[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-webpages.fr.html malwar...
From: |
GNUN |
Subject: |
www/proprietary malware-webpages.fr.html malwar... |
Date: |
Tue, 4 Dec 2018 11:28:40 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/12/04 11:28:40
Modified files:
proprietary : malware-webpages.fr.html
malware-webpages.ru.html
proprietary-surveillance.fr.html
proprietary-surveillance.ru.html
proprietary.fr.html proprietary.ru.html
proprietary/po : malware-webpages.fr-en.html
malware-webpages.ru-en.html
malware-webpages.ru.po
proprietary-surveillance.fr-en.html
proprietary-surveillance.ru-en.html
proprietary-surveillance.ru.po
proprietary.fr-en.html proprietary.ru-en.html
proprietary.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.fr.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.439&r2=1.440
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.108&r2=1.109
Patches:
Index: malware-webpages.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.fr.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-webpages.fr.html 6 Nov 2018 17:29:52 -0000 1.15
+++ malware-webpages.fr.html 4 Dec 2018 16:28:39 -0000 1.16
@@ -57,6 +57,22 @@
<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>De nombreux sites web utilisent du code JavaScript <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">pour
+récupérer l'information que les utilisateurs ont saisie dans un formulaire
+mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
+été <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">poursuivis</a>
+pour cela.</p>
+
+ <p>La messagerie instantanée de certains supports techiques utilise le
même
+genre de maliciel pour <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">lire
+le messsage que l'utilisateur est en train d'écrire avant qu'il ne l'ait
+envoyé</a>.</p>
+ </li>
+
<li id="M201807190">
<p>British Airways a utilisé du <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">JavaScript
@@ -95,16 +111,6 @@
navigateurs.</p>
</li>
- <li id="M201712210">
- <p>De nombreux sites web utilisent du code JavaScript <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">pour
-récupérer l'information que les utilisateurs ont saisie dans un formulaire
-mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
-été <a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">poursuivis</a>
-pour cela.</p>
- </li>
-
<li id="M201711150">
<p>Certains sites envoient du code JavaScript pour collecter tout ce qui
est
saisi par l'utilisateur, <a
@@ -286,7 +292,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/11/06 17:29:52 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
Index: malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-webpages.ru.html 25 Oct 2018 17:00:13 -0000 1.13
+++ malware-webpages.ru.html 4 Dec 2018 16:28:39 -0000 1.14
@@ -56,6 +56,20 @@
<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Ðногие ÑайÑÑ <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">подглÑдÑваÑÑ
+за Ñем, ÑÑо полÑзоваÑели ввели в ÑоÑмÑ, но
не оÑпÑавили</a>. Ðа некоÑоÑÑÑ
за
+ÑÑо <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+подали в ÑÑд</a>.</p>
+
+ <p>СÑедÑÑва пеÑеговоÑов некоÑоÑÑÑ
ÑлÑжб
пÑименÑÑÑ ÑÑого же Ñода вÑедоноÑнÑе
+пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ÑиÑаÑÑ, ÑÑо полÑзоваÑÐµÐ»Ñ Ð²Ð²Ð¾Ð´Ð¸Ñ Ð¿ÐµÑед Ñем,
как оÑоÑлаÑÑ</a>.</p>
+ </li>
+
<li id="M201807190">
<p>British Airways полÑзовалиÑÑ Ð½Ð° Ñвоем ÑайÑе <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">неÑвободнÑми
@@ -95,15 +109,6 @@
