[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 19 Jan 2019 04:30:13 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/01/19 04:30:12
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po pt-br.po ru.po
zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.13&r2=1.14
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- de.po 17 Jan 2019 15:29:36 -0000 1.13
+++ de.po 19 Jan 2019 09:30:11 -0000 1.14
@@ -8532,9 +8532,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- es.po 18 Jan 2019 13:01:09 -0000 1.15
+++ es.po 19 Jan 2019 09:30:11 -0000 1.16
@@ -6097,9 +6097,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- fr.po 17 Jan 2019 16:28:52 -0000 1.23
+++ fr.po 19 Jan 2019 09:30:12 -0000 1.24
@@ -6766,11 +6766,21 @@
msgid "Proprietary Back Doors"
msgstr "Portes dérobées du logiciel privateur"
-#. type: Content of: <div><p>
-msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+# | [-We say-]{+A “back door” in+} a program [-has-] {+is+} a
+# | [-“back door“ when-] {+channel designed to send the program
+# | commands from+} someone who is not supposed to be in control of the
+# | computer where [-it-] {+the program+} is [-installed can send it commands
+# | via some other channel.-] {+installed.+}
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "We say a program has a “back door“ when someone who is not "
+#| "supposed to be in control of the computer where it is installed can send "
+#| "it commands via some other channel."
+msgid ""
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
"Nous disons qu'un programme a une « porte dérobée » si un tiers n'ayant
pas, "
"en principe, le contrôle de l'ordinateur sur lequel il est installé peut
lui "
@@ -9020,6 +9030,15 @@
"processeurs Intel vont avoir un tyran logiciel intégré</a>."
#~ msgid ""
+#~ "We say a program has a “back door“ when someone who is not "
+#~ "supposed to be in control of the computer where it is installed can send "
+#~ "it commands via some other channel."
+#~ msgstr ""
+#~ "Nous disons qu'un programme a une « porte dérobée » si un tiers
n'ayant "
+#~ "pas, en principe, le contrôle de l'ordinateur sur lequel il est installé
"
+#~ "peut lui envoyer des commandes par une autre voie."
+
+#~ msgid ""
#~ "<em>Back door:</em> any piece of software that is running on your "
#~ "computer, and listens for commands from someone else who can tell it to "
#~ "do things without asking your approval."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- it.po 17 Jan 2019 15:29:36 -0000 1.13
+++ it.po 19 Jan 2019 09:30:12 -0000 1.14
@@ -7917,9 +7917,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- ja.po 17 Jan 2019 15:29:36 -0000 1.13
+++ ja.po 19 Jan 2019 09:30:12 -0000 1.14
@@ -6684,9 +6684,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- nl.po 17 Jan 2019 15:29:36 -0000 1.13
+++ nl.po 19 Jan 2019 09:30:12 -0000 1.14
@@ -5244,9 +5244,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- pl.po 17 Jan 2019 15:29:36 -0000 1.13
+++ pl.po 19 Jan 2019 09:30:12 -0000 1.14
@@ -4718,9 +4718,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- pot 17 Jan 2019 15:29:36 -0000 1.13
+++ pot 19 Jan 2019 09:30:12 -0000 1.14
@@ -4514,9 +4514,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-back-doors.de-diff.html 5 Jan 2019 11:31:34 -0000 1.19
+++ proprietary-back-doors.de-diff.html 19 Jan 2019 09:30:12 -0000 1.20
@@ -11,7 +11,7 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.85</strong></del></span> <span
class="inserted"><ins><em>1.86 -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.85</strong></del></span> <span
class="inserted"><ins><em>1.87 -->
<!--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Please do not edit <ul class="blurbs">!
@@ -34,9 +34,9 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
-<span class="inserted"><ins><em><p>We say a program has a “back
door“ when someone who is
-not supposed to be in control of the computer where it is installed
-can send it commands via some other channel.</p></em></ins></span>
+<span class="inserted"><ins><em><p>A “back door” in a
program is a channel designed
+to send the program commands from someone who is not supposed
+to be in control of the computer where the program is
installed.</p></em></ins></span>
<p>Here are examples of demonstrated back doors in proprietary software.
They are sorted out according to what they are known to allow. Back doors
@@ -571,10 +571,10 @@
<a
<span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
may take the form of bugs that have gone 20 years unfixed</a>.
