www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Sat, 19 Jan 2019 04:30:13 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/01/19 04:30:12

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot 
                         proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po pt-br.po ru.po 
                         zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.13&r2=1.14

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- de.po       17 Jan 2019 15:29:36 -0000      1.13
+++ de.po       19 Jan 2019 09:30:11 -0000      1.14
@@ -8532,9 +8532,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- es.po       18 Jan 2019 13:01:09 -0000      1.15
+++ es.po       19 Jan 2019 09:30:11 -0000      1.16
@@ -6097,9 +6097,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- fr.po       17 Jan 2019 16:28:52 -0000      1.23
+++ fr.po       19 Jan 2019 09:30:12 -0000      1.24
@@ -6766,11 +6766,21 @@
 msgid "Proprietary Back Doors"
 msgstr "Portes dérobées du logiciel privateur"
 
-#. type: Content of: <div><p>
-msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+# | [-We say-]{+A &ldquo;back door&rdquo; in+} a program [-has-] {+is+} a
+# | [-&ldquo;back door&ldquo; when-] {+channel designed to send the program
+# | commands from+} someone who is not supposed to be in control of the
+# | computer where [-it-] {+the program+} is [-installed can send it commands
+# | via some other channel.-] {+installed.+}
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "We say a program has a &ldquo;back door&ldquo; when someone who is not "
+#| "supposed to be in control of the computer where it is installed can send "
+#| "it commands via some other channel."
+msgid ""
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 "Nous disons qu'un programme a une « porte dérobée » si un tiers n'ayant 
pas, "
 "en principe, le contrôle de l'ordinateur sur lequel il est installé peut 
lui "
@@ -9020,6 +9030,15 @@
 "processeurs Intel vont avoir un tyran logiciel intégré</a>."
 
 #~ msgid ""
+#~ "We say a program has a &ldquo;back door&ldquo; when someone who is not "
+#~ "supposed to be in control of the computer where it is installed can send "
+#~ "it commands via some other channel."
+#~ msgstr ""
+#~ "Nous disons qu'un programme a une « porte dérobée » si un tiers 
n'ayant "
+#~ "pas, en principe, le contrôle de l'ordinateur sur lequel il est installé 
"
+#~ "peut lui envoyer des commandes par une autre voie."
+
+#~ msgid ""
 #~ "<em>Back door:</em>&nbsp; any piece of software that is running on your "
 #~ "computer, and listens for commands from someone else who can tell it to "
 #~ "do things without asking your approval."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- it.po       17 Jan 2019 15:29:36 -0000      1.13
+++ it.po       19 Jan 2019 09:30:12 -0000      1.14
@@ -7917,9 +7917,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- ja.po       17 Jan 2019 15:29:36 -0000      1.13
+++ ja.po       19 Jan 2019 09:30:12 -0000      1.14
@@ -6684,9 +6684,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- nl.po       17 Jan 2019 15:29:36 -0000      1.13
+++ nl.po       19 Jan 2019 09:30:12 -0000      1.14
@@ -5244,9 +5244,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- pl.po       17 Jan 2019 15:29:36 -0000      1.13
+++ pl.po       19 Jan 2019 09:30:12 -0000      1.14
@@ -4718,9 +4718,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- pot 17 Jan 2019 15:29:36 -0000      1.13
+++ pot 19 Jan 2019 09:30:12 -0000      1.14
@@ -4514,9 +4514,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-back-doors.de-diff.html 5 Jan 2019 11:31:34 -0000       1.19
+++ proprietary-back-doors.de-diff.html 19 Jan 2019 09:30:12 -0000      1.20
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.85</strong></del></span> <span 
class="inserted"><ins><em>1.86 --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.85</strong></del></span> <span 
class="inserted"><ins><em>1.87 --&gt;
 &lt;!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                   Please do not edit &lt;ul class="blurbs"&gt;!
@@ -34,9 +34,9 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;We say a program has a &ldquo;back 
door&ldquo; when someone who is
-not supposed to be in control of the computer where it is installed
-can send it commands via some other channel.&lt;/p&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;p&gt;A &ldquo;back door&rdquo; in a 
program is a channel designed
+to send the program commands from someone who is not supposed
+to be in control of the computer where the program is 
installed.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Here are examples of demonstrated back doors in proprietary software.
 They are sorted out according to what they are known to allow. Back doors
@@ -571,10 +571,10 @@
     &lt;a
       <span 
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"&gt;
       may take the form of bugs that have gone 20 years unfixed&lt;/a&gt;.
-      The choice to leave the security holes</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html#universal-back-door"&gt;Malware</em></ins></span>
-    in <span class="removed"><del><strong>place is morally
+      The choice to leave the security holes in place is morally
       equivalent to writing a back door.&lt;/p&gt;
-    &lt;p&gt;The back door is in the &ldquo;modem processor&rdquo;, whose
+    &lt;p&gt;The back door is</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html#universal-back-door"&gt;Malware</em></ins></span>
+    in <span class="removed"><del><strong>the &ldquo;modem processor&rdquo;, 
whose
       job is to communicate with the radio network.  In most phones,
       the modem processor controls the microphone.  In most phones it
       has the power to rewrite the software</strong></del></span> <span 
class="inserted"><ins><em>Mobile Devices&lt;/a&gt;</em></ins></span> for <span 
class="removed"><del><strong>the main processor
@@ -756,7 +756,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/01/19 09:30:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary-back-doors.de.po        5 Jan 2019 08:59:19 -0000       1.119
+++ proprietary-back-doors.de.po        19 Jan 2019 09:30:12 -0000      1.120
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -53,9 +53,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary-back-doors.fr.po        5 Jan 2019 16:13:43 -0000       1.117
+++ proprietary-back-doors.fr.po        19 Jan 2019 09:30:12 -0000      1.118
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
 "PO-Revision-Date: 2019-01-05 17:13+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-19 09:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -51,10 +52,20 @@
 "utilisateurs qu'ils devraient servir."
 