бÑаÑзеÑа</a>.</p>
</li>
- <li id="M201712210">
- <p>Ðногие ÑайÑÑ <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">подглÑдÑваÑÑ
-за Ñем, ÑÑо полÑзоваÑели ввели в ÑоÑмÑ, но
не оÑпÑавили</a>. Ðа некоÑоÑÑÑ
за
-ÑÑо <a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
-подали в ÑÑд</a>.</p>
- </li>
-
<li id="M201711150">
<p>ÐекоÑоÑÑе ÑайÑÑ Ð¿Ð¾ÑÑлаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑобиÑаÑÑие вÑе, ÑÑо вводиÑ
полÑзоваÑелÑ, <a
@@ -285,7 +290,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/25 17:00:13 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary-surveillance.fr.html 1 Dec 2018 20:27:45 -0000 1.147
+++ proprietary-surveillance.fr.html 4 Dec 2018 16:28:39 -0000 1.148
@@ -1890,6 +1890,22 @@
</div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>De nombreux sites web utilisent du code JavaScript <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">pour
+récupérer l'information que les utilisateurs ont saisie dans un formulaire
+mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
+été <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">poursuivis</a>
+pour cela.</p>
+
+ <p>La messagerie instantanée de certains supports techiques utilise le
même
+genre de maliciel pour <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">lire
+le messsage que l'utilisateur est en train d'écrire avant qu'il ne l'ait
+envoyé</a>.</p>
+ </li>
+
<li id="M201807190">
<p>British Airways a utilisé du <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">JavaScript
@@ -1904,16 +1920,6 @@
navigateurs.</p>
</li>
- <li id="M201712210">
- <p>De nombreux sites web utilisent du code JavaScript <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">pour
-récupérer l'information que les utilisateurs ont saisie dans un formulaire
-mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
-été <a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">poursuivis</a>
-pour cela.</p>
- </li>
-
<li id="M201711150">
<p>Certains sites envoient du code JavaScript pour collecter tout ce qui
est
saisi par l'utilisateur, <a
@@ -2090,7 +2096,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/12/01 20:27:45 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary-surveillance.ru.html 2 Dec 2018 18:28:12 -0000 1.146
+++ proprietary-surveillance.ru.html 4 Dec 2018 16:28:39 -0000 1.147
@@ -1865,6 +1865,20 @@
</div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Ðногие ÑайÑÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ Ð¿ÑогÑаммами
на JavaScript, ÑÑÐ¾Ð±Ñ <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">подглÑдÑваÑÑ,
+ÑÑо полÑзоваÑели ввели в ÑоÑмÑ, но не
оÑпÑавили</a>, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ Ð¸Ñ
+лиÑноÑÑÑ. Ðа некоÑоÑÑÑ
<a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+подали за ÑÑо в ÑÑд</a>.</p>
+
+ <p>СÑедÑÑва пеÑеговоÑов некоÑоÑÑÑ
ÑлÑжб
пÑименÑÑÑ ÑÑого же Ñода вÑедоноÑнÑе
+пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ÑиÑаÑÑ, ÑÑо полÑзоваÑÐµÐ»Ñ Ð²Ð²Ð¾Ð´Ð¸Ñ Ð¿ÐµÑед Ñем,
как оÑоÑлаÑÑ</a>.</p>
+ </li>
+
<li id="M201807190">
<p>British Airways полÑзовалиÑÑ Ð½Ð° Ñвоем ÑайÑе <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">неÑвободнÑми
@@ -1879,15 +1893,6 @@
бÑаÑзеÑа</a>.</p>
</li>
- <li id="M201712210">
- <p>Ðногие ÑайÑÑ Ð¿Ð¾Ð»ÑзÑÑÑÑÑ Ð¿ÑогÑаммами
на JavaScript, ÑÑÐ¾Ð±Ñ <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">подглÑдÑваÑÑ,
-ÑÑо полÑзоваÑели ввели в ÑоÑмÑ, но не
оÑпÑавили</a>, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑеделиÑÑ Ð¸Ñ
