www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po proprietary-back-doors.de.po...


From: GNUN
Subject: www/proprietary/po proprietary-back-doors.de.po...
Date: Tue, 13 Nov 2018 07:28:07 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/11/13 07:28:06

Modified files:
        proprietary/po : proprietary-back-doors.de.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po proprietary.de.po 
                         proprietary.es.po proprietary.fr.po 
                         proprietary.it-diff.html proprietary.it.po 
                         proprietary.ja-diff.html proprietary.ja.po 
                         proprietary.nl-diff.html proprietary.nl.po 
                         proprietary.pl-diff.html proprietary.pl.po 
                         proprietary.pot proprietary.pt-br.po 
                         proprietary.ru.po proprietary.zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.23&r2=1.24

Patches:
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary-back-doors.de.po        25 Oct 2018 10:31:09 -0000      1.114
+++ proprietary-back-doors.de.po        13 Nov 2018 12:28:05 -0000      1.115
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -96,7 +96,7 @@
 # | href=\"#spy\">Spying</a>&nbsp; &nbsp;<a
 # | href=\"#alter-data\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp;
 # | &nbsp;<a
-# | href=\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp;
+# | 
href=\"#install-delete\">Installing/deleting/disabling&nbsp;programs</a>&nbsp;
 # | &nbsp;<a href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a
 # | href=\"#other\">Other/undefined</a>&nbsp;+}
 #, fuzzy
@@ -108,9 +108,9 @@
 msgid ""
 "&nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a href=\"#alter-data"
 "\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp; &nbsp;<a href="
-"\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp; &nbsp;<a "
-"href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href=\"#other"
-"\">Other/undefined</a>&nbsp;"
+"\"#install-delete\">Installing/deleting/disabling&nbsp;programs</a>&nbsp; "
+"&nbsp;<a href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href="
+"\"#other\">Other/undefined</a>&nbsp;"
 msgstr ""
 "<a href=\"#spy\">Spionieren</a> | <a href=\"#alter-data\">Ändern&#160;"
 "von&#160;Benutzerdaten/&#8209;einstellungen</a> | <a href=\"#install-delete"
@@ -437,10 +437,65 @@
 "dazu angehalten sie ohne es wirklich zu verstehen zu aktivieren."
 
 #. type: Content of: <h3>
-msgid "Installing or deleting programs"
+# | [-Installing or-]{+Installing,+} deleting {+or disabling+} programs
+#, fuzzy
+#| msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
 msgstr "Programme&#160;installieren/entfernen"
 
 #. type: Content of: <ul><li><p>
+msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
 # | Some &ldquo;Smart&rdquo; TVs automatically <a
 # | [-href=\"https://news.ycombinator.com/item?id=16727319\";>load-]
 # | 
{+href=\"https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\";>

Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary-back-doors.fr.po        6 Nov 2018 17:16:51 -0000       1.110
+++ proprietary-back-doors.fr.po        13 Nov 2018 12:28:06 -0000      1.111
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-11-06 17:58+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -76,12 +77,26 @@
 "pour l'étayer."
 
 #. type: Content of: <p>
+# | &nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a
+# | href=\"#alter-data\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp;
+# | &nbsp;<a
+# | [-href=\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp;-]
+# | 
{+href=\"#install-delete\">Installing/deleting/disabling&nbsp;programs</a>&nbsp;+}
+# | &nbsp;<a href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a
+# | href=\"#other\">Other/undefined</a>&nbsp;
+#, fuzzy
+#| msgid ""
+#| "&nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a href=\"#alter-data"
+#| "\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp; &nbsp;<a href="
+#| "\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp; &nbsp;<a "
+#| "href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href=\"#other"
+#| "\">Other/undefined</a>&nbsp;"
 msgid ""
 "&nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a href=\"#alter-data"
 "\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp; &nbsp;<a href="
-"\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp; &nbsp;<a "
-"href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href=\"#other"
-"\">Other/undefined</a>&nbsp;"
+"\"#install-delete\">Installing/deleting/disabling&nbsp;programs</a>&nbsp; "
+"&nbsp;<a href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href="
+"\"#other\">Other/undefined</a>&nbsp;"
 msgstr ""
 "&nbsp;<a href=\"#spy\">Espionner</a>&nbsp; &nbsp;<a href=\"#alter-data"
 "\">Altérer&nbsp;les&nbsp;données/préférences&nbsp;de 
l'utilisateur</a>&nbsp; "
@@ -375,11 +390,66 @@
 "que cela implique."
 
 #. type: Content of: <h3>
-msgid "Installing or deleting programs"
+# | [-Installing or-]{+Installing,+} deleting {+or disabling+} programs
+#, fuzzy
+#| msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
 msgstr "Installer ou supprimer des programmes"
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://web.archive.org/";
 "web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\"> "
 "load downgrades that install a surveillance app</a>."

Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-back-doors.it-diff.html 25 Oct 2018 10:31:09 -0000      1.28
+++ proprietary-back-doors.it-diff.html 13 Nov 2018 12:28:06 -0000      1.29
@@ -53,7 +53,7 @@
 &lt;p class="c" style="font-size: 1.1em"&gt;
 &nbsp;&lt;a href="#spy"&gt;Spying&lt;/a&gt;&nbsp;
 &nbsp;&lt;a 
href="#alter-data"&gt;Altering&nbsp;user's&nbsp;data/settings&lt;/a&gt;&nbsp;
-&nbsp;&lt;a 
href="#install-delete"&gt;Installing/deleting&nbsp;programs&lt;/a&gt;&nbsp;
+&nbsp;&lt;a 
href="#install-delete"&gt;Installing/deleting/disabling&nbsp;programs&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#universal"&gt;Full&nbsp;control&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#other"&gt;Other/undefined&lt;/a&gt;&nbsp;
 &lt;/p&gt;
@@ -270,8 +270,8 @@
 &lt;/p&gt;&lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;Users reported</strong></del></span>
-    <span class="inserted"><ins><em>state.  However,</em></ins></span> that 
<span class="inserted"><ins><em>policy didn't last.  In 2012 
it</em></ins></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    <span class="inserted"><ins><em>state.  However,</em></ins></span> that 
<span class="removed"><del><strong>&lt;a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
     Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
     Windows 10&lt;/a&gt;.&lt;/p&gt;
 
