[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Wed, 13 Feb 2019 07:00:27 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/02/13 07:00:26
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.258&r2=1.259
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.373&r2=1.374
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.244&r2=1.245
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.466&r2=1.467
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.27&r2=1.28
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- de.po 11 Feb 2019 12:59:22 -0000 1.27
+++ de.po 13 Feb 2019 12:00:23 -0000 1.28
@@ -7159,6 +7159,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -10177,27 +10184,6 @@
msgid "Latest additions"
msgstr "Letzte Ergänzungen"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -10228,6 +10214,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
"<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-"
"smart-home-camera-free-service-update-change\"> turning off many features "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- es.po 11 Feb 2019 12:59:22 -0000 1.34
+++ es.po 13 Feb 2019 12:00:23 -0000 1.35
@@ -5094,6 +5094,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -7425,37 +7432,6 @@
msgid "Latest additions"
msgstr "Añadidos recientes"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"El software para para tratamiento de gráficos de Foundry <a href=\"https://"
-"torrentfreak.com/software-company-fines-pirates-after-monitoring-their-"
-"computers-181102/\">envÃa información para identificar a quien lo está "
-"utilizando</a>. La consecuencia es a menudo una amenaza lega exigiendo una "
-"elevada suma de dinero."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"El hecho de que lo utilicen para reprimir la compartición no autorizada lo "
-"hace incuso más vil."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"Esto muestra que hacer copias no autorizadas de software que no es libre no "
-"es un remedio contra la injusticia de ese tipo de software. Puede evitar que "
-"se pague por algo malo, pero no lo hace menos malo."
-
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -7490,6 +7466,37 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+"El software para para tratamiento de gráficos de Foundry <a href=\"https://"
+"torrentfreak.com/software-company-fines-pirates-after-monitoring-their-"
+"computers-181102/\">envÃa información para identificar a quien lo está "
+"utilizando</a>. La consecuencia es a menudo una amenaza lega exigiendo una "
+"elevada suma de dinero."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+"El hecho de que lo utilicen para reprimir la compartición no autorizada lo "
+"hace incuso más vil."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+"Esto muestra que hacer copias no autorizadas de software que no es libre no "
+"es un remedio contra la injusticia de ese tipo de software. Puede evitar que "
+"se pague por algo malo, pero no lo hace menos malo."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
"<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-"
"smart-home-camera-free-service-update-change\"> turning off many features "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- fr.po 12 Feb 2019 10:46:00 -0000 1.50
+++ fr.po 13 Feb 2019 12:00:23 -0000 1.51
@@ -5629,6 +5629,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -8158,6 +8165,28 @@
msgid "Latest additions"
msgstr "Ajouts récents"
+#. type: Content of: <div><p>
+msgid ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+msgstr "Copyright © 2013-2019 Free Software Foundation, Inc."
+
+#. type: Content of: <title>
+msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
+msgstr "Sabotage privateur - Projet GNU - Free Software Foundation"
+
+#. type: Content of: <h2>
+msgid "Proprietary Sabotage"
+msgstr "Sabotage privateur"
+
+#. type: Content of: <div><p>
+msgid ""
+"Here are examples of proprietary software that has something worse than a "
+"back door."
+msgstr ""
+"Voici des exemples de logiciels privateurs qui ont des caractéristiques "
+"encore pires qu'une porte dérobée."
+
#. type: Content of: <ul><li><p>
msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
@@ -8189,28 +8218,6 @@
"remède contre l'injustice qu'ils représentent. Elle permet ne pas payer
pour "
"ces choses malfaisantes, mais ne peut pas les rendre moins malfaisantes."
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-msgstr "Copyright © 2013-2019 Free Software Foundation, Inc."
-
-#. type: Content of: <title>
-msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
-msgstr "Sabotage privateur - Projet GNU - Free Software Foundation"
-
-#. type: Content of: <h2>
-msgid "Proprietary Sabotage"
-msgstr "Sabotage privateur"
-
-#. type: Content of: <div><p>
-msgid ""
-"Here are examples of proprietary software that has something worse than a "
-"back door."
-msgstr ""
-"Voici des exemples de logiciels privateurs qui ont des caractéristiques "
-"encore pires qu'une porte dérobée."
-
#. type: Content of: <ul><li><p>
msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- it.po 11 Feb 2019 12:59:22 -0000 1.27
+++ it.po 13 Feb 2019 12:00:24 -0000 1.28
@@ -6732,6 +6732,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -9472,27 +9479,6 @@
msgid "Latest additions"
msgstr "Ultime aggiunte"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -9525,6 +9511,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
"<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-"
"smart-home-camera-free-service-update-change\"> turning off many features "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- ja.po 11 Feb 2019 12:59:22 -0000 1.27
+++ ja.po 13 Feb 2019 12:00:24 -0000 1.28
@@ -5708,6 +5708,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -8022,27 +8029,6 @@
msgid "Latest additions"
msgstr "ææ°ã®è¿½å "
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
@@ -8074,6 +8060,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
"<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-"
"smart-home-camera-free-service-update-change\"> turning off many features "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- malware-mobiles.de-diff.html 11 Feb 2019 12:59:22 -0000 1.40
+++ malware-mobiles.de-diff.html 13 Feb 2019 12:00:24 -0000 1.41
@@ -457,6 +457,12 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
<li id="M201902010">
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
@@ -1226,7 +1232,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/11 12:59:22 $
+$Date: 2019/02/13 12:00:24 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- malware-mobiles.de.po 11 Feb 2019 12:59:22 -0000 1.97
+++ malware-mobiles.de.po 13 Feb 2019 12:00:24 -0000 1.98
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -760,6 +760,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- malware-mobiles.es.po 12 Feb 2019 10:59:31 -0000 1.101
+++ malware-mobiles.es.po 13 Feb 2019 12:00:24 -0000 1.102
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -634,6 +635,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- malware-mobiles.fr.po 12 Feb 2019 10:46:00 -0000 1.121
+++ malware-mobiles.fr.po 13 Feb 2019 12:00:24 -0000 1.122
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2019-02-11 19:48+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -635,6 +636,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-mobiles.it-diff.html 11 Feb 2019 12:59:22 -0000 1.45
+++ malware-mobiles.it-diff.html 13 Feb 2019 12:00:24 -0000 1.46
@@ -463,6 +463,12 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
<li id="M201902010">
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
@@ -1261,7 +1267,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/11 12:59:22 $
+$Date: 2019/02/13 12:00:24 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- malware-mobiles.it.po 11 Feb 2019 12:59:22 -0000 1.97
+++ malware-mobiles.it.po 13 Feb 2019 12:00:24 -0000 1.98
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -729,6 +729,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-mobiles.ja-diff.html 11 Feb 2019 12:59:22 -0000 1.59
+++ malware-mobiles.ja-diff.html 13 Feb 2019 12:00:24 -0000 1.60
@@ -457,6 +457,12 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
<li id="M201902010">
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
@@ -1101,7 +1107,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/11 12:59:22 $
+$Date: 2019/02/13 12:00:24 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-mobiles.ja.po 11 Feb 2019 12:59:22 -0000 1.85
+++ malware-mobiles.ja.po 13 Feb 2019 12:00:24 -0000 1.86
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -599,6 +599,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-mobiles.pot 11 Feb 2019 12:59:22 -0000 1.63
+++ malware-mobiles.pot 13 Feb 2019 12:00:24 -0000 1.64
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -432,6 +432,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a "
+"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\">
"
+"recording all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a "
"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\"> 25% fail "
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- malware-mobiles.ru.po 11 Feb 2019 13:29:21 -0000 1.153
+++ malware-mobiles.ru.po 13 Feb 2019 12:00:24 -0000 1.154
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -625,6 +626,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- nl.po 11 Feb 2019 12:59:22 -0000 1.27
+++ nl.po 13 Feb 2019 12:00:24 -0000 1.28
@@ -4490,6 +4490,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -6491,27 +6498,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -6543,6 +6529,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
"<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-"
"smart-home-camera-free-service-update-change\"> turning off many features "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- pl.po 11 Feb 2019 12:59:22 -0000 1.27
+++ pl.po 13 Feb 2019 12:00:24 -0000 1.28
@@ -3936,6 +3936,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -6004,27 +6011,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -6054,6 +6040,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
"<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-"
"smart-home-camera-free-service-update-change\"> turning off many features "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- pot 11 Feb 2019 12:59:22 -0000 1.27
+++ pot 13 Feb 2019 12:00:24 -0000 1.28
@@ -3759,6 +3759,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -5501,6 +5508,26 @@
msgid "Latest additions"
msgstr ""
+#. type: Content of: <div><p>
+msgid ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+msgstr ""
+
+#. type: Content of: <title>
+msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
+msgstr ""
+
+#. type: Content of: <h2>
+msgid "Proprietary Sabotage"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Here are examples of proprietary software that has something worse than a "
+"back door."
