[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Wed, 6 Mar 2019 04:30:55 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/03/06 04:30:54
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po pt-br.po ru.po
zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.41&r2=1.42
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- de.po 4 Mar 2019 09:00:09 -0000 1.41
+++ de.po 6 Mar 2019 09:30:53 -0000 1.42
@@ -5605,38 +5605,14 @@
"Encryption Key, The Intercept, 2015.\">Festplattenverschlüsselung bereits "
"hintergangen</a>."
-# [2]
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
-# [2-1]
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
(âDementiâ)
-# | {+The+} German government <a
-# |
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers-]
-# |
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/"
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/"
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
-"\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 â
Linked "
-"to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive).\"><ins cite="
-"\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/"
-"Windows_TPM_Pl_21082013.html\">â⦠einige kritische Aspekte im
Zusammenhang "
-"mit bestimmten Einsatzszenarien, in denen Windows 8 in Kombination mit einer "
-"Hardware betrieben wird, die über ein TPM 2.0 verfügt.â</ins></a><a href="
-"\"#tn02\" id=\"tn02-ref\">[2]</a><a href=\"#tn02-1\" id=\"tn02-1-ref\">[2-1]"
-"</a>"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
# | Here is a suspicion that we can't prove, but is worth thinking about: <a
# |
href=\"http{+s+}://web.archive.org/web/20150206003913/http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI\">
@@ -11649,6 +11625,38 @@
"\">Tyrannische Software in Intel-Prozessoren eingebaut</a><a href=\"#tn01\" "
"id=\"tn01-ref\" class=\"transnote\">[1]</a>."
+# [2]
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
+# [2-1]
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
(âDementiâ)
+# | {+The+} German government <a
+# |
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers-]
+# |
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers+}
+# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
+# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/"
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/"
+#~ "web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
+#~ "\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 â "
+#~ "Linked to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive)."
+#~ "\"><ins cite=\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/"
+#~ "Presse2013/Windows_TPM_Pl_21082013.html\">â⦠einige kritische Aspekte
im "
+#~ "Zusammenhang mit bestimmten Einsatzszenarien, in denen Windows 8 in "
+#~ "Kombination mit einer Hardware betrieben wird, die über ein TPM 2.0 "
+#~ "verfügt.â</ins></a><a href=\"#tn02\" id=\"tn02-ref\">[2]</a><a href="
+#~ "\"#tn02-1\" id=\"tn02-1-ref\">[2-1]</a>"
+
# | Anova sabotaged users' cooking devices with a downgrade that tethered them
# | to a remote server. <a
# |
href=\"https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062\">Unless
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- es.po 5 Mar 2019 11:29:45 -0000 1.54
+++ es.po 6 Mar 2019 09:30:53 -0000 1.55
@@ -4004,15 +4004,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"El Gobierno alemán <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">evita "
-"los ordenadores con Windows 8 provistos del chip TPM 2.0</a> debido a que "
-"este chip permite la creación de puertas traseras."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -8781,6 +8778,17 @@
"procesadores Intel incorporarán software tirano</a>."
#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "El Gobierno alemán <a href=\"http://drleonardcoldwell.com/leaked-german-"
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">evita "
+#~ "los ordenadores con Windows 8 provistos del chip TPM 2.0</a> debido a que "
+#~ "este chip permite la creación de puertas traseras."
+
+#~ msgid ""
#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
#~ "the video they capture to Amazon servers</a> which save it permanently."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- fr.po 4 Mar 2019 20:20:41 -0000 1.71
+++ fr.po 6 Mar 2019 09:30:53 -0000 1.72
@@ -4475,15 +4475,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-"
-"german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0
parce "
-"que cette puce permet de créer des portes dérobées</a>."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -9577,3 +9574,14 @@
msgstr ""
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">Les "
"processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0 "
+#~ "parce que cette puce permet de créer des portes dérobées</a>."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- it.po 4 Mar 2019 09:00:09 -0000 1.41
+++ it.po 6 Mar 2019 09:30:53 -0000 1.42
@@ -5245,29 +5245,14 @@
"computer-microsoft-probably-has-your-encryption-key/\"> Microsoft ha già "
"inserito una backdoor nel suo sistema di cifratura dei dischi</a>."
-# | {+The+} German government <a
-# |
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers-]
-# |
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/"
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/"
-"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-"
-"entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai computer "
-"Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel chip TPM 2.0."
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
# | {+Here is a suspicion that we can't prove, but is worth thinking about:+}
# | <a
@@ -10941,6 +10926,30 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">I "
"processori Intel avranno del software tiranno preinstallato</a>."
+# | {+The+} German government <a
+# |
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers-]
+# |
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers+}
+# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
+# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/"
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/"
+#~ "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
+#~ "key-entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai "
+#~ "computer Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel "
+#~ "chip TPM 2.0."
+
# | Anova sabotaged users' cooking devices with a downgrade that tethered them
# | to a remote server. <a
# |
href=\"https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062\">Unless
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- ja.po 4 Mar 2019 09:00:09 -0000 1.41
+++ ja.po 6 Mar 2019 09:30:53 -0000 1.42
@@ -4505,22 +4505,13 @@
"ãã£ã¹ã¯æå·åã«ãã§ã«ããã¯ãã¢ãä»æãã¦ãã¾ã</a>ã"
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"https://web.archive."
-#| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-"
-#| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-#| "\"> the German government has decided it can't be trusted</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"ã¦ã£ã³ãã¦ãº8ã®ããã¯ãã¢ã¯é©ãã¹ããã®ã§ã<a
href=\"https://web.archive.org/"
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">ãã¤ãæ¿"
-"åºã¯ãããã¯ä¿¡ç¨ã§ããªããã¨æ±ºå®ãã¾ãã</a>ã"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
#, fuzzy
@@ -9367,6 +9358,23 @@
"<a
href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">ã¤ã³ãã«ã®"
"ããã»ããµã«ã¯æ´åã½ããã¦ã§ã¢ãçµã¿è¾¼ã¾ããããã«ãªãã¾ã</a>ã"
+#, fuzzy
+#~| msgid ""
+#~| "Windows 8's back doors are so gaping that <a href=\"https://web.archive."
+#~| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-"
+#~| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~| "\"> the German government has decided it can't be trusted</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "ã¦ã£ã³ãã¦ãº8ã®ããã¯ãã¢ã¯é©ãã¹ããã®ã§ã<a
href=\"https://web.archive."
