www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po de.po es.po fr.po it.po ja.p...


From: GNUN
Subject: www/proprietary/po de.po es.po fr.po it.po ja.p...
Date: Wed, 6 Mar 2019 04:30:55 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     19/03/06 04:30:54

Modified files:
        proprietary/po : de.po es.po fr.po it.po ja.po 
                         malware-microsoft.de-diff.html 
                         malware-microsoft.de.po malware-microsoft.es.po 
                         malware-microsoft.fr.po 
                         malware-microsoft.it-diff.html 
                         malware-microsoft.it.po 
                         malware-microsoft.ja-diff.html 
                         malware-microsoft.ja.po malware-microsoft.pot 
                         malware-microsoft.ru.po nl.po pl.po pot 
                         proprietary-back-doors.de-diff.html 
                         proprietary-back-doors.de.po 
                         proprietary-back-doors.fr.po 
                         proprietary-back-doors.it-diff.html 
                         proprietary-back-doors.it.po 
                         proprietary-back-doors.ja-diff.html 
                         proprietary-back-doors.ja.po 
                         proprietary-back-doors.pot 
                         proprietary-back-doors.ru.po pt-br.po ru.po 
                         zh-tw.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.41&r2=1.42

Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- de.po       4 Mar 2019 09:00:09 -0000       1.41
+++ de.po       6 Mar 2019 09:30:53 -0000       1.42
@@ -5605,38 +5605,14 @@
 "Encryption Key, The Intercept, 2015.\">Festplattenverschlüsselung bereits "
 "hintergangen</a>."
 
-#   [2] 
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
-# [2-1] 
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
 („Dementi“)
-# | {+The+} German government <a
-# | 
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers-]
-# | 
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/";
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/";
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
-"\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 – 
Linked "
-"to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive).\"><ins cite="
-"\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/";
-"Windows_TPM_Pl_21082013.html\">„… einige kritische Aspekte im 
Zusammenhang "
-"mit bestimmten Einsatzszenarien, in denen Windows 8 in Kombination mit einer "
-"Hardware betrieben wird, die über ein TPM 2.0 verfügt.“</ins></a><a href="
-"\"#tn02\" id=\"tn02-ref\">[2]</a><a href=\"#tn02-1\" id=\"tn02-1-ref\">[2-1]"
-"</a>"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 # | Here is a suspicion that we can't prove, but is worth thinking about: <a
 # | 
href=\"http{+s+}://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI\";>
@@ -11649,6 +11625,38 @@
 "\">Tyrannische Software in Intel-Prozessoren eingebaut</a><a href=\"#tn01\" "
 "id=\"tn01-ref\" class=\"transnote\">[1]</a>."
 
+#   [2] 
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
+# [2-1] 
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
 („Dementi“)
+# | {+The+} German government <a
+# | 
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers-]
+# | 
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers+}
+# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
+# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/";
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/";
+#~ "web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
+#~ "\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 – "
+#~ "Linked to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive)."
+#~ "\"><ins cite=\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/";
+#~ "Presse2013/Windows_TPM_Pl_21082013.html\">„… einige kritische Aspekte 
im "
+#~ "Zusammenhang mit bestimmten Einsatzszenarien, in denen Windows 8 in "
+#~ "Kombination mit einer Hardware betrieben wird, die über ein TPM 2.0 "
+#~ "verfügt.“</ins></a><a href=\"#tn02\" id=\"tn02-ref\">[2]</a><a href="
+#~ "\"#tn02-1\" id=\"tn02-1-ref\">[2-1]</a>"
+
 # | Anova sabotaged users' cooking devices with a downgrade that tethered them
 # | to a remote server. <a
 # | 
href=\"https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062\";>Unless

Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- es.po       5 Mar 2019 11:29:45 -0000       1.54
+++ es.po       6 Mar 2019 09:30:53 -0000       1.55
@@ -4004,15 +4004,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"El Gobierno alemán <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">evita "
-"los ordenadores con Windows 8 provistos del chip TPM 2.0</a> debido a que "
-"este chip permite la creación de puertas traseras."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -8781,6 +8778,17 @@
 "procesadores Intel incorporarán software tirano</a>."
 
 #~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "El Gobierno alemán <a href=\"http://drleonardcoldwell.com/leaked-german-";
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">evita "
+#~ "los ordenadores con Windows 8 provistos del chip TPM 2.0</a> debido a que "
+#~ "este chip permite la creación de puertas traseras."
+
+#~ msgid ""
 #~ "Amazon Ring &ldquo;security&rdquo; devices <a href=\"https://www.engadget.";
 #~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
 #~ "the video they capture to Amazon servers</a> which save it permanently."

Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- fr.po       4 Mar 2019 20:20:41 -0000       1.71
+++ fr.po       6 Mar 2019 09:30:53 -0000       1.72
@@ -4475,15 +4475,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-";
-"german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0 
parce "
-"que cette puce permet de créer des portes dérobées</a>."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -9577,3 +9574,14 @@
 msgstr ""
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>Les "
 "processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0 "
+#~ "parce que cette puce permet de créer des portes dérobées</a>."

Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- it.po       4 Mar 2019 09:00:09 -0000       1.41
+++ it.po       6 Mar 2019 09:30:53 -0000       1.42
@@ -5245,29 +5245,14 @@
 "computer-microsoft-probably-has-your-encryption-key/\"> Microsoft ha già "
 "inserito una backdoor nel suo sistema di cifratura dei dischi</a>."
 
-# | {+The+} German government <a
-# | 
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers-]
-# | 
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/";
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/";
-"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-";
-"entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai computer "
-"Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel chip TPM 2.0."
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 # | {+Here is a suspicion that we can't prove, but is worth thinking about:+}
 # | <a
@@ -10941,6 +10926,30 @@
 "<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>I "
 "processori Intel avranno del software tiranno preinstallato</a>."
 
+# | {+The+} German government <a
+# | 
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers-]
+# | 
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers+}
+# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
+# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/";
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/";
+#~ "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
+#~ "key-entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai "
+#~ "computer Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel "
+#~ "chip TPM 2.0."
+
 # | Anova sabotaged users' cooking devices with a downgrade that tethered them
 # | to a remote server. <a
 # | 
href=\"https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062\";>Unless

Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- ja.po       4 Mar 2019 09:00:09 -0000       1.41
+++ ja.po       6 Mar 2019 09:30:53 -0000       1.42
@@ -4505,22 +4505,13 @@
 
"ディスク暗号化にすでにバックドアを仕掛けています</a>。"
 
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"https://web.archive.";
-#| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-";
-#| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-#| "\"> the German government has decided it can't be trusted</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"ウィンドウズ8のバックドアは驚くべきもので、<a 
href=\"https://web.archive.org/";
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">ドイツ政"
-"府は、それは信用できない、と決定しました</a>。"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 #, fuzzy
@@ -9367,6 +9358,23 @@
 "<a 
href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\";>インテルの"
 
"プロセッサには暴君ソフトウェアが組み込まれるようになります</a>。"
 
+#, fuzzy
+#~| msgid ""
+#~| "Windows 8's back doors are so gaping that <a href=\"https://web.archive.";
+#~| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-";
+#~| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~| "\"> the German government has decided it can't be trusted</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "ウィンドウズ8のバックドアは驚くべきもので、<a 
href=\"https://web.archive.";
+#~ "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ 
"\">ドイツ政府は、それは信用できない、と決定しました</a>。"
+
 #~ msgid ""
 #~ "Various proprietary programs often mess up the user's system. They are "
 #~ "like sabotage, but they are not grave enough to qualify for the word "

Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-microsoft.de-diff.html      4 Feb 2019 07:31:22 -0000       1.35
+++ malware-microsoft.de-diff.html      6 Mar 2019 09:30:53 -0000       1.36
@@ -124,8 +124,10 @@
 
   &lt;li id="M201308230"&gt;
     &lt;p&gt;The German government &lt;a
-    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-    away from</em></ins></span> Windows 8 <span 
class="inserted"><ins><em>computers with TPM 2.0&lt;/a&gt;, due to potential 
back
+    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/"&gt;veers
+    away from</em></ins></span> Windows 8 <span 
class="inserted"><ins><em>computers with TPM 2.0&lt;/a&gt; (&lt;a
+    
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa"&gt;original
+    article in German&lt;/a&gt;), due to potential back
     door capabilities of the TPM 2.0 chip.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -177,8 +179,8 @@
     <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray"&gt;Bluray&lt;/a&gt;
 disks. 
     (The article talks about</em></ins></span> how <span 
class="removed"><del><strong>to permanently reject</strong></del></span> the 
<span class="removed"><del><strong>downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This seems to involve use of a back door in Windows 7 and 
8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>same malware 
would later be
-    introduced in MacOS.  That had not been done at the time, but it was
+    &lt;p&gt;This seems to involve use of a back door</strong></del></span> 
<span class="inserted"><ins><em>same malware would later be
+    introduced</em></ins></span> in <span class="removed"><del><strong>Windows 
7 and 8.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>MacOS. 
 That had not been done at the time, but it was
     done subsequently.)&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 &lt;/ul&gt;
@@ -870,7 +872,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/06 09:30:53 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- malware-microsoft.de.po     3 Feb 2019 15:59:41 -0000       1.131
+++ malware-microsoft.de.po     6 Mar 2019 09:30:53 -0000       1.132
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2018-07-20 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -235,38 +235,14 @@
 "Encryption Key, The Intercept, 2015.\">Festplattenverschlüsselung bereits "
 "hintergangen</a>."
 