- The choice to leave the security holes</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html#universal-back-door">Malware</em></ins></span>
- in <span class="removed"><del><strong>place is morally
+ The choice to leave the security holes in place is morally
equivalent to writing a back door.</p>
- <p>The back door is in the “modem processor”, whose
+ <p>The back door is</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html#universal-back-door">Malware</em></ins></span>
+ in <span class="removed"><del><strong>the “modem processor”,
whose
job is to communicate with the radio network. In most phones,
the modem processor controls the microphone. In most phones it
has the power to rewrite the software</strong></del></span> <span
class="inserted"><ins><em>Mobile Devices</a></em></ins></span> for <span
class="removed"><del><strong>the main processor
@@ -756,7 +756,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/01/19 09:30:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary-back-doors.de.po 5 Jan 2019 08:59:19 -0000 1.119
+++ proprietary-back-doors.de.po 19 Jan 2019 09:30:12 -0000 1.120
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -53,9 +53,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary-back-doors.fr.po 5 Jan 2019 16:13:43 -0000 1.117
+++ proprietary-back-doors.fr.po 19 Jan 2019 09:30:12 -0000 1.118
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
"PO-Revision-Date: 2019-01-05 17:13+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-19 09:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -51,10 +52,20 @@
"utilisateurs qu'ils devraient servir."
#. type: Content of: <div><p>
-msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+# | [-We say-]{+A “back door” in+} a program [-has-] {+is+} a
+# | [-“back door“ when-] {+channel designed to send the program
+# | commands from+} someone who is not supposed to be in control of the
+# | computer where [-it-] {+the program+} is [-installed can send it commands
+# | via some other channel.-] {+installed.+}
+#, fuzzy
+#| msgid ""
+#| "We say a program has a “back door“ when someone who is not "
+#| "supposed to be in control of the computer where it is installed can send "
+#| "it commands via some other channel."
+msgid ""
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
"Nous disons qu'un programme a une « porte dérobée » si un tiers n'ayant
pas, "
"en principe, le contrôle de l'ordinateur sur lequel il est installé peut
lui "
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-back-doors.it-diff.html 5 Jan 2019 11:31:34 -0000 1.45
+++ proprietary-back-doors.it-diff.html 19 Jan 2019 09:30:12 -0000 1.46
@@ -11,7 +11,7 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.83</strong></del></span> <span
class="inserted"><ins><em>1.86 -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.83</strong></del></span> <span
class="inserted"><ins><em>1.87 -->
<!--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Please do not edit <ul class="blurbs">!
@@ -34,9 +34,9 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
-<span class="inserted"><ins><em><p>We say a program has a “back
door“ when someone who is
-not supposed to be in control of the computer where it is installed
-can send it commands via some other channel.</p></em></ins></span>
+<span class="inserted"><ins><em><p>A “back door” in a
program is a channel designed
+to send the program commands from someone who is not supposed
+to be in control of the computer where the program is
installed.</p></em></ins></span>
<p>Here are examples of demonstrated back doors in proprietary <span
class="removed"><del><strong>software.</p>
@@ -146,7 +146,7 @@
isn't clear.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>A</strong></del></span>
+ <span class="removed"><del><strong><li><p>A pregnancy
test</strong></del></span>
<span class="inserted"><ins><em><li id="M201607284">
<p>The Dropbox app for Macintosh <a
@@ -156,7 +156,7 @@
</li>
<li id="M201604250">
- <p>A</em></ins></span> pregnancy test controller application not
only can <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <p>A pregnancy test</em></ins></span> controller application not
only can <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
spy</em></ins></span> on many sorts of data in the phone, and in server
accounts,
it can alter them too</a>.</p>
@@ -292,135 +292,136 @@
<p>This seems to involve use of</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
- wiped</em></ins></span> a <span class="removed"><del><strong>back door in
Windows 7</strong></del></span> <span class="inserted"><ins><em>user's
Kindle-Swindle</em></ins></span> and <span
class="removed"><del><strong>8.</p>
+ wiped</em></ins></span> a <span class="inserted"><ins><em>user's
Kindle-Swindle and deleted her account</a>, then
+ offered her kafkaesque “explanations.”</p>
+
+ <p>Do other ebook readers have</em></ins></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
+ don't know,</em></ins></span> and <span
class="removed"><del><strong>8.</p>
</li>
<li>
-<p>Most mobile phones have a universal back door, which has been used to
-<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+<p>Most mobile phones</strong></del></span> <span
class="inserted"><ins><em>we</em></ins></span> have <span
class="inserted"><ins><em>no way to find out. There is no reason to
+ assume that they don't.</p>
+ </li>
+
+ <li id="M201011220">
+ <p>The iPhone has</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door, which has been used to</strong></del></span>
<span class="inserted"><ins><em>door for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.