+#~ "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~
"\">ãã¤ãæ¿åºã¯ãããã¯ä¿¡ç¨ã§ããªããã¨æ±ºå®ãã¾ãã</a>ã"
+
#~ msgid ""
#~ "Various proprietary programs often mess up the user's system. They are "
#~ "like sabotage, but they are not grave enough to qualify for the word "
Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-microsoft.de-diff.html 4 Feb 2019 07:31:22 -0000 1.35
+++ malware-microsoft.de-diff.html 6 Mar 2019 09:30:53 -0000 1.36
@@ -124,8 +124,10 @@
<li id="M201308230">
<p>The German government <a
-
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
- away from</em></ins></span> Windows 8 <span
class="inserted"><ins><em>computers with TPM 2.0</a>, due to potential
back
+
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers
+ away from</em></ins></span> Windows 8 <span
class="inserted"><ins><em>computers with TPM 2.0</a> (<a
+
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
+ article in German</a>), due to potential back
door capabilities of the TPM 2.0 chip.</p>
</li>
@@ -177,8 +179,8 @@
<span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray">Bluray</a>
disks.
(The article talks about</em></ins></span> how <span
class="removed"><del><strong>to permanently reject</strong></del></span> the
<span class="removed"><del><strong>downgrade to Windows 10</a>.</p>
- <p>This seems to involve use of a back door in Windows 7 and
8.</p></strong></del></span> <span class="inserted"><ins><em>same malware
would later be
- introduced in MacOS. That had not been done at the time, but it was
+ <p>This seems to involve use of a back door</strong></del></span>
<span class="inserted"><ins><em>same malware would later be
+ introduced</em></ins></span> in <span class="removed"><del><strong>Windows
7 and 8.</p></strong></del></span> <span class="inserted"><ins><em>MacOS.
That had not been done at the time, but it was
done subsequently.)</p></em></ins></span>
</li>
</ul>
@@ -870,7 +872,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/06 09:30:53 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- malware-microsoft.de.po 3 Feb 2019 15:59:41 -0000 1.131
+++ malware-microsoft.de.po 6 Mar 2019 09:30:53 -0000 1.132
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -235,38 +235,14 @@
"Encryption Key, The Intercept, 2015.\">Festplattenverschlüsselung bereits "
"hintergangen</a>."
-# [2]
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
-# [2-1]
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
(âDementiâ)
#. type: Content of: <ul><li><p>
-# | {+The+} German government <a
-# |
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers-]
-# |
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/"
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/"
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
-"\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 â
Linked "
-"to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive).\"><ins cite="
-"\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/"
-"Windows_TPM_Pl_21082013.html\">â⦠einige kritische Aspekte im
Zusammenhang "
-"mit bestimmten Einsatzszenarien, in denen Windows 8 in Kombination mit einer "
-"Hardware betrieben wird, die über ein TPM 2.0 verfügt.â</ins></a><a href="
-"\"#tn02\" id=\"tn02-ref\">[2]</a><a href=\"#tn02-1\" id=\"tn02-1-ref\">[2-1]"
-"</a>"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
# | Here is a suspicion that we can't prove, but is worth thinking about: <a
@@ -1471,6 +1447,33 @@
msgid "Updated:"
msgstr "Letzte Ãnderung:"
+# [2]
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
+# [2-1]
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
(âDementiâ)
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/"
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/"
+#~ "web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
+#~ "\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 â "
+#~ "Linked to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive)."
+#~ "\"><ins cite=\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/"
+#~ "Presse2013/Windows_TPM_Pl_21082013.html\">â⦠einige kritische Aspekte
im "
+#~ "Zusammenhang mit bestimmten Einsatzszenarien, in denen Windows 8 in "
+#~ "Kombination mit einer Hardware betrieben wird, die über ein TPM 2.0 "
+#~ "verfügt.â</ins></a><a href=\"#tn02\" id=\"tn02-ref\">[2]</a><a href="
+#~ "\"#tn02-1\" id=\"tn02-1-ref\">[2-1]</a>"
+
#~ msgid ""
#~ "Various proprietary programs often mess up the user's system. They are "
#~ "like sabotage, but they are not grave enough to qualify for the word "
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-microsoft.es.po 12 Feb 2019 10:27:18 -0000 1.133
+++ malware-microsoft.es.po 6 Mar 2019 09:30:53 -0000 1.134
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
"X-Generator: Poedit 1.8.11\n"
#. type: Content of: <title>
@@ -192,15 +193,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"El Gobierno alemán <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">evita "
-"los ordenadores con Windows 8 provistos del chip TPM 2.0</a> debido a que "
-"este chip permite la creación de puertas traseras."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1101,6 +1099,17 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "El Gobierno alemán <a href=\"http://drleonardcoldwell.com/leaked-german-"
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">evita "
+#~ "los ordenadores con Windows 8 provistos del chip TPM 2.0</a> debido a que "
+#~ "este chip permite la creación de puertas traseras."
+
+#~ msgid ""
#~ "Various proprietary programs often mess up the user's system. They are "
#~ "like sabotage, but they are not grave enough to qualify for the word "
#~ "“sabotage”. Nonetheless, they are nasty and wrong. This "
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- malware-microsoft.fr.po 3 Feb 2019 16:59:25 -0000 1.151
+++ malware-microsoft.fr.po 6 Mar 2019 09:30:53 -0000 1.152
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2019-02-03 17:41+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -191,15 +192,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-"
-"german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0
parce "
-"que cette puce permet de créer des portes dérobées</a>."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1092,3 +1090,14 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0 "
+#~ "parce que cette puce permet de créer des portes dérobées</a>."
Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-microsoft.it-diff.html 8 Feb 2019 09:30:03 -0000 1.35
+++ malware-microsoft.it-diff.html 6 Mar 2019 09:30:54 -0000 1.36
@@ -123,8 +123,10 @@
<li id="M201308230">
<p>The German government <a
-
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
- away from</em></ins></span> Windows 8 <span
class="inserted"><ins><em>computers with TPM 2.0</a>, due to potential
back
+
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers
+ away from</em></ins></span> Windows 8 <span
class="inserted"><ins><em>computers with TPM 2.0</a> (<a
+
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
+ article in German</a>), due to potential back
door capabilities of the TPM 2.0 chip.</p>
</li>
@@ -295,9 +297,9 @@
<li><p>Once Microsoft has tricked a user into accepting
installation
of Windows
10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that</strong></del></span> <span
class="inserted"><ins><em>10</a> when</em></ins></span> they <span
class="removed"><del><strong>are denied the option to cancel or even
postpone</strong></del></span> <span class="inserted"><ins><em>had turned
- it off, in</em></ins></span> the
- <span class="removed"><del><strong>imposed date</strong></del></span> <span
class="inserted"><ins><em>hope that some day they would fail to say no.
