[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po proprietary-back-doors.de.po...
From: |
GNUN |
Subject: |
www/proprietary/po proprietary-back-doors.de.po... |
Date: |
Tue, 13 Nov 2018 07:28:07 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/11/13 07:28:06
Modified files:
proprietary/po : proprietary-back-doors.de.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.23&r2=1.24
Patches:
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary-back-doors.de.po 25 Oct 2018 10:31:09 -0000 1.114
+++ proprietary-back-doors.de.po 13 Nov 2018 12:28:05 -0000 1.115
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -96,7 +96,7 @@
# | href=\"#spy\">Spying</a> <a
# | href=\"#alter-data\">Altering user's data/settings</a>
# | <a
-# | href=\"#install-delete\">Installing/deleting programs</a>
+# |
href=\"#install-delete\">Installing/deleting/disabling programs</a>
# | <a href=\"#universal\">Full control</a> <a
# | href=\"#other\">Other/undefined</a> +}
#, fuzzy
@@ -108,9 +108,9 @@
msgid ""
" <a href=\"#spy\">Spying</a> <a href=\"#alter-data"
"\">Altering user's data/settings</a> <a href="
-"\"#install-delete\">Installing/deleting programs</a> <a "
-"href=\"#universal\">Full control</a> <a href=\"#other"
-"\">Other/undefined</a> "
+"\"#install-delete\">Installing/deleting/disabling programs</a> "
+" <a href=\"#universal\">Full control</a> <a href="
+"\"#other\">Other/undefined</a> "
msgstr ""
"<a href=\"#spy\">Spionieren</a> | <a href=\"#alter-data\">Ãndern "
"von Benutzerdaten/‑einstellungen</a> | <a href=\"#install-delete"
@@ -437,10 +437,65 @@
"dazu angehalten sie ohne es wirklich zu verstehen zu aktivieren."
#. type: Content of: <h3>
-msgid "Installing or deleting programs"
+# | [-Installing or-]{+Installing,+} deleting {+or disabling+} programs
+#, fuzzy
+#| msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
msgstr "Programme installieren/entfernen"
#. type: Content of: <ul><li><p>
+msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | Some “Smart” TVs automatically <a
# | [-href=\"https://news.ycombinator.com/item?id=16727319\">load-]
# |
{+href=\"https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\">
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary-back-doors.fr.po 6 Nov 2018 17:16:51 -0000 1.110
+++ proprietary-back-doors.fr.po 13 Nov 2018 12:28:06 -0000 1.111
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-11-06 17:58+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -76,12 +77,26 @@
"pour l'étayer."
#. type: Content of: <p>
+# | <a href=\"#spy\">Spying</a> <a
+# | href=\"#alter-data\">Altering user's data/settings</a>
+# | <a
+# | [-href=\"#install-delete\">Installing/deleting programs</a> -]
+# |
{+href=\"#install-delete\">Installing/deleting/disabling programs</a> +}
+# | <a href=\"#universal\">Full control</a> <a
+# | href=\"#other\">Other/undefined</a>
+#, fuzzy
+#| msgid ""
+#| " <a href=\"#spy\">Spying</a> <a href=\"#alter-data"
+#| "\">Altering user's data/settings</a> <a href="
+#| "\"#install-delete\">Installing/deleting programs</a> <a "
+#| "href=\"#universal\">Full control</a> <a href=\"#other"
+#| "\">Other/undefined</a> "
msgid ""
" <a href=\"#spy\">Spying</a> <a href=\"#alter-data"
"\">Altering user's data/settings</a> <a href="
-"\"#install-delete\">Installing/deleting programs</a> <a "
-"href=\"#universal\">Full control</a> <a href=\"#other"
-"\">Other/undefined</a> "
+"\"#install-delete\">Installing/deleting/disabling programs</a> "
+" <a href=\"#universal\">Full control</a> <a href="
+"\"#other\">Other/undefined</a> "
msgstr ""
" <a href=\"#spy\">Espionner</a> <a href=\"#alter-data"
"\">Altérer les données/préférences de
l'utilisateur</a> "
@@ -375,11 +390,66 @@
"que cela implique."
#. type: Content of: <h3>
-msgid "Installing or deleting programs"
+# | [-Installing or-]{+Installing,+} deleting {+or disabling+} programs
+#, fuzzy
+#| msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
msgstr "Installer ou supprimer des programmes"
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some “Smart” TVs automatically <a href=\"https://web.archive.org/"
"web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\"> "
"load downgrades that install a surveillance app</a>."
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-back-doors.it-diff.html 25 Oct 2018 10:31:09 -0000 1.28
+++ proprietary-back-doors.it-diff.html 13 Nov 2018 12:28:06 -0000 1.29
@@ -53,7 +53,7 @@
<p class="c" style="font-size: 1.1em">
<a href="#spy">Spying</a>
<a
href="#alter-data">Altering user's data/settings</a>
- <a
href="#install-delete">Installing/deleting programs</a>
+ <a
href="#install-delete">Installing/deleting/disabling programs</a>
<a href="#universal">Full control</a>
<a href="#other">Other/undefined</a>
</p>
@@ -270,8 +270,8 @@
</p></li>
<li><p>Users reported</strong></del></span>
- <span class="inserted"><ins><em>state. However,</em></ins></span> that
<span class="inserted"><ins><em>policy didn't last. In 2012
it</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ <span class="inserted"><ins><em>state. However,</em></ins></span> that
<span class="removed"><del><strong><a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
Microsoft was forcing them to replace Windows 7 and 8 with all-spying
Windows 10</a>.</p>
@@ -279,10 +279,10 @@
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
attacking computers that run Windows 7 and 8</a>, switching on a
flag
that said whether to “upgrade” to Windows 10 when users
- had turned it off.</p>
+ had turned</strong></del></span> <span class="inserted"><ins><em>policy
didn't last. In 2012</em></ins></span> it <span
class="removed"><del><strong>off.</p>
- <p>Later on, Microsoft published instructions on <a
-
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ <p>Later on, Microsoft published instructions
on</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
how to permanently reject the downgrade to Windows 10</a>.</p>
<p>This seems to involve use of</strong></del></span>
@@ -355,29 +355,67 @@
<span class="inserted"><ins><em></ul>
-<h3 id='install-delete'>Installing or deleting programs</h3>
+<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
<ul class="blurbs">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.