@@ -279,10 +279,10 @@
     
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
     attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag 
     that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
-    had turned it off.&lt;/p&gt;
+    had turned</strong></del></span> <span class="inserted"><ins><em>policy 
didn't last.  In 2012</em></ins></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
 
-    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
-    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    &lt;p&gt;Later on, Microsoft published instructions 
on</strong></del></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
     how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This seems to involve use of</strong></del></span>
@@ -355,29 +355,67 @@
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;h3 id='install-delete'&gt;Installing or deleting programs&lt;/h3&gt;
+&lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
+
+    &lt;li&gt;&ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.&lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    that have nothing in common&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're "protecting the boundary line". The kids can't do harm
+    to the boundary line, not even</em></ins></span> with <span 
class="inserted"><ins><em>a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
+    &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
+    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo;</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>well</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -441,33 +479,20 @@
     it considers malicious.  But there is no excuse for allowing it to
     &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
     who (if anyone) to trust in this <span class="removed"><del><strong>way.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-Samsung Galaxy devices running proprietary Android versions come with a back
-door&lt;/a&gt; that provides remote access to the files stored on the device.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+Samsung Galaxy devices running proprietary Android versions come 
with</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Amazon 
Kindle-Swindle</strong></del></span> <span 
class="inserted"><ins><em>iPhone</em></ins></span> has a back door <span 
class="inserted"><ins><em>&lt;a
+  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;
+    &lt;p&gt;The iPhone has</em></ins></span> a back
+<span class="removed"><del><strong>door&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>door &lt;a
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>has been 
used</strong></del></span> <span class="inserted"><ins><em>allows 
Apple</em></ins></span> to
-<span class="removed"><del><strong>&lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;</strong></del></span>
 remotely <span class="removed"><del><strong>erase books&lt;/a&gt;.  One of the 
books erased was 1984, by George Orwell.
-&lt;/p&gt;
-
-&lt;p&gt;Amazon responded to criticism by saying it 
would</strong></del></span> delete <span class="removed"><del><strong>books only
-following orders from the state.  However, that policy didn't last.
-In 2012
-it &lt;a 
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
-a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
-kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
+    that <span class="removed"><del><strong>provides remote 
access</strong></del></span> <span class="inserted"><ins><em>allows Apple to 
remotely delete apps&lt;/a&gt; which Apple considers
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for 
Apple</em></ins></span> to <span class="inserted"><ins><em>have
     this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -476,61 +501,73 @@
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
-  &lt;li id="M201711244"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Kindle-Swindle 
also</strong></del></span> <span class="inserted"><ins><em>Furby 
Connect</em></ins></span> has a &lt;a <span 
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;</em></ins></span>
-    universal back door&lt;/a&gt;.
-<span class="removed"><del><strong>&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use</strong></del></span> 
<span class="inserted"><ins><em>If</em></ins></span> the <span 
class="removed"><del><strong>proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors that give
-HP &lt;a 
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;</strong></del></span>
 <span class="inserted"><ins><em>product as shipped doesn't act as a
-    listening device,</em></ins></span> remote <span 
class="removed"><del><strong>login access&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>changes</em></ins></span> to <span 
class="removed"><del><strong>them.  HP claims that this does not give HP
-access</strong></del></span> <span class="inserted"><ins><em>the code could 
surely convert it
-    into one.&lt;/p&gt;
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If</em></ins></span> the <span 
class="removed"><del><strong>files stored on</strong></del></span> <span 
class="inserted"><ins><em>product as shipped doesn't act as a
+    listening device, remote changes to</em></ins></span> the <span 
class="removed"><del><strong>device.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>code could 
surely convert it
+    into one.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201711010"&gt;
-    &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The Amazon Kindle-Swindle</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201711010"&gt;
+    &lt;p&gt;Sony</em></ins></span> has <span 
class="inserted"><ins><em>brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and tethered</em></ins></span> to <span 
class="inserted"><ins><em>a server that requires
+    with</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>door, and tethered to a server</em></ins></span> that 
<span class="removed"><del><strong>has been</strong></del></span> <span 
class="inserted"><ins><em>requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709091"&gt;
-    &lt;p&gt;Tesla used software to limit</em></ins></span> the <span 
class="removed"><del><strong>customer's data,</strong></del></span> <span 
class="inserted"><ins><em>part of the battery
-    that was available to customers in some cars, and &lt;a
+    &lt;p&gt;Tesla</em></ins></span> used <span 
class="inserted"><ins><em>software</em></ins></span> to
+<span class="removed"><del><strong>&lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+remotely erase books&lt;/a&gt;.  One</strong></del></span> <span 
class="inserted"><ins><em>limit the part</em></ins></span> of the <span 
class="removed"><del><strong>books erased</strong></del></span> <span 
class="inserted"><ins><em>battery
+    that</em></ins></span> was <span class="removed"><del><strong>1984, by 
George Orwell.
+&lt;/p&gt;
+
+&lt;p&gt;Amazon responded</strong></del></span> <span 
class="inserted"><ins><em>available</em></ins></span> to <span 
class="removed"><del><strong>criticism by saying it</strong></del></span> <span 
class="inserted"><ins><em>customers in some cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
     a universal back door in the software&lt;/a&gt; to temporarily increase
     this limit.&lt;/p&gt;
 
