www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www distros/common-distros.zh-cn.html distros/p...


From: GNUN
Subject: www distros/common-distros.zh-cn.html distros/p...
Date: Sat, 23 Feb 2019 03:29:35 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/02/23 03:29:35

Modified files:
        distros        : common-distros.zh-cn.html 
        distros/po     : common-distros.zh-cn.po 
        doc            : other-free-books.zh-cn.html 
        doc/po         : other-free-books.zh-cn.po 
        education      : edu-cases-india-irimpanam.zh-cn.html 
        education/po   : edu-cases-india-irimpanam.zh-cn.po 
        philosophy     : applying-free-sw-criteria.zh-cn.html 
                         surveillance-vs-democracy.zh-cn.html 
                         who-does-that-server-really-serve.zh-cn.html 
        philosophy/po  : surveillance-vs-democracy.zh-cn.po 
                         who-does-that-server-really-serve.zh-cn.po 
        thankgnus      : thankgnus.zh-cn.html 
        thankgnus/po   : thankgnus.zh-cn.po 
Added files:
        philosophy/po  : surveillance-vs-democracy.zh-cn-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/common-distros.zh-cn.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/common-distros.zh-cn.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/doc/other-free-books.zh-cn.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/doc/po/other-free-books.zh-cn.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-cases-india-irimpanam.zh-cn.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/education/po/edu-cases-india-irimpanam.zh-cn.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/applying-free-sw-criteria.zh-cn.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.zh-cn.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.zh-cn.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.zh-cn.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.zh-cn-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/thankgnus.zh-cn.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/thankgnus.zh-cn.po?cvsroot=www&r1=1.20&r2=1.21

Patches:
Index: distros/common-distros.zh-cn.html
===================================================================
RCS file: /web/www/www/distros/common-distros.zh-cn.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- distros/common-distros.zh-cn.html   12 Jan 2019 13:58:40 -0000      1.11
+++ distros/common-distros.zh-cn.html   23 Feb 2019 08:29:33 -0000      1.12
@@ -59,9 +59,9 @@
 
 <p>Debian的社群契约声明其目标是使Debian成为完å…
¨è‡ªç”±è½¯ä»¶ï¼Œå¹¶ä¸”Debian自觉地把非自由软件排除在å…
¶æ­£å¼å‘布之外。然而,Debian还是提供非自由软件的软件库。æ
 ¹æ®å…
¶é¡¹ç›®ï¼Œè¿™äº›è½¯ä»¶&ldquo;不是Debian系统的一部分&rdquo;,但是该软件库由该项目的许多主要服务器托管,而且人们可以马上通过浏览Debian的在线软件åŒ
…数据库和其wiki找到这些非自由软件。</p>
 
-<p>它还有一个&ldquo;贡献&rdquo;软件库;其软件包
是自由的,但是其中有些需要加
载另外发布的专属软件。这也没完å…
¨å’ŒDebian主发行版分离。</p>
+<p>它还有一个&ldquo;contrib&rdquo;软件库;其软件包
是自由的,但是其中有些需要加
载另外发布的专有软件。这也没完å…
¨å’ŒDebian主发行版分离。</p>
 
-<p>Debian是唯一没有被支持而在å…
¶ä¸»å‘布中没有非自由blobs的发行版。不过,还是有些问题。非自由的固件还存在于Debian的非自由软件库中,这点在debian.org的文档中有说明,å
…¶å®‰è£…程序在某些情况下会建议计算机周边设备安装
这些非自由固件。</p>
+<p>Debian是唯一没有被认可而在å…
¶ä¸»å‘布中没有非自由blobs的发行版。不过,还是有些问题。非自由的固件仍然存在于Debian的非自由软件库中,这点在debian.org的文档中有说明,å
…¶å®‰è£…程序在某些情况下会推荐计算机周边设备安装
这些非自由固件。</p>
 
 <p>Debian的wiki含有关于安装这些非自由固件的页面。</p>
 
@@ -86,12 +86,12 @@
 
 <h3 id="Mint">Mint GNU/Linux</h3>
 
-<p>Mint没有拒绝非自由软件的政策,它的内核驱动包
含有非自由的二进制blobs,而且它的软件库中也带有非自由软件。它甚至åŒ
…含了专属的编解码程序。</p>
+<p>Mint没有拒绝非自由软件的政策,它的内核驱动包
含有非自由的二进制blobs,而且它的软件库中也带有非自由软件。它甚至åŒ
…含了专有的编解码程序。</p>
 
 <h3 id="openSUSE">openSUSE</h3>
 
 <p>openSUSE提供非自由软件库。这就是<a
-href="/philosophy/open-source-misses-the-point.html">&ldquo;开放&rdquo;弱于&ldquo;自由&rdquo;</a>的一个明证。</p>
+href="/philosophy/open-source-misses-the-point.html">&ldquo;开放(open)&rdquo;弱于&ldquo;自由(free)&rdquo;</a>的一个明证。</p>
 
 <h3 id="RedHat">Red Hat GNU/Linux</h3>
 
@@ -105,8 +105,8 @@
 
 <h3 id="SteamOS">SteamOS</h3>
 
-<p>SteamOS是由Valve发布的GNU/Linux版本。它带有专属软件,包
括Steam客户端和专属驱动。Steam使用<a
-href="https://www.defectivebydesign.org/what_is_drm";>数字权限管理(DRM)</a>来限制å
…¶å‘布的软件,包括其通过Steam商店发布的专属软件。</p>
+<p>SteamOS是由Valve发布的GNU/Linux版本。它带有专有软件,包
括Steam客户端和专有驱动。Steam使用<a
+href="https://www.defectivebydesign.org/what_is_drm";>数字权限管理(DRM)</a>来限制å
…¶å‘布的软件,包括其通过Steam商店发布的专有软件。</p>
 
 <h3 id="SUSE">SUSE GNU/Linux Enterprise</h3>
 
@@ -120,14 +120,14 @@
 
 
<p>Ubuntu为非自由软件提供特别的软件库,而且Canonical以Ubuntu的名义在å
…¶å‘布渠道明确表示推广和建议非自由软件。Ubuntu提供了仅
安装自由软件的选项,这表示它也提供了安装
非自由软件的选项。另外,Ubuntu的Linux内核包
含了固件blobs。</p>
 
-<p>&ldquo;Ubuntu软件中心&rdquo;把自由软件和专属软件混在一起。这æ
 ·<a
-href="http://www.freesoftwaremagazine.com/articles/ubuntu_software_center_proprietary_and_free_software_mixed_confusing_ui";>难以分辨哪些是自由软件</a>,å›
 ä¸ºå…è´¹ä¸‹è½½çš„专属软件贴着&ldquo;自由(free)&rdquo;的æ 
‡ç­¾ã€‚</p>
+<p>&ldquo;Ubuntu软件中心&rdquo;把自由软件和专有软件混在一起。这æ
 ·<a
+href="http://www.freesoftwaremagazine.com/articles/ubuntu_software_center_proprietary_and_free_software_mixed_confusing_ui";>难以分辨哪些是自由软件</a>,å›
 ä¸ºå…è´¹ä¸‹è½½çš„专有软件贴着&ldquo;自由(free)&rdquo;的æ 
‡ç­¾ã€‚</p>
 
 <p>Ubuntu<a
-href="http://www.ubuntu.com/legal/intellectual-property-policy#your-use-of-ubuntu";>显然å
…è®¸ä»¥å…¶å•†æ ‡å‘布完全一æ 
·çš„商业拷贝</a>;只有修改过的版本才需要去除其商æ 
‡ã€‚这个商æ 
‡æ”¿ç­–可以接受。在同一页面,往下看,可以看到含糊不明的&ldquo;Ubuntu专利&rdquo;声明,而它并未就以上是否构成侵权给出详尽的说明。</p>
+href="https://www.ubuntu.com/legal/intellectual-property-policy#your-use-of-ubuntu";>显然å
…è®¸ä»¥å…¶å•†æ ‡å‘布完全一æ 
·çš„商业拷贝</a>;只有修改过的版本才需要去除其商æ 
‡ã€‚这个商æ 
‡æ”¿ç­–可以接受。在同一页面,往下看,可以看到含糊不明的&ldquo;Ubuntu专利&rdquo;声明,而它并未就以上是否构成侵权给出详尽的说明。</p>
 
 <p>该页面通过使用<a
-href="/philosophy/not-ipr.html">&ldquo;知识产权权利&rdquo;</a>这一误导性术语散布混乱,错误地假设商æ
 ‡æ³•ã€ä¸“利法和å…
¶ä»–一些法律属于同一概念性框架。使用该术语是有害的,没有例外,所以除了引用别人对该术语的使用之外,我们应该拒绝使用它。但是,这并不是Ubuntu作为一个GNU/Linux发行版的主要问题。</p>
+href="/philosophy/not-ipr.html">&ldquo;知识产权&rdquo;</a>这一误导性术语散布混乱,错误地假设商æ
 ‡æ³•ã€ä¸“利法和å…
¶ä»–一些法律属于同一概念性框架。使用该术语是有害的,没有例外,所以除了引用别人对该术语的使用之外,我们应该拒绝使用它。但是,这并不是Ubuntu作为一个GNU/Linux发行版的主要问题。</p>
 
 <p>请不要使用这个非自由的发行版,请使用由它改造
的自由发行版:<a
 href="/distros/free-distros.html#for-pc">Dyne:bolic</a>、<a
@@ -150,7 +150,7 @@
 
 <p>Linux内æ 
¸ä½¿ç”¨çš„非自由固件程序被称做&ldquo;blobs&rdquo;,我们使用该术语描述此类程序。在BSD术语中,&ldquo;blob&rdquo;说的是另外的东西:非自由驱动。OpenBSD,还可能åŒ
…括其他BSD发行版(BSD开发者称之为&ldquo;项目&rdquo;)有不包
含这些非自由驱动的政策。对驱动,这是正确的政策;但是当开发è€
…说其发行版&ldquo;没有包
含blobs&rdquo;时,就形成了误解。他们说的不是固件blobs。</p>
 
-<p>这些BSD发行版都没有声明它们有针对专属二进制固件的政策,即使这些二进制固件可能会被自由驱动åŠ
 è½½ã€‚</p>
+<p>这些BSD发行版都没有声明它们有针对专有二进制固件的政策,即使这些二进制固件可能会被自由驱动åŠ
 è½½ã€‚</p>
 