-#   [2] 
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
-# [2-1] 
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
 („Dementi“)
 #. type: Content of: <ul><li><p>
-# | {+The+} German government <a
-# | 
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers-]
-# | 
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/";
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/";
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
-"\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 – 
Linked "
-"to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive).\"><ins cite="
-"\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/";
-"Windows_TPM_Pl_21082013.html\">„… einige kritische Aspekte im 
Zusammenhang "
-"mit bestimmten Einsatzszenarien, in denen Windows 8 in Kombination mit einer "
-"Hardware betrieben wird, die über ein TPM 2.0 verfügt.“</ins></a><a href="
-"\"#tn02\" id=\"tn02-ref\">[2]</a><a href=\"#tn02-1\" id=\"tn02-1-ref\">[2-1]"
-"</a>"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 # | Here is a suspicion that we can't prove, but is worth thinking about: <a
@@ -1471,6 +1447,33 @@
 msgid "Updated:"
 msgstr "Letzte Änderung:"
 
+#   [2] 
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
+# [2-1] 
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
 („Dementi“)
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/";
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/";
+#~ "web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
+#~ "\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 – "
+#~ "Linked to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive)."
+#~ "\"><ins cite=\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/";
+#~ "Presse2013/Windows_TPM_Pl_21082013.html\">„… einige kritische Aspekte 
im "
+#~ "Zusammenhang mit bestimmten Einsatzszenarien, in denen Windows 8 in "
+#~ "Kombination mit einer Hardware betrieben wird, die über ein TPM 2.0 "
+#~ "verfügt.“</ins></a><a href=\"#tn02\" id=\"tn02-ref\">[2]</a><a href="
+#~ "\"#tn02-1\" id=\"tn02-1-ref\">[2-1]</a>"
+
 #~ msgid ""
 #~ "Various proprietary programs often mess up the user's system. They are "
 #~ "like sabotage, but they are not grave enough to qualify for the word "

Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-microsoft.es.po     12 Feb 2019 10:27:18 -0000      1.133
+++ malware-microsoft.es.po     6 Mar 2019 09:30:53 -0000       1.134
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: \n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
 "X-Generator: Poedit 1.8.11\n"
 
 #. type: Content of: <title>
@@ -192,15 +193,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"El Gobierno alemán <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">evita "
-"los ordenadores con Windows 8 provistos del chip TPM 2.0</a> debido a que "
-"este chip permite la creación de puertas traseras."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1101,6 +1099,17 @@
 msgstr "Última actualización:"
 
 #~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "El Gobierno alemán <a href=\"http://drleonardcoldwell.com/leaked-german-";
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">evita "
+#~ "los ordenadores con Windows 8 provistos del chip TPM 2.0</a> debido a que "
+#~ "este chip permite la creación de puertas traseras."
+
+#~ msgid ""
 #~ "Various proprietary programs often mess up the user's system. They are "
 #~ "like sabotage, but they are not grave enough to qualify for the word "
 #~ "&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This "

Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- malware-microsoft.fr.po     3 Feb 2019 16:59:25 -0000       1.151
+++ malware-microsoft.fr.po     6 Mar 2019 09:30:53 -0000       1.152
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2019-02-03 17:41+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -191,15 +192,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-";
-"german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0 
parce "
-"que cette puce permet de créer des portes dérobées</a>."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1092,3 +1090,14 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0 "
+#~ "parce que cette puce permet de créer des portes dérobées</a>."

Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-microsoft.it-diff.html      8 Feb 2019 09:30:03 -0000       1.35
+++ malware-microsoft.it-diff.html      6 Mar 2019 09:30:54 -0000       1.36
@@ -123,8 +123,10 @@
 
   &lt;li id="M201308230"&gt;
     &lt;p&gt;The German government &lt;a
-    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-    away from</em></ins></span> Windows 8 <span 
class="inserted"><ins><em>computers with TPM 2.0&lt;/a&gt;, due to potential 
back
+    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/"&gt;veers
+    away from</em></ins></span> Windows 8 <span 
class="inserted"><ins><em>computers with TPM 2.0&lt;/a&gt; (&lt;a
+    
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa"&gt;original
+    article in German&lt;/a&gt;), due to potential back
     door capabilities of the TPM 2.0 chip.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -295,9 +297,9 @@
   &lt;li&gt;&lt;p&gt;Once Microsoft has tricked a user into accepting 
installation
    of Windows
    10, &lt;a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/"&gt;they
-   find that</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt; when</em></ins></span> they <span 
class="removed"><del><strong>are denied the option to cancel or even 
postpone</strong></del></span> <span class="inserted"><ins><em>had turned
-    it off, in</em></ins></span> the
-   <span class="removed"><del><strong>imposed date</strong></del></span> <span 
class="inserted"><ins><em>hope that some day they would fail to say no.
+   find that</strong></del></span> <span 
class="inserted"><ins><em>10&lt;/a&gt; when</em></ins></span> they <span 
class="removed"><del><strong>are denied</strong></del></span> <span 
class="inserted"><ins><em>had turned
+    it off, in</em></ins></span> the <span 
class="removed"><del><strong>option</strong></del></span> <span 
class="inserted"><ins><em>hope that some day they would fail</em></ins></span> 
to <span class="removed"><del><strong>cancel or even postpone the
+   imposed date</strong></del></span> <span class="inserted"><ins><em>say no.
     To do this, Microsoft used &lt;a
     
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"&gt;
     malware techniques&lt;/a&gt;.&lt;/p&gt;
@@ -860,7 +862,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:03 $
+$Date: 2019/03/06 09:30:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- malware-microsoft.it.po     8 Feb 2019 08:59:35 -0000       1.137
+++ malware-microsoft.it.po     6 Mar 2019 09:30:54 -0000       1.138
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2017-12-31 13:06+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -221,28 +221,13 @@
 "inserito una backdoor nel suo sistema di cifratura dei dischi</a>."
 
 #. type: Content of: <ul><li><p>
-# | {+The+} German government <a
-# | 
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers-]
-# | 
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/";
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/";
-"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-";
-"entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai computer "
-"Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel chip TPM 2.0."
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 # | {+Here is a suspicion that we can't prove, but is worth thinking about:+}
@@ -1378,6 +1363,25 @@
 msgid "Updated:"
 msgstr "Ultimo aggiornamento:"
 
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/";
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/";
+#~ "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
+#~ "key-entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai "
+#~ "computer Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel "
+#~ "chip TPM 2.0."
+
 #~ msgid ""
 #~ "Various proprietary programs often mess up the user's system. They are "
 #~ "like sabotage, but they are not grave enough to qualify for the word "

Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-microsoft.ja-diff.html      4 Feb 2019 07:31:22 -0000       1.44
+++ malware-microsoft.ja-diff.html      6 Mar 2019 09:30:54 -0000       1.45
@@ -131,8 +131,10 @@
 
   &lt;li id="M201308230"&gt;
     &lt;p&gt;The German government &lt;a
-    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-    away from</em></ins></span> Windows 8 <span 
class="inserted"><ins><em>computers with TPM 2.0&lt;/a&gt;, due to potential 
back
+    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/"&gt;veers
+    away from</em></ins></span> Windows 8 <span 
class="inserted"><ins><em>computers with TPM 2.0&lt;/a&gt; (&lt;a
+    
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa"&gt;original
+    article in German&lt;/a&gt;), due to potential back
     door capabilities of the TPM 2.0 chip.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -196,7 +198,7 @@
 &lt;h3 id="insecurity"&gt;Microsoft Insecurity&lt;/h3&gt;
 
