[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Mon, 4 Mar 2019 04:00:13 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/03/04 04:00:11
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-amazon.de-diff.html
malware-amazon.de.po malware-amazon.es.po
malware-amazon.fr.po
malware-amazon.it-diff.html
malware-amazon.it.po
malware-amazon.ja-diff.html
malware-amazon.ja.po malware-amazon.pot
malware-amazon.ru.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.pot?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.40&r2=1.41
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- de.po 4 Mar 2019 08:00:36 -0000 1.40
+++ de.po 4 Mar 2019 09:00:09 -0000 1.41
@@ -550,6 +550,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -2138,27 +2175,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- es.po 4 Mar 2019 08:00:36 -0000 1.50
+++ es.po 4 Mar 2019 09:00:09 -0000 1.51
@@ -443,6 +443,52 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www."
+"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+"\">envÃan la señal de vÃdeo que capturan a los servidores de Amazon</a>,
que "
+"la guardan de forma permanente."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1690,36 +1736,6 @@
msgstr ""
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
-#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
-#| "the video they capture to Amazon servers</a> which save it permanently."
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www."
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
-"\">envÃan la señal de vÃdeo que capturan a los servidores de Amazon</a>,
que "
-"la guardan de forma permanente."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- fr.po 4 Mar 2019 08:00:36 -0000 1.69
+++ fr.po 4 Mar 2019 09:00:09 -0000 1.70
@@ -453,6 +453,53 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
+"leurs enregistrements vidéo aux serveurs d'Amazon</a>, qui les sauvegardent "
+"sur le long terme."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Très souvent, la vidéo montre tous les gens qui s'approchent de la porte "
+"d'entrée, ou même de simples passants."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+"L'article s'intéresse surtout à la manière dont Ring laissait certains "
+"employés regarder librement les vidéos. Il semble qu'Amazon ait essayé "
+"d'empêcher cet abus secondaire. Quant à l'abus primaire (le fait qu'elle "
+"obtienne les vidéos), Amazon compte bien que la société s'y soumettra."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1698,37 +1745,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
-"leurs enregistrements vidéo aux serveurs d'Amazon</a>, qui les sauvegardent "
-"sur le long terme."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-"Très souvent, la vidéo montre tous les gens qui s'approchent de la porte "
-"d'entrée, ou même de simples passants."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-"L'article s'intéresse surtout à la manière dont Ring laissait certains "
-"employés regarder librement les vidéos. Il semble qu'Amazon ait essayé "
-"d'empêcher cet abus secondaire. Quant à l'abus primaire (le fait qu'elle "
-"obtienne les vidéos), Amazon compte bien que la société s'y soumettra."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- it.po 4 Mar 2019 08:00:36 -0000 1.40
+++ it.po 4 Mar 2019 09:00:09 -0000 1.41
@@ -521,6 +521,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -2082,27 +2119,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- ja.po 4 Mar 2019 08:00:36 -0000 1.40
+++ ja.po 4 Mar 2019 09:00:09 -0000 1.41
@@ -466,6 +466,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1760,27 +1797,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-amazon.de-diff.html 4 Feb 2019 07:31:22 -0000 1.18
+++ malware-amazon.de-diff.html 4 Mar 2019 09:00:09 -0000 1.19
@@ -228,6 +228,34 @@
<h3 id="misc"> Malware in other products</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender to.</p>
+ </li>
+
<li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -301,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/04 09:00:09 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- malware-amazon.de.po 14 Jan 2019 07:59:32 -0000 1.22
+++ malware-amazon.de.po 4 Mar 2019 09:00:09 -0000 1.23
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2017-09-26 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -309,6 +309,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
Index: malware-amazon.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-amazon.es.po 12 Feb 2019 10:59:31 -0000 1.27
+++ malware-amazon.es.po 4 Mar 2019 09:00:09 -0000 1.28
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2019-02-12 11:22+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -250,6 +251,56 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | Amazon Ring “security” devices <a
+# |
href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">
+# | send the video they capture to Amazon servers</a>{+,+} which save it
+# | [-permanently.-] {+long-term.+}
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www."
+"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+"\">envÃan la señal de vÃdeo que capturan a los servidores de Amazon</a>,
que "
+"la guardan de forma permanente."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
Index: malware-amazon.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- malware-amazon.fr.po 14 Jan 2019 09:33:11 -0000 1.32
+++ malware-amazon.fr.po 4 Mar 2019 09:00:10 -0000 1.33
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2019-01-13 10:54+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -245,6 +246,53 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
+"leurs enregistrements vidéo aux serveurs d'Amazon</a>, qui les sauvegardent "
+"sur le long terme."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Très souvent, la vidéo montre tous les gens qui s'approchent de la porte "
+"d'entrée, ou même de simples passants."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+"L'article s'intéresse surtout à la manière dont Ring laissait certains "
+"employés regarder librement les vidéos. Il semble qu'Amazon ait essayé "
+"d'empêcher cet abus secondaire. Quant à l'abus primaire (le fait qu'elle "
+"obtienne les vidéos), Amazon compte bien que la société s'y soumettra."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
Index: malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- malware-amazon.it-diff.html 8 Feb 2019 09:30:03 -0000 1.32
+++ malware-amazon.it-diff.html 4 Mar 2019 09:00:10 -0000 1.33
@@ -228,6 +228,34 @@
<h3 id="misc"> Malware in other products</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender to.</p>
+ </li>
+
<li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -301,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:03 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-amazon.it.po 8 Feb 2019 08:59:35 -0000 1.25
+++ malware-amazon.it.po 4 Mar 2019 09:00:10 -0000 1.26
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2017-09-30 22:48+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -287,6 +287,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
Index: malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-amazon.ja-diff.html 4 Feb 2019 07:31:22 -0000 1.29
+++ malware-amazon.ja-diff.html 4 Mar 2019 09:00:10 -0000 1.30
@@ -217,6 +217,34 @@
<h3 id="misc"> Malware in other products</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender to.</p>
+ </li>
+
<li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
@@ -290,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-amazon.ja.po 14 Jan 2019 07:59:32 -0000 1.16
+++ malware-amazon.ja.po 4 Mar 2019 09:00:10 -0000 1.17
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2016-10-31 11:24+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -255,6 +255,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
Index: malware-amazon.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.pot,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-amazon.pot 14 Jan 2019 07:59:32 -0000 1.15
+++ malware-amazon.pot 4 Mar 2019 09:00:10 -0000 1.16
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -180,6 +180,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a "
+"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone "
+"else can also watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
+"to watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a "
+"href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">
"
+"send the video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a "
"href=\"https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo\">
"
"allow delivery staff to open their front doors</a>. Wouldn't you know it, "
Index: malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-amazon.ru.po 25 Feb 2019 10:00:30 -0000 1.37
+++ malware-amazon.ru.po 4 Mar 2019 09:00:10 -0000 1.38
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-01-14 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2018-10-08 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
#. type: Content of: <title>
msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -245,6 +246,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
+"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
+"оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они "
+"ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° длиÑелÑное вÑемÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Ðо многиÑ
ÑлÑÑаÑÑ
видеозапиÑи показÑваÑÑ
вÑеÑ
, кÑо оказалÑÑ Ð²Ð±Ð»Ð¸Ð·Ð¸ или "
+"пÑоÑÑо пÑоÑ
Ð¾Ð´Ð¸Ñ Ð¼Ð¸Ð¼Ð¾ двеÑи полÑзоваÑелÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+"ÐÑновное внимание ÑÑаÑÑÑ ÑделÑÐµÑ ÑомÑ,
как Ring позволÑл оÑделÑнÑм "
+"ÑабоÑникам Ñвободно заглÑдÑваÑÑ Ð²
видеозапиÑи. Ðак оказалоÑÑ, в Amazon "
+"пÑÑалиÑÑ Ð¿ÑедоÑвÑаÑиÑÑ ÑÑи вÑоÑиÑнÑе
злоÑпоÑÑеблениÑ, но пеÑвиÑное "
+"злоÑпоÑÑебление, ÑоÑÑоÑÑее в Ñом, ÑÑо Amazon
полÑÑÐ°ÐµÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи,— "
+"Amazon ÑÑиÑаеÑ, ÑÑо в ÑÑом обÑеÑÑво должно
ÑÑÑÑпиÑÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -353,16 +402,6 @@
#~ msgstr "<a href=\"#surveillance\">Слежка</a>"
#~ msgid ""
-#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
-#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
-#~ "the video they capture to Amazon servers</a> which save it permanently."
-#~ msgstr ""
-#~ "УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
-#~ "engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
-#~ "\"> оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, "
-#~ "где они ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð°Ð²Ñегда."
-
-#~ msgid ""
#~ "We refer to that product as the <a href=\"/philosophy/why-call-it-the-"
#~ "swindle.html\"> Amazon Swindle</a> because of this and <a href=\"/"
#~ "philosophy/ebooks.html\"> other malicious functionalities</a>."
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- malware-appliances.de-diff.html 28 Feb 2019 22:00:38 -0000 1.37
+++ malware-appliances.de-diff.html 4 Mar 2019 09:00:10 -0000 1.38
@@ -71,107 +71,117 @@
<li>
<p>Every “home security” camera, if its manufacturer can
communicate with it,
- is</strong></del></span> <span class="inserted"><ins><em>URL
of</em></ins></span> a <span class="removed"><del><strong>surveillance
device.</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
+ is</strong></del></span> <span class="inserted"><ins><em>URL
of</em></ins></span> a <span class="removed"><del><strong>surveillance device.
<a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
- <li id="M201902080">
- <p>The HP</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</strong></del></span>
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell</em></ins></span> camera is <span
class="removed"><del><strong>an example</a>.</p>
+ <p>The article describes wrongdoing by the manufacturer, based on
the fact</strong></del></span> <span class="inserted"><ins><em>designed
so</em></ins></span> that the <span class="removed"><del><strong>device is
tethered to a server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer (now Amazon) can watch all
the time. Now</em></ins></span> it <span class="removed"><del><strong>also
demonstrates</strong></del></span> <span class="inserted"><ins><em>turns
out</em></ins></span>
+ that <span class="removed"><del><strong>the device gives the company
+ surveillance capability.</p>
+</li>
+
+<li>
+ <p>A “smart” intravenous pump designed for
+ hospitals</strong></del></span> <span class="inserted"><ins><em><a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon</em></ins></span> to <span
class="inserted"><ins><em>change</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally <a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its security has been cracked</a>.</p>
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span> that <span
class="removed"><del><strong>this article misuses the
term</strong></del></span> <a
+<span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ referring</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon</em></ins></span> to <span
class="removed"><del><strong>crackers.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902080"></em></ins></span>
+ <p>The <span class="removed"><del><strong>bad security in many
Internet of Stings devices
+ allows</strong></del></span> <span
class="inserted"><ins><em>HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the
user</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>still
- paying for</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
+ communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>make sure the user is still
+ paying for the subscription, and hasn't printed more pages than were
paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
specific cases, it spies</em></ins></span> on <span
class="inserted"><ins><em>users, and involves totally unacceptable
- restrictions in</em></ins></span> the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges</em></ins></span> that <span
class="inserted"><ins><em>would otherwise be in
+ restrictions in</em></ins></span> the <span
class="removed"><del><strong>people that</strong></del></span> use <span
class="removed"><del><strong>them</a>.</p>
+ <p>Don't</strong></del></span> <span class="inserted"><ins><em>of ink
cartridges that would otherwise</em></ins></span> be <span
class="removed"><del><strong>a sucker—reject all</strong></del></span>
<span class="inserted"><ins><em>in
working order.</p>
</li>
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span class="removed"><del><strong>device is
tethered</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="removed"><del><strong>a
server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span> <span class="inserted"><ins><em>Amazon
servers</a>, which save</em></ins></span> it <span
class="removed"><del><strong>also demonstrates that</strong></del></span>
- <span class="inserted"><ins><em>long-term.</p>
-
- <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>video shows everyone that comes near, or merely
- passes by,</em></ins></span> the <span class="removed"><del><strong>company
- surveillance capability.</p>
-</li>
-
-<li>
- <p>A “smart” intravenous pump designed for
- hospitals is connected</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
+ send</em></ins></span> the <span
class="removed"><del><strong>stings.</p>
+ <p>It is unfortunate</strong></del></span> <span
class="inserted"><ins><em>video they capture to Amazon servers</a>, which
save it
+ long-term.</p>
- <p>The article focuses on how Ring used</em></ins></span> to <span
class="inserted"><ins><em>let individual employees look
- at</em></ins></span> the <span class="removed"><del><strong>internet.