 <h3 id="ChromeOS">Chrome OS</h3>
 
@@ -170,7 +170,7 @@
 
 <h3 id="ReactOS">ReactOS</h3>
 
-<p>ReactOS目的在于为替代Windows而提供自由二进制å…
¼å®¹è½¯ä»¶ã€‚为Windows使用专属软件和驱动是其项目阐述的目æ 
‡ä¹‹ä¸€ã€‚</p>
+<p>ReactOS目的在于为替代Windows而提供自由二进制å…
¼å®¹è½¯ä»¶ã€‚为Windows使用专有软件和驱动是其项目阐述的目æ 
‡ä¹‹ä¸€ã€‚</p>
 
 <div class="translators-notes">
 
@@ -240,7 +240,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2019/01/12 13:58:40 $
+$Date: 2019/02/23 08:29:33 $
 
 <!-- timestamp end -->
 </p>

Index: distros/po/common-distros.zh-cn.po
===================================================================
RCS file: /web/www/www/distros/po/common-distros.zh-cn.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- distros/po/common-distros.zh-cn.po  23 Feb 2019 07:59:56 -0000      1.25
+++ distros/po/common-distros.zh-cn.po  23 Feb 2019 08:29:33 -0000      1.26
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-01-08 09:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -644,10 +643,10 @@
 #~ "partly remains: the installer in some cases recommends these nonfree "
 #~ "firmware files for the peripherals on the machine."
 #~ msgstr ""
-#~ "Debian以前的发布包括带非自由blobs的Linux内æ 
¸ã€‚从2011å¹´2月的Debian "
-#~ "6.0(&ldquo;squeeze&rdquo;)发布起,这些blobs被å…
¶ä¸»å‘布移除到分离的非自由"
-#~ "软件库。然而,问题还有遗留:其安装程序在某些情
况下会为电脑的外设推荐这些非"
-#~ "自由的固件。"
+#~ "Debian以前的发布包括带非自由blobs的Linux内æ 
¸ã€‚从2011å¹´2月的Debian 6.0"
+#~ "(&ldquo;squeeze&rdquo;)发布起,这些blobs被å…
¶ä¸»å‘布移除到分离的非自由软件"
+#~ "库。然而,问题还有遗留:其安装程序在某些情
况下会为电脑的外设推荐这些非自由"
+#~ "的固件。"
 
 #~ msgid ""
 #~ "Arch has the two usual problems: there's no clear policy about what "

Index: doc/other-free-books.zh-cn.html
===================================================================
RCS file: /web/www/www/doc/other-free-books.zh-cn.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- doc/other-free-books.zh-cn.html     15 Dec 2018 14:46:03 -0000      1.8
+++ doc/other-free-books.zh-cn.html     23 Feb 2019 08:29:34 -0000      1.9
@@ -39,8 +39,8 @@
 <h3 id="TableOfContents">目录</h3>
 
 <ul>
-  <li>英语自由书籍</li>
-  <li>西班牙语自由书籍</li>
+  <li><a href="#English">英语自由书籍</a></li>
+  <li><a href="#Spanish">西班牙语自由书籍</a></li>
 </ul>
 
 <p>
@@ -90,7 +90,7 @@
 <td>J.W. Eaton等</td>
 <td>Network Theory Ltd.</td>
 <td>095461206X</td>
-<td>老GNU手册许可证</td>
+<td>老版的GNU手册许可证</td>
 </tr>
 
 <tr>
@@ -173,7 +173,7 @@
 <td>The R Development Core Team</td>
 <td>Network Theory Ltd.</td>
 <td>0-9546120-0-0</td>
-<td>老GNU手册许可证</td>
+<td>老版的GNU手册许可证</td>
 </tr>
 
 <tr>
@@ -182,7 +182,7 @@
 <td>The R Development Core Team</td>
 <td>Network Theory Ltd.</td>
 <td>0-9546120-1-9</td>
-<td>老GNU手册许可证</td>
+<td>老版的GNU手册许可证</td>
 </tr>
 
 <tr>
@@ -191,7 +191,7 @@
 <td>Chet Ramey, Brian Fox</td>
 <td>Network Theory Ltd.</td>
 <td>0-9541617-7-7</td>
-<td>老GNU手册许可证</td>
+<td>老版的GNU手册许可证</td>
 </tr>
 
 <tr>
@@ -218,7 +218,7 @@
 <td>W.N. Venables等</td>
 <td>Network Theory Ltd.</td>
 <td>0-9541617-4-2</td>
-<td>老GNU手册许可证</td>
+<td>老版的GNU手册许可证</td>
 </tr>
 
 <tr>
@@ -227,7 +227,7 @@
 <td>John W. Eaton</td>
 <td>Network Theory Ltd.</td>
 <td>0-9541617-2-6</td>
-<td>老GNU手册许可证</td>
+<td>老版的GNU手册许可证</td>
 </tr>
 
 <tr>
@@ -236,7 +236,7 @@
 <td>Per Cederqvist等</td>
 <td>Network Theory Ltd.</td>
 <td>0-9541617-1-8</td>
-<td>老GNU手册许可证</td>
+<td>老版的GNU手册许可证</td>
 </tr>
 
 <tr>
@@ -425,7 +425,7 @@
 <dt><a href="#ALP_ENTRY" name="ALP_NOTE"><strong>Note on Advanced Linux
 Programming,第一版:</strong></a></dt>
 <dd>
-本书在2001年6月付印时没有正确列出许可证。该印刷版显示本书是专属书籍。出版商向我们保证这个纯属印刷错误,而该书的许可证应该是&ldquo;Open
+本书在2001年6月付印时没有正确列出许可证。该印刷版显示本书是专有书籍。出版商向我们保证这个纯属印刷错误,而该书的许可证应该是&ldquo;Open
 Publication License,版本&nbsp;1.0,无选择权&rdquo;。该书的<a
 
href="https://web.archive.org/web/20150330081029/http://www.advancedlinuxprogramming.com/errata.html";>勘误表</a>也确认了这一点。他们还保证再版时一定会更正许可证。
 </dd>
@@ -499,12 +499,12 @@
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
 <b>翻译团队</b>:<a rel="team"
-href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2018。</div>
+href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2018,2019。</div>
 
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2018/12/15 14:46:03 $
+$Date: 2019/02/23 08:29:34 $
 
 <!-- timestamp end -->
 </p>

Index: doc/po/other-free-books.zh-cn.po
===================================================================
RCS file: /web/www/www/doc/po/other-free-books.zh-cn.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- doc/po/other-free-books.zh-cn.po    23 Feb 2019 07:59:09 -0000      1.8
+++ doc/po/other-free-books.zh-cn.po    23 Feb 2019 08:29:34 -0000      1.9
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-12-01 18:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -502,8 +501,8 @@
 "Open Publication License, Version&nbsp;1.0 (no options exercised)  <a href="
 "\"#ALP_NOTE\">(See note below)</a>"
 msgstr ""
-"Open Publication License, Version&nbsp;1.0(无选择权)<a 
href=\"#ALP_NOTE"
-"\">(请参看注解)</a>"
+"Open Publication License, Version&nbsp;1.0(无选择权)<a 
href=\"#ALP_NOTE\">"
+"(请参看注解)</a>"
 
 #. type: Content of: <table><tr><td>
 msgid ""

Index: education/edu-cases-india-irimpanam.zh-cn.html
===================================================================
RCS file: /web/www/www/education/edu-cases-india-irimpanam.zh-cn.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- education/edu-cases-india-irimpanam.zh-cn.html      15 Dec 2018 14:46:04 
-0000      1.4
+++ education/edu-cases-india-irimpanam.zh-cn.html      23 Feb 2019 08:29:34 
-0000      1.5
@@ -10,8 +10,8 @@
 <!--#include virtual="/education/po/edu-cases-india-irimpanam.translist" -->
 <!--#include virtual="/server/banner.zh-cn.html" -->
 <!--#include virtual="/education/education-menu.zh-cn.html" -->
-<p class="edu-breadcrumb"><a href="/educatoin/education.html">Education</a> 
&rarr; <a
-href="/education/edu-cases.html">案例学习</a> &rarr; <a
+<p class="edu-breadcrumb"><a href="/education/education.html">Education</a> 
&rarr; <a
+href="/education/edu-cases.html">案例分析</a> &rarr; <a
 href="/education/edu-cases-india.html">印度</a> &rarr; 
Irimpanam高级职业中学</p>
 
 <!--GNUN: OUT-OF-DATE NOTICE-->
@@ -77,7 +77,7 @@
 
 <h3>保证使用自由软件</h3>
 
-<p>开始时我们还使用带有新系统的双启动系统,因
为教师们还不了解自由软件,但是很快我们就熟悉了新系统的大部分功能。现在,我们的电脑没有安è£
…任何专属软件,我们也不再用任何专属软件。在课å 
‚上、在管理办公室,我们只用自由软件。</p>
+<p>开始时我们还使用带有新系统的双启动系统,因
为教师们还不了解自由软件,但是很快我们就熟悉了新系统的大部分功能。现在,我们的电脑没有安è£
…任何专有软件,我们也不再用任何专有软件。在课å 
‚上、在管理办公室,我们只用自由软件。</p>
 
 <p>我们在课堂上使用很多自由软件,比如<a href= 
"http://directory.fsf.org/wiki/GIMP/";>GIMP</a>、<a
 href= "http://directory.fsf.org/wiki/TuxPaint";>Tux Paint</a>、<a
@@ -138,8 +138,8 @@
 rel="license" href="http://creativecommons.org/licenses/by-sa/3.0/";>Creative
 Commons Attribution-Share Alike 3.0 Unported</a>许可证发布。</p>    
 
-<p class="back"> <a href="/education/edu-cases-india.html">印度的å…
¶ä»–案例研究</a> <br />
-<a href="/education/edu-cases.html">返回到案例研究</a></p>
+<p class="back"> <a href="/education/edu-cases-india.html">印度的å…
¶ä»–案例分析</a> <br />
+<a href="/education/edu-cases.html">返回到案例分析</a></p>
 
 <div class="translators-notes">
 
@@ -187,12 +187,12 @@
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
 <b>翻译团队</b>:<a rel="team"
-href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2017,2018。</div>
+href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2017-2019。</div>
 
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2018/12/15 14:46:04 $
+$Date: 2019/02/23 08:29:34 $
 
 <!-- timestamp end -->
 </p>

Index: education/po/edu-cases-india-irimpanam.zh-cn.po
===================================================================
RCS file: /web/www/www/education/po/edu-cases-india-irimpanam.zh-cn.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- education/po/edu-cases-india-irimpanam.zh-cn.po     23 Feb 2019 07:58:30 
-0000      1.5
+++ education/po/edu-cases-india-irimpanam.zh-cn.po     23 Feb 2019 08:29:34 
-0000      1.6
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-08-12 07:26+0000\n"
 
 #. type: Content of: <title>
 msgid ""

