[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/po/open-source-misses-the-point....
From: |
GNUN |
Subject: |
www philosophy/po/open-source-misses-the-point.... |
Date: |
Wed, 20 Feb 2019 10:30:57 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/02/20 10:30:53
Modified files:
philosophy/po : open-source-misses-the-point.ar-diff.html
open-source-misses-the-point.ar.po
open-source-misses-the-point.bg.po
open-source-misses-the-point.de.po
open-source-misses-the-point.el.po
open-source-misses-the-point.es.po
open-source-misses-the-point.fa.po
open-source-misses-the-point.fr.po
open-source-misses-the-point.hr-diff.html
open-source-misses-the-point.hr.po
open-source-misses-the-point.it.po
open-source-misses-the-point.ja.po
open-source-misses-the-point.lt-diff.html
open-source-misses-the-point.lt.po
open-source-misses-the-point.ml.po
open-source-misses-the-point.nl.po
open-source-misses-the-point.pl.po
open-source-misses-the-point.pot
open-source-misses-the-point.pt-br.po
open-source-misses-the-point.ro.po
open-source-misses-the-point.ru.po
open-source-misses-the-point.sq.po
open-source-misses-the-point.ta.po
open-source-misses-the-point.tr.po
open-source-misses-the-point.uk.po
open-source-misses-the-point.zh-cn.po
selling-exceptions.de-diff.html
selling-exceptions.de.po
selling-exceptions.es.po
selling-exceptions.fr.po
selling-exceptions.pl-diff.html
selling-exceptions.pl.po selling-exceptions.pot
selling-exceptions.ru.po
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-deception.de-diff.html
proprietary-deception.de.po
proprietary-deception.fr.po
proprietary-deception.ja-diff.html
proprietary-deception.ja.po
proprietary-deception.pot
proprietary-deception.ru.po
proprietary-sabotage.de-diff.html
proprietary-sabotage.de.po
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
software : recent-releases-include.af.html
recent-releases-include.ar.html
recent-releases-include.bg.html
recent-releases-include.ca.html
recent-releases-include.cs.html
recent-releases-include.da.html
recent-releases-include.de.html
recent-releases-include.el.html
recent-releases-include.es.html
recent-releases-include.fa.html
recent-releases-include.fr.html
recent-releases-include.he.html
recent-releases-include.hr.html
recent-releases-include.id.html
recent-releases-include.it.html
recent-releases-include.ja.html
recent-releases-include.ko.html
recent-releases-include.lt.html
recent-releases-include.ml.html
recent-releases-include.nb.html
recent-releases-include.nl.html
recent-releases-include.pl.html
recent-releases-include.pt-br.html
recent-releases-include.ro.html
recent-releases-include.ru.html
recent-releases-include.sk.html
recent-releases-include.sq.html
recent-releases-include.sr.html
recent-releases-include.sv.html
recent-releases-include.ta.html
recent-releases-include.te.html
recent-releases-include.tr.html
recent-releases-include.uk.html
recent-releases-include.zh-cn.html
recent-releases-include.zh-tw.html
software/po : recent-releases-include.de.po
recent-releases-include.pot.opt
recent-releases-include.pt-br.po
recent-releases-include.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ar-diff.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ar.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.bg.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.de.po?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.el.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.es.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.fa.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.fr.po?cvsroot=www&r1=1.100&r2=1.101
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.hr-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.hr.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.it.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ja.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.lt-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.lt.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ml.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.nl.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.pl.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.pot?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.pt-br.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ro.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ru.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.sq.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.ta.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.tr.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.uk.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.zh-cn.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/selling-exceptions.de-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/selling-exceptions.de.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/selling-exceptions.es.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/selling-exceptions.fr.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/selling-exceptions.pl-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/selling-exceptions.pl.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/selling-exceptions.pot?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/selling-exceptions.ru.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.pot?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.259&r2=1.260
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.375&r2=1.376
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.272&r2=1.273
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.193&r2=1.194
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.468&r2=1.469
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.af.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ar.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.bg.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ca.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.cs.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.da.html?cvsroot=www&r1=1.558&r2=1.559
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.de.html?cvsroot=www&r1=1.1119&r2=1.1120
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.el.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.es.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.fa.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.fr.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.he.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.hr.html?cvsroot=www&r1=1.877&r2=1.878
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.id.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.it.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ja.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ko.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.lt.html?cvsroot=www&r1=1.676&r2=1.677
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ml.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.nb.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.nl.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.pl.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.pt-br.html?cvsroot=www&r1=1.508&r2=1.509
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ro.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ru.html?cvsroot=www&r1=1.1656&r2=1.1657
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.sk.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.sq.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.sr.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.sv.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.ta.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.te.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.tr.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.uk.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.zh-cn.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/recent-releases-include.zh-tw.html?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/recent-releases-include.de.po?cvsroot=www&r1=1.1213&r2=1.1214
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/recent-releases-include.pot.opt?cvsroot=www&r1=1.920&r2=1.921
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/recent-releases-include.pt-br.po?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/recent-releases-include.ru.po?cvsroot=www&r1=1.2338&r2=1.2339
Patches:
Index: philosophy/po/open-source-misses-the-point.ar-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ar-diff.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- philosophy/po/open-source-misses-the-point.ar-diff.html 20 Feb 2019
10:31:27 -0000 1.23
+++ philosophy/po/open-source-misses-the-point.ar-diff.html 20 Feb 2019
15:30:44 -0000 1.24
@@ -26,13 +26,13 @@
<blockquote class="comment"><p>
The terms “free software” and “open
-source” stand for nearly the same range of software. However,
-they say deeply different things about that software, based on
+source” stand for almost the same range of programs. However,
+they say deeply different things about those programs, based on
different values. The free software movement campaigns for freedom
-for the users of computing; it is a matter of freedom, principle and
-justice. “Open source” values mainly practical
-advantage and does not campaign for principles. Therefore, we do not
-advocate “open source” and do not use that term.
+for the users of computing; it is a movement for freedom and justice.
+By contrast, the open source idea values mainly practical advantage
+and does not campaign for principles. This is why we do not agree
+with open source, and do not use that term.
</p></blockquote></em></ins></span>
<p>When we call software “free,” we mean that it respects
@@ -503,7 +503,7 @@
<span class="inserted"><ins><em><p
class="unprintable">Updated:</em></ins></span>
<!-- timestamp start -->
-$Date: 2019/02/20 10:31:27 $
+$Date: 2019/02/20 15:30:44 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.ar.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ar.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- philosophy/po/open-source-misses-the-point.ar.po 20 Feb 2019 10:31:27
-0000 1.72
+++ philosophy/po/open-source-misses-the-point.ar.po 20 Feb 2019 15:30:44
-0000 1.73
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2014-09-27 17:26+0100\n"
"Last-Translator: Rafik E. Younan <address@hidden>\n"
"Language-Team: Arabic <address@hidden>\n"
@@ -44,12 +44,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.bg.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.bg.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- philosophy/po/open-source-misses-the-point.bg.po 20 Feb 2019 10:31:27
-0000 1.48
+++ philosophy/po/open-source-misses-the-point.bg.po 20 Feb 2019 15:30:44
-0000 1.49
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2009-10-28 14:55+0200\n"
"Last-Translator: Yavor Doganov <address@hidden>\n"
"Language-Team: Bulgarian <address@hidden>\n"
@@ -39,12 +39,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.de.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.de.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- philosophy/po/open-source-misses-the-point.de.po 20 Feb 2019 10:31:27
-0000 1.101
+++ philosophy/po/open-source-misses-the-point.de.po 20 Feb 2019 15:30:45
-0000 1.102
@@ -9,7 +9,7 @@
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
"Report-Msgid-Bugs-To: address@hidden"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2016-08-08 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de <address@hidden>\n"
@@ -41,12 +41,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.el.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.el.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- philosophy/po/open-source-misses-the-point.el.po 20 Feb 2019 10:31:27
-0000 1.15
+++ philosophy/po/open-source-misses-the-point.el.po 20 Feb 2019 15:30:45
-0000 1.16
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: web-translators <address@hidden>\n"
@@ -38,12 +38,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.es.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- philosophy/po/open-source-misses-the-point.es.po 20 Feb 2019 10:31:27
-0000 1.100
+++ philosophy/po/open-source-misses-the-point.es.po 20 Feb 2019 15:30:45
-0000 1.101
@@ -10,7 +10,7 @@
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -47,12 +47,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
# type: Content of: <p>
Index: philosophy/po/open-source-misses-the-point.fa.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.fa.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- philosophy/po/open-source-misses-the-point.fa.po 20 Feb 2019 10:31:27
-0000 1.57
+++ philosophy/po/open-source-misses-the-point.fa.po 20 Feb 2019 15:30:45
-0000 1.58
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2011-01-16 23:22+0330\n"
"Last-Translator: Mahyar Moghimi <address@hidden>\n"
"Language-Team: Persian <address@hidden>\n"
@@ -41,12 +41,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.fr.po,v
retrieving revision 1.100
retrieving revision 1.101
diff -u -b -r1.100 -r1.101
--- philosophy/po/open-source-misses-the-point.fr.po 20 Feb 2019 13:30:28
-0000 1.100
+++ philosophy/po/open-source-misses-the-point.fr.po 20 Feb 2019 15:30:45
-0000 1.101
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-02-20 14:29+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -37,14 +38,34 @@
msgstr "par Richard Stallman"
#. type: Content of: <div><blockquote><p>
+# | The terms “free software” and “open source” stand
+# | for [-nearly-] {+almost+} the same range of [-software.-] {+programs.+}
+# | However, they say deeply different things about [-that software,-] {+those
+# | programs,+} based on different values. The free software movement
+# | campaigns for freedom for the users of computing; it is a [-matter of
+# | freedom, principle-] {+movement for freedom+} and justice. [-“Open
+# | source”-] {+By contrast, the open source idea+} values mainly
+# | practical advantage and does not campaign for principles. [-Therefore,-]
+# | {+This is why+} we do not [-advocate “open source”-] {+agree
+# | with open source,+} and do not use that term.
+#, fuzzy
+#| msgid ""
+#| "The terms “free software” and “open source” stand "
+#| "for nearly the same range of software. However, they say deeply "
+#| "different things about that software, based on different values. The "
+#| "free software movement campaigns for freedom for the users of computing; "
+#| "it is a matter of freedom, principle and justice. “Open "
+#| "source” values mainly practical advantage and does not campaign for "
+#| "principles. Therefore, we do not advocate “open source” and "
+#| "do not use that term."
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
"Les termes « logiciel libre » et « open source » recouvrent à peu
près la "
"même gamme de logiciels. Cependant, ils disent des choses profondément "
Index: philosophy/po/open-source-misses-the-point.hr-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.hr-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/po/open-source-misses-the-point.hr-diff.html 20 Feb 2019
10:31:27 -0000 1.14
+++ philosophy/po/open-source-misses-the-point.hr-diff.html 20 Feb 2019
15:30:45 -0000 1.15
@@ -26,13 +26,13 @@
<blockquote class="comment"><p>
The terms “free software” and “open
-source” stand for nearly the same range of software. However,
-they say deeply different things about that software, based on
+source” stand for almost the same range of programs. However,
+they say deeply different things about those programs, based on
different values. The free software movement campaigns for freedom
-for the users of computing; it is a matter of freedom, principle and
-justice. “Open source” values mainly practical
-advantage and does not campaign for principles. Therefore, we do not
-advocate “open source” and do not use that term.
+for the users of computing; it is a movement for freedom and justice.
+By contrast, the open source idea values mainly practical advantage
+and does not campaign for principles. This is why we do not agree
+with open source, and do not use that term.
</p></blockquote></em></ins></span>
<p>When we call software “free,” we mean that it respects
@@ -133,8 +133,8 @@
<p>Second, and more <span
class="removed"><del><strong>important,</strong></del></span> <span
class="inserted"><ins><em>important in practice,</em></ins></span> many
products containing
computers
<span class="removed"><del><strong>(including many Android devices) come
with</strong></del></span> <span class="inserted"><ins><em>check signatures on
their</em></ins></span> executable programs <span
class="removed"><del><strong>that
-correspond</strong></del></span> to <span class="removed"><del><strong>free
software source code, but the devices do not allow
-the user to install modified versions of those</strong></del></span> <span
class="inserted"><ins><em>block users
+correspond to free software source code, but the devices do not allow
+the user</strong></del></span> to <span class="removed"><del><strong>install
modified versions of those</strong></del></span> <span
class="inserted"><ins><em>block users
from installing different</em></ins></span> executables; only one
<span class="removed"><del><strong>special</strong></del></span> <span
class="inserted"><ins><em>privileged</em></ins></span> company <span
class="removed"><del><strong>has</strong></del></span> <span
class="inserted"><ins><em>can
make executables that can run in</em></ins></span> the <span
class="removed"><del><strong>power to modify them.</strong></del></span> <span
class="inserted"><ins><em>device or can access its full
@@ -501,7 +501,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/20 10:31:27 $
+$Date: 2019/02/20 15:30:45 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.hr.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.hr.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- philosophy/po/open-source-misses-the-point.hr.po 20 Feb 2019 10:31:27
-0000 1.33
+++ philosophy/po/open-source-misses-the-point.hr.po 20 Feb 2019 15:30:45
-0000 1.34
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2014-02-06 22:11+0100\n"
"Last-Translator: Martina Bebek <address@hidden>\n"
"Language-Team: GNU Croatian Translation Team <address@hidden>\n"
@@ -42,12 +42,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.it.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- philosophy/po/open-source-misses-the-point.it.po 20 Feb 2019 10:31:27
-0000 1.75
+++ philosophy/po/open-source-misses-the-point.it.po 20 Feb 2019 15:30:45
-0000 1.76
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2016-07-30 17:23+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian\n"
@@ -40,12 +40,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ja.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- philosophy/po/open-source-misses-the-point.ja.po 20 Feb 2019 10:31:27
-0000 1.71
+++ philosophy/po/open-source-misses-the-point.ja.po 20 Feb 2019 15:30:45
-0000 1.72
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-01-17 16:07+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -37,12 +37,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.lt-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.lt-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/open-source-misses-the-point.lt-diff.html 20 Feb 2019
10:31:27 -0000 1.5
+++ philosophy/po/open-source-misses-the-point.lt-diff.html 20 Feb 2019
15:30:45 -0000 1.6
@@ -26,13 +26,13 @@
<blockquote class="comment"><p>
The terms “free software” and “open
-source” stand for nearly the same range of software. However,
-they say deeply different things about that software, based on
+source” stand for almost the same range of programs. However,
+they say deeply different things about those programs, based on
different values. The free software movement campaigns for freedom
-for the users of computing; it is a matter of freedom, principle and
-justice. “Open source” values mainly practical
-advantage and does not campaign for principles. Therefore, we do not
-advocate “open source” and do not use that term.
+for the users of computing; it is a movement for freedom and justice.
+By contrast, the open source idea values mainly practical advantage
+and does not campaign for principles. This is why we do not agree
+with open source, and do not use that term.
</p></blockquote></em></ins></span>
<p>When we call software “free,” we mean that it respects
@@ -490,7 +490,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/20 10:31:27 $
+$Date: 2019/02/20 15:30:45 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/open-source-misses-the-point.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.lt.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- philosophy/po/open-source-misses-the-point.lt.po 20 Feb 2019 10:31:27
-0000 1.15
+++ philosophy/po/open-source-misses-the-point.lt.po 20 Feb 2019 15:30:46
-0000 1.16
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2016-01-15 02:06+0200\n"
"Last-Translator: Donatas Klimašauskas <address@hidden>\n"
"Language-Team: Lithuanian <address@hidden>\n"
@@ -42,12 +42,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.ml.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ml.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- philosophy/po/open-source-misses-the-point.ml.po 20 Feb 2019 10:31:27
-0000 1.56
+++ philosophy/po/open-source-misses-the-point.ml.po 20 Feb 2019 15:30:46
-0000 1.57
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html 1\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2010-07-13 08:18+0530\n"
"Last-Translator: Shyam Karanattu <address@hidden>\n"
"Language-Team: Swathanthra Malayalam Computing <address@hidden"
@@ -41,12 +41,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.nl.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- philosophy/po/open-source-misses-the-point.nl.po 20 Feb 2019 10:31:27
-0000 1.45
+++ philosophy/po/open-source-misses-the-point.nl.po 20 Feb 2019 15:30:46
-0000 1.46
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch\n"
@@ -41,12 +41,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
# Opmerkingskoppeling ingevoegd (zoals beschreven op
https://www.gnu.org/software/trans-coord/manual/gnun/gnun.html#Notes-Slot )
Index: philosophy/po/open-source-misses-the-point.pl.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.pl.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- philosophy/po/open-source-misses-the-point.pl.po 20 Feb 2019 10:31:27
-0000 1.72
+++ philosophy/po/open-source-misses-the-point.pl.po 20 Feb 2019 15:30:46
-0000 1.73
@@ -8,7 +8,7 @@
msgstr ""
"Project-Id-Version: Why Open Source misses the point of Free Software\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-05-01 10:34-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -43,12 +43,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.pot
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.pot,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- philosophy/po/open-source-misses-the-point.pot 20 Feb 2019 10:31:27
-0000 1.44
+++ philosophy/po/open-source-misses-the-point.pot 20 Feb 2019 15:30:46
-0000 1.45
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -33,12 +33,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.pt-br.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- philosophy/po/open-source-misses-the-point.pt-br.po 20 Feb 2019 10:31:27
-0000 1.36
+++ philosophy/po/open-source-misses-the-point.pt-br.po 20 Feb 2019 15:30:46
-0000 1.37
@@ -10,7 +10,7 @@
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
"Report-Msgid-Bugs-To: \n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2016-11-13 17:13-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -44,12 +44,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.ro.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ro.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- philosophy/po/open-source-misses-the-point.ro.po 20 Feb 2019 10:31:27
-0000 1.40
+++ philosophy/po/open-source-misses-the-point.ro.po 20 Feb 2019 15:30:46
-0000 1.41
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2010-08-27 20:00+0300\n"
"Last-Translator: CÄtÄlin Frâncu <address@hidden>\n"
"Language-Team: Romanian <address@hidden>\n"
@@ -39,12 +39,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ru.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- philosophy/po/open-source-misses-the-point.ru.po 20 Feb 2019 10:31:27
-0000 1.95
+++ philosophy/po/open-source-misses-the-point.ru.po 20 Feb 2019 15:30:46
-0000 1.96
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-01-29 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -48,12 +48,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
# type: Content of: <p>
Index: philosophy/po/open-source-misses-the-point.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.sq.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- philosophy/po/open-source-misses-the-point.sq.po 20 Feb 2019 10:31:27
-0000 1.72
+++ philosophy/po/open-source-misses-the-point.sq.po 20 Feb 2019 15:30:46
-0000 1.73
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-12-25 00:07+0200\n"
"Last-Translator: Besnik Bleta <address@hidden>\n"
"Language-Team: Albanian <address@hidden>\n"
@@ -38,12 +38,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.ta.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.ta.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/open-source-misses-the-point.ta.po 20 Feb 2019 10:31:27
-0000 1.2
+++ philosophy/po/open-source-misses-the-point.ta.po 20 Feb 2019 15:30:46
-0000 1.3
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: web-translators <address@hidden>\n"
@@ -38,12 +38,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.tr.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- philosophy/po/open-source-misses-the-point.tr.po 20 Feb 2019 10:31:27
-0000 1.42
+++ philosophy/po/open-source-misses-the-point.tr.po 20 Feb 2019 15:30:46
-0000 1.43
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2010-05-16 16:54+0200\n"
"Last-Translator: Tahir Emre Kalaycı <address@hidden>\n"
"Language-Team: Turkish <address@hidden>\n"
@@ -40,12 +40,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.uk.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- philosophy/po/open-source-misses-the-point.uk.po 20 Feb 2019 10:31:27
-0000 1.41
+++ philosophy/po/open-source-misses-the-point.uk.po 20 Feb 2019 15:30:46
-0000 1.42
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: open-source-misses-the-point.html\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2016-08-04 07:30+0200\n"
"Last-Translator: Andriy Bandura <address@hidden>\n"
"Language-Team: Ukrainian <>\n"
@@ -40,12 +40,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/open-source-misses-the-point.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.zh-cn.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- philosophy/po/open-source-misses-the-point.zh-cn.po 20 Feb 2019 10:31:27
-0000 1.50
+++ philosophy/po/open-source-misses-the-point.zh-cn.po 20 Feb 2019 15:30:46
-0000 1.51
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: 1.0\n"
-"POT-Creation-Date: 2019-02-20 10:28+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-01-31 20:40+0800\n"
"Last-Translator: Wensheng Xie <address@hidden>\n"
"Language-Team: Chinese <address@hidden>\n"
@@ -36,12 +36,12 @@
#. type: Content of: <div><blockquote><p>
msgid ""
"The terms “free software” and “open source” stand "
-"for nearly the same range of software. However, they say deeply different "
-"things about that software, based on different values. The free software "
-"movement campaigns for freedom for the users of computing; it is a matter of "
-"freedom, principle and justice. “Open source” values mainly "
-"practical advantage and does not campaign for principles. Therefore, we do "
-"not advocate “open source” and do not use that term."
+"for almost the same range of programs. However, they say deeply different "
+"things about those programs, based on different values. The free software "
+"movement campaigns for freedom for the users of computing; it is a movement "
+"for freedom and justice. By contrast, the open source idea values mainly "
+"practical advantage and does not campaign for principles. This is why we do "
+"not agree with open source, and do not use that term."
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/selling-exceptions.de-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/selling-exceptions.de-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/po/selling-exceptions.de-diff.html 15 Dec 2018 14:46:40
-0000 1.4
+++ philosophy/po/selling-exceptions.de-diff.html 20 Feb 2019 15:30:46
-0000 1.5
@@ -22,10 +22,11 @@
<p>by <a href="http://www.stallman.org/">Richard
Stallman</a></p>
<p>Selling exceptions means that the copyright holder of the code
-releases it to the public under a free software license, then lets
-customers pay for permission to use the same code under different
-terms, for instance allowing its inclusion in proprietary
-applications.</p>
+releases it to the <span class="inserted"><ins><em>general</em></ins></span>
public under a <span class="inserted"><ins><em>valid</em></ins></span> free
software license,
+then <span class="removed"><del><strong>lets
+customers pay</strong></del></span> <span class="inserted"><ins><em>separately
offers users the option of paying</em></ins></span> for permission to
+use the same code under different terms, for instance <span
class="inserted"><ins><em>terms</em></ins></span> allowing
+its inclusion in proprietary applications.</p>
<p>We must distinguish the practice of selling exceptions from something
crucially different: purely proprietary extensions or versions of
@@ -177,7 +178,7 @@
information on coordinating and submitting translations of this
article.</p>
</div>
-<p>Copyright © 2009, 2010, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2009, 2010, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -187,7 +188,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/12/15 14:46:40 $
+$Date: 2019/02/20 15:30:46 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/selling-exceptions.de.po
===================================================================
RCS file: /web/www/www/philosophy/po/selling-exceptions.de.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- philosophy/po/selling-exceptions.de.po 1 Jan 2018 06:22:07 -0000
1.34
+++ philosophy/po/selling-exceptions.de.po 20 Feb 2019 15:30:46 -0000
1.35
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: selling-exceptions.html\n"
-"POT-Creation-Date: 2018-01-01 05:59+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-04-27 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -33,11 +33,23 @@
"von <strong><a href=\"//www.stallman.org/\">Richard Stallman</a></strong>"
#. type: Content of: <p>
+# | Selling exceptions means that the copyright holder of the code releases it
+# | to the {+general+} public under a {+valid+} free software license, then
+# | [-lets customers pay-] {+separately offers users the option of paying+}
+# | for permission to use the same code under different terms, for instance
+# | {+terms+} allowing its inclusion in proprietary applications.
+#, fuzzy
+#| msgid ""
+#| "Selling exceptions means that the copyright holder of the code releases "
+#| "it to the public under a free software license, then lets customers pay "
+#| "for permission to use the same code under different terms, for instance "
+#| "allowing its inclusion in proprietary applications."
msgid ""
"Selling exceptions means that the copyright holder of the code releases it "
-"to the public under a free software license, then lets customers pay for "
-"permission to use the same code under different terms, for instance allowing "
-"its inclusion in proprietary applications."
+"to the general public under a valid free software license, then separately "
+"offers users the option of paying for permission to use the same code under "
+"different terms, for instance terms allowing its inclusion in proprietary "
+"applications."
msgstr ""
"Der Verkauf von Ausnahmen bedeutet, dass der Urheberrechtsinhaber des "
"Quellcodes diesen unter einer freien Softwarelizenz der Ãffentlichkeit "
@@ -371,11 +383,12 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © 2009, 2010, 2015, 2016, [-2017-] {+2017, 2018+} Richard
-# | Stallman
+# | Copyright © 2009, 2010, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
+# | Richard Stallman
#, fuzzy
#| msgid "Copyright © 2009, 2010, 2015, 2016, 2017 Richard Stallman"
-msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
+msgid ""
+"Copyright © 2009, 2010, 2015, 2016, 2017, 2018, 2019 Richard Stallman"
msgstr "Copyright © 2009, 2010, 2015, 2016, 2017 Richard Stallman."
#. type: Content of: <div><p>
Index: philosophy/po/selling-exceptions.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/selling-exceptions.es.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- philosophy/po/selling-exceptions.es.po 19 Jan 2018 01:01:57 -0000
1.18
+++ philosophy/po/selling-exceptions.es.po 20 Feb 2019 15:30:46 -0000
1.19
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: selling-exceptions.html\n"
-"POT-Creation-Date: 2018-01-01 05:59+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-01-18 23:08+0100\n"
"Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -18,6 +18,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.6.10\n"
@@ -38,11 +39,23 @@
msgstr "por <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <p>
+# | Selling exceptions means that the copyright holder of the code releases it
+# | to the {+general+} public under a {+valid+} free software license, then
+# | [-lets customers pay-] {+separately offers users the option of paying+}
+# | for permission to use the same code under different terms, for instance
+# | {+terms+} allowing its inclusion in proprietary applications.