 #. type: Content of: <div><p>
-msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+# | [-We say-]{+A &ldquo;back door&rdquo; in+} a program [-has-] {+is+} a
+# | [-&ldquo;back door&ldquo; when-] {+channel designed to send the program
+# | commands from+} someone who is not supposed to be in control of the
+# | computer where [-it-] {+the program+} is [-installed can send it commands
+# | via some other channel.-] {+installed.+}
+#, fuzzy
+#| msgid ""
+#| "We say a program has a &ldquo;back door&ldquo; when someone who is not "
+#| "supposed to be in control of the computer where it is installed can send "
+#| "it commands via some other channel."
+msgid ""
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 "Nous disons qu'un programme a une « porte dérobée » si un tiers n'ayant 
pas, "
 "en principe, le contrôle de l'ordinateur sur lequel il est installé peut 
lui "

Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-back-doors.it-diff.html 5 Jan 2019 11:31:34 -0000       1.45
+++ proprietary-back-doors.it-diff.html 19 Jan 2019 09:30:12 -0000      1.46
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.86 --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.83</strong></del></span> <span 
class="inserted"><ins><em>1.87 --&gt;
 &lt;!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                   Please do not edit &lt;ul class="blurbs"&gt;!
@@ -34,9 +34,9 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;We say a program has a &ldquo;back 
door&ldquo; when someone who is
-not supposed to be in control of the computer where it is installed
-can send it commands via some other channel.&lt;/p&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;p&gt;A &ldquo;back door&rdquo; in a 
program is a channel designed
+to send the program commands from someone who is not supposed
+to be in control of the computer where the program is 
installed.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Here are examples of demonstrated back doors in proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
@@ -146,7 +146,7 @@
     isn't clear.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-    <span 
class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A</strong></del></span>
+    <span class="removed"><del><strong>&lt;li&gt;&lt;p&gt;A pregnancy 
test</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201607284"&gt;
     &lt;p&gt;The Dropbox app for Macintosh &lt;a
@@ -156,7 +156,7 @@
   &lt;/li&gt;
 
   &lt;li id="M201604250"&gt;
-    &lt;p&gt;A</em></ins></span> pregnancy test controller application not 
only can &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
+    &lt;p&gt;A pregnancy test</em></ins></span> controller application not 
only can &lt;a <span 
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;spy</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security"&gt;
     spy</em></ins></span> on many sorts of data in the phone, and in server 
accounts,
     it can alter them too&lt;/a&gt;.&lt;/p&gt;
@@ -292,135 +292,136 @@
 