Index: philosophy/applying-free-sw-criteria.zh-cn.html
===================================================================
RCS file: /web/www/www/philosophy/applying-free-sw-criteria.zh-cn.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/applying-free-sw-criteria.zh-cn.html     31 Dec 2018 14:29:06 
-0000      1.2
+++ philosophy/applying-free-sw-criteria.zh-cn.html     23 Feb 2019 08:29:34 
-0000      1.3
@@ -36,7 +36,7 @@
 可以正常工作,并且它们也不能离开 Unix libc 而运行,直到 
glibc
 
可以正常工作。每个组件都只能运行在非自由操作系统上,å›
 ä¸ºå½“时所有的操作系统都是非自由的。</p>
 
-<p>每当我们发布一款可以运行在某些非自由操作系统上的组件时,用户将å
…¶ç§»æ¤åˆ°å…
¶ä»–非自由操作系统上。从伦理上讲,这些移植并不比我们曾经用于开发这些组件的限定平台代ç
 æ›´åï¼Œå› æ­¤æˆ‘们整合了他们的修补程序。</p>
+<p>当我们发布了一款可以运行在某些非自由操作系统上的组件后,用户就把它移植到å
…
¶ä»–的非自由操作系统上。从伦理上讲,这些移植并不比我们曾经用于开发这些组件的限定平台代ç
 æ›´åï¼Œå› æ­¤æˆ‘们整合了用户的这些补丁程序。</p>
 
 <p>当 Linux 内核于 1992 年变为自由之时,它填补了 GNU 
操作系统的最后一块空缺(Linux 最初于 1991
 年以一种非自由许可证发布)。GNU 和 Linux 
的组合成为了一种完全自由的操作系统&mdash;<a
@@ -53,7 +53,7 @@
 <p>事实上,如果冰猫解释如何在 MacOS 
上运行冰猫,这将不会引导用户去运行
 
MacOS。但如果它介绍了一些非自由扩展,它将会鼓励冰猫用户安è£
…这些非自由扩展。因此,冰猫软件包及å…
¶æ‰‹å†Œå’Œç½‘站不应该介绍这些东西。</p>
 
-<p>有时一个自由软件和一个非自由软件协同工作,但å…
¶ä¸­ä»»ä½•ä¸€æ–¹éƒ½ä¸æ˜¯åŸºäºŽå¦ä¸€æ–¹çš„。我们针对这种情
况的规则是,如果该非自由软件非常有名,我们应当告知人们如何使用我们的自由软件与之工作;但如果该专有软件鲜为人知,我们不应该暗示å
…¶å­˜åœ¨ã€‚有时我们会在该非自由软件存在的情
况下提供互操作支持,但避免告知用户这么做的可能性。</p>
+<p>有时一个自由软件和一个非自由软件协同工作,但å…
¶ä¸­ä»»ä½•ä¸€æ–¹éƒ½ä¸æ˜¯å¦ä¸€æ–¹çš„基础。我们针对这种情
况的规则是,如果该非自由软件非常有名,我们应当告知人们如何使用我们的自由软件与之工作;但如果该专有软件鲜为人知,我们不应该暗示å
…¶å­˜åœ¨ã€‚有时我们会在该非自由软件存在的情
况下提供互操作支持,但避免告知用户这么做的可能性。</p>
 
 <p>我们拒绝任何仅
可用于某一非自由操作系统的&ldquo;增强组件&rdquo;。它们会鼓励人们使用该非自由操作系统而非
 GNU,如同自摆乌龙。</p>
 
@@ -82,9 +82,8 @@
 
 <p>与之相反,一个 GNU/Linux
 发行版通常包含数千个软件包,并且其开发者
可能每年都会向其中添加数百个新的软件包
。如果未能尽力避免那些包含某种非自由软件的软件包,几
乎肯定会有一些非自由软件混入å…
¶ä¸­ã€‚由于自由发行版的数量很少,作为列出那些发行版的条件,我们要求每位自由发行版的开发è€
…通过移除任何非自由代码或恶意代ç 
æ¥æ‰¿è¯ºä¿æŒè¯¥å‘行版成为自由软件。参见
-<a
-href="http://gnu.org/distros/free-system-distribution-guidelines.html";>GNU
-自由操作系统发行版指导意</a>。</p>
+<a href="/distros/free-system-distribution-guidelines.html">GNU
+自由操作系统发行版指南</a>。</p>
 
 <p>我们不要求自由软件包的开发者也做出这æ 
·çš„承诺,这是不现实的,幸运地是,这也不是必
需的。得到超过 30000
 个自由软件的开发者的承诺也许能够避免少数问题,但å…
¶ä»£ä»·æ˜¯æžå¤§å¢žåŠ 
自由软件基金会(FSF)员工的工作量;此外,这些开发者
中的大部分与 GNU
@@ -123,7 +122,7 @@
 
 <p>现在的很多网页都包含复杂的 JavaScript
 程序并且需要它们才能工作。这是一种有害的实践,因
为它阻碍用户对他们自己计算的控制。更坏的是,这些程序中的大部分是非自由的,这是一种不å
…¬ã€‚JavaScript
-代码常常窥探用户。<a 
href="philosophy/javascript-trap.html">JavaScript</a>
+代码常常窥探用户。<a 
href="/philosophy/javascript-trap.html">JavaScript</a>
 已经变成了一种对用户自由的威胁。</p>
 
 <p>为了解决这一问题,我们开发了 <a 
href="/software/librejs">LibreJS</a>,这是一种用于阻止非普通非自由的
@@ -206,12 +205,12 @@
 <b>翻译</b>:<a rel="team"
 href="https://savannah.nongnu.org/projects/blug/";>BLUG</a><br></br>
 <b>翻译团队</b>:<a rel="team"
-href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2018。</div>
+href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2018,2019。</div>
 
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2018/12/31 14:29:06 $
+$Date: 2019/02/23 08:29:34 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/surveillance-vs-democracy.zh-cn.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.zh-cn.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/surveillance-vs-democracy.zh-cn.html     15 Dec 2018 14:46:30 
-0000      1.14
+++ philosophy/surveillance-vs-democracy.zh-cn.html     23 Feb 2019 08:29:34 
-0000      1.15
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/surveillance-vs-democracy.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/surveillance-vs-democracy.zh-cn.po">
+ https://www.gnu.org/philosophy/po/surveillance-vs-democracy.zh-cn.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/surveillance-vs-democracy.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/surveillance-vs-democracy.zh-cn-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-11-19" --><!--#set 
var="ENGLISH_PAGE" value="/philosophy/surveillance-vs-democracy.en.html" -->
 
 <!--#include virtual="/server/header.zh-cn.html" -->
 <!-- Parent-Version: 1.86 -->
@@ -19,6 +24,7 @@
 <!-- GNUN: localize URL /graphics/dog.small.jpg -->
 <!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
 <!--#include virtual="/server/banner.zh-cn.html" -->
+<!--#include virtual="/server/outdated.zh-cn.html" -->
 <h2 class="center">民主能够承受多少监控?</h2>
 
 <p class="byline center"><a href="http://www.stallman.org/";>Richard 
Stallman</a> 著</p>
@@ -341,7 +347,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2018/12/15 14:46:30 $
+$Date: 2019/02/23 08:29:34 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/who-does-that-server-really-serve.zh-cn.html
===================================================================
RCS file: /web/www/www/philosophy/who-does-that-server-really-serve.zh-cn.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/who-does-that-server-really-serve.zh-cn.html     15 Dec 2018 
14:46:30 -0000      1.5
+++ philosophy/who-does-that-server-really-serve.zh-cn.html     23 Feb 2019 
08:29:34 -0000      1.6
@@ -15,22 +15,22 @@
 <blockquote><p>(本文第一版发表于<a
 
href="http://www.bostonreview.net/richard-stallman-free-software-DRM";>波士顿评论</a>。)</p></blockquote>
 
-<p><strong>在网络上,专属软件不是唯一让你
失去自由的途径。服务代替软件,或叫SaaSS,就是另一个让你
把计算交给别人的途径。</strong></p>
+<p><strong>在网络上,专有软件不是唯一让你
失去自由的途径。服务代替软件,或叫SaaSS,就是另一个让你
把计算交给别人的途径。</strong></p>
 
 <p>基本的观点是,你可以控制å…
¶ä»–人编写的程序(如果它是自由软件),但是你
永远不能控制å…
¶ä»–人执行的服务,所以原则上在程序能够完成任务的时候,不要使用服务。</p>
 
 
 <p>SaaSS意味着使用他人实现的服务来代替运行你
自己的软件。该术语是我们用的;其他文章
和广告不会使用它,并且他们不会告诉你
一项服务是否为SaaSS。另一方面,他们可能会用含糊和分散注意力的&ldquo;云&rdquo;这一术语,它把SaaSS和å
…¶ä»–一些实践搞在一起,å…
¶ä¸­æœ‰çš„是滥用,有的还可以。通过本页的解释和举例,你
就能够分辨一项服务究竟是不是SaaSS。</p>
 
-<h3>背景:专属软件如何拿走你的自由</h3>
+<h3>背景:专有软件如何拿走你的自由</h3>
 
-<p>数字技术能够给你自由;它也能拿走你
的自由。第一个对我们自主控制计算的威胁来自<em>专属软件</em>å›
 ä¸ºå…¶æ‰€æœ‰è€…(诸如苹果或微软之类的å…
¬å¸ï¼‰æŽŒæŽ§è½¯ä»¶ï¼Œæ‰€ä»¥ç”¨æˆ·æ— æ³•æŽ§åˆ¶è¯¥è½¯ä»¶ã€‚其所有者
经常利用这种不公平的权力植å…
¥æ¶æ„åŠŸèƒ½ï¼Œæ¯”如间谍软件、后门和<a
+<p>数字技术能够给你自由;它也能拿走你
的自由。第一个对我们自主控制计算的威胁来自<em>专有软件</em>å›
 ä¸ºå…¶æ‰€æœ‰è€…(诸如苹果或微软之类的å…
¬å¸ï¼‰æŽŒæŽ§è½¯ä»¶ï¼Œæ‰€ä»¥ç”¨æˆ·æ— æ³•æŽ§åˆ¶è¯¥è½¯ä»¶ã€‚其所有者
经常利用这种不公平的权力植å…
¥æ¶æ„åŠŸèƒ½ï¼Œæ¯”如间谍软件、后门和<a
 
href="http://DefectiveByDesign.org";>数字权限管理(DRM)</a>(请参考他们宣ä¼
 çš„&ldquo;数字版权管理&rdquo;)。</p>
 