+msgstr ""
+
#. type: Content of: <ul><li><p>
msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
@@ -5522,26 +5549,6 @@
"nasty thing, but cannot make it less nasty."
msgstr ""
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-msgstr ""
-
-#. type: Content of: <title>
-msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
-msgstr ""
-
-#. type: Content of: <h2>
-msgid "Proprietary Sabotage"
-msgstr ""
-
-#. type: Content of: <div><p>
-msgid ""
-"Here are examples of proprietary software that has something worse than a "
-"back door."
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-surveillance.de-diff.html 8 Feb 2019 09:30:04 -0000
1.42
+++ proprietary-surveillance.de-diff.html 13 Feb 2019 12:00:24 -0000
1.43
@@ -1015,16 +1015,42 @@
often a legal threat demanding a lot of money.</p>
<p>The fact that</em></ins></span> this
- <span class="removed"><del><strong>would require
circumventing</strong></del></span> <span class="inserted"><ins><em>is used for
repression of forbidden sharing
- makes it even more vicious.</p>
+ <span class="removed"><del><strong>would require circumventing the iOS
DRM.</p>
+ </li>
+
+ <li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth the
+ obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A</strong></del></span> <span class="inserted"><ins><em>is used for
repression of forbidden sharing
+ makes it even</em></ins></span> more <span
class="removed"><del><strong>advanced way really does turn them off—only
until 5am.
+ That's Apple</strong></del></span> <span
class="inserted"><ins><em>vicious.</p>
<p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ is not a cure</em></ins></span> for <span
class="removed"><del><strong>you—“We know you want to be spied
on”.</p>
</li>
- <span
class="removed"><del><strong><li><p>In</strong></del></span>
-<span class="inserted"><ins><em></ul>
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether</strong></del></span> the
<span class="removed"><del><strong>phone is snooping on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
server records these numbers</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying</em></ins></span> for <span class="removed"><del><strong>at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users</strong></del></span> <span
class="inserted"><ins><em>the nasty thing, but</em></ins></span> cannot make
<span class="removed"><del><strong>an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ without giving</strong></del></span> <span class="inserted"><ins><em>it
less nasty.</p>
+ </li>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -1032,102 +1058,82 @@
</div>
<ul class="blurbs">
- <li id="M201902010">
- <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi and Bluetooth the
- obvious way</strong></del></span> <span class="inserted"><ins><em>150
most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want</strong></del></span>
+ <li id="M201902060">
+ <p>Many nonfree apps have</em></ins></span> a <span
class="removed"><del><strong>valid email address and
receiving</strong></del></span> <span class="inserted"><ins><em>surveillance
feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all</em></ins></span> the <span
class="removed"><del><strong>code Apple
+ sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>users' actions</a> in interacting with the
app.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Around
47%</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation</em></ins></span> of the <span
class="inserted"><ins><em>150</em></ins></span> most popular <span
class="removed"><del><strong>iOS</strong></del></span>
+ <span class="inserted"><ins><em>gratis VPN</em></ins></span> apps <span
class="inserted"><ins><em>in Google Play found that</em></ins></span> <a
<span class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a> of</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to <span class="removed"><del><strong>be spied
on”.</p>
+ 25% fail to protect</em></ins></span> their <span
class="removed"><del><strong>users with third parties.</p>
</li>
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a>
due</em></ins></span> to <span class="removed"><del><strong>use it without
having your fingerprints
- taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>DNS leaks. In
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>usersâ privacy</a> due</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up</strong></del></span> <span
class="inserted"><ins><em>DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
- potentially also be used</em></ins></span> to <span
class="removed"><del><strong>tell whether the phone is
snooping</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on
- <span class="removed"><del><strong>them.</p></li>
+ potentially also be used</em></ins></span> to <span
class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
- found as well.</p>
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a></strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
+ found</em></ins></span> as <span class="removed"><del><strong>accessed on
24 Sep 2015.) The iCloud feature is</strong></del></span> <span
class="inserted"><ins><em>well.</p>
- <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>personal data to Apple's
servers</a>. Big Brother can
- get them from there.</p></strong></del></span>
+ <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by the
+ startup</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span>
<span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
- <p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>a way
to <a href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>,</strong></del></span> <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
+ apps.” These apps are gratis,</em></ins></span> but <span
class="removed"><del><strong>it's active by default so</strong></del></span>
<span class="inserted"><ins><em>they are <em>not</em> <a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The
iMessage</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel</em></ins></span> app <span
class="removed"><del><strong>on iThings</strong></del></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
stored users' locations to the company's server</a>. The company is
- being sued, demanding</em></ins></span> that <span
class="inserted"><ins><em>it notify</em></ins></span> the <span
class="removed"><del><strong>user types into
it</a>;</strong></del></span> <span class="inserted"><ins><em>users of
what it will do
- with</em></ins></span> the <span class="removed"><del><strong>server
records these numbers for at least 30
- days.</p>
- </li>
+ being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>still counts as</strong></del></span> <span
class="inserted"><ins><em>notify the users of what it will do
+ with the data.</p>
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+ <p>I think that lawsuit is about</em></ins></span> a
+ <span class="removed"><del><strong>surveillance functionality.</p>
- <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>valid email address and
receiving</strong></del></span> <span class="inserted"><ins><em>side issue.