     &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
     whole battery capacity did not do them any harm, the same back
-    door would permit Tesla (perhaps under the command of some
+    door</em></ins></span> would <span class="removed"><del><strong>delete 
books only
+following orders from</strong></del></span> <span 
class="inserted"><ins><em>permit Tesla (perhaps under</em></ins></span> the 
<span class="removed"><del><strong>state.  However, that policy didn't last.
+In 2012
+it</strong></del></span> <span class="inserted"><ins><em>command of some
     government) to remotely order the car to use none of its battery. Or
     perhaps to drive its passenger to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201702061"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs &lt;a
-    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
-    have a universal back door&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
+    have</em></ins></span> a <span class="removed"><del><strong>user's 
Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
+kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+
+
+&lt;p&gt;The Kindle-Swindle also has</strong></del></span> <span 
class="inserted"><ins><em>universal back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
-    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
-    a universal back door in the application processor, for Xiaomi's
+    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;</em></ins></span>
+    a <span class="inserted"><ins><em>universal back door in the application 
processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door in the modem processor that the local phone
-    company can use&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;This is separate from</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="#universal-back-door-phone-modem"&gt;the</em></ins></span>
+    universal back <span class="removed"><del><strong>door&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>door in the 
modem processor that the local phone
+    company can use&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201608172"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201608172"&gt;
     &lt;p id="windows-update"&gt;Microsoft
     Windows has a universal back door through which &lt;a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
@@ -538,8 +575,9 @@
 
     &lt;p&gt;This was &lt;a
     href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-    reported in 2007&lt;/a&gt; for XP and Vista, and it seems
-    that Microsoft used the same method to push the &lt;a
+    reported in 2007&lt;/a&gt; for XP and Vista, and it seems</em></ins></span>
+    that <span class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>Microsoft used</em></ins></span> the <span 
class="removed"><del><strong>proprietary
+&ldquo;Left Hand&rdquo; operating system</strong></del></span> <span 
class="inserted"><ins><em>same method to push the &lt;a
     href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;
     Windows 10 downgrade&lt;/a&gt; to computers running Windows 7 and 
8.&lt;/p&gt;
 
@@ -550,13 +588,15 @@
   &lt;/li&gt;
 
   &lt;li id="M201606060"&gt;
-    &lt;p&gt;The Amazon Echo appears to have a universal back door, since &lt;a
-    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
+    &lt;p&gt;The Amazon Echo appears to</em></ins></span> have <span 
class="inserted"><ins><em>a universal</em></ins></span> back <span 
class="removed"><del><strong>doors that give
+HP</strong></del></span> <span class="inserted"><ins><em>door, 
since</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
     it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We have found nothing explicitly documenting the lack of any way
-    to disable remote changes to the software, so we are not completely
-    sure there isn't one,</em></ins></span> but <span 
class="removed"><del><strong>if</strong></del></span> <span 
class="inserted"><ins><em>this seems pretty clear.&lt;/p&gt;
+    to disable</em></ins></span> remote <span 
class="removed"><del><strong>login access&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>changes</em></ins></span> to <span 
class="removed"><del><strong>them.  HP claims that this 
does</strong></del></span> <span class="inserted"><ins><em>the software, so we 
are</em></ins></span> not <span class="removed"><del><strong>give HP
+access</strong></del></span> <span class="inserted"><ins><em>completely
+    sure there isn't one, but this seems pretty clear.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201412180"&gt;
@@ -564,8 +604,8 @@
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
     A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
     all models of mobile phones have a &lt;a href="#universal-back-door"&gt;
-    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
-    to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
+    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad 
bother</em></ins></span>
+    to <span class="inserted"><ins><em>introduce another? Because this one is 
controlled by Coolpad.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201311300"&gt;
@@ -579,12 +619,12 @@
     &lt;p&gt;ChromeOS has a universal back
     door. At least, Google says it does&mdash;in &lt;a
     href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
-    section 4 of</em></ins></span> the <span 
class="inserted"><ins><em>EULA&lt;/a&gt;.&lt;/p&gt;
+    section 4 of</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span> 
<span class="inserted"><ins><em>EULA&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200700001"&gt;
     &lt;p&gt;In addition to its &lt;a href="#swindle-eraser"&gt;book
-    eraser&lt;/a&gt;, the Kindle-Swindle has a &lt;a
+    eraser&lt;/a&gt;,</em></ins></span> the <span 
class="inserted"><ins><em>Kindle-Swindle has a &lt;a
     
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
     universal back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
@@ -766,7 +806,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:09 $
+$Date: 2018/11/13 12:28:06 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary-back-doors.it.po        25 Oct 2018 10:31:09 -0000      1.106
+++ proprietary-back-doors.it.po        13 Nov 2018 12:28:06 -0000      1.107
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -70,9 +70,9 @@
 msgid ""
 "&nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a href=\"#alter-data"
 "\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp; &nbsp;<a href="
-"\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp; &nbsp;<a "
-"href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href=\"#other"
-"\">Other/undefined</a>&nbsp;"
+"\"#install-delete\">Installing/deleting/disabling&nbsp;programs</a>&nbsp; "
+"&nbsp;<a href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href="
+"\"#other\">Other/undefined</a>&nbsp;"
 msgstr ""
 
 #. type: Content of: <h3>
@@ -440,7 +440,59 @@
 "spinti ad abilitarla a loro insaputa."
 