     &lt;p&gt;This seems to involve use of</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
-    wiped</em></ins></span> a <span class="removed"><del><strong>back door in 
Windows 7</strong></del></span> <span class="inserted"><ins><em>user's 
Kindle-Swindle</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
+    wiped</em></ins></span> a <span class="inserted"><ins><em>user's 
Kindle-Swindle and deleted her account&lt;/a&gt;, then
+    offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+
+    &lt;p&gt;Do other ebook readers have</em></ins></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
+    don't know,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal back door, which has been used to
-&lt;a 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+&lt;p&gt;Most mobile phones</strong></del></span> <span 
class="inserted"><ins><em>we</em></ins></span> have <span 
class="inserted"><ins><em>no way to find out.  There is no reason to
+    assume that they don't.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201011220"&gt;
+    &lt;p&gt;The iPhone has</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door, which has been used to</strong></del></span> 
<span class="inserted"><ins><em>door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
 turn them malicious&lt;/a&gt;.
-&lt;/p&gt;
-&lt;/li&gt;
+&lt;/p&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
+    enabling it without understanding.&lt;/p&gt;</em></ins></span>
+  &lt;/li&gt;
 
-&lt;li&gt;
+<span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly all
-models of mobile phones</strong></del></span> <span 
class="inserted"><ins><em>deleted her account&lt;/a&gt;, then
-    offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+A Chinese version of Android</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
+
 
-    &lt;p&gt;Do other ebook readers</em></ins></span> have <span 
class="removed"><del><strong>a universal</strong></del></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> in <span 
class="removed"><del><strong>the modem chip. So
-why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
-    don't know, and we have no way</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this one is controlled
+&lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
+    back <span class="removed"><del><strong>door&lt;/a&gt;. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>door that can 
make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full</em></ins></span> of <span 
class="removed"><del><strong>mobile phones</strong></del></span> <span 
class="inserted"><ins><em>confusions, errors and biases that 
we</em></ins></span> have
+    <span class="inserted"><ins><em>an obligation to expose, given that we are 
making</em></ins></span> a <span class="removed"><del><strong>universal back 
door</strong></del></span> <span class="inserted"><ins><em>link to 
them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing</em></ins></span> in <span 
class="inserted"><ins><em>its products. What it does enable</em></ins></span> 
the <span class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
+    to <span class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span> 
is <span class="removed"><del><strong>controlled
 by Coolpad.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Microsoft Windows has a universal back door through which
+&lt;p&gt;Microsoft Windows has</strong></del></span> <span 
class="inserted"><ins><em>sue other companies if they do some particular thing 
in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users 
through</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back
+    door <span class="removed"><del><strong>through which
 &lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever can be imposed on the users&lt;/a&gt;.
+any change whatsoever can be imposed on</strong></del></span> <span 
class="inserted"><ins><em>are beside</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.
 &lt;/p&gt;
 &lt;p&gt;More information on when
 &lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
 this was used&lt;/a&gt;.
 &lt;/p&gt;
-&lt;p&gt;In Windows 10, the universal back door</strong></del></span> <span 
class="inserted"><ins><em>find out.  There</em></ins></span> is no <span 
class="removed"><del><strong>longer hidden; all
+&lt;p&gt;In Windows 10,</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span 
class="removed"><del><strong>universal</strong></del></span> back door is <span 
class="removed"><del><strong>no longer hidden; all
 &ldquo;upgrades&rdquo; will
-be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
-and immediately imposed&lt;/a&gt;.
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>wrong in the
+    first place,</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;&lt;p&gt;German government &lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span 
class="inserted"><ins><em>reason</em></ins></span> to <span 
class="removed"><del><strong>potential back
-door capabilities of the TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
+away from Windows 8 computers with TPM 2.0 due to potential back
+door capabilities of</strong></del></span> <span 
class="inserted"><ins><em>using</em></ins></span> the <span 
class="removed"><del><strong>TPM 2.0 chip&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;The iPhone has a back door
-&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
-    <span class="inserted"><ins><em>assume</em></ins></span> that <span 
class="removed"><del><strong>allows Apple to remotely delete apps&lt;/a&gt; 
which Apple considers
-&ldquo;inappropriate&rdquo;.  Jobs said it's ok for Apple to have this power
-because of course we can trust Apple.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>they 
don't.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201011220"&gt;</em></ins></span>
-    &lt;p&gt;The iPhone has a back door for &lt;a
-    
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-    remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
-    enabling it without <span class="removed"><del><strong>understanding.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>understanding.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Apple can, and regularly does,</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
-
-
-&lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
-
-&lt;ul class="blurbs"&gt;
-  &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
-    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article is full of confusions, errors and biases that we have
-    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
-
-    &lt;ul&gt;
-    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
-    any particular thing in its products. What it does enable the company
-    to do is sue other companies if they do</em></ins></span> some <span 
class="removed"><del><strong>data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>particular thing in
-    their products.&lt;/li&gt;
-
-    &lt;li&gt;A company's policies about when to attack users through a back
-    door are beside</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting the back door is wrong in the
-    first place, and using the back door is always wrong too. No software
-    developer should</em></ins></span> have <span 
class="removed"><del><strong>improved</strong></del></span> <span 
class="inserted"><ins><em>that power over users.&lt;/li&gt;
+&lt;p&gt;The iPhone has a</strong></del></span> back door
+<span class="removed"><del><strong>&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
 <span class="inserted"><ins><em>is always wrong too. No software
+    developer should have</em></ins></span> that <span 
class="removed"><del><strong>allows Apple</strong></del></span> <span 
class="inserted"><ins><em>power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word to refer to sharing copies is a smear;
+    attacking ships. Using that word</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok for 
Apple</strong></del></span> <span 
class="inserted"><ins><em>refer</em></ins></span> to <span 
class="removed"><del><strong>have this power
+because</strong></del></span> <span class="inserted"><ins><em>sharing copies 
is a smear;
     please don't smear sharing.&lt;/li&gt;
 