+#, fuzzy
+#| msgid ""
+#| "Selling exceptions means that the copyright holder of the code releases "
+#| "it to the public under a free software license, then lets customers pay "
+#| "for permission to use the same code under different terms, for instance "
+#| "allowing its inclusion in proprietary applications."
msgid ""
"Selling exceptions means that the copyright holder of the code releases it "
-"to the public under a free software license, then lets customers pay for "
-"permission to use the same code under different terms, for instance allowing "
-"its inclusion in proprietary applications."
+"to the general public under a valid free software license, then separately "
+"offers users the option of paying for permission to use the same code under "
+"different terms, for instance terms allowing its inclusion in proprietary "
+"applications."
msgstr ""
"La venta de excepciones significa que el titular del copyright sobre el "
"código lo publica bajo una licencia de software libre y ofrece a sus "
@@ -367,7 +380,12 @@
"de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
+# | Copyright © 2009, 2010, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
+# | Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
+msgid ""
+"Copyright © 2009, 2010, 2015, 2016, 2017, 2018, 2019 Richard Stallman"
msgstr "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/selling-exceptions.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/selling-exceptions.fr.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- philosophy/po/selling-exceptions.fr.po 27 Oct 2018 13:42:52 -0000
1.24
+++ philosophy/po/selling-exceptions.fr.po 20 Feb 2019 15:30:46 -0000
1.25
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: selling-exceptions.html\n"
-"POT-Creation-Date: 2018-01-01 05:59+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-10-27 15:41+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"Plural-Forms: \n"
#. type: Content of: <title>
@@ -31,11 +32,23 @@
msgstr "par <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <p>
+# | Selling exceptions means that the copyright holder of the code releases it
+# | to the {+general+} public under a {+valid+} free software license, then
+# | [-lets customers pay-] {+separately offers users the option of paying+}
+# | for permission to use the same code under different terms, for instance
+# | {+terms+} allowing its inclusion in proprietary applications.
+#, fuzzy
+#| msgid ""
+#| "Selling exceptions means that the copyright holder of the code releases "
+#| "it to the public under a free software license, then lets customers pay "
+#| "for permission to use the same code under different terms, for instance "
+#| "allowing its inclusion in proprietary applications."
msgid ""
"Selling exceptions means that the copyright holder of the code releases it "
-"to the public under a free software license, then lets customers pay for "
-"permission to use the same code under different terms, for instance allowing "
-"its inclusion in proprietary applications."
+"to the general public under a valid free software license, then separately "
+"offers users the option of paying for permission to use the same code under "
+"different terms, for instance terms allowing its inclusion in proprietary "
+"applications."
msgstr ""
"Vendre des exceptions veut dire que le détenteur du copyright sur le code le
"
"met à la disposition du public sous une licence de logiciel libre, puis "
@@ -364,7 +377,12 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
+# | Copyright © 2009, 2010, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
+# | Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
+msgid ""
+"Copyright © 2009, 2010, 2015, 2016, 2017, 2018, 2019 Richard Stallman"
msgstr "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/selling-exceptions.pl-diff.html
===================================================================
RCS file: /web/www/www/philosophy/po/selling-exceptions.pl-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- philosophy/po/selling-exceptions.pl-diff.html 15 Dec 2018 14:46:41
-0000 1.7
+++ philosophy/po/selling-exceptions.pl-diff.html 20 Feb 2019 15:30:46
-0000 1.8
@@ -31,10 +31,11 @@
article explains what I think of the practice, and
why.</p></strong></del></span>
<p>Selling exceptions means that the copyright holder of the code
-releases it to the public under a free software license, then lets
-customers pay for permission to use the same code under different
-terms, for instance allowing its inclusion in proprietary
-applications.</p>
+releases it to the <span class="inserted"><ins><em>general</em></ins></span>
public under a <span class="inserted"><ins><em>valid</em></ins></span> free
software license,
+then <span class="removed"><del><strong>lets
+customers pay</strong></del></span> <span class="inserted"><ins><em>separately
offers users the option of paying</em></ins></span> for permission to
+use the same code under different terms, for instance <span
class="inserted"><ins><em>terms</em></ins></span> allowing
+its inclusion in proprietary applications.</p>
<p>We must distinguish the practice of selling exceptions from something
crucially different: purely proprietary extensions or versions of
@@ -195,7 +196,7 @@
information on coordinating and submitting translations of this
article.</p>
</div>
-<p>Copyright © 2009, 2010, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017, 2018</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2009, 2010, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -205,7 +206,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/12/15 14:46:41 $
+$Date: 2019/02/20 15:30:46 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/selling-exceptions.pl.po
===================================================================
RCS file: /web/www/www/philosophy/po/selling-exceptions.pl.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/po/selling-exceptions.pl.po 1 Jan 2018 06:22:07 -0000
1.19
+++ philosophy/po/selling-exceptions.pl.po 20 Feb 2019 15:30:46 -0000
1.20
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: selling-exceptions.html\n"
-"POT-Creation-Date: 2018-01-01 05:59+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2016-02-29 20:55-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -35,11 +35,23 @@
msgstr "<a href=\"http://www.stallman.org/\">Richard Stallman</a>"
#. type: Content of: <p>
+# | Selling exceptions means that the copyright holder of the code releases it
+# | to the {+general+} public under a {+valid+} free software license, then
+# | [-lets customers pay-] {+separately offers users the option of paying+}
+# | for permission to use the same code under different terms, for instance
+# | {+terms+} allowing its inclusion in proprietary applications.
+#, fuzzy
+#| msgid ""
+#| "Selling exceptions means that the copyright holder of the code releases "
+#| "it to the public under a free software license, then lets customers pay "
+#| "for permission to use the same code under different terms, for instance "
+#| "allowing its inclusion in proprietary applications."
msgid ""
"Selling exceptions means that the copyright holder of the code releases it "
-"to the public under a free software license, then lets customers pay for "
-"permission to use the same code under different terms, for instance allowing "
-"its inclusion in proprietary applications."
+"to the general public under a valid free software license, then separately "
+"offers users the option of paying for permission to use the same code under "
+"different terms, for instance terms allowing its inclusion in proprietary "
+"applications."
msgstr ""
"Sprzedaż na innej licencji oznacza, że wÅaÅciciel praw
autorskich "
"do danego kodu źródÅowego udostÄpnia go na zasadach licencji "
@@ -420,11 +432,12 @@
"tÅumaczeÅ</a>."
#. type: Content of: <div><p>
-# | Copyright © 2009, 2010, 2015, [-2016-] {+2016, 2017, 2018+} Richard
-# | Stallman
+# | Copyright © 2009, 2010, 2015, [-2016-] {+2016, 2017, 2018, 2019+}
+# | Richard Stallman
#, fuzzy
#| msgid "Copyright © 2009, 2010, 2015, 2016 Richard Stallman"
-msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
+msgid ""
+"Copyright © 2009, 2010, 2015, 2016, 2017, 2018, 2019 Richard Stallman"
msgstr "Copyright © 2009, 2010, 2015, 2016 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/selling-exceptions.pot
===================================================================
RCS file: /web/www/www/philosophy/po/selling-exceptions.pot,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/po/selling-exceptions.pot 1 Jan 2018 06:22:07 -0000
1.19
+++ philosophy/po/selling-exceptions.pot 20 Feb 2019 15:30:46 -0000
1.20
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: selling-exceptions.html\n"
-"POT-Creation-Date: 2018-01-01 05:59+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -31,9 +31,10 @@
#. type: Content of: <p>
msgid ""
"Selling exceptions means that the copyright holder of the code releases it "
-"to the public under a free software license, then lets customers pay for "
-"permission to use the same code under different terms, for instance allowing "
-"its inclusion in proprietary applications."
+"to the general public under a valid free software license, then separately "
+"offers users the option of paying for permission to use the same code under "
+"different terms, for instance terms allowing its inclusion in proprietary "
+"applications."
msgstr ""
#. type: Content of: <p>
@@ -235,7 +236,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
+msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018, 2019 Richard
Stallman"
msgstr ""
#. type: Content of: <div><p>
Index: philosophy/po/selling-exceptions.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/selling-exceptions.ru.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- philosophy/po/selling-exceptions.ru.po 29 Jan 2019 09:01:19 -0000
1.31
+++ philosophy/po/selling-exceptions.ru.po 20 Feb 2019 15:30:46 -0000
1.32
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: selling-exceptions.html\n"
-"POT-Creation-Date: 2018-01-01 05:59+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-01-29 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
#. type: Content of: <title>
msgid ""
@@ -34,11 +35,23 @@
msgstr "<a href=\"http://www.stallman.org/\">РиÑаÑд СÑолмен</a>"
#. type: Content of: <p>
+# | Selling exceptions means that the copyright holder of the code releases it
+# | to the {+general+} public under a {+valid+} free software license, then
+# | [-lets customers pay-] {+separately offers users the option of paying+}
+# | for permission to use the same code under different terms, for instance
+# | {+terms+} allowing its inclusion in proprietary applications.
+#, fuzzy
+#| msgid ""
+#| "Selling exceptions means that the copyright holder of the code releases "
+#| "it to the public under a free software license, then lets customers pay "
+#| "for permission to use the same code under different terms, for instance "
+#| "allowing its inclusion in proprietary applications."
msgid ""
"Selling exceptions means that the copyright holder of the code releases it "
-"to the public under a free software license, then lets customers pay for "
-"permission to use the same code under different terms, for instance allowing "
-"its inclusion in proprietary applications."
+"to the general public under a valid free software license, then separately "
+"offers users the option of paying for permission to use the same code under "
+"different terms, for instance terms allowing its inclusion in proprietary "
+"applications."
msgstr ""
"ÐлаÑнÑе иÑклÑÑÐµÐ½Ð¸Ñ Ð¾Ð·Ð½Ð°ÑаÑÑ, ÑÑо
пÑавообладаÑÐµÐ»Ñ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð²ÑпÑÑÐºÐ°ÐµÑ \n"
"ее в ÑÐ²ÐµÑ Ð¿Ð¾Ð´ Ñвободной лиÑензией и заÑем
пÑедоÑÑавлÑÐµÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ \n"
@@ -363,7 +376,12 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
+# | Copyright © 2009, 2010, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
+# | Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman"
+msgid ""
+"Copyright © 2009, 2010, 2015, 2016, 2017, 2018, 2019 Richard Stallman"
msgstr ""
"Copyright © 2009, 2010, 2015, 2016, 2017, 2018 Richard Stallman<br /"
">Copyright © 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/de.po 16 Feb 2019 18:30:11 -0000 1.29
+++ proprietary/po/de.po 20 Feb 2019 15:30:47 -0000 1.30
@@ -7153,6 +7153,33 @@
"of users' devices."
msgstr ""
+# | Mobile [-Tyrants-] {+Sabotage+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "Smartphones als Tyrannen"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Ãberwachung in Smartphones"
@@ -9137,6 +9164,17 @@
"Dieses Dokument berichtet von Fällen, in denen proprietäre Software
unlauter "
"ist oder Täuschung oder Hinterlist verbirgt."
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
# | Many proprietary programs secretly <a
# |
[-href=\"https://web.archive.org/web/20160901222135/http://www.theregister.co.uk/2016/08/05/payperinstall_study/\">install-]
# |
{+href=\"https://www.theregister.co.uk/2016/08/05/payperinstall_study/\">install+}
@@ -11019,6 +11057,18 @@
"\">#SpywareInMobileApps</a>)</span>"
msgstr " "
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr ""
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/es.po 18 Feb 2019 10:58:47 -0000 1.38
+++ proprietary/po/es.po 20 Feb 2019 15:30:47 -0000 1.39
@@ -5160,6 +5160,33 @@
"facebook\">among others</a>) están dando un paso más en su secuestro de los
"
"dispositivos de los usuarios."
+# | Mobile [-Tyrants-] {+Sabotage+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "Móviles tiranos"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Vigilancia en los móviles"
@@ -6798,6 +6825,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many proprietary programs secretly <a href=\"https://www.theregister.co."
"uk/2016/08/05/payperinstall_study/\">install other proprietary programs that "
"the users don't want</a>."
@@ -8125,6 +8163,18 @@
"\">#SpywareInMobileApps</a>)</span>"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr ""
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/fr.po 16 Feb 2019 18:30:11 -0000 1.53
+++ proprietary/po/fr.po 20 Feb 2019 15:30:47 -0000 1.54
@@ -5623,6 +5623,33 @@
"they-can-t-delete-facebook\">parmi d'autres</a>) vont encore plus loin dans "
"le piratage des appareils des utilisateurs."
+# | Mobile [-Tyrants-] {+Sabotage+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "Tyrans"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Surveillance"
@@ -7381,6 +7408,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many proprietary programs secretly <a href=\"https://www.theregister.co."
"uk/2016/08/05/payperinstall_study/\">install other proprietary programs that "
"the users don't want</a>."
@@ -8847,6 +8885,18 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
"\">#SpywareInMobileApps</a>)</span>"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr "Skype"
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/it.po 16 Feb 2019 18:30:11 -0000 1.29
+++ proprietary/po/it.po 20 Feb 2019 15:30:47 -0000 1.30
@@ -6726,6 +6726,33 @@
"of users' devices."
msgstr ""
+# | Mobile [-Tyrants-] {+Sabotage+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "Tiranni in dispositivi mobili"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Sorveglianza in dispositivi mobili"
@@ -8528,6 +8555,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many proprietary programs secretly <a href=\"https://www.theregister.co."
"uk/2016/08/05/payperinstall_study/\">install other proprietary programs that "
"the users don't want</a>."
@@ -10310,6 +10348,18 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
"\">#SpywareInMobileApps</a>)</span>"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr ""
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/ja.po 16 Feb 2019 18:30:11 -0000 1.29
+++ proprietary/po/ja.po 20 Feb 2019 15:30:47 -0000 1.30
@@ -5703,6 +5703,32 @@
msgstr ""
#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "ã¢ãã¤ã«ã®æ´å"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "ã¢ãã¤ã«ã®ç£è¦"
@@ -7204,6 +7230,17 @@
"ä¾ãå ±åãã¾ãã"
#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
#| "Many proprietary programs secretly <a href=\"https://web.archive.org/"
@@ -8764,6 +8801,18 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
"\">#SpywareInMobileApps</a>)</span>"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr ""
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/malware-mobiles.de-diff.html 13 Feb 2019 12:00:24 -0000
1.41
+++ proprietary/po/malware-mobiles.de-diff.html 20 Feb 2019 15:30:47 -0000
1.42
@@ -140,7 +140,7 @@
to restrict what users can do with the data in their computers.</li>
<li><a <span
class="inserted"><ins><em>href="#insecurity">Insecurity</a></li>
<li><a href="#interference">Interference</a></li>
-<!--<li><a href="#sabotage">Sabotage</a></li>-->
+ <li><a href="#sabotage">Sabotage</a></li>
<li><a href="#surveillance">Surveillance</a></li>
<li><a</em></ins></span>
href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>
@@ -336,43 +336,58 @@
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
WhatsApp messages are not entirely deleted</a>. They can be
recovered</em></ins></span>
- in <span class="inserted"><ins><em>various ways.</p>
+ in <span class="removed"><del><strong>user's address
+ book to developer's server. Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>various ways.</p></em></ins></span>
</li>
- <li id="M201607280">
- <p>A half-blind security critique of a tracking app: it found that
<a
-
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
- blatant flaws allowed anyone to snoop on a</em></ins></span> user's <span
class="removed"><del><strong>address
- book</strong></del></span> <span class="inserted"><ins><em>personal
data</a>.
- The critique fails entirely</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>express concern</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span> the
<span class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>app
sends the
- personal data</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>a
server, where the <em>developer</em> gets it all.
+ <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607280">
+ <p>A half-blind security critique</em></ins></span> of <span
class="removed"><del><strong>data to China</a>.</p></li>
+
+<li>
+ <p>Facebook's app listens all the time,</strong></del></span> <span
class="inserted"><ins><em>a tracking app: it found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+ blatant flaws allowed anyone to</em></ins></span> snoop on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>a user's personal data</a>.
+ The critique fails entirely</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p>
+</li>
+
+
+<li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security
+ of 283 Android VPN apps concluded</strong></del></span> <span
class="inserted"><ins><em>express concern</em></ins></span> that <span
class="removed"><del><strong>“in spite of</strong></del></span> the
+ <span class="removed"><del><strong>promises for privacy, security, and
anonymity given by</strong></del></span> <span class="inserted"><ins><em>app
sends</em></ins></span> the
+ <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject</strong></del></span>
+ <span class="inserted"><ins><em>personal data</em></ins></span> to <span
class="removed"><del><strong>poor security guarantees</strong></del></span>
<span class="inserted"><ins><em>a server, where the
<em>developer</em> gets it all.
This “service” is for suckers!</p>
- <p>The server surely has a “privacy policy,” and surely
- it is worthless since nearly all of them are.</p></em></ins></span>
- </li>
+ <p>The server surely has a “privacy
policy,”</em></ins></span> and <span class="removed"><del><strong>abusive
practices inflicted by
+ VPN apps.”</p>
- <span class="removed"><del><strong><li><p>Some
portable</strong></del></span>
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>surely
+ it</em></ins></span> is <span class="inserted"><ins><em>worthless since
nearly all of them are.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201607190">
- <p>A bug in a proprietary ASN.1 library, used
- in cell phone towers as well as cell</em></ins></span> phones <span
class="inserted"><ins><em>and routers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+ <li id="M201607190">
+ <p>A bug in</em></ins></span> a <span
class="removed"><del><strong>non-exhaustive list</strong></del></span> <span
class="inserted"><ins><em>proprietary ASN.1 library, used
+ in cell phone towers as well as cell phones and routers, <a
+
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
taking control</em></ins></span> of <span class="inserted"><ins><em>those
systems</a>.</p>
</li>
<li id="M201603100">
- <p>Many proprietary payment apps <a
+ <p>Many</em></ins></span> proprietary <span
class="removed"><del><strong>VPN</strong></del></span> <span
class="inserted"><ins><em>payment</em></ins></span> apps <span
class="removed"><del><strong>from</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
- personal</em></ins></span> data <span class="removed"><del><strong>to
China</a>.</p></li>
-
-<li>
- <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>in an insecure way</a>.
However,</em></ins></span>
- the <span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>worse aspect of these apps is that</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">payment
is not
+ personal data in an insecure way</a>. However,</em></ins></span>
+ the <span class="removed"><del><strong>research
paper</strong></del></span> <span class="inserted"><ins><em>worse aspect of
these apps is</em></ins></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/philosophy/surveillance-vs-democracy.html">payment is not
anonymous</a>.</p>
</li>
@@ -380,33 +395,28 @@
<p><a
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
- your personal data</em></ins></span> on <span
class="removed"><del><strong>what people</strong></del></span> <span
class="inserted"><ins><em>remote servers</a>. This leaves personal
- information like email addresses, passwords, and health information
- vulnerable. Because many of these apps</em></ins></span> are <span
class="removed"><del><strong>listening to or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>proprietary</em></ins></span> it <span
class="removed"><del><strong>may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>makes it
- hard</em></ins></span> to <span class="removed"><del><strong>serve them
with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>impossible to know which apps are at
risk.</p></em></ins></span>
- </li>
+ your personal data on remote servers</a>. This leaves personal
+ information like email addresses, passwords,</em></ins></span> and <span
class="removed"><del><strong>infringes the privacy</strong></del></span> <span
class="inserted"><ins><em>health information
+ vulnerable. Because many</em></ins></span> of
+ <span class="removed"><del><strong>users:</p>
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant</strong></del></span> <span class="inserted"><ins><em>these apps
are proprietary it makes it
+ hard</em></ins></span> to <span class="removed"><del><strong>track users
and show them targeted</strong></del></span> <span
class="inserted"><ins><em>impossible to know which apps are at risk.</p>
+ </li>
-<span class="removed"><del><strong><li>
- <p>A</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405190">
+ <li id="M201405190">
<p>An app to prevent “identity theft”
- (access to personal data) by storing users' data on a special
server</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy
and</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
- deactivated by its developer</a> which had discovered
a</em></ins></span> security
- <span class="removed"><del><strong>of 283 Android VPN apps
concluded</strong></del></span>
- <span class="inserted"><ins><em>flaw.</p>
+ (access to personal data) by storing users' data on a special server <a
+
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
+ deactivated by its developer</a> which had discovered a security
+ flaw.</p>
<p>That developer seems to be conscientious about protecting personal
- data from third parties in general, but it can't protect</em></ins></span>
that <span class="removed"><del><strong>“in spite
of</strong></del></span> <span class="inserted"><ins><em>data
- from</em></ins></span> the
- <span class="removed"><del><strong>promises for privacy, security, and
anonymity given by</strong></del></span> <span class="inserted"><ins><em>state.
Quite</em></ins></span> the
- <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject
- to</strong></del></span> <span class="inserted"><ins><em>contrary:
confiding your data to someone
+ data from third parties in general, but it can't protect that data
+ from the state. Quite the contrary: confiding your data to someone
else's server, if not first encrypted by you with free software,
undermines your rights.</p>
</li>
@@ -454,6 +464,33 @@
</li>
</ul>
+<h3 id="sabotage">Mobile Sabotage</h3>
+
+<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
+ <li id="M201810240">
+ <p>Apple and Samsung deliberately <a
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
+ the performance of older phones to force users to buy their newer
+ phones</a>.</p>
+ </li>
+</ul>
+
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
@@ -718,21 +755,17 @@
research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject to</em></ins></span>
poor security
+ apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive <span
class="removed"><del><strong>list</strong></del></span> <span
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
- of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN
apps <span class="removed"><del><strong>from
- the research paper</strong></del></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>track users</em></ins></span> and <span
class="removed"><del><strong>infringes the privacy of
- users:</p>
-
- <dl></strong></del></span> <span class="inserted"><ins><em>infringe
their
+ <p>Following is a non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
privacy:</p>
- <dl class="compact"></em></ins></span>
+ <dl class="compact">
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+ meant to track users and show them targeted</em></ins></span>
ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
@@ -811,67 +844,66 @@
<p>Faceapp appears to do lots of surveillance, judging by
<a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access</strong></del></span> <span
class="inserted"><ins><em>watching</a>. In addition,</em></ins></span>
- it <span class="removed"><del><strong>demands</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span
class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
- advertisements.</p>
+ it <span class="removed"><del><strong>demands</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span class="removed"><del><strong>personal
data in the device</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
+ advertisements.</p></em></ins></span>
</li>
- <li id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of</em></ins></span> data in the <span
class="removed"><del><strong>device</a>.
- </p>
- </li>
+<span class="removed"><del><strong><li>
+ <p>Pairs of Android apps</strong></del></span>
-<li>
- <p>Pairs of Android apps</strong></del></span> <span
class="inserted"><ins><em>phone, and in server accounts,
- it</em></ins></span> can <span class="removed"><del><strong>collude to
transmit users' personal data
- to servers.</strong></del></span> <span class="inserted"><ins><em>alter
them too</a>.</p>
+ <span class="inserted"><ins><em><li id="M201604250">
+ <p>A pregnancy test controller application not
only</em></ins></span> can <span class="removed"><del><strong>collude to
transmit users' personal data
+ to servers.</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude.</a></p></strong></del></span> <span
class="inserted"><ins><em>data in the phone, and in server accounts,
+ it can alter them too</a>.</p></em></ins></span>
</li>
- <li id="M201601130">
- <p>Apps that include</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands</strong></del></span>
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601130">
+ <p>Apps that include</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of</strong></del></span>
<span
class="inserted"><ins><em>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
- are playing nearby</a>. Also on what users post on various sites
+ are playing nearby</a>. Also on what</em></ins></span> users <span
class="removed"><del><strong>that install the app</a>.</p>
+
+<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>post on various sites
such as Facebook, Google+ and Twitter.</p>
</li>
<li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>pairs that
collude.</a></p></strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones is <a
+ <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>monitoring
+ people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
- proprietary software to make sure they can't “fool”
- the monitoring</a>.</p></em></ins></span>
+ proprietary software</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this
point,</strong></del></span> <span class="inserted"><ins><em>make sure they
can't “fool”
+ the monitoring</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends app developers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511190">
+ <li id="M201511190">
<p>“Cryptic communication,”
- unrelated to the app's functionality, was</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</em></ins></span> the <span class="removed"><del><strong>personal
details of users</strong></del></span> <span class="inserted"><ins><em>500 most
popular gratis Android apps</a>.</p>
+ unrelated to the app's functionality, was <a
+
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500</em></ins></span> most <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>popular gratis Android apps</a>.</p>
- <p>The article should not have described these apps as
+ <p>The article should not</em></ins></span> have
+<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>described these apps as
“free”—they are not free software. The clear way
to say “zero price” is “gratis.”</p>
- <p>The article takes for granted</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
-
-<p>Merely asking</strong></del></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>usual analytics
tools are
- legitimate, but</em></ins></span> is <span
class="removed"><del><strong>not enough</strong></del></span> <span
class="inserted"><ins><em>that valid? Software developers have no
right</em></ins></span> to <span class="removed"><del><strong>legitimize
actions like this. At this point, most</strong></del></span>
- <span class="inserted"><ins><em>analyze what</em></ins></span> users <span
class="removed"><del><strong>have
-stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>are doing or how. “Analytics”
tools</em></ins></span>
- that <span class="removed"><del><strong>spell out
-what they</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
+ legitimate, but is</em></ins></span> that <span
class="removed"><del><strong>spell out</strong></del></span> <span
class="inserted"><ins><em>valid? Software developers have no right to
+ analyze</em></ins></span> what <span
class="removed"><del><strong>they</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> are <span
class="removed"><del><strong>“consenting” to. Google should clearly
and honestly identify the information it collects on users, instead
of hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
-and</strong></del></span> <span class="inserted"><ins><em>just as wrong as
any</em></ins></span> other <span class="removed"><del><strong>companies from
getting this personal information in the first
+and</strong></del></span> <span class="inserted"><ins><em>doing or how.