+ </p>
+ <p>This may have improved</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease to function</a>.</p>
+
+ <p>The article is full of confusions, errors and biases that we have
+ an obligation to expose, given that we are making a link to them.</p>
+
+ <ul>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing in its products. What it does enable the company
+ to do is sue other companies if they do some particular thing in
+ their products.</li>
+
+ <li>A company's policies about when to attack users through a back
+ door are beside the point. Inserting the back door is wrong in the
+ first place, and using the back door is always wrong too. No software
+ developer should have that power over users.</li>
+
+ <li>“<a
+ href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
+ attacking ships. Using that word to refer to sharing copies is a smear;
+ please don't smear sharing.</li>
+
+ <li><p>The idea of “protecting our IP” is
+ total confusion. The term “IP” itself is a <a
+ href="/philosophy/not-ipr.html">bogus generalization about things
+ that have nothing in common</a>.</p>
+
+ <p>In addition, to speak of “protecting” that bogus
+ generalization is a separate absurdity. It's like calling the cops
+ because neighbors' kids are playing on your front yard, and saying
+ that you're "protecting the boundary line". The kids can't do harm
+ to the boundary line, not even</em></ins></span> with <span
class="inserted"><ins><em>a jackhammer, because it is an
+ abstraction and can't be affected by physical action.</p></li>
+ </ul>
+ </li>
+
<li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may have improved with</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
+ <p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span>
+ moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
apps</a>.</p>
@@ -441,33 +479,20 @@
it considers malicious. But there is no excuse for allowing it to
<em>delete</em> the programs, and you should have the right to
decide
who (if anyone) to trust in this <span class="removed"><del><strong>way.
-</p>
-</li>
-
-<li>
-<p><a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
-Samsung Galaxy devices running proprietary Android versions come with a back
-door</a> that provides remote access to the files stored on the device.
</p></strong></del></span> <span
class="inserted"><ins><em>way.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<span class="removed"><del><strong><li>
+<p><a id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span>
- <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
- <p>The <span class="removed"><del><strong>Amazon
Kindle-Swindle</strong></del></span> <span
class="inserted"><ins><em>iPhone</em></ins></span> has a back door <span
class="inserted"><ins><em><a
+ <span class="inserted"><ins><em><li id="M200808110">
+ <p>The iPhone has</em></ins></span> a back
+<span class="removed"><del><strong>door</a></strong></del></span> <span
class="inserted"><ins><em>door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></em></ins></span>
- that <span class="removed"><del><strong>has been
used</strong></del></span> <span class="inserted"><ins><em>allows
Apple</em></ins></span> to
-<span class="removed"><del><strong><a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"></strong></del></span>
remotely <span class="removed"><del><strong>erase books</a>. One of the
books erased was 1984, by George Orwell.
-</p>
-
-<p>Amazon responded to criticism by saying it
would</strong></del></span> delete <span class="removed"><del><strong>books only
-following orders from the state. However, that policy didn't last.
-In 2012
-it <a
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
-a user's Kindle-Swindle and deleted her account</a>, then offered her
-kafkaesque “explanations.”</p></strong></del></span> <span
class="inserted"><ins><em>apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have
+ that <span class="removed"><del><strong>provides remote
access</strong></del></span> <span class="inserted"><ins><em>allows Apple to
remotely delete apps</a> which Apple considers
+ “inappropriate”. Jobs said it's OK for
Apple</em></ins></span> to <span class="inserted"><ins><em>have
this power because of course we can trust Apple.</p>
</li>
</ul>
@@ -476,61 +501,73 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
- <li id="M201711244"></em></ins></span>
- <p>The <span class="removed"><del><strong>Kindle-Swindle
also</strong></del></span> <span class="inserted"><ins><em>Furby
Connect</em></ins></span> has a <a <span
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"></em></ins></span>
- universal back door</a>.
-<span class="removed"><del><strong></p>
-</li>
-
-<li>
-<p>HP “storage appliances” that use</strong></del></span>
<span class="inserted"><ins><em>If</em></ins></span> the <span
class="removed"><del><strong>proprietary
-“Left Hand” operating system have back doors that give
-HP <a
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"></strong></del></span>
<span class="inserted"><ins><em>product as shipped doesn't act as a
- listening device,</em></ins></span> remote <span
class="removed"><del><strong>login access</a></strong></del></span> <span
class="inserted"><ins><em>changes</em></ins></span> to <span
class="removed"><del><strong>them. HP claims that this does not give HP
-access</strong></del></span> <span class="inserted"><ins><em>the code could
surely convert it
- into one.</p>
+ <li id="M201711244">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>files stored on</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as a
+ listening device, remote changes to</em></ins></span> the <span
class="removed"><del><strong>device.
+</p></strong></del></span> <span class="inserted"><ins><em>code could
surely convert it
+ into one.</p></em></ins></span>
</li>
- <li id="M201711010">
- <p>Sony has brought back its robotic pet Aibo, this time <a
+<span class="removed"><del><strong><li>
+<p>The Amazon Kindle-Swindle</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711010">
+ <p>Sony</em></ins></span> has <span
class="inserted"><ins><em>brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with a universal back door, and tethered</em></ins></span> to <span
class="inserted"><ins><em>a server that requires
+ with</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>door, and tethered to a server</em></ins></span> that
<span class="removed"><del><strong>has been</strong></del></span> <span
class="inserted"><ins><em>requires
a subscription</a>.</p>
</li>
<li id="M201709091">
- <p>Tesla used software to limit</em></ins></span> the <span
class="removed"><del><strong>customer's data,</strong></del></span> <span
class="inserted"><ins><em>part of the battery
- that was available to customers in some cars, and <a
+ <p>Tesla</em></ins></span> used <span
class="inserted"><ins><em>software</em></ins></span> to
+<span class="removed"><del><strong><a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+remotely erase books</a>. One</strong></del></span> <span
class="inserted"><ins><em>limit the part</em></ins></span> of the <span
class="removed"><del><strong>books erased</strong></del></span> <span
class="inserted"><ins><em>battery
+ that</em></ins></span> was <span class="removed"><del><strong>1984, by
George Orwell.