-    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
-    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
-    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    &lt;li&gt;&lt;p&gt;The idea</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;The iPhone has</strong></del></span> <span 
class="inserted"><ins><em>&ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is</em></ins></span> a 
<span class="removed"><del><strong>back door for</strong></del></span> &lt;a 
<span 
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.</strong></del></span>
+    <span class="inserted"><ins><em>href="/philosophy/not-ipr.html"&gt;bogus 
generalization about things
     that have nothing in common&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
-    generalization is a separate absurdity. It's like calling the cops
-    because neighbors' kids are playing on your front yard, and saying
+    generalization is a separate absurdity.</em></ins></span> It's <span 
class="removed"><del><strong>not always enabled, but 
users</strong></del></span> <span class="inserted"><ins><em>like calling the 
cops
+    because neighbors' kids</em></ins></span> are <span 
class="removed"><del><strong>led into enabling</strong></del></span> <span 
class="inserted"><ins><em>playing on your front yard, and saying
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
-    to the boundary line, not even</em></ins></span> with <span 
class="inserted"><ins><em>a jackhammer, because it is an
-    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    to the boundary line, not even with a jackhammer, 
because</em></ins></span> it <span class="removed"><del><strong>without 
understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can,</strong></del></span> <span class="inserted"><ins><em>is 
an
+    abstraction</em></ins></span> and <span 
class="removed"><del><strong>regularly does,</strong></del></span> <span 
class="inserted"><ins><em>can't be affected by physical 
action.&lt;/p&gt;&lt;/li&gt;
     &lt;/ul&gt;
   &lt;/li&gt;
 
   &lt;li id="M201804010"&gt;
-    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
+    &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones</strong></del></span>
     <span 
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
     load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
+    &lt;p&gt;We link to the article</em></ins></span> for the <span 
class="removed"><del><strong>state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with</strong></del></span> <span 
class="inserted"><ins><em>facts it presents. It
     is too bad that the article finishes by advocating the
-    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
+    moral weakness of surrendering to Netflix. The Netflix 
app</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span>
     <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
     malware too&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door that 
&lt;a
-    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus, has a back door 
that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
     can &ldquo;upload files&rdquo;</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>well</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
@@ -463,51 +464,37 @@
     program called <span class="removed"><del><strong>GTalkService).
 &lt;/p&gt;
 
-&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>GTalkService, 
which seems since then to have been
-    merged into</em></ins></span> Google <span 
class="inserted"><ins><em>Play.)&lt;/p&gt;
+&lt;p&gt;
+Google can also
+&lt;a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+forcibly and remotely install apps&lt;/a&gt; through GTalkService (which
+seems,</strong></del></span> <span class="inserted"><ins><em>GTalkService, 
which seems</em></ins></span> since <span class="removed"><del><strong>that 
article,</strong></del></span> <span 
class="inserted"><ins><em>then</em></ins></span> to have been
+    merged into Google <span 
class="removed"><del><strong>Play).</strong></del></span> <span 
class="inserted"><ins><em>Play.)&lt;/p&gt;
 
-    &lt;p&gt;Google</em></ins></span> can also &lt;a
+    &lt;p&gt;Google can also &lt;a
     