 #. type: Content of: <h3>
-msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-back-doors.ja-diff.html 25 Oct 2018 10:31:09 -0000      1.26
+++ proprietary-back-doors.ja-diff.html 13 Nov 2018 12:28:06 -0000      1.27
@@ -58,7 +58,7 @@
 &lt;p class="c" style="font-size: 1.1em"&gt;
 &nbsp;&lt;a href="#spy"&gt;Spying&lt;/a&gt;&nbsp;
 &nbsp;&lt;a 
href="#alter-data"&gt;Altering&nbsp;user's&nbsp;data/settings&lt;/a&gt;&nbsp;
-&nbsp;&lt;a 
href="#install-delete"&gt;Installing/deleting&nbsp;programs&lt;/a&gt;&nbsp;
+&nbsp;&lt;a 
href="#install-delete"&gt;Installing/deleting/disabling&nbsp;programs&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#universal"&gt;Full&nbsp;control&lt;/a&gt;&nbsp;
 &nbsp;&lt;a href="#other"&gt;Other/undefined&lt;/a&gt;&nbsp;
 &lt;/p&gt;
@@ -140,34 +140,34 @@
     entering</em></ins></span> an <span 
class="removed"><del><strong>admini</strong></del></span> <span 
class="inserted"><ins><em>admin</em></ins></span> password&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li <span 
class="removed"><del><strong>id="universal-back-door-phone-modem"&gt;&lt;p&gt;The
 universal back door in portable phones &lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
-    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
-    &lt;p&gt;More about</strong></del></span> <span 
class="inserted"><ins><em>id="M201604250"&gt;
-    &lt;p&gt;A pregnancy test controller application not only 
can</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
-    spy on many sorts</em></ins></span> of <span 
class="removed"><del><strong>this 
problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>data in the phone, and in server accounts,
-    it can alter them too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
+  &lt;li <span 
class="removed"><del><strong>id="universal-back-door-phone-modem"&gt;&lt;p&gt;The
 universal</strong></del></span> <span 
class="inserted"><ins><em>id="M201604250"&gt;
+    &lt;p&gt;A pregnancy test controller application not only can &lt;a
+    
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
+    spy on many sorts of data in the phone, and in server accounts,
+    it can alter them too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
  
-  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
-      Microsoft</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201512074"&gt;
+  &lt;li id="M201512074"&gt;
     &lt;p&gt;&lt;a
     
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html"&gt;
-    Some D-Link routers&lt;/a&gt; have a back door for changing settings in a
-    dlink of an eye.&lt;/p&gt;
+    Some D-Link routers&lt;/a&gt; have a</em></ins></span> back door <span 
class="inserted"><ins><em>for changing settings</em></ins></span> in <span 
class="removed"><del><strong>portable phones &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;is
+    employed to listen through their microphones&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;More about &lt;a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;the
 nature</strong></del></span> <span class="inserted"><ins><em>a
+    dlink</em></ins></span> of <span class="removed"><del><strong>this 
problem&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>an eye.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="http://sekurak.pl/tp-link-httptftp-backdoor/"&gt; The 
TP-Link
-    router</em></ins></span> has <span class="removed"><del><strong>already 
backdoored</strong></del></span> <span class="inserted"><ins><em>a back 
door&lt;/a&gt;.&lt;/p&gt;
+    router has a back door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;&lt;a href="https://github.com/elvanderb/TCP-32764"&gt;Many 
models of
-    routers have back doors&lt;/a&gt;.&lt;/p&gt;
+    routers have back doors&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511244"&gt;
-    &lt;p&gt;Google has long had &lt;a
+  <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;&lt;a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/"&gt;
+      Microsoft</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511244"&gt;
+    &lt;p&gt;Google</em></ins></span> has <span 
class="removed"><del><strong>already backdoored</strong></del></span> <span 
class="inserted"><ins><em>long had &lt;a
     
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted"&gt;a
     back door to remotely unlock an Android device&lt;/a&gt;, 
unless</em></ins></span> its disk <span 
class="removed"><del><strong>encryption&lt;/a&gt;.&lt;/p&gt;&lt;/li&gt;
 
@@ -309,8 +309,8 @@
 &lt;li&gt;
 &lt;p&gt;The iPhone has a back door
 &lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
-that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span 
class="inserted"><ins><em>reason</em></ins></span> to <span 
class="removed"><del><strong>have this power
+that allows Apple</strong></del></span> <span 
class="inserted"><ins><em>reason</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
 because of course we can trust Apple.
 &lt;/p&gt;</strong></del></span>
     <span class="inserted"><ins><em>assume that they 
don't.&lt;/p&gt;</em></ins></span>
@@ -323,69 +323,112 @@
     
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
     remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
     enabling it without <span class="removed"><del><strong>understanding.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understanding.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;/p&gt;
+&lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
+&lt;li&gt;
   &lt;p&gt;Apple can, and regularly does,
     &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones</strong></del></span>
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but
+  &lt;a href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not as much as Apple claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understanding.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
+
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+Windows 8 also</strong></del></span>
 <span class="inserted"><ins><em>&lt;/ul&gt;
 
 
-&lt;h3 id='install-delete'&gt;Installing or deleting programs&lt;/h3&gt;
+&lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro</em></ins></span> has a <span 
class="inserted"><ins><em>&lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
+    back door <span class="removed"><del><strong>for remotely deleting 
apps&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+You might well decide to let a security service that you trust
+remotely &lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> that 
<span class="removed"><del><strong>it</strong></del></span> <span 
class="inserted"><ins><em>can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
+
+    &lt;li&gt;&ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.&lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    that have nothing in common&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're "protecting the boundary line". The kids can't do harm
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
+    &lt;p&gt;We link to the article for the facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
-    <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
+    moral weakness of surrendering to Netflix. The Netflix app &lt;a
+    href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload files&rdquo;</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>well</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>forcibly install
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
+    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    can &ldquo;upload files&rdquo; as well as forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is used by 14,000 Android 
applications.&lt;/p&gt;</em></ins></span>
+    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
+  &lt;li id="M201112080"&gt;
     &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
-    door&lt;/a&gt;,</em></ins></span> Windows 8 <span 
class="removed"><del><strong>also</strong></del></span> has a back door for 
<span class="inserted"><ins><em>&lt;a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
-    remotely deleting <span class="removed"><del><strong>apps&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;
-You</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
+    door&lt;/a&gt;, Windows 8 has a back door for &lt;a
+    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
+    remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You</em></ins></span> might well decide to let a security service 
that you trust
-    remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
+    &lt;p&gt;You might well decide to let a security service that you trust
+    remotely &lt;em&gt;deactivate&lt;/em&gt; programs that 
it</em></ins></span> considers malicious.
     But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
-    should have the right to <span class="removed"><del><strong>decide who (if 
anyone) to trust in this way.
+    should have the right to decide <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this 
<span class="removed"><del><strong>way.
 &lt;/p&gt;
 