-<p>我们对此的解决方案是开发<em>自由软件</em>并拒绝专属软件。自由软件意味着,ä½
 ï¼Œä½œä¸ºä¸€ä¸ªç”¨æˆ·ï¼Œæ‹¥æœ‰å››é¡¹åŸºæœ¬è‡ªç”±ï¼š(0)&nbsp;按ç…
§è‡ªç”±çš„意愿运行该软件,(1)&nbsp;通过学习和修改源代ç 
è€Œä½¿è½¯ä»¶æŒ‰ç…
§è‡ªå·±çš„意愿运行,(2)&nbsp;分发原来软件的拷贝,(3)&nbsp;分发修改后软件的拷贝(请参看<a
+<p>我们对此的解决方案是开发<em>自由软件</em>并拒绝专有软件。自由软件意味着,ä½
 ï¼Œä½œä¸ºä¸€ä¸ªç”¨æˆ·ï¼Œæ‹¥æœ‰å››é¡¹åŸºæœ¬è‡ªç”±ï¼š(0)&nbsp;按ç…
§è‡ªå·±çš„意愿运行该软件,(1)&nbsp;通过学习和修改源代ç 
è€Œä½¿è½¯ä»¶æŒ‰ç…
§è‡ªå·±çš„意愿运行,(2)&nbsp;分发原来软件的拷贝,(3)&nbsp;分发修改后软件的拷贝(请参看<a
 href="/philosophy/free-sw.html">自由软件的定义</a>。)</p>
 
-<p>通过使用自由软件,我们作为用户,拿回了对我们计算的控制。专属软件仍然存在,但是我们能够把他们排除在我们的生活之外,我们已经做到了。可是,现在有另一种方式诱使我们割让对计算的控制:服务代替软件(SaaSS)。看在自由的份上,我们也å¿
…须拒绝它。</p>
+<p>通过使用自由软件,我们作为用户,拿回了对我们计算的控制。专有软件仍然存在,但是我们能够把他们排除在我们的生活之外,我们已经做到了。可是,现在有另一种方式诱使我们割让对计算的控制:服务代替软件(SaaSS)。看在自由的份上,我们也å¿
…须拒绝它。</p>
 
 <h3>服务代替软件如何拿走我们的自由</h3>
 
@@ -38,17 +38,17 @@
 
 <p>计算是<em>她自己的</em>因为,按ç…
§å‡å®šï¼ŒåŽŸåˆ™ä¸Šï¼Œå¥¹å¯ä»¥åœ¨è‡ªå·±çš„电脑上完成计算(无
论她目前是否可以使用该程序)。如果该假定不成立,那么这个æƒ
…况不是SaaSS。</p>
 
-<p>这些服务器夺取用户自由甚至比专属软件还无情
。使用专属软件,用户通常得到可执行文件而不是源代ç 
ã€‚这使学习其代ç 
å˜å¾—困难,所以判断该程序真正的操作变得困难,更改它也变得困难。</p>
+<p>这些服务器夺取用户自由甚至比专有软件还无情
。使用专有软件,用户通常得到可执行文件而不是源代ç 
ã€‚这使学习其代ç 
å˜å¾—困难,所以判断该程序真正的操作变得困难,更改它也变得困难。</p>
 
 <p>使用SaaSS,用户甚至都没有从事å…
¶è®¡ç®—的可执行文件:它在别人的服务器上,用户看不到也摸不着。所以用户不可能弄æ¸
…楚它做了什么,也不可能改变它。</p>
 
-<p>更进一步,SaaSS自动就导致了和某些专属软件的恶意功能相同的后果。</p>
+<p>更进一步,SaaSS自动就导致了和某些专有软件的恶意功能相同的后果。</p>
 
-<p> 例如,有些专属软件是&ldquo;间谍软件&rdquo;:该程序<a
+<p> 例如,有些专有软件是&ldquo;间谍软件&rdquo;:该程序<a
 
href="/philosophy/proprietary-surveillance.html">向外发送用户的计算活动数据</a>。微软的Windows就把用户的活动发送给微软。Windows媒体播放器汇报每个用户观看或收听的å†
…容。Amazon
 
Kindle汇报用户在看哪本书的哪一页以及什么时间。愤怒的小鸟汇报用户的历史位置。</p>
 
-<p>和专属软件不同,SaaSS不需要秘密的代ç 
æ¥èŽ·å¾—用户数据。反过来,用户必
须把数据交给服务器才能获得服务。这和间谍软件的效果一æ 
·ï¼šæœåŠ¡å™¨æ“ä½œè€…获得了数据&mdash;不必花力气,因
为SaaSS就是这样的。Amy
+<p>和专有软件不同,SaaSS不需要秘密的代ç 
æ¥èŽ·å¾—用户数据。反过来,用户必
须把数据交给服务器才能获得服务。这和间谍软件的效果一æ 
·ï¼šæœåŠ¡å™¨æ“ä½œè€…获得了数据&mdash;不必花力气,因
为SaaSS就是这样的。Amy
 Webb,从来也没有要发表她女儿的ç…
§ç‰‡ï¼Œé”™è¯¯åœ°ä½¿ç”¨äº†SaaSS(Instagram)来编辑女儿的ç…
§ç‰‡ã€‚最后,<a
 
href="http://www.slate.com/articles/technology/data_mine_1/2013/09/privacy_facebook_kids_don_t_post_photos_of_your_kids_on_social_media.html";>ç
…§ç‰‡è¿˜æ˜¯ä»Žé‚£é‡Œæ³„露了出去</a>。
 </p>
@@ -56,11 +56,11 @@
 <p>理论上,同态加密<sup><a
 href="#TransNote1">1</a></sup>可能发展到有一天未来的SaaSS服务无
法理解用户发来的某些数据。这样的服务<em>可能</em>无
法窥探用户;这并不意味着他们<em>不再</em>窥探。</p>
 
-<p>某些专属软件带有全局后门,它允许远程安装
软件。例如,Windows就有一个å…
¨å±€åŽé—¨ï¼Œå¾®è½¯å¯ä»¥ç”¨å®ƒå¼ºåˆ¶æ”¹å˜ç”µè„‘上的任何软件。几
乎所有移动电话也都有后门。一些专属软件也有å…
¨å±€åŽé—¨ï¼›ä¾‹å¦‚,工作在GNU/Linux上的Steam客户端允许其开发者
远程安装更改后的版本。</p>
+<p>某些专有软件带有全局后门,它允许远程安装
软件。例如,Windows就有一个å…
¨å±€åŽé—¨ï¼Œå¾®è½¯å¯ä»¥ç”¨å®ƒå¼ºåˆ¶æ”¹å˜ç”µè„‘上的任何软件。几
乎所有移动电话也都有后门。一些专有软件也有å…
¨å±€åŽé—¨ï¼›ä¾‹å¦‚,工作在GNU/Linux上的Steam客户端允许其开发者
远程安装更改后的版本。</p>
 
-<p>使用SaaSS,服务器操作员能够改变服务器使用的软件。他应该能够这æ
 ·åšï¼Œå› ä¸ºè¿™æ˜¯ä»–的电脑;但是其结果和带有å…
¨å±€åŽé—¨çš„专属软件是一æ 
·çš„:有人有权不动声色地更改用户的计算。</p>
+<p>使用SaaSS,服务器操作员能够改变服务器使用的软件。他应该能够这æ
 ·åšï¼Œå› ä¸ºè¿™æ˜¯ä»–的电脑;但是其结果和带有å…
¨å±€åŽé—¨çš„专有软件是一æ 
·çš„:有人有权不动声色地更改用户的计算。</p>
 
-<p>所以,SaaSS和带有间谍软件及全局后门的专属软件是一æ 
·çš„。它给予服务器操作员凌驾于用户之上的权力,而这正是我们å¿
…须反抗的权力。</p>
+<p>所以,SaaSS和带有间谍软件及全局后门的专有软件是一æ 
·çš„。它给予服务器操作员凌驾于用户之上的权力,而这正是我们å¿
…须反抗的权力。</p>
 
 <h3>SaaSS和SaaS</h3>
 
@@ -68,14 +68,14 @@
 
 
<p>后来我们认识到SaaS这一术语有时也用于通讯服务&mdash;而此问题并不适用于这些服务。另外,&ldquo;软件即服务&rdquo;这一术语不能解释<em>为什么</em>这种实践是不好的。所以我们创é€
 äº†&ldquo;服务代替软件&rdquo;这一术语,它更清
楚地定义了这个不好的实践,并且说出为什么它是不好的。</p>
 
-<h3>区分SaaSS问题和专属软件问题</h3>
+<h3>区分SaaSS问题和专有软件问题</h3>
 
-<p>SaaSS和专属软件导致类似的有害结果,但是å…
¶æœºåˆ¶å„有不同。对专属软件,该机制是你
有软件拷贝,并使用该软件拷贝,但是修改该拷贝是困难/或è€
…是非法的。对SaaSS,该机制是软件进行你的计算,但是你
并没有该软件的拷贝。</p>
+<p>SaaSS和专有软件导致类似的有害结果,但是å…
¶æœºåˆ¶å„有不同。对专有软件,该机制是你
有软件拷贝,并使用该软件拷贝,但是修改该拷贝是困难/或è€
…是非法的。对SaaSS,该机制是软件进行你的计算,但是你
并没有该软件的拷贝。</p>
 
 <p>这两个问题常常令人困扰,这并不仅仅
是意外。网络开发者使用含糊不清
的术语&ldquo;网络应用&rdquo;把服务器软件和运行在本地电脑的浏览器里的程序搞在一起。有些网页会在ä½
 çš„浏览器里安装
非平凡的、甚至是大型的JavaScript软件,并且不告诉你。<a
 
href="/philosophy/javascript-trap.html">当这些JavaScript程序不是自由软件时</a>,它们就和å
…¶ä»–非自由软件一样导致不公正。然而,在这里,我们å…
³å¿ƒçš„是使用服务本身。</p>
 
-<p>许多自由软件支持者
认为SaaSS问题会由于开发服务器端的自由软件而解决。对服务器操作è€
…
来说,服务器端的程序最好是自由软件;如果它是专属软件,那么å
…¶å¼€å‘者/所有者
就有凌驾于服务器之上的权力。这对服务器操作者是不å…
¬æ­£çš„,而且对服务器的用户也毫无
帮助。但是如果服务器端的程序是自由软件,它也没有保护<em>服务器用户</em>不受SaaSS的影响。该程序使服务器操作è€
…自由,但是没有给服务器用户自由。</p>
+<p>许多自由软件支持者
认为SaaSS问题会由于开发服务器端的自由软件而解决。对服务器操作è€
…
来说,服务器端的程序最好是自由软件;如果它是专有软件,那么å
…¶å¼€å‘者/所有者
就有凌驾于服务器之上的权力。这对服务器操作者是不å…
¬æ­£çš„,而且对服务器的用户也毫无
帮助。但是如果服务器端的程序是自由软件,它也没有保护<em>服务器用户</em>不受SaaSS的影响。该程序使服务器操作è€
…自由,但是没有给服务器用户自由。</p>
 