-</p>
-</li>
+</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ remote wipe</a>. It's not always enabled, but users are led into
+ enabling it without understanding.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android has a universal back door</a>. Nearly all
-models of mobile phones</strong></del></span> <span
class="inserted"><ins><em>deleted her account</a>, then
- offered her kafkaesque “explanations.”</p>
+A Chinese version of Android</strong></del></span>
+<span class="inserted"><ins><em></ul>
+
- <p>Do other ebook readers</em></ins></span> have <span
class="removed"><del><strong>a universal</strong></del></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> in <span
class="removed"><del><strong>the modem chip. So
-why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
- don't know, and we have no way</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this one is controlled
+<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
+
+<ul class="blurbs">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
+ back <span class="removed"><del><strong>door</a>. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>door that can
make it cease to function</a>.</p>
+
+ <p>The article is full</em></ins></span> of <span
class="removed"><del><strong>mobile phones</strong></del></span> <span
class="inserted"><ins><em>confusions, errors and biases that
we</em></ins></span> have
+ <span class="inserted"><ins><em>an obligation to expose, given that we are
making</em></ins></span> a <span class="removed"><del><strong>universal back
door</strong></del></span> <span class="inserted"><ins><em>link to
them.</p>
+
+ <ul>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing</em></ins></span> in <span
class="inserted"><ins><em>its products. What it does enable</em></ins></span>
the <span class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
+ to <span class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span>
is <span class="removed"><del><strong>controlled
by Coolpad.
</p>
</li>
<li>
-<p>Microsoft Windows has a universal back door through which
+<p>Microsoft Windows has</strong></del></span> <span
class="inserted"><ins><em>sue other companies if they do some particular thing
in
+ their products.</li>
+
+ <li>A company's policies about when to attack users
through</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back
+ door <span class="removed"><del><strong>through which
<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on the users</a>.
+any change whatsoever can be imposed on</strong></del></span> <span
class="inserted"><ins><em>are beside</em></ins></span> the <span
class="removed"><del><strong>users</a>.
</p>
<p>More information on when
<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
this was used</a>.
</p>
-<p>In Windows 10, the universal back door</strong></del></span> <span
class="inserted"><ins><em>find out. There</em></ins></span> is no <span
class="removed"><del><strong>longer hidden; all
+<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span
class="removed"><del><strong>universal</strong></del></span> back door is <span
class="removed"><del><strong>no longer hidden; all
“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
-and immediately imposed</a>.
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>wrong in the
+ first place,</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
</p>
</li>
<li><p>German government <a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
-away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span
class="inserted"><ins><em>reason</em></ins></span> to <span
class="removed"><del><strong>potential back
-door capabilities of the TPM 2.0 chip</a>.</p>
+away from Windows 8 computers with TPM 2.0 due to potential back
+door capabilities of</strong></del></span> <span
class="inserted"><ins><em>using</em></ins></span> the <span
class="removed"><del><strong>TPM 2.0 chip</a>.</p>
</li>
<li>
-<p>The iPhone has a back door
-<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
- <span class="inserted"><ins><em>assume</em></ins></span> that <span
class="removed"><del><strong>allows Apple to remotely delete apps</a>
which Apple considers
-“inappropriate”. Jobs said it's ok for Apple to have this power
-because of course we can trust Apple.
-</p></strong></del></span> <span class="inserted"><ins><em>they
don't.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201011220"></em></ins></span>
- <p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
- remote wipe</a>. It's not always enabled, but users are led into
- enabling it without <span class="removed"><del><strong>understanding.