 &lt;p&gt;
 As these pages show, if you do want to clean your computer of malware,
-the first software</strong></del></span> <span 
class="inserted"><ins><em>decide whom (if anyone)</em></ins></span> to <span 
class="removed"><del><strong>delete is Windows or iOS.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>trust in this
-    way.&lt;/p&gt;</em></ins></span>
+the first software to delete is Windows or iOS.
+&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
@@ -413,9 +456,9 @@
 
     &lt;p&gt;Although</em></ins></span> Google's &lt;em&gt;exercise&lt;/em&gt; 
of this power has not been
     malicious so far, the point is that nobody should have such power,
-    which could also be used maliciously.  You might well decide to
+    which could also be <span class="removed"><del><strong>used maliciously.  
You might well decide</strong></del></span> <span 
class="inserted"><ins><em>used maliciously.  You might well decide to
     let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
-    it considers malicious.  But there is no excuse for <span 
class="removed"><del><strong>allowing</strong></del></span> <span 
class="inserted"><ins><em>allowing it to
+    it considers malicious.  But there is no excuse for allowing it to
     &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
     who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
@@ -487,10 +530,10 @@
 
     &lt;p&gt;This was &lt;a
     href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-    reported in 2007&lt;/a&gt; for XP and Vista, and</em></ins></span> it 
<span class="inserted"><ins><em>seems
-    that Microsoft used the same method</em></ins></span> to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>push</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    reported in 2007&lt;/a&gt; for XP and Vista, and it seems
+    that Microsoft used the same method to push the &lt;a
     href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;
-    Windows 10 downgrade&lt;/a&gt; to computers running Windows 
7</em></ins></span> and <span class="removed"><del><strong>you 
should</strong></del></span> <span class="inserted"><ins><em>8.&lt;/p&gt;
+    Windows 10 downgrade&lt;/a&gt; to computers running Windows 7 and 
8.&lt;/p&gt;
 
     &lt;p&gt;In Windows 10, the universal back door
     is no longer hidden; all &ldquo;upgrades&rdquo; will be &lt;a
@@ -499,9 +542,12 @@
   &lt;/li&gt;
 
   &lt;li id="M201606060"&gt;
-    &lt;p&gt;The Amazon Echo appears to have a universal back door, since &lt;a
-    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
-    it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Amazon Echo appears</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>have</em></ins></span> a
+<span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
+considers malicious.  But there is no excuse for 
allowing</strong></del></span> <span class="inserted"><ins><em>universal back 
door, since &lt;a
+    
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;</em></ins></span>
+    it
+<span class="removed"><del><strong>to &lt;em&gt;delete&lt;/em&gt; the 
programs, and you should</strong></del></span> <span 
class="inserted"><ins><em>installs &ldquo;updates&rdquo; 
automatically&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We</em></ins></span> have <span class="inserted"><ins><em>found 
nothing explicitly documenting</em></ins></span> the <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>lack of any way</em></ins></span>
     to
@@ -568,11 +614,11 @@
   <span class="inserted"><ins><em>&lt;li id="M200612050"&gt;
     &lt;p&gt;Almost every phone's communication
     processor has a universal</em></ins></span> back <span 
class="removed"><del><strong>doors that give
-HP</strong></del></span> <span class="inserted"><ins><em>door which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+HP &lt;a 
href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
 remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
-access</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-    often used</em></ins></span> to <span class="removed"><del><strong>the 
customer's data, but if the</strong></del></span> <span 
class="inserted"><ins><em>make a phone transmit all conversations it 
hears&lt;/a&gt;. See
+access to the customer's data, but if the</strong></del></span> <span 
class="inserted"><ins><em>door which is &lt;a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+    often used to make a phone transmit all conversations it hears&lt;/a&gt;. 
See
     &lt;a 
href="/proprietary/malware-mobiles.html#universal-back-door"&gt;Malware
     in Mobile Devices&lt;/a&gt; for more info.&lt;/p&gt;
   &lt;/li&gt;
@@ -745,7 +791,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/25 10:31:09 $
+$Date: 2018/11/13 12:28:06 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary-back-doors.ja.po        25 Oct 2018 10:31:11 -0000      1.86
+++ proprietary-back-doors.ja.po        13 Nov 2018 12:28:06 -0000      1.87
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -69,9 +69,9 @@
 msgid ""
 "&nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a href=\"#alter-data"
 "\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp; &nbsp;<a href="
-"\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp; &nbsp;<a "
-"href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href=\"#other"
-"\">Other/undefined</a>&nbsp;"
+"\"#install-delete\">Installing/deleting/disabling&nbsp;programs</a>&nbsp; "
+"&nbsp;<a href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href="
+"\"#other\">Other/undefined</a>&nbsp;"
 msgstr ""
 
 #. type: Content of: <h3>
@@ -363,7 +363,59 @@
 "うに仕向けられます。"
 
 #. type: Content of: <h3>
-msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary-back-doors.pot  25 Oct 2018 10:31:11 -0000      1.57
+++ proprietary-back-doors.pot  13 Nov 2018 12:28:06 -0000      1.58
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -62,7 +62,7 @@
 "&nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a "
 "href=\"#alter-data\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp; "
 "&nbsp;<a "
-"href=\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp; "
+"href=\"#install-delete\">Installing/deleting/disabling&nbsp;programs</a>&nbsp;
 "
 "&nbsp;<a href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a "
 "href=\"#other\">Other/undefined</a>&nbsp;"
 msgstr ""
@@ -262,7 +262,59 @@
 msgstr ""
 
 #. type: Content of: <h3>
-msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Corel Paintshop Pro has a <a "
+"href=\"https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/\";>
 "
+"back door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary-back-doors.ru.po        25 Oct 2018 17:00:14 -0000      1.153
+++ proprietary-back-doors.ru.po        13 Nov 2018 12:28:06 -0000      1.154
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2018-10-25 10:26+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-10-08 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -74,12 +75,26 @@
 "качестве конкретных свидетельств."
 