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which
-seems, since that article, to have been merged into Google 
Play).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService.</em></ins></span>  This is
-    not equivalent to a universal back door, but permits various dirty <span 
class="removed"><del><strong>tricks.
+    forcibly and remotely install apps&lt;/a&gt; through 
GTalkService.</em></ins></span>  This is
+    not equivalent to a universal back <span 
class="removed"><del><strong>door, but permits various
+dirty tricks.
 &lt;/p&gt;
 
 &lt;p&gt;
-Although</strong></del></span>
-    <span class="inserted"><ins><em>tricks.&lt;/p&gt;
+Although Google's &lt;em&gt;exercise&lt;/em&gt;</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various dirty
+    tricks.&lt;/p&gt;
 
-    &lt;p&gt;Although</em></ins></span> Google's &lt;em&gt;exercise&lt;/em&gt; 
of this power has not been
+    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
     malicious so far, the point is that nobody should have such power,
     which could also be used maliciously.  You might well decide to
     let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
     it considers malicious.  But there is no excuse for allowing it to
     &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
-    who (if anyone) to trust in this <span class="removed"><del><strong>way.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;
-&lt;p&gt;&lt;a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
-Samsung Galaxy devices running proprietary Android versions come with a back
-door&lt;/a&gt; that provides remote access to the files stored on the device.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
+    who (if anyone) to trust in this way.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Amazon 
Kindle-Swindle</strong></del></span> <span 
class="inserted"><ins><em>iPhone</em></ins></span> has a back door <span 
class="inserted"><ins><em>&lt;a
-    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</em></ins></span>
-    that <span class="removed"><del><strong>has been 
used</strong></del></span> <span class="inserted"><ins><em>allows 
Apple</em></ins></span> to
-<span class="removed"><del><strong>&lt;a 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;</strong></del></span>
 remotely <span class="removed"><del><strong>erase books&lt;/a&gt;.  One of the 
books erased was 1984, by George Orwell.
-&lt;/p&gt;
-
-&lt;p&gt;Amazon responded to criticism by saying it 
would</strong></del></span> delete <span class="removed"><del><strong>books only
-following orders from the state.  However, that policy didn't last.
-In 2012
-it</strong></del></span> <span class="inserted"><ins><em>apps&lt;/a&gt; which 
Apple considers
+  &lt;li id="M200808110"&gt;
+    &lt;p&gt;The iPhone has a back door &lt;a
+    
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
+    that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
     &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
     this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
@@ -518,50 +505,41 @@
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201812300"&gt;
-    &lt;p&gt;New GM cars</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of</em></ins></span> a <span 
class="removed"><del><strong>user's Kindle-Swindle and deleted her 
account&lt;/a&gt;, then offered her
-kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>universal back door&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;New GM cars &lt;a
+    href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
+    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;Every nonfree program offers the user zero security against its
     developer. With this malfeature, GM has explicitly made things even
     worse.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201711244"&gt;</em></ins></span>
-    &lt;p&gt;The <span class="removed"><del><strong>Kindle-Swindle 
also</strong></del></span> <span class="inserted"><ins><em>Furby 
Connect</em></ins></span> has a &lt;a <span 
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;</em></ins></span>
-    universal back door&lt;/a&gt;.
-<span class="removed"><del><strong>&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>If the product as shipped doesn't act as a
+  &lt;li id="M201711244"&gt;
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;</em></ins></span>
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;HP &ldquo;storage appliances&rdquo;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711010"&gt;
+  &lt;li id="M201711010"&gt;
     &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with a universal back door, and tethered to a server</em></ins></span> 
that <span class="removed"><del><strong>use</strong></del></span> <span 
class="inserted"><ins><em>requires
+    with a universal back door, and tethered to a server that requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709091"&gt;
-    &lt;p&gt;Tesla used software to limit</em></ins></span> the <span 
class="removed"><del><strong>proprietary
-&ldquo;Left Hand&rdquo; operating system have back doors</strong></del></span> 
<span class="inserted"><ins><em>part of the battery</em></ins></span>
-    that <span class="removed"><del><strong>give
-HP</strong></del></span> <span class="inserted"><ins><em>was available to 
customers in some cars, and</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
-remote login access&lt;/a&gt;</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
-    a universal back door in the software&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>them.  HP claims that</strong></del></span> <span 
class="inserted"><ins><em>temporarily increase</em></ins></span>
-    this <span class="removed"><del><strong>does not give HP
-access</strong></del></span> <span class="inserted"><ins><em>limit.&lt;/p&gt;
+    &lt;p&gt;Tesla used software to limit the part of the battery
+    that was available to customers in some cars, and &lt;a
+    
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
+    a universal back door in the software&lt;/a&gt; to temporarily increase
+    this limit.&lt;/p&gt;
 