+ find that</strong></del></span> <span
class="inserted"><ins><em>10</a> when</em></ins></span> they <span
class="removed"><del><strong>are denied</strong></del></span> <span
class="inserted"><ins><em>had turned
+ it off, in</em></ins></span> the <span
class="removed"><del><strong>option</strong></del></span> <span
class="inserted"><ins><em>hope that some day they would fail</em></ins></span>
to <span class="removed"><del><strong>cancel or even postpone the
+ imposed date</strong></del></span> <span class="inserted"><ins><em>say no.
To do this, Microsoft used <a
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
@@ -860,7 +862,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:03 $
+$Date: 2019/03/06 09:30:54 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- malware-microsoft.it.po 8 Feb 2019 08:59:35 -0000 1.137
+++ malware-microsoft.it.po 6 Mar 2019 09:30:54 -0000 1.138
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -221,28 +221,13 @@
"inserito una backdoor nel suo sistema di cifratura dei dischi</a>."
#. type: Content of: <ul><li><p>
-# | {+The+} German government <a
-# |
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers-]
-# |
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/"
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/"
-"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-"
-"entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai computer "
-"Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel chip TPM 2.0."
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
# | {+Here is a suspicion that we can't prove, but is worth thinking about:+}
@@ -1378,6 +1363,25 @@
msgid "Updated:"
msgstr "Ultimo aggiornamento:"
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/"
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/"
+#~ "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
+#~ "key-entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai "
+#~ "computer Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel "
+#~ "chip TPM 2.0."
+
#~ msgid ""
#~ "Various proprietary programs often mess up the user's system. They are "
#~ "like sabotage, but they are not grave enough to qualify for the word "
Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-microsoft.ja-diff.html 4 Feb 2019 07:31:22 -0000 1.44
+++ malware-microsoft.ja-diff.html 6 Mar 2019 09:30:54 -0000 1.45
@@ -131,8 +131,10 @@
<li id="M201308230">
<p>The German government <a
-
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
- away from</em></ins></span> Windows 8 <span
class="inserted"><ins><em>computers with TPM 2.0</a>, due to potential
back
+
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers
+ away from</em></ins></span> Windows 8 <span
class="inserted"><ins><em>computers with TPM 2.0</a> (<a
+
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
+ article in German</a>), due to potential back
door capabilities of the TPM 2.0 chip.</p>
</li>
@@ -196,7 +198,7 @@
<h3 id="insecurity">Microsoft Insecurity</h3>
<span class="removed"><del><strong><ul>
- <li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and</strong></del></span>
+ <li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet</strong></del></span>
<span class="inserted"><ins><em><p>These bugs are/were not intentional,
so unlike the rest of the file
they do not count as malware. We mention them to refute the
@@ -214,7 +216,7 @@
<li id="M201608020">
<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
- in Internet Explorer and</em></ins></span> Edge</a> allows an
attacker to retrieve
+ in Internet</em></ins></span> Explorer and Edge</a> allows an
attacker to retrieve
Microsoft account credentials, if the user is tricked into visiting
a malicious link.</p>
</li>
@@ -834,7 +836,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:22 $
+$Date: 2019/03/06 09:30:54 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- malware-microsoft.ja.po 3 Feb 2019 15:59:41 -0000 1.111
+++ malware-microsoft.ja.po 6 Mar 2019 09:30:54 -0000 1.112
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -200,22 +200,13 @@
"ãã£ã¹ã¯æå·åã«ãã§ã«ããã¯ãã¢ãä»æãã¦ãã¾ã</a>ã"
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"https://web.archive."
-#| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-"
-#| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-#| "\"> the German government has decided it can't be trusted</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"ã¦ã£ã³ãã¦ãº8ã®ããã¯ãã¢ã¯é©ãã¹ããã®ã§ã<a
href=\"https://web.archive.org/"
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">ãã¤ãæ¿"
-"åºã¯ãããã¯ä¿¡ç¨ã§ããªããã¨æ±ºå®ãã¾ãã</a>ã"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
#, fuzzy
@@ -1143,6 +1134,23 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#, fuzzy
+#~| msgid ""
+#~| "Windows 8's back doors are so gaping that <a href=\"https://web.archive."
+#~| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-"
+#~| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~| "\"> the German government has decided it can't be trusted</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "ã¦ã£ã³ãã¦ãº8ã®ããã¯ãã¢ã¯é©ãã¹ããã®ã§ã<a
href=\"https://web.archive."
+#~ "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~
"\">ãã¤ãæ¿åºã¯ãããã¯ä¿¡ç¨ã§ããªããã¨æ±ºå®ãã¾ãã</a>ã"
+
#~ msgid ""
#~ "Various proprietary programs often mess up the user's system. They are "
#~ "like sabotage, but they are not grave enough to qualify for the word "
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-microsoft.pot 3 Feb 2019 15:59:41 -0000 1.75
+++ malware-microsoft.pot 6 Mar 2019 09:30:54 -0000 1.76
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -145,9 +145,11 @@
#. type: Content of: <ul><li><p>
msgid ""
"The German government <a "
-"href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers
"
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"href=\"https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/\">veers
"
+"away from Windows 8 computers with TPM 2.0</a> (<a "
+"href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa\">original
"
+"article in German</a>), due to potential back door capabilities of the TPM "
+"2.0 chip."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- malware-microsoft.ru.po 25 Feb 2019 09:37:05 -0000 1.196
+++ malware-microsoft.ru.po 6 Mar 2019 09:30:54 -0000 1.197
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-02-03 15:56+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2018-11-20 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
#. type: Content of: <title>
msgid ""
@@ -188,15 +189,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"ÐÑавиÑелÑÑÑво ÐеÑмании <a
href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">оÑвеÑнÑлоÑÑ Ð¾Ñ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑов под Windows 8
Ñ TPM 2.0</a> из-за "
-"поÑенÑиалÑной лазейки в микÑоÑÑ
еме
TPM 2.0."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1087,6 +1085,17 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "ÐÑавиÑелÑÑÑво ÐеÑмании <a
href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">оÑвеÑнÑлоÑÑ Ð¾Ñ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑов под
Windows 8 Ñ TPM 2.0</a> из-за "
+#~ "поÑенÑиалÑной лазейки в микÑоÑÑ
еме
TPM 2.0."