“Analytics” tools
+ that snoop are just as wrong as any</em></ins></span> other <span
class="removed"><del><strong>companies from getting this personal information
in the first
place!</p></strong></del></span> <span
class="inserted"><ins><em>snooping.</p></em></ins></span>
</li>
@@ -1232,7 +1264,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/13 12:00:24 $
+$Date: 2019/02/20 15:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary/po/malware-mobiles.de.po 13 Feb 2019 12:00:24 -0000
1.98
+++ proprietary/po/malware-mobiles.de.po 20 Feb 2019 15:30:47 -0000
1.99
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -261,6 +261,10 @@
msgstr "<a href=\"#interference\">Interferenz</a>"
#. type: Content of: <div><ul><li>
+msgid "<a href=\"#sabotage\">Sabotage</a>"
+msgstr "<a href=\"#sabotage\">Sabotage</a>"
+
+#. type: Content of: <div><ul><li>
msgid "<a href=\"#surveillance\">Surveillance</a>"
msgstr "<a href=\"#surveillance\">Ãberwachung</a>"
@@ -755,6 +759,40 @@
msgstr ""
#. type: Content of: <h3>
+# | Mobile [-Tyrants-] {+Sabotage+}
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "Smartphones als Tyrannen"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
+"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
+"the performance of older phones to force users to buy their newer phones</a>."
+msgstr ""
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Ãberwachung in Smartphones"
Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/malware-mobiles.es.po 14 Feb 2019 09:43:20 -0000
1.103
+++ proprietary/po/malware-mobiles.es.po 20 Feb 2019 15:30:47 -0000
1.104
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -220,6 +221,10 @@
msgstr "<a href=\"#interference\">Intromisiones</a>"
#. type: Content of: <div><ul><li>
+msgid "<a href=\"#sabotage\">Sabotage</a>"
+msgstr "<a href=\"#sabotage\">Sabotaje</a>"
+
+#. type: Content of: <div><ul><li>
msgid "<a href=\"#surveillance\">Surveillance</a>"
msgstr "<a href=\"#surveillance\">Vigilancia</a>"
@@ -629,6 +634,44 @@
"secuestro de los dispositivos de los usuarios."
#. type: Content of: <h3>
+# | Mobile [-Tyrants-] {+Sabotage+}
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "Móviles tiranos"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
+"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
+"the performance of older phones to force users to buy their newer phones</a>."
+msgstr ""
+"Apple y Samsung <a href=\"https://www.theguardian.com/technology/2018/oct/24/"
+"apple-samsung-fined-for-slowing-down-phones\">reducen deliberadamente el "
+"rendimiento de los teléfonos viejos para obligar a los usuarios a comprarse "
+"uno nuevo</a>."
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Vigilancia"
Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- proprietary/po/malware-mobiles.fr.po 13 Feb 2019 13:27:21 -0000
1.123
+++ proprietary/po/malware-mobiles.fr.po 20 Feb 2019 15:30:47 -0000
1.124
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-02-13 14:22+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -220,6 +221,10 @@
msgstr "<a href=\"#interference\">Ingérence</a>"
#. type: Content of: <div><ul><li>
+msgid "<a href=\"#sabotage\">Sabotage</a>"
+msgstr "<a href=\"#sabotage\">Sabotage</a>"
+
+#. type: Content of: <div><ul><li>
msgid "<a href=\"#surveillance\">Surveillance</a>"
msgstr "<a href=\"#surveillance\">Surveillance</a>"
@@ -630,6 +635,44 @@
"le piratage des appareils des utilisateurs."
#. type: Content of: <h3>
+# | Mobile [-Tyrants-] {+Sabotage+}
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "Tyrans"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
+"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
+"the performance of older phones to force users to buy their newer phones</a>."
+msgstr ""
+"Apple et Samsung ont délibérément <a href=\"https://www.theguardian.com/"
+"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">dégradé
"
+"les performances des anciens téléphones pour forcer les utilisateurs à "
+"acheter leurs nouveaux modèles</a>."
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Surveillance"
Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/malware-mobiles.it-diff.html 13 Feb 2019 12:00:24 -0000
1.46
+++ proprietary/po/malware-mobiles.it-diff.html 20 Feb 2019 15:30:47 -0000
1.47
@@ -136,9 +136,9 @@
<p>Google can also <a
href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
title="at</strong></del></span> <span class="inserted"><ins><em>communication
with</em></ins></span> the <span class="removed"><del><strong>Wayback Machine
(archived May 20, 2015)">forcibly and remotely
-install apps</a> through GTalkService (which seems, since that
article,</strong></del></span> <span class="inserted"><ins><em>network, there
is no way</em></ins></span>
- to <span class="removed"><del><strong>have
-been merged into Google Play). This adds up</strong></del></span> <span
class="inserted"><ins><em>stop the network from recording its location. Many
countries
+install apps</a> through GTalkService (which seems, since that article,
to have
+been merged into Google Play). This adds up</strong></del></span> <span
class="inserted"><ins><em>network, there is no way
+ to stop the network from recording its location. Many countries
(including the US and the EU) require the network</em></ins></span> to
<span class="inserted"><ins><em>store all
these location data for months or years.</p>
</li>
@@ -193,29 +193,37 @@
<li>
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be hijacked through their Wi-Fi chips</a> because of a
bug</strong></del></span>
- <span class="inserted"><ins><em>change the software</em></ins></span> in
- <span class="removed"><del><strong>Broadcom's non-free
firmware.</p>
+ can be hijacked through their Wi-Fi chips</a> because of a bug in
+ Broadcom's non-free firmware.</p>
</li>
<li>
<p>Samsung
-phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
<span class="inserted"><ins><em>the main processor. They still have the
- back door, but at least it is unable to turn the phone
unto</em></ins></span> a <span class="removed"><del><strong>security hole that
allows an SMS message</strong></del></span>
- <span class="inserted"><ins><em>listening device.</p>
-
- <p>The universal back door is apparently also used</em></ins></span>
to <span class="removed"><del><strong>install
+phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
+a security hole that allows an SMS message to install
ransomware</a>.</p>
</li>
<li>
-<p>Many proprietary payment apps</strong></del></span> <span
class="inserted"><ins><em>make phones</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+<p>Many proprietary payment apps <a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
+transmit personal data</strong></del></span>
+ <span class="inserted"><ins><em>change the software</em></ins></span> in
<span class="removed"><del><strong>an insecure way</a>.
+However,</strong></del></span> the <span class="removed"><del><strong>worse
aspect of these apps</strong></del></span> <span class="inserted"><ins><em>main
processor. They still have the
+ back door, but at least it</em></ins></span> is <span
class="removed"><del><strong>that
+<a
href="/philosophy/surveillance-vs-democracy.html">payment</strong></del></span>
<span class="inserted"><ins><em>unable to turn the phone unto a
+ listening device.</p>
+
+ <p>The universal back door</em></ins></span> is <span
class="removed"><del><strong>not anonymous</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>apparently
also used to make phones <a
+
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
transmit even when they are turned off</a>. This means their
movements
- are tracked, and may also make the listening feature work.</p>
+ are tracked, and may also make the listening feature
work.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="summary" style="margin-top: 1em">
<h3>Type of malware</h3>
@@ -224,15 +232,17 @@
<!--<li><a
href="#censorship">Censorship</a></li>-->
<li><a href="#drm">Digital restrictions
management</a> or “DRM”—functionalities designed
- to restrict what users can do with the data in their computers.</li>
+ to restrict what users</em></ins></span> can <span
class="removed"><del><strong>tap</strong></del></span> <span
class="inserted"><ins><em>do with the</em></ins></span> data in <span
class="removed"><del><strong>smart phones, including iPhones, Android, and
+ BlackBerry</a>. While there is not much detail here, it
seems</strong></del></span> <span class="inserted"><ins><em>their
computers.</li>
<li><a href="#insecurity">Insecurity</a></li>
<li><a href="#interference">Interference</a></li>
-<!--<li><a href="#sabotage">Sabotage</a></li>-->
+ <li><a href="#sabotage">Sabotage</a></li>
<li><a href="#surveillance">Surveillance</a></li>
- <li><a href="#jails">Jails</a>—systems
- that impose censorship on application programs.</li>
+ <li><a
href="#jails">Jails</a>—systems</em></ins></span>
+ that <span class="removed"><del><strong>this
+ does</strong></del></span> <span class="inserted"><ins><em>impose censorship
on application programs.</li>
<li><a href="#tyrants">Tyrants</a>—systems
- that reject any operating system not “authorized” by the
+ that reject any operating system</em></ins></span> not <span
class="removed"><del><strong>operate via</strong></del></span> <span
class="inserted"><ins><em>“authorized” by the
manufacturer.</li>
</ul>
</div>
@@ -241,27 +251,42 @@
<ul>
<li>
- <p>See above for the <a href="#universal-back-door">general
universal back
- door</a> in essentially all mobile phones, which permits converting
+ <p>See above for</em></ins></span> the <span
class="inserted"><ins><em><a
href="#universal-back-door">general</em></ins></span> universal back <span
class="removed"><del><strong>door that we know nearly</strong></del></span>
+ <span class="inserted"><ins><em>door</a> in
essentially</em></ins></span> all
+ <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>mobile phones, which permits converting
them into full-time listening devices.</p>
</li>
</ul>
<ul class="blurbs">
<li id="M201609130">
- <p>Xiaomi phones come with <a
-
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
- a universal back door in the application processor, for Xiaomi's
+ <p>Xiaomi</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>come
with</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
+ a universal back door</em></ins></span> in the <span
class="removed"><del><strong>phones' radio software</a>.</p>
+ </li>
+</ul>
+
+<h3 id="surveillance">Mobile Surveillance</h3>
+<ul>
+ <li><p>The Sarahah app</strong></del></span> <span
class="inserted"><ins><em>application processor, for Xiaomi's
use</a>.</p>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor that the local phone
- company can use</a>.</p>
+ <p>This is separate from</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email
addresses</a></strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the
+ universal back door</em></ins></span> in <span
class="removed"><del><strong>user's address
+ book to developer's server. Note</strong></del></span> <span
class="inserted"><ins><em>the modem processor</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span> the
<span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>local phone
+ company can use</a>.</p></em></ins></span>
</li>
- <li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ <span class="removed"><del><strong><li><p>Some portable
phones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511090">
+ <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files” as well as forcibly install
apps</a>.</p>
@@ -271,8 +296,11 @@
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>. Nearly
- all models of mobile phones have a <a href="#universal-back-door">
+ A Chinese version</em></ins></span> of <span
class="removed"><del><strong>data to China</a>.</p></li>
+
+<li>
+ <p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>Android has a universal back door</a>.
Nearly</em></ins></span>
+ all <span class="removed"><del><strong>the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span> <span class="inserted"><ins><em>models of mobile
phones have a <a href="#universal-back-door">
universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
@@ -281,8 +309,8 @@
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come with
- a back door</a> that provides remote access to the files stored on
- the device.</p>
+ a back door</a> that provides remote access to the files
stored</em></ins></span> on <span
class="removed"><del><strong>what</strong></del></span>
+ <span class="inserted"><ins><em>the device.</p>
</li>
</ul>
@@ -318,7 +346,7 @@
<li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos to people in the owner's contact list</a>.</p>
+ photos to</em></ins></span> people <span class="removed"><del><strong>are
listening</strong></del></span> <span class="inserted"><ins><em>in the owner's
contact list</a>.</p>
</li>
<li id="M201704050">
@@ -333,13 +361,17 @@
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
- <p>This is in addition to the fact that the car contains a cellular
- modem that tells big brother all the time where it is. If you own
- such a car, it would be wise to disconnect the modem so as to turn
- off the tracking.</p>
+ <p>This is in addition</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>the fact that
the car contains a cellular
+ modem that tells big brother all the time where</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>is. If you own
+ such a car, it would</em></ins></span> be <span
class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span
class="inserted"><ins><em>wise</em></ins></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>disconnect the modem so as to turn
+ off the tracking.</p></em></ins></span>
</li>
- <li id="M201701270">
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201701270">
<p>Samsung phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
@@ -460,6 +492,33 @@
</li>
</ul>
+<h3 id="sabotage">Mobile Sabotage</h3>
+
+<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
+ <li id="M201810240">
+ <p>Apple and Samsung deliberately <a
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
+ the performance of older phones to force users to buy their newer
+ phones</a>.</p>
+ </li>
+</ul>
+
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
@@ -681,77 +740,44 @@
<li id="M201704074">
<p>Pairs of Android apps can collude
- to</em></ins></span> transmit <span
class="inserted"><ins><em>users'</em></ins></span> personal data <span
class="removed"><del><strong>in an insecure way</a>.
-However, the worse aspect</strong></del></span> <span
class="inserted"><ins><em>to servers. <a
+ to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens</em></ins></span> of <span
class="removed"><del><strong>these apps is</strong></del></span> <span
class="inserted"><ins><em>thousands of pairs</em></ins></span> that
-<span class="removed"><del><strong><a
href="/philosophy/surveillance-vs-democracy.html">payment is not
anonymous</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>collude</a>.</p></em></ins></span>
+ study found tens of thousands of pairs that collude</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data in smart phones, including iPhones, Android, and
- BlackBerry</a>. While there is not much detail here, it
seems</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703300">
+ <li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app</em></ins></span> that <span
class="removed"><del><strong>this
- does not operate via</strong></del></span> <span
class="inserted"><ins><em>it will</a> pre-install
- on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>universal back door</strong></del></span>
<span class="inserted"><ins><em>same information
- about the users' searches</em></ins></span> that <span
class="removed"><del><strong>we know nearly all
- portable phones have. It may involve exploiting various bugs. There are
- <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in</strong></del></span> <span class="inserted"><ins><em>Google
normally gets when they use
+ announced an opt-in proprietary search app that it will</a>
pre-install
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>phones' radio software</a>.</p>
- </li>
-</ul>
-
-<h3 id="surveillance">Mobile Surveillance</h3>
-<ul>
- <li><p>The Sarahah</strong></del></span> app <span
class="inserted"><ins><em>is</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</em></ins></span> and
<span class="removed"><del><strong>email addresses</a> in user's address
- book to developer's server. Note that this article
misuses</strong></del></span> the <span class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>user must
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
- still spyware.</p></em></ins></span>
+ still spyware.</p>
</li>
- <span class="removed"><del><strong><li><p>Some portable
phones</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701210">
- <p>The Meitu photo-editing app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
-
-<li>
- <p>Facebook's</strong></del></span> <span class="inserted"><ins><em>a
Chinese company</a>.</p>
+ <li id="M201701210">
+ <p>The Meitu photo-editing app <a
+
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
- <p>The Uber</em></ins></span> app <span
class="removed"><del><strong>listens all the time,</strong></del></span> <span
class="inserted"><ins><em>tracks</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening to or watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ <p>The Uber app tracks <a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p></em></ins></span>
+ massive surveillance.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160"></em></ins></span>
+ <li id="M201611160"></em></ins></span>
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -784,8 +810,8 @@
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed <span
class="removed"><del><strong>logs
- and may turn them over to the UK government if
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
+ <span class="removed"><del><strong>and may turn them over to the UK
government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -838,7 +864,7 @@
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>logs and
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>and
may turn them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -1267,7 +1293,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/13 12:00:24 $
+$Date: 2019/02/20 15:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary/po/malware-mobiles.it.po 13 Feb 2019 12:00:24 -0000
1.98
+++ proprietary/po/malware-mobiles.it.po 20 Feb 2019 15:30:47 -0000
1.99
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -236,6 +236,10 @@
msgstr "<a href=\"#interference\">Interferenza</a>"
#. type: Content of: <div><ul><li>
+msgid "<a href=\"#sabotage\">Sabotage</a>"
+msgstr "<a href=\"#sabotage\">Sabotaggio</a>"
+
+#. type: Content of: <div><ul><li>
msgid "<a href=\"#surveillance\">Surveillance</a>"
msgstr "<a href=\"#surveillance\">Sorveglianza</a>"
@@ -724,6 +728,40 @@
msgstr ""
#. type: Content of: <h3>
+# | Mobile [-Tyrants-] {+Sabotage+}
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "Tiranni in dispositivi mobili"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
+"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
+"the performance of older phones to force users to buy their newer phones</a>."
+msgstr ""
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Sorveglianza in dispositivi mobili"
Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/malware-mobiles.ja-diff.html 13 Feb 2019 12:00:24 -0000
1.60
+++ proprietary/po/malware-mobiles.ja-diff.html 20 Feb 2019 15:30:47 -0000
1.61
@@ -136,22 +136,22 @@
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> a <span
class="inserted"><ins><em>phone transmit all conversations it
hears</a>.</p>
- <p>The</em></ins></span> back <span
class="removed"><del><strong>door</a> that provides remote access
to</strong></del></span> <span class="inserted"><ins><em>door <a
class="not-a-duplicate"
+ <p>The</em></ins></span> back <span
class="removed"><del><strong>door</a></strong></del></span> <span
class="inserted"><ins><em>door <a class="not-a-duplicate"
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- may take</em></ins></span> the <span class="removed"><del><strong>data
stored on the
+ may take the form of bugs</em></ins></span> that <span
class="removed"><del><strong>provides remote access</strong></del></span> <span
class="inserted"><ins><em>have gone 20 years unfixed</a>.
+ The choice</em></ins></span> to <span
class="inserted"><ins><em>leave</em></ins></span> the <span
class="removed"><del><strong>data stored on the
device.</p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span> <span
class="inserted"><ins><em>form of bugs that have gone 20 years
unfixed</a>.
- The choice</em></ins></span> to <span class="removed"><del><strong>any
file on</strong></del></span> <span
class="inserted"><ins><em>leave</em></ins></span> the <span
class="removed"><del><strong>system.</p>
+ Samsung's back door</a> provides access</strong></del></span> <span
class="inserted"><ins><em>security holes in place is morally
+ equivalent</em></ins></span> to <span class="removed"><del><strong>any
file on the system.</p>
</li>
<li>
<p>In Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has</strong></del></span> <span class="inserted"><ins><em>security
holes in place is morally
- equivalent to writing</em></ins></span> a back <span
class="inserted"><ins><em>door.</p>
+ Google has</strong></del></span> <span
class="inserted"><ins><em>writing</em></ins></span> a back <span
class="inserted"><ins><em>door.</p>
<p>The back</em></ins></span> door <span
class="removed"><del><strong>to remotely delete apps.</a>
(It</strong></del></span> is in <span class="removed"><del><strong>a program
called GTalkService).
@@ -200,7 +200,7 @@
</li></strong></del></span> <span class="inserted"><ins><em>their
computers.</li>
<li><a href="#insecurity">Insecurity</a></li>
<li><a href="#interference">Interference</a></li>
-<!--<li><a href="#sabotage">Sabotage</a></li>-->
+ <li><a href="#sabotage">Sabotage</a></li>
<li><a href="#surveillance">Surveillance</a></li>
<li><a href="#jails">Jails</a>—systems
that impose censorship on application programs.</li>
@@ -214,18 +214,11 @@
<ul>
<li>
-<span class="removed"><del><strong><p>Many proprietary payment apps <a
-href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
-transmit personal data in an insecure way</a>.
-However,</strong></del></span>
- <span class="inserted"><ins><em><p>See above for</em></ins></span>
the <span class="removed"><del><strong>worse aspect of these apps is
that</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
-</p>
-</li>
-
- <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door">general universal back
- door</a></em></ins></span> in <span
class="removed"><del><strong>smart</strong></del></span> <span
class="inserted"><ins><em>essentially all mobile</em></ins></span> phones,
<span class="removed"><del><strong>including iPhones, Android, and
- BlackBerry</a>. While there</strong></del></span> <span
class="inserted"><ins><em>which permits converting
+<span class="removed"><del><strong><p>Many proprietary payment
apps</strong></del></span>
+ <span class="inserted"><ins><em><p>See above for
the</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
+transmit personal data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door">general universal back
+ door</a> in essentially all mobile phones, which permits converting
them into full-time listening devices.</p>
</li>
</ul>
@@ -234,11 +227,18 @@
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
- a universal back door in the application processor, for Xiaomi's
+ a universal back door</em></ins></span> in <span
class="removed"><del><strong>an insecure way</a>.
+However,</strong></del></span> the <span class="removed"><del><strong>worse
aspect of these apps</strong></del></span> <span
class="inserted"><ins><em>application processor, for Xiaomi's
use</a>.</p>
- <p>This</em></ins></span> is <span class="removed"><del><strong>not
much detail here, it seems</strong></del></span> <span
class="inserted"><ins><em>separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor</em></ins></span> that <span
class="removed"><del><strong>this
+ <p>This</em></ins></span> is <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>separate from</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
+</p>
+</li>
+
+ <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the
+ universal back door</em></ins></span> in <span
class="removed"><del><strong>smart phones, including iPhones, Android, and
+ BlackBerry</a>. While there is not much detail here, it
seems</strong></del></span> <span class="inserted"><ins><em>the modem
processor</em></ins></span> that <span class="removed"><del><strong>this
does not operate via</strong></del></span> the <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em>local phone
company can use</a>.</p>
</li>
@@ -328,7 +328,9 @@
<p>This is in addition</em></ins></span> to <span
class="inserted"><ins><em>the fact that the car contains</em></ins></span> a
<span class="removed"><del><strong>server, where</strong></del></span> <span
class="inserted"><ins><em>cellular
modem that tells big brother all</em></ins></span> the <span
class="removed"><del><strong><em>developer</em>
gets</strong></del></span> <span class="inserted"><ins><em>time
where</em></ins></span> it <span class="removed"><del><strong>all.
-This “service” is</strong></del></span> <span
class="inserted"><ins><em>is. If you own
+This “service” is for suckers!</p>
+
+<p>The server surely has</strong></del></span> <span
class="inserted"><ins><em>is. If you own
such a car, it would be wise to disconnect the modem so as to turn
off the tracking.</p>
</li>
@@ -365,9 +367,9 @@
blatant flaws allowed anyone to snoop on a user's personal data</a>.
The critique fails entirely to express concern that the app sends the
personal data to a server, where the <em>developer</em> gets
it all.
- This “service” is</em></ins></span> for suckers!</p>
+ This “service” is for suckers!</p>
- <p>The server surely has a “privacy policy,” and <span
class="removed"><del><strong>surely</strong></del></span> <span
class="inserted"><ins><em>surely
+ <p>The server surely has</em></ins></span> a “privacy
policy,” and <span
class="removed"><del><strong>surely</strong></del></span> <span
class="inserted"><ins><em>surely
it is worthless since nearly all of them are.</p>
</li>
@@ -454,6 +456,33 @@
</li>
</ul>
+<h3 id="sabotage">Mobile Sabotage</h3>
+
+<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
+ <li id="M201810240">
+ <p>Apple and Samsung deliberately <a
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
+ the performance of older phones to force users to buy their newer
+ phones</a>.</p>
+ </li>
+</ul>
+
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
@@ -1107,7 +1136,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/13 12:00:24 $
+$Date: 2019/02/20 15:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary/po/malware-mobiles.ja.po 13 Feb 2019 12:00:24 -0000
1.86
+++ proprietary/po/malware-mobiles.ja.po 20 Feb 2019 15:30:47 -0000
1.87
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -195,6 +195,10 @@
msgstr "<a href=\"#interference\">å¹²æ¸</a>"
#. type: Content of: <div><ul><li>
+msgid "<a href=\"#sabotage\">Sabotage</a>"
+msgstr "<a href=\"#sabotage\">妨害</a>"
+
+#. type: Content of: <div><ul><li>
msgid "<a href=\"#surveillance\">Surveillance</a>"
msgstr "<a href=\"#surveillance\">ç£è¦</a>"
@@ -594,6 +598,39 @@
msgstr ""
#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "ã¢ãã¤ã«ã®æ´å"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
+"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
+"the performance of older phones to force users to buy their newer phones</a>."
+msgstr ""
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "ã¢ãã¤ã«ã®ç£è¦"
Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/malware-mobiles.pot 13 Feb 2019 12:00:24 -0000 1.64
+++ proprietary/po/malware-mobiles.pot 20 Feb 2019 15:30:47 -0000 1.65
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -156,6 +156,10 @@
msgstr ""
#. type: Content of: <div><ul><li>
+msgid "<a href=\"#sabotage\">Sabotage</a>"
+msgstr ""
+
+#. type: Content of: <div><ul><li>
msgid "<a href=\"#surveillance\">Surveillance</a>"
msgstr ""
@@ -427,6 +431,37 @@
msgstr ""
#. type: Content of: <h3>
+msgid "Mobile Sabotage"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a "
+"href=\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923\">pushing
"
+"unwanted and often malicious ads on users, and redirecting them to phishing "
+"sites</a> that stole their credentials. Furthermore, the user interface of "
+"most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple and Samsung deliberately <a "
+"href=\"https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade
"
+"the performance of older phones to force users to buy their newer "
+"phones</a>."
+msgstr ""
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr ""
Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary/po/malware-mobiles.ru.po 13 Feb 2019 16:29:43 -0000
1.155
+++ proprietary/po/malware-mobiles.ru.po 20 Feb 2019 15:30:47 -0000
1.156
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -214,6 +215,10 @@
msgstr "<a href=\"#interference\">ÐомеÑ
и</a>"
#. type: Content of: <div><ul><li>
+msgid "<a href=\"#sabotage\">Sabotage</a>"
+msgstr "<a href=\"#sabotage\">СабоÑаж</a>"
+
+#. type: Content of: <div><ul><li>
msgid "<a href=\"#surveillance\">Surveillance</a>"
msgstr "<a href=\"#surveillance\">Слежка</a>"
@@ -620,6 +625,44 @@
"полÑзоваÑелей."