-    &lt;p&gt;While remotely allowing car 
&ldquo;owners&rdquo;</em></ins></span> to <span 
class="inserted"><ins><em>use</em></ins></span> the <span 
class="removed"><del><strong>customer's data, but if</strong></del></span>
-    <span class="inserted"><ins><em>whole battery capacity did not do them any 
harm, the same back
+    &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
+    whole battery capacity did not do them any harm, the same back
     door would permit Tesla (perhaps under the command of some
-    government) to remotely order</em></ins></span> the <span 
class="inserted"><ins><em>car to use none of its battery. Or
+    government) to remotely order the car to use none of its battery. Or
     perhaps to drive its passenger to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -615,37 +593,72 @@
     &lt;p&gt;&lt;a
     
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
     A Chinese version of Android has a universal back door&lt;/a&gt;. Nearly
-    all models of mobile phones have a &lt;a href="#universal-back-door"&gt;
-    universal back door in the modem chip&lt;/a&gt;. So why did Coolpad bother
-    to introduce another? Because this one is controlled by Coolpad.&lt;/p&gt;
+    all models</em></ins></span> of <span class="removed"><del><strong>this 
power has not been
+malicious so far, the point is that nobody should</strong></del></span> <span 
class="inserted"><ins><em>mobile phones</em></ins></span> have <span 
class="removed"><del><strong>such power,
+which could also be used maliciously.  You might well decide to 
let</strong></del></span> a
+<span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
+considers malicious.  But there is no excuse for allowing it
+to &lt;em&gt;delete&lt;/em&gt; the programs, and you should 
have</strong></del></span> <span class="inserted"><ins><em>&lt;a 
href="#universal-back-door"&gt;
+    universal back door in</em></ins></span> the <span 
class="removed"><del><strong>right to
+decide who (if anyone)</strong></del></span> <span 
class="inserted"><ins><em>modem chip&lt;/a&gt;. So why did Coolpad 
bother</em></ins></span>
+    to <span class="removed"><del><strong>trust in</strong></del></span> <span 
class="inserted"><ins><em>introduce another? Because</em></ins></span> this 
<span class="removed"><del><strong>way.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>one is 
controlled by Coolpad.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201311300"&gt;
-    &lt;p&gt;&lt;a
-    
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
-    Some applications come with MyFreeProxy, which is a universal back
-    door&lt;/a&gt; that can download programs and run them.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201311300"&gt;</em></ins></span>
+    &lt;p&gt;&lt;a <span class="removed"><del><strong>id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor"&gt;
+Samsung Galaxy devices running proprietary Android 
versions</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/"&gt;
+    Some applications</em></ins></span> come with <span 
class="inserted"><ins><em>MyFreeProxy, which is</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back
+    door&lt;/a&gt; that <span class="removed"><del><strong>provides remote 
access to the files stored on the device.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>can download 
programs and run them.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201202280"&gt;
-    &lt;p&gt;ChromeOS has a universal back
-    door. At least, Google says it does&mdash;in &lt;a
-    href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
-    section 4 of the EULA&lt;/a&gt;.&lt;/p&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The Amazon Kindle-Swindle</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201202280"&gt;
+    &lt;p&gt;ChromeOS</em></ins></span> has a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door that has been used to</strong></del></span>
+    <span class="inserted"><ins><em>door. At least, Google says it 
does&mdash;in</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/"&gt;
+remotely erase books&lt;/a&gt;.  One</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html"&gt;
+    section 4</em></ins></span> of the <span 
class="removed"><del><strong>books erased was 1984, by George Orwell.
+&lt;/p&gt;
+
+&lt;p&gt;Amazon responded</strong></del></span> <span 
class="inserted"><ins><em>EULA&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M200700001"&gt;
-    &lt;p&gt;In addition to its &lt;a href="#swindle-eraser"&gt;book
-    eraser&lt;/a&gt;, the Kindle-Swindle has a &lt;a
+    &lt;p&gt;In addition</em></ins></span> to <span 
class="removed"><del><strong>criticism by saying it would delete books only
+following orders from the state.  However, that policy didn't last.
+In 2012
+it</strong></del></span> <span class="inserted"><ins><em>its</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;wiped
+a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then offered her
+kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
+
+
+&lt;p&gt;The</strong></del></span> <span 
class="inserted"><ins><em>href="#swindle-eraser"&gt;book
+    eraser&lt;/a&gt;, the</em></ins></span> Kindle-Swindle <span 
class="removed"><del><strong>also</strong></del></span> has a &lt;a
     