-</p></strong></del></span> <span
class="inserted"><ins><em>understanding.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
- <p>Apple can, and regularly does,</strong></del></span>
-<span class="inserted"><ins><em></ul>
-
-
-<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
-
-<ul class="blurbs">
- <li id="M201811100">
- <p>Corel Paintshop Pro has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
- back door that can make it cease to function</a>.</p>
-
- <p>The article is full of confusions, errors and biases that we have
- an obligation to expose, given that we are making a link to them.</p>
-
- <ul>
- <li>Getting a patent does not “enable” a company to do
- any particular thing in its products. What it does enable the company
- to do is sue other companies if they do</em></ins></span> some <span
class="removed"><del><strong>data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>particular thing in
- their products.</li>
-
- <li>A company's policies about when to attack users through a back
- door are beside</em></ins></span> the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may</strong></del></span> <span
class="inserted"><ins><em>point. Inserting the back door is wrong in the
- first place, and using the back door is always wrong too. No software
- developer should</em></ins></span> have <span
class="removed"><del><strong>improved</strong></del></span> <span
class="inserted"><ins><em>that power over users.</li>
+<p>The iPhone has a</strong></del></span> back door
+<span class="removed"><del><strong><a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
<span class="inserted"><ins><em>is always wrong too. No software
+ developer should have</em></ins></span> that <span
class="removed"><del><strong>allows Apple</strong></del></span> <span
class="inserted"><ins><em>power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word to refer to sharing copies is a smear;
+ attacking ships. Using that word</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
+“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span
class="inserted"><ins><em>refer</em></ins></span> to <span
class="removed"><del><strong>have this power
+because</strong></del></span> <span class="inserted"><ins><em>sharing copies
is a smear;
please don't smear sharing.</li>
- <li><p>The idea of “protecting our IP” is
- total confusion. The term “IP” itself is a <a
- href="/philosophy/not-ipr.html">bogus generalization about things
+ <li><p>The idea</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
+</p>
+</li>
+
+<li>
+<p>The iPhone has</strong></del></span> <span
class="inserted"><ins><em>“protecting our IP” is
+ total confusion. The term “IP” itself is</em></ins></span> a
<span class="removed"><del><strong>back door for</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>.</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/not-ipr.html">bogus
generalization about things
that have nothing in common</a>.</p>
<p>In addition, to speak of “protecting” that bogus
- generalization is a separate absurdity. It's like calling the cops
- because neighbors' kids are playing on your front yard, and saying
+ generalization is a separate absurdity.</em></ins></span> It's <span
class="removed"><del><strong>not always enabled, but
users</strong></del></span> <span class="inserted"><ins><em>like calling the
cops
+ because neighbors' kids</em></ins></span> are <span
class="removed"><del><strong>led into enabling</strong></del></span> <span
class="inserted"><ins><em>playing on your front yard, and saying
that you're “protecting the boundary line”. The kids can't do
harm
- to the boundary line, not even</em></ins></span> with <span
class="inserted"><ins><em>a jackhammer, because it is an
- abstraction and can't be affected by physical action.</p></li>
+ to the boundary line, not even with a jackhammer,
because</em></ins></span> it <span class="removed"><del><strong>without
understanding.
+</p>
+</li>
+
+<li>
+ <p>Apple can,</strong></del></span> <span class="inserted"><ins><em>is
an
+ abstraction</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>can't be affected by physical
action.</p></li>
</ul>
</li>
<li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
+ <p>We link to the article</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
+ moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
apps</a>.</p>
@@ -463,51 +464,37 @@
program called <span class="removed"><del><strong>GTalkService).
</p>
-<p></strong></del></span> <span class="inserted"><ins><em>GTalkService,
which seems since then to have been
- merged into</em></ins></span> Google <span
class="inserted"><ins><em>Play.)</p>
+<p>
+Google can also
+<a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+forcibly and remotely install apps</a> through GTalkService (which
+seems,</strong></del></span> <span class="inserted"><ins><em>GTalkService,
which seems</em></ins></span> since <span class="removed"><del><strong>that
article,</strong></del></span> <span
class="inserted"><ins><em>then</em></ins></span> to have been
+ merged into Google <span
class="removed"><del><strong>Play).</strong></del></span> <span
class="inserted"><ins><em>Play.)</p>
- <p>Google</em></ins></span> can also <a
+ <p>Google can also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which
-seems, since that article, to have been merged into Google
Play).</strong></del></span> <span
class="inserted"><ins><em>GTalkService.</em></ins></span> This is
- not equivalent to a universal back door, but permits various dirty <span
class="removed"><del><strong>tricks.