 <span class="removed"><del><strong>&lt;ul&gt;
-    &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet Explorer and</strong></del></span>
+    &lt;li&gt;&lt;p&gt;A &lt;a 
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
 in Internet</strong></del></span>
 
 <span class="inserted"><ins><em>&lt;p&gt;These bugs are/were not intentional, 
so unlike the rest of the file
   they do not count as malware. We mention them to refute the
@@ -214,7 +216,7 @@
   &lt;li id="M201608020"&gt;
     &lt;p&gt;A &lt;a
     
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/"&gt;flaw
-    in Internet Explorer and</em></ins></span> Edge&lt;/a&gt; allows an 
attacker to retrieve
+    in Internet</em></ins></span> Explorer and Edge&lt;/a&gt; allows an 
attacker to retrieve
     Microsoft account credentials, if the user is tricked into visiting
     a malicious link.&lt;/p&gt;
   &lt;/li&gt;
@@ -834,7 +836,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/06 09:30:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- malware-microsoft.ja.po     3 Feb 2019 15:59:41 -0000       1.111
+++ malware-microsoft.ja.po     6 Mar 2019 09:30:54 -0000       1.112
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2016-12-20 14:57+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -200,22 +200,13 @@
 
"ディスク暗号化にすでにバックドアを仕掛けています</a>。"
 
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"https://web.archive.";
-#| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-";
-#| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-#| "\"> the German government has decided it can't be trusted</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"ウィンドウズ8のバックドアは驚くべきもので、<a 
href=\"https://web.archive.org/";
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">ドイツ政"
-"府は、それは信用できない、と決定しました</a>。"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 #, fuzzy
@@ -1143,6 +1134,23 @@
 msgid "Updated:"
 msgstr "最終更新:"
 
+#, fuzzy
+#~| msgid ""
+#~| "Windows 8's back doors are so gaping that <a href=\"https://web.archive.";
+#~| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-";
+#~| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~| "\"> the German government has decided it can't be trusted</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "ウィンドウズ8のバックドアは驚くべきもので、<a 
href=\"https://web.archive.";
+#~ "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ 
"\">ドイツ政府は、それは信用できない、と決定しました</a>。"
+
 #~ msgid ""
 #~ "Various proprietary programs often mess up the user's system. They are "
 #~ "like sabotage, but they are not grave enough to qualify for the word "

Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-microsoft.pot       3 Feb 2019 15:59:41 -0000       1.75
+++ malware-microsoft.pot       6 Mar 2019 09:30:54 -0000       1.76
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -145,9 +145,11 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The German government <a "
-"href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers
 "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"href=\"https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/\";>veers
 "
+"away from Windows 8 computers with TPM 2.0</a> (<a "
+"href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa\";>original
 "
+"article in German</a>), due to potential back door capabilities of the TPM "
+"2.0 chip."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- malware-microsoft.ru.po     25 Feb 2019 09:37:05 -0000      1.196
+++ malware-microsoft.ru.po     6 Mar 2019 09:30:54 -0000       1.197
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2018-11-20 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
 
 #. type: Content of: <title>
 msgid ""
@@ -188,15 +189,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Правительство Германии <a 
href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">отвернулось от компьютеров под Windows&nbsp;8 
с TPM&nbsp;2.0</a> из-за "
-"потенциальной лазейки в микросхеме 
TPM&nbsp;2.0."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1087,6 +1085,17 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Правительство Германии <a 
href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">отвернулось от компьютеров под 
Windows&nbsp;8 с TPM&nbsp;2.0</a> из-за "
+#~ "потенциальной лазейки в микросхеме 
TPM&nbsp;2.0."
+
+#~ msgid ""
 #~ "Various proprietary programs often mess up the user's system. They are "
 #~ "like sabotage, but they are not grave enough to qualify for the word "
 #~ "&ldquo;sabotage&rdquo;. Nonetheless, they are nasty and wrong. This "

Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- nl.po       4 Mar 2019 09:00:10 -0000       1.41
+++ nl.po       6 Mar 2019 09:30:54 -0000       1.42
@@ -3671,10 +3671,11 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- pl.po       4 Mar 2019 09:00:10 -0000       1.41
+++ pl.po       6 Mar 2019 09:30:54 -0000       1.42
@@ -3173,10 +3173,11 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- pot 4 Mar 2019 09:00:10 -0000       1.41
+++ pot 6 Mar 2019 09:30:54 -0000       1.42
@@ -2999,10 +2999,11 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-back-doors.de-diff.html 4 Feb 2019 07:31:23 -0000       1.21
+++ proprietary-back-doors.de-diff.html 6 Mar 2019 09:30:54 -0000       1.22
@@ -680,8 +680,10 @@
     &lt;p&gt;The German</em></ins></span> government &lt;a
       <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
       veers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers</em></ins></span>
-    away from Windows 8 computers with TPM <span 
class="removed"><del><strong>2.0</strong></del></span> <span 
class="inserted"><ins><em>2.0&lt;/a&gt;,</em></ins></span> due to potential back
+    <span 
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/"&gt;veers</em></ins></span>
+    away from Windows 8 computers with TPM <span 
class="removed"><del><strong>2.0</strong></del></span> <span 
class="inserted"><ins><em>2.0&lt;/a&gt; (&lt;a
+    
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa"&gt;original
+    article in German&lt;/a&gt;),</em></ins></span> due to potential back
     door capabilities of the TPM 2.0 <span 
class="removed"><del><strong>chip&lt;/a&gt;.&lt;/p&gt;</strong></del></span> 
<span class="inserted"><ins><em>chip.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
@@ -756,7 +758,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/03/06 09:30:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary-back-doors.de.po        19 Jan 2019 09:30:12 -0000      1.120
+++ proprietary-back-doors.de.po        6 Mar 2019 09:30:54 -0000       1.121
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2018-08-29 03:06+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -1070,38 +1070,14 @@
 "Fälle bekannt, aber jedes proprietäre Programm was der Verschlüsselung 
dient "
 "ist eine potentielle Möglichkeit."
 
-#   [1] 
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
-# [1-1] 
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
 („Dementi“)
 #. type: Content of: <ul><li><p>
-# | {+The+} German government <a
-# | 
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers-]
-# | 
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/";
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/";
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
-"\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 – 
Linked "
-"to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive).\"><ins cite="
-"\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/";
-"Windows_TPM_Pl_21082013.html\">„… einige kritische Aspekte im 
Zusammenhang "
-"mit bestimmten Einsatzszenarien, in denen Windows 8 in Kombination mit einer "
-"Hardware betrieben wird, die über ein TPM 2.0 verfügt.“</ins></a><a href="
-"\"#tn01\" id=\"tn01-ref\" class=\"tnote\">[1]</a><a href=\"#tn01-1\" id="
-"\"tn01-1-ref\" class=\"tnote\">[1-1]</a>"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 # | Here is a suspicion that we can't prove, but is worth thinking about: <a
@@ -1277,6 +1253,33 @@
 msgid "Updated:"
 msgstr "Letzte Änderung:"
 
+#   [1] 
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
+# [1-1] 
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
 („Dementi“)
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/";
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/";
+#~ "web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
+#~ "\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 – "
+#~ "Linked to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive)."
+#~ "\"><ins cite=\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/";
+#~ "Presse2013/Windows_TPM_Pl_21082013.html\">„… einige kritische Aspekte 
im "
+#~ "Zusammenhang mit bestimmten Einsatzszenarien, in denen Windows 8 in "
+#~ "Kombination mit einer Hardware betrieben wird, die über ein TPM 2.0 "
+#~ "verfügt.“</ins></a><a href=\"#tn01\" id=\"tn01-ref\" 
class=\"tnote\">[1]</"
+#~ "a><a href=\"#tn01-1\" id=\"tn01-1-ref\" class=\"tnote\">[1-1]</a>"
+
 #~ msgid ""
 #~ "WhatsApp <a href=\"https://www.theguardian.com/technology/2017/jan/13/";
 #~ "whatsapp-backdoor-allows-snooping-on-encrypted-messages\"> has a back "

Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary-back-doors.fr.po        19 Jan 2019 10:10:02 -0000      1.119
+++ proprietary-back-doors.fr.po        6 Mar 2019 09:30:54 -0000       1.120
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2019-01-19 10:56+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -911,15 +912,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-";
-"german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0 
parce "
-"que cette puce permet de créer des portes dérobées</a>."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1035,3 +1033,14 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0 "
+#~ "parce que cette puce permet de créer des portes dérobées</a>."

Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-back-doors.it-diff.html 8 Feb 2019 09:30:04 -0000       1.48
+++ proprietary-back-doors.it-diff.html 6 Mar 2019 09:30:54 -0000       1.49
@@ -688,8 +688,8 @@
     &lt;p&gt;Dell computers, shipped with
     Windows, had a bogus root certificate</em></ins></span> that <span 
class="removed"><del><strong>would give access</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;
-    allowed anyone (not just Dell) to remotely authorize any 
software</em></ins></span> to
-    <span class="inserted"><ins><em>run&lt;/a&gt; on</em></ins></span> the
+    allowed anyone (not just Dell)</em></ins></span> to <span 
class="inserted"><ins><em>remotely authorize any software to
+    run&lt;/a&gt; on</em></ins></span> the
 <span class="removed"><del><strong>customer's data.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -753,8 +753,10 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201308230"&gt;
     &lt;p&gt;The German government &lt;a
-    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-    away from Windows 8 computers with TPM 2.0&lt;/a&gt;, due to potential back
+    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/"&gt;veers
+    away from Windows 8 computers with TPM 2.0&lt;/a&gt; (&lt;a
+    
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa"&gt;original
+    article in German&lt;/a&gt;), due to potential back
     door capabilities of the TPM 2.0 chip.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -831,7 +833,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/03/06 09:30:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary-back-doors.it.po        8 Feb 2019 08:59:36 -0000       1.113
+++ proprietary-back-doors.it.po        6 Mar 2019 09:30:54 -0000       1.114
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2017-12-31 13:12+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -1113,28 +1113,13 @@
 "riteniamo a rischio ogni programma proprietario di crittografia."
 
 #. type: Content of: <ul><li><p>
-# | {+The+} German government <a
-# | 
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers-]
-# | 
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/";
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/";
-"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-";
-"entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai computer "
-"Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel chip TPM 2.0."
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 # | {+Here is a suspicion that we can't prove, but is worth thinking about:+}
@@ -1285,6 +1270,25 @@
 
 #, fuzzy
 #~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/";
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/";
+#~ "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-";
+#~ "key-entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai "
+#~ "computer Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel "
+#~ "chip TPM 2.0."
+
+#, fuzzy
+#~| msgid ""
 #~| "WhatsApp <a href=\"https://www.theguardian.com/technology/2017/jan/13/";
 #~| "whatsapp-backdoor-allows-snooping-on-encrypted-messages\">has a back "
 #~| "door that the company can use to read the plaintext of messages</a>."

Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-back-doors.ja-diff.html 4 Feb 2019 07:31:23 -0000       1.44
+++ proprietary-back-doors.ja-diff.html 6 Mar 2019 09:30:54 -0000       1.45
@@ -240,197 +240,240 @@
     remotely erase books&lt;/a&gt;.  One of</em></ins></span> the <span 
class="removed"><del><strong>backdoor&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
   &lt;li&gt;&lt;p&gt;Caterpillar vehicles come with
-     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door</strong></del></span> <span class="inserted"><ins><em>books erased 
was
-    &lt;cite&gt;1984&lt;/cite&gt;, by George Orwell.&lt;/p&gt;
-
-    &lt;p&gt;Amazon responded</em></ins></span> to <span 
class="removed"><del><strong>shutoff</strong></del></span> <span 
class="inserted"><ins><em>criticism by saying it
-    would delete books only following orders from</em></ins></span> the <span 
class="removed"><del><strong>engine&lt;/a&gt;
+     &lt;a 
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it"&gt;a
 back-door to shutoff the engine&lt;/a&gt;
      remotely.&lt;/p&gt;
   &lt;/li&gt;
 &lt;li&gt;&lt;p&gt;
-Mac OS X had an</strong></del></span>
-    <span class="inserted"><ins><em>state.  However, that policy didn't last.  
In 2012 it</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
-intentional local</strong></del></span>
+Mac OS X had an &lt;a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/"&gt;
+intentional local back door for 4 years&lt;/a&gt;.
+&lt;/p&gt;&lt;/li&gt;
+
+&lt;li&gt;&lt;p&gt;Users reported that &lt;a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
+    Microsoft</strong></del></span> <span class="inserted"><ins><em>books 
erased</em></ins></span> was <span class="removed"><del><strong>forcing 
them</strong></del></span>
+    <span class="inserted"><ins><em>&lt;cite&gt;1984&lt;/cite&gt;, by George 
Orwell.&lt;/p&gt;
+
+    &lt;p&gt;Amazon responded</em></ins></span> to <span 
class="removed"><del><strong>replace Windows 7 and 8 with all-spying 
+    Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;Microsoft was in fact &lt;a 
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
+    attacking computers that run Windows 7 and 8&lt;/a&gt;, switching on a 
flag</strong></del></span> <span class="inserted"><ins><em>criticism by saying 
it
+    would delete books only following orders from the
+    state.  However,</em></ins></span> that <span 
class="removed"><del><strong>said whether to &ldquo;upgrade&rdquo; to Windows 
10 when users 
+    had turned</strong></del></span> <span class="inserted"><ins><em>policy 
didn't last.  In 2012</em></ins></span> it <span 
class="removed"><del><strong>off.&lt;/p&gt;
+
+    &lt;p&gt;Later on, Microsoft published instructions 
on</strong></del></span> &lt;a 
+    <span 
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
+    how to permanently reject the downgrade to Windows 10&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;This seems to involve use of</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html"&gt;
-    wiped a user's Kindle-Swindle and deleted her account&lt;/a&gt;, then
+    wiped</em></ins></span> a <span class="inserted"><ins><em>user's 
Kindle-Swindle and deleted her account&lt;/a&gt;, then
     offered her kafkaesque &ldquo;explanations.&rdquo;&lt;/p&gt;
 
-    &lt;p&gt;Do other ebook readers have back doors in their nonfree software? 
We
-    don't know, and we have no way to find out.  There is no reason to
+    &lt;p&gt;Do other ebook readers have</em></ins></span> back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>doors</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>their nonfree software? We
+    don't know,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Most mobile phones</strong></del></span> <span 
class="inserted"><ins><em>we</em></ins></span> have <span 
class="inserted"><ins><em>no way to find out.  There is no reason to
     assume that they don't.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201011220"&gt;
-    &lt;p&gt;The iPhone has a</em></ins></span> back door for <span 
class="removed"><del><strong>4 years&lt;/a&gt;.
-&lt;/p&gt;&lt;/li&gt;
-
-&lt;li&gt;&lt;p&gt;Users reported that</strong></del></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all"&gt;
-    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
-    Windows 10&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Microsoft was in fact</strong></del></span>
+    &lt;p&gt;The iPhone has</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door, which has been used to</strong></del></span> 
<span class="inserted"><ins><em>door for</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
+turn them malicious&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
     remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into
-    enabling it without understanding.&lt;/p&gt;
+    enabling it without understanding.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
-&lt;/ul&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
+A Chinese version of Android</strong></del></span>
+<span class="inserted"><ins><em>&lt;/ul&gt;
 
 
 &lt;h3 id='install-delete'&gt;Installing, deleting or disabling 
programs&lt;/h3&gt;
 
 &lt;ul class="blurbs"&gt;
   &lt;li id="M201811100"&gt;
-    &lt;p&gt;Corel Paintshop Pro has a</em></ins></span> &lt;a 
-    <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"&gt;
-    attacking computers</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
-    back door</em></ins></span> that <span class="removed"><del><strong>run 
Windows 7</strong></del></span> <span class="inserted"><ins><em>can make it 
cease to function&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;The article is full of confusions, errors</em></ins></span> and 
<span class="removed"><del><strong>8&lt;/a&gt;, switching on a 
flag</strong></del></span> <span 
class="inserted"><ins><em>biases</em></ins></span> that <span 
class="removed"><del><strong>said whether</strong></del></span> <span 
class="inserted"><ins><em>we have
-    an obligation</em></ins></span> to <span 
class="removed"><del><strong>&ldquo;upgrade&rdquo;</strong></del></span> <span 
class="inserted"><ins><em>expose, given that we are making a 
link</em></ins></span> to <span class="removed"><del><strong>Windows 10 when 
users 
-    had turned it off.&lt;/p&gt;
-
-    &lt;p&gt;Later on, Microsoft published instructions on &lt;a 
-    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/"&gt;
-    how</strong></del></span> <span class="inserted"><ins><em>them.&lt;/p&gt;
+    &lt;p&gt;Corel Paintshop Pro</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;</em></ins></span>
+    back <span class="removed"><del><strong>door&lt;/a&gt;. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>door that can 
make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full</em></ins></span> of <span 
class="removed"><del><strong>mobile phones</strong></del></span> <span 
class="inserted"><ins><em>confusions, errors and biases that 
we</em></ins></span> have
+    <span class="inserted"><ins><em>an obligation to expose, given that we are 
making</em></ins></span> a <span class="removed"><del><strong>universal back 
door</strong></del></span> <span class="inserted"><ins><em>link to 
them.&lt;/p&gt;
 