-лиÑноÑÑÑ. Ðа некоÑоÑÑÑ
<a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
-подали за ÑÑо в ÑÑд</a>.</p>
- </li>
-
<li id="M201711150">
<p>ÐекоÑоÑÑе ÑайÑÑ Ð¿Ð¾ÑÑлаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑобиÑаÑÑие вÑе, ÑÑо вводиÑ
полÑзоваÑелÑ, <a
@@ -2060,7 +2065,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/12/02 18:28:12 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
Index: proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary.fr.html 13 Nov 2018 17:27:59 -0000 1.46
+++ proprietary.fr.html 4 Dec 2018 16:28:39 -0000 1.47
@@ -151,6 +151,22 @@
<h3 id="latest">Ajouts récents</h3>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>De nombreux sites web utilisent du code JavaScript <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">pour
+récupérer l'information que les utilisateurs ont saisie dans un formulaire
+mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
+été <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">poursuivis</a>
+pour cela.</p>
+
+ <p>La messagerie instantanée de certains supports techiques utilise le
même
+genre de maliciel pour <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">lire
+le messsage que l'utilisateur est en train d'écrire avant qu'il ne l'ait
+envoyé</a>.</p>
+ </li>
+
<li id="M201811100">
<p>Corel Paintshop Pro a une <a
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">porte
@@ -215,27 +231,6 @@
les performances des anciens téléphones pour forcer les utilisateurs Ã
acheter leurs nouveaux modèles</a>.</p>
</li>
-
- <li id="M201810230">
- <p>General Motors <a
-href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">gardait
-la trace des programmes radio choisis</a> dans ses voitures « connectéesÂ
»,
-minute par minute.</p>
-
- <p>GM n'avait pas le consentement des utilisateurs, mais il aurait été
facile
-de le glisser dans le contrat de souscription à un service numérique
-quelconque. Une exigence de consentement revient en fait à une absence de
-protection.</p>
-
- <p>Les voitures peuvent aussi récolter une quantité d'autres données :
elles
-peuvent vous écouter, vous regarder, suivre vos mouvements, suivre à la
-trace les téléphones mobiles des passagers. <em>Tout</em> recueil de données
-de ce type doit être interdit.</p>
-
- <p>Mais si on veut être vraiment en sécurité, on doit s'assurer que le
matériel
-de la voiture ne peut collecter aucune de ces données, ou bien que le
-logiciel est libre, ce qui permet de savoir si c'est bien le cas.</p>
- </li>
</ul>
@@ -316,7 +311,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/11/13 17:27:59 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
Index: proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary.ru.html 13 Nov 2018 15:28:27 -0000 1.41
+++ proprietary.ru.html 4 Dec 2018 16:28:39 -0000 1.42
@@ -156,6 +156,20 @@
<h3 id="latest">ÐоÑледние добавлениÑ</h3>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Ðногие ÑайÑÑ Ð¿ÑименÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑÑÐ¾Ð±Ñ <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+вÑÑживаÑÑ Ð¸Ð½ÑоÑмаÑиÑ, коÑоÑÑÑ
полÑзоваÑели ввели в ÑоÑме, но не
+оÑпÑавили</a> Ð´Ð»Ñ Ð¾Ð¿ÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ Ð¸Ñ
лиÑноÑÑи.
Ðа некоÑоÑÑÑ
за ÑÑо <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+подали в ÑÑд</a>.</p>
+
+ <p>СÑедÑÑва пеÑеговоÑов некоÑоÑÑÑ
ÑлÑжб
пÑименÑÑÑ ÑÑого же Ñода вÑедоноÑнÑе
+пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ÑиÑаÑÑ, ÑÑо полÑзоваÑÐµÐ»Ñ Ð²Ð²Ð¾Ð´Ð¸Ñ Ð¿ÐµÑед Ñем,