+ forcibly and remotely install apps</a> through
GTalkService.</em></ins></span> This is
+ not equivalent to a universal back <span
class="removed"><del><strong>door, but permits various
+dirty tricks.
</p>
<p>
-Although</strong></del></span>
- <span class="inserted"><ins><em>tricks.</p>
+Although Google's <em>exercise</em></strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
+ tricks.</p>
- <p>Although</em></ins></span> Google's <em>exercise</em>
of this power has not been
+ <p>Although Google's <em>exercise</em> of this power has
not been
malicious so far, the point is that nobody should have such power,
which could also be used maliciously. You might well decide to
let a security service remotely <em>deactivate</em> programs
that
it considers malicious. But there is no excuse for allowing it to
<em>delete</em> the programs, and you should have the right to
decide
- who (if anyone) to trust in this <span class="removed"><del><strong>way.
-</p>
-</li>
-
-<li>
-<p><a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
-Samsung Galaxy devices running proprietary Android versions come with a back
-door</a> that provides remote access to the files stored on the device.
-</p></strong></del></span> <span
class="inserted"><ins><em>way.</p></em></ins></span>
+ who (if anyone) to trust in this way.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
- <p>The <span class="removed"><del><strong>Amazon
Kindle-Swindle</strong></del></span> <span
class="inserted"><ins><em>iPhone</em></ins></span> has a back door <span
class="inserted"><ins><em><a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></em></ins></span>
- that <span class="removed"><del><strong>has been
used</strong></del></span> <span class="inserted"><ins><em>allows
Apple</em></ins></span> to
-<span class="removed"><del><strong><a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"></strong></del></span>
remotely <span class="removed"><del><strong>erase books</a>. One of the
books erased was 1984, by George Orwell.
-</p>
-
-<p>Amazon responded to criticism by saying it
would</strong></del></span> delete <span class="removed"><del><strong>books only
-following orders from the state. However, that policy didn't last.
-In 2012
-it</strong></del></span> <span class="inserted"><ins><em>apps</a> which
Apple considers
+ <li id="M200808110">
+ <p>The iPhone has a back door <a
+
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+ that allows Apple to remotely delete apps</a> which Apple considers
“inappropriate”. Jobs said it's OK for Apple to have
this power because of course we can trust Apple.</p>
</li>
@@ -518,50 +505,41 @@
<ul class="blurbs">
<li id="M201812300">
- <p>New GM cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped</strong></del></span>
- <span
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of</em></ins></span> a <span
class="removed"><del><strong>user's Kindle-Swindle and deleted her
account</a>, then offered her
-kafkaesque “explanations.”</p></strong></del></span> <span
class="inserted"><ins><em>universal back door</a>.</p>
+ <p>New GM cars <a
+ href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
+ offer the feature of a universal back door</a>.</p>
<p>Every nonfree program offers the user zero security against its
developer. With this malfeature, GM has explicitly made things even
worse.</p>
</li>
- <li id="M201711244"></em></ins></span>
- <p>The <span class="removed"><del><strong>Kindle-Swindle
also</strong></del></span> <span class="inserted"><ins><em>Furby
Connect</em></ins></span> has a <a <span
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"></em></ins></span>
- universal back door</a>.