What</em></ins></span> the <span class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>company does
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Around
47%</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>the most popular iOS</strong></del></span> <span
class="inserted"><ins><em>gratis Android</em></ins></span> apps <a <span
class="removed"><del><strong>class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
+ tracking people's locations.</p>
</li>
- <li><p>iThings automatically upload to Apple's servers
all</strong></del></span>
+ <li id="M201812290">
+ <p>Around 40%</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
<span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span class="removed"><del><strong>photos
and
- videos</strong></del></span> <span class="inserted"><ins><em>user's
actions to Facebook</a>.</p>
-
- <p>Often</em></ins></span> they <span
class="removed"><del><strong>make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>send</em></ins></span>
the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There is a way to <a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by
default</strong></del></span> <span class="inserted"><ins><em>machine's
“advertising ID,”</em></ins></span> so <span
class="removed"><del><strong>it still counts as a
- surveillance functionality.</p>
+ report on the user's actions</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
- <p>Unknown people apparently took advantage of this to
- <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA</strong></del></span> <span
class="inserted"><ins><em>that
+ <p>Often they send the machine's “advertising ID,” so
that
Facebook</em></ins></span> can <span class="removed"><del><strong>access
any</strong></del></span> <span class="inserted"><ins><em>correlate the data it
obtains from the same machine via
various apps. Some</em></ins></span> of them <span
class="removed"><del><strong>through
<a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
@@ -1143,36 +1149,34 @@
<li><p>There is also a feature for web sites to track users,
which</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is
<span class="removed"><del><strong><a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS
6,</strong></del></span>
- <span class="inserted"><ins><em>using that app,</em></ins></span> but
<span class="removed"><del><strong>it
- is still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span> that <span class="removed"><del><strong>can be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>alone is often quite informative.</p>
+ <span class="inserted"><ins><em>using that app,</em></ins></span> but
<span class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>that alone</em></ins></span> is <span
class="removed"><del><strong>still true in iOS
7.)</p></strong></del></span> <span class="inserted"><ins><em>often quite
informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
account.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
<span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span>
+ <p>Some Android apps</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>phones of users that have deleted
them</a>.</p></em></ins></span>
+ track the phones of users</em></ins></span> that <span
class="removed"><del><strong>can be
+ turned off.</p></strong></del></span> <span
class="inserted"><ins><em>have deleted
them</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
<span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>data in an
iThing,
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>NSA snoop
on all the data in an iThing,
or it is totally incompetent.</a></p>
</li>
@@ -1236,32 +1240,33 @@
<p>If you learn to care</em></ins></span> much <span
class="removed"><del><strong>data that their transmission</strong></del></span>
<span class="inserted"><ins><em>less about sports, you will benefit in
many ways. This</em></ins></span> is <span class="removed"><del><strong>a
substantial expense for users. Said transmission, not wanted or
- requested by the user, clearly must constitute spying of some
- kind.</p></li>
-
- <li><p>A Motorola phone</strong></del></span> <span
class="inserted"><ins><em>one more.</p>
+ requested</strong></del></span> <span class="inserted"><ins><em>one
more.</p>
</li>
<li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied</em></ins></span> by <span
class="inserted"><ins><em>researchers were found to snoop
+ and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>user, clearly must
constitute spying of</strong></del></span> <span class="inserted"><ins><em>apps
were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only</em></ins></span> some
+ <span class="removed"><del><strong>kind.</p></li>
+
+ <li><p>A Motorola phone
+ <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
</li>
- <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>5,855</em></ins></span> Android <span
class="removed"><del><strong>phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us</strong></del></span>
<span class="inserted"><ins><em>apps studied</em></ins></span> by <span
class="removed"><del><strong>a paywall)
- reports</strong></del></span> <span
class="inserted"><ins><em>researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows?
laptops):</strong></del></span> <span class="inserted"><ins><em>these
proprietary apps whose
+ source code they cannot look at.</em></ins></span> The <span
class="removed"><del><strong>Wall
+ Street Journal (in an article blocked from us</strong></del></span>
<span class="inserted"><ins><em>other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ Android</em></ins></span> by <span class="removed"><del><strong>a paywall)
+ reports</strong></del></span> <span class="inserted"><ins><em><a
href="https://replicant.us">switching to Replicant</a>,
and the proprietary apps by getting apps from the free software
only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
<span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns</em></ins></span>
@@ -1306,8 +1311,9 @@
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
(The US says it will eventually require</strong></del></span>
<span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads</em></ins></span> all <span class="removed"><del><strong>new
portable phones</strong></del></span> <span class="inserted"><ins><em>phone
numbers and email addresses</a> in user's address
- book</em></ins></span> to <span class="inserted"><ins><em>developer's
server. Note that this article misuses the words
+ uploads</em></ins></span> all <span class="removed"><del><strong>new
portable phones
+ to</strong></del></span> <span class="inserted"><ins><em>phone numbers
and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -3131,7 +3137,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/13 12:00:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.258
retrieving revision 1.259
diff -u -b -r1.258 -r1.259
--- proprietary-surveillance.de.po 8 Feb 2019 09:30:04 -0000 1.258
+++ proprietary-surveillance.de.po 13 Feb 2019 12:00:24 -0000 1.259
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1849,6 +1849,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.373
retrieving revision 1.374
diff -u -b -r1.373 -r1.374
--- proprietary-surveillance.fr.po 8 Feb 2019 10:10:56 -0000 1.373
+++ proprietary-surveillance.fr.po 13 Feb 2019 12:00:24 -0000 1.374
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2019-02-08 11:08+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1407,6 +1408,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary-surveillance.it-diff.html 8 Feb 2019 09:30:04 -0000
1.109
+++ proprietary-surveillance.it-diff.html 13 Feb 2019 12:00:24 -0000
1.110
@@ -1136,98 +1136,68 @@
</div>
<ul class="blurbs">
- <li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN</em></ins></span> apps <span class="inserted"><ins><em>in
Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
- apps</strong></del></span> <span class="inserted"><ins><em>invasive
advertising—that could
- potentially also be used to spy on users. Other technical flaws were
- found as well.</p>
-
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>user has
- installed.</strong></del></span> <span class="inserted"><ins><em>top 10
gratis VPN apps have lousy privacy policies</a>.</p>
-
- <p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
- </li>
-
- <li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The
company</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding that it notify the
users of what it will do
- with the data.</p>
-
- <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>side issue. What the company does
- with the data is a secondary issue. The principal wrong here
is</em></ins></span> that
- <span class="inserted"><ins><em>the company gets that
data</em></ins></span> at <span class="removed"><del><strong>least is
visible</strong></del></span> <span class="inserted"><ins><em>all.</p>
-
- <p><a
-
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as bad as what
the others do.</p></strong></del></span> <span
class="inserted"><ins><em>WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ <li id="M201902060">
+ <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>mobile devices report which other
+ apps the user has
+ installed.</strong></del></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>a way that at least is visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>interacting with</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC
says</strong></del></span>
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect privacy:
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation of the 150</em></ins></span> most <span
class="removed"><del><strong>mobile apps for children don't respect privacy:
<a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li><p>Widely used</strong></del></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
-
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
- Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>data it obtains
from</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities</em></ins></span> in the
- <span class="removed"><del><strong>phone.</p>
+ <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner</strong></del></span> <span
class="inserted"><ins><em>popular
+ gratis VPN</em></ins></span> apps <span class="removed"><del><strong>snoop
on the user</a>. This is</strong></del></span> in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to
+ <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a> due to DNS
leaks. In
+ addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>the
+ phone.</p>
+
+ <p>Don't</strong></del></span> <span
class="inserted"><ins><em>their
+ source code—often used for invasive advertising—that could
+ potentially also</em></ins></span> be <span
class="removed"><del><strong>distracted by the question</strong></del></span>
<span class="inserted"><ins><em>used to spy on users. Other technical flaws were
+ found as well.</p>
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>user is
- using that app, but that alone is often quite informative.</p>
+ <p>Moreover, a previous investigation had found that <a
+
href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>whether</strong></del></span>
+ the <span class="removed"><del><strong>app developers get
+ users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
- <p>This spying occurs regardless</em></ins></span> of whether the
<span class="removed"><del><strong>app developers get</strong></del></span>
<span class="inserted"><ins><em>user has a Facebook
- account.</p>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p>
</li>
- <li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of</em></ins></span> users <span
class="removed"><del><strong>to say “I agree”. That is no excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>that have deleted
them</a>.</p></em></ins></span>
+ <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
- tracking”</a>.</p>
+ <li id="M201901050"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span class="removed"><del><strong>because it
asked the user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>app developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>to other companies. This
shows</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>what it will do
+ with the data.</p>
- <p>There are other ways</em></ins></span> to <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask about sending it to</strong></del></span> other <span
class="removed"><del><strong>companies. This shows the
- weakness</strong></del></span> <span
class="inserted"><ins><em>kinds</em></ins></span> of <span
class="inserted"><ins><em>location
- tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should a flashlight
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>flashlight
app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>misleading control.</p></em></ins></span>
+ app would not.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
@@ -1236,118 +1206,193 @@
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements</em></ins></span> and <span
class="removed"><del><strong>then sends personal data
about</strong></del></span> <span class="inserted"><ins><em>listens through the
microphone</a>.</p>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal</strong></del></span>
<span class="inserted"><ins><em>side issue. What the company does
+ with the</em></ins></span> data <span class="removed"><del><strong>about
them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>is a secondary issue. The principal wrong here is that
+ the company gets that data at all.</p>
- <p>This makes</em></ins></span> them <span
class="removed"><del><strong>to
- nVidia servers</a>.</p>
+ <p><a
+
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p></em></ins></span>
</li>
- <li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"></strong></del></span>
<span class="inserted"><ins><em>act as</em></ins></span> spies for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+ <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span class="removed"><del><strong>spy
through</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information on
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data</em></ins></span> it <span
class="removed"><del><strong>too</a>.