как оÑоÑлаÑÑ</a>.</p>
+ </li>
+
<li id="M201811100">
<p>Ð Corel Paintshop Pro еÑÑÑ <a
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
@@ -217,26 +231,6 @@
Ñ
аÑакÑеÑиÑÑики ÑÑаÑÑÑ
ÑелеÑонов, ÑÑобÑ
вÑнÑдиÑÑ Ð¿Ð¾Ð»ÑзоваÑелей покÑпаÑÑ
новÑе</a>.</p>
</li>
-
- <li id="M201810230">
- <p>GM <a
href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
-оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¿ÐµÑеклÑÑÐµÐ½Ð¸Ñ Ð½Ð° ÑазлиÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ ÑадиопеÑедаÑ</a> в
-“подклÑÑеннÑÑ
” авÑомобилÑÑ
,
поминÑÑно.</p>
-
- <p>GM не полÑÑал ÑоглаÑÐ¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей,
но они легко могли Ð±Ñ ÐµÐ³Ð¾ полÑÑиÑÑ,
-вÑÑавив в конÑÑакÑ, коÑоÑÑй подпиÑÑваÑÑ
полÑзоваÑели, какÑÑ-нибÑÐ´Ñ ÑиÑÑовÑÑ
-ÑÑлÑÐ³Ñ Ð¸Ð»Ð¸ ÑÑо-Ñо подобное. ТÑебование на
ÑоглаÑие Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
-ÑакÑиÑеÑки не заÑиÑаеÑ.</p>
-
- <p>ÐвÑомобили могÑÑ ÑобиÑаÑÑ Ñакже маÑÑÑ
дÑÑгиÑ
даннÑÑ
: они могÑÑ ÑлÑÑаÑÑ Ð²Ð°Ñ,
-ÑмоÑÑеÑÑ Ð½Ð° ваÑ, оÑÑлеживаÑÑ Ð²Ð°Ñи
пеÑемеÑÐµÐ½Ð¸Ñ Ð¸ ÑоÑовÑе ÑелеÑонÑ
-паÑÑажиÑов. <em>ÐÑбой</em> ÑÐ±Ð¾Ñ ÑакиÑ
даннÑÑ
должен бÑÑÑ Ð·Ð°Ð¿ÑеÑен.</p>
-
- <p>Ðо еÑли Ð²Ñ Ñ
оÑиÑе наÑÑоÑÑей
безопаÑноÑÑи, нÑжно гаÑанÑиÑоваÑÑ, ÑÑо
-аппаÑаÑÑÑа авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ðµ Ð¼Ð¾Ð¶ÐµÑ ÑобиÑаÑÑ
ниÑего из ÑÑиÑ
даннÑÑ
или ÑÑо
-пÑогÑÐ°Ð¼Ð¼Ñ ÑвободнÑ, Ñак ÑÑо Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, ÑÑо
они не бÑдÑÑ ÑобиÑаÑÑ Ð½Ð¸Ñего из
-ÑÑиÑ
даннÑÑ
.</p>
- </li>
</ul>
@@ -318,7 +312,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/11/13 15:28:27 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
Index: po/malware-webpages.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-webpages.fr-en.html 25 Oct 2018 11:28:59 -0000 1.12
+++ po/malware-webpages.fr-en.html 4 Dec 2018 16:28:39 -0000 1.13
@@ -49,6 +49,20 @@
<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.</p>
+ </li>
+
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -86,15 +100,6 @@
swipes usernames from browser-based password managers</a>.</p>
</li>
- <li id="M201712210">
- <p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
- form but not sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li>
-
<li id="M201711150">
<p>Some websites send
JavaScript code to collect all the user's input, <a
@@ -254,7 +259,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 11:28:59 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-webpages.ru-en.html 25 Oct 2018 17:00:14 -0000 1.13
+++ po/malware-webpages.ru-en.html 4 Dec 2018 16:28:39 -0000 1.14
@@ -49,6 +49,20 @@
<div class="column-limit" id="malware-webpages"></div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.</p>
+ </li>
+
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -86,15 +100,6 @@
swipes usernames from browser-based password managers</a>.</p>
</li>
- <li id="M201712210">
- <p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
- form but not sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li>
-
<li id="M201711150">
<p>Some websites send
JavaScript code to collect all the user's input, <a
@@ -254,7 +259,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/25 17:00:14 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-webpages.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/malware-webpages.ru.po 4 Dec 2018 16:03:30 -0000 1.29
+++ po/malware-webpages.ru.po 4 Dec 2018 16:28:39 -0000 1.30