Naturally <a
-href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its security</strong></del></span> <span class="inserted"><ins><em>videos
freely. It appears Amazon</em></ins></span> has <span
class="removed"><del><strong>been cracked</a>.</p>
- <p>Note</strong></del></span> <span class="inserted"><ins><em>tried to
prevent</em></ins></span> that <span class="removed"><del><strong>this article
misuses</strong></del></span>
- <span class="inserted"><ins><em>secondary abuse, but</em></ins></span> the
<span class="removed"><del><strong>term <a
-href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</strong></del></span> <span class="inserted"><ins><em>primary
abuse—that Amazon gets the
- video—Amazon expects society</em></ins></span> to <span
class="removed"><del><strong>crackers.</p></strong></del></span> <span
class="inserted"><ins><em>surrender to.</p></em></ins></span>
- </li>
+ <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span class="inserted"><ins><em>user's
front door.</p>
-<span class="removed"><del><strong><li>
- <p>The bad security in many Internet of Stings devices
- allows</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>people that use them</a>.</p>
- <p>Don't be a sucker—reject all</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in</em></ins></span> the
<span class="removed"><del><strong>stings.</p>
- <p>It</strong></del></span> <span class="inserted"><ins><em>own words
of the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed to make this spying acceptable, according to
him,</em></ins></span>
- is <span class="removed"><del><strong>unfortunate</strong></del></span>
that <span class="inserted"><ins><em>it is opt-in in newer models. But
since</em></ins></span> the <span class="removed"><del><strong>article
uses</strong></del></span> <span class="inserted"><ins><em>Vizio software is
- nonfree, we don't know what is actually happening behind</em></ins></span>
the
+ <p>The</em></ins></span> article <span
class="removed"><del><strong>uses</strong></del></span> <span
class="inserted"><ins><em>focuses on how Ring used to let individual employees
look
+ at</em></ins></span> the
<span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li>
<p>Many models of Internet-connected cameras are tremendously insecure.
They have login accounts with hard-coded passwords, which can't be
- changed,</strong></del></span> <span
class="inserted"><ins><em>scenes,</em></ins></span>
- and <span class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</strong></del></span>
<span class="inserted"><ins><em>there</em></ins></span> is no <span
class="removed"><del><strong>way to
- delete these accounts either</a>.</p>
+ changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way</strong></del></span> <span class="inserted"><ins><em>videos freely.
It appears Amazon has tried</em></ins></span> to
+ <span class="removed"><del><strong>delete these accounts
either</a>.</p>
</li>
<li>
-<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>guarantee</em></ins></span> that <span
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>prevent</em></ins></span> that <span
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
+full of gross security faults</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>secondary abuse, but the primary
abuse—that Amazon gets the
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
+ </li>
-<li><p>Users are suing Bose for <a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span> <span class="inserted"><ins><em>all future
updates will leave the
- settings unchanged.</p>
+<span class="removed"><del><strong><li><p>Users are suing Bose
for</strong></del></span>
- <p>If you already own</em></ins></span> a <span
class="removed"><del><strong>spyware app</strong></del></span> <span
class="inserted"><ins><em>Vizio smart TV (or any smart TV,</em></ins></span>
for <span class="removed"><del><strong>its headphones</a>.
-Specifically, the app would record the names of the audio files
-users listen to along with the headphone's unique serial number.
+ <span class="inserted"><ins><em><li id="M201901070">
+ <p>Vizio TVs</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing a spyware app for its headphones</a>.
+Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in</em></ins></span> the
<span class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>own words</em></ins></span> of the <span
class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>company's
+ CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
</p>
-<p>The suit accuses</strong></del></span> that <span
class="removed"><del><strong>this was done without the users' consent.
-If the fine print of</strong></del></span>
- <span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
-would that</strong></del></span> <span class="inserted"><ins><em>easiest way
to</em></ins></span> make <span
class="inserted"><ins><em>sure</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat out
+<p>The suit accuses that</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
+ lower retail prices.</p>
+
+ <p>What is supposed to make</em></ins></span> this <span
class="removed"><del><strong>was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>spying acceptable,
according to him,
+ is that it is opt-in in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>fine print of</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
+ nonfree, we don't know what is actually happening behind</em></ins></span>
the <span class="removed"><del><strong>app said</strong></del></span> <span
class="inserted"><ins><em>scenes,
+ and there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>users gave consent</strong></del></span> <span
class="inserted"><ins><em>all future updates will leave the
+ settings unchanged.</p>
+
+ <p>If you already own a Vizio smart TV (or any smart
TV,</em></ins></span> for <span class="removed"><del><strong>this,
+would</strong></del></span> that
+ <span class="inserted"><ins><em>matter), the easiest way
to</em></ins></span> make <span
class="inserted"><ins><em>sure</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat out
<a href="/philosophy/surveillance-vs-democracy.html">
illegal</strong></del></span> <span class="inserted"><ins><em>isn't spying on
you is</em></ins></span>
to <span class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
@@ -184,7 +194,7 @@
<p>Anova sabotaged users' cooking devices with</strong></del></span>
<span class="inserted"><ins><em>get your own router (which can
be an old computer running completely free software), and set
up</em></ins></span> a <span class="removed"><del><strong>downgrade that
tethered them</strong></del></span>
- <span class="inserted"><ins><em>firewall to block
connections</em></ins></span> to <span class="inserted"><ins><em>Vizio's
servers. Or, as</em></ins></span> a <span class="removed"><del><strong>remote
server.</strong></del></span> <span class="inserted"><ins><em>last resort,
+ <span class="inserted"><ins><em>firewall</em></ins></span> to <span
class="inserted"><ins><em>block connections to Vizio's servers. Or,
as</em></ins></span> a <span class="removed"><del><strong>remote
server.</strong></del></span> <span class="inserted"><ins><em>last resort,
you can replace your TV with another model.</p>
</li>
@@ -248,71 +258,69 @@
report everything</strong></del></span>
<span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
hide voice commands in other audio</a>, so</em></ins></span> that
<span class="removed"><del><strong>is viewed on</strong></del></span> <span
class="inserted"><ins><em>people cannot hear</em></ins></span>
- them, <span class="inserted"><ins><em>but Alexa</em></ins></span> and
<span class="removed"><del><strong>not just broadcasts</strong></del></span>
<span class="inserted"><ins><em>Siri can.</p>
+ them, <span class="inserted"><ins><em>but Alexa</em></ins></span> and
<span class="removed"><del><strong>not just broadcasts
+ and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>Siri can.</p>
</li>
<li id="M201807050">
<p>The Jawbone fitness tracker was tethered to a proprietary phone
- app. In 2017, the company shut down</em></ins></span> and <span
class="removed"><del><strong>cable</a>. Even if</strong></del></span>
<span class="inserted"><ins><em>made</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>app stop working. <a
+ app. In 2017,</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>company shut down and made</em></ins></span> the
<span class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>app stop
working. <a
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All</em></ins></span>
- the <span class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>existing
trackers stopped working forever</a>.</p>
+ the <span class="removed"><del><strong>TV reports what it is. The
existence of</strong></del></span> <span class="inserted"><ins><em>existing
trackers stopped working forever</a>.</p>
- <p>The article focuses on a further nasty fillip, that sales
of</em></ins></span> the <span class="removed"><del><strong>TV reports
what</strong></del></span>
+ <p>The article focuses on</em></ins></span> a <span
class="removed"><del><strong>way to
+ disable</strong></del></span> <span class="inserted"><ins><em>further
nasty fillip, that sales of</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden
as</strong></del></span>
<span class="inserted"><ins><em>broken devices continued. But I think that
is a secondary issue;</em></ins></span>
- it <span class="removed"><del><strong>is.</strong></del></span> <span
class="inserted"><ins><em>made the nasty consequences extend to some additional
people.</em></ins></span>
- The <span class="removed"><del><strong>existence of a
way</strong></del></span> <span class="inserted"><ins><em>fundamental wrong
was</em></ins></span> to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>devices to depend on something
- else that didn't respect users' freedom.</p>
- </li>
-
- <li id="M201804140">
- <p>A medical insurance company <a
-
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
+ it <span class="inserted"><ins><em>made the nasty consequences extend to
some additional people.
+ The fundamental wrong</em></ins></span> was <span
class="removed"><del><strong>in
+ these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>to design</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>devices to depend on something
+ else that didn't respect users' freedom.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>More or less all “smart”</strong></del></span>
+<p>More or less all “smart” TVs</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart”</em></ins></span> TVs <span
class="inserted"><ins><em>automatically</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ <span class="inserted"><ins><em><li id="M201804140">
+ <p>A medical insurance company</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops</em></ins></span> on
<span class="removed"><del><strong>their users</a>.</p>
<p>The report was as of 2014, but we don't expect this has got
better.</p>
-<p>This shows</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
+<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate. And
-what happens if</strong></del></span> <span
class="inserted"><ins><em>install</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV will say,
-“Without your consent</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
-
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> the <span
class="removed"><del><strong>TV will not
+what happens if a</strong></del></span> <span
class="inserted"><ins><em>its</em></ins></span> user <span
class="removed"><del><strong>declines consent? Probably the TV will say,
+“Without your consent to tracking, the TV will not
work.”</p>
-<p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>article for the facts it presents. It
- is too bad</em></ins></span> that <span class="removed"><del><strong>TVs
are not allowed to report what</strong></del></span> the
-<span class="removed"><del><strong>user watches — no
exceptions!</p>
-</li>
-<li>
-<p>Some LG
+<p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>by
+ sending usage data back over</em></ins></span> the
+<span class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804010"></em></ins></span>
+ <p>Some <span class="removed"><del><strong>LG
TVs <a href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
tyrants</a>.</p>
</li>
<li><a
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
-Samsung “Smart” TVs have turned Linux into</strong></del></span>
<span class="inserted"><ins><em>article finishes by
advocating</em></ins></span> the <span class="removed"><del><strong>base
-for a tyrant system</a> so as to impose DRM.
-What enables Samsung</strong></del></span>
- <span class="inserted"><ins><em>moral weakness of
surrendering</em></ins></span> to <span class="removed"><del><strong>do this is
that Linux is released under
-GNU GPL version 2,</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> <a
<span class="removed"><del><strong>href="/licenses/rms-why-gplv3.html">not
version 3</a>,
-together with a weak interpretation of GPL version 2.</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+Samsung</strong></del></span> “Smart” TVs <span
class="removed"><del><strong>have turned Linux into the base
+for</strong></del></span> <span class="inserted"><ins><em>automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>tyrant system</a> so as to impose DRM.
+What enables Samsung</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
+
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>do this</strong></del></span> <span
class="inserted"><ins><em>the article for the facts it presents.
It</em></ins></span>
+ is <span class="inserted"><ins><em>too bad</em></ins></span> that <span
class="removed"><del><strong>Linux is released under
+GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version
3</a>,
+together with a weak interpretation</strong></del></span> <span
class="inserted"><ins><em>the article finishes by advocating the
+ moral weakness</em></ins></span> of <span class="removed"><del><strong>GPL
version 2.</strong></del></span> <span class="inserted"><ins><em>surrendering
to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p></em></ins></span>
</li>
@@ -340,50 +348,35 @@
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
intentionally broke Revolv home automatic</strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose</em></ins></span> control <span class="removed"><del><strong>products
that depended on</strong></del></span> <span class="inserted"><ins><em>of your
house and appliances</a>.</p>
-
- <p>For your safety, don't use any appliance with</em></ins></span> a
<span class="removed"><del><strong>server</a></strong></del></span> <span
class="inserted"><ins><em>connection</em></ins></span> to <span
class="removed"><del><strong>function. The lesson is, don't stand for that!