+ Here's</strong></del></span> <span class="inserted"><ins><em>obtains
from the same machine via
+ various apps. Some of them send Facebook detailed</em></ins></span>
information <span class="removed"><del><strong>on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More</strong></del></span> <span class="inserted"><ins><em>care much
less</em></ins></span> about <span class="removed"><del><strong>NSA app
spying</a>.</p>
+ More</strong></del></span> about <span class="removed"><del><strong>NSA
app spying</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
<li>
- <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
- <span class="inserted"><ins><em>many ways. This is one more.</p>
+ <p>The “smart” toys My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based</strong></del></span>
+ <span class="inserted"><ins><em>the user's activities</em></ins></span> in
the <span class="removed"><del><strong>U.S.</p>
+
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers to listen in on a child's speech, and even speak
+ into</strong></del></span> <span class="inserted"><ins><em>user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>user has a Facebook
+ account.</p></em></ins></span>
</li>
- <li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span class="removed"><del><strong>U.S.</p>
+ <span class="removed"><del><strong><li>
+ <p>A computerized vibrator</strong></del></span>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech,</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
- and <span class="removed"><del><strong>even speak
- into</strong></del></span> <span class="inserted"><ins><em>collect
information about its users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p>
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> of <span
class="inserted"><ins><em>users that have deleted them</a>.</p>
+ </li>
+
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>vibrator
minute by
+ minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span class="inserted"><ins><em>user's
location even when users disable “location
+ tracking”</a>.</p>
+
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked</em></ins></span> by <span
class="removed"><del><strong>a person's
+ body), as well as</strong></del></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
</li>
- <li>
- <p>A computerized vibrator
- <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span> <span class="inserted"><ins><em>apps
were
- found to insecurely snitch</em></ins></span> on its <span
class="removed"><del><strong>users through the</strong></del></span> <span
class="inserted"><ins><em>users. Furthermore, they could
- detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>control app</a>.</p>
+ <li id="M201806110">
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
+ the <span class="removed"><del><strong>totally inadequate proposed
response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than free software which users could have
+ checked</strong></del></span> <span class="inserted"><ins><em>user's
movements</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
+
+ <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+
+ <p>This makes them act as spies</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+
+ <p>I expect</em></ins></span> it <span
class="removed"><del><strong>had sold the data</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no
way</em></ins></span> to <span class="inserted"><ins><em>save</em></ins></span>
+ a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>recording. But I can't be sure
from</em></ins></span> the <span class="removed"><del><strong>data broker would
have been able</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who the user was.</p>
+
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will benefit in
+ many ways. This is one more.</p>
+ </li>
- <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>apps whose
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span class="removed"><del><strong>company has
been ordered</strong></del></span> <span class="inserted"><ins><em>5,855
Android apps studied by researchers were found</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>snoop
+ and collect information about its users</a>. 40%</em></ins></span>
of <span class="removed"><del><strong>C$4m</a></strong></del></span>
<span class="inserted"><ins><em>the apps were
+ found</em></ins></span> to <span class="inserted"><ins><em>insecurely
snitch on</em></ins></span> its <span
class="removed"><del><strong>customers.</p>
+ </li>
+
+ <li><p> “CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
<p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
- need to get rid</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android</em></ins></span> by <span class="removed"><del><strong>a person's
- body), as well as</strong></del></span> <span
class="inserted"><ins><em><a href="https://replicant.us">switching to
Replicant</a>,
- and</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
-
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> free software <span
class="removed"><del><strong>which users could have
- checked and changed.</p>
-
- <p>The company</strong></del></span>
- <span class="inserted"><ins><em>only <a
href="https://f-droid.org/">F-Droid store</a></em></ins></span> that
<span class="removed"><del><strong>made the vibrator</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns
- the user if an app contains anti-features</a>.</p>
+ need</em></ins></span> to <span class="inserted"><ins><em>get rid
of</em></ins></span> the
+ <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
+ and</em></ins></span> the <span class="removed"><del><strong>data</a>
+ collected by</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
+
+ <p>That</strong></del></span> <span class="inserted"><ins><em>free
software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>manufacturer
and</strong></del></span> <span class="inserted"><ins><em>user if an app
contains anti-features</a>.</p>
</li>
<li id="M201804020">
- <p>Grindr collects</em></ins></span> information about <span
class="removed"><del><strong>how
- people used it</a>.</p>
-
- <p>The company's statement that it was
anonymizing</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>data may</strong></del></span> <span
class="inserted"><ins><em>information to
+ which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could</em></ins></span> be
- <span class="removed"><del><strong>true,</strong></del></span> <span
class="inserted"><ins><em>designed so that users communicate such info to each
- other</em></ins></span> but <span class="removed"><del><strong>it doesn't
really matter. If it had sold</strong></del></span> <span
class="inserted"><ins><em>not to</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
+ It</em></ins></span> could <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>be designed so that users communicate such
info</em></ins></span> to <span class="removed"><del><strong>these conversations
+ was unacceptable by itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>each
+ other but not</em></ins></span> to <span class="inserted"><ins><em>the
server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app and dis-service
- spy on users even more than users expected. It <a
+ <p>The moviepass app and dis-service</em></ins></span>
+ spy on <span class="removed"><del><strong>children</strong></del></span>
<span class="inserted"><ins><em>users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</em></ins></span> to a
- <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
+ where they travel before</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
+ </li>
+</ul>
+
+
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>after going</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
-
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+ is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
@@ -1355,149 +1400,129 @@
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book</em></ins></span> to <span class="removed"><del><strong>figure out
- who the user was.</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that</em></ins></span> this
<span class="removed"><del><strong>lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>article misuses</em></ins></span> the <span
class="removed"><del><strong>company has been ordered to pay a total of
C$4m</a></strong></del></span> <span class="inserted"><ins><em>words
+ uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
+ book to developer's server.</em></ins></span> Note that <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo
used</strong></del></span> <span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring</em></ins></span> to <span class="removed"><del><strong>its
customers.</p></strong></del></span> <span class="inserted"><ins><em>zero
price.</p></em></ins></span>
+ referring to zero price.</p>
</li>
- <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend</em></ins></span> to <span
class="inserted"><ins><em>make these apps spy; on</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>contrary, it
- worked in various ways to prevent that, and deleted these apps after
+ <p>Google</em></ins></span> did not <span
class="removed"><del><strong>affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>intend</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span>
+ <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that, and deleted these apps
after
discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done</em></ins></span> a <span
class="inserted"><ins><em>better job of preventing apps from
- cheating? There is no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
- to <span class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
-
- <p>That</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>manufacturer</strong></del></span> <span
class="inserted"><ins><em>source code for these apps,</em></ins></span> and