 <p>把服务器软件的源代ç 
å‘布可以使社区受益:这使有相应技术的用户可以搭建类似的服务器,也可能修改软件。<a
 href="/licenses/license-recommendations.html">我们建议使用GNU Affero
@@ -85,10 +85,10 @@
 
 
<p>这个问题展示了&ldquo;开放&rdquo;和&ldquo;自由&rdquo;的深度不同。源代ç
 æ˜¯å¼€æº<a
 
href="/philosophy/free-open-overlap.html">意味着,差不多总是,自由软件</a>。但是,<a
-href="https://opendefinition.org/software-service";>&ldquo;开源软件&rdquo;服务</a>,意味着服务器软件是开源或是自由软件,却错失了SaaSS的问题。</p>
+href="https://opendefinition.org/ossd/";>&ldquo;开源软件&rdquo;服务</a>,意味着服务器软件是开源或是自由软件,却错失了SaaSS的问题。</p>
 
 <p>服务从根本上不同于程序,由它带来的道德问题从æ 
¹æœ¬ä¸Šä¹Ÿå’Œç¨‹åºçš„不同。为了避免混淆,我们<a
-href="/philosophy/network-services-arent-free-or-nonfree.html">避å…
æŠŠæœåŠ¡æè¿°ä¸º&ldquo;自由&rdquo;或&ldquo;专属。&rdquo;</a></p>
+href="/philosophy/network-services-arent-free-or-nonfree.html">避å…
æŠŠæœåŠ¡æè¿°ä¸º&ldquo;自由&rdquo;或&ldquo;专有。&rdquo;</a></p>
 
 <h3>区分SaaSS和其他网络服务</h3>
 
@@ -120,7 +120,7 @@
 Docs只是作为仓库来使用。把自己的数据展示给一个å…
¬å¸æ˜¯ä¸€ä»¶åäº‹ï¼Œä½†è¿™ä¹Ÿåªæ˜¯éšç§çš„问题,不是SaaSS;依赖某个服务来访问自己的数据也是一件坏事,但它也只是风险的问题,不是SaaSS。另一方面,使用服务来转换文档的æ
 ¼å¼<em>是</em>SaaSS,因为你
可以使用自己电脑里的合适程序(希望是,自由软件)来完成这件事。</p>
 
 <p>当然,通过自由软件使用Google
-Docs并不常见。最常见的是,人们通过非自由的JavaScript程序来使用它,这和使用å
…¶ä»–非自由软件一样糟糕。这个场景还会引å…
¥SaaSS;这取决于哪些操作是JavaScript程序做的,哪些是服务器做的。我们不知道,但是由于SaaSS和专属软件都对用户作恶,知不知道并不是å
…³é”®ã€‚</p>
+Docs并不常见。最常见的是,人们通过非自由的JavaScript程序来使用它,这和使用å
…¶ä»–非自由软件一样糟糕。这个场景还会引å…
¥SaaSS;这取决于哪些操作是JavaScript程序做的,哪些是服务器做的。我们不知道,但是由于SaaSS和专有软件都对用户作恶,知不知道并不是å
…³é”®ã€‚</p>
 
 
<p>通过他人的仓库进行发布不会有隐私的问题,但是通过Google
 Docs发布却有一个特别的问题:不运行非自由的JavaScript代ç 
ï¼Œä½ ç”šè‡³ä¸èƒ½åœ¨æµè§ˆå™¨é‡Œ<em>查看Google
@@ -143,7 +143,7 @@
 
<p>只有小部分网站实施SaaSS;大多数网站没有这个问题。但是我们如何应对有这个问题的网站呢?</p>
 
 <p>对简单的情况,你
用自己的数据进行自己的计算,解决方法也简单:使用一份ä½
 è‡ªå·±çš„自由软件拷贝。用一份诸如GNU
-Emacs或自由字处理程序的自由软件来进行自己的文本编辑。使用诸如GIMP的自由软件来编辑ç
…
§ç‰‡ã€‚如果没有可用的自由软件怎么办?专属软件或SaaSS会拿走ä½
 çš„自由,所以你不应该使用它们。你
可以贡献时间或资金来开发一款可以替代专属软件的自由软件。</p>
+Emacs或自由字处理程序的自由软件来进行自己的文本编辑。使用诸如GIMP的自由软件来编辑ç
…
§ç‰‡ã€‚如果没有可用的自由软件怎么办?专有软件或SaaSS会拿走ä½
 çš„自由,所以你不应该使用它们。你
可以贡献时间或资金来开发一款可以替代专有软件的自由软件。</p>
 
 <p>和其他人结成合作团队怎么样?现在在不用服务器的情
况下工作可能有困难,而团队可能并不知道如何运作自己的服务器。如果ä½
 è¦ä½¿ç”¨ä»–人的服务器,至少不要相信由å…
¬å¸è¿ä½œçš„服务器。一纸客户合同对你不是保护,除非你
能够侦测到违规并真正起诉,而公司制作的合同可能å…
è®¸å®½æ³›çš„滥用。政府可以从该公司强行调取你的以及å…
¶ä»–人的数据,正如奥巴马总统对电话å…
¬å¸æ‰€åšçš„;还要假设该å…
¬å¸ä¸è‡ªæ„¿äº¤å‡ºæ•°æ®ï¼Œä¸è¿‡ç¾Žå›½ç”µè¯å…
¬å¸æ˜¯éžæ³•ä¸ºå¸ƒä»€æ”¿åºœç›‘听其用户的。如果你必
须使用服务器,请使用除了商业关系之外还有å…
¶ä»–可信基础的服务器操作方。</p>
 
@@ -223,12 +223,12 @@
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
 <b>翻译团队</b>:<a rel="team"
-href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2017,2018。</div>
+href="https://savannah.gnu.org/projects/www-zh-cn/";>&lt;CTT&gt;</a>,2017-2019。</div>
 
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2018/12/15 14:46:30 $
+$Date: 2019/02/23 08:29:34 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/surveillance-vs-democracy.zh-cn.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.zh-cn.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- philosophy/po/surveillance-vs-democracy.zh-cn.po    23 Feb 2019 07:57:05 
-0000      1.35
+++ philosophy/po/surveillance-vs-democracy.zh-cn.po    23 Feb 2019 08:29:34 
-0000      1.36
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: surveillance-vs-democracy.html\n"
-"POT-Creation-Date: 2018-11-19 22:26+0000\n"
+"POT-Creation-Date: 2019-02-21 01:56+0000\n"
 "PO-Revision-Date: 2019-02-23 15:06+0800\n"
 "Last-Translator: Wensheng Xie <address@hidden>\n"
 "Language-Team: Chinese <address@hidden>\n"
@@ -681,10 +681,24 @@
 msgstr "针对旅行监控的解药"
 
 #. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "We must convert digital toll collection to anonymous payment (using "
+#| "digital cash, for instance).  License-plate recognition systems recognize "
+#| "all license plates, and the <a href=\"http://news.bbc.co.uk/2/hi/";
+#| "programmes/whos_watching_you/8064333.stm\">data can be kept indefinitely</"
+#| "a>; they should be required by law to notice and record only those "
+#| "license numbers that are on a list of cars sought by court orders.  A "
+#| "less secure alternative would record all cars locally but only for a few "
+#| "days, and not make the full data available over the Internet; access to "
+#| "the data should be limited to searching for a list of court-ordered "
+#| "license-numbers."
 msgid ""
 "We must convert digital toll collection to anonymous payment (using digital "
-"cash, for instance).  License-plate recognition systems recognize all "
-"license plates, and the <a href=\"http://news.bbc.co.uk/2/hi/programmes/";
+"cash, for instance).  License-plate recognition systems <a href=\"https://";
+"www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-"
+"law-enforcement-agencies-automated\"> recognize all cars' license plates</"
+"a>, and the <a href=\"http://news.bbc.co.uk/2/hi/programmes/";
 "whos_watching_you/8064333.stm\">data can be kept indefinitely</a>; they "
 "should be required by law to notice and record only those license numbers "
 "that are on a list of cars sought by court orders.  A less secure "
@@ -1020,7 +1034,9 @@
 "翻译须知</a>获取有关协调和提交翻译的相关事项。"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2015, 2016, 2017, 2018 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016, 2017, 2018 Richard Stallman"
+msgid "Copyright &copy; 2015, 2016, 2017, 2018, 2019 Richard Stallman"
 msgstr "Copyright &copy; 2015, 2016, 2017, 2018 Richard Stallman"
 
 #. type: Content of: <div><p>

Index: philosophy/po/who-does-that-server-really-serve.zh-cn.po
===================================================================
RCS file: 
/web/www/www/philosophy/po/who-does-that-server-really-serve.zh-cn.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- philosophy/po/who-does-that-server-really-serve.zh-cn.po    23 Feb 2019 
07:56:24 -0000      1.11
+++ philosophy/po/who-does-that-server-really-serve.zh-cn.po    23 Feb 2019 
08:29:34 -0000      1.12
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-06-05 15:56+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -96,11 +95,11 @@
 msgid ""
 "Our solution to this problem is developing <em>free software</em> and "
 "rejecting proprietary software.  Free software means that you, as a user, "
-"have four essential freedoms: (0)&nbsp;to run the program as you wish, "
-"(1)&nbsp;to study and change the source code so it does what you wish, "
-"(2)&nbsp;to redistribute exact copies, and (3)&nbsp;to redistribute copies "
-"of your modified versions.  (See the <a href=\"/philosophy/free-sw.html"
-"\">free software definition</a>.)"
+"have four essential freedoms: (0)&nbsp;to run the program as you wish, (1)"
+"&nbsp;to study and change the source code so it does what you wish, (2)&nbsp;"
+"to redistribute exact copies, and (3)&nbsp;to redistribute copies of your "
+"modified versions.  (See the <a href=\"/philosophy/free-sw.html\">free "
+"software definition</a>.)"
 msgstr ""
 
"我们对此的解决方案是开发<em>自由软件</em>并拒绝专有软件。自由软件意味着,ä½
 ï¼Œ"
 "作为一个用户,拥有四项基本自由:(0)&nbsp;按ç…
§è‡ªå·±çš„意愿运行该软件,(1)&nbsp;"