-<span class="removed"><del><strong></p></strong></del></span> <span
class="inserted"><ins><em>If the product as shipped doesn't act as a
+ <li id="M201711244">
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
- into one.</p></em></ins></span>
+ into one.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>HP “storage appliances”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711010">
+ <li id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with a universal back door, and tethered to a server</em></ins></span>
that <span class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>requires
+ with a universal back door, and tethered to a server that requires
a subscription</a>.</p>
</li>
<li id="M201709091">
- <p>Tesla used software to limit</em></ins></span> the <span
class="removed"><del><strong>proprietary
-“Left Hand” operating system have back doors</strong></del></span>
<span class="inserted"><ins><em>part of the battery</em></ins></span>
- that <span class="removed"><del><strong>give
-HP</strong></del></span> <span class="inserted"><ins><em>was available to
customers in some cars, and</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
-remote login access</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
- a universal back door in the software</a></em></ins></span> to <span
class="removed"><del><strong>them. HP claims that</strong></del></span> <span
class="inserted"><ins><em>temporarily increase</em></ins></span>
- this <span class="removed"><del><strong>does not give HP
-access</strong></del></span> <span class="inserted"><ins><em>limit.</p>
+ <p>Tesla used software to limit the part of the battery
+ that was available to customers in some cars, and <a
+
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
+ a universal back door in the software</a> to temporarily increase
+ this limit.</p>
- <p>While remotely allowing car
“owners”</em></ins></span> to <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
- <span class="inserted"><ins><em>whole battery capacity did not do them any
harm, the same back
+ <p>While remotely allowing car “owners” to use the
+ whole battery capacity did not do them any harm, the same back
door would permit Tesla (perhaps under the command of some
- government) to remotely order</em></ins></span> the <span
class="inserted"><ins><em>car to use none of its battery. Or
+ government) to remotely order the car to use none of its battery. Or
perhaps to drive its passenger to a torture prison.</p>
</li>
@@ -615,37 +593,72 @@
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>. Nearly
- all models of mobile phones have a <a href="#universal-back-door">
- universal back door in the modem chip</a>. So why did Coolpad bother
- to introduce another? Because this one is controlled by Coolpad.</p>
+ all models</em></ins></span> of <span class="removed"><del><strong>this
power has not been
+malicious so far, the point is that nobody should</strong></del></span> <span
class="inserted"><ins><em>mobile phones</em></ins></span> have <span
class="removed"><del><strong>such power,
+which could also be used maliciously. You might well decide to
let</strong></del></span> a
+<span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs that it
+considers malicious. But there is no excuse for allowing it
+to <em>delete</em> the programs, and you should
have</strong></del></span> <span class="inserted"><ins><em><a
href="#universal-back-door">
+ universal back door in</em></ins></span> the <span
class="removed"><del><strong>right to
+decide who (if anyone)</strong></del></span> <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad
bother</em></ins></span>
+ to <span class="removed"><del><strong>trust in</strong></del></span> <span
class="inserted"><ins><em>introduce another? Because</em></ins></span> this
<span class="removed"><del><strong>way.
+</p></strong></del></span> <span class="inserted"><ins><em>one is
controlled by Coolpad.</p></em></ins></span>
</li>
- <li id="M201311300">
- <p><a
-
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
- Some applications come with MyFreeProxy, which is a universal back
- door</a> that can download programs and run them.</p>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311300"></em></ins></span>
+ <p><a <span class="removed"><del><strong>id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+Samsung Galaxy devices running proprietary Android
versions</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
+ Some applications</em></ins></span> come with <span
class="inserted"><ins><em>MyFreeProxy, which is</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back
+ door</a> that <span class="removed"><del><strong>provides remote
access to the files stored on the device.
+</p></strong></del></span> <span class="inserted"><ins><em>can download
programs and run them.</p></em></ins></span>
</li>
- <li id="M201202280">
- <p>ChromeOS has a universal back
- door. At least, Google says it does—in <a
- href="https://www.google.com/intl/en/chromebook/termsofservice.html">
- section 4 of the EULA</a>.</p>
+<span class="removed"><del><strong><li>
+<p>The Amazon Kindle-Swindle</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201202280">
+ <p>ChromeOS</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door that has been used to</strong></del></span>
+ <span class="inserted"><ins><em>door. At least, Google says it
does—in</em></ins></span> <a <span
class="removed"><del><strong>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+remotely erase books</a>. One</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html">
+ section 4</em></ins></span> of the <span
class="removed"><del><strong>books erased was 1984, by George Orwell.
+</p>
+
+<p>Amazon responded</strong></del></span> <span
class="inserted"><ins><em>EULA</a>.</p>
</li>
<li id="M200700001">
- <p>In addition to its <a href="#swindle-eraser">book
- eraser</a>, the Kindle-Swindle has a <a
+ <p>In addition</em></ins></span> to <span
class="removed"><del><strong>criticism by saying it would delete books only
+following orders from the state. However, that policy didn't last.