Insist
-on self-contained computers that run free
software!</p></strong></del></span> <span class="inserted"><ins><em>the
- real internet.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>ARRIS cable modem</strong></del></span>
+ lose</em></ins></span> control <span class="removed"><del><strong>products
that depended on
+a server</a> to function. The lesson is,</strong></del></span> <span
class="inserted"><ins><em>of your house and appliances</a>.</p>
- <span class="inserted"><ins><em><li id="M201711200">
- <p>Amazon recently invited consumers to be suckers and <a
-
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff to open their front doors</a>. Wouldn't you know
- it, the system</em></ins></span> has a <span
class="inserted"><ins><em>grave security flaw.</p>
- </li>
+ <p>For your safety,</em></ins></span> don't <span
class="removed"><del><strong>stand for that! Insist
+on self-contained computers that run free software!</p>
+</li>
- <li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-backdoor in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+<li>
+<p>ARRIS cable modem has</strong></del></span> <span
class="inserted"><ins><em>use any appliance with</em></ins></span> a <span
class="removed"><del><strong><a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+backdoor in</strong></del></span> <span class="inserted"><ins><em>connection
to</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>real internet.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>HP “storage appliances” that use the proprietary
-“Left Hand” operating system have back doors that give
HP</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711080">
- <p>Logitech will sabotage
- all Harmony Link household control devices by</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+“Left Hand” operating system have back doors that give HP
+<a
+href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
remote login access</a> to them. HP claims that this does not give HP
-access to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>server through which</em></ins></span> the
<span class="removed"><del><strong>back door allows
-installation of software changes,</strong></del></span> <span
class="inserted"><ins><em>products' supposed owners
- communicate with them</a>.</p>
+access</strong></del></span>
- <p>The owners suspect this is to pressure them to
buy</em></ins></span> a <span class="removed"><del><strong>change could be
installed</strong></del></span> <span class="inserted"><ins><em>newer model. If
- they are wise, they will learn, rather, to distrust any
product</em></ins></span> that
-<span class="removed"><del><strong>would give access</strong></del></span>
- <span class="inserted"><ins><em>requires users</em></ins></span> to <span
class="removed"><del><strong>the customer's data.
+ <span class="inserted"><ins><em><li id="M201711200">
+ <p>Amazon recently invited consumers</em></ins></span> to <span
class="removed"><del><strong>the customer's data, but if the back door allows
+installation of software changes, a change could</strong></del></span> be
<span class="removed"><del><strong>installed that
+would give access</strong></del></span> <span
class="inserted"><ins><em>suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff</em></ins></span> to <span
class="inserted"><ins><em>open their front doors</a>. Wouldn't you know
+ it,</em></ins></span> the <span class="removed"><del><strong>customer's
data.
</p>
</li>
@@ -395,75 +388,78 @@
<p>
<a href="https://github.com/elvanderb/TCP-32764">Many models of routers
-have back doors</a>.</p></strong></del></span> <span
class="inserted"><ins><em>talk with them through some specialized
service.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
-The TP-Link router has</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201710040">
- <p>Every “home security” camera, if its
- manufacturer can communicate with it, is</em></ins></span> a <span
class="removed"><del><strong>backdoor</a>.</p>
+have back doors</a>.</p>
</li>
<li>
-<p>The</strong></del></span> <span
class="inserted"><ins><em>surveillance device.</em></ins></span> <a <span
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer was designed with DRM</a>: it won't accept
-third-party printing materials. It</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera</em></ins></span> is <span class="inserted"><ins><em>an
example</a>.</p>
+<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+The TP-Link router</strong></del></span> <span
class="inserted"><ins><em>system</em></ins></span> has a <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>grave security
flaw.</p></em></ins></span>
+ </li>
- <p>The article describes wrongdoing by</em></ins></span> the <span
class="removed"><del><strong>Keurig of printers. Now it is
+<span class="removed"><del><strong><li>
+<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+“Cube” 3D printer</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy</em></ins></span> was <span
class="removed"><del><strong>designed with DRM</a>: it won't accept
+third-party printing materials. It is the Keurig</strong></del></span> <span
class="inserted"><ins><em>found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings</em></ins></span> of <span
class="removed"><del><strong>printers. Now it is
being discontinued, which means that eventually authorized materials won't
-be available and</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on</em></ins></span>
- the <span class="removed"><del><strong>printers may become
unusable.</p>
+be available and</strong></del></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
-<p>With a <a
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer</strong></del></span> <span
class="inserted"><ins><em>fact</em></ins></span> that <span
class="removed"><del><strong>gets</strong></del></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
-even be</strong></del></span> <span class="inserted"><ins><em>device is
tethered to</em></ins></span> a <span class="removed"><del><strong>remote
possibility.</p>
+<p>With a</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
+ </li>
-<p>How pitiful that the author of that article
says</strong></del></span> <span class="inserted"><ins><em>server.</p>
+ <li id="M201711080">
+ <p>Logitech will sabotage
+ all Harmony Link household control devices by</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer that gets</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off</em></ins></span> the <span
class="removed"><del><strong>Respects Your
Freedom</a>,</strong></del></span> <span class="inserted"><ins><em>server
through which the products' supposed owners
+ communicate with them</a>.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
- proprietary tethering</a>.</p>
+ <p>The owners suspect</em></ins></span> this <span
class="removed"><del><strong>problem would not
+even be</strong></del></span> <span class="inserted"><ins><em>is to pressure
them to buy</em></ins></span> a <span class="removed"><del><strong>remote
possibility.</p>
- <p>But it also demonstrates</em></ins></span> that <span
class="removed"><del><strong>there was
-“nothing wrong” with designing</strong></del></span> the device
<span class="removed"><del><strong>to restrict users in</strong></del></span>
<span class="inserted"><ins><em>gives</em></ins></span> the <span
class="removed"><del><strong>first place. This is like putting a “cheat
me and mistreat me”
-sign on your chest. We should know better: we should condemn all companies
-that take advantage of people like him. Indeed, it</strong></del></span>
<span class="inserted"><ins><em>company
- surveillance capability.</p>
+<p>How pitiful that the author of</strong></del></span> <span
class="inserted"><ins><em>newer model. If
+ they are wise, they will learn, rather, to distrust any
product</em></ins></span> that
+ <span class="inserted"><ins><em>requires users to talk with them through
some specialized service.</p>
</li>
- <li id="M201709200">
- <p>A “smart” intravenous pump
- designed for hospitals</em></ins></span> is <span
class="inserted"><ins><em>connected to</em></ins></span> the <span
class="removed"><del><strong>acceptance of
-their unjust practice</strong></del></span> <span
class="inserted"><ins><em>internet. Naturally <a
-
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its security has been cracked</a>.</p>
+ <li id="M201710040">
+ <p>Every “home security” camera, if its
+ manufacturer can communicate with it, is a surveillance device. <a
+
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is an example</a>.</p>
+
+ <p>The</em></ins></span> article <span
class="removed"><del><strong>says</strong></del></span> <span
class="inserted"><ins><em>describes wrongdoing by the manufacturer, based on
+ the fact</em></ins></span> that <span class="removed"><del><strong>there
was
+“nothing wrong” with designing</strong></del></span> the device
<span class="inserted"><ins><em>is tethered</em></ins></span> to <span
class="removed"><del><strong>restrict users in
+the first place. This is like putting</strong></del></span> a <span
class="removed"><del><strong>“cheat me and mistreat me”
+sign on your chest. We should know better: we should condemn all companies
+that take advantage of people like him. Indeed,</strong></del></span> <span
class="inserted"><ins><em>server.</p>
- <p>Note</em></ins></span> that <span
class="removed"><del><strong>teaches people</strong></del></span> <span
class="inserted"><ins><em>this article misuses the term <a
-
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</em></ins></span> to <span class="removed"><del><strong>be
doormats.</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
+ proprietary tethering</a>.</p>
+
+ <p>But</em></ins></span> it <span class="removed"><del><strong>is
the acceptance of
+their unjust practice</strong></del></span> <span
class="inserted"><ins><em>also demonstrates</em></ins></span> that <span
class="removed"><del><strong>teaches people to be
doormats.</p></strong></del></span> <span class="inserted"><ins><em>the
device gives the company
+ surveillance capability.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>Philips “smart” lightbulbs</strong></del></span>
+<p>Philips</strong></del></span>
- <span class="inserted"><ins><em><li id="M201708280">
- <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
-have been designed not</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="removed"><del><strong>interact with other companies' smart
+ <span class="inserted"><ins><em><li id="M201709200">
+ <p>A</em></ins></span> “smart” <span
class="removed"><del><strong>lightbulbs <a
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+have been</strong></del></span> <span class="inserted"><ins><em>intravenous
pump</em></ins></span>
+ designed <span class="removed"><del><strong>not to interact with other
companies' smart
lightbulbs</a>.</p>
-<p>If</strong></del></span> <span class="inserted"><ins><em>snoop on the
people that use them</a>.</p>
-
- <p>Don't be</em></ins></span> a <span
class="removed"><del><strong>product is “smart”, and you didn't
build it, it</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all the stings.</p>
-
- <p>It</em></ins></span> is
-<span class="removed"><del><strong>cleverly serving its manufacturer
<em>against you</em>.</p>
+<p>If a product is “smart”, and you didn't build it, it is
+cleverly serving its manufacturer <em>against you</em>.</p>
</li>
<li>
@@ -472,46 +468,73 @@
DVDs and Bluray disks have DRM</a>.
</p>
-<p>That page uses spin terms</strong></del></span> <span
class="inserted"><ins><em>unfortunate</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
-including</strong></del></span> <span class="inserted"><ins><em>the article
uses the term</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+<p>That page uses spin terms that favor DRM,
+including <a
href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
digital “rights” management</a>
-and</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+and <a
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
+and it claims that “artists” (rather than companies) are
+primarily responsible</strong></del></span> for <span
class="removed"><del><strong>putting digital restrictions management into
+these disks. Nonetheless, it</strong></del></span> <span
class="inserted"><ins><em>hospitals</em></ins></span> is <span
class="removed"><del><strong>a reference for</strong></del></span> <span
class="inserted"><ins><em>connected to</em></ins></span> the <span
class="removed"><del><strong>facts.
+</p>
+
+<p>Every Bluray disk (with few, rare exceptions) has DRM—so
+don't use Bluray disks!</p>
+</li>
+
+<li id="cameras-bugs">
+<p>Over 70 brands of network-connected surveillance cameras
have</strong></del></span> <span class="inserted"><ins><em>internet.
Naturally</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its</em></ins></span> security <span
class="removed"><del><strong>bugs</strong></del></span> <span
class="inserted"><ins><em>has been cracked</a>.</p>
+
+ <p>Note</em></ins></span> that <span
class="removed"><del><strong>allow anyone</strong></del></span> <span
class="inserted"><ins><em>this article misuses the term <a
+
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ referring</em></ins></span> to <span class="removed"><del><strong>watch
through them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>Samsung's “Smart Home” has a big</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708280">
+ <p>The bad</em></ins></span> security <span
class="removed"><del><strong>hole;</strong></del></span> <span
class="inserted"><ins><em>in many Internet of Stings devices
allows</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+unauthorized</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the</em></ins></span> people <span
class="removed"><del><strong>can remotely control it</a>.</p>
+
+<p>Samsung claims</strong></del></span> that <span
class="removed"><del><strong>this is an “open” platform
so</strong></del></span> <span class="inserted"><ins><em>use
them</a>.</p>
+
+ <p>Don't be a sucker—reject all</em></ins></span> the
+<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+
+ <p>It</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>unfortunate that the article uses the term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li id="M201708230">
- <p>Sonos</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+ <p>Sonos <a
+
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”
to snooping or the product will stop working</a>. <a
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
Another article</a> says they won't forcibly change the software, but
- people won't be able to get any upgrades</em></ins></span> and <span
class="inserted"><ins><em>eventually</em></ins></span> it <span
class="removed"><del><strong>claims that “artists” (rather than
companies) are
-primarily responsible for putting digital restrictions management into
-these disks. Nonetheless, it is</strong></del></span> <span
class="inserted"><ins><em>will
+ people won't be able to get any upgrades and eventually it will
stop working.</p>
</li>
<li id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>reference for the facts.
-</p>
-
-<p>Every Bluray disk (with few, rare exceptions) has DRM—so
-don't use Bluray disks!</p></strong></del></span> <span
class="inserted"><ins><em>DJI drone
+ <p>While you're using a DJI drone
to snoop on other people, DJI is in many cases <a
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ on you</a>.</p>
</li>
- <li <span class="removed"><del><strong>id="cameras-bugs">
-<p>Over 70 brands</strong></del></span> <span
class="inserted"><ins><em>id="M201706200">
- <p>Many models</em></ins></span> of <span
class="removed"><del><strong>network-connected
surveillance</strong></del></span> <span
class="inserted"><ins><em>Internet-connected</em></ins></span> cameras
- <span class="inserted"><ins><em>are tremendously insecure.
They</em></ins></span> have <span class="inserted"><ins><em>login
- accounts with hard-coded passwords, which can't be changed,
and</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
-security bugs that allow anyone</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
- is no way</em></ins></span> to <span class="removed"><del><strong>watch
through them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>delete these accounts either</a>.</p>
+ <li id="M201706200">
+ <p>Many models of Internet-connected cameras
+ are tremendously insecure. They have login
+ accounts with hard-coded passwords, which can't be changed, and <a
+
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+ is no way to delete these accounts either</a>.</p>
</li>
<li id="M201705250">
@@ -730,13 +753,10 @@
mistreat me” sign on your chest. We should know better: we
should condemn all companies that take advantage of people like him.