Index: thankgnus/thankgnus.zh-cn.html
===================================================================
RCS file: /web/www/www/thankgnus/thankgnus.zh-cn.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- thankgnus/thankgnus.zh-cn.html      4 Jan 2019 14:58:34 -0000       1.13
+++ thankgnus/thankgnus.zh-cn.html      23 Feb 2019 08:29:34 -0000      1.14
@@ -14,7 +14,7 @@
 
 <h3>年度捐赠者列表:</h3>
 <ul>
-<li><a href="/thankgnus/2018supporters.html">2019年捐赠者</a></li>
+<li><a href="/thankgnus/2019supporters.html">2019年捐赠者</a></li>
 <li><a href="/thankgnus/2018supporters.html">2018年捐赠者</a></li>
 <li><a href="/thankgnus/2017supporters.html">2017年捐赠者</a></li>
 <li><a href="/thankgnus/2016supporters.html">2016年捐赠者</a></li>
@@ -44,7 +44,7 @@
 
<p>感谢所有从自由软件基金会购买CD-ROM、手册、参考卡片和T-恤的人。感谢所有购买豪华发行版的人。</p>
 <p>感谢所有列于<a href=
 "/people/people.html">GNU人物</a>的志愿者,以及无数未列入å…
¶ä¸­ä½†å¸®åŠ©è¿‡è‡ªç”±è½¯ä»¶åŸºé‡‘会筹备和举办活动的人。</p>
-<p>感谢所有将版权指定给自由软件基金会或在GNU 
GPL下发布他们的源代ç 
çš„人。感谢所有贡献了文档、提交了优秀的bug报告或å…
¶å®ƒæ‰¹è¯„的人。</p>
+<p>感谢所有将版权指定给自由软件基金会或在GNU 
GPL下发布他们的源代ç 
çš„人。感谢所有贡献了文档、提交了优秀的bug报告或å…
¶ä»–批评的人。</p>
 
 <div class="translators-notes">
 
@@ -115,7 +115,7 @@
 <p class="unprintable"><!-- timestamp start -->
 最后更新:
 
-$Date: 2019/01/04 14:58:34 $
+$Date: 2019/02/23 08:29:34 $
 
 <!-- timestamp end -->
 </p>

Index: thankgnus/po/thankgnus.zh-cn.po
===================================================================
RCS file: /web/www/www/thankgnus/po/thankgnus.zh-cn.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- thankgnus/po/thankgnus.zh-cn.po     23 Feb 2019 07:57:51 -0000      1.20
+++ thankgnus/po/thankgnus.zh-cn.po     23 Feb 2019 08:29:34 -0000      1.21
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-01-04 10:56+0000\n"
 "X-Generator: Poedit 1.8.7.1\n"
 