     &lt;ul&gt;
-    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a 
company</em></ins></span> to <span class="removed"><del><strong>permanently 
reject</strong></del></span> <span class="inserted"><ins><em>do
-    any particular thing in its products. What it does 
enable</em></ins></span> the <span 
class="removed"><del><strong>downgrade</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
-    to <span class="removed"><del><strong>Windows 10&lt;/a&gt;.&lt;/p&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing</em></ins></span> in <span 
class="inserted"><ins><em>its products. What it does enable</em></ins></span> 
the <span class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>company</em></ins></span>
+    to <span class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span> 
is <span class="removed"><del><strong>controlled
+by Coolpad.
+&lt;/p&gt;
+&lt;/li&gt;
 
-    &lt;p&gt;This seems</strong></del></span> <span 
class="inserted"><ins><em>do is sue other companies if they do some particular 
thing in
+&lt;li&gt;
+&lt;p&gt;Microsoft Windows has</strong></del></span> <span 
class="inserted"><ins><em>sue other companies if they do some particular thing 
in
     their products.&lt;/li&gt;
 
-    &lt;li&gt;A company's policies about when</em></ins></span> to <span 
class="removed"><del><strong>involve use of</strong></del></span> <span 
class="inserted"><ins><em>attack users through</em></ins></span> a back
-    door <span class="inserted"><ins><em>are beside the point. Inserting the 
back door is wrong</em></ins></span> in <span 
class="removed"><del><strong>Windows 7</strong></del></span> <span 
class="inserted"><ins><em>the
-    first place,</em></ins></span> and <span 
class="removed"><del><strong>8.&lt;/p&gt;
+    &lt;li&gt;A company's policies about when to attack users 
through</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back
+    door <span class="removed"><del><strong>through which
+&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
+any change whatsoever can be imposed on</strong></del></span> <span 
class="inserted"><ins><em>are beside</em></ins></span> the <span 
class="removed"><del><strong>users&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;More information on when
+&lt;a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+this was used&lt;/a&gt;.
+&lt;/p&gt;
+&lt;p&gt;In Windows 10,</strong></del></span> <span 
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span 
class="removed"><del><strong>universal</strong></del></span> back door is <span 
class="removed"><del><strong>no longer hidden; all
+&ldquo;upgrades&rdquo; will
+be &lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly</strong></del></span>
 <span class="inserted"><ins><em>wrong in the
+    first place,</em></ins></span> and <span 
class="removed"><del><strong>immediately imposed&lt;/a&gt;.
+&lt;/p&gt;
 &lt;/li&gt;
 
 &lt;li&gt;
-&lt;p&gt;Most mobile phones have a universal</strong></del></span> <span 
class="inserted"><ins><em>using the</em></ins></span> back <span 
class="removed"><del><strong>door, which has been used</strong></del></span> 
<span class="inserted"><ins><em>door is always wrong too. No software
-    developer should have that power over users.&lt;/li&gt;
+&lt;p&gt;Windows 8's</strong></del></span> <span 
class="inserted"><ins><em>using the</em></ins></span> back <span 
class="removed"><del><strong>doors are so gaping</strong></del></span> <span 
class="inserted"><ins><em>door is always wrong too. No software
+    developer should have</em></ins></span> that <span 
class="inserted"><ins><em>power over users.&lt;/li&gt;
 
     &lt;li&gt;&ldquo;&lt;a
     href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
-    attacking ships. Using that word</em></ins></span> to <span 
class="inserted"><ins><em>refer to sharing copies is a smear;
+    attacking ships. Using that word to refer to sharing copies is a smear;
     please don't smear sharing.&lt;/li&gt;
 
     &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
-    total confusion. The term &ldquo;IP&rdquo; itself is a</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html"&gt;
-turn them malicious&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span>
+    total confusion. The term &ldquo;IP&rdquo; itself is a</em></ins></span> 
&lt;a <span 
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;</strong></del></span>
     <span class="inserted"><ins><em>href="/philosophy/not-ipr.html"&gt;bogus 
generalization about things
     that have nothing in common&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
-    generalization is a separate absurdity. It's like calling the cops
+    generalization is a separate absurdity. It's like 
calling</em></ins></span> the <span class="removed"><del><strong>German 
government has decided</strong></del></span> <span 
class="inserted"><ins><em>cops
     because neighbors' kids are playing on your front yard, and saying
     that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
-    to the boundary line, not even with a jackhammer, because it is an
-    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    to the boundary line, not even with a jackhammer, 
because</em></ins></span> it <span class="inserted"><ins><em>is an
+    abstraction and</em></ins></span> can't be <span 
class="removed"><del><strong>trusted&lt;/a&gt;.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>affected by 
physical action.&lt;/p&gt;&lt;/li&gt;
     &lt;/ul&gt;</em></ins></span>
   &lt;/li&gt;
 
 <span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor"&gt;
-A Chinese version</strong></del></span>
+&lt;p&gt;The iPhone has a back door
+&lt;a 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;</strong></del></span>
 
   <span class="inserted"><ins><em>&lt;li id="M201804010"&gt;
     &lt;p&gt;Some &ldquo;Smart&rdquo; TVs automatically &lt;a
     
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928"&gt;
-    load downgrades that install a surveillance app&lt;/a&gt;.&lt;/p&gt;
+    load downgrades</em></ins></span> that <span 
class="removed"><del><strong>allows Apple</strong></del></span> <span 
class="inserted"><ins><em>install a surveillance app&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;We link to the article for the facts it presents. It
+    &lt;p&gt;We link</em></ins></span> to <span 
class="removed"><del><strong>remotely delete apps&lt;/a&gt; which Apple 
considers
+&ldquo;inappropriate&rdquo;.  Jobs said it's ok</strong></del></span> <span 
class="inserted"><ins><em>the article</em></ins></span> for <span 
class="removed"><del><strong>Apple to have this power
+because</strong></del></span> <span class="inserted"><ins><em>the facts it 
presents. It
     is too bad that the article finishes by advocating the
-    moral weakness</em></ins></span> of <span 
class="inserted"><ins><em>surrendering to Netflix. The Netflix app &lt;a
+    moral weakness</em></ins></span> of <span 
class="removed"><del><strong>course we can trust Apple.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>surrendering 
to Netflix. The Netflix app &lt;a
     href="/proprietary/malware-google.html#netflix-app-geolocation-drm"&gt;is
-    malware too&lt;/a&gt;.&lt;/p&gt;
+    malware too&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201511090"&gt;
-    &lt;p&gt;Baidu's proprietary</em></ins></span> Android <span 
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> back <span 
class="removed"><del><strong>door&lt;/a&gt;. Nearly all
-models of mobile phones have</strong></del></span> <span 
class="inserted"><ins><em>door that &lt;a
-    
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
-    can &ldquo;upload files&rdquo; as well as forcibly install
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;The iPhone</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201511090"&gt;
+    &lt;p&gt;Baidu's proprietary Android library, Moplus,</em></ins></span> 
has a back door <span class="removed"><del><strong>for
+&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
+remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
+it without understanding.
+&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+  &lt;p&gt;Apple can, and regularly does,
+    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
+  remotely extract some data from iPhones for the state&lt;/a&gt;.
+  &lt;/p&gt;
+  &lt;p&gt;This may have improved with
+  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
+  iOS 8 security improvements&lt;/a&gt;; but</strong></del></span> <span 
class="inserted"><ins><em>that</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
+  not</strong></del></span>
+    <span 
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"&gt;
+    can &ldquo;upload files&rdquo;</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>well</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>forcibly install
     apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;It is used by 14,000 Android applications.&lt;/p&gt;
+    &lt;p&gt;It is used by 14,000 Android 
applications.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201112080"&gt;
+
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201112080"&gt;
     &lt;p&gt; In addition to its &lt;a href="#windows-update"&gt;universal back
-    door&lt;/a&gt;, Windows 8 has</em></ins></span> a <span 
class="removed"><del><strong>universal</strong></del></span> back door <span 
class="removed"><del><strong>in the modem chip. So
-why did Coolpad bother</strong></del></span> <span 
class="inserted"><ins><em>for &lt;a
-    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-    remotely deleting apps&lt;/a&gt;.&lt;/p&gt;
+    door&lt;/a&gt;,</em></ins></span> Windows 8 <span 
class="removed"><del><strong>also</strong></del></span> has a back door for 
<span class="inserted"><ins><em>&lt;a
+    
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;</em></ins></span>
+    remotely deleting <span class="removed"><del><strong>apps&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;
+You</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;You might well decide</em></ins></span> to <span 
class="removed"><del><strong>introduce another? Because this 
one</strong></del></span> <span class="inserted"><ins><em>let a security 
service that you trust
+    &lt;p&gt;You</em></ins></span> might well decide to let a security service 
that you trust
     remotely &lt;em&gt;deactivate&lt;/em&gt; programs that it considers 
malicious.
-    But there</em></ins></span> is <span 
class="removed"><del><strong>controlled
-by Coolpad.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>no excuse for 
&lt;em&gt;deleting&lt;/em&gt; the programs, and you
-    should have the right to decide whom (if anyone) to trust in this
-    way.&lt;/p&gt;</em></ins></span>
+    But there is no excuse for &lt;em&gt;deleting&lt;/em&gt; the programs, and 
you
+    should have the right to decide <span 
class="removed"><del><strong>who</strong></del></span> <span 
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this 
<span class="removed"><del><strong>way.
+&lt;/p&gt;
+
+&lt;p&gt;
+As these pages show, if you do want to clean your computer of malware,
+the first software to delete is Windows or iOS.
+&lt;/p&gt;</strong></del></span>
+    <span class="inserted"><ins><em>way.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;Microsoft Windows</strong></del></span>
+<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;
+  <span class="inserted"><ins><em>&lt;li id="M201103070"&gt;</em></ins></span>
     &lt;p&gt;In Android, &lt;a
     