<span class="inserted"><ins><em>study</em></ins></span>
- the <span class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>source code somehow to determine whether they
mistreat users in
- various ways. If it did a good job of this, it</em></ins></span> could
<span class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>more or less
- prevent such snooping, except when the app developers are clever
- enough</em></ins></span> to <span class="removed"><del><strong>these
conversations
- was unacceptable by itself.</p></li>
-
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>outsmart the
checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p>
+ <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>protect us. We must demand release of source
code</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>the
- public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>top under</strong></del></span> each <span
class="removed"><del><strong>subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat
users</em></ins></span> in <span class="removed"><del><strong>Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>other.</p>
+ <li><p>Spyware</strong></del></span>
+ <span class="inserted"><ins><em>various ways. If it did a good job of
this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
-Note</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>the
specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
+ <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>demands to personal data in</em></ins></span> the
<span class="removed"><del><strong>emails of members</strong></del></span>
<span class="inserted"><ins><em>device</a>.</p>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
<li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names</em></ins></span> of <span
class="removed"><del><strong>Parliament</strong></del></span> <span
class="inserted"><ins><em>the audio files users listen to
- along with the headphone's unique serial number.</p>
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
+ </li>
+</ul>
- <p>The suit accuses that</em></ins></span> this <span
class="removed"><del><strong>way, because they pass</strong></del></span> <span
class="inserted"><ins><em>was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
- <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design
- the app to snoop at all</a>.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware</strong></del></span>
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201704074">
+ <li id="M201704074">
<p>Pairs of Android apps can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
@@ -1888,12 +1913,7 @@
report everything that is viewed on them, and not just broadcasts and
cable</a>. Even if the image is coming from the user's own computer,
the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was</em></ins></span> in
<span class="removed"><del><strong>Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>these TVs,
+ surveillance, even if it were not hidden as it was in these TVs,
does not legitimize the surveillance.</p>
</li>
@@ -1958,30 +1978,21 @@
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
- software</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>your own computer.</p>
+ software in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly confirms
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
+ <p>In its privacy policy, Samsung explicitly confirms that <a
+
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
data containing sensitive information will be transmitted to third
parties</a>.</p>
</li>
<li id="M201411090">
- <p>The Amazon “Smart” TV is</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all the time</a>.</p></em></ins></span>
+ <p>The Amazon “Smart” TV is <a
+
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
+ snooping all the time</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201409290">
+ <li id="M201409290">
<p>More or less all “smart” TVs <a
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
@@ -2953,7 +2964,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/13 12:00:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary-surveillance.it.po 8 Feb 2019 09:30:04 -0000 1.271
+++ proprietary-surveillance.it.po 13 Feb 2019 12:00:24 -0000 1.272
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1799,6 +1799,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary-surveillance.ja-diff.html 8 Feb 2019 09:30:04 -0000
1.119
+++ proprietary-surveillance.ja-diff.html 13 Feb 2019 12:00:24 -0000
1.120
@@ -1026,8 +1026,7 @@
<p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile devices report which other
- apps</strong></del></span>
+ <span class="removed"><del><strong><li><p>Many
proprietary</strong></del></span>
<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -1036,48 +1035,55 @@
</div>
<ul class="blurbs">
- <li id="M201902010">
- <p>An investigation of</em></ins></span> the <span
class="removed"><del><strong>user has
- installed.</strong></del></span> <span class="inserted"><ins><em>150 most
popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ <li id="M201902060">
+ <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>mobile devices report which other
+ apps the user has
+ installed.</strong></del></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
is doing this</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="inserted"><ins><em>their
- source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
- found as well.</p>
-
- <p>Moreover,</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>previous investigation had found</em></ins></span>
that <span class="removed"><del><strong>at least is visible and
- optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em><a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>others do.</p>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>a way that at least is visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>interacting with</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
</li>
- <li><p>FTC says most mobile</strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <span class="inserted"><ins><em>have lousy
privacy policies</a>.</p>
+ <span class="removed"><del><strong><li><p>FTC
says</strong></del></span>
- <p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation of the 150</em></ins></span> most <span
class="removed"><del><strong>mobile</strong></del></span> <span
class="inserted"><ins><em>popular
+ gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for
children don't respect privacy:</strong></del></span> <span
class="inserted"><ins><em>in Google Play found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+ <li><p>Widely</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often</em></ins></span> used <span
class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>for invasive advertising—that could
+ potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ found as well.</p>
- <span class="inserted"><ins><em><li id="M201901050">
- <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in
addition</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>users of what it will
do
- with</em></ins></span> the <span class="removed"><del><strong>OS
in</strong></del></span> <span class="inserted"><ins><em>data.</p>
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>user</a>.
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps have lousy privacy policies</a>.</p>
- <p>I think that lawsuit is about a side issue.
What</em></ins></span> the
- <span class="removed"><del><strong>phone.</p>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that
these articles talk about “free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
+ </li>
+
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS in the
+ phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>what it will do
+ with</em></ins></span> the <span class="removed"><del><strong>app
developers get
+ users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>data.</p>
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>company does
- with</em></ins></span> the <span class="removed"><del><strong>question of
whether the app developers get
- users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>a
secondary issue. The principal wrong here is that
+ <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>about
a side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
@@ -1123,15 +1129,15 @@
<li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
<span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends personal data
about them</strong></del></span> <span class="inserted"><ins><em>that have
deleted them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends personal data
about them</strong></del></span> <span class="inserted"><ins><em>disable
“location
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
tracking”</a>.</p>
<p>There are other ways</em></ins></span> to
@@ -1307,26 +1313,36 @@
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
+ <h4 id="SpywareInSkype">Spyware</strong></del></span>
+ <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="removed"><del><strong>Skype</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
<ul>
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that, and deleted these apps
after
+ discovering what they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares</em></ins></span> in <span
class="removed"><del><strong>Skype:
<a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype
- <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"></strong></del></span>
<span class="inserted"><ins><em>various ways to prevent that, and deleted
these apps after
- discovering what they did. So we cannot blame Google</em></ins></span>
specifically
- for <span class="removed"><del><strong>spying</a>.</p>
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
</li>
</ul>