#. type: Content of: <h3>
+# | Mobile [-Tyrants-] {+Sabotage+}
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "ТиÑанÑ"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
+"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
+"the performance of older phones to force users to buy their newer phones</a>."
+msgstr ""
+"Apple и Samsung пÑеднамеÑенно <a
href=\"https://www.theguardian.com/"
+"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">ÑнижаÑÑ
"
+"Ñ
аÑакÑеÑиÑÑики ÑÑаÑÑÑ
ÑелеÑонов, ÑÑобÑ
вÑнÑдиÑÑ Ð¿Ð¾Ð»ÑзоваÑелей покÑпаÑÑ "
+"новÑе</a>."
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Слежка"
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/nl.po 16 Feb 2019 18:30:11 -0000 1.29
+++ proprietary/po/nl.po 20 Feb 2019 15:30:47 -0000 1.30
@@ -4484,6 +4484,32 @@
#. type: Content of: <h3>
#, fuzzy
+#| msgid "Apple Sabotage"
+msgid "Mobile Sabotage"
+msgstr "Apple-sabotage"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <h3>
+#, fuzzy
#| msgid "Apple Surveillance"
msgid "Mobile Surveillance"
msgstr "Apple-spionage"
@@ -5703,6 +5729,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many proprietary programs secretly <a href=\"https://www.theregister.co."
"uk/2016/08/05/payperinstall_study/\">install other proprietary programs that "
"the users don't want</a>."
@@ -7120,6 +7157,18 @@
"\">#SpywareInMobileApps</a>)</span>"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr ""
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/pl.po 16 Feb 2019 18:30:11 -0000 1.29
+++ proprietary/po/pl.po 20 Feb 2019 15:30:47 -0000 1.30
@@ -3931,6 +3931,30 @@
msgstr ""
#. type: Content of: <h3>
+msgid "Mobile Sabotage"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr ""
@@ -5152,6 +5176,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many proprietary programs secretly <a href=\"https://www.theregister.co."
"uk/2016/08/05/payperinstall_study/\">install other proprietary programs that "
"the users don't want</a>."
@@ -6624,6 +6659,18 @@
"\">#SpywareInMobileApps</a>)</span>"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr ""
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/pot 16 Feb 2019 18:30:11 -0000 1.29
+++ proprietary/po/pot 20 Feb 2019 15:30:47 -0000 1.30
@@ -3754,6 +3754,30 @@
msgstr ""
#. type: Content of: <h3>
+msgid "Mobile Sabotage"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr ""
@@ -4935,6 +4959,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many proprietary programs secretly <a href=\"https://www.theregister.co."
"uk/2016/08/05/payperinstall_study/\">install other proprietary programs that "
"the users don't want</a>."
@@ -6040,6 +6075,18 @@
"\">#SpywareInMobileApps</a>)</span>"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr ""
Index: proprietary/po/proprietary-deception.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-deception.de-diff.html 5 Jan 2019 11:31:34
-0000 1.21
+++ proprietary/po/proprietary-deception.de-diff.html 20 Feb 2019 15:30:47
-0000 1.22
@@ -46,13 +46,28 @@
to <span class="removed"><del><strong>present the specifics.</p>
<ul>
-<li>
-<a</strong></del></span> <span class="inserted"><ins><em>serve as specific
substantiation.</p>
+<li></strong></del></span> <span class="inserted"><ins><em>serve as
specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
+ <li id="M201902041.2">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos instead of “beautifying” them</a>,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201611060">
<p><a</em></ins></span>
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
@@ -73,9 +88,9 @@
<p>The</em></ins></span> proprietor of the Pokémon Go game <a
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business">
invites restaurants and other businesses to pay to have the game lure
- people <span
class="removed"><del><strong>there</a>.</strong></del></span> <span
class="inserted"><ins><em>there</a>.</p></em></ins></span>
+ people <span class="removed"><del><strong>there</a>.
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p>“Dark patterns”
are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
interfaces designed to mislead users, or make option settings
@@ -83,9 +98,9 @@
<p>This allows a company such as Apple to say, “We allow
users to turn this off” while ensuring that few will
- understand how to actually turn it off.</p>
+ understand how to actually turn it off.</p></strong></del></span>
<span class="inserted"><ins><em>there</a>.</p></em></ins></span>
</li>
- <li></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201511110"></em></ins></span>
<p>A top-ranking proprietary Instagram client promising
@@ -182,7 +197,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/20 15:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-deception.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/proprietary-deception.de.po 5 Jan 2019 11:31:34 -0000
1.33
+++ proprietary/po/proprietary-deception.de.po 20 Feb 2019 15:30:47 -0000
1.34
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-08-29 02:43+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -85,6 +85,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a href=\"http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-"
"emissions-1788630969\"> Audi's proprietary software used a simple method to "
"cheat on emissions tests</a>: to activate a special low-emission "
Index: proprietary/po/proprietary-deception.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary-deception.fr.po 5 Jan 2019 16:13:43 -0000
1.34
+++ proprietary/po/proprietary-deception.fr.po 20 Feb 2019 15:30:47 -0000
1.35
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-01-05 17:13+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: fr <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
#. type: Content of: <title>
msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -70,6 +71,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a href=\"http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-"
"emissions-1788630969\"> Audi's proprietary software used a simple method to "
"cheat on emissions tests</a>: to activate a special low-emission "
Index: proprietary/po/proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-deception.ja-diff.html 5 Jan 2019 11:31:34
-0000 1.24
+++ proprietary/po/proprietary-deception.ja-diff.html 20 Feb 2019 15:30:47
-0000 1.25
@@ -44,7 +44,7 @@
<span class="inserted"><ins><em><div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
-to</em></ins></span> <a <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
+to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to serve as specific substantiation.</p>
</div>
@@ -52,6 +52,22 @@
<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
+ <li id="M201902041.2">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos instead of “beautifying” them</a>,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201611060">
<p><a</em></ins></span>
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
@@ -72,9 +88,9 @@
<p>The</em></ins></span> proprietor of the Pokémon Go game <a
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business">
invites restaurants and other businesses to pay to have the game lure
- people <span class="removed"><del><strong>there</a>.
+ people <span
class="removed"><del><strong>there</a>.</strong></del></span> <span
class="inserted"><ins><em>there</a>.</p></em></ins></span>
</li>
- <li>
+ <span class="removed"><del><strong><li>
<p>“Dark patterns”
are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
interfaces designed to mislead users, or make option settings
@@ -82,9 +98,9 @@
<p>This allows a company such as Apple to say, “We allow
users to turn this off” while ensuring that few will
- understand how to actually turn it off.</p></strong></del></span>
<span class="inserted"><ins><em>there</a>.</p></em></ins></span>
+ understand how to actually turn it off.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <li></strong></del></span>
<span class="inserted"><ins><em><li id="M201511110"></em></ins></span>
<p>A top-ranking proprietary Instagram client promising
@@ -183,7 +199,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/20 15:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-deception.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-deception.ja.po 5 Jan 2019 11:31:34 -0000
1.32
+++ proprietary/po/proprietary-deception.ja.po 20 Feb 2019 15:30:47 -0000
1.33
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2016-11-18 13:31+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -67,6 +67,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a href=\"http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-"
"emissions-1788630969\"> Audi's proprietary software used a simple method to "
"cheat on emissions tests</a>: to activate a special low-emission "
Index: proprietary/po/proprietary-deception.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-deception.pot 5 Jan 2019 11:31:34 -0000
1.18
+++ proprietary/po/proprietary-deception.pot 20 Feb 2019 15:30:47 -0000
1.19
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -57,6 +57,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a "
+"href=\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923\">
"
+"stealing users' photos instead of “beautifying” them</a>, "
+"pushing unwanted and often malicious ads on users, and redirecting them to "
+"phishing sites that stole their credentials. Furthermore, the user interface "
+"of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a "
"href=\"http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969\">
"
"Audi's proprietary software used a simple method to cheat on emissions "
Index: proprietary/po/proprietary-deception.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-deception.ru.po 17 Jan 2019 06:30:31 -0000
1.45
+++ proprietary/po/proprietary-deception.ru.po 20 Feb 2019 15:30:47 -0000
1.46
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-09-27 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
#. type: Content of: <title>
msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -71,6 +72,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"<a href=\"http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-"
"emissions-1788630969\"> Audi's proprietary software used a simple method to "
"cheat on emissions tests</a>: to activate a special low-emission "
Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/proprietary-sabotage.de-diff.html 9 Feb 2019 23:00:28
-0000 1.29
+++ proprietary/po/proprietary-sabotage.de-diff.html 20 Feb 2019 15:30:47
-0000 1.30
@@ -48,6 +48,24 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials.
Furthermore,</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+
+<p>Here</strong></del></span>
+ <span class="inserted"><ins><em>user interface of most of them was
designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201811020">
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
@@ -58,9 +76,7 @@
makes it even more vicious.</p>
<p>This illustrates that making unauthorized copies of nonfree
software
- is not a cure for</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<p>Here</strong></del></span> <span class="inserted"><ins><em>injustice
of nonfree software. It may avoid
+ is not a cure for the injustice of nonfree software. It may avoid
paying for the nasty thing, but cannot make it less nasty.</p>
</li>
@@ -117,19 +133,22 @@
</li>
<span class="removed"><del><strong><li>
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
+ <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711080">
+ <p>Logitech will sabotage
+ all Harmony Link household control devices by</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
changes the file system from HFS+ to APFS</a>, which cannot be
accessed
from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711080"></em></ins></span>
- <p>Logitech will sabotage
- all Harmony Link household control devices by <a
-
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off the server through which the products' supposed owners
+ <li>
+ <p>Logitech will sabotage all Harmony Link household control devices
by
+<a
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off</em></ins></span> the server through which the products'
supposed owners
communicate with them</a>.</p>
<p>The owners suspect this is to pressure them to buy a newer model.
If
@@ -137,21 +156,13 @@
requires users to talk with them through some specialized
service.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Tesla used software to limit customers to using
just</strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">part
of</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span class="removed"><del><strong>battery
of some
- cars</a>.</p>
- </li>
-
- <li>
- <p>Sonos
- <a
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
- told all its customers, “Agree”</strong></del></span> <span
class="inserted"><ins><em>file system from HFS+</em></ins></span> to <span
class="removed"><del><strong>snooping</strong></del></span> <span
class="inserted"><ins><em>APFS</a>, which cannot be
- accessed from GNU/Linux, Windows</em></ins></span> or <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>even older versions of MacOS.</p>
+ <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
+
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
+ changes the file system from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
<li id="M201710040.1">
@@ -168,17 +179,19 @@
a temptation to commit sabotage.</p>
</li>
- <li id="M201709090">
+ <li id="M201709090"></em></ins></span>
<p>Tesla used software to limit customers to using just <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">part
of the battery of some cars</a>.</p>
</li>
- <li id="M201708230">
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708230"></em></ins></span>
<p>Sonos <a
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”
- to snooping or the</em></ins></span> product will stop working</a>.
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">Another</strong></del></span>
+ to snooping or the product will stop working</a>. <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">Another</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
Another</em></ins></span> article</a> says they won't forcibly
change the software, but
people won't be able to get any upgrades and eventually it will
@@ -295,10 +308,7 @@
ink cartridges</a>.</p>
</li>
- <span class="removed"><del><strong><li>
-
- <p>Once Microsoft has tricked a user into accepting installation
- of</strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201606270">
<p id="windows10-forcing">In its efforts to trick users of Windows
@@ -324,9 +334,9 @@
while refusing to fix them itself.</p>
</li>
- <li id="M201606010">
+ <li id="M201606010"></em></ins></span>
<p>Once Microsoft has tricked a user
- into accepting installation of</em></ins></span> Windows 10, <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</strong></del></span>
+ into accepting installation of Windows 10, <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</em></ins></span>
find that they are denied the option to cancel or even postpone the
imposed date of installation</a>.</p>
@@ -414,10 +424,7 @@
<p>Microsoft
is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
forcibly
- pushing</a></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511244">
- <p>Google has long had</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">Windows
+ pushing</a> <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">Windows
update to its version 10</a>, ignoring the flag on Windows 7 or 8
that you could set to not upgrade. This reaffirms the presence of
a <a href="/proprietary/proprietary-back-doors.html">universal
@@ -428,11 +435,12 @@
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
delete applications</a> without asking permission.</p>
</li>
- <li><p>Google has long had <a
+ <li><p>Google</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511244">
+ <p>Google</em></ins></span> has long had <a
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
- back door</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
- back door</em></ins></span> to remotely unlock an Android
device</a>, unless its disk
+ back door to remotely unlock an Android device</a>, unless its disk
is encrypted (possible since Android 5.0 Lollipop, but still not
quite the <span class="removed"><del><strong>default).</p></li>
<li><p>
@@ -756,7 +764,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/09 23:00:28 $
+$Date: 2019/02/20 15:30:47 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary/po/proprietary-sabotage.de.po 9 Feb 2019 23:00:28 -0000
1.111
+++ proprietary/po/proprietary-sabotage.de.po 20 Feb 2019 15:30:47 -0000
1.112
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -85,6 +85,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: proprietary/po/proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary/po/proprietary-sabotage.fr.po 10 Feb 2019 15:42:57 -0000
1.129
+++ proprietary/po/proprietary-sabotage.fr.po 20 Feb 2019 15:30:47 -0000
1.130
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-02-10 16:42+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -73,6 +74,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: proprietary/po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-sabotage.it-diff.html 9 Feb 2019 23:00:28
-0000 1.40
+++ proprietary/po/proprietary-sabotage.it-diff.html 20 Feb 2019 15:30:48
-0000 1.41
@@ -51,6 +51,22 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201811020">
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
@@ -719,7 +735,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/09 23:00:28 $
+$Date: 2019/02/20 15:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary/po/proprietary-sabotage.it.po 9 Feb 2019 23:00:28 -0000
1.105
+++ proprietary/po/proprietary-sabotage.it.po 20 Feb 2019 15:30:48 -0000
1.106
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -79,6 +79,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: proprietary/po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-sabotage.ja-diff.html 9 Feb 2019 23:00:28
-0000 1.42
+++ proprietary/po/proprietary-sabotage.ja-diff.html 20 Feb 2019 15:30:48
-0000 1.43
@@ -52,6 +52,22 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201811020">
<p>Foundry's graphics software <a
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
@@ -699,7 +715,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/09 23:00:28 $
+$Date: 2019/02/20 15:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary/po/proprietary-sabotage.ja.po 9 Feb 2019 23:00:28 -0000
1.96
+++ proprietary/po/proprietary-sabotage.ja.po 20 Feb 2019 15:30:48 -0000
1.97
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -67,6 +67,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: proprietary/po/proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary-sabotage.pot 9 Feb 2019 23:00:28 -0000
1.63
+++ proprietary/po/proprietary-sabotage.pot 20 Feb 2019 15:30:48 -0000
1.64
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -57,6 +57,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a "
+"href=\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923\">pushing
"
+"unwanted and often malicious ads on users, and redirecting them to phishing "
+"sites</a> that stole their credentials. Furthermore, the user interface of "
+"most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Foundry's graphics software <a "
"href=\"https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/\">
"
"reports information to identify who is running it</a>. The result is often a "
Index: proprietary/po/proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary/po/proprietary-sabotage.ru.po 11 Feb 2019 07:28:47 -0000
1.167
+++ proprietary/po/proprietary-sabotage.ru.po 20 Feb 2019 15:30:48 -0000
1.168
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-12-10 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -70,6 +71,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
"information to identify who is running it</a>. The result is often a legal "
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-surveillance.de-diff.html 13 Feb 2019
12:00:24 -0000 1.43
+++ proprietary/po/proprietary-surveillance.de-diff.html 20 Feb 2019
15:30:48 -0000 1.44
@@ -1032,23 +1032,9 @@
<li><p>Apple proposes
<a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether</strong></del></span> the
<span class="removed"><del><strong>phone is snooping on
- them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can
- get them from there.</p>
- </li>
-
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into it</a>; the
server records these numbers</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
- paying</em></ins></span> for <span class="removed"><del><strong>at least 30
- days.</p>
- </li>
-
- <li><p>Users</strong></del></span> <span
class="inserted"><ins><em>the nasty thing, but</em></ins></span> cannot make
<span class="removed"><del><strong>an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving</strong></del></span> <span class="inserted"><ins><em>it
less nasty.</p>
+ — which would mean no way to use</strong></del></span> <span
class="inserted"><ins><em>the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
+ taken. Users would</strong></del></span> <span
class="inserted"><ins><em>less nasty.</p>
</li>
</ul>
@@ -1059,10 +1045,40 @@
<ul class="blurbs">
<li id="M201902060">
- <p>Many nonfree apps have</em></ins></span> a <span
class="removed"><del><strong>valid email address and
receiving</strong></del></span> <span class="inserted"><ins><em>surveillance
feature for <a
+ <p>Many nonfree apps</em></ins></span> have <span
class="removed"><del><strong>no way to tell whether</strong></del></span> <span
class="inserted"><ins><em>a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>code Apple
- sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>users' actions</a> in interacting with the
app.</p></em></ins></span>
+ recording all</em></ins></span> the <span
class="removed"><del><strong>phone is snooping</strong></del></span> <span
class="inserted"><ins><em>users' actions</a> in interacting with the
app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera” apps that used to
+ be</em></ins></span> on
+ <span class="removed"><del><strong>them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>Google Play had one or more malicious
functionalities, such as</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead</em></ins></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app</strong></del></span> <span
class="inserted"><ins><em>“beautifying” them,
+ pushing unwanted and often malicious ads</em></ins></span> on <span
class="removed"><del><strong>iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span> <span
class="inserted"><ins><em>users, and redirecting
+ them to phishing sites</em></ins></span> that <span
class="inserted"><ins><em>stole their credentials.
Furthermore,</em></ins></span>
+ the user <span class="removed"><del><strong>types into it</a>; the
server records these numbers for at least 30
+ days.</p>
+ </li>
+
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>interface of most of them was
designed</em></ins></span> to <span class="removed"><del><strong>install even
gratis apps)</a>
+ without giving</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry</em></ins></span> a
<span class="removed"><del><strong>valid email address and receiving the code
Apple
+ sends to it.</p></strong></del></span> <span
class="inserted"><ins><em>potential risk because
+ there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Around
47%</strong></del></span>
@@ -1076,48 +1092,49 @@
25% fail to protect</em></ins></span> their <span
class="removed"><del><strong>users with third parties.</p>
</li>
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>usersâ privacy</a> due</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all the photos and
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>usersâ privacy</a> due</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
+ found as well.</p>
+
+ <p>Moreover, a previous investigation had found that <a
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>photos and
videos they make.</p>
<blockquote><p>
iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive advertising—that could
- potentially also be used</em></ins></span> to <span
class="removed"><del><strong>date</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a></strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
- found</em></ins></span> as <span class="removed"><del><strong>accessed on
24 Sep 2015.) The iCloud feature is</strong></del></span> <span
class="inserted"><ins><em>well.</p>
-
- <p>Moreover, a previous investigation had found
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by the
- startup</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
+ and keeps them up to date on all your devices.
+ Any edits you make</strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
- <p>There</strong></del></span>
- <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps</em></ins></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
+ </p></blockquote>
- <p>It</em></ins></span> is <span class="removed"><del><strong>a way
to <a href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>,</strong></del></span> <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
- apps.” These apps are gratis,</em></ins></span> but <span
class="removed"><del><strong>it's active by default so</strong></del></span>
<span class="inserted"><ins><em>they are <em>not</em> <a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ <p>(From</strong></del></span> <span
class="inserted"><ins><em>gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
+ information</a> as accessed on 24 Sep 2015.)</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
</li>
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>still counts as</strong></del></span> <span
class="inserted"><ins><em>notify the users of what it will do
+ stored users' locations to the company's
server</a>.</em></ins></span> The <span
class="removed"><del><strong>iCloud feature</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> is
+ <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span>
+ <span class="inserted"><ins><em>being sued, demanding that it
notify</em></ins></span> the
+ <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span class="inserted"><ins><em>what
it will do
with the data.</p>
- <p>I think that lawsuit is about</em></ins></span> a
+ <p>I think that lawsuit</em></ins></span> is <span
class="inserted"><ins><em>about</em></ins></span> a <span
class="removed"><del><strong>way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as</strong></del></span> <span class="inserted"><ins><em>side issue.
What the company does
+ with the data is</em></ins></span> a
<span class="removed"><del><strong>surveillance functionality.</p>
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>secondary issue. The principal wrong here is
that
the company gets that data at all.</p>
<p><a
@@ -1149,44 +1166,36 @@
<li><p>There is also a feature for web sites to track users,
which</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is
<span class="removed"><del><strong><a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS
6,</strong></del></span>
- <span class="inserted"><ins><em>using that app,</em></ins></span> but
<span class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>that alone</em></ins></span> is <span
class="removed"><del><strong>still true in iOS
7.)</p></strong></del></span> <span class="inserted"><ins><em>often quite
informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p></em></ins></span>
+ <span class="inserted"><ins><em>using that app,</em></ins></span> but
<span class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>that alone</em></ins></span> is <span
class="removed"><del><strong>still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users</em></ins></span> that <span
class="removed"><del><strong>can be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>have deleted
them</a>.</p></em></ins></span>
+ <li><p>The iThing also
+ <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though that can be
+ turned off.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the
state</a>.</p>
</li>
<li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>NSA snoop
on all the data in an iThing,
+ Either Apple helps the NSA snoop on all the data in an iThing,
or it is totally incompetent.</a></p>
</li>
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist for no
- possible purpose other than surveillance</a>. Here is the
- <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>often quite informative.</p>
+
+ <p>This spying occurs regardless</em></ins></span> of <span
class="removed"><del><strong>iOS seem to exist for no
+ possible purpose other than surveillance</a>. Here
is</strong></del></span> <span
class="inserted"><ins><em>whether</em></ins></span> the
+ <span class="removed"><del><strong><a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>user has a Facebook
+ account.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -1195,15 +1204,25 @@
</div>
<ul>
- <li><p>Tracking software in popular Android apps is pervasive and
- sometimes very clever. Some trackers can <a
-href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a</strong></del></span> user's <span
class="removed"><del><strong>movements around a physical store by noticing WiFi
- networks</a>.</p>
-</li>
+ <li><p>Tracking software in popular</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
+ sometimes very clever. Some trackers can</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ </li>
- <li><p>Android tracks</strong></del></span> location <span
class="removed"><del><strong>for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"></strong></del></span>
even when <span class="inserted"><ins><em>users disable</em></ins></span>
“location <span
class="removed"><del><strong>services”</strong></del></span>
+ <span class="removed"><del><strong><li><p>Android tracks
location for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some</em></ins></span> Google <span
class="inserted"><ins><em>apps on Android</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location</em></ins></span> even when <span
class="inserted"><ins><em>users disable</em></ins></span> “location <span
class="removed"><del><strong>services”</strong></del></span>
<span class="inserted"><ins><em>tracking”</a>.</p>
<p>There</em></ins></span> are <span
class="removed"><del><strong>turned off, even
@@ -1229,54 +1248,57 @@
<p>This makes them act as spies for licensing enforcement.</p>
<p>I expect it implements DRM, too—that
there</em></ins></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to
- <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ <span class="removed"><del><strong>disguise itself</strong></del></span>
<span class="inserted"><ins><em>save
+ a recording. But I can't be sure</em></ins></span> from <span
class="removed"><del><strong>investigation.</p>
</li>
- <li><p>Samsung phones come with
- <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users</strong></del></span> <span class="inserted"><ins><em>save
- a recording. But I</em></ins></span> can't <span
class="removed"><del><strong>delete</a>,
- and they send so</strong></del></span> <span
class="inserted"><ins><em>be sure from the article.</p>
-
- <p>If you learn to care</em></ins></span> much <span
class="removed"><del><strong>data that their transmission</strong></del></span>
<span class="inserted"><ins><em>less about sports, you will benefit in
- many ways. This</em></ins></span> is <span class="removed"><del><strong>a
- substantial expense for users. Said transmission, not wanted or
- requested</strong></del></span> <span class="inserted"><ins><em>one
more.</p>
+ <li><p>Samsung phones come with</strong></del></span> <span
class="inserted"><ins><em>the article.</p>
+
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
</li>
<li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied</em></ins></span> by <span
class="inserted"><ins><em>researchers were found to snoop
- and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>user, clearly must
constitute spying of</strong></del></span> <span class="inserted"><ins><em>apps
were
- found to insecurely snitch on its users. Furthermore, they could
- detect only</em></ins></span> some
- <span class="removed"><del><strong>kind.</p></li>
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to
snoop</em></ins></span>
+ and <span class="inserted"><ins><em>collect information about its
users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore,</em></ins></span>
they <span class="removed"><del><strong>send so much data</strong></del></span>
<span class="inserted"><ins><em>could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
+
+ <p>This is evidence</em></ins></span> that <span
class="inserted"><ins><em>proprietary apps generally work
against</em></ins></span>
+ their <span class="removed"><del><strong>transmission is a
+ substantial expense for</strong></del></span> users. <span
class="removed"><del><strong>Said transmission, not wanted or
+ requested by the user, clearly must constitute
spying</strong></del></span> <span class="inserted"><ins><em>To protect their
privacy and freedom, Android users
+ need to get rid</em></ins></span> of <span
class="removed"><del><strong>some
+ kind.</p></li>
<li><p>A Motorola phone
<a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p>
+ listens for voice all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p>
</li>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows?
laptops):</strong></del></span> <span class="inserted"><ins><em>these
proprietary apps whose
- source code they cannot look at.</em></ins></span> The <span
class="removed"><del><strong>Wall
- Street Journal (in an article blocked from us</strong></del></span>
<span class="inserted"><ins><em>other apps might be snooping
- in other ways.</p>
-
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of the proprietary software—both proprietary
- Android</em></ins></span> by <span class="removed"><del><strong>a paywall)
- reports</strong></del></span> <span class="inserted"><ins><em><a
href="https://replicant.us">switching to Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns</em></ins></span>
- the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>user if an app
contains anti-features</a>.</p>
+ <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both
proprietary</em></ins></span>
+ Android <span class="removed"><del><strong>phones (and Windows? laptops):
The Wall
+ Street Journal (in an article blocked from us</strong></del></span> by
<span class="removed"><del><strong>a paywall)
+ reports that</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
<span class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
+ and</em></ins></span> the <span class="removed"><del><strong>FBI can
remotely activate</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>GPS and
microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here is</strong></del></span>
<span class="inserted"><ins><em>free software
+ only</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains
anti-features</a>.</p></em></ins></span>
</li>
- <li id="M201804020">
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>GPS</strong></del></span> <span
class="inserted"><ins><em>information to
+ which users are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
@@ -1285,34 +1307,28 @@
</li>
<li id="M201803050">
- <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>microphone</strong></del></span> <span
class="inserted"><ins><em>dis-service
- spy on users even more than users expected. It <a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ <p>The moviepass app</em></ins></span> and <span
class="inserted"><ins><em>dis-service
+ spy on</em></ins></span> users <span class="removed"><del><strong>cannot
stop them:</strong></del></span> <span class="inserted"><ins><em>even more than
users expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="inserted"><ins><em>popular</em></ins></span> Android
- <span class="removed"><del><strong>phones and laptops</a>.