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-    Google</em></ins></span> has a <span 
class="removed"><del><strong>universal</strong></del></span> back door <span 
class="removed"><del><strong>through</strong></del></span> <span 
class="inserted"><ins><em>to remotely delete apps&lt;/a&gt;. (It was in a
-    program called GTalkService,</em></ins></span> which
-<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"&gt;
-any change whatsoever</strong></del></span> <span 
class="inserted"><ins><em>seems since then to have been
-    merged into Google Play.)&lt;/p&gt;
-
-    &lt;p&gt;Google</em></ins></span> can <span 
class="removed"><del><strong>be imposed on the users&lt;/a&gt;.
-&lt;/p&gt;
-&lt;p&gt;More information on when</strong></del></span> <span 
class="inserted"><ins><em>also</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-this was used&lt;/a&gt;.
+    Google has a back door to remotely delete <span 
class="removed"><del><strong>apps.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>apps&lt;/a&gt;.</em></ins></span> (It <span 
class="removed"><del><strong>is</strong></del></span> <span 
class="inserted"><ins><em>was</em></ins></span> in a
+    program called <span class="removed"><del><strong>GTalkService).
 &lt;/p&gt;
-&lt;p&gt;In Windows 10, the</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-    forcibly and remotely install apps&lt;/a&gt; through GTalkService.  This is
-    not equivalent to a</em></ins></span> universal back <span 
class="removed"><del><strong>door</strong></del></span> <span 
class="inserted"><ins><em>door, but permits various dirty
-    tricks.&lt;/p&gt;
-
-    &lt;p&gt;Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has 
not been
-    malicious so far, the point</em></ins></span> is <span 
class="removed"><del><strong>no longer hidden; all
-&ldquo;upgrades&rdquo; will</strong></del></span> <span 
class="inserted"><ins><em>that nobody should have such power,
-    which could also</em></ins></span> be <span 
class="removed"><del><strong>&lt;a 
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;forcibly
-and immediately imposed&lt;/a&gt;.
+
+&lt;p&gt;</strong></del></span> <span class="inserted"><ins><em>GTalkService, 
which seems since then to have been
+    merged into</em></ins></span> Google <span 
class="inserted"><ins><em>Play.)&lt;/p&gt;
+
+    &lt;p&gt;Google</em></ins></span> can also &lt;a
+    
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
+    forcibly and remotely install apps&lt;/a&gt; through <span 
class="removed"><del><strong>GTalkService (which
+seems, since that article, to have been merged into Google 
Play).</strong></del></span> <span 
class="inserted"><ins><em>GTalkService.</em></ins></span>  This is
+    not equivalent to a universal back door, but permits various dirty <span 
class="removed"><del><strong>tricks.
 &lt;/p&gt;
-&lt;/li&gt;
 
-&lt;li&gt;
-&lt;p&gt;Windows 8's back doors are so gaping</strong></del></span> <span 
class="inserted"><ins><em>used maliciously.  You might well decide to
-    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; 
programs</em></ins></span> that
-<span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;
-the German government has decided</strong></del></span>
-    it <span class="removed"><del><strong>can't be trusted&lt;/a&gt;.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>considers 
malicious.  But there is no excuse for allowing it to
-    &lt;em&gt;delete&lt;/em&gt; the programs, and you should have the right to 
decide
-    who (if anyone) to trust in this way.&lt;/p&gt;</em></ins></span>
-  &lt;/li&gt;
+&lt;p&gt;
+Although</strong></del></span>
+    <span class="inserted"><ins><em>tricks.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
+    &lt;p&gt;Although</em></ins></span> Google's &lt;em&gt;exercise&lt;/em&gt; 
of this power has not been
+    malicious so far, the point is that nobody should have such power,
+    which could also be used maliciously.  You might well decide to
+    let a security service remotely &lt;em&gt;deactivate&lt;/em&gt; programs 
that
+    it considers malicious.  But there is no excuse for allowing it to <span 
class="removed"><del><strong>&lt;em&gt;delete&lt;/em&gt;</strong></del></span>
+    <span class="inserted"><ins><em>&lt;em&gt;delete&lt;/em&gt; the programs, 
and you should have the right to decide
+    who (if anyone) to trust in this way.&lt;/p&gt;
+  &lt;/li&gt;
 
-  <span class="inserted"><ins><em>&lt;li id="M200808110"&gt;</em></ins></span>
+  &lt;li id="M200808110"&gt;
     &lt;p&gt;The iPhone has a back door &lt;a
     
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"&gt;
     that allows Apple to remotely delete apps&lt;/a&gt; which Apple considers
-    &ldquo;inappropriate&rdquo;.  Jobs said it's <span 
class="removed"><del><strong>ok</strong></del></span> <span 
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
-    this power because of course we can trust <span 
class="removed"><del><strong>Apple.
-&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>Apple.&lt;/p&gt;</em></ins></span>
+    &ldquo;inappropriate&rdquo;.  Jobs said it's OK for Apple to have
+    this power because of course we can trust Apple.&lt;/p&gt;
   &lt;/li&gt;
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;The iPhone has</strong></del></span>
-<span class="inserted"><ins><em>&lt;/ul&gt;
+&lt;/ul&gt;
 
 
 &lt;h3 id='universal'&gt;Full control&lt;/h3&gt;
@@ -439,136 +482,82 @@
   &lt;li id="M201812300"&gt;
     &lt;p&gt;New GM cars &lt;a
     href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html"&gt;
-    offer the feature of</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door for
-&lt;a 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone"&gt;
-remote wipe&lt;/a&gt;.  It's not always enabled, but users are led into 
enabling
-it without understanding.
-&lt;/p&gt;
-&lt;/li&gt;
+    offer the feature of a universal back door&lt;/a&gt;.&lt;/p&gt;
 
-&lt;li&gt;
-  &lt;p&gt;Apple can, and regularly does,
-    &lt;a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"&gt;
-  remotely extract some data from iPhones for</strong></del></span> <span 
class="inserted"><ins><em>door&lt;/a&gt;.&lt;/p&gt;
-
-    &lt;p&gt;Every nonfree program offers</em></ins></span> the <span 
class="removed"><del><strong>state&lt;/a&gt;.
-  &lt;/p&gt;
-  &lt;p&gt;This may have improved with
-  &lt;a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html"&gt;
-  iOS 8</strong></del></span> <span class="inserted"><ins><em>user 
zero</em></ins></span> security <span 
class="removed"><del><strong>improvements&lt;/a&gt;; but</strong></del></span> 
<span class="inserted"><ins><em>against its
+    &lt;p&gt;Every nonfree program offers the user zero security against its
     developer. With this malfeature, GM has explicitly made things even
     worse.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201711244"&gt;
-    &lt;p&gt;The Furby Connect has a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"&gt;
-  not</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
-    universal back door&lt;/a&gt;. If the product</em></ins></span> as <span 
class="removed"><del><strong>much</strong></del></span> <span 
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span 
class="removed"><del><strong>Apple 
claims&lt;/a&gt;.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>a
+    &lt;p&gt;The Furby Connect has a &lt;a
+    
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect"&gt;
+    universal back door&lt;/a&gt;. If the product as shipped doesn't act as a
     listening device, remote changes to the code could surely convert it
-    into one.&lt;/p&gt;</em></ins></span>
+    into one.&lt;/p&gt;
   &lt;/li&gt;
 