+</p>
+
+<p>Amazon responded</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>criticism by saying it</strong></del></span> <span
class="inserted"><ins><em>customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
a universal back door in the software</a> to temporarily increase
this limit.</p>
<p>While remotely allowing car “owners” to use the
whole battery capacity did not do them any harm, the same back
- door would permit Tesla (perhaps under the command of some
+ door</em></ins></span> would <span class="removed"><del><strong>delete
books only
+following orders from</strong></del></span> <span
class="inserted"><ins><em>permit Tesla (perhaps under</em></ins></span> the
<span class="removed"><del><strong>state. However, that policy didn't last.
+In 2012
+it</strong></del></span> <span class="inserted"><ins><em>command of some
government) to remotely order the car to use none of its battery. Or
perhaps to drive its passenger to a torture prison.</p>
</li>
<li id="M201702061">
- <p>Vizio “smart” TVs <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
- have a universal back door</a>.</p>
+ <p>Vizio “smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
+ have</em></ins></span> a <span class="removed"><del><strong>user's
Kindle-Swindle and deleted her account</a>, then offered her
+kafkaesque “explanations.”</p>
+
+
+<p>The Kindle-Swindle also has</strong></del></span> <span
class="inserted"><ins><em>universal back door</a>.</p>
</li>
<li id="M201609130">
<p>Xiaomi phones come with <a
-
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
- a universal back door in the application processor, for Xiaomi's
+
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"></em></ins></span>
+ a <span class="inserted"><ins><em>universal back door in the application
processor, for Xiaomi's
use</a>.</p>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor that the local phone
- company can use</a>.</p>
+ <p>This is separate from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"></strong></del></span>
<span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the</em></ins></span>
+ universal back <span class="removed"><del><strong>door</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>door in the
modem processor that the local phone
+ company can use</a>.</p></em></ins></span>
</li>
- <li id="M201608172">
+<span class="removed"><del><strong><li>
+<p>HP “storage appliances”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201608172">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -538,8 +575,9 @@
<p>This was <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- reported in 2007</a> for XP and Vista, and it seems
- that Microsoft used the same method to push the <a
+ reported in 2007</a> for XP and Vista, and it seems</em></ins></span>
+ that <span class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>Microsoft used</em></ins></span> the <span
class="removed"><del><strong>proprietary
+“Left Hand” operating system</strong></del></span> <span
class="inserted"><ins><em>same method to push the <a
href="/proprietary/malware-microsoft.html#windows10-forcing">
Windows 10 downgrade</a> to computers running Windows 7 and
8.</p>
@@ -550,13 +588,15 @@
</li>
<li id="M201606060">
- <p>The Amazon Echo appears to have a universal back door, since <a
- href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
+ <p>The Amazon Echo appears to</em></ins></span> have <span
class="inserted"><ins><em>a universal</em></ins></span> back <span
class="removed"><del><strong>doors that give
+HP</strong></del></span> <span class="inserted"><ins><em>door,
since</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
it installs “updates” automatically</a>.</p>
<p>We have found nothing explicitly documenting the lack of any way
- to disable remote changes to the software, so we are not completely
- sure there isn't one,</em></ins></span> but <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>this seems pretty clear.</p>
+ to disable</em></ins></span> remote <span
class="removed"><del><strong>login access</a></strong></del></span> <span
class="inserted"><ins><em>changes</em></ins></span> to <span
class="removed"><del><strong>them. HP claims that this
does</strong></del></span> <span class="inserted"><ins><em>the software, so we
are</em></ins></span> not <span class="removed"><del><strong>give HP
+access</strong></del></span> <span class="inserted"><ins><em>completely
+ sure there isn't one, but this seems pretty clear.</p>
</li>
<li id="M201412180">
@@ -564,8 +604,8 @@
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>. Nearly
all models of mobile phones have a <a href="#universal-back-door">
- universal back door in the modem chip</a>. So why did Coolpad bother
- to introduce another? Because this one is controlled by Coolpad.</p>
+ universal back door in the modem chip</a>. So why did Coolpad
bother</em></ins></span>
+ to <span class="inserted"><ins><em>introduce another? Because this one is
controlled by Coolpad.</p>
</li>
<li id="M201311300">
@@ -579,12 +619,12 @@
<p>ChromeOS has a universal back
door. At least, Google says it does—in <a
href="https://www.google.com/intl/en/chromebook/termsofservice.html">
- section 4 of</em></ins></span> the <span
class="inserted"><ins><em>EULA</a>.</p>
+ section 4 of</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>EULA</a>.</p>
</li>
<li id="M200700001">
<p>In addition to its <a href="#swindle-eraser">book
- eraser</a>, the Kindle-Swindle has a <a
+ eraser</a>,</em></ins></span> the <span
class="inserted"><ins><em>Kindle-Swindle has a <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
universal back door</a>.</p>
</li>
@@ -766,7 +806,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:09 $
+$Date: 2018/11/13 12:28:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary-back-doors.it.po 25 Oct 2018 10:31:09 -0000 1.106
+++ proprietary-back-doors.it.po 13 Nov 2018 12:28:06 -0000 1.107
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -70,9 +70,9 @@
msgid ""
" <a href=\"#spy\">Spying</a> <a href=\"#alter-data"
"\">Altering user's data/settings</a> <a href="
-"\"#install-delete\">Installing/deleting programs</a> <a "
-"href=\"#universal\">Full control</a> <a href=\"#other"
-"\">Other/undefined</a> "
+"\"#install-delete\">Installing/deleting/disabling programs</a> "
+" <a href=\"#universal\">Full control</a> <a href="
+"\"#other\">Other/undefined</a> "
msgstr ""
#. type: Content of: <h3>
@@ -440,7 +440,59 @@
"spinti ad abilitarla a loro insaputa."