- (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>apps</em></ins></span>
- is <span class="inserted"><ins><em>pervasive and sometimes very clever.
Some trackers can</em></ins></span> <a <span
class="removed"><del><strong>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></em></ins></span>
+ networks</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
- remote command and users cannot stop them:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads</em></ins></span> all <span class="removed"><del><strong>new
portable phones
- to</strong></del></span> <span class="inserted"><ins><em>phone numbers
and email addresses</a> in user's address
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads</em></ins></span> all <span class="removed"><del><strong>new
portable phones</strong></del></span> <span class="inserted"><ins><em>phone
numbers and email addresses</a> in user's address
book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
@@ -1339,7 +1355,7 @@
to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
+ the source code somehow</em></ins></span> to <span
class="inserted"><ins><em>determine whether they mistreat users in
various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
@@ -3137,7 +3153,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/13 12:00:24 $
+$Date: 2019/02/20 15:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- proprietary/po/proprietary-surveillance.de.po 13 Feb 2019 12:00:24
-0000 1.259
+++ proprietary/po/proprietary-surveillance.de.po 20 Feb 2019 15:30:48
-0000 1.260
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1856,6 +1856,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.375
retrieving revision 1.376
diff -u -b -r1.375 -r1.376
--- proprietary/po/proprietary-surveillance.fr.po 13 Feb 2019 13:27:21
-0000 1.375
+++ proprietary/po/proprietary-surveillance.fr.po 20 Feb 2019 15:30:48
-0000 1.376
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-02-13 14:22+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1418,6 +1419,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/proprietary-surveillance.it-diff.html 13 Feb 2019
12:00:24 -0000 1.110
+++ proprietary/po/proprietary-surveillance.it-diff.html 20 Feb 2019
15:30:48 -0000 1.111
@@ -1137,67 +1137,103 @@
<ul class="blurbs">
<li id="M201902060">
- <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>mobile devices report which other
- apps the user has
- installed.</strong></del></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>a way that at least is visible and
- optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>interacting with</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
+ <p>Many nonfree</em></ins></span> apps <span
class="inserted"><ins><em>have a surveillance feature</em></ins></span> for
<span class="removed"><del><strong>mobile devices report which
other</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
+ </li>
+
+ <li id="M201902041.1">
+ <p>Twenty nine “beauty camera”</em></ins></span> apps
<span class="inserted"><ins><em>that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
+ the user <span class="removed"><del><strong>has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this</strong></del></span> <span
class="inserted"><ins><em>interface of most of them was designed to make
uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree
apps</em></ins></span> in
+ <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry</em></ins></span> a <span class="removed"><del><strong>way that at
least</strong></del></span> <span class="inserted"><ins><em>potential risk
because
+ there</em></ins></span> is <span class="removed"><del><strong>visible and
+ optional</a>. Not as bad as</strong></del></span> <span
class="inserted"><ins><em>no easy way of knowing</em></ins></span> what <span
class="removed"><del><strong>the others</strong></del></span> <span
class="inserted"><ins><em>they really</em></ins></span> do.</p>
</li>
<span class="removed"><del><strong><li><p>FTC
says</strong></del></span>
<span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of the 150</em></ins></span> most <span
class="removed"><del><strong>mobile apps for children don't respect privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <p>An investigation of the 150</em></ins></span> most <span
class="removed"><del><strong>mobile</strong></del></span> <span
class="inserted"><ins><em>popular
+ gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for
children don't respect privacy:</strong></del></span> <span
class="inserted"><ins><em>in Google Play found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span> <span
class="inserted"><ins><em>popular
- gratis VPN</em></ins></span> apps <span class="removed"><del><strong>snoop
on the user</a>. This is</strong></del></span> in <span
class="removed"><del><strong>addition</strong></del></span> <span
class="inserted"><ins><em>Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS</strong></del></span> <span
class="inserted"><ins><em>protect their usersâ privacy</a> due to DNS
leaks. In
- addition, 85% feature intrusive permissions or functions</em></ins></span>
in <span class="removed"><del><strong>the
- phone.</p>
-
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>their
- source code—often used for invasive advertising—that could
- potentially also</em></ins></span> be <span
class="removed"><del><strong>distracted by the question</strong></del></span>
<span class="inserted"><ins><em>used to spy on users. Other technical flaws were
+ <li><p>Widely</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often</em></ins></span> used <span
class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>for invasive advertising—that could
+ potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
-
href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>whether</strong></del></span>
- the <span class="removed"><del><strong>app developers get
- users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>top 10 gratis VPN apps have lousy privacy
policies</a>.</p>
+ href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
+ the <span class="removed"><del><strong>user</a>.
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps have lousy privacy policies</a>.</p>
- <p>It</em></ins></span> is <span class="removed"><del><strong>no
excuse for malware.</p>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that
these articles talk about “free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
- <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
+ <li id="M201901050">
+ <p>The Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS in</strong></del></span> <span class="inserted"><ins><em>company's
server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by the question</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>what it will do
+ with</em></ins></span> the <span class="removed"><del><strong>app
developers get
+ users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>about
a side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
+ the company gets that data at all.</p>
+
+ <p><a
+
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p></em></ins></span>
</li>
- <li id="M201901050"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span class="inserted"><ins><em>Weather
Channel</em></ins></span> app <span class="removed"><del><strong>because it
asked the user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>to other companies. This
shows</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>what it will do
- with the data.</p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>user's actions</em></ins></span> to
+ <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the</em></ins></span> data <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>it obtains from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask</strong></del></span> <span class="inserted"><ins><em>same machine
via
+ various apps. Some of them send Facebook detailed
information</em></ins></span> about <span class="removed"><del><strong>sending
it to other companies. This shows</strong></del></span>
+ the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's activities in the app; others only say that
the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>user has</em></ins></span> a <span
class="removed"><del><strong>flashlight
app send any information to anyone? A free software flashlight
- app would not.</p>
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
+ account.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -1206,34 +1242,34 @@
</div>
<ul>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal</strong></del></span>
<span class="inserted"><ins><em>side issue. What the company does
- with the</em></ins></span> data <span class="removed"><del><strong>about
them to
- nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>is a secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
- <p><a
-
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends personal data
about them to
+ nVidia servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>that have deleted
them</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span class="removed"><del><strong>NSA
takes advantage</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span class="removed"><del><strong>spy
through</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>user's location
even when users disable “location
+ tracking”</a>.</p>
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data</em></ins></span> it <span
class="removed"><del><strong>too</a>.
- Here's</strong></del></span> <span class="inserted"><ins><em>obtains
from the same machine via
- various apps. Some of them send Facebook detailed</em></ins></span>
information <span class="removed"><del><strong>on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's information on</strong></del></span> <span
class="inserted"><ins><em>turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
+ </li>
+
+ <li id="M201806110">
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More</strong></del></span> about <span class="removed"><del><strong>NSA
app spying</a>.</p>
+ More about NSA app spying</a>.</p>
</li>
</ul>
@@ -1245,130 +1281,130 @@
<ul>
<li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based</strong></del></span>
- <span class="inserted"><ins><em>the user's activities</em></ins></span> in
the <span class="removed"><del><strong>U.S.</p>
+ <p>The “smart” toys My Friend Cayla</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>listens
through the microphone</a>.</p>
+
+ <p>This makes them act as spies for licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
+ a <span class="removed"><del><strong>speech recognition company based in
the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers to listen in on a child's speech, and even speak
- into</strong></del></span> <span class="inserted"><ins><em>user is
- using that app, but that alone is often quite informative.</p>
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em>recording. But I can't be sure from</em></ins></span>
the <span class="removed"><del><strong>toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>user has a Facebook
- account.</p></em></ins></span>
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will
benefit</em></ins></span> in <span class="removed"><del><strong>on a child's
speech, and even speak
+ into the toys themselves.</p></strong></del></span>
+ <span class="inserted"><ins><em>many ways. This is one
more.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>A computerized vibrator</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ <span class="inserted"><ins><em><li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about</em></ins></span> its <span
class="removed"><del><strong>users through</strong></del></span> <span
class="inserted"><ins><em>users</a>. 40% of</em></ins></span> the <span
class="inserted"><ins><em>apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>control app</a>.</p>
- <p>The app was reporting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> of <span
class="inserted"><ins><em>users that have deleted them</a>.</p>
- </li>
+ <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
- <li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>vibrator
minute by
- minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span class="inserted"><ins><em>user's
location even when users disable “location
- tracking”</a>.</p>
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android</em></ins></span> by <span class="removed"><del><strong>a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em><a href="https://replicant.us">switching to
Replicant</a>,
+ and</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
- <p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well as</strong></del></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about
+ their products, rather than</strong></del></span> free software <span
class="removed"><del><strong>which users could have
+ checked and changed.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>The company</strong></del></span>
+ <span class="inserted"><ins><em>only <a
href="https://f-droid.org/">F-Droid store</a></em></ins></span> that
<span class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
+ the <span class="removed"><del><strong>vibrator</strong></del></span>
<span class="inserted"><ins><em>user if an app contains
anti-features</a>.</p>
</li>
- <li id="M201806110">
- <p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>totally inadequate proposed
response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked</strong></del></span> <span class="inserted"><ins><em>user's
movements</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
-
- <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>vibrator
- <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ <li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
- <p>This makes them act as spies</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
+ <p>Grindr should not have so much</em></ins></span> information
about <span class="removed"><del><strong>how
people used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
-
- <p>I expect</em></ins></span> it <span
class="removed"><del><strong>had sold the data</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no
way</em></ins></span> to <span class="inserted"><ins><em>save</em></ins></span>
- a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>recording. But I can't be sure
from</em></ins></span> the <span class="removed"><del><strong>data broker would
have been able</strong></del></span> <span
class="inserted"><ins><em>article.</p>
-
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>figure out
- who the user was.</p>
+ <p>The company's statement that it was anonymizing the data
may</strong></del></span> <span class="inserted"><ins><em>its users.
+ It could</em></ins></span> be
+ <span class="removed"><del><strong>true, but it doesn't really matter.
If it had sold the data</strong></del></span> <span
class="inserted"><ins><em>designed so that users communicate such
info</em></ins></span> to <span class="removed"><del><strong>a
+ data broker, the data broker would have been able</strong></del></span>
<span class="inserted"><ins><em>each
+ other but not</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who</strong></del></span> the <span class="removed"><del><strong>user
was.</p>
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will benefit in
- many ways. This is one more.</p>
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
</li>
- <li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span class="removed"><del><strong>company has
been ordered</strong></del></span> <span class="inserted"><ins><em>5,855
Android apps studied by researchers were found</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>snoop
- and collect information about its users</a>. 40%</em></ins></span>
of <span class="removed"><del><strong>C$4m</a></strong></del></span>
<span class="inserted"><ins><em>the apps were
- found</em></ins></span> to <span class="inserted"><ins><em>insecurely
snitch on</em></ins></span> its <span
class="removed"><del><strong>customers.</p>
- </li>
-
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations</strong></del></span> <span
class="inserted"><ins><em>users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
-
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need</em></ins></span> to <span class="inserted"><ins><em>get rid
of</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found a way</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
- and</em></ins></span> the <span class="removed"><del><strong>data</a>
- collected by</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>manufacturer's
snooping.</p>
+ <li id="M201803050">
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> a <span
class="removed"><del><strong>total of C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
+
+ <p>Don't be tracked—pay cash!</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
+ <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
+ manufacturer</a>. Guess what?</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow</em></ins></span> a <span class="removed"><del><strong>way to
access the data</a>
+ collected</strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store</em></ins></span> by <span
class="removed"><del><strong>the manufacturer's snooping.</p>
- <p>That</strong></del></span> <span class="inserted"><ins><em>free
software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>manufacturer
and</strong></del></span> <span class="inserted"><ins><em>user if an app
contains anti-features</a>.</p>
+ <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>noticing WiFi
+ networks</a>.</p>
</li>
- <li id="M201804020">
- <p>Grindr collects information about <a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>information to
- companies</a>.</p>
-
- <p>Grindr should not have so much information about its users.
- It</em></ins></span> could <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>be designed so that users communicate such
info</em></ins></span> to <span class="removed"><del><strong>these conversations
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</em></ins></span> and <span
class="inserted"><ins><em>email addresses</a> in user's address
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span> <span class="inserted"><ins><em>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</em></ins></span> to <span class="removed"><del><strong>these
conversations
was unacceptable by itself.</p></li>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>each
- other but not</em></ins></span> to <span class="inserted"><ins><em>the
server's database.</p>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>zero price.</p>
</li>
- <li id="M201803050">
- <p>The moviepass app and dis-service</em></ins></span>
- spy on <span class="removed"><del><strong>children</strong></del></span>
<span class="inserted"><ins><em>users even more than users expected. It <a
-
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>after going</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>sent them and text messages and
emails</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1378,48 +1414,46 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>a movie</a>.</p>
-
- <p>Don't be tracked—pay cash!</p>
- </li>
-
- <li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>the contrary, it
+ worked</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>popular Android apps
- is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
- </li>
-
- <li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server.</em></ins></span> Note that <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo
used</strong></del></span> <span class="inserted"><ins><em>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
- </li>
-
- <li id="M201707270">
- <p>20 dishonest Android apps recorded <a
-
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
-
- <p>Google</em></ins></span> did not <span
class="removed"><del><strong>affect
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that,</em></ins></span> and
<span class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.
+Note that the specific sabotage method Lenovo used did not affect
GNU/Linux; also, a “clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
+puts</strong></del></span> <span class="inserted"><ins><em>deleted these apps
after
+ discovering what they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares</em></ins></span> in <span class="inserted"><ins><em>the
responsibility for the injustice of their being
+ nonfree. It also distributes</em></ins></span> its own <span
class="removed"><del><strong>malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>intend</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android
users,</em></ins></span>
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>inspect executable
proprietary apps to see what they do.</p>
+
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>top under</strong></del></span> each <span
class="removed"><del><strong>subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -1429,95 +1463,72 @@
<ul>
<li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows</strong></del></span> <span
class="inserted"><ins><em>other.</p>
+ </li>
+
+ <li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Specifically, it</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop on users</a>.</p>
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that, and deleted these apps
after
- discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ <p>With free software apps, users could <em>make
sure</em> that they
+ don't snoop.</p>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>collect the emails of members of Parliament
+ this way, because</strong></del></span> <span class="inserted"><ins><em>only
hope that</em></ins></span> they <span class="removed"><del><strong>pass it
through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
<span class="inserted"><ins><em>don't.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what they do.</p>
-
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat
users</em></ins></span> in <span class="removed"><del><strong>Skype</h4>
+ <h4 id="SpywareInSkype">Spyware in Skype</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
</div>
<ul>
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>various ways. If it did a good job of
this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ <span class="inserted"><ins><em><li id="M201705040">
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
+ programs</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
- don't snoop.</p>
-
- <p>With proprietary apps, one can only hope that they
don't.</p>
- </li>
- <li id="M201705040">
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
- programs</a>.</p>
- </li>
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS:</strong></del></span>
- <li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ <span class="inserted"><ins><em><li id="M201704260">
+ <p>Faceapp appears to do lots of surveillance, judging by <a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access it demands to personal data in the
device</a>.</p>
</li>
<li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>its headphones</a>. Specifically,
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
+ would that</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
the app to snoop at all</a>.</p>
</li>
@@ -2964,7 +2975,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/13 12:00:24 $
+$Date: 2019/02/20 15:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.272
retrieving revision 1.273
diff -u -b -r1.272 -r1.273
--- proprietary/po/proprietary-surveillance.it.po 13 Feb 2019 12:00:24
-0000 1.272
+++ proprietary/po/proprietary-surveillance.it.po 20 Feb 2019 15:30:48
-0000 1.273
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1806,6 +1806,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/proprietary-surveillance.ja-diff.html 13 Feb 2019
12:00:24 -0000 1.120
+++ proprietary/po/proprietary-surveillance.ja-diff.html 20 Feb 2019
15:30:48 -0000 1.121
@@ -1045,196 +1045,166 @@
optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>interacting with</em></ins></span> the <span
class="removed"><del><strong>others do.</p></strong></del></span> <span
class="inserted"><ins><em>app.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>FTC
says</strong></del></span>
+ <span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation of the 150</em></ins></span> most <span
class="removed"><del><strong>mobile</strong></del></span> <span
class="inserted"><ins><em>popular
- gratis VPN</em></ins></span> apps <span class="removed"><del><strong>for
children don't respect privacy:</strong></del></span> <span
class="inserted"><ins><em>in Google Play found that</em></ins></span> <a
<span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+ <span class="inserted"><ins><em><li id="M201902041.1">
+ <p>Twenty nine “beauty camera”</em></ins></span> apps
<span class="removed"><del><strong>for children don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <li><p>Widely</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often</em></ins></span> used <span
class="removed"><del><strong><a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>for invasive advertising—that could
- potentially also be used to spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
- found as well.</p>
-
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half
of</em></ins></span>
- the <span class="removed"><del><strong>user</a>.
This</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps have lousy privacy policies</a>.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>in
addition</strong></del></span> <span class="inserted"><ins><em>unfortunate that
these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free software</a>.</p>
- </li>
-
- <li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS in the
+ <li><p>Widely</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> used <span
class="inserted"><ins><em>to
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted and often malicious ads</em></ins></span> on <span
class="removed"><del><strong>the user</a>. This is in addition to
+ the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>users,</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
phone.</p>
- <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that it notify</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>users</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>what it will do
- with</em></ins></span> the <span class="removed"><del><strong>app
developers get
- users to say “I agree”. That</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>about
a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
-
- <p><a
-
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p></em></ins></span>
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>redirecting
+ them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
+ the <span class="removed"><del><strong>question</strong></del></span>
<span class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>whether the app developers get
+ users</strong></del></span> <span class="inserted"><ins><em>most of them
was designed</em></ins></span> to <span class="removed"><del><strong>say
“I agree”. That</strong></del></span> <span
class="inserted"><ins><em>make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there</em></ins></span> is no <span class="removed"><del><strong>excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
sends user data, including geolocation, for use by
companies.</a></p>
- <p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>user's actions</em></ins></span> to
- <span class="removed"><del><strong>approve sending
personal</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the</em></ins></span> data <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>it obtains from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask</strong></del></span> <span class="inserted"><ins><em>same machine
via
- various apps. Some of them send Facebook detailed
information</em></ins></span> about <span class="removed"><del><strong>sending
it to other companies. This shows</strong></del></span>
- the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>user's activities in the app; others only say that
the user is
- using that app, but that alone is often quite informative.</p>
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data to the app developer but did not
+ ask about sending it to other companies. This shows the
+ weakness</strong></del></span>
- <p>This spying occurs regardless</em></ins></span> of <span
class="inserted"><ins><em>whether</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>user has</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ <span class="inserted"><ins><em><li id="M201902010">
+ <p>An investigation</em></ins></span> of the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
app send any information to anyone? A free software flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook
- account.</p></em></ins></span>
+ app would not.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware in Games</h4>
+ <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>150 most popular
+ gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of</em></ins></span> users <span
class="removed"><del><strong>identify themselves and then sends personal data
about them</strong></del></span> <span class="inserted"><ins><em>that have
deleted them</a>.</p>
- </li>
-
- <li id="M201808030">
- <p>Some Google apps on Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
- tracking”</a>.</p>
-
- <p>There are other ways</em></ins></span> to
- <span class="removed"><del><strong>nVidia
servers</a>.</p></strong></del></span> <span
class="inserted"><ins><em>turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span> <span class="inserted"><ins><em>Google Play
found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ 25% fail</em></ins></span> to
+ <span class="removed"><del><strong>nVidia servers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Angry
Birds</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
-
- <p>This makes them act as</em></ins></span> spies for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
-
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>article.</p>
-
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies</strong></del></span> <span class="inserted"><ins><em>protect
their usersâ privacy</a> due to DNS leaks. In
+ addition, 85% feature intrusive permissions or functions in their
+ source code—often used</em></ins></span> for <span
class="removed"><del><strong>companies, and the NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>invasive
advertising—that could
+ potentially also be used</em></ins></span> to spy <span
class="removed"><del><strong>through it too</a>.
+ Here's information</strong></del></span> on
+ <span class="removed"><del><strong><a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More</strong></del></span> <span class="inserted"><ins><em>care much
less</em></ins></span> about <span class="removed"><del><strong>NSA app
spying</a>.</p>
+ More about NSA app spying</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
- <li><p>A company that makes internet-controlled
vibrators</strong></del></span>
- <span class="inserted"><ins><em>many ways. This is one more.</p>
- </li>
+ <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>users. Other technical flaws were
+ found as well.</p>
- <li id="M201804160">
- <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ <p>Moreover, a previous investigation had found</em></ins></span>
that <span class="removed"><del><strong>makes internet-controlled
vibrators</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
being sued for collecting lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of <span class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were
found to snoop
- and collect</em></ins></span> information about <span
class="removed"><del><strong>how
- people use it</a>.</p>
-
- <p>The company's statement that it
anonymizes</strong></del></span> <span class="inserted"><ins><em>its
users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>data may</strong></del></span> <span
class="inserted"><ins><em>apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might</em></ins></span> be
- <span class="removed"><del><strong>true, but it doesn't really matter.
If it sells</strong></del></span> <span class="inserted"><ins><em>snooping
- in other ways.</p>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>personal
information</strong></del></span>
+ <span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both proprietary
- Android by <a
href="https://replicant.us">switching</em></ins></span> to <span
class="removed"><del><strong>a
- data broker,</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
- and</em></ins></span> the <span class="removed"><del><strong>data broker
can figure out who</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps from the free
software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the user <span
class="removed"><del><strong>is.</p></strong></del></span> <span
class="inserted"><ins><em>if an app contains
anti-features</a>.</p></em></ins></span>
+ <p>It is unfortunate that these articles talk</em></ins></span>
about <span class="removed"><del><strong>how
+ people use it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>A computerized
- vibrator</strong></del></span>
+ <li id="M201901050"></em></ins></span>
+ <p>The <span class="inserted"><ins><em>Weather Channel app <a
+
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the</em></ins></span> company's <span
class="removed"><del><strong>statement</strong></del></span> <span
class="inserted"><ins><em>server</a>. The company is
+ being sued, demanding</em></ins></span> that it <span
class="removed"><del><strong>anonymizes</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>data may be
+ true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>will do
+ with</em></ins></span> the <span class="removed"><del><strong>data
to</strong></del></span> <span class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a
+ <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>side issue. What the company does
+ with</em></ins></span> the data <span class="removed"><del><strong>broker
can figure out who</strong></del></span> <span class="inserted"><ins><em>is a
secondary issue. The principal wrong here is that</em></ins></span>
+ the <span class="removed"><del><strong>user is.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides the information to
- companies</a>.</p>
+ <li><p>A computerized
+ vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
+ on its users through</strong></del></span> <span
class="inserted"><ins><em>company gets that data at all.</p>
- <p>Grindr should not have so much information
about</em></ins></span> its <span class="inserted"><ins><em>users.