 #. type: Content of: <p>
+# | &nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a
+# | href=\"#alter-data\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp;
+# | &nbsp;<a
+# | [-href=\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp;-]
+# | 
{+href=\"#install-delete\">Installing/deleting/disabling&nbsp;programs</a>&nbsp;+}
+# | &nbsp;<a href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a
+# | href=\"#other\">Other/undefined</a>&nbsp;
+#, fuzzy
+#| msgid ""
+#| "&nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a href=\"#alter-data"
+#| "\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp; &nbsp;<a href="
+#| "\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp; &nbsp;<a "
+#| "href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href=\"#other"
+#| "\">Other/undefined</a>&nbsp;"
 msgid ""
 "&nbsp;<a href=\"#spy\">Spying</a>&nbsp; &nbsp;<a href=\"#alter-data"
 "\">Altering&nbsp;user's&nbsp;data/settings</a>&nbsp; &nbsp;<a href="
-"\"#install-delete\">Installing/deleting&nbsp;programs</a>&nbsp; &nbsp;<a "
-"href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href=\"#other"
-"\">Other/undefined</a>&nbsp;"
+"\"#install-delete\">Installing/deleting/disabling&nbsp;programs</a>&nbsp; "
+"&nbsp;<a href=\"#universal\">Full&nbsp;control</a>&nbsp; &nbsp;<a href="
+"\"#other\">Other/undefined</a>&nbsp;"
 msgstr ""
 "&nbsp;<a href=\"#spy\">Шпионаж</a>&nbsp; &nbsp;<a href=\"#alter-data"
 "\">Изменение&nbsp;данных/настроек</a>&nbsp; &nbsp;<a 
href=\"#install-delete"
@@ -364,11 +379,66 @@
 "делают."
 
 #. type: Content of: <h3>
-msgid "Installing or deleting programs"
+# | [-Installing or-]{+Installing,+} deleting {+or disabling+} programs
+#, fuzzy
+#| msgid "Installing or deleting programs"
+msgid "Installing, deleting or disabling programs"
 msgstr "Установка или удаление программ"
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Some &ldquo;Smart&rdquo; TVs automatically <a href=\"https://web.archive.org/";
 "web/20180405014828/https:/twitter.com/buro9/status/980349887006076928\"> "
 "load downgrades that install a surveillance app</a>."

Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.de.po   8 Nov 2018 18:58:39 -0000       1.63
+++ proprietary.de.po   13 Nov 2018 12:28:06 -0000      1.64
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-04-12 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -423,6 +423,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -477,16 +529,6 @@
 "won't collect any of that data."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
 # !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 # ! GNU should report facts briefly and crisply!  Also resulting !
 # ! consequences should not be swept away by an own opinion!     !

Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary.es.po   8 Nov 2018 18:58:39 -0000       1.62
+++ proprietary.es.po   13 Nov 2018 12:28:06 -0000      1.63
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-09-19 10:49+0200\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -436,6 +436,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -490,16 +542,6 @@
 "won't collect any of that data."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.fr.po   12 Nov 2018 17:13:55 -0000      1.78
+++ proprietary.fr.po   13 Nov 2018 12:28:06 -0000      1.79
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-11-06 17:58+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -290,6 +291,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -374,22 +427,6 @@
 "de la voiture ne peut collecter aucune de ces données, ou bien que le "
 "logiciel est libre, ce qui permet de savoir si c'est bien le cas."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-"Les fabricants d'imprimantes ont l'esprit inventif&hellip; lorsqu'il s'agit "
-"d'interdire l'usage de cartouches de remplacement non officielles. Leurs "
-"« mises à niveau de sécurité » imposent de temps à autre de nouvelles 
formes "
-"de DRM pour les cartouches. <a href=\"https://motherboard.vice.com/en_us/";
-"article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-"
-"security-updates\">HP et Epson le font</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -465,3 +502,18 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Printer manufacturers are very innovative&mdash;at blocking the use of "
+#~ "independent replacement ink cartridges. Their &ldquo;security "
+#~ "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+#~ "crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+#~ "have done this</a>."
+#~ msgstr ""
+#~ "Les fabricants d'imprimantes ont l'esprit inventif&hellip; lorsqu'il "
+#~ "s'agit d'interdire l'usage de cartouches de remplacement non officielles. "
+#~ "Leurs « mises à niveau de sécurité » imposent de temps à autre de "
+#~ "nouvelles formes de DRM pour les cartouches. <a href=\"https://";
+#~ "motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-"
+#~ "cheap-ink-cartridges-via-bogus-security-updates\">HP et Epson le font</a>."

Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary.it-diff.html    8 Nov 2018 18:58:40 -0000       1.21
+++ proprietary.it-diff.html    13 Nov 2018 12:28:06 -0000      1.22
@@ -25,9 +25,9 @@
 <span class="inserted"><ins><em>&lt;!--
 .button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
 <span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
-   display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+   <span class="inserted"><ins><em>display: block;</em></ins></span>
    max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
    overflow: auto;
    margin: 2.5em auto;
@@ -97,18 +97,18 @@
  &lt;tr&gt;
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
     &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
@@ -179,6 +179,44 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a &lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
+
+    &lt;li&gt;&ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.&lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    that have nothing in common&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're "protecting the boundary line". The kids can't do harm
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810300"&gt;
     &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
@@ -223,14 +261,6 @@
     hardware cannot collect any of that data, or that the software
     is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
-    use of independent replacement ink cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
-    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -291,7 +321,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/11/08 18:58:40 $
+$Date: 2018/11/13 12:28:06 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.it.po   8 Nov 2018 18:58:40 -0000       1.72
+++ proprietary.it.po   13 Nov 2018 12:28:06 -0000      1.73
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-02-01 21:32+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -427,6 +427,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -481,16 +533,6 @@
 "won't collect any of that data."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary.ja-diff.html    8 Nov 2018 18:58:40 -0000       1.23
+++ proprietary.ja-diff.html    13 Nov 2018 12:28:06 -0000      1.24
@@ -176,6 +176,44 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a &lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
+
+    &lt;li&gt;&ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.&lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    that have nothing in common&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're "protecting the boundary line". The kids can't do harm
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810300"&gt;
     &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
@@ -220,14 +258,6 @@
     hardware cannot collect any of that data, or that the software
     is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
-    use of independent replacement ink cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
-    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -288,7 +318,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/11/08 18:58:40 $
+$Date: 2018/11/13 12:28:06 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.ja.po   8 Nov 2018 18:58:40 -0000       1.55
+++ proprietary.ja.po   13 Nov 2018 12:28:06 -0000      1.56
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2017-01-11 11:25+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -349,6 +349,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -403,16 +455,6 @@
 "won't collect any of that data."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary.nl-diff.html    8 Nov 2018 18:58:40 -0000       1.21
+++ proprietary.nl-diff.html    13 Nov 2018 12:28:06 -0000      1.22
@@ -38,10 +38,10 @@
 <span class="inserted"><ins><em>#TOC th</em></ins></span> {
    <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
 #TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
-   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span 
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none; 
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>div.toc</strong></del></span>
 <span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
 #TOC ol li { margin: .5em 5%; }
@@ -154,10 +154,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
@@ -179,6 +179,44 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a &lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
+
+    &lt;li&gt;&ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.&lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    that have nothing in common&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're "protecting the boundary line". The kids can't do harm
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810300"&gt;
     &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
@@ -223,14 +261,6 @@
     hardware cannot collect any of that data, or that the software
     is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
-    use of independent replacement ink cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
-    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -291,7 +321,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/11/08 18:58:40 $
+$Date: 2018/11/13 12:28:06 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary.nl.po   8 Nov 2018 18:58:40 -0000       1.45
+++ proprietary.nl.po   13 Nov 2018 12:28:06 -0000      1.46
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2017-11-24 22:20+0100\n"
 "Last-Translator: Justin van Steijn <address@hidden>\n"
 "Language-Team: Dutch <address@hidden>\n"
@@ -420,6 +420,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -474,16 +526,6 @@
 "won't collect any of that data."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary.pl-diff.html    8 Nov 2018 18:58:40 -0000       1.39
+++ proprietary.pl-diff.html    13 Nov 2018 12:28:06 -0000      1.40
@@ -40,8 +40,8 @@
 #TOC ul { padding-bottom: .5em; }
 #TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
 <span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span 
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span 
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 
5%;</em></ins></span> }
 --&gt;
 &lt;/style&gt;
 <span class="inserted"><ins><em>&lt;style type="text/css" 
media="print,screen"&gt;
@@ -85,8 +85,8 @@
   &lt;li&gt;&lt;strong&gt;Company or type</strong></del></span> <span 
class="inserted"><ins><em>typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>malicious functionalities (with more than 400 
references to
+&lt;p&gt;As</em></ins></span> of <span 
class="removed"><del><strong>product&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
 <span class="inserted"><ins><em>October, 2018, the pages in this directory 
list around 350
+instances of malicious functionalities (with more than 400 references to
 back them up), but there are surely thousands more we don't know 
about.&lt;/p&gt;
 
 &lt;table id="TOC"&gt;
@@ -121,18 +121,18 @@
   &lt;td&gt;</em></ins></span>
    &lt;ul&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;strong&gt;Type&nbsp;of 
malware&lt;/strong&gt;&lt;/li&gt;</strong></del></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
-   &lt;ul&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;
-    &lt;li&gt;&lt;a 
href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/philosophy/proprietary-drm.html"&gt;Digital</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
    &lt;/ul&gt;
   &lt;/td&gt;
  &lt;/tr&gt;
@@ -153,10 +153,10 @@
      application programs.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/philosophy/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
 
-    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality</em></ins></span> 
that <span class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>requires
      permanent (or very frequent) connection to a server.&lt;/li&gt;
 
-    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; system that 
rejects</em></ins></span> any operating
      system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
 <span class="removed"><del><strong>&lt;/ul&gt;
 &lt;/div&gt;
@@ -177,6 +177,44 @@
 <span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a &lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
+
+    &lt;li&gt;&ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.&lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    that have nothing in common&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're "protecting the boundary line". The kids can't do harm
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+  &lt;/li&gt;
+
   &lt;li id="M201810300"&gt;
     &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
     
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
@@ -221,14 +259,6 @@
     hardware cannot collect any of that data, or that the software
     is free so we know it won't collect any of that data.&lt;/p&gt;
   &lt;/li&gt;
-
-  &lt;li id="M201810150"&gt;
-    &lt;p&gt;Printer manufacturers are very innovative&mdash;at blocking the
-    use of independent replacement ink cartridges. Their &ldquo;security
-    upgrades&rdquo; occasionally impose new forms of cartridge DRM. &lt;a
-    
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"&gt;
-    HP and Epson have done this&lt;/a&gt;.&lt;/p&gt;
-  &lt;/li&gt;
 &lt;/ul&gt;</em></ins></span>
 
 
@@ -289,7 +319,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/11/08 18:58:40 $
+$Date: 2018/11/13 12:28:06 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary.pl.po   8 Nov 2018 18:58:40 -0000       1.40
+++ proprietary.pl.po   13 Nov 2018 12:28:06 -0000      1.41
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2015-07-31 20:51-0600\n"
 "Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
 "Language-Team: Polish <address@hidden>\n"
@@ -501,6 +501,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -555,16 +607,6 @@
 "won't collect any of that data."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary.pot     8 Nov 2018 18:58:40 -0000       1.37
+++ proprietary.pot     13 Nov 2018 12:28:06 -0000      1.38
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -241,6 +241,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a "
+"href=\"https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/\";>
 "
+"back door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a "
 
"href=\"https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/\";>
 "
 "give the manufacturer an unencrypted copy of everything they "
@@ -297,15 +349,6 @@
 "won't collect any of that data."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a "
-"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\";>
 "
-"HP and Epson have done this</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"

Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary.pt-br.po        8 Nov 2018 18:58:40 -0000       1.28
+++ proprietary.pt-br.po        13 Nov 2018 12:28:06 -0000      1.29
@@ -5,7 +5,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-11-05 17:53-0200\n"
 "Last-Translator: Rafael Fontenelle <address@hidden>\n"
 "Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n > 1);\n"
 "X-Generator: Virtaal 1.0.0-beta1\n"
 