+
+#~ msgid ""
#~ "Various proprietary programs often mess up the user's system. They are "
#~ "like sabotage, but they are not grave enough to qualify for the word "
#~ "“sabotage”. Nonetheless, they are nasty and wrong. This "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- nl.po 4 Mar 2019 09:00:10 -0000 1.41
+++ nl.po 6 Mar 2019 09:30:54 -0000 1.42
@@ -3671,10 +3671,11 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
msgstr ""
#. type: Content of: <ul><li><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- pl.po 4 Mar 2019 09:00:10 -0000 1.41
+++ pl.po 6 Mar 2019 09:30:54 -0000 1.42
@@ -3173,10 +3173,11 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
msgstr ""
#. type: Content of: <ul><li><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- pot 4 Mar 2019 09:00:10 -0000 1.41
+++ pot 6 Mar 2019 09:30:54 -0000 1.42
@@ -2999,10 +2999,11 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-back-doors.de-diff.html 4 Feb 2019 07:31:23 -0000 1.21
+++ proprietary-back-doors.de-diff.html 6 Mar 2019 09:30:54 -0000 1.22
@@ -680,8 +680,10 @@
<p>The German</em></ins></span> government <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
veers</strong></del></span>
- <span
class="inserted"><ins><em>href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers</em></ins></span>
- away from Windows 8 computers with TPM <span
class="removed"><del><strong>2.0</strong></del></span> <span
class="inserted"><ins><em>2.0</a>,</em></ins></span> due to potential back
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers</em></ins></span>
+ away from Windows 8 computers with TPM <span
class="removed"><del><strong>2.0</strong></del></span> <span
class="inserted"><ins><em>2.0</a> (<a
+
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
+ article in German</a>),</em></ins></span> due to potential back
door capabilities of the TPM 2.0 <span
class="removed"><del><strong>chip</a>.</p></strong></del></span>
<span class="inserted"><ins><em>chip.</p></em></ins></span>
</li>
@@ -756,7 +758,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/03/06 09:30:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary-back-doors.de.po 19 Jan 2019 09:30:12 -0000 1.120
+++ proprietary-back-doors.de.po 6 Mar 2019 09:30:54 -0000 1.121
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1070,38 +1070,14 @@
"Fälle bekannt, aber jedes proprietäre Programm was der Verschlüsselung
dient "
"ist eine potentielle Möglichkeit."
-# [1]
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
-# [1-1]
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
(âDementiâ)
#. type: Content of: <ul><li><p>
-# | {+The+} German government <a
-# |
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers-]
-# |
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/"
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/"
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
-"\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 â
Linked "
-"to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive).\"><ins cite="
-"\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/"
-"Windows_TPM_Pl_21082013.html\">â⦠einige kritische Aspekte im
Zusammenhang "
-"mit bestimmten Einsatzszenarien, in denen Windows 8 in Kombination mit einer "
-"Hardware betrieben wird, die über ein TPM 2.0 verfügt.â</ins></a><a href="
-"\"#tn01\" id=\"tn01-ref\" class=\"tnote\">[1]</a><a href=\"#tn01-1\" id="
-"\"tn01-1-ref\" class=\"tnote\">[1-1]</a>"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
# | Here is a suspicion that we can't prove, but is worth thinking about: <a
@@ -1277,6 +1253,33 @@
msgid "Updated:"
msgstr "Letzte Ãnderung:"
+# [1]
http://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa
+# [1-1]
https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2013/Windows_TPM_Pl_21082013.html
(âDementiâ)
+#, fuzzy
+#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/"
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Deutsche Bundesbehörde sieht <a href=\"https://web.archive.org/"
+#~ "web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
+#~ "government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\" title="
+#~ "\"LEAKED: German Government Warns Key Entities Not To Use Windows 8 â "
+#~ "Linked to NSA, unter: DrLeonardColdwell.com 2013 (Internet Archive)."
+#~ "\"><ins cite=\"https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/"
+#~ "Presse2013/Windows_TPM_Pl_21082013.html\">â⦠einige kritische Aspekte
im "
+#~ "Zusammenhang mit bestimmten Einsatzszenarien, in denen Windows 8 in "
+#~ "Kombination mit einer Hardware betrieben wird, die über ein TPM 2.0 "
+#~ "verfügt.â</ins></a><a href=\"#tn01\" id=\"tn01-ref\"
class=\"tnote\">[1]</"
+#~ "a><a href=\"#tn01-1\" id=\"tn01-1-ref\" class=\"tnote\">[1-1]</a>"
+
#~ msgid ""
#~ "WhatsApp <a href=\"https://www.theguardian.com/technology/2017/jan/13/"
#~ "whatsapp-backdoor-allows-snooping-on-encrypted-messages\"> has a back "
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary-back-doors.fr.po 19 Jan 2019 10:10:02 -0000 1.119
+++ proprietary-back-doors.fr.po 6 Mar 2019 09:30:54 -0000 1.120
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2019-01-19 10:56+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -911,15 +912,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-"
-"german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0
parce "
-"que cette puce permet de créer des portes dérobées</a>."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1035,3 +1033,14 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Le gouvernement allemand <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">se détourne des ordinateurs sous Windows 8 munis de la puce TPM 2.0 "
+#~ "parce que cette puce permet de créer des portes dérobées</a>."
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary-back-doors.it-diff.html 8 Feb 2019 09:30:04 -0000 1.48
+++ proprietary-back-doors.it-diff.html 6 Mar 2019 09:30:54 -0000 1.49
@@ -688,8 +688,8 @@
<p>Dell computers, shipped with
Windows, had a bogus root certificate</em></ins></span> that <span
class="removed"><del><strong>would give access</strong></del></span> <span
class="inserted"><ins><em><a
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">
- allowed anyone (not just Dell) to remotely authorize any
software</em></ins></span> to
- <span class="inserted"><ins><em>run</a> on</em></ins></span> the
+ allowed anyone (not just Dell)</em></ins></span> to <span
class="inserted"><ins><em>remotely authorize any software to
+ run</a> on</em></ins></span> the
<span class="removed"><del><strong>customer's data.