Indeed, it is the acceptance of their unjust practice that teaches
- people to be doormats.</p></em></ins></span>
+ people to be doormats.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Samsung's “Smart Home”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201512140">
+ <li id="M201512140">
<p>Philips “smart” lightbulbs had initially been
designed to interact with other companies' smart light bulbs, but <a
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
@@ -754,17 +774,15 @@
dlink of an eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
- router</em></ins></span> has a <span class="removed"><del><strong>big
security hole;</strong></del></span> <span class="inserted"><ins><em>back
door</a>.</p>
+ router has a back door</a>.</p>
<p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
routers have back doors</a>.</p>
</li>
<li id="M201511250">
- <p>The Nest Cam “smart” camera is</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
-unauthorized people</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
@@ -782,9 +800,7 @@
sounds to be picked up by proprietary malware running
on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely control it</a>.</p>
-
-<p>Samsung claims</strong></del></span> <span
class="inserted"><ins><em>correlate ads with Web activity, and other <a
+ your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
@@ -794,12 +810,11 @@
manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
- link them your IP address</a> so</em></ins></span> that <span
class="inserted"><ins><em>advertisers can track you
+ link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible to turn</em></ins></span> this <span
class="inserted"><ins><em>off, but having it enabled by
default</em></ins></span>
- is an <span class="removed"><del><strong>“open” platform so the
-problem is partly</strong></del></span> <span
class="inserted"><ins><em>injustice already.</p>
+ <p>It is possible to turn this off, but having it enabled by default
+ is an injustice already.</p>
</li>
<li id="M201511020">
@@ -1284,7 +1299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:38 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-appliances.de.po 28 Feb 2019 22:00:38 -0000 1.71
+++ malware-appliances.de.po 4 Mar 2019 09:00:10 -0000 1.72
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -108,6 +108,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- malware-appliances.fr.po 28 Feb 2019 22:17:16 -0000 1.113
+++ malware-appliances.fr.po 4 Mar 2019 09:00:10 -0000 1.114
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2019-02-28 23:15+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-appliances.pot 28 Feb 2019 22:00:38 -0000 1.56
+++ malware-appliances.pot 4 Mar 2019 09:00:10 -0000 1.57
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a "
+"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone "
+"else can also watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
+"to watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- malware-appliances.ru.po 1 Mar 2019 05:29:26 -0000 1.147
+++ malware-appliances.ru.po 4 Mar 2019 09:00:10 -0000 1.148
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- nl.po 4 Mar 2019 08:00:37 -0000 1.40
+++ nl.po 4 Mar 2019 09:00:10 -0000 1.41
@@ -411,6 +411,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1733,27 +1770,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- pl.po 4 Mar 2019 08:00:37 -0000 1.40
+++ pl.po 4 Mar 2019 09:00:10 -0000 1.41
@@ -365,6 +365,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1300,27 +1337,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- pot 4 Mar 2019 08:00:37 -0000 1.40
+++ pot 4 Mar 2019 09:00:10 -0000 1.41
@@ -322,6 +322,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1170,27 +1207,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-insecurity.de-diff.html 4 Feb 2019 07:31:23 -0000 1.22
+++ proprietary-insecurity.de-diff.html 4 Mar 2019 09:00:10 -0000 1.23
@@ -69,6 +69,19 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
@@ -196,35 +209,10 @@
<span class="removed"><del><strong><li>
<p>
- Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models of HP laptops logged the user's
- keystroke to a file in the filesystem. Any process with access to
- the filesystem or the MapViewOfFile API could gain access to the
- log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
- to modzero</a> the “information-leak via Covert Storage
- Channel enables malware authors to capture keystrokes without
- taking the risk of being classified as malicious task by AV
- heuristics”.
- </p>
-</li>
-<li>
-<p>The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
+ Conexant</strong></del></span>
-
-<li>
- <p>Exploits of bugs in Windows, which were developed by the NSA
- and then leaked by the Shadowbrokers group, are now being used to
- <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
- of Windows computers with ransomware</a>.
- </p>
-</li></strong></del></span>
-
- <li <span
class="removed"><del><strong>id="intel-me-10-year-vulnerability">
- <p>Intel's</strong></del></span> <span
class="inserted"><ins><em>id="M201706050">
- <p id="intel-me-10-year-vulnerability">Intel's</em></ins></span>
+ <span class="inserted"><ins><em><li id="M201706050">
+ <p id="intel-me-10-year-vulnerability">Intel's
CPU backdoor—the Intel Management Engine—had a <a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security vulnerability for 10 years</a>.</p>
@@ -242,9 +230,7 @@
besides using machines that don't come with the backdoor.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705250">
+ <li id="M201705250">
<p>The proprietary code that runs pacemakers,
insulin pumps, and other medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
@@ -252,50 +238,87 @@
</li>
<li id="M201705160">
- <p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+ <p>Conexant</em></ins></span> HD Audio Driver Package (version
1.0.0.46 and earlier)
pre-installed on 28 models of HP laptops logged the user's keystroke
to a file in the filesystem. Any process with access to the filesystem
or the MapViewOfFile API could gain access to the log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
to modzero</a> the “information-leak via Covert Storage Channel
enables malware authors to capture keystrokes without taking the risk
- of being classified as malicious task by AV heuristics”.</p>
+ of being classified as malicious task by AV
+ <span class="removed"><del><strong>heuristics”.
+ </p>
+</li>
+<li>
+<p>The proprietary code that runs pacemakers, insulin pumps, and other
+medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
</li>
- <li id="M201705120">
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705120"></em></ins></span>
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
- a great number of Windows computers with ransomware</a>.</p>
+ a great number of Windows computers with <span
class="removed"><del><strong>ransomware</a>.
+ </p></strong></del></span> <span
class="inserted"><ins><em>ransomware</a>.</p></em></ins></span>
</li>
- <li id="M201704050"></em></ins></span>
+ <li <span
class="removed"><del><strong>id="intel-me-10-year-vulnerability">
+ <p>Intel's CPU backdoor—the Intel Management
Engine—had</strong></del></span> <span
class="inserted"><ins><em>id="M201704050">
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be hijacked through their Wi-Fi chips</a> because of a bug in
+ can be hijacked through their Wi-Fi chips</a> because
of</em></ins></span> a <span class="inserted"><ins><em>bug in
Broadcom's non-free firmware.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703270"></em></ins></span>
+ <li id="M201703270">
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is <a
-
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to the Internet, its security is crap</a>.</p>
-
- <p>For example, a cracker can gain access to the dishwasher's
- filesystem, infect it with malware, and force the dishwasher to launch
- attacks on other devices in the network. Since these dishwashers are
+ Stings hospital disinfectant dishwasher is</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to the Internet, its</em></ins></span> security
+ <span class="removed"><del><strong>vulnerability for 10
years</a>.</p>
+
+ <p>The vulnerability allowed</strong></del></span> <span
class="inserted"><ins><em>is crap</a>.</p>
+
+ <p>For example,</em></ins></span> a cracker <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>can gain</em></ins></span> access <span
class="inserted"><ins><em>to</em></ins></span> the <span
class="removed"><del><strong>computer's Intel Active
+ Management Technology
+ (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
+ web interface</strong></del></span> <span
class="inserted"><ins><em>dishwasher's
+ filesystem, infect it</em></ins></span> with <span
class="removed"><del><strong>an empty password</strong></del></span> <span
class="inserted"><ins><em>malware,</em></ins></span> and <span
class="removed"><del><strong>gave administrative
+ access</a> to access</strong></del></span> <span
class="inserted"><ins><em>force</em></ins></span> the <span
class="removed"><del><strong>computer's keyboard, mouse, monitor
+ among other privileges.</p>
+
+ <p>It does not help that in newer Intel processors, it is
impossible
+ to turn off the Intel Management Engine. Thus, even users who are
+ proactive about their security can do nothing to protect themselves
+ besides using machines that don't come with the backdoor.</p>
+
+</li>
+
+<li>
+ <p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+ can be hijacked through their Wi-Fi chips</a> because of a bug in
+ Broadcom's non-free firmware.</p>
+</li>
+
+<li>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
<a
+href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+connected to the Internet, its security is crap</a>.</p>
+
+<p>For example, a cracker can gain access to the dishwasher's
filesystem,
+infect it with malware, and force the dishwasher to launch attacks
on</strong></del></span> <span class="inserted"><ins><em>dishwasher to launch
+ attacks on</em></ins></span> other devices in the network. Since these
dishwashers are
used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
</li>
-<span class="removed"><del><strong><li><p>WhatsApp
has</strong></del></span>
+<span
class="removed"><del><strong><li><p>WhatsApp</strong></del></span>
<span class="inserted"><ins><em><li id="M201702200">
- <p>If you buy</em></ins></span> a <span
class="removed"><del><strong>feature that
- <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
- has been described as</strong></del></span> <span
class="inserted"><ins><em>used “smart”
+ <p>If you buy a used “smart”
car, house, TV, refrigerator, etc., usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
previous owners can still remotely control it</a>.</p>
@@ -320,9 +343,9 @@
</li>
<li id="M201701130">
- <p>WhatsApp has a feature that <a
+ <p>WhatsApp</em></ins></span> has a feature that <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
- has been described as</em></ins></span> a “back
door”</a> because it would
+ has been described as a “back door”</a> because it would
enable governments to nullify its encryption.</p>
<p>The developers say that it wasn't intended as a back door, and
that
@@ -345,8 +368,13 @@
</li>
<span class="removed"><del><strong><li>
-<p>The mobile apps for
-communicating <a
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+<p>The mobile apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201610230">
+ <p>4G LTE phone networks are drastically insecure. They can be <a
+
href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
+ taken over by third parties and used</em></ins></span> for
+<span class="removed"><del><strong>communicating <a
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
<p>This is in addition to the fact that the car contains a cellular
@@ -369,19 +397,20 @@
ransomware</a>.</p>
</li>
-<li></strong></del></span>
+<li>
+<p>4G LTE phone networks are drastically insecure. They can be
+<a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
+taken
+over by third parties and used for man-in-the-middle
attacks</a>.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201610230"></em></ins></span>
- <p>4G LTE phone networks are drastically insecure. They can be <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"></em></ins></span>
- taken over by third parties and used for man-in-the-middle
+<li>
+<p>Due to weak security,</strong></del></span> <span
class="inserted"><ins><em>man-in-the-middle
attacks</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201608110"></em></ins></span>
- <p>Due to weak security, <a
+ <li id="M201608110">
+ <p>Due to weak security,</em></ins></span> <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
is easy to open the doors of 100 million cars built by
Volkswagen</a>.</p>
@@ -468,12 +497,12 @@
<span class="removed"><del><strong><li>
<p>
-The Nissan Leaf has</strong></del></span>
+The</strong></del></span>
<span class="inserted"><ins><em><li id="M201604120">
<p>A bug in the iThings Messages app <a
-
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</em></ins></span>
- a <span class="removed"><del><strong>built-in</strong></del></span> <span
class="inserted"><ins><em>malicious web site to extract all the user's messaging
+
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
+ a malicious web site to extract all the user's messaging
history</a>.</p>
</li>
@@ -504,7 +533,7 @@
</li>
<li id="M201602240">
- <p id="nissan-modem">The Nissan Leaf has a built-in</em></ins></span>
+ <p id="nissan-modem">The</em></ins></span> Nissan Leaf has a built-in
cell phone modem which allows effectively anyone <span
class="inserted"><ins><em>to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/"></em></ins></span>
access its computers remotely and make changes in various
@@ -624,10 +653,10 @@
<span class="removed"><del><strong><li>
<p>
-Hospira infusion pumps, which are used</strong></del></span>
+Hospira</strong></del></span>
<span class="inserted"><ins><em><li id="M201506080">
- <p>Due</em></ins></span> to <span
class="removed"><del><strong>administer drugs</strong></del></span> <span
class="inserted"><ins><em>bad security in a drug pump, crackers could use it to
<a
+ <p>Due to bad security in a drug pump, crackers could use it to <a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
kill patients</a>.</p>
</li>
@@ -643,8 +672,8 @@
</li>
<li id="M201505050">
- <p>Hospira infusion pumps, which are used
- to administer drugs</em></ins></span> to a patient, were rated “<a
+ <p>Hospira</em></ins></span> infusion pumps, which are used
+ to administer drugs to a patient, were rated “<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
secure IP device I've ever seen</a>” by a security <span
class="removed"><del><strong>researcher.