#. type: Content of: <h3>
-msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-back-doors.ja-diff.html 25 Oct 2018 10:31:09 -0000 1.26
+++ proprietary-back-doors.ja-diff.html 13 Nov 2018 12:28:06 -0000 1.27
@@ -58,7 +58,7 @@
<p class="c" style="font-size: 1.1em">
<a href="#spy">Spying</a>
<a
href="#alter-data">Altering user's data/settings</a>
- <a
href="#install-delete">Installing/deleting programs</a>
+ <a
href="#install-delete">Installing/deleting/disabling programs</a>
<a href="#universal">Full control</a>
<a href="#other">Other/undefined</a>
</p>
@@ -140,34 +140,34 @@
entering</em></ins></span> an <span
class="removed"><del><strong>admini</strong></del></span> <span
class="inserted"><ins><em>admin</em></ins></span> password</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal back door in portable phones <a
-
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
- employed to listen through their microphones</a>.</p>
- <p>More about</strong></del></span> <span
class="inserted"><ins><em>id="M201604250">
- <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>this
problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
- it can alter them too</a>.</p></em></ins></span>
+ <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal</strong></del></span> <span
class="inserted"><ins><em>id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- Microsoft</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201512074">
+ <li id="M201512074">
<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
- Some D-Link routers</a> have a back door for changing settings in a
- dlink of an eye.</p>
+ Some D-Link routers</a> have a</em></ins></span> back door <span
class="inserted"><ins><em>for changing settings</em></ins></span> in <span
class="removed"><del><strong>portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed to listen through their microphones</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span class="inserted"><ins><em>a
+ dlink</em></ins></span> of <span class="removed"><del><strong>this
problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
- router</em></ins></span> has <span class="removed"><del><strong>already
backdoored</strong></del></span> <span class="inserted"><ins><em>a back
door</a>.</p>
+ router has a back door</a>.</p>
<p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
- routers have back doors</a>.</p>
+ routers have back doors</a>.</p></em></ins></span>
</li>
- <li id="M201511244">
- <p>Google has long had <a
+ <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511244">
+ <p>Google</em></ins></span> has <span
class="removed"><del><strong>already backdoored</strong></del></span> <span
class="inserted"><ins><em>long had <a
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
back door to remotely unlock an Android device</a>,
unless</em></ins></span> its disk <span
class="removed"><del><strong>encryption</a>.</p></li>
@@ -309,8 +309,8 @@
<li>
<p>The iPhone has a back door
<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
-that allows Apple to remotely delete apps</a> which Apple considers
-“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span
class="inserted"><ins><em>reason</em></ins></span> to <span
class="removed"><del><strong>have this power
+that allows Apple</strong></del></span> <span
class="inserted"><ins><em>reason</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
+“inappropriate”. Jobs said it's ok for Apple to have this power
because of course we can trust Apple.
</p></strong></del></span>
<span class="inserted"><ins><em>assume that they
don't.</p></em></ins></span>
@@ -323,69 +323,112 @@
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling it without <span class="removed"><del><strong>understanding.
-</p></strong></del></span> <span
class="inserted"><ins><em>understanding.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>Apple can, and regularly does,
<a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
+ remotely extract some data from iPhones for the state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>understanding.</p></em></ins></span>
+ </li>
+
+
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+Windows 8 also</strong></del></span>
<span class="inserted"><ins><em></ul>
-<h3 id='install-delete'>Installing or deleting programs</h3>
+<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
<ul class="blurbs">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro</em></ins></span> has a <span
class="inserted"><ins><em><a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
+ back door <span class="removed"><del><strong>for remotely deleting
apps</a>.
+</p>
+
+<p>
+You might well decide to let a security service that you trust
+remotely <em>deactivate</em> programs</strong></del></span> that
<span class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>can make it cease to function</a>.</p>
+
+ <p>The article is full of confusions, errors and biases that we have
+ an obligation to expose, given that we are making a link to them.</p>
+
+ <ul>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing in its products. What it does enable the company
+ to do is sue other companies if they do some particular thing in
+ their products.</li>
+
+ <li>A company's policies about when to attack users through a back
+ door are beside the point. Inserting the back door is wrong in the
+ first place, and using the back door is always wrong too. No software
+ developer should have that power over users.</li>
+
+ <li>“<a
+ href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
+ attacking ships. Using that word to refer to sharing copies is a smear;
+ please don't smear sharing.</li>
+
+ <li><p>The idea of “protecting our IP” is
+ total confusion. The term “IP” itself is a <a
+ href="/philosophy/not-ipr.html">bogus generalization about things
+ that have nothing in common</a>.</p>
+
+ <p>In addition, to speak of “protecting” that bogus
+ generalization is a separate absurdity. It's like calling the cops
+ because neighbors' kids are playing on your front yard, and saying
+ that you're "protecting the boundary line". The kids can't do harm
+ to the boundary line, not even with a jackhammer, because it is an
+ abstraction and can't be affected by physical action.</p></li>
+ </ul>
+ </li>
+
<li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may have improved with</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
+ <p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
+ <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload files” as well as forcibly install
apps</a>.</p>
- <p>It is used by 14,000 Android
applications.</p></em></ins></span>
+ <p>It is used by 14,000 Android applications.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201112080">
+ <li id="M201112080">
<p> In addition to its <a href="#windows-update">universal back
- door</a>,</em></ins></span> Windows 8 <span
class="removed"><del><strong>also</strong></del></span> has a back door for
<span class="inserted"><ins><em><a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
- remotely deleting <span class="removed"><del><strong>apps</a>.
-</p>
-
-<p>
-You</strong></del></span> <span
class="inserted"><ins><em>apps</a>.</p>
+ door</a>, Windows 8 has a back door for <a
+
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ remotely deleting apps</a>.</p>
- <p>You</em></ins></span> might well decide to let a security service
that you trust
- remotely <em>deactivate</em> programs that it considers
malicious.
+ <p>You might well decide to let a security service that you trust
+ remotely <em>deactivate</em> programs that
it</em></ins></span> considers malicious.
But there is no excuse for <em>deleting</em> the programs, and
you
- should have the right to <span class="removed"><del><strong>decide who (if
anyone) to trust in this way.