<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>Google, or Android users,</em></ins></span>
+ to <span class="removed"><del><strong>place new items on top under each
subsection -->
<div class="big-section">
<h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
@@ -1335,10 +1351,7 @@
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware</strong></del></span> <span
class="inserted"><ins><em>the snooping of these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</em></ins></span> in <span
class="removed"><del><strong>Cameras</h4>
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
@@ -1346,19 +1359,12 @@
<li>
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>responsibility for</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If</em></ins></span> it <span class="inserted"><ins><em>did
a good job of this, it could more or less
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and
study</em></ins></span>
+ the <span class="removed"><del><strong>manufacturer is
using</strong></del></span> <span class="inserted"><ins><em>source code somehow
to determine whether they mistreat users in
+ various ways. If it did a good job of this,</em></ins></span> it <span
class="inserted"><ins><em>could more or less
prevent such snooping, except when the app developers are clever
enough</em></ins></span> to outsmart
<span class="removed"><del><strong>you.</p>
@@ -1491,15 +1497,10 @@
explicitly opt-in before</em></ins></span> the <span
class="removed"><del><strong>data
and hand it over,</strong></del></span> <span
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the
<span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>app
remains spyware—an “optional” piece of spyware is
- still spyware.</p></em></ins></span>
+ still spyware.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make</strong></del></span>
- <span class="inserted"><ins><em><li id="M201701210">
+ <li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
user data to a Chinese company</a>.</p>
@@ -1987,12 +1988,16 @@
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ and use its camera to watch the people who are watching
TV.</p></em></ins></span>
</li>
</ul>
-<div class="big-subsection">
+<span class="removed"><del><strong><!-- #SpywareAtHome -->
+<!-- WEBMASTERS:</strong></del></span>
+
+
+<span class="inserted"><ins><em><div class="big-subsection">
<h4 id="SpywareInCameras">Cameras</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
</div>
@@ -2014,7 +2019,7 @@
<p>When Consumer Reports tested them, it suggested that these
manufacturers promise not to look at what's in the videos. That's not
- security for your home. Security means making</em></ins></span> sure <span
class="inserted"><ins><em>they don't get to
+ security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
@@ -2065,7 +2070,7 @@
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
+ standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>statements about their
products, rather than free software which users could have checked
and changed.</p>
@@ -2781,7 +2786,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/13 12:00:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.244
retrieving revision 1.245
diff -u -b -r1.244 -r1.245
--- proprietary-surveillance.ja.po 8 Feb 2019 09:30:04 -0000 1.244
+++ proprietary-surveillance.ja.po 13 Feb 2019 12:00:24 -0000 1.245
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1492,6 +1492,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary-surveillance.pot 8 Feb 2019 09:30:04 -0000 1.192
+++ proprietary-surveillance.pot 13 Feb 2019 12:00:24 -0000 1.193
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -997,6 +997,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a "
+"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\">
"
+"recording all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a "
"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\"> 25% fail "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.466
retrieving revision 1.467
diff -u -b -r1.466 -r1.467
--- proprietary-surveillance.ru.po 8 Feb 2019 12:29:08 -0000 1.466
+++ proprietary-surveillance.ru.po 13 Feb 2019 12:00:24 -0000 1.467
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1394,6 +1395,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary.de-diff.html 8 Feb 2019 09:30:04 -0000 1.44
+++ proprietary.de-diff.html 13 Feb 2019 12:00:24 -0000 1.45
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -183,6 +183,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
<li id="M201902010">
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
@@ -237,20 +243,6 @@
<p>This spying occurs regardless of whether the user has a Facebook
account.</p>
</li>
-
- <li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
-
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +303,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/02/13 12:00:24 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary.de.po 8 Feb 2019 09:30:04 -0000 1.86
+++ proprietary.de.po 13 Feb 2019 12:00:24 -0000 1.87
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -500,27 +507,6 @@
"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary.es.po 11 Feb 2019 12:15:03 -0000 1.96
+++ proprietary.es.po 13 Feb 2019 12:00:24 -0000 1.97
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2019-02-11 12:49+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -298,6 +299,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -409,37 +417,6 @@
"El espionaje se produce con independencia de que el usuario tenga cuenta en "
"Facebook."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"El software para para tratamiento de gráficos de Foundry <a href=\"https://"
-"torrentfreak.com/software-company-fines-pirates-after-monitoring-their-"
-"computers-181102/\">envÃa información para identificar a quien lo está "
-"utilizando</a>. La consecuencia es a menudo una amenaza lega exigiendo una "
-"elevada suma de dinero."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"El hecho de que lo utilicen para reprimir la compartición no autorizada lo "
-"hace incuso más vil."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"Esto muestra que hacer copias no autorizadas de software que no es libre no "
-"es un remedio contra la injusticia de ese tipo de software. Puede evitar que "
-"se pague por algo malo, pero no lo hace menos malo."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -519,6 +496,34 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+#~ "information to identify who is running it</a>. The result is often a "
+#~ "legal threat demanding a lot of money."
+#~ msgstr ""
+#~ "El software para para tratamiento de gráficos de Foundry <a href="
+#~ "\"https://torrentfreak.com/software-company-fines-pirates-after-"
+#~ "monitoring-their-computers-181102/\">envÃa información para identificar
a "
+#~ "quien lo está utilizando</a>. La consecuencia es a menudo una amenaza "
+#~ "lega exigiendo una elevada suma de dinero."
+
+#~ msgid ""
+#~ "The fact that this is used for repression of forbidden sharing makes it "
+#~ "even more vicious."
+#~ msgstr ""
+#~ "El hecho de que lo utilicen para reprimir la compartición no autorizada "
+#~ "lo hace incuso más vil."
+
+#~ msgid ""
+#~ "This illustrates that making unauthorized copies of nonfree software is "
+#~ "not a cure for the injustice of nonfree software. It may avoid paying for "
+#~ "the nasty thing, but cannot make it less nasty."
+#~ msgstr ""
+#~ "Esto muestra que hacer copias no autorizadas de software que no es libre "
+#~ "no es un remedio contra la injusticia de ese tipo de software. Puede "
+#~ "evitar que se pague por algo malo, pero no lo hace menos malo."
+
+#~ msgid ""
#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/"
#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.fr.po 8 Feb 2019 10:10:56 -0000 1.119
+++ proprietary.fr.po 13 Feb 2019 12:00:25 -0000 1.120
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2019-02-08 11:08+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -405,37 +413,6 @@
msgstr ""
"Cet espionnage se produit que l'utilisateur ait un compte Facebook ou non."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"Les logiciels de Foundry <a href=\"https://torrentfreak.com/software-company-"
-"fines-pirates-after-monitoring-their-computers-181102/\">font remonter des "
-"informations permettant d'identifier qui les utilise</a>. Cela se traduit "
-"souvent par la demande d'une grosse somme d'argent sous la menace d'un "
-"procès."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"Le fait qu'il soit utilisé pour réprimer le partage non autorisé rend ce "
-"procédé encore plus vicieux."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"Ceci montre que la copie non autorisée de logiciels non libres n'est pas un "
-"remède contre l'injustice qu'ils représentent. Elle permet ne pas payer
pour "
-"ces choses malfaisantes, mais ne peut pas les rendre moins malfaisantes."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -509,3 +486,32 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+#~ "information to identify who is running it</a>. The result is often a "
+#~ "legal threat demanding a lot of money."
+#~ msgstr ""
+#~ "Les logiciels de Foundry <a href=\"https://torrentfreak.com/software-"
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\">font "
+#~ "remonter des informations permettant d'identifier qui les utilise</a>. "
+#~ "Cela se traduit souvent par la demande d'une grosse somme d'argent sous "
+#~ "la menace d'un procès."
+
+#~ msgid ""
+#~ "The fact that this is used for repression of forbidden sharing makes it "
+#~ "even more vicious."
+#~ msgstr ""
+#~ "Le fait qu'il soit utilisé pour réprimer le partage non autorisé rend
ce "
+#~ "procédé encore plus vicieux."
+
+#~ msgid ""
+#~ "This illustrates that making unauthorized copies of nonfree software is "
+#~ "not a cure for the injustice of nonfree software. It may avoid paying for "
+#~ "the nasty thing, but cannot make it less nasty."