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-12-04 14:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Webpages - GNU Project - Free Software Foundation"
Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- po/proprietary-surveillance.fr-en.html 1 Dec 2018 20:27:46 -0000
1.135
+++ po/proprietary-surveillance.fr-en.html 4 Dec 2018 16:28:39 -0000
1.136
@@ -1808,6 +1808,20 @@
</div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.</p>
+ </li>
+
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -1821,15 +1835,6 @@
swipes usernames from browser-based password managers</a>.</p>
</li>
- <li id="M201712210">
- <p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
- form but not sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li>
-
<li id="M201711150">
<p>Some websites send
JavaScript code to collect all the user's input, <a
@@ -1979,7 +1984,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/12/01 20:27:46 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- po/proprietary-surveillance.ru-en.html 2 Dec 2018 18:28:12 -0000
1.139
+++ po/proprietary-surveillance.ru-en.html 4 Dec 2018 16:28:39 -0000
1.140
@@ -1808,6 +1808,20 @@
</div>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.</p>
+ </li>
+
<li id="M201807190">
<p>British Airways used <a
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security">nonfree
@@ -1821,15 +1835,6 @@
swipes usernames from browser-based password managers</a>.</p>
</li>
- <li id="M201712210">
- <p>Many web sites use JavaScript code <a
-
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
- to snoop on information that users have typed into a
- form but not sent</a>, in order to learn their identity. Some are <a
-
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
- getting sued</a> for this.</p>
- </li>
-
<li id="M201711150">
<p>Some websites send
JavaScript code to collect all the user's input, <a
@@ -1979,7 +1984,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/12/02 18:28:12 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.439
retrieving revision 1.440
diff -u -b -r1.439 -r1.440
--- po/proprietary-surveillance.ru.po 4 Dec 2018 16:03:30 -0000 1.439
+++ po/proprietary-surveillance.ru.po 4 Dec 2018 16:28:39 -0000 1.440
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-12-04 14:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -960,8 +959,8 @@
"(Ðз <a href=\"https://www.apple.com/icloud/photos/\">ÐнÑоÑмаÑии
об Apple's "
"iCloud</a> на 24 ÑенÑÑбÑÑ 2015 года.) ФÑнкÑиÑ
iCloud <a href="
"\"https://support.apple.com/en-us/HT202033\">акÑивизиÑÑеÑÑÑ
пÑи загÑÑзке "
-"iOS</a>. Слово “<span lang=\"en\" xml:lang=\"en\">cloud</span> "
-"(облако)” ознаÑÐ°ÐµÑ “пожалÑйÑÑа, не
ÑпÑаÑивайÑе, где ÑÑо”."
+"iOS</a>. Слово “<span lang=\"en\" xml:lang=\"en\">cloud</span>
(облако)"
+"” ознаÑÐ°ÐµÑ “пожалÑйÑÑа, не
ÑпÑаÑивайÑе, где ÑÑо”."
#. type: Content of: <ul><li><p>
msgid ""
@@ -2026,8 +2025,8 @@
"technology/2015/may/06/free-android-apps-connect-tracking-advertising-"
"websites\">tracking and advertising</a> URLs, on the average."
msgstr ""
-"ÐеÑплаÑнÑе (но не <a
href=\"/philosophy/free-sw.html\">ÑвободнÑе</"
-"a>)пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android <a
href=\"http://www.theguardian.com/technology/2015/"
+"ÐеÑплаÑнÑе (но не <a
href=\"/philosophy/free-sw.html\">ÑвободнÑе</a>)"
+"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android <a
href=\"http://www.theguardian.com/technology/2015/"
"may/06/free-android-apps-connect-tracking-advertising-websites"
"\">подклÑÑаÑÑÑÑ Ðº 100 URL Ñлежки и ÑекламÑ</a> (в
ÑÑеднем)."