</p>
@@ -654,26 +683,28 @@
<p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
the door to <span class="removed"><del><strong>murder.
-</p>
-</li>
-
-<li>
-<p>
-Due to bad security in a drug pump, crackers could use it to
-<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p></strong></del></span>
+<p>
+Due to bad security in a drug pump, crackers</strong></del></span>
<span class="inserted"><ins><em><li id="M201504090">
- <p>Mac OS X had an</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ <p>Mac OS X had an <a
+
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ intentional local back door for 4 years</a>, which</em></ins></span>
could <span class="removed"><del><strong>use it</strong></del></span> <span
class="inserted"><ins><em>be exploited
+ by attackers</em></ins></span> to
+<span class="removed"><del><strong><a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>gain root
privileges.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>
+<a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones, Android, and
BlackBerry</a>. While there is not much detail here, it seems that
-this does not operate via the universal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
- intentional local</em></ins></span> back door <span
class="removed"><del><strong>that we know nearly
+this does not operate via the universal back door that we know nearly
all portable phones have. It may involve exploiting various bugs.
There
are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
@@ -696,7 +727,7 @@
<li>
<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
The FTC punished a company for making webcams with bad security so
-that it was easy</strong></del></span> for <span
class="removed"><del><strong>anyone to watch them</a>.
+that it was easy for anyone to watch them</a>.
</p>
</li>
@@ -721,7 +752,7 @@
</li>
<li>
-<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>, and it can</strong></del></span> <span
class="inserted"><ins><em>4 years</a>, which could</em></ins></span> be
<span class="removed"><del><strong>fatal.
+<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>, and it can be fatal.
</p>
</li>
@@ -730,11 +761,10 @@
Point-of-sale terminals running Windows were taken over and turned
into a botnet for the purpose of collecting customers' credit card
numbers</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>exploited
- by attackers to gain root privileges.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201405190"></em></ins></span>
<p>An app to prevent “identity theft”
@@ -933,7 +963,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary-insecurity.de.po 5 Jan 2019 11:31:34 -0000 1.125
+++ proprietary-insecurity.de.po 4 Mar 2019 09:00:10 -0000 1.126
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -139,6 +139,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
"voice commands in other audio</a>, so that people cannot hear them, but "
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary-insecurity.fr.po 5 Jan 2019 16:13:44 -0000 1.157
+++ proprietary-insecurity.fr.po 4 Mar 2019 09:00:10 -0000 1.158
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2019-01-05 17:13+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -110,6 +111,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
"voice commands in other audio</a>, so that people cannot hear them, but "
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-insecurity.it-diff.html 8 Feb 2019 09:30:04 -0000 1.37
+++ proprietary-insecurity.it-diff.html 4 Mar 2019 09:00:10 -0000 1.38
@@ -54,39 +54,51 @@
<em>helpless to fix any security problems that arise</em>.
Keeping the
users helpless is what's culpable about proprietary software.</p>
-<span class="removed"><del><strong><ul></strong></del></span>
+<span class="removed"><del><strong><ul>
+<li id="break-security-smarttv">
+ <p><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way</strong></del></span>
<span class="inserted"><ins><em><p>This page lists clearly established
cases of insecurity in
proprietary software that has grave consequences or is otherwise
noteworthy.</p>
<div class="important">
-<p>If you know of an example that ought to be in this page but isn't
+<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>break security on</strong></del></span> <span
class="inserted"><ins><em>be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p>
+to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>“smart” TV</a> and use its
camera</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two</em></ins></span>
+to <span class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
-<ul class="blurbs"></em></ins></span>
- <li <span class="removed"><del><strong>id="break-security-smarttv">
- <p><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers</strong></del></span> <span
class="inserted"><ins><em>id="M201809240">
+<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can</em></ins></span> watch <span
class="inserted"><ins><em>all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change</em></ins></span> the <span
class="inserted"><ins><em>design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
+ <li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p>
+ hide voice commands in other audio</a>, so that</em></ins></span>
people <span class="removed"><del><strong>who are watching
TV.</p></strong></del></span> <span class="inserted"><ins><em>cannot hear
+ them, but Alexa and Siri can.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p>Many models</strong></del></span>
- <li id="M201808120">
- <p>Crackers</em></ins></span> found a way to break <span
class="removed"><del><strong>security on a “smart” TV</a> and
use its camera
- to watch</strong></del></span> the <span
class="removed"><del><strong>people who are watching TV.</p>
-</li>
-<li>
- <p>Many models</strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras</strong></del></span>
<span class="inserted"><ins><em>an Amazon device,
+ <span class="inserted"><ins><em><li id="M201808120">
+ <p>Crackers found a way to break the security</em></ins></span> of
<span class="removed"><del><strong>Internet-connected
cameras</strong></del></span> <span class="inserted"><ins><em>an Amazon device,
and</em></ins></span> <a
<span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
@@ -230,19 +242,14 @@
<span class="inserted"><ins><em><li id="M201705250">
<p>The proprietary code that runs pacemakers,
insulin pumps, and other medical</em></ins></span> devices <span
class="inserted"><ins><em>is</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be hijacked through their Wi-Fi chips</a>
because</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full</em></ins></span> of <span class="removed"><del><strong>a bug in
- Broadcom's non-free firmware.</p></strong></del></span> <span
class="inserted"><ins><em>gross
- security faults</a>.</p></em></ins></span>
+ can be</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full of gross
+ security faults</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>When Miele's Internet</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705160">
+ <li id="M201705160">
<p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models</em></ins></span> of <span
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
<span class="inserted"><ins><em>HP laptops logged the user's keystroke
+ pre-installed on 28 models of HP laptops logged the user's keystroke
to a file in the filesystem. Any process with access to the filesystem
or the MapViewOfFile API could gain access to the log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
@@ -261,14 +268,16 @@
<li id="M201704050">
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be hijacked through their Wi-Fi chips</a> because of a bug in
+ can be</em></ins></span> hijacked through their Wi-Fi chips</a>
because of a bug in
Broadcom's non-free firmware.</p>
</li>
- <li id="M201703270">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703270"></em></ins></span>
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is <a
-
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ Stings hospital disinfectant dishwasher is <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
connected</em></ins></span> to the Internet, its security is
crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
@@ -723,11 +732,13 @@
</p>
</li>
-<li></strong></del></span>
+<li>
+<p>An app to prevent “identity theft” (access to personal
data)
+by storing users'</strong></del></span>
- <span class="inserted"><ins><em><li id="M201405190"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201405190">
<p>An app to prevent “identity theft”
- (access to personal data) by storing users' data on a special server <a
+ (access to personal data) by storing users'</em></ins></span> data on a
special server <a
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
deactivated by its developer</a> which had discovered a security
<span class="removed"><del><strong>flaw.
</p>
@@ -923,7 +934,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary-insecurity.it.po 8 Feb 2019 08:59:36 -0000 1.142
+++ proprietary-insecurity.it.po 4 Mar 2019 09:00:10 -0000 1.143
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
"voice commands in other audio</a>, so that people cannot hear them, but "
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-insecurity.ja-diff.html 4 Feb 2019 07:31:23 -0000 1.54
+++ proprietary-insecurity.ja-diff.html 4 Mar 2019 09:00:10 -0000 1.55
@@ -80,59 +80,78 @@
<li>
<p>Ransomware <a
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
-been developed for</strong></del></span> a <span
class="removed"><del><strong>thermostat that uses proprietary
software</a>.</p>
-</li>
-
-<li>
-<p>A</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
+been developed for</strong></del></span> a <span
class="removed"><del><strong>thermostat</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M201809240">
- <p>Researchers have discovered how to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands</em></ins></span> in
-<span class="removed"><del><strong>Internet Explorer</strong></del></span>
<span class="inserted"><ins><em>other audio</a>, so that people cannot
hear
- them, but Alexa</em></ins></span> and <span
class="removed"><del><strong>Edge</a> allows an
attacker</strong></del></span> <span class="inserted"><ins><em>Siri
can.</p>
- </li>
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns
out</em></ins></span>
+ that <span class="removed"><del><strong>uses proprietary
software</a>.</p>
+</li>
- <li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>retrieve
-Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>user is tricked</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it</em></ins></span> into <span
class="removed"><del><strong>visiting</strong></del></span> a
-<span class="removed"><del><strong>malicious link.</p>
+<li>
+<p>A</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
+Internet Explorer</strong></del></span> <span
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch,</em></ins></span> and <span
class="removed"><del><strong>Edge</a> allows an attacker to retrieve
+Microsoft account credentials, if the user</strong></del></span> <span
class="inserted"><ins><em>fake videos too</a>.</p>
+
+ <p>The third party vulnerability</em></ins></span> is <span
class="removed"><del><strong>tricked into visiting a
+malicious link.</p>
</li>
<li>
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
-WhatsApp messages</strong></del></span> <span
class="inserted"><ins><em>listening device</a> for them.</p>
+WhatsApp messages are</strong></del></span> <span
class="inserted"><ins><em>presumably
+ unintentional and I suppose Amazon will fix it. I
+ do</em></ins></span> not <span class="removed"><del><strong>entirely
deleted</a>. They can be recovered
+in various ways.
+</p>
+</li>
+
+<li>
+<p>A vulnerability in Apple's Image I/O API allowed an
attacker</strong></del></span> <span class="inserted"><ins><em>expect
Amazon</em></ins></span> to <span class="inserted"><ins><em>change the design
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this API</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon</em></ins></span> to <span class="removed"><del><strong>render a
+ certain kind of image file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+<p>A bug</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201809240">
+ <p>Researchers have discovered how to <a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands</em></ins></span> in <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>other audio</a>, so that people cannot hear
+ them, but Alexa and Siri can.</p>
+ </li>
+
+ <li id="M201808120">
+ <p>Crackers found a way to break the security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
easier for Amazon. And if some government such as China or the US
told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not entirely deleted</a>.
They</strong></del></span> <span class="inserted"><ins><em>probably hackers
too, but please <a
+ <p>These crackers are probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
“hacking” to mean “breaking
security”</a>.</p>
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all the other voice-control
systems</em></ins></span> can be <span
class="removed"><del><strong>recovered</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
- hijacked by programs that play commands</em></ins></span> in <span
class="removed"><del><strong>various ways.
-</p></strong></del></span> <span class="inserted"><ins><em>ultrasound
that humans
- can't hear</a>.</p></em></ins></span>
+ hijacked by programs that play commands in ultrasound that humans
+ can't hear</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>A vulnerability in</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201807020">
+ <li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
photos to people in the owner's contact list</a>.</p>
@@ -349,16 +368,14 @@
</li>
<li id="M201607220">
- <p>A vulnerability in</em></ins></span> Apple's Image I/O API
allowed an attacker to <a
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- <span class="removed"><del><strong>malacious</strong></del></span>
- <span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
+ malicious code from any application which uses this API to render a
certain kind of image file</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201607190"></em></ins></span>
- <p>A bug in a proprietary ASN.1 library, used
+ <li id="M201607190">
+ <p>A bug in a</em></ins></span> proprietary ASN.1 library, used
in cell phone towers as well as cell phones and routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
taking control of those systems</a>.</p>
@@ -867,7 +884,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary-insecurity.ja.po 5 Jan 2019 11:31:34 -0000 1.112
+++ proprietary-insecurity.ja.po 4 Mar 2019 09:00:10 -0000 1.113
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -102,6 +102,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
"voice commands in other audio</a>, so that people cannot hear them, but "
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary-insecurity.pot 5 Jan 2019 11:31:34 -0000 1.81
+++ proprietary-insecurity.pot 4 Mar 2019 09:00:10 -0000 1.82
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a "
+"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone "
+"else can also watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
+"to watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Researchers have discovered how to <a "
"href=\"http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\">
"
"hide voice commands in other audio</a>, so that people cannot hear them, but "
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- proprietary-insecurity.ru.po 25 Feb 2019 09:37:05 -0000 1.208
+++ proprietary-insecurity.ru.po 4 Mar 2019 09:00:10 -0000 1.209
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2018-12-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
"voice commands in other audio</a>, so that people cannot hear them, but "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.de-diff.html 4 Mar 2019 08:00:38 -0000 1.55
+++ proprietary.de-diff.html 4 Mar 2019 09:00:10 -0000 1.56
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -102,17 +102,17 @@
<td></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
@@ -125,9 +125,9 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201902140">
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
@@ -247,30 +260,6 @@
<p>However, modification of the client program could cover up some
addictive behaviors without losing the user anything.</p>
</li>
-
- <li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
- </li>
</ul></em></ins></span>
@@ -331,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.de.po 4 Mar 2019 08:00:38 -0000 1.97
+++ proprietary.de.po 4 Mar 2019 09:00:10 -0000 1.98
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -505,35 +521,6 @@
"behaviors without losing the user anything."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary.es.po 4 Mar 2019 08:00:38 -0000 1.110
+++ proprietary.es.po 4 Mar 2019 09:00:10 -0000 1.111
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2019-02-25 11:08+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -387,54 +403,6 @@
"No obstante, la modificación del programa cliente podrÃa impedir algunos "
"comportamientos adictivos sin que eso supusiera pérdidas para el usuario."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-"Los televisores Vizio <a href=\"https://www.theverge.com/2019/1/7/18172397/"
-"airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-"
-"ces-2019\">registran «todo lo que se ve en el aparato»</a>, en palabras de "
-"la compañÃa CTO, y estos se venden a terceros. Esto se hace a cambio de un "
-"«mejor servicio» (¿más anuncios intrusivos, quizás?) y ligeras rebajas
de "
-"precios."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-"Lo que se supone que hace este espionaje aceptable, según ellos, es que es "
-"una opción en los nuevos modelos. Pero dado que el software de Vizio no es "
-"libre, no sabemos qué sucede exactamente por detrás, y no hay garantÃa de "
-"que en las actualizaciones futuras no modifiquen la configuración del "
-"usuario."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-"Si ya posee una <cite>smart»</cite> TV Vizio (o cualquier <cite>smart»</"
-"cite> TV, por cierto), la manera más sencilla de asegurarse de que no le "
-"están espiando consiste en desconectarla de Internet y utilizar una antena "
-"terrestre en su lugar. Otra opción, si tiene algunos conocimientos
técnicos, "
-"es utilizar un enrutador propio (que podrÃa ser un viejo ordenador que "
-"utilizara únicamente software libre) y activar un cortafuegos que bloqueara "
-"las conexiones a los servidores de Vizio. O, como último recurso, sustituir "
-"su televisor por otro modelo."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -514,6 +482,53 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect "
+#~ "“whatever the TV sees,”</a> in the own words of the company's "
+#~ "CTO, and this data is sold to third parties. This is in return for “"
+#~ "better service” (meaning more intrusive ads?) and slightly lower "
+#~ "retail prices."