+#~ msgstr ""
+#~ "Ceci montre que la copie non autorisée de logiciels non libres n'est pas "
+#~ "un remède contre l'injustice qu'ils représentent. Elle permet ne pas "
+#~ "payer pour ces choses malfaisantes, mais ne peut pas les rendre moins "
+#~ "malfaisantes."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.it-diff.html 8 Feb 2019 09:30:05 -0000 1.56
+++ proprietary.it-diff.html 13 Feb 2019 12:00:25 -0000 1.57
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li { margin: .5em 5%; }
@@ -182,6 +182,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
<li id="M201902010">
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
@@ -236,20 +242,6 @@
<p>This spying occurs regardless of whether the user has a Facebook
account.</p>
</li>
-
- <li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
-
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +302,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary.it.po 8 Feb 2019 09:30:05 -0000 1.95
+++ proprietary.it.po 13 Feb 2019 12:00:25 -0000 1.96
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -504,27 +511,6 @@
"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary.ja-diff.html 8 Feb 2019 09:30:05 -0000 1.57
+++ proprietary.ja-diff.html 13 Feb 2019 12:00:25 -0000 1.58
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -95,16 +95,16 @@
</tr>
<tr>
<td>
- <ul>
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html">Malware
in the Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
+ <li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
<li><a
href="/proprietary/proprietary-interference.html">Interference</a></li>
<li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -155,10 +155,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -179,6 +179,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
<li id="M201902010">
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
@@ -233,20 +239,6 @@
<p>This spying occurs regardless of whether the user has a Facebook
account.</p>
</li>
-
- <li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
-
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
- </li>
</ul></em></ins></span>
@@ -307,7 +299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.ja.po 8 Feb 2019 09:30:05 -0000 1.78
+++ proprietary.ja.po 13 Feb 2019 12:00:25 -0000 1.79
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -424,27 +431,6 @@
"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.nl-diff.html 8 Feb 2019 09:30:05 -0000 1.56
+++ proprietary.nl-diff.html 13 Feb 2019 12:00:25 -0000 1.57
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -182,6 +182,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
<li id="M201902010">
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
@@ -236,20 +242,6 @@
<p>This spying occurs regardless of whether the user has a Facebook
account.</p>
</li>
-
- <li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
-
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +302,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.nl.po 8 Feb 2019 09:30:05 -0000 1.67
+++ proprietary.nl.po 13 Feb 2019 12:00:25 -0000 1.68
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -497,27 +504,6 @@
"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary.pl-diff.html 8 Feb 2019 09:30:05 -0000 1.74
+++ proprietary.pl-diff.html 13 Feb 2019 12:00:25 -0000 1.75
@@ -87,8 +87,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
-instances of malicious functionalities (with more than 400 references to
+<p>As of October, 2018, the pages in this directory list around 350
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -124,14 +124,14 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
@@ -156,10 +156,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -180,6 +180,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
<li id="M201902010">
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
@@ -234,20 +240,6 @@
<p>This spying occurs regardless of whether the user has a Facebook
account.</p>
</li>
-
- <li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
-
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
- </li>
</ul></em></ins></span>
@@ -308,7 +300,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary.pl.po 8 Feb 2019 09:30:05 -0000 1.62
+++ proprietary.pl.po 13 Feb 2019 12:00:25 -0000 1.63
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -579,27 +586,6 @@
"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary.pot 8 Feb 2019 09:30:05 -0000 1.59
+++ proprietary.pot 13 Feb 2019 12:00:25 -0000 1.60
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a "
+"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\">
"
+"recording all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a "
"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\"> 25% fail "
@@ -314,27 +321,6 @@
msgid "This spying occurs regardless of whether the user has a Facebook
account."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a "
-"href=\"https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/\">
"
-"reports information to identify who is running it</a>. The result is often a "
-"legal threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary.pt-br.po 8 Feb 2019 20:12:35 -0000 1.80
+++ proprietary.pt-br.po 13 Feb 2019 12:00:25 -0000 1.81
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2019-02-08 16:42-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -292,6 +293,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -400,36 +408,6 @@
"Esta espionagem ocorre independentemente de o usuário ter uma conta no "
"Facebook."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"O software gráfico da Foundry <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> relata "
-"informações para identificar quem está executando-o </a>. O resultado é "
-"muitas vezes uma ameaça legal que exige muito dinheiro."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"O fato de que isso é usado para repressão de compartilhamento proibido
torna "
-"ainda mais cruel."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"Isso mostra que fazer cópias não autorizadas de software não livre não é
uma "
-"cura para a injustiça do software não livre. Pode evitar pagar pelo "
-"desagradável, mas não pode torná-lo menos desagradável."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,6 +483,33 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+#~ "information to identify who is running it</a>. The result is often a "
+#~ "legal threat demanding a lot of money."
+#~ msgstr ""
+#~ "O software gráfico da Foundry <a
href=\"https://torrentfreak.com/software-"
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> relata "
+#~ "informações para identificar quem está executando-o </a>. O resultado
é "
+#~ "muitas vezes uma ameaça legal que exige muito dinheiro."
+
+#~ msgid ""
+#~ "The fact that this is used for repression of forbidden sharing makes it "
+#~ "even more vicious."
+#~ msgstr ""
+#~ "O fato de que isso é usado para repressão de compartilhamento proibido "
+#~ "torna ainda mais cruel."
+
+#~ msgid ""
+#~ "This illustrates that making unauthorized copies of nonfree software is "
+#~ "not a cure for the injustice of nonfree software. It may avoid paying for "
+#~ "the nasty thing, but cannot make it less nasty."
+#~ msgstr ""
+#~ "Isso mostra que fazer cópias não autorizadas de software não livre não
é "
+#~ "uma cura para a injustiça do software não livre. Pode evitar pagar pelo "
+#~ "desagradável, mas não pode torná-lo menos desagradável."
+
+#~ msgid ""
#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/"
#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.ru.po 8 Feb 2019 12:29:08 -0000 1.148
+++ proprietary.ru.po 13 Feb 2019 12:00:25 -0000 1.149
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-13 11:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -407,36 +415,6 @@
"ÐÑа Ñлежка пÑоиÑÑ
Ð¾Ð´Ð¸Ñ Ð½ÐµÐ·Ð°Ð²Ð¸Ñимо Ð¾Ñ Ñого,
еÑÑÑ Ð»Ð¸ Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ ÑÑеÑÐ½Ð°Ñ "
"запиÑÑ Facebook."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-"ÐÑаÑиÑеÑкие пÑогÑÐ°Ð¼Ð¼Ñ Foundry <a
href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\">
ÑообÑаÑÑ "
-"ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑии Ñого, кÑо Ñ
ними ÑабоÑаеÑ</a>. ЧаÑÑо ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ "
-"к ÑгÑозе ÑÑдебного пÑеÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ñ
ÑÑебованием болÑÑого колиÑеÑÑва денег."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-"Ð¢Ð¾Ñ ÑакÑ, ÑÑо ÑÑо пÑименÑеÑÑÑ Ð´Ð»Ñ
Ð¿Ð¾Ð´Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð¿ÑеÑенного обмена, Ð´ÐµÐ»Ð°ÐµÑ ÑÑо
"
-"еÑе более поÑоÑнÑм."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-"ÐÑо показÑваеÑ, ÑÑо Ñоздание
неÑанкÑиониÑованнÑÑ
копий неÑвободнÑÑ
пÑогÑамм "
-"не избавлÑÐµÑ Ð¾Ñ Ð½ÐµÑпÑаведливоÑÑи
неÑвободнÑÑ
пÑогÑамм. Ðозможно, ÑÑо "
-"позволÑÐµÑ Ð½Ðµ плаÑиÑÑ Ð·Ð° ÑÑÑ Ð³Ð°Ð´Ð¾ÑÑÑ, но
менÑÑей гадоÑÑÑÑ ÑÑо ее не делаеÑ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -516,6 +494,35 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+#~ "information to identify who is running it</a>. The result is often a "
+#~ "legal threat demanding a lot of money."
+#~ msgstr ""
+#~ "ÐÑаÑиÑеÑкие пÑогÑÐ°Ð¼Ð¼Ñ Foundry <a
href=\"https://torrentfreak.com/software-"
+#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> "
+#~ "ÑообÑаÑÑ ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑии
Ñого, кÑо Ñ Ð½Ð¸Ð¼Ð¸ ÑабоÑаеÑ</a>. ЧаÑÑо "
+#~ "ÑÑо пÑÐ¸Ð²Ð¾Ð´Ð¸Ñ Ðº ÑгÑозе ÑÑдебного
пÑеÑÐ»ÐµÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ñ ÑÑебованием болÑÑого "
+#~ "колиÑеÑÑва денег."