+ should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.
</p>
<p>
As these pages show, if you do want to clean your computer of malware,
-the first software</strong></del></span> <span
class="inserted"><ins><em>decide whom (if anyone)</em></ins></span> to <span
class="removed"><del><strong>delete is Windows or iOS.
-</p></strong></del></span> <span class="inserted"><ins><em>trust in this
- way.</p></em></ins></span>
+the first software to delete is Windows or iOS.
+</p></strong></del></span>
+ <span class="inserted"><ins><em>way.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -413,9 +456,9 @@
<p>Although</em></ins></span> Google's <em>exercise</em>
of this power has not been
malicious so far, the point is that nobody should have such power,
- which could also be used maliciously. You might well decide to
+ which could also be <span class="removed"><del><strong>used maliciously.
You might well decide</strong></del></span> <span
class="inserted"><ins><em>used maliciously. You might well decide to
let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for <span
class="removed"><del><strong>allowing</strong></del></span> <span
class="inserted"><ins><em>allowing it to
+ it considers malicious. But there is no excuse for allowing it to
<em>delete</em> the programs, and you should have the right to
decide
who (if anyone) to trust in this way.</p>
</li>
@@ -487,10 +530,10 @@
<p>This was <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- reported in 2007</a> for XP and Vista, and</em></ins></span> it
<span class="inserted"><ins><em>seems
- that Microsoft used the same method</em></ins></span> to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
<span class="inserted"><ins><em>push</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em><a
+ reported in 2007</a> for XP and Vista, and it seems
+ that Microsoft used the same method to push the <a
href="/proprietary/malware-microsoft.html#windows10-forcing">
- Windows 10 downgrade</a> to computers running Windows
7</em></ins></span> and <span class="removed"><del><strong>you
should</strong></del></span> <span class="inserted"><ins><em>8.</p>
+ Windows 10 downgrade</a> to computers running Windows 7 and
8.</p>
<p>In Windows 10, the universal back door
is no longer hidden; all “upgrades” will be <a
@@ -499,9 +542,12 @@
</li>
<li id="M201606060">
- <p>The Amazon Echo appears to have a universal back door, since <a
- href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
- it installs “updates” automatically</a>.</p>
+ <p>The Amazon Echo appears</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>have</em></ins></span> a
+<span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs that it
+considers malicious. But there is no excuse for
allowing</strong></del></span> <span class="inserted"><ins><em>universal back
door, since <a
+
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"></em></ins></span>
+ it
+<span class="removed"><del><strong>to <em>delete</em> the
programs, and you should</strong></del></span> <span
class="inserted"><ins><em>installs “updates”
automatically</a>.</p>
<p>We</em></ins></span> have <span class="inserted"><ins><em>found
nothing explicitly documenting</em></ins></span> the <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>lack of any way</em></ins></span>
to
@@ -568,11 +614,11 @@
<span class="inserted"><ins><em><li id="M200612050">
<p>Almost every phone's communication
processor has a universal</em></ins></span> back <span
class="removed"><del><strong>doors that give
-HP</strong></del></span> <span class="inserted"><ins><em>door which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+HP <a
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
remote login access</a> to them. HP claims that this does not give HP
-access</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- often used</em></ins></span> to <span class="removed"><del><strong>the
customer's data, but if the</strong></del></span> <span
class="inserted"><ins><em>make a phone transmit all conversations it
hears</a>. See
+access to the customer's data, but if the</strong></del></span> <span
class="inserted"><ins><em>door which is <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it hears</a>.
See
<a
href="/proprietary/malware-mobiles.html#universal-back-door">Malware
in Mobile Devices</a> for more info.</p>
</li>
@@ -745,7 +791,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 10:31:09 $
+$Date: 2018/11/13 12:28:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-back-doors.ja.po 25 Oct 2018 10:31:11 -0000 1.86
+++ proprietary-back-doors.ja.po 13 Nov 2018 12:28:06 -0000 1.87
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -69,9 +69,9 @@
msgid ""
" <a href=\"#spy\">Spying</a> <a href=\"#alter-data"
"\">Altering user's data/settings</a> <a href="
-"\"#install-delete\">Installing/deleting programs</a> <a "
-"href=\"#universal\">Full control</a> <a href=\"#other"
-"\">Other/undefined</a> "
+"\"#install-delete\">Installing/deleting/disabling programs</a> "
+" <a href=\"#universal\">Full control</a> <a href="
+"\"#other\">Other/undefined</a> "
msgstr ""
#. type: Content of: <h3>
@@ -363,7 +363,59 @@
"ãã«ä»åãããã¾ãã"
#. type: Content of: <h3>
-msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary-back-doors.pot 25 Oct 2018 10:31:11 -0000 1.57
+++ proprietary-back-doors.pot 13 Nov 2018 12:28:06 -0000 1.58
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -62,7 +62,7 @@
" <a href=\"#spy\">Spying</a> <a "
"href=\"#alter-data\">Altering user's data/settings</a> "
" <a "
-"href=\"#install-delete\">Installing/deleting programs</a> "
+"href=\"#install-delete\">Installing/deleting/disabling programs</a>
"
" <a href=\"#universal\">Full control</a> <a "
"href=\"#other\">Other/undefined</a> "
msgstr ""
@@ -262,7 +262,59 @@
msgstr ""
#. type: Content of: <h3>
-msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Corel Paintshop Pro has a <a "
+"href=\"https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/\">
"
+"back door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary-back-doors.ru.po 25 Oct 2018 17:00:14 -0000 1.153
+++ proprietary-back-doors.ru.po 13 Nov 2018 12:28:06 -0000 1.154
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-10-08 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -74,12 +75,26 @@
"каÑеÑÑве конкÑеÑнÑÑ
ÑвидеÑелÑÑÑв."