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"&gt;
-    universal back door&lt;/a&gt;.&lt;/p&gt;
+    universal back <span class="removed"><del><strong>door&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M200612050"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;HP &ldquo;storage appliances&rdquo; that use the proprietary
+&ldquo;Left Hand&rdquo; operating system have</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M200612050"&gt;
     &lt;p&gt;Almost every phone's communication
-    processor has a universal back door which is &lt;a
-    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
-    often used to make a phone transmit all conversations it hears&lt;/a&gt;. 
See
+    processor has a universal</em></ins></span> back <span 
class="removed"><del><strong>doors that give
+HP</strong></del></span> <span class="inserted"><ins><em>door which 
is</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"&gt;
+remote login access&lt;/a&gt; to them.  HP claims that this does not give HP
+access</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html"&gt;
+    often used</em></ins></span> to <span class="removed"><del><strong>the 
customer's data, but if the</strong></del></span> <span 
class="inserted"><ins><em>make a phone transmit all conversations it 
hears&lt;/a&gt;. See
     &lt;a 
href="/proprietary/malware-mobiles.html#universal-back-door"&gt;Malware
     in Mobile Devices&lt;/a&gt; for more info.&lt;/p&gt;
   &lt;/li&gt;
@@ -818,7 +831,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/01/19 09:30:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary-back-doors.it.po        5 Jan 2019 08:59:19 -0000       1.111
+++ proprietary-back-doors.it.po        19 Jan 2019 09:30:12 -0000      1.112
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -52,9 +52,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-back-doors.ja-diff.html 5 Jan 2019 11:31:34 -0000       1.42
+++ proprietary-back-doors.ja-diff.html 19 Jan 2019 09:30:12 -0000      1.43
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.86 --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.79</strong></del></span> <span 
class="inserted"><ins><em>1.87 --&gt;
 &lt;!-- 
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                   Please do not edit &lt;ul class="blurbs"&gt;!
@@ -34,9 +34,9 @@
 basic injustice&lt;/a&gt;. The developers often exercise that power to the
 detriment of the users they ought to serve.&lt;/p&gt;
 
-<span class="inserted"><ins><em>&lt;p&gt;We say a program has a &ldquo;back 
door&ldquo; when someone who is
-not supposed to be in control of the computer where it is installed
-can send it commands via some other channel.&lt;/p&gt;</em></ins></span>
+<span class="inserted"><ins><em>&lt;p&gt;A &ldquo;back door&rdquo; in a 
program is a channel designed
+to send the program commands from someone who is not supposed
+to be in control of the computer where the program is 
installed.&lt;/p&gt;</em></ins></span>
 
 &lt;p&gt;Here are examples of demonstrated back doors in proprietary <span 
class="removed"><del><strong>software.&lt;/p&gt;
 
@@ -128,7 +128,7 @@
       collect a wide range of</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
     remotely extract some</em></ins></span> data <span 
class="removed"><del><strong>about their users and their users' 
-      friends and</strong></del></span> <span class="inserted"><ins><em>from 
iPhones for the state&lt;/a&gt;.&lt;/p&gt;
+      friends and associates&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>from iPhones for the state&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;This may have improved with &lt;a
     
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
@@ -196,7 +196,7 @@
     &lt;p&gt;Modern gratis game cr&hellip;apps &lt;a
     
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/"&gt;
     collect a wide range of data about their users and their users'
-    friends and</em></ins></span> associates&lt;/a&gt;.&lt;/p&gt;
+    friends and associates&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
 
     &lt;p&gt;Even nastier, they do it through ad networks that merge the data
     collected by various cr&hellip;apps and sites made by different
@@ -812,7 +812,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/01/19 09:30:12 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary-back-doors.ja.po        5 Jan 2019 08:59:19 -0000       1.91
+++ proprietary-back-doors.ja.po        19 Jan 2019 09:30:12 -0000      1.92
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -51,9 +51,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-back-doors.pot  5 Jan 2019 08:59:19 -0000       1.61
+++ proprietary-back-doors.pot  19 Jan 2019 09:30:12 -0000      1.62
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -42,9 +42,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary-back-doors.ru.po        17 Jan 2019 06:02:19 -0000      1.163
+++ proprietary-back-doors.ru.po        19 Jan 2019 09:30:12 -0000      1.164
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-05 08:56+0000\n"
+"POT-Creation-Date: 2019-01-19 09:26+0000\n"
 "PO-Revision-Date: 2018-11-13 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-19 09:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -50,10 +51,20 @@
 "они должны обслуживать."
 