</p></strong></del></span> <span
class="inserted"><ins><em>computer.</p></em></ins></span>
</li>
@@ -753,8 +753,10 @@
<span class="inserted"><ins><em><li id="M201308230">
<p>The German government <a
-
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
- away from Windows 8 computers with TPM 2.0</a>, due to potential back
+
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers
+ away from Windows 8 computers with TPM 2.0</a> (<a
+
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
+ article in German</a>), due to potential back
door capabilities of the TPM 2.0 chip.</p>
</li>
@@ -831,7 +833,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/08 09:30:04 $
+$Date: 2019/03/06 09:30:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary-back-doors.it.po 8 Feb 2019 08:59:36 -0000 1.113
+++ proprietary-back-doors.it.po 6 Mar 2019 09:30:54 -0000 1.114
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1113,28 +1113,13 @@
"riteniamo a rischio ogni programma proprietario di crittografia."
#. type: Content of: <ul><li><p>
-# | {+The+} German government <a
-# |
[-href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers-]
-# |
{+href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers+}
-# | away from Windows 8 computers with TPM [-2.0-] {+2.0</a>,+} due to
-# | potential back door capabilities of the TPM 2.0 [-chip</a>.-] {+chip.+}
-#, fuzzy
-#| msgid ""
-#| "German government <a href=\"https://web.archive.org/web/20160310201616/"
-#| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
-#| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
-#| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
-#| "of the TPM 2.0 chip</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/"
-"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-"
-"entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai computer "
-"Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel chip TPM 2.0."
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
# | {+Here is a suspicion that we can't prove, but is worth thinking about:+}
@@ -1285,6 +1270,25 @@
#, fuzzy
#~| msgid ""
+#~| "German government <a href=\"https://web.archive.org/web/20160310201616/"
+#~| "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
+#~| "key-entities-not-to-use-windows-8-linked-to-nsa/\">veers away from "
+#~| "Windows 8 computers with TPM 2.0 due to potential back door capabilities "
+#~| "of the TPM 2.0 chip</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "Il governo tedesco <a href=\"https://web.archive.org/web/20160310201616/"
+#~ "http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-"
+#~ "key-entities-not-to-use-windows-8-linked-to-nsa/\">si allontana dai "
+#~ "computer Windows 8 con TPM 2.0</a> a causa di potenziali backdoor nel "
+#~ "chip TPM 2.0."
+
+#, fuzzy
+#~| msgid ""
#~| "WhatsApp <a href=\"https://www.theguardian.com/technology/2017/jan/13/"
#~| "whatsapp-backdoor-allows-snooping-on-encrypted-messages\">has a back "
#~| "door that the company can use to read the plaintext of messages</a>."
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-back-doors.ja-diff.html 4 Feb 2019 07:31:23 -0000 1.44
+++ proprietary-back-doors.ja-diff.html 6 Mar 2019 09:30:54 -0000 1.45
@@ -240,197 +240,240 @@
remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
</li>
<li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>books erased
was
- <cite>1984</cite>, by George Orwell.</p>
-
- <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>criticism by saying it
- would delete books only following orders from</em></ins></span> the <span
class="removed"><del><strong>engine</a>
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
remotely.</p>
</li>
<li><p>
-Mac OS X had an</strong></del></span>
- <span class="inserted"><ins><em>state. However, that policy didn't last.
In 2012 it</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local</strong></del></span>
+Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>.
+</p></li>
+
+<li><p>Users reported that <a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft</strong></del></span> <span class="inserted"><ins><em>books
erased</em></ins></span> was <span class="removed"><del><strong>forcing
them</strong></del></span>
+ <span class="inserted"><ins><em><cite>1984</cite>, by George
Orwell.</p>
+
+ <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7 and 8</a>, switching on a
flag</strong></del></span> <span class="inserted"><ins><em>criticism by saying
it
+ would delete books only following orders from the
+ state. However,</em></ins></span> that <span
class="removed"><del><strong>said whether to “upgrade” to Windows
10 when users
+ had turned</strong></del></span> <span class="inserted"><ins><em>policy
didn't last. In 2012</em></ins></span> it <span
class="removed"><del><strong>off.</p>
+
+ <p>Later on, Microsoft published instructions
on</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject the downgrade to Windows 10</a>.</p>
+
+ <p>This seems to involve use of</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
- wiped a user's Kindle-Swindle and deleted her account</a>, then
+ wiped</em></ins></span> a <span class="inserted"><ins><em>user's
Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
- <p>Do other ebook readers have back doors in their nonfree software?
We
- don't know, and we have no way to find out. There is no reason to
+ <p>Do other ebook readers have</em></ins></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
+ don't know,</em></ins></span> and <span
class="removed"><del><strong>8.</p>
+</li>
+
+<li>
+<p>Most mobile phones</strong></del></span> <span
class="inserted"><ins><em>we</em></ins></span> have <span
class="inserted"><ins><em>no way to find out. There is no reason to
assume that they don't.</p>
</li>
<li id="M201011220">
- <p>The iPhone has a</em></ins></span> back door for <span
class="removed"><del><strong>4 years</a>.