#. type: Content of: <p>
+# | <a href=\"#spy\">Spying</a> <a
+# | href=\"#alter-data\">Altering user's data/settings</a>
+# | <a
+# | [-href=\"#install-delete\">Installing/deleting programs</a> -]
+# |
{+href=\"#install-delete\">Installing/deleting/disabling programs</a> +}
+# | <a href=\"#universal\">Full control</a> <a
+# | href=\"#other\">Other/undefined</a>
+#, fuzzy
+#| msgid ""
+#| " <a href=\"#spy\">Spying</a> <a href=\"#alter-data"
+#| "\">Altering user's data/settings</a> <a href="
+#| "\"#install-delete\">Installing/deleting programs</a> <a "
+#| "href=\"#universal\">Full control</a> <a href=\"#other"
+#| "\">Other/undefined</a> "
msgid ""
" <a href=\"#spy\">Spying</a> <a href=\"#alter-data"
"\">Altering user's data/settings</a> <a href="
-"\"#install-delete\">Installing/deleting programs</a> <a "
-"href=\"#universal\">Full control</a> <a href=\"#other"
-"\">Other/undefined</a> "
+"\"#install-delete\">Installing/deleting/disabling programs</a> "
+" <a href=\"#universal\">Full control</a> <a href="
+"\"#other\">Other/undefined</a> "
msgstr ""
" <a href=\"#spy\">Шпионаж</a> <a href=\"#alter-data"
"\">Ðзменение даннÑÑ
/наÑÑÑоек</a> <a
href=\"#install-delete"
@@ -364,11 +379,66 @@
"делаÑÑ."
#. type: Content of: <h3>
-msgid "Installing or deleting programs"
+# | [-Installing or-]{+Installing,+} deleting {+or disabling+} programs
+#, fuzzy
+#| msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
msgstr "УÑÑановка или Ñдаление пÑогÑамм"
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some “Smart” TVs automatically <a href=\"https://web.archive.org/"
"web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\"> "
"load downgrades that install a surveillance app</a>."
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.de.po 8 Nov 2018 18:58:39 -0000 1.63
+++ proprietary.de.po 13 Nov 2018 12:28:06 -0000 1.64
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -423,6 +423,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -477,16 +529,6 @@
"won't collect any of that data."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary.es.po 8 Nov 2018 18:58:39 -0000 1.62
+++ proprietary.es.po 13 Nov 2018 12:28:06 -0000 1.63
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-09-19 10:49+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -436,6 +436,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -490,16 +542,6 @@
"won't collect any of that data."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.fr.po 12 Nov 2018 17:13:55 -0000 1.78
+++ proprietary.fr.po 13 Nov 2018 12:28:06 -0000 1.79
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-11-06 17:58+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -290,6 +291,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -374,22 +427,6 @@
"de la voiture ne peut collecter aucune de ces données, ou bien que le "
"logiciel est libre, ce qui permet de savoir si c'est bien le cas."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-"Les fabricants d'imprimantes ont l'esprit inventif… lorsqu'il s'agit "
-"d'interdire l'usage de cartouches de remplacement non officielles. Leurs "
-"« mises à niveau de sécurité » imposent de temps à autre de nouvelles
formes "
-"de DRM pour les cartouches. <a href=\"https://motherboard.vice.com/en_us/"
-"article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-"
-"security-updates\">HP et Epson le font</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -465,3 +502,18 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Printer manufacturers are very innovative—at blocking the use of "
+#~ "independent replacement ink cartridges. Their “security "
+#~ "upgrades” occasionally impose new forms of cartridge DRM. <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+#~ "crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+#~ "have done this</a>."
+#~ msgstr ""
+#~ "Les fabricants d'imprimantes ont l'esprit inventif… lorsqu'il "
+#~ "s'agit d'interdire l'usage de cartouches de remplacement non officielles. "
+#~ "Leurs « mises à niveau de sécurité » imposent de temps à autre de "
+#~ "nouvelles formes de DRM pour les cartouches. <a href=\"https://"
+#~ "motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-"
+#~ "cheap-ink-cartridges-via-bogus-security-updates\">HP et Epson le font</a>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary.it-diff.html 8 Nov 2018 18:58:40 -0000 1.21
+++ proprietary.it-diff.html 13 Nov 2018 12:28:06 -0000 1.22
@@ -25,9 +25,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -97,18 +97,18 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
- <li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+ <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
<li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
@@ -179,6 +179,44 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a <a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease to function</a>.</p>
+
+ <p>The article is full of confusions, errors and biases that we have
+ an obligation to expose, given that we are making a link to them.</p>
+
+ <ul>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing in its products. What it does enable the company
+ to do is sue other companies if they do some particular thing in
+ their products.</li>
+
+ <li>A company's policies about when to attack users through a back
+ door are beside the point. Inserting the back door is wrong in the
+ first place, and using the back door is always wrong too. No software
+ developer should have that power over users.</li>
+
+ <li>“<a
+ href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
+ attacking ships. Using that word to refer to sharing copies is a smear;
+ please don't smear sharing.</li>
+
+ <li><p>The idea of “protecting our IP” is
+ total confusion. The term “IP” itself is a <a
+ href="/philosophy/not-ipr.html">bogus generalization about things
+ that have nothing in common</a>.</p>
+
+ <p>In addition, to speak of “protecting” that bogus
+ generalization is a separate absurdity. It's like calling the cops
+ because neighbors' kids are playing on your front yard, and saying
+ that you're "protecting the boundary line". The kids can't do harm
+ to the boundary line, not even with a jackhammer, because it is an
+ abstraction and can't be affected by physical action.</p></li>
+ </ul>
+ </li>
+
<li id="M201810300">
<p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
@@ -223,14 +261,6 @@
hardware cannot collect any of that data, or that the software
is free so we know it won't collect any of that data.</p>
</li>
-
- <li id="M201810150">
- <p>Printer manufacturers are very innovative—at blocking the
- use of independent replacement ink cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge DRM. <a
-
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP and Epson have done this</a>.</p>
- </li>
</ul></em></ins></span>
@@ -291,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/11/08 18:58:40 $
+$Date: 2018/11/13 12:28:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.it.po 8 Nov 2018 18:58:40 -0000 1.72
+++ proprietary.it.po 13 Nov 2018 12:28:06 -0000 1.73
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -427,6 +427,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -481,16 +533,6 @@
"won't collect any of that data."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary.ja-diff.html 8 Nov 2018 18:58:40 -0000 1.23