- It could be designed so that</em></ins></span> users <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>communicate such info to each
- other but not to</em></ins></span> the <span
class="removed"><del><strong>proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
+ <p><a
+
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p>
</li>
- <li id="M201803050"></em></ins></span>
- <p>The <span class="inserted"><ins><em>moviepass</em></ins></span>
app <span class="removed"><del><strong>reports the temperature of the vibrator
minute by
- minute (thus, indirectly, whether it is surrounded by a person's
- body),</strong></del></span> and <span class="removed"><del><strong>the
vibration frequency.</p>
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on</em></ins></span> the <span
class="removed"><del><strong>proprietary control app</a>.</p>
- <p>Note the totally inadequate proposed response: a labeling
+ <p>The app reports</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
+
+ <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
+ Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>is surrounded by a person's
+ body), and</strong></del></span> <span class="inserted"><ins><em>obtains
from</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>same
machine via
+ various apps. Some of them send Facebook detailed information
about</em></ins></span>
+ the <span class="removed"><del><strong>totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>user's
activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user
has</em></ins></span> a <span class="removed"><del><strong>labeling
standard with which manufacturers would make statements about
- their products, rather</strong></del></span> <span
class="inserted"><ins><em>dis-service
- spy on users even more</em></ins></span> than <span
class="removed"><del><strong>free software which</strong></del></span> users
<span class="removed"><del><strong>can check
- and change.</p>
- </li>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after</em></ins></span> going to <span
class="removed"><del><strong>spy on children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a movie</a>.</p>
+ their products, rather than free software which</strong></del></span>
<span class="inserted"><ins><em>Facebook
+ account.</p>
+ </li>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of</em></ins></span> users <span
class="removed"><del><strong>can check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>that have deleted
them</a>.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when users disable “location
+ tracking”</a>.</p>
+
+ <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>spy on children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1250,252 +1220,182 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>popular Android apps
- is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p>
- </li>
+<li><p></strong></del></span>
- <li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server.</em></ins></span> Note that <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo
used</strong></del></span> <span class="inserted"><ins><em>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
- </li>
+ <span class="inserted"><ins><em><li id="M201806110">
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note that</strong></del></span> <span class="inserted"><ins><em>listens
through</em></ins></span> the <span class="removed"><del><strong>specific
sabotage method Lenovo used did not affect
+GNU/Linux; also, a “clean” Windows install</strong></del></span>
<span class="inserted"><ins><em>microphone</a>.</p>
- <li id="M201707270">
- <p>20 dishonest Android apps recorded <a
-
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
+ <p>This makes them act as spies for licensing enforcement.</p>
- <p>Google</em></ins></span> did not <span
class="removed"><del><strong>affect
-GNU/Linux; also, a “clean” Windows install is not really
+ <p>I expect it implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>intend</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from the article.</p>
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
+ <p>If you learn to care much less about sports, you will benefit in
+ many ways. This is one more.</p>
+ </li>
- <p>Specifically, it can collect</strong></del></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <li id="M201804160">
+ <p>More than <a
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
-</ul>
+ <li id="M201804020">
+ <p>Grindr collects information about <a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware</strong></del></span>
- <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="removed"><del><strong>Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that, and deleted these apps
after
- discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ <p>Grindr should not have so much information about its users.
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
+ </li>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>the responsibility for the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
+ <li id="M201803050">
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going to a movie</a>.</p>
- <p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
+ <p>Don't be tracked—pay cash!</p>
</li>
-</ul>
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+ </li>
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
+ </li>
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>Google, or Android users,</em></ins></span>
- to <span class="removed"><del><strong>place new items on top under each
subsection -->
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
+ discovering what they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
-<ul>
- <li>
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>source code for these apps, and
study</em></ins></span>
- the <span class="removed"><del><strong>manufacturer is
using</strong></del></span> <span class="inserted"><ins><em>source code somehow
to determine whether they mistreat users in
- various ways. If it did a good job of this,</em></ins></span> it <span
class="inserted"><ins><em>could more or less
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
- enough</em></ins></span> to outsmart
- <span class="removed"><del><strong>you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this</strong></del></span> <span class="inserted"><ins><em>the
checking.</p>
+ enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source</em></ins></span>
code <span class="removed"><del><strong>snoops</strong></del></span> <span
class="inserted"><ins><em>to the
- public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>readers</a>.</p></strong></del></span>
<span class="inserted"><ins><em>each other.</p></em></ins></span>
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
- <span class="removed"><del><strong><li><p>Spyware in many
e-readers—not only the
- Kindle:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <li id="M201705230">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that</em></ins></span> they <span
class="removed"><del><strong>report even which page the user reads at what
time</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>don't snoop.</p>
+ <p>With free software apps, users could <em>make
sure</em> that they
+ don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <span class="removed"><del><strong><li><p>Adobe made
“Digital Editions,” the e-reader used</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234 Android apps that track users</em></ins></span>
by <span class="removed"><del><strong>most US libraries,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears to do</em></ins></span> lots of <span
class="removed"><del><strong>data to Adobe</a>. Adobe's
“excuse”: it's
- needed</strong></del></span> <span
class="inserted"><ins><em>surveillance, judging by <a
+ <p>Faceapp appears to do lots of surveillance, judging by <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware</strong></del></span> <span
class="inserted"><ins><em>personal data</em></ins></span> in <span
class="removed"><del><strong>Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>the
device</a>.</p>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
<li id="M201704190">
- <p>Users</em></ins></span> are <span class="inserted"><ins><em>suing
Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p>
- </li>
-
- <li><p>The Nissan Leaf has</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
- effectively
- anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access</strong></del></span> <span class="inserted"><ins><em>spyware app
for</em></ins></span> its <span class="removed"><del><strong>computers remotely
and make changes in various
- settings</a>.</p>
-
- <p>That's easy to do because</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,</em></ins></span>
- the <span class="removed"><del><strong>system has no authentication when
- accessed through</strong></del></span> <span class="inserted"><ins><em>app
would record</em></ins></span> the <span class="removed"><del><strong>modem.
However, even if it asked for
- authentication, you couldn't be confident that Nissan has no
- access. The software in</strong></del></span> <span
class="inserted"><ins><em>names of</em></ins></span> the <span
class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means it demands blind faith from its users</a>.</p>
-
- <p>Even if no one connects</strong></del></span> <span
class="inserted"><ins><em>audio files users listen</em></ins></span> to
- <span class="inserted"><ins><em>along with</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
-
- <p>The suit accuses that this was done without</em></ins></span> the
<span class="removed"><del><strong>phone company to track</strong></del></span>
<span class="inserted"><ins><em>users' consent.
- If</em></ins></span> the <span class="removed"><del><strong>car's
movements all</strong></del></span> <span class="inserted"><ins><em>fine print
of</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>app said that users gave consent for this,
- would that make</em></ins></span> it <span class="removed"><del><strong>is
possible</strong></del></span> <span class="inserted"><ins><em>acceptable? No
way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>physically
remove</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span>
- the <span class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>app to snoop at
all</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Proprietary software
in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs of Android apps can collude</em></ins></span>
- to <span class="removed"><del><strong>car manufacturers, insurance
companies, and
- others.</p>
-
- <p>The case</strong></del></span> <span
class="inserted"><ins><em>transmit users' personal data to servers. <a
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses that this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
+ </li>
+
+ <li id="M201704074">
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
- study found tens</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned in this
article, is not
- really a matter</strong></del></span> <span
class="inserted"><ins><em>thousands</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These systems
are</strong></del></span> <span class="inserted"><ins><em>pairs that
collude</a>.</p>
+ study found tens of thousands of pairs that collude</a>.</p>
</li>
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced</em></ins></span> an
- <span class="removed"><del><strong>intolerable
invasion</strong></del></span> <span class="inserted"><ins><em>opt-in
proprietary search app that it will</a> pre-install
- on some</em></ins></span> of <span class="removed"><del><strong>privacy,
and should be replaced with anonymous
- payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>its
phones.</em></ins></span> The <span class="removed"><del><strong>other
- cases mentioned are done by proprietary malware in</strong></del></span>
<span class="inserted"><ins><em>app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>same information
- about</em></ins></span> the <span class="removed"><del><strong>company to
extract data remotely and
- determine</strong></del></span> <span class="inserted"><ins><em>users'
searches that Google normally gets when they use
+ announced an opt-in proprietary search app that it will</a>
pre-install
+ on some of its phones. The app will give Verizon the same information
+ about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>app
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</em></ins></span> and
<span class="removed"><del><strong>c.</a>). The company says it doesn't
- store this information, but if</strong></del></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>user must
- explicitly opt-in before</em></ins></span> the <span
class="removed"><del><strong>data
- and hand it over,</strong></del></span> <span
class="inserted"><ins><em>app takes effect. However,</em></ins></span> the
<span class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>app
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
+ explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
</li>
@@ -1914,13 +1814,24 @@
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
+ snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware at Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>what
programs people watch, and even what they wanted to
record</a>.</p>
</li>
<li id="M201504300">
- <p>Vizio <a
-
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
@@ -1929,7 +1840,10 @@
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the US or some
+ Nuance can save it and would then have to give it to the</em></ins></span>
US <span class="removed"><del><strong>Companies, NSA To Route Around Domestic
Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span> <span
class="inserted"><ins><em>or some
other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
@@ -1972,15 +1886,19 @@
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
- <p>Even worse, it <a
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
- <p>LG later said it had installed a patch to stop this, but any
+ <p>LG later said</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:</strong></del></span>
<span class="inserted"><ins><em>had installed a patch to stop this, but any
product could spy this way.</p>
- <p>Meanwhile, LG TVs <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
</li>
@@ -1993,34 +1911,57 @@
</ul>
-<span class="removed"><del><strong><!-- #SpywareAtHome -->
-<!-- WEBMASTERS:</strong></del></span>
-
-
-<span class="inserted"><ins><em><div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a> which save it
permanently.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
give the manufacturer an unencrypted copy of everything they
see</a>. “Home insecurity camera” would be a better
name!</p>
<p>When Consumer Reports tested them, it suggested that these
manufacturers promise not to look at what's in the videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p>
+ security</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
+ </li>
+</ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make</strong></del></span> <span
class="inserted"><ins><em>your home. Security means making</em></ins></span>
sure <span class="inserted"><ins><em>they don't get</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
<li id="M201603220">
@@ -2029,139 +1970,204 @@
security bugs that allow anyone to watch through them</a>.</p>
</li>
- <li id="M201511250">
+ <li id="M201511250"></em></ins></span>
<p>The Nest Cam “smart” camera is <a
href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using
<span class="removed"><del><strong>it to outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not only the
+ Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page the user reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,
+ <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span>
+ to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>outsmart
you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ <p>The Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ effectively
+ anyone</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+ access its computers remotely and make</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
+ listening device, remote</em></ins></span> changes <span
class="removed"><del><strong>in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> to <span
class="removed"><del><strong>do because the system has no authentication when
+ accessed through</strong></del></span> the <span
class="removed"><del><strong>modem. However, even if</strong></del></span>
<span class="inserted"><ins><em>code could surely convert</em></ins></span> it
<span class="removed"><del><strong>asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software in</strong></del></span>
+ <span class="inserted"><ins><em>into one.</p>
</li>
<li id="M201711100">
<p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ recordings of</em></ins></span> the <span class="removed"><del><strong>car
is
+ proprietary,</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
</li>
<li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means it demands blind faith from</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on</em></ins></span> its <span
class="removed"><del><strong>users</a>.</p>
+
+ <p>Even if no one connects to the car remotely, the cell phone
+ modem enables</strong></del></span> <span class="inserted"><ins><em>users
through</em></ins></span> the <span class="removed"><del><strong>phone company
to track</strong></del></span> <span class="inserted"><ins><em>proprietary
control app</a>.</p>
+
+ <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>temperature of</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>vibrator minute by
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>is possible to physically
remove</strong></del></span> <span class="inserted"><ins><em>was surrounded by
a person's
+ body), as well as</em></ins></span> the <span
class="removed"><del><strong>cell phone modem
+ though.</p>
+ </li>
+
+ <li><p>Proprietary software in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span> <span class="inserted"><ins><em>vibration
frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>statements about their
- products, rather than free software which users could have checked
- and changed.</p>
+ standard with which manufacturers would make statements</em></ins></span>
about <span class="removed"><del><strong>drivers'
movements</a>,</strong></del></span> <span class="inserted"><ins><em>their
+ products, rather than free software</em></ins></span> which <span
class="removed"><del><strong>is made available to car manufacturers, insurance
companies,</strong></del></span> <span class="inserted"><ins><em>users could
have checked</em></ins></span>
+ and
+ <span
class="removed"><del><strong>others.</p></strong></del></span> <span
class="inserted"><ins><em>changed.</p></em></ins></span>
- <p>The company that made the vibrator <a
+ <p>The <span class="removed"><del><strong>case</strong></del></span>
<span class="inserted"><ins><em>company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
+ was sued for collecting lots</em></ins></span> of <span
class="removed"><del><strong>toll-collection systems, mentioned
in</strong></del></span> <span class="inserted"><ins><em>personal information
about how people
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the
data</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>a data
+ true, but it doesn't really matter. If it had sold the data to a data
broker, the data broker would have been able to figure out who the
user was.</p>
- <p>Following this lawsuit, <a
+ <p>Following</em></ins></span> this <span
class="removed"><del><strong>article, is not
+ really</strong></del></span> <span class="inserted"><ins><em>lawsuit,
<a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
+ the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>total</em></ins></span> of <span
class="removed"><del><strong>privacy, and should be
replaced</strong></del></span> <span class="inserted"><ins><em>C$4m</a>
to its
customers.</p>
</li>
<li id="M201702280">
- <p>“CloudPets” toys with microphones <a
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>microphones <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+ leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware. The other
+ cases mentioned are done</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
- manufacturer's snooping.</p>
+ Crackers found a way to access the data</a>
collected</em></ins></span> by <span class="removed"><del><strong>proprietary
malware in</strong></del></span> the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
+ <p>That</em></ins></span> the <span
class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span
class="inserted"><ins><em>manufacturer</em></ins></span> and
+ <span class="removed"><del><strong>determine</strong></del></span> the
<span class="removed"><del><strong>car's location at any time. (See
+ <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b</strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
conversations was unacceptable by itself.</p>
</li>
<li id="M201612060">
- <p>The “smart” toys My Friend Cayla and i-Que transmit
<a
+ <p>The “smart” toys My Friend Cayla</em></ins></span>
and <span class="removed"><del><strong>c.</a>). The</strong></del></span>
<span class="inserted"><ins><em>i-Que transmit <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ conversations to Nuance Communications</a>, a speech
recognition</em></ins></span>
+ company <span class="removed"><del><strong>says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>based in</em></ins></span> the <span
class="removed"><del><strong>state orders it to get</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen in on a child's speech,</em></ins></span> and <span
class="removed"><del><strong>hand it over,</strong></del></span> <span
class="inserted"><ins><em>even speak into</em></ins></span> the <span
class="removed"><del><strong>state can store it.</p></strong></del></span>
+ <span class="inserted"><ins><em>toys
themselves.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed</strong></del></span> <span
class="inserted"><ins><em>a child's speech, and even speak into the
- toys themselves.</p>
- </li>
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201502180">
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going</em></ins></span> to spy on <span class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>children and
adults</a>.</p></em></ins></span>
+ going</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>top under each subsection
--></strong></del></span> <span class="inserted"><ins><em>children and
adults</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
-<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+<div <span class="removed"><del><strong>class="big-section">
+ <h3 id="SpywareAtHome">Spyware at
Home</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
+ <h4 id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtHome">#SpywareAtHome</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
+<span class="removed"><del><strong><div style="clear: left;"></div>
-<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers were programmed</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
- to <span class="removed"><del><strong>me and
-said, “Didn't I see you</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out the</strong></del></span> other <span
class="removed"><del><strong>way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>people, DJI is in
many cases <a
+ <p>While you're using a DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>their
renters</a>.</p></strong></del></span> <span
class="inserted"><ins><em>other people, DJI is in many cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p>
+ on you</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareAtHome">Other Appliances</h4><span
class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInTVSets">Spyware in
TV Sets</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips made a joke: The
other day</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out the other way.” Evidently that was
+before Amazon “smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>break the security of
an Amazon device,
and</em></ins></span> <a <span class="removed"><del><strong>href="
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
@@ -2786,7 +2792,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/13 12:00:24 $
+$Date: 2019/02/20 15:30:48 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary/po/proprietary-surveillance.ja.po 13 Feb 2019 12:00:24
-0000 1.245
+++ proprietary/po/proprietary-surveillance.ja.po 20 Feb 2019 15:30:49
-0000 1.246
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1499,6 +1499,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.193
retrieving revision 1.194
diff -u -b -r1.193 -r1.194
--- proprietary/po/proprietary-surveillance.pot 13 Feb 2019 12:00:24 -0000
1.193
+++ proprietary/po/proprietary-surveillance.pot 20 Feb 2019 15:30:49 -0000
1.194
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1004,6 +1004,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a "
+"href=\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923\">
"
+"stealing users' photos</a> instead of “beautifying” them, "
+"pushing unwanted and often malicious ads on users, and redirecting them to "
+"phishing sites that stole their credentials. Furthermore, the user interface "
+"of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a "
"href=\"https://www.top10vpn.com/free-vpn-android-app-risk-index/\"> 25% fail "
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.468
retrieving revision 1.469
diff -u -b -r1.468 -r1.469
--- proprietary/po/proprietary-surveillance.ru.po 13 Feb 2019 16:29:43
-0000 1.468
+++ proprietary/po/proprietary-surveillance.ru.po 20 Feb 2019 15:30:49
-0000 1.469
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-02-13 11:56+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1404,6 +1405,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"An investigation of the 150 most popular gratis VPN apps in Google Play "
"found that <a href=\"https://www.top10vpn.com/free-vpn-android-app-risk-"
"index/\"> 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
"
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/proprietary.de-diff.html 16 Feb 2019 18:30:12 -0000
1.46
+++ proprietary/po/proprietary.de-diff.html 20 Feb 2019 15:30:49 -0000
1.47
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -125,17 +125,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -209,42 +225,6 @@
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
-
- <li id="M201902040">
- <p>Google invites people to <a
-
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and all internet use in their
- homes, for an extravagant payment of $20</a>.</p>
-
- <p>This is not a malicious functionality of a program with some other
- purpose; this is the software's sole purpose, and Google says so. But
- Google says it in a way that encourages most people to ignore the
- details. That, we believe, makes it fitting to list here.</p>
- </li>
-
- <li id="M201901230">
- <p>Google is modifying Chromium so that <a
-
href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers">
- extensions won't be able to alter or block whatever the page
- contains</a>. Users could conceivably reverse the change in a fork
- of Chromium, but surely Chrome (nonfree) will have the same change,
- and users can't fix it there.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
- </li>
</ul></em></ins></span>
@@ -305,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/16 18:30:12 $
+$Date: 2019/02/20 15:30:49 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary.de.po 16 Feb 2019 18:30:12 -0000 1.88
+++ proprietary/po/proprietary.de.po 20 Feb 2019 15:30:51 -0000 1.89
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -460,53 +480,6 @@
"sw.html\">free software</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary/po/proprietary.es.po 16 Feb 2019 18:30:12 -0000 1.99
+++ proprietary/po/proprietary.es.po 20 Feb 2019 15:30:51 -0000 1.100
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-02-14 10:09+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -298,6 +299,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -346,80 +367,6 @@
"son gratuitas, pero <em>no</em> son <a href=\"/philosophy/free-sw.html"
"\">software libre</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-"Google invita a la gente a <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\">permitirle monitorear su uso del teléfono, y todo el uso que se
"
-"hace de internet en sus hogares, a cambio de un extravagante pago de 20 "
-"dólares</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-"Esta no es una función maliciosa de un programa que tiene algún otro "
-"propósito; ese es el único propósito del software, y Google asà lo dice. "
-"Pero Google lo dice de tal manera que induce a la mayorÃa de los usuarios a "
-"ignorar los detalles. Creemos que esto hace que podamos incluirlo aquÃ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-"Google está modificando Chromium a fin de que <a href=\"https://tech."
-"slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-"
-"browser-that-will-break-content-blocking-extensions-including-various-ad-"
-"blockers\"> las extensiones no puedan alterar o bloquear nada de lo que "
-"contenga la página</a>. Cabe la posibilidad de que los usuarios reviertan "
-"este cambio en una bifurcación de Chromium, pero seguro que Chrome (que no "
-"es libre) mantendrá el mismo cambio, y ahà los usuarios no podrán hacer
nada."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-"Alrededor del 40 % de las aplicaciones gratuitas de Android <a href="
-"\"https://privacyinternational.org/report/2647/how-apps-android-share-data-"
-"facebook-report\">informan a Facebook de las acciones del usuario</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-"A menudo envÃan el «identificador publicitario» de la máquina, de modo
que "
-"Facebook puede correlacionar los datos que obtiene de la misma máquina a "
-"través de diversas aplicaciones. Algunos de ellas envÃan a Facebook "
-"información detallada acerca de las actividades del usuario en la "
-"aplicación; otras solo informan de que el usuario está utilizando la "
-"aplicación, pero a menudo estos es ya bastante informativo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-"El espionaje se produce con independencia de que el usuario tenga cuenta en "
-"Facebook."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -499,6 +446,77 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Google invites people to <a href=\"https://www.commondreams.org/"
+#~ "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
+#~ "origin=rss\"> let Google monitor their phone use, and all internet use in "
+#~ "their homes, for an extravagant payment of $20</a>."
+#~ msgstr ""
+#~ "Google invita a la gente a <a href=\"https://www.commondreams.org/"
+#~ "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
+#~ "origin=rss\">permitirle monitorear su uso del teléfono, y todo el uso que
"
+#~ "se hace de internet en sus hogares, a cambio de un extravagante pago de "
+#~ "20 dólares</a>."
+
+#~ msgid ""
+#~ "This is not a malicious functionality of a program with some other "
+#~ "purpose; this is the software's sole purpose, and Google says so. But "
+#~ "Google says it in a way that encourages most people to ignore the "
+#~ "details. That, we believe, makes it fitting to list here."
+#~ msgstr ""
+#~ "Esta no es una función maliciosa de un programa que tiene algún otro "
+#~ "propósito; ese es el único propósito del software, y Google asà lo
dice. "
+#~ "Pero Google lo dice de tal manera que induce a la mayorÃa de los usuarios
"
+#~ "a ignorar los detalles. Creemos que esto hace que podamos incluirlo aquÃ."
+
+#~ msgid ""
+#~ "Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
+#~ "story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-"
+#~ "will-break-content-blocking-extensions-including-various-ad-blockers\"> "
+#~ "extensions won't be able to alter or block whatever the page contains</"
+#~ "a>. Users could conceivably reverse the change in a fork of Chromium, but "
+#~ "surely Chrome (nonfree) will have the same change, and users can't fix it "
+#~ "there."
+#~ msgstr ""
+#~ "Google está modificando Chromium a fin de que <a href=\"https://tech."
+#~ "slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-"
+#~ "browser-that-will-break-content-blocking-extensions-including-various-ad-"
+#~ "blockers\"> las extensiones no puedan alterar o bloquear nada de lo que "
+#~ "contenga la página</a>. Cabe la posibilidad de que los usuarios reviertan
"
+#~ "este cambio en una bifurcación de Chromium, pero seguro que Chrome (que "
+#~ "no es libre) mantendrá el mismo cambio, y ahà los usuarios no podrán "
+#~ "hacer nada."
+
+#~ msgid ""
+#~ "Around 40% of gratis Android apps <a href=\"https://privacyinternational."
+#~ "org/report/2647/how-apps-android-share-data-facebook-report\"> report on "
+#~ "the user's actions to Facebook</a>."
+#~ msgstr ""
+#~ "Alrededor del 40 % de las aplicaciones gratuitas de Android <a href="
+#~ "\"https://privacyinternational.org/report/2647/how-apps-android-share-"
+#~ "data-facebook-report\">informan a Facebook de las acciones del usuario</"
+#~ "a>."
+
+#~ msgid ""
+#~ "Often they send the machine's “advertising ID,” so that "
+#~ "Facebook can correlate the data it obtains from the same machine via "
+#~ "various apps. Some of them send Facebook detailed information about the "
+#~ "user's activities in the app; others only say that the user is using that "
+#~ "app, but that alone is often quite informative."
+#~ msgstr ""
+#~ "A menudo envÃan el «identificador publicitario» de la máquina, de modo
"
+#~ "que Facebook puede correlacionar los datos que obtiene de la misma "
+#~ "máquina a través de diversas aplicaciones. Algunos de ellas envÃan a "
+#~ "Facebook información detallada acerca de las actividades del usuario en "
+#~ "la aplicación; otras solo informan de que el usuario está utilizando la "
+#~ "aplicación, pero a menudo estos es ya bastante informativo."
+
+#~ msgid ""
+#~ "This spying occurs regardless of whether the user has a Facebook account."
+#~ msgstr ""
+#~ "El espionaje se produce con independencia de que el usuario tenga cuenta "
+#~ "en Facebook."
+
+#~ msgid ""
#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
#~ "information to identify who is running it</a>. The result is often a "
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary/po/proprietary.fr.po 16 Feb 2019 18:30:12 -0000 1.122
+++ proprietary/po/proprietary.fr.po 20 Feb 2019 15:30:51 -0000 1.123
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-02-13 14:22+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -343,79 +364,6 @@
"le contexte]. Elles sont gratuites, mais il ne s'agit <em>pas</em> de <a "
"href=\"/philosophy/free-sw.html\">logiciel libre</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-"Les internautes sont invités à <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\">laisser Google surveiller ce qu'ils font avec leur téléphone
et "
-"leur connexion Internet, contre une rémunération extravagante de 20 $</a>.
"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-"Il ne s'agit pas d'une fonctionnalité malveillante dans programme conçu
pour "
-"faire autre chose, mais de la seule raison d'être de ce logiciel, et Google "
-"ne s'en cache pas. Toutefois, Google le dit en des termes qui encouragent la "
-"plupart des gens à négliger les détails. Voilà pourquoi, à notre avis,
il "
-"est justifié d'en parler ici."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-"Google est en train de modifier Chromium de telle sorte que <a href="
-"\"https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-"
-"to-chromium-browser-that-will-break-content-blocking-extensions-including-"
-"various-ad-blockers\">les extensions ne puissent plus altérer ni bloquer ce "
-"que contient la page</a>. Il est concevable que les utilisateurs annulent ce "
-"changement dans un fork de Chromium, mais il est certain que Chrome (non "
-"libre) le contiendra également, et là les utilisateurs ne pourront pas "
-"l'annuler."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-"Environ 40Â % des applis gratuites pour Android <a href=\"https://"
-"privacyinternational.org/report/2647/how-apps-android-share-data-facebook-"
-"report\">rapportent à Facebook les actions de l'utilisateur</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-"Souvent, elles envoient l'« identifiant publicitaire » de la machine pour
"
-"que Facebook puisse corréler les données envoyées de la même machine par "
-"diverses applis. Certaines envoient à Facebook des informations détaillées
"
-"sur les activités de l'utilisateur dans l'appli ; d'autres disent seulement
"
-"qu'il l'utilise, mais ce simple renseignement est souvent très instructif."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-"Cet espionnage se produit que l'utilisateur ait un compte Facebook ou non."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -489,3 +437,73 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Google invites people to <a href=\"https://www.commondreams.org/"
+#~ "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
+#~ "origin=rss\"> let Google monitor their phone use, and all internet use in "
+#~ "their homes, for an extravagant payment of $20</a>."