+#~ msgstr ""
+#~ "Los televisores Vizio <a href=\"https://www.theverge."
+#~ "com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-"
+#~ "vergecast-ces-2019\">registran «todo lo que se ve en el aparato»</a>, en
"
+#~ "palabras de la compañÃa CTO, y estos se venden a terceros. Esto se hace
a "
+#~ "cambio de un «mejor servicio» (¿más anuncios intrusivos, quizás?) y "
+#~ "ligeras rebajas de precios."
+
+#~ msgid ""
+#~ "What is supposed to make this spying acceptable, according to him, is "
+#~ "that it is opt-in in newer models. But since the Vizio software is "
+#~ "nonfree, we don't know what is actually happening behind the scenes, and "
+#~ "there is no guarantee that all future updates will leave the settings "
+#~ "unchanged."
+#~ msgstr ""
+#~ "Lo que se supone que hace este espionaje aceptable, según ellos, es que "
+#~ "es una opción en los nuevos modelos. Pero dado que el software de Vizio "
+#~ "no es libre, no sabemos qué sucede exactamente por detrás, y no hay "
+#~ "garantÃa de que en las actualizaciones futuras no modifiquen la "
+#~ "configuración del usuario."
+
+#~ msgid ""
+#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
+#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
+#~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "
+#~ "this is not always possible. Another option, if you are technically "
+#~ "oriented, is to get your own router (which can be an old computer running "
+#~ "completely free software), and set up a firewall to block connections to "
+#~ "Vizio's servers. Or, as a last resort, you can replace your TV with "
+#~ "another model."
+#~ msgstr ""
+#~ "Si ya posee una <cite>smart»</cite> TV Vizio (o cualquier <cite>smart»</"
+#~ "cite> TV, por cierto), la manera más sencilla de asegurarse de que no le "
+#~ "están espiando consiste en desconectarla de Internet y utilizar una "
+#~ "antena terrestre en su lugar. Otra opción, si tiene algunos conocimientos
"
+#~ "técnicos, es utilizar un enrutador propio (que podrÃa ser un viejo "
+#~ "ordenador que utilizara únicamente software libre) y activar un "
+#~ "cortafuegos que bloqueara las conexiones a los servidores de Vizio. O, "
+#~ "como último recurso, sustituir su televisor por otro modelo."
+
+#~ msgid ""
#~ "Some portable surveillance devices (“phones”) now have <a "
#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-"
#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary.fr.po 4 Mar 2019 08:00:38 -0000 1.135
+++ proprietary.fr.po 4 Mar 2019 09:00:10 -0000 1.136
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2019-02-28 23:15+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -295,6 +295,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -399,54 +415,6 @@
"Cependant, la modification du programme client pourrait masquer certains "
"comportements addictifs sans rien faire perdre à l'utilisateur."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-"Les téléviseurs Vizio <a href=\"https://www.theverge.com/2019/1/7/18172397/"
-"airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-"
-"ces-2019\">collectent « tout ce que voit le téléviseur »</a> â ce
sont les "
-"termes employés par le directeur technique de cette société â et ces
données "
-"sont vendues à des tiers. La contrepartie est un « meilleur service »
(c'est-"
-"à -dire plus de pubs intrusives ?) et un prix de vente légèrement plus
bas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-"Ce qui est censé rendre cet espionnage acceptable, selon lui, c'est qu'il "
-"est désactivé par défaut dans les modèles récents. Mais puisque le
logiciel "
-"de ces téléviseurs est non libre, nous ne savons pas ce qui se passe "
-"vraiment en coulisses et il n'y a aucune garantie que les mises à jour à "
-"venir ne changeront jamais la configuration."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-"Si vous possédez déjà un téléviseur Vizio intelligent (ou n'importe quel
"
-"autre téléviseur intelligent, d'ailleurs), le moyen le plus simple d'être "
-"sûr qu'il ne vous espionne pas est de le déconnecter d'Internet et "
-"d'utiliser une antenne hertzienne. Malheureusement, ce n'est pas toujours "
-"possible. Une autre option, si la technique ne vous rebute pas, est "
-"d'installer votre propre routeur avec un pare-feu qui bloque les connexions "
-"aux serveurs de Vizio. Et en dernier ressort, vous pouvez toujours remplacer "
-"votre téléviseur par un autre modèle. "
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -522,6 +490,54 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect "
+#~ "“whatever the TV sees,”</a> in the own words of the company's "
+#~ "CTO, and this data is sold to third parties. This is in return for “"
+#~ "better service” (meaning more intrusive ads?) and slightly lower "
+#~ "retail prices."
+#~ msgstr ""
+#~ "Les téléviseurs Vizio <a href=\"https://www.theverge."
+#~ "com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-"
+#~ "vergecast-ces-2019\">collectent « tout ce que voit le téléviseurÂ
»</a> â "
+#~ "ce sont les termes employés par le directeur technique de cette société
â "
+#~ "et ces données sont vendues à des tiers. La contrepartie est un "
+#~ "« meilleur service » (c'est-à -dire plus de pubs intrusives ?) et un
prix "
+#~ "de vente légèrement plus bas."
+
+#~ msgid ""
+#~ "What is supposed to make this spying acceptable, according to him, is "
+#~ "that it is opt-in in newer models. But since the Vizio software is "
+#~ "nonfree, we don't know what is actually happening behind the scenes, and "
+#~ "there is no guarantee that all future updates will leave the settings "
+#~ "unchanged."
+#~ msgstr ""
+#~ "Ce qui est censé rendre cet espionnage acceptable, selon lui, c'est qu'il
"
+#~ "est désactivé par défaut dans les modèles récents. Mais puisque le "
+#~ "logiciel de ces téléviseurs est non libre, nous ne savons pas ce qui se "
+#~ "passe vraiment en coulisses et il n'y a aucune garantie que les mises à "
+#~ "jour à venir ne changeront jamais la configuration."
+
+#~ msgid ""
+#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
+#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
+#~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "
+#~ "this is not always possible. Another option, if you are technically "
+#~ "oriented, is to get your own router (which can be an old computer running "
+#~ "completely free software), and set up a firewall to block connections to "
+#~ "Vizio's servers. Or, as a last resort, you can replace your TV with "
+#~ "another model."
+#~ msgstr ""
+#~ "Si vous possédez déjà un téléviseur Vizio intelligent (ou n'importe
quel "
+#~ "autre téléviseur intelligent, d'ailleurs), le moyen le plus simple
d'être "
+#~ "sûr qu'il ne vous espionne pas est de le déconnecter d'Internet et "
+#~ "d'utiliser une antenne hertzienne. Malheureusement, ce n'est pas toujours "
+#~ "possible. Une autre option, si la technique ne vous rebute pas, est "
+#~ "d'installer votre propre routeur avec un pare-feu qui bloque les "
+#~ "connexions aux serveurs de Vizio. Et en dernier ressort, vous pouvez "
+#~ "toujours remplacer votre téléviseur par un autre modèle. "
+
+#~ msgid ""
#~ "Some portable surveillance devices (“phones”) now have <a "
#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-"
#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.it-diff.html 4 Mar 2019 08:00:38 -0000 1.67
+++ proprietary.it-diff.html 4 Mar 2019 09:00:10 -0000 1.68
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201902140">
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
@@ -246,30 +259,6 @@
<p>However, modification of the client program could cover up some
addictive behaviors without losing the user anything.</p>
</li>
-
- <li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
- </li>
</ul></em></ins></span>
@@ -330,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.it.po 4 Mar 2019 08:00:38 -0000 1.106
+++ proprietary.it.po 4 Mar 2019 09:00:10 -0000 1.107
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -509,35 +525,6 @@
"behaviors without losing the user anything."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary.ja-diff.html 4 Mar 2019 08:00:38 -0000 1.68
+++ proprietary.ja-diff.html 4 Mar 2019 09:00:10 -0000 1.69
@@ -181,6 +181,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201902140">
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
@@ -243,30 +256,6 @@
<p>However, modification of the client program could cover up some
addictive behaviors without losing the user anything.</p>
</li>
-
- <li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
- </li>
</ul></em></ins></span>
@@ -327,7 +316,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary.ja.po 4 Mar 2019 08:00:38 -0000 1.89
+++ proprietary.ja.po 4 Mar 2019 09:00:10 -0000 1.90
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -429,35 +445,6 @@
"behaviors without losing the user anything."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary.nl-diff.html 4 Mar 2019 08:00:38 -0000 1.67
+++ proprietary.nl-diff.html 4 Mar 2019 09:00:10 -0000 1.68
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201902140">
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
@@ -246,30 +259,6 @@
<p>However, modification of the client program could cover up some
addictive behaviors without losing the user anything.</p>
</li>
-
- <li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
- </li>
</ul></em></ins></span>
@@ -330,7 +319,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.nl.po 4 Mar 2019 08:00:38 -0000 1.78
+++ proprietary.nl.po 4 Mar 2019 09:00:10 -0000 1.79
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -502,35 +518,6 @@
"behaviors without losing the user anything."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary.pl-diff.html 4 Mar 2019 08:00:38 -0000 1.85
+++ proprietary.pl-diff.html 4 Mar 2019 09:00:10 -0000 1.86
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of October, 2018, the pages in this directory list around 350
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
+instances of malicious functionalities (with more than 400 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -127,17 +127,17 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul>
- <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201902140">
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
@@ -244,30 +257,6 @@
<p>However, modification of the client program could cover up some
addictive behaviors without losing the user anything.</p>
</li>
-
- <li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
- </li>
</ul></em></ins></span>
@@ -328,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary.pl.po 4 Mar 2019 08:00:38 -0000 1.73
+++ proprietary.pl.po 4 Mar 2019 09:00:10 -0000 1.74
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -584,35 +600,6 @@
"behaviors without losing the user anything."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary.pot 4 Mar 2019 08:00:38 -0000 1.70
+++ proprietary.pot 4 Mar 2019 09:00:10 -0000 1.71
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a "
+"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone "
+"else can also watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
+"to watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a "
"href=\"https://www.appcensus.mobi\"> how Android apps use and misuse users' "
"personal data</a>. As of March 2019, nearly 78,000 have been analyzed, of "
@@ -320,35 +336,6 @@
"behaviors without losing the user anything."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a "
-"href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\">
"
-"collect “whatever the TV sees,”</a> in the own words of the "
-"company's CTO, and this data is sold to third parties. This is in return for "
-"“better service” (meaning more intrusive ads?) and slightly "
-"lower retail prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's "
-"servers. Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary.pt-br.po 4 Mar 2019 08:00:38 -0000 1.99
+++ proprietary.pt-br.po 4 Mar 2019 09:00:10 -0000 1.100
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2019-02-24 15:49-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -380,52 +396,6 @@
"No entanto, a modificação do programa cliente pode encobrir alguns "
"comportamentos aditivos sem perder nada do usuário."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-"TVs Vizio <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> colecionam âo "
-"que quer que a TV vejaâ</a>, nas próprias palavras do CTO da empresa, e "
-"esses dados são vendidos a terceiros. Isso é em troca de um âserviço "
-"melhorâ (significando anúncios mais intrusivos?) e preços de varejo "
-"ligeiramente inferiores."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-"O que supostamente torna essa espionagem aceitável, segundo ele, é que ela "
-"está optando por modelos mais novos. Mas como o software da Vizio é não "
-"livre, não sabemos o que está acontecendo nos bastidores, e não há
garantia "
-"de que todas as atualizações futuras deixarão as configurações
inalteradas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-"Se você já possui uma smart TV da Vizio (ou qualquer smart TV, a
propósito), "
-"a maneira mais fácil de garantir que não está espionando você é
desconectá-"
-"la da Internet e usar uma antena terrestre. Infelizmente, isso nem sempre é "
-"possÃvel. Outra opção, se você for orientado tecnicamente, é ter seu
próprio "
-"roteador (que pode ser um computador antigo rodando software completamente "
-"livre), e configurar um firewall para bloquear conexões com os servidores da
"
-"Vizio. Ou, como último recurso, você pode substituir sua TV por outro
modelo."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -501,6 +471,53 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect "
+#~ "“whatever the TV sees,”</a> in the own words of the company's "
+#~ "CTO, and this data is sold to third parties. This is in return for “"
+#~ "better service” (meaning more intrusive ads?) and slightly lower "
+#~ "retail prices."