-
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;&lt;a 
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"&gt;
-Windows 8 also</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201711010"&gt;
-    &lt;p&gt;Sony</em></ins></span> has <span 
class="inserted"><ins><em>brought back its robotic pet Aibo, this time &lt;a
+  &lt;li id="M201711010"&gt;
+    &lt;p&gt;Sony has brought back its robotic pet Aibo, this time &lt;a
     
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet"&gt;
-    with</em></ins></span> a <span 
class="inserted"><ins><em>universal</em></ins></span> back <span 
class="removed"><del><strong>door for remotely deleting apps&lt;/a&gt;.
-&lt;/p&gt;
-
-&lt;p&gt;
-You might well decide</strong></del></span> <span 
class="inserted"><ins><em>door, and tethered</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> a <span 
class="removed"><del><strong>security service that you trust
-remotely &lt;em&gt;deactivate&lt;/em&gt; programs</strong></del></span> <span 
class="inserted"><ins><em>server</em></ins></span> that <span 
class="removed"><del><strong>it considers malicious.
-But there is no excuse for &lt;em&gt;deleting&lt;/em&gt;</strong></del></span> 
<span class="inserted"><ins><em>requires
+    with a universal back door, and tethered to a server that requires
     a subscription&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201709090.1"&gt;
-    &lt;p&gt;Tesla used software to limit</em></ins></span> the <span 
class="removed"><del><strong>programs, and you
-should have</strong></del></span> <span class="inserted"><ins><em>part 
of</em></ins></span> the <span class="removed"><del><strong>right to decide who 
(if anyone)</strong></del></span> <span class="inserted"><ins><em>battery
-    that was available</em></ins></span> to <span 
class="removed"><del><strong>trust</strong></del></span> <span 
class="inserted"><ins><em>customers in some cars, and &lt;a
+    &lt;p&gt;Tesla used software to limit the part of the battery
+    that was available to customers in some cars, and &lt;a
     
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"&gt;
-    a universal back door</em></ins></span> in <span 
class="inserted"><ins><em>the software&lt;/a&gt; to temporarily 
increase</em></ins></span>
-    this <span class="removed"><del><strong>way.
-&lt;/p&gt;
+    a universal back door in the software&lt;/a&gt; to temporarily increase
+    this limit.&lt;/p&gt;
 
-&lt;p&gt;
-As these pages show, if you do want</strong></del></span> <span 
class="inserted"><ins><em>limit.&lt;/p&gt;
-
-    &lt;p&gt;While remotely allowing car 
&ldquo;owners&rdquo;</em></ins></span> to <span 
class="removed"><del><strong>clean your computer</strong></del></span> <span 
class="inserted"><ins><em>use the
+    &lt;p&gt;While remotely allowing car &ldquo;owners&rdquo; to use the
     whole battery capacity did not do them any harm, the same back
-    door would permit Tesla (perhaps under the command</em></ins></span> of 
<span class="removed"><del><strong>malware,</strong></del></span> <span 
class="inserted"><ins><em>some
-    government) to remotely order</em></ins></span> the <span 
class="removed"><del><strong>first software</strong></del></span> <span 
class="inserted"><ins><em>car</em></ins></span> to <span 
class="removed"><del><strong>delete is Windows or iOS.
-&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>use none of 
its battery. Or
-    perhaps to drive its passenger to a torture 
prison.&lt;/p&gt;</em></ins></span>
+    door would permit Tesla (perhaps under the command of some
+    government) to remotely order the car to use none of its battery. Or
+    perhaps to drive its passenger to a torture prison.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;
-&lt;p&gt;In Android,</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201702060.1"&gt;
-    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"&gt;
-Google has</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
+  &lt;li id="M201702060.1"&gt;
+    &lt;p&gt;Vizio &ldquo;smart&rdquo; TVs &lt;a
+    
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen"&gt;
     have a universal back door&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201609130"&gt;
     &lt;p&gt;Xiaomi phones come with &lt;a
-    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;</em></ins></span>
-    a <span class="inserted"><ins><em>universal</em></ins></span> back door 
<span class="removed"><del><strong>to remotely delete apps.&lt;/a&gt;  
(It</strong></del></span> <span class="inserted"><ins><em>in the application 
processor, for Xiaomi's
+    
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"&gt;
+    a universal back door in the application processor, for Xiaomi's
     use&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This</em></ins></span> is <span 
class="inserted"><ins><em>separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
-    universal back door</em></ins></span> in <span 
class="inserted"><ins><em>the modem processor that the local phone
+    &lt;p&gt;This is separate from &lt;a 
href="#universal-back-door-phone-modem"&gt;the
+    universal back door in the modem processor that the local phone
     company can use&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201608171"&gt;
     &lt;p id="windows-update"&gt;Microsoft
-    Windows has</em></ins></span> a <span class="removed"><del><strong>program
-called GTalkService).
-&lt;/p&gt;
-
-&lt;p&gt;
-Google</strong></del></span> <span class="inserted"><ins><em>universal back 
door through which &lt;a
+    Windows has a universal back door through which &lt;a
     
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"&gt;
-    any change whatsoever</em></ins></span> can <span 
class="removed"><del><strong>also</strong></del></span> <span 
class="inserted"><ins><em>be imposed on the users&lt;/a&gt;.&lt;/p&gt;
+    any change whatsoever can be imposed on the users&lt;/a&gt;.&lt;/p&gt;
 
-    &lt;p&gt;This was</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"&gt;
-forcibly</strong></del></span>
-    <span 
class="inserted"><ins><em>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
-    reported in 2007&lt;/a&gt; for XP</em></ins></span> and <span 
class="removed"><del><strong>remotely install apps&lt;/a&gt; through 
GTalkService (which
-seems, since</strong></del></span> <span class="inserted"><ins><em>Vista, and 
it seems</em></ins></span>
-    that <span class="removed"><del><strong>article,</strong></del></span> 
<span class="inserted"><ins><em>Microsoft used the same 
method</em></ins></span> to <span class="removed"><del><strong>have been merged 
into Google Play).
-This is not equivalent</strong></del></span> <span 
class="inserted"><ins><em>push the &lt;a
+    &lt;p&gt;This was &lt;a
+    href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"&gt;
+    reported in 2007&lt;/a&gt; for XP and Vista, and it seems
+    that Microsoft used the same method to push the &lt;a
     href="/proprietary/malware-microsoft.html#windows10-forcing"&gt;
-    Windows 10 downgrade&lt;/a&gt;</em></ins></span> to <span 
class="removed"><del><strong>a</strong></del></span> <span 
class="inserted"><ins><em>computers running Windows 7 and 8.&lt;/p&gt;
+    Windows 10 downgrade&lt;/a&gt; to computers running Windows 7 and 
8.&lt;/p&gt;
 
-    &lt;p&gt;In Windows 10, the</em></ins></span> universal back <span 
class="removed"><del><strong>door, but permits various
-dirty tricks.
-&lt;/p&gt;
-
-&lt;p&gt;
-Although Google's &lt;em&gt;exercise&lt;/em&gt; of this power has not been
-malicious so far, the point</strong></del></span> <span 
class="inserted"><ins><em>door</em></ins></span>
-    is <span class="removed"><del><strong>that nobody should have such power,
-which could also</strong></del></span> <span class="inserted"><ins><em>no 
longer hidden; all &ldquo;upgrades&rdquo; will</em></ins></span> be <span 
class="removed"><del><strong>used maliciously.  You might well 
decide</strong></del></span> <span class="inserted"><ins><em>&lt;a
+    &lt;p&gt;In Windows 10,</em></ins></span> the <span 
class="removed"><del><strong>programs,</strong></del></span> <span 
class="inserted"><ins><em>universal back door
+    is no longer hidden; all &ldquo;upgrades&rdquo; will be &lt;a
     