+#~ msgstr ""
+#~ "Les internautes sont invités à <a href=\"https://www.commondreams.org/"
+#~ "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
+#~ "origin=rss\">laisser Google surveiller ce qu'ils font avec leur
téléphone "
+#~ "et leur connexion Internet, contre une rémunération extravagante de 20Â
$</"
+#~ "a>. "
+
+#~ msgid ""
+#~ "This is not a malicious functionality of a program with some other "
+#~ "purpose; this is the software's sole purpose, and Google says so. But "
+#~ "Google says it in a way that encourages most people to ignore the "
+#~ "details. That, we believe, makes it fitting to list here."
+#~ msgstr ""
+#~ "Il ne s'agit pas d'une fonctionnalité malveillante dans programme conçu "
+#~ "pour faire autre chose, mais de la seule raison d'être de ce logiciel, et
"
+#~ "Google ne s'en cache pas. Toutefois, Google le dit en des termes qui "
+#~ "encouragent la plupart des gens à négliger les détails. VoilÃ
pourquoi, Ã "
+#~ "notre avis, il est justifié d'en parler ici."
+
+#~ msgid ""
+#~ "Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
+#~ "story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-"
+#~ "will-break-content-blocking-extensions-including-various-ad-blockers\"> "
+#~ "extensions won't be able to alter or block whatever the page contains</"
+#~ "a>. Users could conceivably reverse the change in a fork of Chromium, but "
+#~ "surely Chrome (nonfree) will have the same change, and users can't fix it "
+#~ "there."
+#~ msgstr ""
+#~ "Google est en train de modifier Chromium de telle sorte que <a href="
+#~ "\"https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-"
+#~ "changes-to-chromium-browser-that-will-break-content-blocking-extensions-"
+#~ "including-various-ad-blockers\">les extensions ne puissent plus altérer "
+#~ "ni bloquer ce que contient la page</a>. Il est concevable que les "
+#~ "utilisateurs annulent ce changement dans un fork de Chromium, mais il est "
+#~ "certain que Chrome (non libre) le contiendra également, et là les "
+#~ "utilisateurs ne pourront pas l'annuler."
+
+#~ msgid ""
+#~ "Around 40% of gratis Android apps <a href=\"https://privacyinternational."
+#~ "org/report/2647/how-apps-android-share-data-facebook-report\"> report on "
+#~ "the user's actions to Facebook</a>."
+#~ msgstr ""
+#~ "Environ 40Â % des applis gratuites pour Android <a href=\"https://"
+#~ "privacyinternational.org/report/2647/how-apps-android-share-data-facebook-"
+#~ "report\">rapportent à Facebook les actions de l'utilisateur</a>."
+
+#~ msgid ""
+#~ "Often they send the machine's “advertising ID,” so that "
+#~ "Facebook can correlate the data it obtains from the same machine via "
+#~ "various apps. Some of them send Facebook detailed information about the "
+#~ "user's activities in the app; others only say that the user is using that "
+#~ "app, but that alone is often quite informative."
+#~ msgstr ""
+#~ "Souvent, elles envoient l'« identifiant publicitaire » de la machine
pour "
+#~ "que Facebook puisse corréler les données envoyées de la même machine
par "
+#~ "diverses applis. Certaines envoient à Facebook des informations "
+#~ "détaillées sur les activités de l'utilisateur dans l'appli ; d'autres "
+#~ "disent seulement qu'il l'utilise, mais ce simple renseignement est "
+#~ "souvent très instructif."
+
+#~ msgid ""
+#~ "This spying occurs regardless of whether the user has a Facebook account."
+#~ msgstr ""
+#~ "Cet espionnage se produit que l'utilisateur ait un compte Facebook ou non."
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary.it-diff.html 16 Feb 2019 18:30:12 -0000
1.58
+++ proprietary/po/proprietary.it-diff.html 20 Feb 2019 15:30:51 -0000
1.59
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -208,42 +224,6 @@
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
-
- <li id="M201902040">
- <p>Google invites people to <a
-
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and all internet use in their
- homes, for an extravagant payment of $20</a>.</p>
-
- <p>This is not a malicious functionality of a program with some other
- purpose; this is the software's sole purpose, and Google says so. But
- Google says it in a way that encourages most people to ignore the
- details. That, we believe, makes it fitting to list here.</p>
- </li>
-
- <li id="M201901230">
- <p>Google is modifying Chromium so that <a
-
href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers">
- extensions won't be able to alter or block whatever the page
- contains</a>. Users could conceivably reverse the change in a fork
- of Chromium, but surely Chrome (nonfree) will have the same change,
- and users can't fix it there.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
- </li>
</ul></em></ins></span>
@@ -304,7 +284,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/16 18:30:12 $
+$Date: 2019/02/20 15:30:51 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary/po/proprietary.it.po 16 Feb 2019 18:30:12 -0000 1.97
+++ proprietary/po/proprietary.it.po 20 Feb 2019 15:30:51 -0000 1.98
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -464,53 +484,6 @@
"sw.html\">free software</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary.ja-diff.html 16 Feb 2019 18:30:12 -0000
1.59
+++ proprietary/po/proprietary.ja-diff.html 20 Feb 2019 15:30:51 -0000
1.60
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -181,6 +181,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -205,42 +221,6 @@
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
-
- <li id="M201902040">
- <p>Google invites people to <a
-
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and all internet use in their
- homes, for an extravagant payment of $20</a>.</p>
-
- <p>This is not a malicious functionality of a program with some other
- purpose; this is the software's sole purpose, and Google says so. But
- Google says it in a way that encourages most people to ignore the
- details. That, we believe, makes it fitting to list here.</p>
- </li>
-
- <li id="M201901230">
- <p>Google is modifying Chromium so that <a
-
href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers">
- extensions won't be able to alter or block whatever the page
- contains</a>. Users could conceivably reverse the change in a fork
- of Chromium, but surely Chrome (nonfree) will have the same change,
- and users can't fix it there.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
- </li>
</ul></em></ins></span>
@@ -301,7 +281,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/16 18:30:12 $
+$Date: 2019/02/20 15:30:51 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/proprietary.ja.po 16 Feb 2019 18:30:12 -0000 1.80
+++ proprietary/po/proprietary.ja.po 20 Feb 2019 15:30:51 -0000 1.81
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -384,53 +404,6 @@
"sw.html\">free software</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary.nl-diff.html 16 Feb 2019 18:30:12 -0000
1.58
+++ proprietary/po/proprietary.nl-diff.html 20 Feb 2019 15:30:51 -0000
1.59
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -184,6 +184,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -208,42 +224,6 @@
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
-
- <li id="M201902040">
- <p>Google invites people to <a
-
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and all internet use in their
- homes, for an extravagant payment of $20</a>.</p>
-
- <p>This is not a malicious functionality of a program with some other
- purpose; this is the software's sole purpose, and Google says so. But
- Google says it in a way that encourages most people to ignore the
- details. That, we believe, makes it fitting to list here.</p>
- </li>
-
- <li id="M201901230">
- <p>Google is modifying Chromium so that <a
-
href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers">
- extensions won't be able to alter or block whatever the page
- contains</a>. Users could conceivably reverse the change in a fork
- of Chromium, but surely Chrome (nonfree) will have the same change,
- and users can't fix it there.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
- </li>
</ul></em></ins></span>
@@ -304,7 +284,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/16 18:30:12 $
+$Date: 2019/02/20 15:30:51 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/proprietary.nl.po 16 Feb 2019 18:30:12 -0000 1.69
+++ proprietary/po/proprietary.nl.po 20 Feb 2019 15:30:51 -0000 1.70
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -457,53 +477,6 @@
"sw.html\">free software</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/proprietary.pl-diff.html 16 Feb 2019 18:30:12 -0000
1.76
+++ proprietary/po/proprietary.pl-diff.html 20 Feb 2019 15:30:51 -0000
1.77
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
-instances of malicious functionalities (with more than 400 references to
+<p>As of October, 2018, the pages in this directory list around 350
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -126,18 +126,18 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li>
+ <li><a
href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -206,42 +222,6 @@
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
-
- <li id="M201902040">
- <p>Google invites people to <a
-
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and all internet use in their
- homes, for an extravagant payment of $20</a>.</p>
-
- <p>This is not a malicious functionality of a program with some other
- purpose; this is the software's sole purpose, and Google says so. But
- Google says it in a way that encourages most people to ignore the
- details. That, we believe, makes it fitting to list here.</p>
- </li>
-
- <li id="M201901230">
- <p>Google is modifying Chromium so that <a
-
href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers">
- extensions won't be able to alter or block whatever the page
- contains</a>. Users could conceivably reverse the change in a fork
- of Chromium, but surely Chrome (nonfree) will have the same change,
- and users can't fix it there.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
- </li>
</ul></em></ins></span>
@@ -302,7 +282,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/16 18:30:12 $
+$Date: 2019/02/20 15:30:51 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/proprietary.pl.po 16 Feb 2019 18:30:12 -0000 1.64
+++ proprietary/po/proprietary.pl.po 20 Feb 2019 15:30:51 -0000 1.65
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -539,53 +559,6 @@
"sw.html\">free software</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary.pot 16 Feb 2019 18:30:12 -0000 1.61
+++ proprietary/po/proprietary.pot 20 Feb 2019 15:30:51 -0000 1.62
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,25 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a "
+"href=\"https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923\">pushing
"
+"unwanted and often malicious ads on users, and redirecting them to phishing "
+"sites</a> that stole their credentials. Furthermore, the user interface of "
+"most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a "
"href=\"https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\">
"
"recording all the users' actions</a> in interacting with the app."
@@ -275,52 +294,6 @@
"href=\"/philosophy/free-sw.html\">free software</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a "
-"href=\"https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss\">
"
-"let Google monitor their phone use, and all internet use in their homes, for "
-"an extravagant payment of $20</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a "
-"href=\"https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers\">
"
-"extensions won't be able to alter or block whatever the page "
-"contains</a>. Users could conceivably reverse the change in a fork of "
-"Chromium, but surely Chrome (nonfree) will have the same change, and users "
-"can't fix it there."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a "
-"href=\"https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report\">
"
-"report on the user's actions to Facebook</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various "
-"apps. Some of them send Facebook detailed information about the user's "
-"activities in the app; others only say that the user is using that app, but "
-"that alone is often quite informative."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "This spying occurs regardless of whether the user has a Facebook
account."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/proprietary.pt-br.po 16 Feb 2019 18:30:12 -0000 1.84
+++ proprietary/po/proprietary.pt-br.po 20 Feb 2019 15:30:51 -0000 1.85
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-02-16 14:27-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -292,6 +293,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -337,79 +358,6 @@
"são grátis, mas <em>não</em> são <a href=\"/philosophy/free-sw.html"
"\">software livre</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-"O Google convida as pessoas a <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> permitir que o Google monitore o uso do telefone e todo o uso "
-"da Internet em suas casas, para um pagamento extravagante de US$ 20</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-"Esta não é uma funcionalidade maliciosa de um programa com outra
finalidade; "
-"este é o único propósito do software, e o Google diz isso. Mas o Google
diz "
-"isso de uma forma que incentiva a maioria das pessoas a ignorar os detalhes. "
-"Isso, acreditamos, faz com que seja adequado listar aqui."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-"O Google está modificando o Chromium para que <a href=\"https://tech."
-"slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-"
-"browser-that-will-break-content-blocking-extensions-including-various-ad-"
-"blockers\"> extensões não poderão alterar ou bloquear o que a página "
-"contiver</a>. Os usuários poderiam inverter a mudança em um fork do "
-"Chromium, mas com certeza o Chrome (não livre) terá a mesma alteração e
os "
-"usuários não poderão corrigi-lo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-"Cerca de 40% dos aplicativos gratuitos para Android <a href=\"https://"
-"privacyinternational.org/report/2647/how-apps-android-share-data-facebook-"
-"report\"> relatam as ações do usuário no Facebook</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-"Muitas vezes eles enviam o âID de publicidadeâ da máquina para que o "
-"Facebook possa correlacionar os dados que obtém da mesma máquina por meio
de "
-"vários aplicativos. Alguns deles enviam informações detalhadas do Facebook
"
-"sobre as atividades do usuário no aplicativo; outros dizem apenas que o "
-"usuário está usando esse aplicativo, mas isso por si só é muitas vezes "
-"bastante informativo."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-"Esta espionagem ocorre independentemente de o usuário ter uma conta no "
-"Facebook."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -485,6 +433,76 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Google invites people to <a href=\"https://www.commondreams.org/"
+#~ "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
+#~ "origin=rss\"> let Google monitor their phone use, and all internet use in "
+#~ "their homes, for an extravagant payment of $20</a>."
+#~ msgstr ""
+#~ "O Google convida as pessoas a <a href=\"https://www.commondreams.org/"
+#~ "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
+#~ "origin=rss\"> permitir que o Google monitore o uso do telefone e todo o "
+#~ "uso da Internet em suas casas, para um pagamento extravagante de US$ 20</"
+#~ "a>."
+
+#~ msgid ""
+#~ "This is not a malicious functionality of a program with some other "
+#~ "purpose; this is the software's sole purpose, and Google says so. But "
+#~ "Google says it in a way that encourages most people to ignore the "
+#~ "details. That, we believe, makes it fitting to list here."
+#~ msgstr ""
+#~ "Esta não é uma funcionalidade maliciosa de um programa com outra "
+#~ "finalidade; este é o único propósito do software, e o Google diz isso. "
+#~ "Mas o Google diz isso de uma forma que incentiva a maioria das pessoas a "
+#~ "ignorar os detalhes. Isso, acreditamos, faz com que seja adequado listar "
+#~ "aqui."
+
+#~ msgid ""
+#~ "Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
+#~ "story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-"
+#~ "will-break-content-blocking-extensions-including-various-ad-blockers\"> "
+#~ "extensions won't be able to alter or block whatever the page contains</"
+#~ "a>. Users could conceivably reverse the change in a fork of Chromium, but "
+#~ "surely Chrome (nonfree) will have the same change, and users can't fix it "
+#~ "there."
+#~ msgstr ""
+#~ "O Google está modificando o Chromium para que <a href=\"https://tech."
+#~ "slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-"
+#~ "browser-that-will-break-content-blocking-extensions-including-various-ad-"
+#~ "blockers\"> extensões não poderão alterar ou bloquear o que a página "
+#~ "contiver</a>. Os usuários poderiam inverter a mudança em um fork do "
+#~ "Chromium, mas com certeza o Chrome (não livre) terá a mesma alteração
e "
+#~ "os usuários não poderão corrigi-lo."
+
+#~ msgid ""
+#~ "Around 40% of gratis Android apps <a href=\"https://privacyinternational."
+#~ "org/report/2647/how-apps-android-share-data-facebook-report\"> report on "
+#~ "the user's actions to Facebook</a>."
+#~ msgstr ""
+#~ "Cerca de 40% dos aplicativos gratuitos para Android <a href=\"https://"
+#~ "privacyinternational.org/report/2647/how-apps-android-share-data-facebook-"
+#~ "report\"> relatam as ações do usuário no Facebook</a>."
+
+#~ msgid ""
+#~ "Often they send the machine's “advertising ID,” so that "
+#~ "Facebook can correlate the data it obtains from the same machine via "
+#~ "various apps. Some of them send Facebook detailed information about the "
+#~ "user's activities in the app; others only say that the user is using that "
+#~ "app, but that alone is often quite informative."
+#~ msgstr ""
+#~ "Muitas vezes eles enviam o âID de publicidadeâ da máquina para que o "
+#~ "Facebook possa correlacionar os dados que obtém da mesma máquina por
meio "
+#~ "de vários aplicativos. Alguns deles enviam informações detalhadas do "
+#~ "Facebook sobre as atividades do usuário no aplicativo; outros dizem "
+#~ "apenas que o usuário está usando esse aplicativo, mas isso por si só é
"
+#~ "muitas vezes bastante informativo."
+
+#~ msgid ""
+#~ "This spying occurs regardless of whether the user has a Facebook account."
+#~ msgstr ""
+#~ "Esta espionagem ocorre independentemente de o usuário ter uma conta no "
+#~ "Facebook."
+
+#~ msgid ""
#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
#~ "information to identify who is running it</a>. The result is often a "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary/po/proprietary.ru.po 16 Feb 2019 18:30:12 -0000 1.151
+++ proprietary/po/proprietary.ru.po 20 Feb 2019 15:30:51 -0000 1.152
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:24+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -343,80 +364,6 @@
"ÐÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð±ÐµÑплаÑнÑ, но они <em>не</em> <a
href=\"/philosophy/free-sw."
"html\">ÑвободнÑ</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-"Google пÑиглаÑÐ°ÐµÑ Ð»Ñдей <a
href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> позволиÑÑ Google наблÑдаÑÑ Ð·Ð°
иÑполÑзованием иÑ
ÑелеÑона и "
-"вÑем иÑполÑзованием ÐнÑеÑнеÑа в иÑ
домаÑ
за ÑкÑÑÑаваганÑнÑÑ Ð¿Ð»Ð°ÑÑ 20 "
-"доллаÑов</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-"ÐÑо не вÑедоноÑÐ½Ð°Ñ ÑÑнкÑÐ¸Ñ Ð¿ÑогÑаммÑ, Ñ
коÑоÑой еÑÑÑ ÐºÐ°ÐºÐ¾Ðµ-Ñо дÑÑгое "
-"назнаÑение; ÑÑо единÑÑвенное назнаÑение
пÑогÑаммÑ, Google Ñак и говоÑиÑ. Ðо "
-"Google говоÑÐ¸Ñ ÑÑо Ñак, ÑÑÐ¾Ð±Ñ Ð»Ñди не
обÑаÑали Ð²Ð½Ð¸Ð¼Ð°Ð½Ð¸Ñ Ð½Ð° подÑобноÑÑи. ÐÑ "
-"ÑÑиÑаем, ÑÑо ÑÑо Ð´ÐµÐ»Ð°ÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾Ð´Ñ
одÑÑей Ð´Ð»Ñ Ð½Ð°Ñего ÑпиÑка."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-"Google модиÑиÑиÑÑÐµÑ Chromium, ÑÑÐ¾Ð±Ñ <a
href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\">
модÑли "
-"ÑаÑÑиÑÐµÐ½Ð¸Ñ Ð½Ðµ могли изменÑÑÑ Ð¸Ð»Ð¸
блокиÑоваÑÑ Ñо, ÑÑо ÑодеÑжиÑÑÑ Ð½Ð°
ÑÑÑаниÑе</"
-"a>. ÐолÑзоваÑели, видимо, могли Ð±Ñ Ð¾ÑмениÑÑ
ÑÑо изменение в Ñвоей веÑÑии "
-"Chromium, но в Chrome (неÑвободном) навеÑнÑка
бÑÐ´ÐµÑ Ñо же Ñамое изменение, и "
-"Ñам полÑзоваÑели ÑÑо иÑпÑавиÑÑ Ð½Ðµ могÑÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-"Ðколо 40% беÑплаÑнÑÑ
пÑиложений Android <a
href=\"https://"
-"privacyinternational.org/report/2647/how-apps-android-share-data-facebook-"
-"report\"> докладÑваÑÑ Ð¾ дейÑÑвиÑÑ
полÑзоваÑÐµÐ»Ñ Ð² Facebook</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-"ÐеÑедко они вÑÑÑлаÑÑ “ÑекламнÑй
иденÑиÑикаÑоє маÑинÑ, ÑÑÐ¾Ð±Ñ "
-"Facebook мог ÑопоÑÑавиÑÑ Ð´Ð°Ð½Ð½Ñе, коÑоÑÑе
полÑÑÐ°ÐµÑ Ð¾Ñ Ð¾Ð´Ð½Ð¾Ð¹ и Ñой же маÑÐ¸Ð½Ñ "
-"ÑеÑез ÑазнÑе пÑиложениÑ. ÐекоÑоÑÑе из ниÑ
вÑÑÑлаÑÑ Ð² Facebook подÑобнÑÑ "
-"инÑоÑмаÑÐ¸Ñ Ð¾ дейÑÑвиÑÑ
полÑзоваÑÐµÐ»Ñ Ð²
пÑиложении; дÑÑгие ÑолÑко ÑообÑаÑÑ, "
-"ÑÑо полÑзоваÑÐµÐ»Ñ ÑабоÑÐ°ÐµÑ Ñ ÑÑим
пÑиложением, но Ñже одно ÑÑо ÑаÑÑо оÑÐµÐ½Ñ "
-"инÑоÑмаÑивно."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-"ÐÑа Ñлежка пÑоиÑÑ
Ð¾Ð´Ð¸Ñ Ð½ÐµÐ·Ð°Ð²Ð¸Ñимо Ð¾Ñ Ñого,
еÑÑÑ Ð»Ð¸ Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ ÑÑеÑÐ½Ð°Ñ "
-"запиÑÑ Facebook."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -496,6 +443,76 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Google invites people to <a href=\"https://www.commondreams.org/"
+#~ "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
+#~ "origin=rss\"> let Google monitor their phone use, and all internet use in "
+#~ "their homes, for an extravagant payment of $20</a>."
+#~ msgstr ""
+#~ "Google пÑиглаÑÐ°ÐµÑ Ð»Ñдей <a
href=\"https://www.commondreams.org/"
+#~ "views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
+#~ "origin=rss\"> позволиÑÑ Google наблÑдаÑÑ Ð·Ð°
иÑполÑзованием иÑ
ÑелеÑона и "
+#~ "вÑем иÑполÑзованием ÐнÑеÑнеÑа в иÑ
домаÑ
за ÑкÑÑÑаваганÑнÑÑ Ð¿Ð»Ð°ÑÑ 20 "
+#~ "доллаÑов</a>."
+
+#~ msgid ""
+#~ "This is not a malicious functionality of a program with some other "
+#~ "purpose; this is the software's sole purpose, and Google says so. But "
+#~ "Google says it in a way that encourages most people to ignore the "
+#~ "details. That, we believe, makes it fitting to list here."
+#~ msgstr ""
+#~ "ÐÑо не вÑедоноÑÐ½Ð°Ñ ÑÑнкÑÐ¸Ñ Ð¿ÑогÑаммÑ, Ñ
коÑоÑой еÑÑÑ ÐºÐ°ÐºÐ¾Ðµ-Ñо дÑÑгое "
+#~ "назнаÑение; ÑÑо единÑÑвенное назнаÑение
пÑогÑаммÑ, Google Ñак и говоÑиÑ. "
+#~ "Ðо Google говоÑÐ¸Ñ ÑÑо Ñак, ÑÑÐ¾Ð±Ñ Ð»Ñди не
обÑаÑали Ð²Ð½Ð¸Ð¼Ð°Ð½Ð¸Ñ Ð½Ð° "
+#~ "подÑобноÑÑи. ÐÑ ÑÑиÑаем, ÑÑо ÑÑо делаеÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾Ð´Ñ
одÑÑей Ð´Ð»Ñ Ð½Ð°Ñего "
+#~ "ÑпиÑка."
+
+#~ msgid ""
+#~ "Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
+#~ "story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-"
+#~ "will-break-content-blocking-extensions-including-various-ad-blockers\"> "
+#~ "extensions won't be able to alter or block whatever the page contains</"
+#~ "a>. Users could conceivably reverse the change in a fork of Chromium, but "
+#~ "surely Chrome (nonfree) will have the same change, and users can't fix it "
+#~ "there."
+#~ msgstr ""
+#~ "Google модиÑиÑиÑÑÐµÑ Chromium, ÑÑÐ¾Ð±Ñ <a
href=\"https://tech.slashdot.org/"
+#~ "story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-"
+#~ "will-break-content-blocking-extensions-including-various-ad-blockers\"> "
+#~ "модÑли ÑаÑÑиÑÐµÐ½Ð¸Ñ Ð½Ðµ могли изменÑÑÑ Ð¸Ð»Ð¸
блокиÑоваÑÑ Ñо, ÑÑо ÑодеÑжиÑÑÑ Ð½Ð° "
+#~ "ÑÑÑаниÑе</a>. ÐолÑзоваÑели, видимо, могли
Ð±Ñ Ð¾ÑмениÑÑ ÑÑо изменение в "
+#~ "Ñвоей веÑÑии Chromium, но в Chrome (неÑвободном)
навеÑнÑка бÑÐ´ÐµÑ Ñо же "
+#~ "Ñамое изменение, и Ñам полÑзоваÑели ÑÑо
иÑпÑавиÑÑ Ð½Ðµ могÑÑ."
+
+#~ msgid ""
+#~ "Around 40% of gratis Android apps <a href=\"https://privacyinternational."
+#~ "org/report/2647/how-apps-android-share-data-facebook-report\"> report on "
+#~ "the user's actions to Facebook</a>."
+#~ msgstr ""
+#~ "Ðколо 40% беÑплаÑнÑÑ
пÑиложений Android <a
href=\"https://"
+#~ "privacyinternational.org/report/2647/how-apps-android-share-data-facebook-"
+#~ "report\"> докладÑваÑÑ Ð¾ дейÑÑвиÑÑ
полÑзоваÑÐµÐ»Ñ Ð² Facebook</a>."