+In 2012
+it</strong></del></span> <span class="inserted"><ins><em>its</em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
+a user's Kindle-Swindle and deleted her account</a>, then offered her
+kafkaesque “explanations.”</p>
+
+
+<p>The</strong></del></span> <span
class="inserted"><ins><em>href="#swindle-eraser">book
+ eraser</a>, the</em></ins></span> Kindle-Swindle <span
class="removed"><del><strong>also</strong></del></span> has a <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
- universal back door</a>.</p>
+ universal back <span class="removed"><del><strong>door</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
</li>
- <li id="M200612050">
+<span class="removed"><del><strong><li>
+<p>HP “storage appliances” that use the proprietary
+“Left Hand” operating system have</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200612050">
<p>Almost every phone's communication
- processor has a universal back door which is <a
-
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- often used to make a phone transmit all conversations it hears</a>.
See
+ processor has a universal</em></ins></span> back <span
class="removed"><del><strong>doors that give
+HP</strong></del></span> <span class="inserted"><ins><em>door which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a> to them. HP claims that this does not give HP
+access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used</em></ins></span> to <span class="removed"><del><strong>the
customer's data, but if the</strong></del></span> <span
class="inserted"><ins><em>make a phone transmit all conversations it
hears</a>. See
<a
href="/proprietary/malware-mobiles.html#universal-back-door">Malware
in Mobile Devices</a> for more info.</p>
</li>
@@ -818,7 +831,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/01/19 09:30:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary-back-doors.it.po 5 Jan 2019 08:59:19 -0000 1.111
+++ proprietary-back-doors.it.po 19 Jan 2019 09:30:12 -0000 1.112
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -52,9 +52,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-back-doors.ja-diff.html 5 Jan 2019 11:31:34 -0000 1.42
+++ proprietary-back-doors.ja-diff.html 19 Jan 2019 09:30:12 -0000 1.43
@@ -11,7 +11,7 @@
</style></head>
<body><pre>
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.86 -->
+<!-- Parent-Version: <span
class="removed"><del><strong>1.79</strong></del></span> <span
class="inserted"><ins><em>1.87 -->
<!--
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Please do not edit <ul class="blurbs">!
@@ -34,9 +34,9 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
-<span class="inserted"><ins><em><p>We say a program has a “back
door“ when someone who is
-not supposed to be in control of the computer where it is installed
-can send it commands via some other channel.</p></em></ins></span>
+<span class="inserted"><ins><em><p>A “back door” in a
program is a channel designed
+to send the program commands from someone who is not supposed
+to be in control of the computer where the program is
installed.</p></em></ins></span>
<p>Here are examples of demonstrated back doors in proprietary <span
class="removed"><del><strong>software.</p>
@@ -128,7 +128,7 @@
collect a wide range of</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some</em></ins></span> data <span
class="removed"><del><strong>about their users and their users'
- friends and</strong></del></span> <span class="inserted"><ins><em>from
iPhones for the state</a>.</p>
+ friends and associates</a>.</p></strong></del></span> <span
class="inserted"><ins><em>from iPhones for the state</a>.</p>
<p>This may have improved with <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
@@ -196,7 +196,7 @@
<p>Modern gratis game cr…apps <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
- friends and</em></ins></span> associates</a>.</p>
+ friends and associates</a>.</p></em></ins></span>
<p>Even nastier, they do it through ad networks that merge the data
collected by various cr…apps and sites made by different
@@ -812,7 +812,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/01/19 09:30:12 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary-back-doors.ja.po 5 Jan 2019 08:59:19 -0000 1.91
+++ proprietary-back-doors.ja.po 19 Jan 2019 09:30:12 -0000 1.92
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -51,9 +51,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-back-doors.pot 5 Jan 2019 08:59:19 -0000 1.61
+++ proprietary-back-doors.pot 19 Jan 2019 09:30:12 -0000 1.62
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -42,9 +42,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary-back-doors.ru.po 17 Jan 2019 06:02:19 -0000 1.163
+++ proprietary-back-doors.ru.po 19 Jan 2019 09:30:12 -0000 1.164
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-19 09:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -50,10 +51,20 @@
"они Ð´Ð¾Ð»Ð¶Ð½Ñ Ð¾Ð±ÑлÑживаÑÑ."
#. type: Content of: <div><p>
-msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+# | [-We say-]{+A “back door” in+} a program [-has-] {+is+} a
+# | [-“back door“ when-] {+channel designed to send the program
+# | commands from+} someone who is not supposed to be in control of the
+# | computer where [-it-] {+the program+} is [-installed can send it commands
+# | via some other channel.-] {+installed.+}
+#, fuzzy
+#| msgid ""
+#| "We say a program has a “back door“ when someone who is not "
+#| "supposed to be in control of the computer where it is installed can send "
+#| "it commands via some other channel."