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/"&gt;
-    forcibly and immediately imposed&lt;/a&gt;.&lt;/p&gt;
+    forcibly</em></ins></span> and <span class="removed"><del><strong>you 
should</strong></del></span> <span class="inserted"><ins><em>immediately 
imposed&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201606060"&gt;
-    &lt;p&gt;The Amazon Echo appears</em></ins></span> to <span 
class="removed"><del><strong>let</strong></del></span> <span 
class="inserted"><ins><em>have</em></ins></span> a
-<span class="removed"><del><strong>security service remotely 
&lt;em&gt;deactivate&lt;/em&gt; programs that it
-considers malicious.  But there is no excuse for 
allowing</strong></del></span> <span class="inserted"><ins><em>universal back 
door, since &lt;a
-    
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;</em></ins></span>
-    it
-<span class="removed"><del><strong>to &lt;em&gt;delete&lt;/em&gt; the 
programs, and you should</strong></del></span> <span 
class="inserted"><ins><em>installs &ldquo;updates&rdquo; 
automatically&lt;/a&gt;.&lt;/p&gt;
+    &lt;p&gt;The Amazon Echo appears to have a universal back door, since &lt;a
+    href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"&gt;
+    it installs &ldquo;updates&rdquo; automatically&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;We</em></ins></span> have <span class="inserted"><ins><em>found 
nothing explicitly documenting</em></ins></span> the <span 
class="removed"><del><strong>right</strong></del></span> <span 
class="inserted"><ins><em>lack of any way</em></ins></span>
     to
@@ -669,8 +658,8 @@
     &lt;p&gt;Dell computers, shipped with
     Windows, had a bogus root certificate</em></ins></span> that <span 
class="removed"><del><strong>would give access</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/"&gt;
-    allowed anyone (not just Dell) to remotely authorize any 
software</em></ins></span> to
-    <span class="inserted"><ins><em>run&lt;/a&gt; on</em></ins></span> the
+    allowed anyone (not just Dell)</em></ins></span> to <span 
class="inserted"><ins><em>remotely authorize any software to
+    run&lt;/a&gt; on</em></ins></span> the
 <span class="removed"><del><strong>customer's data.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>computer.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
@@ -734,8 +723,10 @@
 
   <span class="inserted"><ins><em>&lt;li id="M201308230"&gt;
     &lt;p&gt;The German government &lt;a
-    
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"&gt;veers
-    away from Windows 8 computers with TPM 2.0&lt;/a&gt;, due to potential back
+    
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/"&gt;veers
+    away from Windows 8 computers with TPM 2.0&lt;/a&gt; (&lt;a
+    
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa"&gt;original
+    article in German&lt;/a&gt;), due to potential back
     door capabilities of the TPM 2.0 chip.&lt;/p&gt;
   &lt;/li&gt;
 
@@ -812,7 +803,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/03/06 09:30:54 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary-back-doors.ja.po        19 Jan 2019 09:30:12 -0000      1.92
+++ proprietary-back-doors.ja.po        6 Mar 2019 09:30:54 -0000       1.93
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2017-01-24 12:17+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -912,22 +912,13 @@
 "が、暗号化のすべてのプロプライエタリのプログラム
に可能性があります。"
 
 #. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"https://web.archive.";
-#| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-";
-#| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-#| "\"> the German government has decided it can't be trusted</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"ウィンドウズ8のバックドアは驚くべきもので、<a 
href=\"https://web.archive.org/";
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">ドイツ政"
-"府は、それは信用できない、と決定しました</a>。"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 #, fuzzy
@@ -1061,6 +1052,23 @@
 msgid "Updated:"
 msgstr "最終更新:"
 
+#, fuzzy
+#~| msgid ""
+#~| "Windows 8's back doors are so gaping that <a href=\"https://web.archive.";
+#~| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-";
+#~| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~| "\"> the German government has decided it can't be trusted</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "ウィンドウズ8のバックドアは驚くべきもので、<a 
href=\"https://web.archive.";
+#~ "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ 
"\">ドイツ政府は、それは信用できない、と決定しました</a>。"
+
 #~ msgid ""
 #~ "Users reported that <a href=\"http://www.networkworld.com/article/2993490/";
 #~ "windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-"

Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-back-doors.pot  19 Jan 2019 09:30:12 -0000      1.62
+++ proprietary-back-doors.pot  6 Mar 2019 09:30:54 -0000       1.63
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -623,9 +623,11 @@
 #. type: Content of: <ul><li><p>
 msgid ""
 "The German government <a "
-"href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>veers
 "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"href=\"https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/\";>veers
 "
+"away from Windows 8 computers with TPM 2.0</a> (<a "
+"href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa\";>original
 "
+"article in German</a>), due to potential back door capabilities of the TPM "
+"2.0 chip."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary-back-doors.ru.po        25 Feb 2019 09:37:05 -0000      1.166
+++ proprietary-back-doors.ru.po        6 Mar 2019 09:30:54 -0000       1.167
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
 "PO-Revision-Date: 2018-11-13 16:09+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -894,15 +895,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Правительство Германии <a 
href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">отвернулось от компьютеров под Windows&nbsp;8 
с TPM&nbsp;2.0</a> из-за "
-"потенциальной лазейки в микросхеме 
TPM&nbsp;2.0."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -1023,6 +1021,17 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Правительство Германии <a 
href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">отвернулось от компьютеров под 
Windows&nbsp;8 с TPM&nbsp;2.0</a> из-за "
+#~ "потенциальной лазейки в микросхеме 
TPM&nbsp;2.0."
+
+#~ msgid ""
 #~ "The back door is in the &ldquo;modem processor&rdquo;, whose job is to "
 #~ "communicate with the radio network.  In most phones, the modem processor "
 #~ "controls the microphone.  In most phones it has the power to rewrite the "

Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- pt-br.po    4 Mar 2019 09:00:10 -0000       1.55
+++ pt-br.po    6 Mar 2019 09:30:54 -0000       1.56
@@ -3249,10 +3249,11 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
 msgstr ""
 
 #. type: Content of: <ul><li><p>

Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- ru.po       4 Mar 2019 09:20:39 -0000       1.92
+++ ru.po       6 Mar 2019 09:30:54 -0000       1.93
@@ -465,10 +465,10 @@
 "dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
 "watch, and fake videos too</a>."
 msgstr ""
-"Камера&nbsp;&mdash; дверной глазок Ring (сейчас 
Amazon) может смотреть "
-"все время. И вот оказывается, что <a 
href=\"https://";
-"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> смотреть в нее 
может кто угодно, "
-"и даже подделывать видеоизображение</a>."
+"Камера&nbsp;&mdash; дверной глазок Ring (сейчас 
Amazon) может смотреть все "
+"время. И вот оказывается, что <a 
href=\"https://dojo.bullguard.com/dojo-by-";
+"bullguard/blog/ring/\"> смотреть в нее может кто 
угодно, и даже подделывать "
+"видеоизображение</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -479,9 +479,8 @@
 msgstr ""
 "Уязвимость третьей стороны, 
предположительно, была непреднамеренной, и 
я "
 "полагаю, в Amazon это исправят. Но я не думаю, 
что Amazon изменит устройство "
-"программы, которое <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">позволяет "
-"Amazon смотреть через камеру</a>."
+"программы, которое <a 
href=\"/proprietary/proprietary-surveillance."
+"html#M201901100\">позволяет Amazon смотреть через 
камеру</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -4453,15 +4452,12 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Правительство Германии <a 
href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">отвернулось от компьютеров под Windows&nbsp;8 
с TPM&nbsp;2.0</a> из-за "
-"потенциальной лазейки в микросхеме 
TPM&nbsp;2.0."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -9543,6 +9539,17 @@
 "процессорах Intel будут встроенные 
несвободные программы-тираны</a>."
 
 #~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Правительство Германии <a 
href=\"http://drleonardcoldwell.com/leaked-";
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">отвернулось от компьютеров под 
Windows&nbsp;8 с TPM&nbsp;2.0</a> из-за "
+#~ "потенциальной лазейки в микросхеме 
TPM&nbsp;2.0."
+
+#~ msgid ""
 #~ "Even though the ink subscription program may be cheaper in some specific "
 #~ "cases, it spies on users, and involves totally unacceptable restrictions "
 #~ "in the use of a printer that would otherwise be in working order."

Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- zh-tw.po    4 Mar 2019 09:00:11 -0000       1.41
+++ zh-tw.po    6 Mar 2019 09:30:54 -0000       1.42
@@ -3126,10 +3126,11 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-";
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/";
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-";
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
 msgstr ""
 
 #. type: Content of: <ul><li><p>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]