-</p></li>
-
-<li><p>Users reported that</strong></del></span> <a
- <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7 and 8 with all-spying
- Windows 10</a>.</p>
-
- <p>Microsoft was in fact</strong></del></span>
+ <p>The iPhone has</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door, which has been used to</strong></del></span>
<span class="inserted"><ins><em>door for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
+</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
- enabling it without understanding.</p>
+ enabling it without understanding.</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A Chinese version of Android</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
<ul class="blurbs">
<li id="M201811100">
- <p>Corel Paintshop Pro has a</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
- back door</em></ins></span> that <span class="removed"><del><strong>run
Windows 7</strong></del></span> <span class="inserted"><ins><em>can make it
cease to function</a>.</p>
-
- <p>The article is full of confusions, errors</em></ins></span> and
<span class="removed"><del><strong>8</a>, switching on a
flag</strong></del></span> <span
class="inserted"><ins><em>biases</em></ins></span> that <span
class="removed"><del><strong>said whether</strong></del></span> <span
class="inserted"><ins><em>we have
- an obligation</em></ins></span> to <span
class="removed"><del><strong>“upgrade”</strong></del></span> <span
class="inserted"><ins><em>expose, given that we are making a
link</em></ins></span> to <span class="removed"><del><strong>Windows 10 when
users
- had turned it off.</p>
-
- <p>Later on, Microsoft published instructions on <a
-
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how</strong></del></span> <span class="inserted"><ins><em>them.</p>
+ <p>Corel Paintshop Pro</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
+ back <span class="removed"><del><strong>door</a>. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>door that can
make it cease to function</a>.</p>
+
+ <p>The article is full</em></ins></span> of <span
class="removed"><del><strong>mobile phones</strong></del></span> <span
class="inserted"><ins><em>confusions, errors and biases that
we</em></ins></span> have
+ <span class="inserted"><ins><em>an obligation to expose, given that we are
making</em></ins></span> a <span class="removed"><del><strong>universal back
door</strong></del></span> <span class="inserted"><ins><em>link to
them.</p>
<ul>
- <li>Getting a patent does not “enable” a
company</em></ins></span> to <span class="removed"><del><strong>permanently
reject</strong></del></span> <span class="inserted"><ins><em>do
- any particular thing in its products. What it does
enable</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
- to <span class="removed"><del><strong>Windows 10</a>.</p>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing</em></ins></span> in <span
class="inserted"><ins><em>its products. What it does enable</em></ins></span>
the <span class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
+ to <span class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span>
is <span class="removed"><del><strong>controlled
+by Coolpad.
+</p>
+</li>
- <p>This seems</strong></del></span> <span
class="inserted"><ins><em>do is sue other companies if they do some particular
thing in
+<li>
+<p>Microsoft Windows has</strong></del></span> <span
class="inserted"><ins><em>sue other companies if they do some particular thing
in
their products.</li>
- <li>A company's policies about when</em></ins></span> to <span
class="removed"><del><strong>involve use of</strong></del></span> <span
class="inserted"><ins><em>attack users through</em></ins></span> a back
- door <span class="inserted"><ins><em>are beside the point. Inserting the
back door is wrong</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>the
- first place,</em></ins></span> and <span
class="removed"><del><strong>8.</p>
+ <li>A company's policies about when to attack users
through</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back
+ door <span class="removed"><del><strong>through which
+<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever can be imposed on</strong></del></span> <span
class="inserted"><ins><em>are beside</em></ins></span> the <span
class="removed"><del><strong>users</a>.
+</p>
+<p>More information on when
+<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+this was used</a>.
+</p>
+<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span
class="removed"><del><strong>universal</strong></del></span> back door is <span
class="removed"><del><strong>no longer hidden; all
+“upgrades” will
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>wrong in the
+ first place,</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
+</p>
</li>
<li>
-<p>Most mobile phones have a universal</strong></del></span> <span
class="inserted"><ins><em>using the</em></ins></span> back <span
class="removed"><del><strong>door, which has been used</strong></del></span>
<span class="inserted"><ins><em>door is always wrong too. No software
- developer should have that power over users.</li>
+<p>Windows 8's</strong></del></span> <span
class="inserted"><ins><em>using the</em></ins></span> back <span
class="removed"><del><strong>doors are so gaping</strong></del></span> <span
class="inserted"><ins><em>door is always wrong too. No software
+ developer should have</em></ins></span> that <span
class="inserted"><ins><em>power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word</em></ins></span> to <span
class="inserted"><ins><em>refer to sharing copies is a smear;
+ attacking ships. Using that word to refer to sharing copies is a smear;
please don't smear sharing.</li>
<li><p>The idea of “protecting our IP” is
- total confusion. The term “IP” itself is a</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p></strong></del></span>
+ total confusion. The term “IP” itself is a</em></ins></span>
<a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span class="inserted"><ins><em>href="/philosophy/not-ipr.html">bogus
generalization about things
that have nothing in common</a>.</p>
<p>In addition, to speak of “protecting” that bogus
- generalization is a separate absurdity. It's like calling the cops
+ generalization is a separate absurdity. It's like
calling</em></ins></span> the <span class="removed"><del><strong>German
government has decided</strong></del></span> <span
class="inserted"><ins><em>cops
because neighbors' kids are playing on your front yard, and saying
that you're “protecting the boundary line”. The kids can't do
harm
- to the boundary line, not even with a jackhammer, because it is an
- abstraction and can't be affected by physical action.</p></li>
+ to the boundary line, not even with a jackhammer,
because</em></ins></span> it <span class="inserted"><ins><em>is an
+ abstraction and</em></ins></span> can't be <span
class="removed"><del><strong>trusted</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>affected by
physical action.</p></li>
</ul></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version</strong></del></span>
+<p>The iPhone has a back door
+<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>allows Apple</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
+“inappropriate”. Jobs said it's ok</strong></del></span> <span
class="inserted"><ins><em>the article</em></ins></span> for <span
class="removed"><del><strong>Apple to have this power
+because</strong></del></span> <span class="inserted"><ins><em>the facts it
presents. It
is too bad that the article finishes by advocating the
- moral weakness</em></ins></span> of <span
class="inserted"><ins><em>surrendering to Netflix. The Netflix app <a
+ moral weakness</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
+</p></strong></del></span> <span class="inserted"><ins><em>surrendering
to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p>
+ malware too</a>.</p></em></ins></span>
</li>
- <li id="M201511090">
- <p>Baidu's proprietary</em></ins></span> Android <span
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door</a>. Nearly all
-models of mobile phones have</strong></del></span> <span
class="inserted"><ins><em>door that <a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files” as well as forcibly install
+<span class="removed"><del><strong><li>
+<p>The iPhone</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511090">
+ <p>Baidu's proprietary Android library, Moplus,</em></ins></span>
has a back door <span class="removed"><del><strong>for
+<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
enabling
+it without understanding.
+</p>
+</li>
+
+<li>
+ <p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
apps</a>.</p>
- <p>It is used by 14,000 Android applications.</p>
+ <p>It is used by 14,000 Android
applications.</p></em></ins></span>
</li>
- <li id="M201112080">
+
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201112080">
<p> In addition to its <a href="#windows-update">universal back
- door</a>, Windows 8 has</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>in the modem chip. So
-why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>for <a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
- remotely deleting apps</a>.</p>
+ door</a>,</em></ins></span> Windows 8 <span
class="removed"><del><strong>also</strong></del></span> has a back door for
<span class="inserted"><ins><em><a
+
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
+ remotely deleting <span class="removed"><del><strong>apps</a>.