+
+#~ msgid ""
+#~ "The fact that this is used for repression of forbidden sharing makes it "
+#~ "even more vicious."
+#~ msgstr ""
+#~ "Ð¢Ð¾Ñ ÑакÑ, ÑÑо ÑÑо пÑименÑеÑÑÑ Ð´Ð»Ñ
Ð¿Ð¾Ð´Ð°Ð²Ð»ÐµÐ½Ð¸Ñ Ð·Ð°Ð¿ÑеÑенного обмена, Ð´ÐµÐ»Ð°ÐµÑ "
+#~ "ÑÑо еÑе более поÑоÑнÑм."
+
+#~ msgid ""
+#~ "This illustrates that making unauthorized copies of nonfree software is "
+#~ "not a cure for the injustice of nonfree software. It may avoid paying for "
+#~ "the nasty thing, but cannot make it less nasty."
+#~ msgstr ""
+#~ "ÐÑо показÑваеÑ, ÑÑо Ñоздание
неÑанкÑиониÑованнÑÑ
копий неÑвободнÑÑ
"
+#~ "пÑогÑамм не избавлÑÐµÑ Ð¾Ñ
неÑпÑаведливоÑÑи неÑвободнÑÑ
пÑогÑамм.
Ðозможно, "
+#~ "ÑÑо позволÑÐµÑ Ð½Ðµ плаÑиÑÑ Ð·Ð° ÑÑÑ Ð³Ð°Ð´Ð¾ÑÑÑ,
но менÑÑей гадоÑÑÑÑ ÑÑо ее не "
+#~ "делаеÑ."
+
+#~ msgid ""
#~ "Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/"
#~ "news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-"
#~ "delete-facebook\"> a version of the Facebook app that can't be deleted</"
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary.zh-tw-diff.html 8 Feb 2019 09:30:05 -0000 1.34
+++ proprietary.zh-tw-diff.html 13 Feb 2019 12:00:25 -0000 1.35
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -183,6 +183,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
<li id="M201902010">
<p>An investigation of the 150 most popular
gratis VPN apps in Google Play found that <a
@@ -237,20 +243,6 @@
<p>This spying occurs regardless of whether the user has a Facebook
account.</p>
</li>
-
- <li id="M201811020">
- <p>Foundry's graphics software <a
-
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
- reports information to identify who is running it</a>. The result is
- often a legal threat demanding a lot of money.</p>
-
- <p>The fact that this is used for repression of forbidden sharing
- makes it even more vicious.</p>
-
- <p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for the injustice of nonfree software. It may avoid
- paying for the nasty thing, but cannot make it less nasty.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +303,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:05 $
+$Date: 2019/02/13 12:00:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary.zh-tw.po 8 Feb 2019 09:30:05 -0000 1.45
+++ proprietary.zh-tw.po 13 Feb 2019 12:00:25 -0000 1.46
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-08 09:26+0000\n"
+"POT-Creation-Date: 2019-02-13 11:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -413,27 +420,6 @@
"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- pt-br.po 11 Feb 2019 12:59:23 -0000 1.37
+++ pt-br.po 13 Feb 2019 12:00:25 -0000 1.38
@@ -4017,6 +4017,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -5967,6 +5974,34 @@
msgid "Latest additions"
msgstr "Ãltimas adições"
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
+#. type: Content of: <title>
+#, fuzzy
+#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
+msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
+msgstr "Software proprietário - Projeto GNU - Free Software Foundation"
+
+#. type: Content of: <h2>
+msgid "Proprietary Sabotage"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Here are examples of proprietary software that has something worse than a "
+"back door."
+msgstr ""
+
#. type: Content of: <ul><li><p>
msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
@@ -5997,34 +6032,6 @@
"cura para a injustiça do software não livre. Pode evitar pagar pelo "
"desagradável, mas não pode torná-lo menos desagradável."
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
-
-#. type: Content of: <title>
-#, fuzzy
-#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
-msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
-msgstr "Software proprietário - Projeto GNU - Free Software Foundation"
-
-#. type: Content of: <h2>
-msgid "Proprietary Sabotage"
-msgstr ""
-
-#. type: Content of: <div><p>
-msgid ""
-"Here are examples of proprietary software that has something worse than a "
-"back door."
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- ru.po 11 Feb 2019 13:58:59 -0000 1.64
+++ ru.po 13 Feb 2019 12:00:25 -0000 1.65
@@ -5607,6 +5607,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -8145,6 +8152,31 @@
msgid "Latest additions"
msgstr "ÐоÑледние добавлениÑ"
+#. type: Content of: <div><p>
+msgid ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+
+#. type: Content of: <title>
+msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
+msgstr ""
+"СабоÑаж неÑвободнÑÑ
пÑогÑамм - ÐÑÐ¾ÐµÐºÑ GNU -
Фонд Ñвободного пÑогÑаммного "
+"обеÑпеÑениÑ"
+
+#. type: Content of: <h2>
+msgid "Proprietary Sabotage"
+msgstr "СабоÑаж неÑвободнÑÑ
пÑогÑамм"
+
+#. type: Content of: <div><p>
+msgid ""
+"Here are examples of proprietary software that has something worse than a "
+"back door."
+msgstr ""
+"ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм, в
коÑоÑÑÑ
еÑÑÑ ÐºÐ¾Ðµ-ÑÑо поÑ
Ñже, Ñем лазейки."
+
#. type: Content of: <ul><li><p>
msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
@@ -8175,31 +8207,6 @@
"не избавлÑÐµÑ Ð¾Ñ Ð½ÐµÑпÑаведливоÑÑи
неÑвободнÑÑ
пÑогÑамм. Ðозможно, ÑÑо "
"позволÑÐµÑ Ð½Ðµ плаÑиÑÑ Ð·Ð° ÑÑÑ Ð³Ð°Ð´Ð¾ÑÑÑ, но
менÑÑей гадоÑÑÑÑ ÑÑо ее не делаеÑ."
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-
-#. type: Content of: <title>
-msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
-msgstr ""
-"СабоÑаж неÑвободнÑÑ
пÑогÑамм - ÐÑÐ¾ÐµÐºÑ GNU -
Фонд Ñвободного пÑогÑаммного "
-"обеÑпеÑениÑ"
-
-#. type: Content of: <h2>
-msgid "Proprietary Sabotage"
-msgstr "СабоÑаж неÑвободнÑÑ
пÑогÑамм"
-
-#. type: Content of: <div><p>
-msgid ""
-"Here are examples of proprietary software that has something worse than a "
-"back door."
-msgstr ""
-"ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм, в
коÑоÑÑÑ
еÑÑÑ ÐºÐ¾Ðµ-ÑÑо поÑ
Ñже, Ñем лазейки."
-
#. type: Content of: <ul><li><p>
msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- zh-tw.po 11 Feb 2019 12:59:23 -0000 1.27
+++ zh-tw.po 13 Feb 2019 12:00:25 -0000 1.28
@@ -3888,6 +3888,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Many nonfree apps have a surveillance feature for <a href=\"https://"
+"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
+"all the users' actions</a> in interacting with the app."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
@@ -5780,27 +5787,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
-"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
-"information to identify who is running it</a>. The result is often a legal "
-"threat demanding a lot of money."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The fact that this is used for repression of forbidden sharing makes it even "
-"more vicious."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This illustrates that making unauthorized copies of nonfree software is not "
-"a cure for the injustice of nonfree software. It may avoid paying for the "
-"nasty thing, but cannot make it less nasty."
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
@@ -5831,6 +5817,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Canary home surveillance camera has been sabotaged by its manufacturer, "
"<a href=\"https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-"
"smart-home-camera-free-service-update-change\"> turning off many features "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/11
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/24
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/02/28