 #. type: Content of: <title>

Index: philosophy/po/surveillance-vs-democracy.zh-cn-diff.html
===================================================================
RCS file: philosophy/po/surveillance-vs-democracy.zh-cn-diff.html
diff -N philosophy/po/surveillance-vs-democracy.zh-cn-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/surveillance-vs-democracy.zh-cn-diff.html     23 Feb 2019 
08:29:34 -0000      1.1
@@ -0,0 +1,632 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/surveillance-vs-democracy.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: 1.86 --&gt;
+&lt;title&gt;How Much Surveillance Can Democracy Withstand?
+- GNU Project - Free Software Foundation&lt;/title&gt;
+&lt;style type="text/css" media="print,screen"&gt;&lt;!--
+#intro { margin: 2em auto 1.5em; }
+.pict.wide { width: 23em; }
+.pict p { margin-top: .2em; }
address@hidden (min-width: 55em) {
+   #intro { max-width: 55em; }
+   .pict.wide { margin-bottom: 0; }
+}
+--&gt;&lt;/style&gt;
+&lt;!-- GNUN: localize URL /graphics/dog.small.jpg --&gt;
+&lt;!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" 
--&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+&lt;h2 class="center"&gt;How Much Surveillance Can Democracy 
Withstand?&lt;/h2&gt;
+
+&lt;p class="byline center"&gt;by &lt;a 
href="http://www.stallman.org/"&gt;Richard Stallman&lt;/a&gt;&lt;/p&gt;
+
+&lt;!-- rms: I deleted the link because of Wired's announced
+     anti-ad-block system --&gt;
+&lt;blockquote class="center"&gt;&lt;p&gt;A version of this article was first 
published in
+&lt;cite&gt;Wired&lt;/cite&gt; in October&nbsp;2013.&lt;br /&gt;
+Also consider reading &ldquo;&lt;a
+href="https://www.theguardian.com/commentisfree/2018/apr/03/facebook-abusing-data-law-privacy-big-tech-surveillance"&gt;A
+radical proposal to keep your personal data safe&lt;/a&gt;,&rdquo; published in
+&lt;cite&gt;The Guardian&lt;/cite&gt; in 
April&nbsp;2018.&lt;/p&gt;&lt;/blockquote&gt;
+
+&lt;div class="article"&gt;
+
+&lt;div id="intro"&gt;
+&lt;div class="pict wide"&gt;
+&lt;a href="/graphics/dog.html"&gt;
+&lt;img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /&gt;&lt;/a&gt;
+&lt;p&gt;&ldquo;How did they find out I'm a dog?&rdquo;&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;p&gt;Thanks to Edward Snowden's disclosures, we know that the current
+level of general surveillance in society is incompatible with human
+rights.  The repeated harassment and prosecution of dissidents,
+sources, and journalists in the US and elsewhere provides
+confirmation.  We need to reduce the level of general surveillance,
+but how far?  Where exactly is the
+&lt;em&gt;maximum tolerable level of surveillance&lt;/em&gt;, which we must 
ensure
+is not exceeded?  It is the level beyond which surveillance starts to
+interfere with the functioning of democracy, in that whistleblowers
+(such as Snowden) are likely to be caught.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="columns" style="clear:both"&gt;
+&lt;p&gt;Faced with government secrecy, we the people depend on
+whistleblowers
+to &lt;a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"&gt;tell
+us what the state is doing&lt;/a&gt;.  However, today's surveillance
+intimidates potential whistleblowers, which means it is too much.  To
+recover our democratic control over the state, we must reduce
+surveillance to the point where whistleblowers know they are safe.&lt;/p&gt;
+
+&lt;p&gt;Using free/libre
+software, &lt;a href="/philosophy/free-software-even-more-important.html"&gt;as
+I've advocated for 30 years&lt;/a&gt;, is the first step in taking control
+of our digital lives, and that includes preventing surveillance.  We
+can't trust nonfree software; the NSA
+&lt;a 
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm"&gt;uses&lt;/a&gt;
+and
+even &lt;a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"&gt;creates&lt;/a&gt;
+security weaknesses in nonfree software to invade our own computers
+and routers.  Free software gives us control of our own computers,
+but &lt;a href="http://www.wired.com/opinion/2013/10/149481/"&gt;that won't
+protect our privacy once we set foot on the Internet&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill"&gt;Bipartisan
+legislation to &ldquo;curtail the domestic surveillance
+powers&rdquo;&lt;/a&gt; in the U.S. is being drawn up, but it relies on
+limiting the government's use of our virtual dossiers.  That won't
+suffice to protect whistleblowers if &ldquo;catching the
+whistleblower&rdquo; is grounds for access sufficient to identify him
+or her.  We need to go further.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 class="subheader" style="clear: both"&gt;The Upper Limit on 
Surveillance in a Democracy&lt;/h3&gt;
+
+&lt;div class="columns"&gt;
+&lt;p&gt;If whistleblowers don't dare reveal crimes and lies, we lose the
+last shred of effective control over our government and institutions.
+That's why surveillance that enables the state to find out who has
+talked with a reporter is too much surveillance&mdash;too much for
+democracy to endure.&lt;/p&gt;
+
+&lt;p&gt;An unnamed U.S. government official ominously told journalists in
+2011 that
+the &lt;a 
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river"&gt;U.S.
 would
+not subpoena reporters because &ldquo;We know who you're talking
+to.&rdquo;&lt;/a&gt;
+Sometimes &lt;a 
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press"&gt;journalists'
+phone call records are subpoenaed&lt;/a&gt; to find this out, but Snowden
+has shown us that in effect they subpoena all the phone call records
+of everyone in the U.S., all the
+time, &lt;a 
href="https://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order"&gt;from
+Verizon&lt;/a&gt;
+and &lt;a 
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07"&gt;from
+other companies too&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Opposition and dissident activities need to keep secrets from
+states that are willing to play dirty tricks on them.  The ACLU has
+demonstrated the U.S. government's &lt;a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"&gt;systematic
+practice of infiltrating peaceful dissident groups&lt;/a&gt; on the pretext
+that there might be terrorists among them.  The point at which
+surveillance is too much is the point at which the state can find who
+spoke to a known journalist or a known dissident.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Information, Once Collected, Will Be 
Misused&lt;/h3&gt;
+
+&lt;div  class="columns"&gt;
+&lt;p id="willbemisused"&gt;When people recognize
+that the level of general surveillance is too
+high, the first response is to propose limits on access to the
+accumulated data.  That sounds nice, but it won't fix the problem, not
+even slightly, even supposing that the government obeys the rules.
+(The NSA has misled the FISA court, which said it
+was &lt;a 
href="http://www.wired.com/threatlevel/2013/09/nsa-violations/"&gt;unable
+to effectively hold the NSA accountable&lt;/a&gt;.) Suspicion of a crime
+will be grounds for access, so once a whistleblower is accused of
+&ldquo;espionage,&rdquo; finding the &ldquo;spy&rdquo; will provide an
+excuse to access the accumulated material.&lt;/p&gt;
+
+&lt;p&gt;In practice, we can't expect state agencies even to make up excuses
+to satisfy the rules for using surveillance data&mdash;because US
+agencies
+already &lt;a 
href="https://theintercept.com/2018/01/09/dark-side-fbi-dea-illegal-searches-secret-evidence/"&gt;
+lie to cover up breaking the rules&lt;/a&gt;.  These rules are not seriously
+meant to be obeyed; rather, they are a fairy-tale we can believe if we
+like.&lt;/p&gt;
+
+&lt;p&gt;In addition, the state's surveillance staff will misuse the data
+for personal reasons.  Some NSA
+agents &lt;a 
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems"&gt;used
+U.S. surveillance systems to track their lovers&lt;/a&gt;&mdash;past,
+present, or wished-for&mdash;in a practice called
+&ldquo;LOVEINT.&rdquo; The NSA says it has caught and punished this a
+few times; we don't know how many other times it wasn't caught.  But
+these events shouldn't surprise us, because police have
+long &lt;a 
href="https://web.archive.org/web/20160401102120/http://www.sweetliberty.org/issues/privacy/lein1.htm#.V_mKlYbb69I"&gt;used
+their access to driver's license records to track down someone
+attractive&lt;/a&gt;, a practice known as &ldquo;running a plate for a
+date.&rdquo; This practice has expanded
+with &lt;a 
href="https://theyarewatching.org/issues/risks-increase-once-data-shared"&gt;new
+digital systems&lt;/a&gt;.  In 2016, a prosecutor was accused of forging
+judges' signatures to get authorization
+to &lt;a 
href="http://gizmodo.com/government-officials-cant-stop-spying-on-their-crushes-1789490933"&gt;
+wiretap someone who was the object of a romantic obsession&lt;/a&gt;. The AP
+knows
+of &lt;a href="https://apnews.com/699236946e3140659fff8a2362e16f43"&gt;many
+other instances in the US&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;Surveillance data will always be used for other purposes, even if
+this is prohibited.  Once the data has been accumulated and the state
+has the possibility of access to it, it can misuse that data in
+dreadful ways, as shown by examples
+from &lt;a 
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/"&gt;Europe&lt;/a&gt;,
+&lt;a href="https://en.wikipedia.org/wiki/Japanese_American_internment"&gt;the
+US&lt;/a&gt;, and most
+recently &lt;a 
href="http://www.cbc.ca/news/world/terrifying-how-a-single-line-of-computer-code-put-thousands-of-innocent-turks-in-jail-1.4495021"&gt;Turkey&lt;/a&gt;.
+(Turkey's confusion about who had really used the Bylock program only
+exacerbated the basic deliberate injustice of arbitrarily punishing
+people for having used it.)
+&lt;/p&gt;
+
+&lt;p&gt;Personal data collected by the state is also likely to be obtained
+by outside crackers that break the security of the servers, even
+by &lt;a 
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml"&gt;crackers
+working for hostile states&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Governments can easily use massive surveillance capability
+to &lt;a 
href="http://www.nytimes.com/2015/06/22/world/europe/macedonia-government-is-blamed-for-wiretapping-scandal.html"&gt;subvert
+democracy directly&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Total surveillance accessible to the state enables the state to
+launch a massive fishing expedition against any person.  To make
+journalism and democracy safe, we must limit the accumulation of data
+that is easily accessible to the state.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Robust Protection for Privacy Must Be 
Technical&lt;/h3&gt;
+
+&lt;div class="columns"&gt;
+&lt;p&gt;The Electronic Frontier Foundation and other organizations propose
+a set of legal principles designed to &lt;a
+href="https://en.necessaryandproportionate.org/text"&gt;prevent the
+abuses of massive surveillance&lt;/a&gt;.  These principles include,
+crucially, explicit legal protection for whistleblowers; as a
+consequence, they would be adequate for protecting democratic
+freedoms&mdash;if adopted completely and enforced without exception
+forever.&lt;/p&gt;
+
+&lt;p&gt;However, such legal protections are precarious: as recent history
+shows, they can be repealed (as in the FISA Amendments Act),
+suspended, or &lt;a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html"&gt;ignored&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Meanwhile, demagogues will cite the usual excuses as grounds for
+total surveillance; any terrorist attack, even one that kills just a
+handful of people, can be hyped to provide an opportunity.&lt;/p&gt;
+
+&lt;p&gt;If limits on access to the data are set aside, it will be as if
+they had never existed: years worth of dossiers would suddenly become
+available for misuse by the state and its agents and, if collected by
+companies, for their private misuse as well.  If, however, we stop the
+collection of dossiers on everyone, those dossiers won't exist, and
+there will be no way to compile them retroactively.  A new illiberal
+regime would have to implement surveillance afresh, and it would only
+collect data starting at that date.  As for suspending or momentarily
+ignoring this law, the idea would hardly make sense.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;First, Don't Be Foolish&lt;/h3&gt;
+
+&lt;div class="columns"&gt;
+&lt;p&gt;To have privacy, you must not throw it away: the first one who has
+to protect your privacy is you.  Avoid identifying yourself to web
+sites, contact them with Tor, and use browsers that block the schemes
+they use to track visitors.  Use the GNU Privacy Guard to encrypt the
+contents of your email.  Pay for things with cash.&lt;/p&gt;
+
+&lt;p&gt;Keep your own data; don't store your data in a company's
+&ldquo;convenient&rdquo; server.  It's safe, however, to entrust a
+data backup to a commercial service, provided you put the files in an
+archive and encrypt the whole archive, including the names of the
+files, with free software on your own computer before uploading
+it.&lt;/p&gt;
+
+&lt;p&gt;For privacy's sake, you must avoid nonfree software; if you give
+control of your computer's operations to companies, they
+are &lt;a href="/malware/proprietary-surveillance.html"&gt;likely to make it
+spy on you&lt;/a&gt;.
+Avoid &lt;a 
href="/philosophy/who-does-that-server-really-serve.html"&gt;service
+as a software substitute&lt;/a&gt;; in addition to giving others control of
+how your computing is done, it requires you to hand over all the
+pertinent data to the company's server.&lt;/p&gt;
+
+&lt;p&gt;Protect your friends' and acquaintances' privacy,
+too.  &lt;a 
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/"&gt;Don't
+give out their personal information&lt;/a&gt; except how to contact them,
+and never give any web site your list of email or phone contacts.
+Don't tell a company such as Facebook anything about your friends that
+they might not wish to publish in a newspaper.  Better yet, don't be
+used by Facebook at all.  Reject communication systems that require
+users to give their real names, even if you are happy to divulge yours,
+since they pressure other people to surrender their privacy.&lt;/p&gt;
+
+&lt;p&gt;Self-protection is essential, but even the most rigorous
+self-protection is insufficient to protect your privacy on or from
+systems that don't belong to you.  When we communicate with others or
+move around the city, our privacy depends on the practices of society.
+We can avoid some of the systems that surveil our communications and
+movements, but not all of them.  Clearly, the better solution is to
+make all these systems stop surveilling people other than legitimate
+suspects.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;We Must Design Every System for Privacy&lt;/h3&gt;
+
+&lt;div class="columns"&gt;
+&lt;p&gt;If we don't want a total surveillance society, we must consider
+surveillance a kind of social pollution, and limit the surveillance
+impact of each new digital system just as we limit the environmental
+impact of physical construction.&lt;/p&gt;
+
+&lt;p&gt;For example: &ldquo;smart&rdquo; meters for electricity are touted
+for sending the power company moment-by-moment data about each
+customer's electric usage, including how usage compares with users in
+general.  This is implemented based on general surveillance, but does
+not require any surveillance.  It would be easy for the power company
+to calculate the average usage in a residential neighborhood by
+dividing the total usage by the number of subscribers, and send that
+to the meters.  Each customer's meter could compare her usage, over
+any desired period of time, with the average usage pattern for that
+period.  The same benefit, with no surveillance!&lt;/p&gt;
+
+&lt;p&gt;We need to design such privacy into all our digital systems.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Remedy for Collecting Data: Leaving It 