 #. type: Content of: <div><p>
-msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+# | [-We say-]{+A &ldquo;back door&rdquo; in+} a program [-has-] {+is+} a
+# | [-&ldquo;back door&ldquo; when-] {+channel designed to send the program
+# | commands from+} someone who is not supposed to be in control of the
+# | computer where [-it-] {+the program+} is [-installed can send it commands
+# | via some other channel.-] {+installed.+}
+#, fuzzy
+#| msgid ""
+#| "We say a program has a &ldquo;back door&ldquo; when someone who is not "
+#| "supposed to be in control of the computer where it is installed can send "
+#| "it commands via some other channel."
+msgid ""
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 "Мы говорим, что в программе есть 
&ldquo;черный ход&rdquo;, если кто-то, кто "
 "не должен контролировать компьютер, на 
котором она установлена, может "

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- pt-br.po    17 Jan 2019 15:29:37 -0000      1.19
+++ pt-br.po    19 Jan 2019 09:30:12 -0000      1.20
@@ -4802,11 +4802,19 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+#, fuzzy
+#| msgid ""
+#| "<em>Back door:</em>&nbsp; any feature of a program that enables someone "
+#| "who is not supposed to be in control of the computer where it is "
+#| "installed to send it commands."
+msgid ""
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
+"<em>Back door:</em>&nbsp; qualquer funcionalidade de um programa que "
+"possibilita que alguém que não deveria estar no controle do computador, no "
+"qual o programa está instalado, enviar comandos para ele."
 
 #. type: Content of: <div><p>
 msgid ""

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- ru.po       17 Jan 2019 17:29:15 -0000      1.28
+++ ru.po       19 Jan 2019 09:30:12 -0000      1.29
@@ -6730,11 +6730,21 @@
 msgid "Proprietary Back Doors"
 msgstr "Лазейки в несвободных программах"
 
-#. type: Content of: <div><p>
-msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+# | [-We say-]{+A &ldquo;back door&rdquo; in+} a program [-has-] {+is+} a
+# | [-&ldquo;back door&ldquo; when-] {+channel designed to send the program
+# | commands from+} someone who is not supposed to be in control of the
+# | computer where [-it-] {+the program+} is [-installed can send it commands
+# | via some other channel.-] {+installed.+}
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "We say a program has a &ldquo;back door&ldquo; when someone who is not "
+#| "supposed to be in control of the computer where it is installed can send "
+#| "it commands via some other channel."
+msgid ""
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 "Мы говорим, что в программе есть 
&ldquo;черный ход&rdquo;, если кто-то, кто "
 "не должен контролировать компьютер, на 
котором она установлена, может "
@@ -9002,6 +9012,15 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";> В "
 "процессорах Intel будут встроенные 
несвободные программы-тираны</a>."
 
+#~ msgid ""
+#~ "We say a program has a &ldquo;back door&ldquo; when someone who is not "
+#~ "supposed to be in control of the computer where it is installed can send "
+#~ "it commands via some other channel."
+#~ msgstr ""
+#~ "Мы говорим, что в программе есть 
&ldquo;черный ход&rdquo;, если кто-то, "
+#~ "кто не должен контролировать компьютер, 
на котором она установлена, может "
+#~ "посылать этому компьютеру команды."
+
 #~ msgid "#TOC { width: 40em; }\n"
 #~ msgstr "#TOC { width: 40em; }\n"
 

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- zh-tw.po    17 Jan 2019 15:29:37 -0000      1.13
+++ zh-tw.po    19 Jan 2019 09:30:12 -0000      1.14
@@ -4661,9 +4661,9 @@
 
 #. type: Content of: <div><p>
 msgid ""
-"We say a program has a &ldquo;back door&ldquo; when someone who is not "
-"supposed to be in control of the computer where it is installed can send it "
-"commands via some other channel."
+"A &ldquo;back door&rdquo; in a program is a channel designed to send the "
+"program commands from someone who is not supposed to be in control of the "
+"computer where the program is installed."
 msgstr ""
 
 #. type: Content of: <div><p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]