+msgid ""
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
"ÐÑ Ð³Ð¾Ð²Ð¾Ñим, ÑÑо в пÑогÑамме еÑÑÑ
“ÑеÑнÑй Ñ
од”, еÑли кÑо-Ñо, кÑо "
"не должен конÑÑолиÑоваÑÑ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑ, на
коÑоÑом она ÑÑÑановлена, Ð¼Ð¾Ð¶ÐµÑ "
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- pt-br.po 17 Jan 2019 15:29:37 -0000 1.19
+++ pt-br.po 19 Jan 2019 09:30:12 -0000 1.20
@@ -4802,11 +4802,19 @@
msgstr ""
#. type: Content of: <div><p>
-msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+#, fuzzy
+#| msgid ""
+#| "<em>Back door:</em> any feature of a program that enables someone "
+#| "who is not supposed to be in control of the computer where it is "
+#| "installed to send it commands."
+msgid ""
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
+"<em>Back door:</em> qualquer funcionalidade de um programa que "
+"possibilita que alguém que não deveria estar no controle do computador, no "
+"qual o programa está instalado, enviar comandos para ele."
#. type: Content of: <div><p>
msgid ""
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- ru.po 17 Jan 2019 17:29:15 -0000 1.28
+++ ru.po 19 Jan 2019 09:30:12 -0000 1.29
@@ -6730,11 +6730,21 @@
msgid "Proprietary Back Doors"
msgstr "Ðазейки в неÑвободнÑÑ
пÑогÑаммаÑ
"
-#. type: Content of: <div><p>
-msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+# | [-We say-]{+A “back door” in+} a program [-has-] {+is+} a
+# | [-“back door“ when-] {+channel designed to send the program
+# | commands from+} someone who is not supposed to be in control of the
+# | computer where [-it-] {+the program+} is [-installed can send it commands
+# | via some other channel.-] {+installed.+}
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "We say a program has a “back door“ when someone who is not "
+#| "supposed to be in control of the computer where it is installed can send "
+#| "it commands via some other channel."
+msgid ""
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
"ÐÑ Ð³Ð¾Ð²Ð¾Ñим, ÑÑо в пÑогÑамме еÑÑÑ
“ÑеÑнÑй Ñ
од”, еÑли кÑо-Ñо, кÑо "
"не должен конÑÑолиÑоваÑÑ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑ, на
коÑоÑом она ÑÑÑановлена, Ð¼Ð¾Ð¶ÐµÑ "
@@ -9002,6 +9012,15 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\"> Ð "
"пÑоÑеÑÑоÑаÑ
Intel бÑдÑÑ Ð²ÑÑÑоеннÑе
неÑвободнÑе пÑогÑаммÑ-ÑиÑанÑ</a>."
+#~ msgid ""
+#~ "We say a program has a “back door“ when someone who is not "
+#~ "supposed to be in control of the computer where it is installed can send "
+#~ "it commands via some other channel."
+#~ msgstr ""
+#~ "ÐÑ Ð³Ð¾Ð²Ð¾Ñим, ÑÑо в пÑогÑамме еÑÑÑ
“ÑеÑнÑй Ñ
од”, еÑли кÑо-Ñо, "
+#~ "кÑо не должен конÑÑолиÑоваÑÑ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑ,
на коÑоÑом она ÑÑÑановлена, Ð¼Ð¾Ð¶ÐµÑ "
+#~ "поÑÑлаÑÑ ÑÑÐ¾Ð¼Ñ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ."
+
#~ msgid "#TOC { width: 40em; }\n"
#~ msgstr "#TOC { width: 40em; }\n"
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- zh-tw.po 17 Jan 2019 15:29:37 -0000 1.13
+++ zh-tw.po 19 Jan 2019 09:30:12 -0000 1.14
@@ -4661,9 +4661,9 @@
#. type: Content of: <div><p>
msgid ""
-"We say a program has a “back door“ when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A “back door” in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
msgstr ""
#. type: Content of: <div><p>
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/01
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/05
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/14
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/17
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/28