Index: po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- po/proprietary.fr-en.html 13 Nov 2018 17:28:00 -0000 1.37
+++ po/proprietary.fr-en.html 4 Dec 2018 16:28:39 -0000 1.38
@@ -141,6 +141,20 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.</p>
+ </li>
+
<li id="M201811100">
<p>Corel Paintshop Pro has a <a
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
@@ -204,25 +218,6 @@
the performance of older phones to force users to buy their newer
phones</a>.</p>
</li>
-
- <li id="M201810230">
- <p>GM <a
- href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked the choices of radio programs</a> in its
- “connected” cars, minute by minute.</p>
-
- <p>GM did not get users' consent, but it could have got that easily by
- sneaking it into the contract that users sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
-
- <p>The cars can also collect lots of other data: listening to you,
- watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be forbidden.</p>
-
- <p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of that data.</p>
- </li>
</ul>
@@ -283,7 +278,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/11/13 17:28:00 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- po/proprietary.ru-en.html 13 Nov 2018 15:59:33 -0000 1.39
+++ po/proprietary.ru-en.html 4 Dec 2018 16:28:39 -0000 1.40
@@ -141,6 +141,20 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201811270">
+ <p>Many web sites use JavaScript code <a
+
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081">
+ to snoop on information that users have typed into a
+ form but not sent</a>, in order to learn their identity. Some are <a
+
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege">
+ getting sued</a> for this.</p>
+
+ <p>The chat facilities of some customer services use the same sort of
+ malware to <a
+
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119">
+ read what the user is typing before it is posted</a>.</p>
+ </li>
+
<li id="M201811100">
<p>Corel Paintshop Pro has a <a
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
@@ -204,25 +218,6 @@
the performance of older phones to force users to buy their newer
phones</a>.</p>
</li>
-
- <li id="M201810230">
- <p>GM <a
- href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html">
- tracked the choices of radio programs</a> in its
- “connected” cars, minute by minute.</p>
-
- <p>GM did not get users' consent, but it could have got that easily by
- sneaking it into the contract that users sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
-
- <p>The cars can also collect lots of other data: listening to you,
- watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be forbidden.</p>
-
- <p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of that data.</p>
- </li>
</ul>
@@ -283,7 +278,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/11/13 15:59:33 $
+$Date: 2018/12/04 16:28:39 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- po/proprietary.ru.po 4 Dec 2018 16:03:30 -0000 1.108
+++ po/proprietary.ru.po 4 Dec 2018 16:28:39 -0000 1.109
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-12-04 14:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,12 +301,12 @@
"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
"Allege\"> getting sued</a> for this."
msgstr ""
-"Ðногие ÑайÑÑ Ð¿ÑименÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑÑÐ¾Ð±Ñ <a href=\"http://gizmodo.com/before-you-"
-"hit-submit-this-company-has-already-logge-1795906081\"> вÑÑживаÑÑ
инÑоÑмаÑиÑ, "
-"коÑоÑÑÑ Ð¿Ð¾Ð»ÑзоваÑели ввели в ÑоÑме, но не
оÑпÑавили</a> Ð´Ð»Ñ Ð¾Ð¿ÑÐµÐ´ÐµÐ»ÐµÐ½Ð¸Ñ "
-"иÑ
лиÑноÑÑи. Ðа некоÑоÑÑÑ
за ÑÑо <a
href=\"https://www.manatt.com/Insights/"
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> подали в ÑÑд</a>."
+"Ðногие ÑайÑÑ Ð¿ÑименÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
JavaScript, ÑÑÐ¾Ð±Ñ <a href=\"http://"
+"gizmodo.com/before-you-hit-submit-this-company-has-already-"
+"logge-1795906081\"> вÑÑживаÑÑ Ð¸Ð½ÑоÑмаÑиÑ, коÑоÑÑÑ
полÑзоваÑели ввели в "
+"ÑоÑме, но не оÑпÑавили</a> Ð´Ð»Ñ Ð¾Ð¿ÑеделениÑ
иÑ
лиÑноÑÑи. Ðа некоÑоÑÑÑ
за ÑÑо "
+"<a href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-"
+"Illegally-Tracked-Consumers-New-Suits-Allege\"> подали в ÑÑд</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -317,8 +316,9 @@
"a>."
msgstr ""
"СÑедÑÑва пеÑеговоÑов некоÑоÑÑÑ
ÑлÑжб
пÑименÑÑÑ ÑÑого же Ñода вÑедоноÑнÑе "
-"пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ <a
href=\"https://gizmodo.com/be-warned-customer-service-agents-can-see-"
-"what-youre-t-1830688119\"> ÑиÑаÑÑ, ÑÑо полÑзоваÑелÑ
Ð²Ð²Ð¾Ð´Ð¸Ñ Ð¿ÐµÑед Ñем, как оÑоÑлаÑÑ</a>."
+"пÑогÑаммÑ, ÑÑÐ¾Ð±Ñ <a
href=\"https://gizmodo.com/be-warned-customer-service-"
+"agents-can-see-what-youre-t-1830688119\"> ÑиÑаÑÑ, ÑÑо
полÑзоваÑÐµÐ»Ñ Ð²Ð²Ð¾Ð´Ð¸Ñ "
+"пеÑед Ñем, как оÑоÑлаÑÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-webpages.fr.html malwar...,
GNUN <=