+
+#~ msgid ""
+#~ "Often they send the machine's “advertising ID,” so that "
+#~ "Facebook can correlate the data it obtains from the same machine via "
+#~ "various apps. Some of them send Facebook detailed information about the "
+#~ "user's activities in the app; others only say that the user is using that "
+#~ "app, but that alone is often quite informative."
+#~ msgstr ""
+#~ "ÐеÑедко они вÑÑÑлаÑÑ “ÑекламнÑй
иденÑиÑикаÑоє маÑинÑ, ÑÑÐ¾Ð±Ñ "
+#~ "Facebook мог ÑопоÑÑавиÑÑ Ð´Ð°Ð½Ð½Ñе, коÑоÑÑе
полÑÑÐ°ÐµÑ Ð¾Ñ Ð¾Ð´Ð½Ð¾Ð¹ и Ñой же "
+#~ "маÑÐ¸Ð½Ñ ÑеÑез ÑазнÑе пÑиложениÑ.
ÐекоÑоÑÑе из ниÑ
вÑÑÑлаÑÑ Ð² Facebook "
+#~ "подÑобнÑÑ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾ дейÑÑвиÑÑ
полÑзоваÑÐµÐ»Ñ Ð² пÑиложении; дÑÑгие ÑолÑко "
+#~ "ÑообÑаÑÑ, ÑÑо полÑзоваÑÐµÐ»Ñ ÑабоÑÐ°ÐµÑ Ñ
ÑÑим пÑиложением, но Ñже одно ÑÑо "
+#~ "ÑаÑÑо оÑÐµÐ½Ñ Ð¸Ð½ÑоÑмаÑивно."
+
+#~ msgid ""
+#~ "This spying occurs regardless of whether the user has a Facebook account."
+#~ msgstr ""
+#~ "ÐÑа Ñлежка пÑоиÑÑ
Ð¾Ð´Ð¸Ñ Ð½ÐµÐ·Ð°Ð²Ð¸Ñимо оÑ
Ñого, еÑÑÑ Ð»Ð¸ Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ ÑÑеÑÐ½Ð°Ñ "
+#~ "запиÑÑ Facebook."
+
+#~ msgid ""
#~ "Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
#~ "company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
#~ "information to identify who is running it</a>. The result is often a "
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary.zh-tw-diff.html 16 Feb 2019 18:30:12 -0000
1.36
+++ proprietary/po/proprietary.zh-tw-diff.html 20 Feb 2019 15:30:51 -0000
1.37
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -125,17 +125,17 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
-<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902041">
+ <p>Twenty nine “beauty camera” apps that used to be
+ on Google Play had one or more malicious functionalities, such
+ as stealing users' photos instead of “beautifying” them, <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">pushing
+ unwanted and often malicious ads on users, and redirecting them
+ to phishing sites</a> that stole their credentials. Furthermore, the
+ user interface of most of them was designed to make uninstallation
+ difficult.</p>
+
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
+ </li>
+
<li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
@@ -209,42 +225,6 @@
apps.” These apps are gratis, but they are <em>not</em>
<a
href="/philosophy/free-sw.html">free software</a>.</p>
</li>
-
- <li id="M201902040">
- <p>Google invites people to <a
-
href="https://www.commondreams.org/views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-origin=rss">
- let Google monitor their phone use, and all internet use in their
- homes, for an extravagant payment of $20</a>.</p>
-
- <p>This is not a malicious functionality of a program with some other
- purpose; this is the software's sole purpose, and Google says so. But
- Google says it in a way that encourages most people to ignore the
- details. That, we believe, makes it fitting to list here.</p>
- </li>
-
- <li id="M201901230">
- <p>Google is modifying Chromium so that <a
-
href="https://tech.slashdot.org/story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-break-content-blocking-extensions-including-various-ad-blockers">
- extensions won't be able to alter or block whatever the page
- contains</a>. Users could conceivably reverse the change in a fork
- of Chromium, but surely Chrome (nonfree) will have the same change,
- and users can't fix it there.</p>
- </li>
-
- <li id="M201812290">
- <p>Around 40% of gratis Android apps <a
-
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on the user's actions to Facebook</a>.</p>
-
- <p>Often they send the machine's “advertising ID,” so
that
- Facebook can correlate the data it obtains from the same machine via
- various apps. Some of them send Facebook detailed information about
- the user's activities in the app; others only say that the user is
- using that app, but that alone is often quite informative.</p>
-
- <p>This spying occurs regardless of whether the user has a Facebook
- account.</p>
- </li>
</ul></em></ins></span>
@@ -305,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/16 18:30:12 $
+$Date: 2019/02/20 15:30:51 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary/po/proprietary.zh-tw.po 16 Feb 2019 18:30:12 -0000 1.47
+++ proprietary/po/proprietary.zh-tw.po 20 Feb 2019 15:30:51 -0000 1.48
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-02-16 18:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:24+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many nonfree apps have a surveillance feature for <a href=\"https://"
"techcrunch.com/2019/02/06/iphone-session-replay-screenshots/\"> recording "
"all the users' actions</a> in interacting with the app."
@@ -373,53 +393,6 @@
"sw.html\">free software</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google invites people to <a href=\"https://www.commondreams.org/"
-"views/2019/02/04/google-screenwise-unwise-trade-all-your-privacy-cash?cd-"
-"origin=rss\"> let Google monitor their phone use, and all internet use in "
-"their homes, for an extravagant payment of $20</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is not a malicious functionality of a program with some other purpose; "
-"this is the software's sole purpose, and Google says so. But Google says it "
-"in a way that encourages most people to ignore the details. That, we "
-"believe, makes it fitting to list here."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Google is modifying Chromium so that <a href=\"https://tech.slashdot.org/"
-"story/19/01/23/0048202/google-proposes-changes-to-chromium-browser-that-will-"
-"break-content-blocking-extensions-including-various-ad-blockers\"> "
-"extensions won't be able to alter or block whatever the page contains</a>. "
-"Users could conceivably reverse the change in a fork of Chromium, but surely "
-"Chrome (nonfree) will have the same change, and users can't fix it there."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Around 40% of gratis Android apps <a href=\"https://privacyinternational.org/"
-"report/2647/how-apps-android-share-data-facebook-report\"> report on the "
-"user's actions to Facebook</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Often they send the machine's “advertising ID,” so that Facebook "
-"can correlate the data it obtains from the same machine via various apps. "
-"Some of them send Facebook detailed information about the user's activities "
-"in the app; others only say that the user is using that app, but that alone "
-"is often quite informative."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This spying occurs regardless of whether the user has a Facebook account."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/pt-br.po 16 Feb 2019 18:30:12 -0000 1.40
+++ proprietary/po/pt-br.po 20 Feb 2019 15:30:51 -0000 1.41
@@ -4012,6 +4012,30 @@
"usuários."
#. type: Content of: <h3>
+msgid "Mobile Sabotage"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr ""
@@ -5331,6 +5355,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many proprietary programs secretly <a href=\"https://www.theregister.co."
"uk/2016/08/05/payperinstall_study/\">install other proprietary programs that "
"the users don't want</a>."
@@ -6552,6 +6587,18 @@
"\">#SpywareInMobileApps</a>)</span>"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr ""
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/po/ru.po 16 Feb 2019 18:30:12 -0000 1.67
+++ proprietary/po/ru.po 20 Feb 2019 15:30:51 -0000 1.68
@@ -5601,6 +5601,33 @@
"facebook\">в ÑиÑле пÑоÑиÑ
</a>) делаÑÑ ÐµÑе один
Ñаг к заÑ
ваÑÑ ÑÑÑойÑÑв "
"полÑзоваÑелей."
+# | Mobile [-Tyrants-] {+Sabotage+}
+#. type: Content of: <h3>
+#, fuzzy
+#| msgid "Mobile Tyrants"
+msgid "Mobile Sabotage"
+msgstr "ТиÑанÑ"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr "Слежка"
@@ -7356,6 +7383,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many proprietary programs secretly <a href=\"https://www.theregister.co."
"uk/2016/08/05/payperinstall_study/\">install other proprietary programs that "
"the users don't want</a>."
@@ -8835,6 +8873,18 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
"\">#SpywareInMobileApps</a>)</span>"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr "Skype"
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/zh-tw.po 16 Feb 2019 18:30:12 -0000 1.29
+++ proprietary/po/zh-tw.po 20 Feb 2019 15:30:51 -0000 1.30
@@ -3883,6 +3883,30 @@
msgstr ""
#. type: Content of: <h3>
+msgid "Mobile Sabotage"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as stealing users' photos "
+"instead of “beautifying” them, <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\">pushing unwanted and often malicious ads on users, and "
+"redirecting them to phishing sites</a> that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Users should of course uninstall these dangerous apps if they haven't yet, "
+"but they should also stay away from nonfree apps in general. <em>All</em> "
+"nonfree apps carry a potential risk because there is no easy way of knowing "
+"what they really do."
+msgstr ""
+
+#. type: Content of: <h3>
msgid "Mobile Surveillance"
msgstr ""
@@ -5094,6 +5118,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos instead of “beautifying” "
+"them</a>, pushing unwanted and often malicious ads on users, and redirecting "
+"them to phishing sites that stole their credentials. Furthermore, the user "
+"interface of most of them was designed to make uninstallation difficult."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many proprietary programs secretly <a href=\"https://www.theregister.co."
"uk/2016/08/05/payperinstall_study/\">install other proprietary programs that "
"the users don't want</a>."
@@ -6365,6 +6400,18 @@
"\">#SpywareInMobileApps</a>)</span>"
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Twenty nine “beauty camera” apps that used to be on Google Play "
+"had one or more malicious functionalities, such as <a href=\"https://www."
+"teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-"
+"photo-29923\"> stealing users' photos</a> instead of “"
+"beautifying” them, pushing unwanted and often malicious ads on users, "
+"and redirecting them to phishing sites that stole their credentials. "
+"Furthermore, the user interface of most of them was designed to make "
+"uninstallation difficult."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "Skype"
msgstr ""
Index: software/recent-releases-include.af.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.af.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.af.html 17 Feb 2019 02:28:57 -0000
1.920
+++ software/recent-releases-include.af.html 20 Feb 2019 15:30:51 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.ar.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ar.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.ar.html 17 Feb 2019 02:28:57 -0000
1.920
+++ software/recent-releases-include.ar.html 20 Feb 2019 15:30:51 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.bg.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.bg.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.bg.html 17 Feb 2019 02:28:57 -0000
1.920
+++ software/recent-releases-include.bg.html 20 Feb 2019 15:30:51 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.ca.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ca.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.ca.html 17 Feb 2019 02:28:57 -0000
1.920
+++ software/recent-releases-include.ca.html 20 Feb 2019 15:30:51 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.cs.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.cs.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.cs.html 17 Feb 2019 02:28:57 -0000
1.920
+++ software/recent-releases-include.cs.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.da.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.da.html,v
retrieving revision 1.558
retrieving revision 1.559
diff -u -b -r1.558 -r1.559
--- software/recent-releases-include.da.html 17 Feb 2019 02:28:57 -0000
1.558
+++ software/recent-releases-include.da.html 20 Feb 2019 15:30:52 -0000
1.559
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.de.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.de.html,v
retrieving revision 1.1119
retrieving revision 1.1120
diff -u -b -r1.1119 -r1.1120
--- software/recent-releases-include.de.html 17 Feb 2019 02:28:57 -0000
1.1119
+++ software/recent-releases-include.de.html 20 Feb 2019 15:30:52 -0000
1.1120
@@ -1,4 +1,10 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
+href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
+MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
Index: software/recent-releases-include.el.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.el.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.el.html 17 Feb 2019 02:28:57 -0000
1.920
+++ software/recent-releases-include.el.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.es.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.es.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.es.html 17 Feb 2019 02:28:57 -0000
1.920
+++ software/recent-releases-include.es.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.fa.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.fa.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.fa.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.fa.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.fr.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.fr.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.fr.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.fr.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.he.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.he.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.he.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.he.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.hr.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.hr.html,v
retrieving revision 1.877
retrieving revision 1.878
diff -u -b -r1.877 -r1.878
--- software/recent-releases-include.hr.html 17 Feb 2019 02:28:58 -0000
1.877
+++ software/recent-releases-include.hr.html 20 Feb 2019 15:30:52 -0000
1.878
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.id.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.id.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.id.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.id.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.it.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.it.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.it.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.it.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.ja.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ja.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.ja.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.ja.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.ko.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ko.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.ko.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.ko.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.lt.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.lt.html,v
retrieving revision 1.676
retrieving revision 1.677
diff -u -b -r1.676 -r1.677
--- software/recent-releases-include.lt.html 17 Feb 2019 02:28:58 -0000
1.676
+++ software/recent-releases-include.lt.html 20 Feb 2019 15:30:52 -0000
1.677
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.ml.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ml.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.ml.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.ml.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.nb.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.nb.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.nb.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.nb.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.nl.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.nl.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.nl.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.nl.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.pl.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.pl.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.pl.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.pl.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.pt-br.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.pt-br.html,v
retrieving revision 1.508
retrieving revision 1.509
diff -u -b -r1.508 -r1.509
--- software/recent-releases-include.pt-br.html 17 Feb 2019 13:59:25 -0000
1.508
+++ software/recent-releases-include.pt-br.html 20 Feb 2019 15:30:52 -0000
1.509
@@ -1,4 +1,10 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
+href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
+MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>16 de Fevereiro de 2019</strong>
<ul>
<li><a
Index: software/recent-releases-include.ro.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ro.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.ro.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.ro.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.ru.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ru.html,v
retrieving revision 1.1656
retrieving revision 1.1657
diff -u -b -r1.1656 -r1.1657
--- software/recent-releases-include.ru.html 17 Feb 2019 06:29:04 -0000
1.1656
+++ software/recent-releases-include.ru.html 20 Feb 2019 15:30:52 -0000
1.1657
@@ -1,4 +1,10 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
+href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
+MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>16 ÑевÑÐ°Ð»Ñ 2019</strong>
<ul>
<li><a
Index: software/recent-releases-include.sk.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.sk.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.sk.html 17 Feb 2019 02:28:58 -0000
1.920
+++ software/recent-releases-include.sk.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.sq.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.sq.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.sq.html 17 Feb 2019 02:28:59 -0000
1.920
+++ software/recent-releases-include.sq.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.sr.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.sr.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.sr.html 17 Feb 2019 02:28:59 -0000
1.920
+++ software/recent-releases-include.sr.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.sv.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.sv.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.sv.html 17 Feb 2019 02:28:59 -0000
1.920
+++ software/recent-releases-include.sv.html 20 Feb 2019 15:30:52 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.ta.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.ta.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.ta.html 17 Feb 2019 02:28:59 -0000
1.920
+++ software/recent-releases-include.ta.html 20 Feb 2019 15:30:53 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.te.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.te.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- software/recent-releases-include.te.html 17 Feb 2019 02:28:59 -0000
1.62
+++ software/recent-releases-include.te.html 20 Feb 2019 15:30:53 -0000
1.63
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.tr.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.tr.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.tr.html 17 Feb 2019 02:28:59 -0000
1.920
+++ software/recent-releases-include.tr.html 20 Feb 2019 15:30:53 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.uk.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.uk.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.uk.html 17 Feb 2019 02:28:59 -0000
1.920
+++ software/recent-releases-include.uk.html 20 Feb 2019 15:30:53 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.zh-cn.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.zh-cn.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.zh-cn.html 17 Feb 2019 02:28:59 -0000
1.920
+++ software/recent-releases-include.zh-cn.html 20 Feb 2019 15:30:53 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/recent-releases-include.zh-tw.html
===================================================================
RCS file: /web/www/www/software/recent-releases-include.zh-tw.html,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/recent-releases-include.zh-tw.html 17 Feb 2019 02:28:59 -0000
1.920
+++ software/recent-releases-include.zh-tw.html 20 Feb 2019 15:30:53 -0000
1.921
@@ -1,4 +1,8 @@
<ul>
+<li><strong>February 20, 2019</strong>
+<ul>
+<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html">GNU
MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt></li>
+</ul></li>
<li><strong>February 16, 2019</strong>
<ul>
<li><a
href="http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00005.html">New
FreeDink game engine release</a>, <i>Sylvain Beucler</i>, <tt>21:06</tt></li>
Index: software/po/recent-releases-include.de.po
===================================================================
RCS file: /web/www/www/software/po/recent-releases-include.de.po,v
retrieving revision 1.1213
retrieving revision 1.1214
diff -u -b -r1.1213 -r1.1214
--- software/po/recent-releases-include.de.po 17 Feb 2019 02:28:59 -0000
1.1213
+++ software/po/recent-releases-include.de.po 20 Feb 2019 15:30:53 -0000
1.1214
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: recent-releases-include.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-17 02:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:27+0000\n"
"PO-Revision-Date: 2018-11-19 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -18,6 +18,29 @@
"X-Outdated-Since: 2019-01-27 17:27+0000\n"
#. type: Content of: <ul><li>
+# | <strong>February 20, 201[-8-]{+9+}</strong>
+#, fuzzy
+#| msgid "<strong>February 20, 2018</strong>"
+msgid "<strong>February 20, 2019</strong>"
+msgstr "2018-02-20"
+
+#. type: Content of: <ul><li><ul><li>
+# | <a
+# |
href=\"http://lists.gnu.org/archive/html/info-gnu/201[-8-]{+9+}-02/msg00006.html\">GNU
+# | MCSim version 6.[-0-]{+1+}.0 release</a>, <i>fredomatic</i>,
+# | [-<tt>11:49</tt>-] {+<tt>09:05</tt>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-02/msg00006.html"
+#| "\">GNU MCSim version 6.0.0 release</a>, <i>fredomatic</i>, <tt>11:49</tt>"
+msgid ""
+"<a href=\"http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html"
+"\">GNU MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt>"
+msgstr ""
+"<a href=\"//lists.gnu.org/archive/html/info-gnu/2018-02/msg00006.html\">GNU "
+"MCSim 6.0.0 release</a>, <i>fredomatic</i>, <tt>11:49</tt>"
+
+#. type: Content of: <ul><li>
# | <strong>February [-02, 2018</strong>-] {+16, 2019</strong>+}
#, fuzzy
#| msgid "<strong>February 02, 2018</strong>"
@@ -1839,13 +1862,6 @@
#~ msgid "<strong>February 24, 2018</strong>"
#~ msgstr "2018-02-24"
-#~ msgid ""
-#~ "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-02/msg00006.html"
-#~ "\">GNU MCSim version 6.0.0 release</a>, <i>fredomatic</i>, <tt>11:49</tt>"
-#~ msgstr ""
-#~ "<a href=\"//lists.gnu.org/archive/html/info-gnu/2018-02/msg00006.html"
-#~ "\">GNU MCSim 6.0.0 release</a>, <i>fredomatic</i>, <tt>11:49</tt>"
-
#~ msgid "<strong>February 22, 2018</strong>"
#~ msgstr "2018-02-22"
@@ -3872,9 +3888,6 @@
#~ msgid "<strong>March 02, 2018</strong>"
#~ msgstr "2018-03-02"
-#~ msgid "<strong>February 20, 2018</strong>"
-#~ msgstr "2018-02-20"
-
#~ msgid "<strong>January 15, 2018</strong>"
#~ msgstr "2018-01-15"
Index: software/po/recent-releases-include.pot.opt
===================================================================
RCS file: /web/www/www/software/po/recent-releases-include.pot.opt,v
retrieving revision 1.920
retrieving revision 1.921
diff -u -b -r1.920 -r1.921
--- software/po/recent-releases-include.pot.opt 17 Feb 2019 02:28:59 -0000
1.920
+++ software/po/recent-releases-include.pot.opt 20 Feb 2019 15:30:53 -0000
1.921
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: recent-releases-include.html\n"
-"POT-Creation-Date: 2019-02-17 02:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:27+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -17,6 +17,17 @@
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <ul><li>
+msgid "<strong>February 20, 2019</strong>"
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"<a "
+"href=\"http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html\">GNU
"
+"MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt>"
+msgstr ""
+
+#. type: Content of: <ul><li>
msgid "<strong>February 16, 2019</strong>"
msgstr ""
Index: software/po/recent-releases-include.pt-br.po
===================================================================
RCS file: /web/www/www/software/po/recent-releases-include.pt-br.po,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- software/po/recent-releases-include.pt-br.po 17 Feb 2019 13:59:25
-0000 1.307
+++ software/po/recent-releases-include.pt-br.po 20 Feb 2019 15:30:53
-0000 1.308
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: recent-releases-include.html\n"
-"POT-Creation-Date: 2019-02-17 02:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:27+0000\n"
"PO-Revision-Date: 2019-02-17 10:24-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,10 +13,29 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:27+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
#. type: Content of: <ul><li>
+#, fuzzy
+#| msgid "<strong>February 12, 2019</strong>"
+msgid "<strong>February 20, 2019</strong>"
+msgstr "<strong>12 de Fevereiro de 2019</strong>"
+
+#. type: Content of: <ul><li><ul><li>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-09/msg00006.html"
+#| "\">GNU xorriso 1.5.0 released</a>, <i>Thomas Schmitt</i>, <tt>16:52</tt>"
+msgid ""
+"<a href=\"http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html"
+"\">GNU MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt>"
+msgstr ""
+"<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-09/msg00006.html"
+"\">GNU xorriso 1.5.0 lançado</a>, <i>Thomas Schmitt</i>, <tt>16:52</tt>"
+
+#. type: Content of: <ul><li>
msgid "<strong>February 16, 2019</strong>"
msgstr "<strong>16 de Fevereiro de 2019</strong>"
@@ -667,13 +686,6 @@
#~ msgid "<strong>September 16, 2018</strong>"
#~ msgstr "<strong>16 de Setembro de 2018</strong>"
-#~ msgid ""
-#~ "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-09/msg00006.html"
-#~ "\">GNU xorriso 1.5.0 released</a>, <i>Thomas Schmitt</i>, <tt>16:52</tt>"
-#~ msgstr ""
-#~ "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-09/msg00006.html"
-#~ "\">GNU xorriso 1.5.0 lançado</a>, <i>Thomas Schmitt</i>, <tt>16:52</tt>"
-
#~ msgid "<strong>September 13, 2018</strong>"
#~ msgstr "<strong>13 de Setembro de 2018</strong>"
Index: software/po/recent-releases-include.ru.po
===================================================================
RCS file: /web/www/www/software/po/recent-releases-include.ru.po,v
retrieving revision 1.2338
retrieving revision 1.2339
diff -u -b -r1.2338 -r1.2339
--- software/po/recent-releases-include.ru.po 17 Feb 2019 06:29:05 -0000
1.2338
+++ software/po/recent-releases-include.ru.po 20 Feb 2019 15:30:53 -0000
1.2339
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: recent-releases-include.html\n"
-"POT-Creation-Date: 2019-02-17 02:26+0000\n"
+"POT-Creation-Date: 2019-02-20 15:27+0000\n"
"PO-Revision-Date: 2019-02-17 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -14,6 +14,31 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-20 15:27+0000\n"
+
+#. type: Content of: <ul><li>
+# | <strong>February 20, 201[-5-]{+9+}</strong>
+#, fuzzy
+#| msgid "<strong>February 20, 2015</strong>"
+msgid "<strong>February 20, 2019</strong>"
+msgstr "<strong>20 ÑевÑÐ°Ð»Ñ 2015</strong>"
+
+#. type: Content of: <ul><li><ul><li>
+# | <a
+# |
[-href=\"http://lists.gnu.org/archive/html/info-gnu/2018-05/msg00006.html\">GNU-]
+# |
{+href=\"http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html\">GNU+}
+# | MCSim version [-6.0.1-] {+6.1.0+} release</a>, <i>fredomatic</i>,
+# | [-<tt>09:39</tt>-] {+<tt>09:05</tt>+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-05/msg00006.html"
+#| "\">GNU MCSim version 6.0.1 release</a>, <i>fredomatic</i>, <tt>09:39</tt>"
+msgid ""
+"<a href=\"http://lists.gnu.org/archive/html/info-gnu/2019-02/msg00006.html"
+"\">GNU MCSim version 6.1.0 release</a>, <i>fredomatic</i>, <tt>09:05</tt>"
+msgstr ""
+"<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-05/msg00006.html"
+"\">ÐÑпÑÑк веÑÑии 6.0.1 GNU MCSim</a>, <i>fredomatic</i>,
<tt>09:39</tt>"
#. type: Content of: <ul><li>
msgid "<strong>February 16, 2019</strong>"
@@ -1064,13 +1089,6 @@
#~ msgid "<strong>May 05, 2018</strong>"
#~ msgstr "<strong>05 Ð¼Ð°Ñ 2018</strong>"
-#~ msgid ""
-#~ "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-05/msg00006.html"
-#~ "\">GNU MCSim version 6.0.1 release</a>, <i>fredomatic</i>, <tt>09:39</tt>"
-#~ msgstr ""
-#~ "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2018-05/msg00006.html"
-#~ "\">ÐÑпÑÑк веÑÑии 6.0.1 GNU MCSim</a>, <i>fredomatic</i>,
<tt>09:39</tt>"
-
#~ msgid "<strong>May 03, 2018</strong>"
#~ msgstr "<strong>03 Ð¼Ð°Ñ 2018</strong>"
@@ -3522,9 +3540,6 @@
#~ msgid "<strong>February 25, 2015</strong>"
#~ msgstr "<strong>25 ÑевÑÐ°Ð»Ñ 2015</strong>"
-#~ msgid "<strong>February 20, 2015</strong>"
-#~ msgstr "<strong>20 ÑевÑÐ°Ð»Ñ 2015</strong>"
-
#~ msgid ""
#~ "<a href=\"http://lists.gnu.org/archive/html/info-gnu/2015-02/msg00009.html"
#~ "\">Bug fix release of GNU MPC 1.0.3 "Fagus silvatica"</a>, "
- www philosophy/po/open-source-misses-the-point....,
GNUN <=