Dispersed&lt;/h3&gt;
+
+&lt;div class="columns"&gt;
+&lt;p&gt;One way to make monitoring safe for privacy is
+to &lt;a name="dispersal"&gt;keep the data dispersed and inconvenient to
+access&lt;/a&gt;.  Old-fashioned security cameras were no threat to 
privacy(&lt;a href="#privatespace"&gt;*&lt;/a&gt;).
+The recording was stored on the premises, and kept for a few weeks at
+most.  Because of the inconvenience of accessing these recordings, it
+was never done massively; they were accessed only in the places where
+someone reported a crime.  It would not be feasible to physically
+collect millions of tapes every day and watch them or copy them.&lt;/p&gt;
+
+&lt;p&gt;Nowadays, security cameras have become surveillance cameras: they
+are connected to the Internet so recordings can be collected in a data
+center and saved forever.  In Detroit, the cops pressure businesses to
+give them &lt;a
+href="https://eu.detroitnews.com/story/news/local/detroit-city/2018/01/23/detroit-green-light/109524794/"&gt;unlimited
+access to their surveillance cameras&lt;/a&gt; so that they can look through
+them at any and all times.  This is already dangerous, but it is going
+to get worse.  Advances in face recognition may bring the day when
+suspected journalists can be tracked on the street all the time to see
+who they talk with.&lt;/p&gt;
+
+&lt;p&gt;Internet-connected cameras often have lousy digital security
+themselves, which means &lt;a
+href="https://www.csoonline.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html"&gt;anyone
+can watch what those cameras see&lt;/a&gt;.  This makes internet-connected
+cameras a major threat to security as well as privacy.  For privacy's
+sake, we should ban the use of Internet-connected cameras aimed where
+and when the public is admitted, except when carried by people.
+Everyone must be free to post photos and video recordings
+occasionally, but the systematic accumulation of such data on the
+Internet must be limited.&lt;/p&gt;
+
+&lt;p&gt;&lt;a name="privatespace"&gt;&lt;b&gt;*&lt;/b&gt;&lt;/a&gt;I assume 
here that the security
+camera points at the inside of a store, or at the street.  Any camera
+pointed at someone's private space by someone else violates privacy,
+but that is another issue.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 id="digitalcash" class="subheader"&gt;Remedy for Internet Commerce 
Surveillance&lt;/h3&gt;
+
+&lt;div class="columns"&gt;
+&lt;p&gt;Most data collection comes from people's own digital activities.
+Usually the data is collected first by companies.  But when it comes
+to the threat to privacy and democracy, it makes no difference whether
+surveillance is done directly by the state or farmed out to a
+business, because the data that the companies collect is
+systematically available to the state.&lt;/p&gt;
+
+&lt;p&gt;The NSA, through PRISM,
+has &lt;a href="https://www.commondreams.org/headline/2013/08/23-2"&gt;gotten
+into the databases of many large Internet corporations&lt;/a&gt;.  AT&amp;T
+has saved all its phone call records since 1987
+and &lt;a 
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0"&gt;makes
+them available to the DEA&lt;/a&gt; to search on request.  Strictly
+speaking, the U.S.  government does not possess that data, but in
+practical terms it may as well possess it.  Some companies are praised
+for &lt;a 
href="https://www.eff.org/who-has-your-back-government-data-requests-2015"&gt;resisting
+government data requests to the limited extent they can&lt;/a&gt;, but that
+can only partly compensate for the harm they do to by collecting that
+data in the first place.  In addition, many of those companies misuse
+the data directly or provide it to data brokers.&lt;/p&gt;
+
+&lt;p&gt;The goal of making journalism and democracy safe therefore requires
+that we reduce the data collected about people by any organization,
+not just by the state.  We must redesign digital systems so that they
+do not accumulate data about their users.  If they need digital data
+about our transactions, they should not be allowed to keep them more
+than a short time beyond what is inherently necessary for their
+dealings with us.&lt;/p&gt;
+
+&lt;p&gt;One of the motives for the current level of surveillance of the
+Internet is that sites are financed through advertising based on
+tracking users' activities and propensities.  This converts a mere
+annoyance&mdash;advertising that we can learn to ignore&mdash;into a
+surveillance system that harms us whether we know it or not.
+Purchases over the Internet also track their users.  And we are all
+aware that &ldquo;privacy policies&rdquo; are more excuses to violate
+privacy than commitments to uphold it.&lt;/p&gt;
+
+&lt;p&gt;We could correct both problems by adopting a system of anonymous
+payments&mdash;anonymous for the payer, that is.  (We don't want to
+help the payee dodge
+taxes.)  &lt;a 
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"&gt;Bitcoin
+is not anonymous&lt;/a&gt;, though there are efforts to develop ways to pay
+anonymously with Bitcoin.  However, technology
+for &lt;a 
href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"&gt;digital
+cash was first developed in the 1980s&lt;/a&gt;; the GNU software for doing
+this is called &lt;a href="http://taler.net/"&gt;GNU Taler&lt;/a&gt;.  Now we 
need
+only suitable business arrangements, and for the state not to obstruct
+them.&lt;/p&gt;
+
+&lt;p&gt;Another possible method for anonymous payments would
+use &lt;a 
href="https://stallman.org/articles/anonymous-payments-thru-phones.html"&gt;prepaid
+phone cards&lt;/a&gt;.  It is less convenient, but very easy to
+implement.&lt;/p&gt;
+
+&lt;p&gt;A further threat from sites' collection of personal data is that
+security breakers might get in, take it, and misuse it.  This includes
+customers' credit card details.  An anonymous payment system would end
+this danger: a security hole in the site can't hurt you if the site
+knows nothing about you.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Remedy for Travel Surveillance&lt;/h3&gt;
+
+&lt;div class="columns"&gt;
+&lt;p&gt;We must convert digital toll collection to anonymous payment (using
+digital cash, for instance).  License-plate recognition systems
+<span class="inserted"><ins><em>&lt;a 
href="https://www.eff.org/deeplinks/2018/11/eff-and-muckrock-release-records-and-data-200-law-enforcement-agencies-automated"&gt;</em></ins></span>
+recognize all <span class="inserted"><ins><em>cars'</em></ins></span> license 
<span class="removed"><del><strong>plates,</strong></del></span> <span 
class="inserted"><ins><em>plates&lt;/a&gt;,</em></ins></span> and
+the &lt;a 
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm"&gt;data
+can be kept indefinitely&lt;/a&gt;; they should be required by law to notice
+and record only those license numbers that are on a list of cars
+sought by court orders.  A less secure alternative would record all
+cars locally but only for a few days, and not make the full data
+available over the Internet; access to the data should be limited to
+searching for a list of court-ordered license-numbers.&lt;/p&gt;
+
+&lt;p&gt;The U.S. &ldquo;no-fly&rdquo; list must be abolished because it is
+&lt;a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes"&gt;punishment
+without trial&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;It is acceptable to have a list of people whose person and luggage
+will be searched with extra care, and anonymous passengers on domestic
+flights could be treated as if they were on this list.  It is also
+acceptable to bar non-citizens, if they are not permitted to enter the
+country at all, from boarding flights to the country.  This ought to
+be enough for all legitimate purposes.&lt;/p&gt;
+
+&lt;p&gt;Many mass transit systems use some kind of smart cards or RFIDs for
+payment.  These systems accumulate personal data: if you once make the
+mistake of paying with anything but cash, they associate the card
+permanently with your name.  Furthermore, they record all travel
+associated with each card.  Together they amount to massive
+surveillance.  This data collection must be reduced.&lt;/p&gt;
+
+&lt;p&gt;Navigation services do surveillance: the user's computer tells the
+map service the user's location and where the user wants to go; then
+the server determines the route and sends it back to the user's
+computer, which displays it.  Nowadays, the server probably records
+the user's locations, since there is nothing to prevent it.  This
+surveillance is not inherently necessary, and redesign could avoid it:
+free/libre software in the user's computer could download map data for
+the pertinent regions (if not downloaded previously), compute the
+route, and display it, without ever telling anyone where the user is
+or wants to go.&lt;/p&gt;
+
+&lt;p&gt;Systems for borrowing bicycles, etc., can be designed so that the
+borrower's identity is known only inside the station where the item
+was borrowed.  Borrowing would inform all stations that the item is
+&ldquo;out,&rdquo; so when the user returns it at any station (in
+general, a different one), that station will know where and when that
+item was borrowed.  It will inform the other station that the item is
+no longer &ldquo;out.&rdquo; It will also calculate the user's bill,
+and send it (after waiting some random number of minutes) to
+headquarters along a ring of stations, so that headquarters would not
+find out which station the bill came from.  Once this is done, the
+return station would forget all about the transaction.  If an item
+remains &ldquo;out&rdquo; for too long, the station where it was
+borrowed can inform headquarters; in that case, it could send the
+borrower's identity immediately.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;Remedy for Communications Dossiers&lt;/h3&gt;
+
+&lt;div class="columns"&gt;
+&lt;p&gt;Internet service providers and telephone companies keep extensive
+data on their users' contacts (browsing, phone calls, etc).  With
+mobile phones, they
+also &lt;a 
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz"&gt;record
+the user's physical location&lt;/a&gt;.  They keep these dossiers for a long
+time: over 30 years, in the case of AT&amp;T.  Soon they will
+even &lt;a 
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"&gt;record
+the user's body activities&lt;/a&gt;.  It appears that
+the &lt;a 
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location"&gt;NSA
+collects cell phone location data&lt;/a&gt; in bulk.&lt;/p&gt;
+
+&lt;p&gt;Unmonitored communication is impossible where systems create such
+dossiers.  So it should be illegal to create or keep them.  ISPs and
+phone companies must not be allowed to keep this information for very
+long, in the absence of a court order to surveil a certain party.&lt;/p&gt;
+
+&lt;p&gt;This solution is not entirely satisfactory, because it won't
+physically stop the government from collecting all the information
+immediately as it is generated&mdash;which is what
+the &lt;a 
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order"&gt;U.S.
 does
+with some or all phone companies&lt;/a&gt;.  We would have to rely on
+prohibiting that by law.  However, that would be better than the
+current situation, where the relevant law (the PAT RIOT Act) does not
+clearly prohibit the practice.  In addition, if the government did
+resume this sort of surveillance, it would not get data about
+everyone's phone calls made prior to that time.&lt;/p&gt;
+
+&lt;p&gt;For privacy about who you exchange email with, a simple partial
+solution is for you and others to use email services in a country that
+would never cooperate with your own government, and which communicate
+with each other using encryption.  However, Ladar Levison (owner of
+the mail service Lavabit that US surveillance sought to corrupt
+completely) has a more sophisticated idea for an encryption system
+through which your email service would know only that you sent mail to
+some user of my email service, and my email service would know only
+that I received mail from some user of your email service, but it
+would be hard to determine that you had sent mail to me.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;h3 class="subheader"&gt;But Some Surveillance Is Necessary&lt;/h3&gt;
+
+&lt;div class="columns"&gt;
+&lt;p&gt;For the state to find criminals, it needs to be able to investigate
+specific crimes, or specific suspected planned crimes, under a court
+order.  With the Internet, the power to tap phone conversations would
+naturally extend to the power to tap Internet connections.  This power
+is easy to abuse for political reasons, but it is also necessary.
+Fortunately, this won't make it possible to find whistleblowers after
+the fact, if (as I recommend) we prevent digital systems from accumulating
+massive dossiers before the fact.&lt;/p&gt;
+
+&lt;p&gt;Individuals with special state-granted power, such as police,
+forfeit their right to privacy and must be monitored.  (In fact,
+police have their own jargon term for perjury,
+&ldquo;&lt;a 
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&amp;oldid=552608302"&gt;testilying&lt;/a&gt;,&rdquo;
+since they do it so frequently, particularly about protesters
+and &lt;a 
href="https://www.themaven.net/pinacnews/"&gt;photographers&lt;/a&gt;.)
+One city in California that required police to wear video cameras all
+the time
+found &lt;a 
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition"&gt;their
+use of force fell by 60%&lt;/a&gt;.  The ACLU is in favor of this.&lt;/p&gt;
+
+&lt;p&gt;&lt;a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"&gt;Corporations
+are not people, and not entitled to human rights&lt;/a&gt;.  It is
+legitimate to require businesses to publish the details of processes
+that might cause chemical, biological, nuclear, fiscal, computational
+(e.g., &lt;a href="http://DefectiveByDesign.org"&gt;DRM&lt;/a&gt;) or political
+(e.g., lobbying) hazards to society, to whatever level is needed for
+public well-being.  The danger of these operations (consider the BP
+oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
+that of terrorism.&lt;/p&gt;
+
+&lt;p&gt;However, journalism must be protected from surveillance even when
+it is carried out as part of a business.&lt;/p&gt;
+&lt;/div&gt;
+&lt;div class="column-limit"&gt;&lt;/div&gt;
+
+&lt;div class="reduced-width"&gt;
+&lt;p&gt;Digital technology has brought about a tremendous increase in the
+level of surveillance of our movements, actions, and communications.
+It is far more than we experienced in the 1990s, and &lt;a
+href="https://hbr.org/2013/06/your-iphone-works-for-the-secret-police"&gt;far
+more than people behind the Iron Curtain experienced&lt;/a&gt; in the 1980s,
+and proposed legal limits on state use of the accumulated data would
+not alter that.&lt;/p&gt;
+
+&lt;p&gt;Companies are designing even more intrusive surveillance.  Some
+project that pervasive surveillance, hooked to companies such as
+Facebook, could have deep effects on &lt;a
+href="https://www.theguardian.com/technology/2015/aug/10/internet-of-things-predictable-people"&gt;how
+people think&lt;/a&gt;.  Such possibilities are imponderable; but the threat
+to democracy is not speculation.  It exists and is visible today.&lt;/p&gt;
+
+&lt;p&gt;Unless we believe that our free countries previously suffered from
+a grave surveillance deficit, and ought to be surveilled more than the
+Soviet Union and East Germany were, we must reverse this increase.
+That requires stopping the accumulation of big data about people.&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015, 2016, 2017, <span 
class="removed"><del><strong>2018</strong></del></span> <span 
class="inserted"><ins><em>2018, 2019</em></ins></span> Richard 
Stallman&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2019/02/23 08:29:34 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;&lt;!-- for class="inner", starts in the banner include --&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]