+++ proprietary.ja-diff.html 13 Nov 2018 12:28:06 -0000 1.24
@@ -176,6 +176,44 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a <a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease to function</a>.</p>
+
+ <p>The article is full of confusions, errors and biases that we have
+ an obligation to expose, given that we are making a link to them.</p>
+
+ <ul>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing in its products. What it does enable the company
+ to do is sue other companies if they do some particular thing in
+ their products.</li>
+
+ <li>A company's policies about when to attack users through a back
+ door are beside the point. Inserting the back door is wrong in the
+ first place, and using the back door is always wrong too. No software
+ developer should have that power over users.</li>
+
+ <li>“<a
+ href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
+ attacking ships. Using that word to refer to sharing copies is a smear;
+ please don't smear sharing.</li>
+
+ <li><p>The idea of “protecting our IP” is
+ total confusion. The term “IP” itself is a <a
+ href="/philosophy/not-ipr.html">bogus generalization about things
+ that have nothing in common</a>.</p>
+
+ <p>In addition, to speak of “protecting” that bogus
+ generalization is a separate absurdity. It's like calling the cops
+ because neighbors' kids are playing on your front yard, and saying
+ that you're "protecting the boundary line". The kids can't do harm
+ to the boundary line, not even with a jackhammer, because it is an
+ abstraction and can't be affected by physical action.</p></li>
+ </ul>
+ </li>
+
<li id="M201810300">
<p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
@@ -220,14 +258,6 @@
hardware cannot collect any of that data, or that the software
is free so we know it won't collect any of that data.</p>
</li>
-
- <li id="M201810150">
- <p>Printer manufacturers are very innovative—at blocking the
- use of independent replacement ink cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge DRM. <a
-
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP and Epson have done this</a>.</p>
- </li>
</ul></em></ins></span>
@@ -288,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/11/08 18:58:40 $
+$Date: 2018/11/13 12:28:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.ja.po 8 Nov 2018 18:58:40 -0000 1.55
+++ proprietary.ja.po 13 Nov 2018 12:28:06 -0000 1.56
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -349,6 +349,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -403,16 +455,6 @@
"won't collect any of that data."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary.nl-diff.html 8 Nov 2018 18:58:40 -0000 1.21
+++ proprietary.nl-diff.html 13 Nov 2018 12:28:06 -0000 1.22
@@ -38,10 +38,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
@@ -154,10 +154,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -179,6 +179,44 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a <a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease to function</a>.</p>
+
+ <p>The article is full of confusions, errors and biases that we have
+ an obligation to expose, given that we are making a link to them.</p>
+
+ <ul>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing in its products. What it does enable the company
+ to do is sue other companies if they do some particular thing in
+ their products.</li>
+
+ <li>A company's policies about when to attack users through a back
+ door are beside the point. Inserting the back door is wrong in the
+ first place, and using the back door is always wrong too. No software
+ developer should have that power over users.</li>
+
+ <li>“<a
+ href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
+ attacking ships. Using that word to refer to sharing copies is a smear;
+ please don't smear sharing.</li>
+
+ <li><p>The idea of “protecting our IP” is
+ total confusion. The term “IP” itself is a <a
+ href="/philosophy/not-ipr.html">bogus generalization about things
+ that have nothing in common</a>.</p>
+
+ <p>In addition, to speak of “protecting” that bogus
+ generalization is a separate absurdity. It's like calling the cops
+ because neighbors' kids are playing on your front yard, and saying
+ that you're "protecting the boundary line". The kids can't do harm
+ to the boundary line, not even with a jackhammer, because it is an
+ abstraction and can't be affected by physical action.</p></li>
+ </ul>
+ </li>
+
<li id="M201810300">
<p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
@@ -223,14 +261,6 @@
hardware cannot collect any of that data, or that the software
is free so we know it won't collect any of that data.</p>
</li>
-
- <li id="M201810150">
- <p>Printer manufacturers are very innovative—at blocking the
- use of independent replacement ink cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge DRM. <a
-
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP and Epson have done this</a>.</p>
- </li>
</ul></em></ins></span>
@@ -291,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/11/08 18:58:40 $
+$Date: 2018/11/13 12:28:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary.nl.po 8 Nov 2018 18:58:40 -0000 1.45
+++ proprietary.nl.po 13 Nov 2018 12:28:06 -0000 1.46
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -420,6 +420,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -474,16 +526,6 @@
"won't collect any of that data."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary.pl-diff.html 8 Nov 2018 18:58:40 -0000 1.39
+++ proprietary.pl-diff.html 13 Nov 2018 12:28:06 -0000 1.40
@@ -40,8 +40,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -85,8 +85,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
+instances of malicious functionalities (with more than 400 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -121,18 +121,18 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -153,10 +153,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -177,6 +177,44 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a <a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease to function</a>.</p>
+
+ <p>The article is full of confusions, errors and biases that we have
+ an obligation to expose, given that we are making a link to them.</p>
+
+ <ul>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing in its products. What it does enable the company
+ to do is sue other companies if they do some particular thing in
+ their products.</li>
+
+ <li>A company's policies about when to attack users through a back
+ door are beside the point. Inserting the back door is wrong in the
+ first place, and using the back door is always wrong too. No software
+ developer should have that power over users.</li>
+
+ <li>“<a
+ href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
+ attacking ships. Using that word to refer to sharing copies is a smear;
+ please don't smear sharing.</li>
+
+ <li><p>The idea of “protecting our IP” is
+ total confusion. The term “IP” itself is a <a
+ href="/philosophy/not-ipr.html">bogus generalization about things
+ that have nothing in common</a>.</p>
+
+ <p>In addition, to speak of “protecting” that bogus
+ generalization is a separate absurdity. It's like calling the cops
+ because neighbors' kids are playing on your front yard, and saying
+ that you're "protecting the boundary line". The kids can't do harm