+</p>
+
+<p>
+You</strong></del></span> <span
class="inserted"><ins><em>apps</a>.</p>
- <p>You might well decide</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>let a security
service that you trust
+ <p>You</em></ins></span> might well decide to let a security service
that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
- But there</em></ins></span> is <span
class="removed"><del><strong>controlled
-by Coolpad.
-</p></strong></del></span> <span class="inserted"><ins><em>no excuse for
<em>deleting</em> the programs, and you
- should have the right to decide whom (if anyone) to trust in this
- way.</p></em></ins></span>
+ But there is no excuse for <em>deleting</em> the programs, and
you
+ should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.
+</p>
+
+<p>
+As these pages show, if you do want to clean your computer of malware,
+the first software to delete is Windows or iOS.
+</p></strong></del></span>
+ <span class="inserted"><ins><em>way.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
-<p>Microsoft Windows</strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201103070">
+ <span class="inserted"><ins><em><li id="M201103070"></em></ins></span>
<p>In Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>to remotely delete apps</a>. (It was in a
- program called GTalkService,</em></ins></span> which
-<span class="removed"><del><strong><a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever</strong></del></span> <span
class="inserted"><ins><em>seems since then to have been
- merged into Google Play.)</p>
-
- <p>Google</em></ins></span> can <span
class="removed"><del><strong>be imposed on the users</a>.
-</p>
-<p>More information on when</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
-this was used</a>.
+ Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> in a
+ program called <span class="removed"><del><strong>GTalkService).
</p>
-<p>In Windows 10, the</strong></del></span>
- <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through GTalkService. This is
- not equivalent to a</em></ins></span> universal back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
- tricks.</p>
-
- <p>Although Google's <em>exercise</em> of this power has
not been
- malicious so far, the point</em></ins></span> is <span
class="removed"><del><strong>no longer hidden; all
-“upgrades” will</strong></del></span> <span
class="inserted"><ins><em>that nobody should have such power,
- which could also</em></ins></span> be <span
class="removed"><del><strong><a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
-and immediately imposed</a>.
+
+<p></strong></del></span> <span class="inserted"><ins><em>GTalkService,
which seems since then to have been
+ merged into</em></ins></span> Google <span
class="inserted"><ins><em>Play.)</p>
+
+ <p>Google</em></ins></span> can also <a
+
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which
+seems, since that article, to have been merged into Google
Play).</strong></del></span> <span
class="inserted"><ins><em>GTalkService.</em></ins></span> This is
+ not equivalent to a universal back door, but permits various dirty <span
class="removed"><del><strong>tricks.
</p>
-</li>
-<li>
-<p>Windows 8's back doors are so gaping</strong></del></span> <span
class="inserted"><ins><em>used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em>
programs</em></ins></span> that
-<span class="removed"><del><strong><a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
-the German government has decided</strong></del></span>
- it <span class="removed"><del><strong>can't be trusted</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>considers
malicious. But there is no excuse for allowing it to
- <em>delete</em> the programs, and you should have the right to
decide
- who (if anyone) to trust in this way.</p></em></ins></span>
- </li>
+<p>
+Although</strong></del></span>
+ <span class="inserted"><ins><em>tricks.</p>
-<span class="removed"><del><strong><li></strong></del></span>
+ <p>Although</em></ins></span> Google's <em>exercise</em>
of this power has not been
+ malicious so far, the point is that nobody should have such power,
+ which could also be used maliciously. You might well decide to
+ let a security service remotely <em>deactivate</em> programs
that
+ it considers malicious. But there is no excuse for allowing it to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
+ <span class="inserted"><ins><em><em>delete</em> the programs,
and you should have the right to decide
+ who (if anyone) to trust in this way.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
+ <li id="M200808110">
<p>The iPhone has a back door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's <span
class="removed"><del><strong>ok</strong></del></span> <span
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
- this power because of course we can trust <span
class="removed"><del><strong>Apple.
-</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
+ “inappropriate”. Jobs said it's OK for Apple to have
+ this power because of course we can trust Apple.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p>The iPhone has</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id='universal'>Full control</h3>
@@ -439,136 +482,82 @@
<li id="M201812300">
<p>New GM cars <a
href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door for
-<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
-remote wipe</a>. It's not always enabled, but users are led into
enabling
-it without understanding.
-</p>
-</li>
+ offer the feature of a universal back door</a>.</p>
-<li>
- <p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>door</a>.</p>
-
- <p>Every nonfree program offers</em></ins></span> the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8</strong></del></span> <span class="inserted"><ins><em>user
zero</em></ins></span> security <span
class="removed"><del><strong>improvements</a>; but</strong></del></span>
<span class="inserted"><ins><em>against its
+ <p>Every nonfree program offers the user zero security against its
developer. With this malfeature, GM has explicitly made things even
worse.</p>
</li>
<li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
+ <p>The Furby Connect has a <a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
- into one.</p></em></ins></span>
+ into one.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
-Windows 8 also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711010">
- <p>Sony</em></ins></span> has <span
class="inserted"><ins><em>brought back its robotic pet Aibo, this time <a
+ <li id="M201711010">
+ <p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door for remotely deleting apps</a>.
-</p>
-
-<p>
-You might well decide</strong></del></span> <span
class="inserted"><ins><em>door, and tethered</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> a <span
class="removed"><del><strong>security service that you trust
-remotely <em>deactivate</em> programs</strong></del></span> <span
class="inserted"><ins><em>server</em></ins></span> that <span
class="removed"><del><strong>it considers malicious.
-But there is no excuse for <em>deleting</em></strong></del></span>
<span class="inserted"><ins><em>requires
+ with a universal back door, and tethered to a server that requires
a subscription</a>.</p>
</li>
<li id="M201709090.1">
- <p>Tesla used software to limit</em></ins></span> the <span
class="removed"><del><strong>programs, and you
-should have</strong></del></span> <span class="inserted"><ins><em>part
of</em></ins></span> the <span class="removed"><del><strong>right to decide who
(if anyone)</strong></del></span> <span class="inserted"><ins><em>battery
- that was available</em></ins></span> to <span
class="removed"><del><strong>trust</strong></del></span> <span
class="inserted"><ins><em>customers in some cars, and <a
+ <p>Tesla used software to limit the part of the battery
+ that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
- a universal back door</em></ins></span> in <span
class="inserted"><ins><em>the software</a> to temporarily
increase</em></ins></span>
- this <span class="removed"><del><strong>way.