@@ -288,6 +289,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -371,22 +424,6 @@
 "hardware do carro não pode coletar nenhum desses dados, ou que o software é 
"
 "livre, por isso sabemos que ele não coletará nenhum desses dados."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-"Os fabricantes de impressoras são muito inovadores &ndash; bloqueando o uso "
-"de cartuchos de tinta de substituição independentes. Suas “atualizações 
de "
-"segurança” ocasionalmente impor novas formas de DRM de cartucho. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> A HP e a Epson "
-"fizeram isso</a>."
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -465,6 +502,21 @@
 msgstr "Última atualização: "
 
 #~ msgid ""
+#~ "Printer manufacturers are very innovative&mdash;at blocking the use of "
+#~ "independent replacement ink cartridges. Their &ldquo;security "
+#~ "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+#~ "crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+#~ "have done this</a>."
+#~ msgstr ""
+#~ "Os fabricantes de impressoras são muito inovadores &ndash; bloqueando o "
+#~ "uso de cartuchos de tinta de substituição independentes. Suas "
+#~ "“atualizações de segurança” ocasionalmente impor novas formas de 
DRM de "
+#~ "cartucho. <a href=\"https://motherboard.vice.com/en_us/article/pa98ab/";
+#~ "printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-"
+#~ "updates\"> A HP e a Epson fizeram isso</a>."
+
+#~ msgid ""
 #~ "A nonfree video game, available through the nonfree Steam client, <a href="
 #~ "\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
 #~ "systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable "

Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary.ru.po   8 Nov 2018 18:58:40 -0000       1.101
+++ proprietary.ru.po   13 Nov 2018 12:28:06 -0000      1.102
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-10-30 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-11-13 12:25+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -294,6 +295,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -378,22 +431,6 @@
 "программы свободны, так что мы знаем, что 
они не будут собирать ничего из "
 "этих данных."
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-"Производители принтеров очень 
изобретательны&nbsp;&mdash; в блокировке "
-"применения картриджей третьих 
производителей. Их &ldquo;обновления "
-"безопасности&rdquo; время от времени 
налагают новые формы цифрового "
-"управления ограничениями в картриджах. <a 
href=\"https://motherboard.vice.";
-"com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-"
-"via-bogus-security-updates\"> Так делали HP и Epson</a>."
-
 # type: Content of: <div><div>
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
@@ -473,6 +510,21 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "Printer manufacturers are very innovative&mdash;at blocking the use of "
+#~ "independent replacement ink cartridges. Their &ldquo;security "
+#~ "upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
+#~ "crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+#~ "have done this</a>."
+#~ msgstr ""
+#~ "Производители принтеров очень 
изобретательны&nbsp;&mdash; в блокировке "
+#~ "применения картриджей третьих 
производителей. Их &ldquo;обновления "
+#~ "безопасности&rdquo; время от времени 
налагают новые формы цифрового "
+#~ "управления ограничениями в картриджах. 
<a href=\"https://motherboard.vice.";
+#~ "com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-"
+#~ "cartridges-via-bogus-security-updates\"> Так делали HP и 
Epson</a>."
+
+#~ msgid ""
 #~ "A nonfree video game, available through the nonfree Steam client, <a href="
 #~ "\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-";
 #~ "systems-with-\"> included a &ldquo;miner&rdquo;</a>, i.e. an executable "

Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary.zh-tw.po        8 Nov 2018 18:58:40 -0000       1.23
+++ proprietary.zh-tw.po        13 Nov 2018 12:28:06 -0000      1.24
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-11-08 18:56+0000\n"
+"POT-Creation-Date: 2018-11-13 12:25+0000\n"
 "PO-Revision-Date: 2018-03-27 16:48+0800\n"
 "Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
 "Language-Team: Traditional Chinese <address@hidden>\n"
@@ -338,6 +338,58 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-";
+"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
+"door that can make it cease to function</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article is full of confusions, errors and biases that we have an "
+"obligation to expose, given that we are making a link to them."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"Getting a patent does not &ldquo;enable&rdquo; a company to do any "
+"particular thing in its products. What it does enable the company to do is "
+"sue other companies if they do some particular thing in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"A company's policies about when to attack users through a back door are "
+"beside the point. Inserting the back door is wrong in the first place, and "
+"using the back door is always wrong too. No software developer should have "
+"that power over users."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"&ldquo;<a href=\"/philosophy/words-to-avoid.html#Piracy\">Piracy</a>&rdquo; "
+"means attacking ships. Using that word to refer to sharing copies is a "
+"smear; please don't smear sharing."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"The idea of &ldquo;protecting our IP&rdquo; is total confusion. The term "
+"&ldquo;IP&rdquo; itself is a <a href=\"/philosophy/not-ipr.html\">bogus "
+"generalization about things that have nothing in common</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li><p>
+msgid ""
+"In addition, to speak of &ldquo;protecting&rdquo; that bogus generalization "
+"is a separate absurdity. It's like calling the cops because neighbors' kids "
+"are playing on your front yard, and saying that you're \"protecting the "
+"boundary line\". The kids can't do harm to the boundary line, not even with "
+"a jackhammer, because it is an abstraction and can't be affected by physical "
+"action."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Nearly all &ldquo;home security cameras&rdquo; <a href=\"https://www.";
 "consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-"
 "reports-finds/\"> give the manufacturer an unencrypted copy of everything "
@@ -392,16 +444,6 @@
 "won't collect any of that data."
 msgstr ""
 
-#. type: Content of: <ul><li><p>
-msgid ""
-"Printer manufacturers are very innovative&mdash;at blocking the use of "
-"independent replacement ink cartridges. Their &ldquo;security "
-"upgrades&rdquo; occasionally impose new forms of cartridge DRM. <a href="
-"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-";
-"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
-"have done this</a>."
-msgstr ""
-
 #. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
 #. type: Content of: <div>
 msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]