+ to the boundary line, not even with a jackhammer, because it is an
+ abstraction and can't be affected by physical action.</p></li>
+ </ul>
+ </li>
+
<li id="M201810300">
<p>Nearly all “home security cameras” <a
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
@@ -221,14 +259,6 @@
hardware cannot collect any of that data, or that the software
is free so we know it won't collect any of that data.</p>
</li>
-
- <li id="M201810150">
- <p>Printer manufacturers are very innovative—at blocking the
- use of independent replacement ink cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge DRM. <a
-
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP and Epson have done this</a>.</p>
- </li>
</ul></em></ins></span>
@@ -289,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/11/08 18:58:40 $
+$Date: 2018/11/13 12:28:06 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary.pl.po 8 Nov 2018 18:58:40 -0000 1.40
+++ proprietary.pl.po 13 Nov 2018 12:28:06 -0000 1.41
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -501,6 +501,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -555,16 +607,6 @@
"won't collect any of that data."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary.pot 8 Nov 2018 18:58:40 -0000 1.37
+++ proprietary.pot 13 Nov 2018 12:28:06 -0000 1.38
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -241,6 +241,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a "
+"href=\"https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/\">
"
+"back door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a "
"href=\"https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/\">
"
"give the manufacturer an unencrypted copy of everything they "
@@ -297,15 +349,6 @@
"won't collect any of that data."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a "
-"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\">
"
-"HP and Epson have done this</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary.pt-br.po 8 Nov 2018 18:58:40 -0000 1.28
+++ proprietary.pt-br.po 13 Nov 2018 12:28:06 -0000 1.29
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-11-05 17:53-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -288,6 +289,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -371,22 +424,6 @@
"hardware do carro não pode coletar nenhum desses dados, ou que o software é
"
"livre, por isso sabemos que ele não coletará nenhum desses dados."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-"Os fabricantes de impressoras são muito inovadores – bloqueando o uso "
-"de cartuchos de tinta de substituição independentes. Suas âatualizações
de "
-"segurançaâ ocasionalmente impor novas formas de DRM de cartucho. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> A HP e a Epson "
-"fizeram isso</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -465,6 +502,21 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Printer manufacturers are very innovative—at blocking the use of "
+#~ "independent replacement ink cartridges. Their “security "
+#~ "upgrades” occasionally impose new forms of cartridge DRM. <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+#~ "crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+#~ "have done this</a>."
+#~ msgstr ""
+#~ "Os fabricantes de impressoras são muito inovadores – bloqueando o "
+#~ "uso de cartuchos de tinta de substituição independentes. Suas "
+#~ "âatualizações de segurançaâ ocasionalmente impor novas formas de
DRM de "
+#~ "cartucho. <a href=\"https://motherboard.vice.com/en_us/article/pa98ab/"
+#~ "printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-"
+#~ "updates\"> A HP e a Epson fizeram isso</a>."
+
+#~ msgid ""
#~ "A nonfree video game, available through the nonfree Steam client, <a href="
#~ "\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
#~ "systems-with-\"> included a “miner”</a>, i.e. an executable "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary.ru.po 8 Nov 2018 18:58:40 -0000 1.101
+++ proprietary.ru.po 13 Nov 2018 12:28:06 -0000 1.102
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-10-30 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -294,6 +295,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -378,22 +431,6 @@
"пÑогÑÐ°Ð¼Ð¼Ñ ÑвободнÑ, Ñак ÑÑо Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, ÑÑо
они не бÑдÑÑ ÑобиÑаÑÑ Ð½Ð¸Ñего из "
"ÑÑиÑ
даннÑÑ
."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-"ÐÑоизводиÑели пÑинÑеÑов оÑенÑ
изобÑеÑаÑелÑÐ½Ñ — в блокиÑовке "
-"пÑÐ¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ ÐºÐ°ÑÑÑиджей ÑÑеÑÑиÑ
пÑоизводиÑелей. ÐÑ
“Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ "
-"безопаÑноÑÑи” вÑÐµÐ¼Ñ Ð¾Ñ Ð²Ñемени
налагаÑÑ Ð½Ð¾Ð²Ñе ÑоÑÐ¼Ñ ÑиÑÑового "
-"ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми в каÑÑÑиджаÑ
. <a
href=\"https://motherboard.vice."
-"com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-"
-"via-bogus-security-updates\"> Так делали HP и Epson</a>."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -473,6 +510,21 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Printer manufacturers are very innovative—at blocking the use of "
+#~ "independent replacement ink cartridges. Their “security "
+#~ "upgrades” occasionally impose new forms of cartridge DRM. <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+#~ "crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+#~ "have done this</a>."
+#~ msgstr ""
+#~ "ÐÑоизводиÑели пÑинÑеÑов оÑенÑ
изобÑеÑаÑелÑÐ½Ñ — в блокиÑовке "
+#~ "пÑÐ¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ ÐºÐ°ÑÑÑиджей ÑÑеÑÑиÑ
пÑоизводиÑелей. ÐÑ
“Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸Ñ "
+#~ "безопаÑноÑÑи” вÑÐµÐ¼Ñ Ð¾Ñ Ð²Ñемени
налагаÑÑ Ð½Ð¾Ð²Ñе ÑоÑÐ¼Ñ ÑиÑÑового "
+#~ "ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми в каÑÑÑиджаÑ
.
<a href=\"https://motherboard.vice."
+#~ "com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-"
+#~ "cartridges-via-bogus-security-updates\"> Так делали HP и
Epson</a>."
+
+#~ msgid ""
#~ "A nonfree video game, available through the nonfree Steam client, <a href="
#~ "\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
#~ "systems-with-\"> included a “miner”</a>, i.e. an executable "
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary.zh-tw.po 8 Nov 2018 18:58:40 -0000 1.23
+++ proprietary.zh-tw.po 13 Nov 2018 12:28:06 -0000 1.24
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -338,6 +338,58 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not “enable” a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"“<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>” "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of “protecting our IP” is total confusion. The term "
+"“IP” itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of “protecting” that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Nearly all “home security cameras” <a href=\"https://www."
"consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
"reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -392,16 +444,6 @@
"won't collect any of that data."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative—at blocking the use of "
-"independent replacement ink cartridges. Their “security "
-"upgrades” occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
- www/proprietary/po proprietary-back-doors.de.po...,
GNUN <=