+#~ msgstr ""
+#~ "TVs Vizio <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> colecionam "
+#~ "âo que quer que a TV vejaâ</a>, nas próprias palavras do CTO da
empresa, "
+#~ "e esses dados são vendidos a terceiros. Isso é em troca de um
âserviço "
+#~ "melhorâ (significando anúncios mais intrusivos?) e preços de varejo "
+#~ "ligeiramente inferiores."
+
+#~ msgid ""
+#~ "What is supposed to make this spying acceptable, according to him, is "
+#~ "that it is opt-in in newer models. But since the Vizio software is "
+#~ "nonfree, we don't know what is actually happening behind the scenes, and "
+#~ "there is no guarantee that all future updates will leave the settings "
+#~ "unchanged."
+#~ msgstr ""
+#~ "O que supostamente torna essa espionagem aceitável, segundo ele, é que "
+#~ "ela está optando por modelos mais novos. Mas como o software da Vizio é "
+#~ "não livre, não sabemos o que está acontecendo nos bastidores, e não
há "
+#~ "garantia de que todas as atualizações futuras deixarão as
configurações "
+#~ "inalteradas."
+
+#~ msgid ""
+#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
+#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
+#~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "
+#~ "this is not always possible. Another option, if you are technically "
+#~ "oriented, is to get your own router (which can be an old computer running "
+#~ "completely free software), and set up a firewall to block connections to "
+#~ "Vizio's servers. Or, as a last resort, you can replace your TV with "
+#~ "another model."
+#~ msgstr ""
+#~ "Se você já possui uma smart TV da Vizio (ou qualquer smart TV, a "
+#~ "propósito), a maneira mais fácil de garantir que não está espionando
você "
+#~ "é desconectá-la da Internet e usar uma antena terrestre. Infelizmente, "
+#~ "isso nem sempre é possÃvel. Outra opção, se você for orientado "
+#~ "tecnicamente, é ter seu próprio roteador (que pode ser um computador "
+#~ "antigo rodando software completamente livre), e configurar um firewall "
+#~ "para bloquear conexões com os servidores da Vizio. Ou, como último "
+#~ "recurso, você pode substituir sua TV por outro modelo."
+
+#~ msgid ""
#~ "Some portable surveillance devices (“phones”) now have <a "
#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-"
#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.ru.po 4 Mar 2019 08:31:54 -0000 1.169
+++ proprietary.ru.po 4 Mar 2019 09:00:10 -0000 1.170
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-04 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -416,53 +433,6 @@
"Ðднако изменение пÑогÑаммÑ-клиенÑа могло
Ð±Ñ Ð½ÐµÐ¹ÑÑализоваÑÑ Ð½ÐµÐºÐ¾ÑоÑÑе пÑÐ¸ÐµÐ¼Ñ "
"вÑÑабоÑки завиÑимоÑÑи Ñак, ÑÑо
полÑзоваÑели ниÑего Ð±Ñ Ð½Ðµ ÑеÑÑли."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-"ТелевизоÑÑ Vizio <a
href=\"https://www.theverge.com/2019/1/7/18172397/"
-"airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> "
-"ÑобиÑаÑÑ “вÑе, ÑÑо видиÑ
Ñелевизоє</a>, по Ñловам ÑÑководиÑÐµÐ»Ñ "
-"компании, и ÑÑи даннÑе пÑодаÑÑ Ð½Ð° ÑÑоÑонÑ.
ÐÑо в обмен на “лÑÑÑее "
-"обÑлÑживание” (ÑÑо знаÑÐ¸Ñ Ð±Ð¾Ð»ÐµÐµ
навÑзÑивÑÑ ÑекламÑ?) и Ñлегка "
-"ÑниженнÑе ÑозниÑнÑе ÑенÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-"ÐоÑÐµÐ¼Ñ Ð¾Ð½ ÑÑиÑÐ°ÐµÑ ÑÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð¿Ñимелемой?
ÐоÑÐ¾Ð¼Ñ ÑÑо в более новÑÑ
моделÑÑ
"
-"она вÑклÑÑена, пока ее не вклÑÑаÑ
полÑзоваÑели. Ðо поÑколÑÐºÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Vizio "
-"не ÑвободнÑ, Ð¼Ñ Ð½Ðµ знаем, ÑÑо на деле пÑоиÑÑ
Ð¾Ð´Ð¸Ñ Ð·Ð° кÑлиÑами, и Ð½ÐµÑ Ð½Ð¸ÐºÐ°ÐºÐ¸Ñ
"
-"гаÑанÑий, ÑÑо в бÑдÑÑиÑ
обновлениÑÑ
ÑÑи
наÑÑÑойки не изменÑÑÑÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-"ÐÑли Ñ Ð²Ð°Ñ Ñже еÑÑÑ Ð¸Ð½ÑеллекÑÑалÑнÑй
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Vizio (или вообÑе лÑбой "
-"инÑеллекÑÑалÑнÑй ÑелевизоÑ), ÑамÑй
пÑоÑÑой ÑпоÑоб гаÑанÑиÑоваÑÑ, ÑÑо он за "
-"вами не ÑÐ»ÐµÐ´Ð¸Ñ — оÑклÑÑиÑÑ ÐµÐ³Ð¾ оÑ
ÐнÑеÑнеÑа и полÑзоваÑÑÑÑ "
-"анÑенной. Ð ÑожалениÑ, ÑÑо не вÑегда
возможно. ÐÑÑÐ³Ð°Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ, еÑли Ð²Ñ "
-"ÑазбиÑаеÑеÑÑ Ð² ÑеÑ
нике,— доÑÑаÑÑ Ñебе
маÑÑÑÑÑизаÑÐ¾Ñ (им Ð¼Ð¾Ð¶ÐµÑ ÑÑаÑÑ "
-"ÑÑаÑÑй компÑÑÑеÑ, ÑабоÑаÑÑий полноÑÑÑÑ
под ÑпÑавлением ÑвободнÑÑ
пÑогÑамм), "
-"и наÑÑÑойÑÑ Ð±ÑандмаÑÑÑ, ÑÑÐ¾Ð±Ñ ÑоединениÑ
Ñ ÑеÑвеÑами Vizio блокиÑовалиÑÑ. "
-"Ðли, в кÑайнем ÑлÑÑае, можно замениÑÑ Ñвой
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð½Ð° дÑÑгÑÑ Ð¼Ð¾Ð´ÐµÐ»Ñ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -542,6 +512,53 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
+#~ "homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect "
+#~ "“whatever the TV sees,”</a> in the own words of the company's "
+#~ "CTO, and this data is sold to third parties. This is in return for “"
+#~ "better service” (meaning more intrusive ads?) and slightly lower "
+#~ "retail prices."
+#~ msgstr ""
+#~ "ТелевизоÑÑ Vizio <a
href=\"https://www.theverge.com/2019/1/7/18172397/"
+#~ "airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> "
+#~ "ÑобиÑаÑÑ “вÑе, ÑÑо видиÑ
Ñелевизоє</a>, по Ñловам "
+#~ "ÑÑководиÑÐµÐ»Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸, и ÑÑи даннÑе
пÑодаÑÑ Ð½Ð° ÑÑоÑонÑ. ÐÑо в обмен на "
+#~ "“лÑÑÑее обÑлÑживание” (ÑÑо знаÑиÑ
более навÑзÑивÑÑ ÑекламÑ?) "
+#~ "и Ñлегка ÑниженнÑе ÑозниÑнÑе ÑенÑ."
+
+#~ msgid ""
+#~ "What is supposed to make this spying acceptable, according to him, is "
+#~ "that it is opt-in in newer models. But since the Vizio software is "
+#~ "nonfree, we don't know what is actually happening behind the scenes, and "
+#~ "there is no guarantee that all future updates will leave the settings "
+#~ "unchanged."
+#~ msgstr ""
+#~ "ÐоÑÐµÐ¼Ñ Ð¾Ð½ ÑÑиÑÐ°ÐµÑ ÑÑÑ ÑÐ»ÐµÐ¶ÐºÑ Ð¿Ñимелемой?
ÐоÑÐ¾Ð¼Ñ ÑÑо в более новÑÑ
моделÑÑ
"
+#~ "она вÑклÑÑена, пока ее не вклÑÑаÑ
полÑзоваÑели. Ðо поÑколÑÐºÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ "
+#~ "Vizio не ÑвободнÑ, Ð¼Ñ Ð½Ðµ знаем, ÑÑо на деле
пÑоиÑÑ
Ð¾Ð´Ð¸Ñ Ð·Ð° кÑлиÑами, и Ð½ÐµÑ "
+#~ "никакиÑ
гаÑанÑий, ÑÑо в бÑдÑÑиÑ
обновлениÑÑ
ÑÑи наÑÑÑойки не изменÑÑÑÑ."
+
+#~ msgid ""
+#~ "If you already own a Vizio smart TV (or any smart TV, for that matter), "
+#~ "the easiest way to make sure it isn't spying on you is to disconnect it "
+#~ "from the Internet, and use a terrestrial antenna instead. Unfortunately, "
+#~ "this is not always possible. Another option, if you are technically "
+#~ "oriented, is to get your own router (which can be an old computer running "
+#~ "completely free software), and set up a firewall to block connections to "
+#~ "Vizio's servers. Or, as a last resort, you can replace your TV with "
+#~ "another model."
+#~ msgstr ""
+#~ "ÐÑли Ñ Ð²Ð°Ñ Ñже еÑÑÑ Ð¸Ð½ÑеллекÑÑалÑнÑй
ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Vizio (или вообÑе лÑбой "
+#~ "инÑеллекÑÑалÑнÑй ÑелевизоÑ), ÑамÑй
пÑоÑÑой ÑпоÑоб гаÑанÑиÑоваÑÑ, ÑÑо он "
+#~ "за вами не ÑÐ»ÐµÐ´Ð¸Ñ — оÑклÑÑиÑÑ ÐµÐ³Ð¾
Ð¾Ñ ÐнÑеÑнеÑа и полÑзоваÑÑÑÑ "
+#~ "анÑенной. Ð ÑожалениÑ, ÑÑо не вÑегда
возможно. ÐÑÑÐ³Ð°Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ, еÑли "
+#~ "Ð²Ñ ÑазбиÑаеÑеÑÑ Ð² ÑеÑ
нике,— доÑÑаÑÑ
Ñебе маÑÑÑÑÑизаÑÐ¾Ñ (им Ð¼Ð¾Ð¶ÐµÑ "
+#~ "ÑÑаÑÑ ÑÑаÑÑй компÑÑÑеÑ, ÑабоÑаÑÑий
полноÑÑÑÑ Ð¿Ð¾Ð´ ÑпÑавлением ÑвободнÑÑ
"
+#~ "пÑогÑамм), и наÑÑÑойÑÑ Ð±ÑандмаÑÑÑ, ÑÑобÑ
ÑÐ¾ÐµÐ´Ð¸Ð½ÐµÐ½Ð¸Ñ Ñ ÑеÑвеÑами Vizio "
+#~ "блокиÑовалиÑÑ. Ðли, в кÑайнем ÑлÑÑае,
можно замениÑÑ Ñвой ÑÐµÐ»ÐµÐ²Ð¸Ð·Ð¾Ñ Ð½Ð° "
+#~ "дÑÑгÑÑ Ð¼Ð¾Ð´ÐµÐ»Ñ."
+
+#~ msgid ""
#~ "Some portable surveillance devices (“phones”) now have <a "
#~ "href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-"
#~ "s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\"> "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary.zh-tw-diff.html 4 Mar 2019 08:00:38 -0000 1.45
+++ proprietary.zh-tw-diff.html 4 Mar 2019 09:00:10 -0000 1.46
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -102,17 +102,17 @@
<td></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
@@ -125,9 +125,9 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and I suppose Amazon will fix it. I
+ do not expect Amazon to change the design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
<li id="M201902140">
<p>The AppCensus database gives information on <a
href="https://www.appcensus.mobi"> how Android apps use and
@@ -247,30 +260,6 @@
<p>However, modification of the client program could cover up some
addictive behaviors without losing the user anything.</p>
</li>
-
- <li id="M201901070">
- <p>Vizio TVs <a
-
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
-
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
- </li>
</ul></em></ins></span>
@@ -331,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 08:00:38 $
+$Date: 2019/03/04 09:00:10 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.zh-tw.po 4 Mar 2019 08:00:38 -0000 1.56
+++ proprietary.zh-tw.po 4 Mar 2019 09:00:10 -0000 1.57
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-03-04 07:56+0000\n"
+"POT-Creation-Date: 2019-03-04 08:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The AppCensus database gives information on <a href=\"https://www.appcensus."
"mobi\"> how Android apps use and misuse users' personal data</a>. As of "
"March 2019, nearly 78,000 have been analyzed, of which 24,000 (31%) transmit "
@@ -418,35 +434,6 @@
"behaviors without losing the user anything."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
-"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
-"whatever the TV sees,”</a> in the own words of the company's CTO, and "
-"this data is sold to third parties. This is in return for “better "
-"service” (meaning more intrusive ads?) and slightly lower retail "
-"prices."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"What is supposed to make this spying acceptable, according to him, is that "
-"it is opt-in in newer models. But since the Vizio software is nonfree, we "
-"don't know what is actually happening behind the scenes, and there is no "
-"guarantee that all future updates will leave the settings unchanged."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"If you already own a Vizio smart TV (or any smart TV, for that matter), the "
-"easiest way to make sure it isn't spying on you is to disconnect it from the "
-"Internet, and use a terrestrial antenna instead. Unfortunately, this is not "
-"always possible. Another option, if you are technically oriented, is to get "
-"your own router (which can be an old computer running completely free "
-"software), and set up a firewall to block connections to Vizio's servers. "
-"Or, as a last resort, you can replace your TV with another model."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- pt-br.po 4 Mar 2019 08:00:38 -0000 1.54
+++ pt-br.po 4 Mar 2019 09:00:10 -0000 1.55
@@ -360,6 +360,52 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"Os dispositivos de âsegurançaâ Amazon Ring <a
href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam o "
+"vÃdeo que eles capturam para os servidores da Amazon</a>, os quais
armazenam-"
+"o permanentemente."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1266,36 +1312,6 @@
msgstr ""
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
-#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
-#| "the video they capture to Amazon servers</a> which save it permanently."
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Os dispositivos de âsegurançaâ Amazon Ring <a
href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam o "
-"vÃdeo que eles capturam para os servidores da Amazon</a>, os quais
armazenam-"
-"o permanentemente."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- ru.po 4 Mar 2019 08:24:01 -0000 1.90
+++ ru.po 4 Mar 2019 09:00:10 -0000 1.91
@@ -460,6 +460,54 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+"УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
+"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
+"оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они "
+"ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° длиÑелÑное вÑемÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Ðо многиÑ
ÑлÑÑаÑÑ
видеозапиÑи показÑваÑÑ
вÑеÑ
, кÑо оказалÑÑ Ð²Ð±Ð»Ð¸Ð·Ð¸ или "
+"пÑоÑÑо пÑоÑ
Ð¾Ð´Ð¸Ñ Ð¼Ð¸Ð¼Ð¾ двеÑи полÑзоваÑелÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+"ÐÑновное внимание ÑÑаÑÑÑ ÑделÑÐµÑ ÑомÑ,
как Ring позволÑл оÑделÑнÑм "
+"ÑабоÑникам Ñвободно заглÑдÑваÑÑ Ð²
видеозапиÑи. Ðак оказалоÑÑ, в Amazon "
+"пÑÑалиÑÑ Ð¿ÑедоÑвÑаÑиÑÑ ÑÑи вÑоÑиÑнÑе
злоÑпоÑÑеблениÑ, но пеÑвиÑное "
+"злоÑпоÑÑебление, ÑоÑÑоÑÑее в Ñом, ÑÑо Amazon
полÑÑÐ°ÐµÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи,— "
+"Amazon ÑÑиÑаеÑ, ÑÑо в ÑÑом обÑеÑÑво должно
ÑÑÑÑпиÑÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1705,38 +1753,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
-"оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они "
-"ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° длиÑелÑное вÑемÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-"Ðо многиÑ
ÑлÑÑаÑÑ
видеозапиÑи показÑваÑÑ
вÑеÑ
, кÑо оказалÑÑ Ð²Ð±Ð»Ð¸Ð·Ð¸ или "
-"пÑоÑÑо пÑоÑ
Ð¾Ð´Ð¸Ñ Ð¼Ð¸Ð¼Ð¾ двеÑи полÑзоваÑелÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-"ÐÑновное внимание ÑÑаÑÑÑ ÑделÑÐµÑ ÑомÑ,
как Ring позволÑл оÑделÑнÑм "
-"ÑабоÑникам Ñвободно заглÑдÑваÑÑ Ð²
видеозапиÑи. Ðак оказалоÑÑ, в Amazon "
-"пÑÑалиÑÑ Ð¿ÑедоÑвÑаÑиÑÑ ÑÑи вÑоÑиÑнÑе
злоÑпоÑÑеблениÑ, но пеÑвиÑное "
-"злоÑпоÑÑебление, ÑоÑÑоÑÑее в Ñом, ÑÑо Amazon
полÑÑÐ°ÐµÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи,— "
-"Amazon ÑÑиÑаеÑ, ÑÑо в ÑÑом обÑеÑÑво должно
ÑÑÑÑпиÑÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
@@ -5755,15 +5771,15 @@
"this ID to hardware identifiers</a>, so that users cannot escape tracking by "
"resetting it."
msgstr ""
-"Ðаза даннÑÑ
AppCensus ÑодеÑÐ¶Ð¸Ñ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
Ñом, как <a href=\"https://www.appcensus."
-"mobi\"> пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android иÑполÑзÑÑÑ
пеÑÑоналÑнÑе даннÑе полÑзоваÑелей "
-"и злоÑпоÑÑеблÑÑÑ Ð¸Ð¼Ð¸</a>. Ðа маÑÑ 2019 года
пÑоанализиÑовано около 78 ÑÑÑÑÑ "
-"пÑиложений, из коÑоÑÑÑ
24 ÑÑÑÑÑи (31%) "
-"<a
href=\"/proprietary/proprietary-surveillance.html#M201812290\">пеÑедаÑÑ
ÑекламнÑй иденÑиÑикаÑоÑ"
-"</a> в дÑÑгие компании, а <a href=\"https://blog.appcensus."
-"mobi/2019/02/14/ad-ids-behaving-badly/\"> 18 ÑÑÑÑÑ (23% вÑеÑ
пÑиложений) "
-"ÑвÑзÑваÑÑ ÑÑÐ¾Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑÐ¾Ñ Ñ
иденÑиÑикаÑоÑами аппаÑаÑÑÑÑ</a>, Ñак ÑÑо
ÑбÑÐ¾Ñ "
-"иденÑиÑикаÑоÑа не позволÑеÑ
полÑзоваÑелÑм избежаÑÑ Ñлежки."
+"Ðаза даннÑÑ
AppCensus ÑодеÑÐ¶Ð¸Ñ Ð¸Ð½ÑоÑмаÑÐ¸Ñ Ð¾
Ñом, как <a href=\"https://www."
+"appcensus.mobi\"> пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android иÑполÑзÑÑÑ
пеÑÑоналÑнÑе даннÑе "
+"полÑзоваÑелей и злоÑпоÑÑеблÑÑÑ Ð¸Ð¼Ð¸</a>. Ðа
маÑÑ 2019 года "
+"пÑоанализиÑовано около 78 ÑÑÑÑÑ
пÑиложений, из коÑоÑÑÑ
24 ÑÑÑÑÑи (31%) <a "
+"href=\"/proprietary/proprietary-surveillance.html#M201812290\">пеÑедаÑÑ
"
+"ÑекламнÑй иденÑиÑикаÑоÑ</a> в дÑÑгие
компании, а <a href=\"https://blog."
+"appcensus.mobi/2019/02/14/ad-ids-behaving-badly/\"> 18 ÑÑÑÑÑ (23%
вÑеÑ
"
+"пÑиложений) ÑвÑзÑваÑÑ ÑÑÐ¾Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑоÑ
Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑоÑами аппаÑаÑÑÑÑ</a>, "
+"Ñак ÑÑо ÑбÑÐ¾Ñ Ð¸Ð´ÐµÐ½ÑиÑикаÑоÑа не позволÑеÑ
полÑзоваÑелÑм избежаÑÑ Ñлежки."
#. type: Content of: <ul><li><p>
msgid ""
@@ -5773,11 +5789,11 @@
"development platform are ineffective at preventing nonfree software "
"developers from including malware in their programs."
msgstr ""
-"Ð¡Ð±Ð¾Ñ Ð°Ð¿Ð¿Ð°ÑаÑнÑÑ
иденÑиÑикаÑоÑов Ñвно
наÑÑÑÐ°ÐµÑ Ð¿Ñавила Google. Ðо в Google "
-"об ÑÑом как бÑдÑо не знали, а когда им
ÑообÑили, они не ÑпеÑили Ñ "
-"оÑвеÑнÑми дейÑÑвиÑми. ÐÑо доказÑваеÑ, ÑÑо
пÑавила плаÑÑоÑÐ¼Ñ ÑазÑабоÑки "
-"ÑакÑиÑеÑки не пÑепÑÑÑÑвÑÑÑ ÑазÑабоÑÑикам
неÑвободнÑÑ
пÑогÑамм закладÑваÑÑ "
-"вÑедоноÑнÑе ÑÑнкÑии в иÑ
пÑогÑаммÑ."
+"Ð¡Ð±Ð¾Ñ Ð°Ð¿Ð¿Ð°ÑаÑнÑÑ
иденÑиÑикаÑоÑов Ñвно
наÑÑÑÐ°ÐµÑ Ð¿Ñавила Google. Ðо в Google об "
+"ÑÑом как бÑдÑо не знали, а когда им
ÑообÑили, они не ÑпеÑили Ñ Ð¾ÑвеÑнÑми "
+"дейÑÑвиÑми. ÐÑо доказÑваеÑ, ÑÑо пÑавила
плаÑÑоÑÐ¼Ñ ÑазÑабоÑки ÑакÑиÑеÑки не "
+"пÑепÑÑÑÑвÑÑÑ ÑазÑабоÑÑикам неÑвободнÑÑ
пÑогÑамм закладÑваÑÑ Ð²ÑедоноÑнÑе "
+"ÑÑнкÑии в иÑ
пÑогÑаммÑ."
#. type: Content of: <ul><li><p>
msgid ""
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- zh-tw.po 4 Mar 2019 08:00:38 -0000 1.40
+++ zh-tw.po 4 Mar 2019 09:00:11 -0000 1.41
@@ -360,6 +360,43 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
+"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
+"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
+"watch, and fake videos too</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The third party vulnerability is presumably unintentional and I suppose "
+"Amazon will fix it. I do not expect Amazon to change the design that <a href="
+"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
+"watch</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Amazon Ring “security” devices <a href=\"https://www.engadget."
+"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -1263,27 +1300,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/04
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/26
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/28