-</p>
+ a universal back door in the software</a> to temporarily increase
+ this limit.</p>
-<p>
-As these pages show, if you do want</strong></del></span> <span
class="inserted"><ins><em>limit.</p>
-
- <p>While remotely allowing car
“owners”</em></ins></span> to <span
class="removed"><del><strong>clean your computer</strong></del></span> <span
class="inserted"><ins><em>use the
+ <p>While remotely allowing car “owners” to use the
whole battery capacity did not do them any harm, the same back
- door would permit Tesla (perhaps under the command</em></ins></span> of
<span class="removed"><del><strong>malware,</strong></del></span> <span
class="inserted"><ins><em>some
- government) to remotely order</em></ins></span> the <span
class="removed"><del><strong>first software</strong></del></span> <span
class="inserted"><ins><em>car</em></ins></span> to <span
class="removed"><del><strong>delete is Windows or iOS.
-</p></strong></del></span> <span class="inserted"><ins><em>use none of
its battery. Or
- perhaps to drive its passenger to a torture
prison.</p></em></ins></span>
+ door would permit Tesla (perhaps under the command of some
+ government) to remotely order the car to use none of its battery. Or
+ perhaps to drive its passenger to a torture prison.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>In Android,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702060.1">
- <p>Vizio “smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
-Google has</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
+ <li id="M201702060.1">
+ <p>Vizio “smart” TVs <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
have a universal back door</a>.</p>
</li>
<li id="M201609130">
<p>Xiaomi phones come with <a
-
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"></em></ins></span>
- a <span class="inserted"><ins><em>universal</em></ins></span> back door
<span class="removed"><del><strong>to remotely delete apps.</a>
(It</strong></del></span> <span class="inserted"><ins><em>in the application
processor, for Xiaomi's
+
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
+ a universal back door in the application processor, for Xiaomi's
use</a>.</p>
- <p>This</em></ins></span> is <span
class="inserted"><ins><em>separate from <a
href="#universal-back-door-phone-modem">the
- universal back door</em></ins></span> in <span
class="inserted"><ins><em>the modem processor that the local phone
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor that the local phone
company can use</a>.</p>
</li>
<li id="M201608171">
<p id="windows-update">Microsoft
- Windows has</em></ins></span> a <span class="removed"><del><strong>program
-called GTalkService).
-</p>
-
-<p>
-Google</strong></del></span> <span class="inserted"><ins><em>universal back
door through which <a
+ Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
- any change whatsoever</em></ins></span> can <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>be imposed on the users</a>.</p>
+ any change whatsoever can be imposed on the users</a>.</p>
- <p>This was</em></ins></span> <a <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-forcibly</strong></del></span>
- <span
class="inserted"><ins><em>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- reported in 2007</a> for XP</em></ins></span> and <span
class="removed"><del><strong>remotely install apps</a> through
GTalkService (which
-seems, since</strong></del></span> <span class="inserted"><ins><em>Vista, and
it seems</em></ins></span>
- that <span class="removed"><del><strong>article,</strong></del></span>
<span class="inserted"><ins><em>Microsoft used the same
method</em></ins></span> to <span class="removed"><del><strong>have been merged
into Google Play).
-This is not equivalent</strong></del></span> <span
class="inserted"><ins><em>push the <a
+ <p>This was <a
+ href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ reported in 2007</a> for XP and Vista, and it seems
+ that Microsoft used the same method to push the <a
href="/proprietary/malware-microsoft.html#windows10-forcing">
- Windows 10 downgrade</a></em></ins></span> to <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>computers running Windows 7 and 8.</p>
+ Windows 10 downgrade</a> to computers running Windows 7 and
8.</p>
- <p>In Windows 10, the</em></ins></span> universal back <span
class="removed"><del><strong>door, but permits various
-dirty tricks.
-</p>
-
-<p>
-Although Google's <em>exercise</em> of this power has not been
-malicious so far, the point</strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span>
- is <span class="removed"><del><strong>that nobody should have such power,
-which could also</strong></del></span> <span class="inserted"><ins><em>no
longer hidden; all “upgrades” will</em></ins></span> be <span
class="removed"><del><strong>used maliciously. You might well
decide</strong></del></span> <span class="inserted"><ins><em><a
+ <p>In Windows 10,</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>universal back door
+ is no longer hidden; all “upgrades” will be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
- forcibly and immediately imposed</a>.</p>
+ forcibly</em></ins></span> and <span class="removed"><del><strong>you
should</strong></del></span> <span class="inserted"><ins><em>immediately
imposed</a>.</p>
</li>
<li id="M201606060">
- <p>The Amazon Echo appears</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>have</em></ins></span> a
-<span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs that it
-considers malicious. But there is no excuse for
allowing</strong></del></span> <span class="inserted"><ins><em>universal back
door, since <a
-
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"></em></ins></span>
- it
-<span class="removed"><del><strong>to <em>delete</em> the
programs, and you should</strong></del></span> <span
class="inserted"><ins><em>installs “updates”
automatically</a>.</p>
+ <p>The Amazon Echo appears to have a universal back door, since <a
+ href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
+ it installs “updates” automatically</a>.</p>
<p>We</em></ins></span> have <span class="inserted"><ins><em>found
nothing explicitly documenting</em></ins></span> the <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>lack of any way</em></ins></span>
to
@@ -669,8 +658,8 @@
<p>Dell computers, shipped with
Windows, had a bogus root certificate</em></ins></span> that <span
class="removed"><del><strong>would give access</strong></del></span> <span
class="inserted"><ins><em><a
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">
- allowed anyone (not just Dell) to remotely authorize any
software</em></ins></span> to
- <span class="inserted"><ins><em>run</a> on</em></ins></span> the
+ allowed anyone (not just Dell)</em></ins></span> to <span
class="inserted"><ins><em>remotely authorize any software to
+ run</a> on</em></ins></span> the
<span class="removed"><del><strong>customer's data.
</p></strong></del></span> <span
class="inserted"><ins><em>computer.</p></em></ins></span>
</li>
@@ -734,8 +723,10 @@
<span class="inserted"><ins><em><li id="M201308230">
<p>The German government <a
-
href="http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
- away from Windows 8 computers with TPM 2.0</a>, due to potential back
+
href="https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/">veers
+ away from Windows 8 computers with TPM 2.0</a> (<a
+
href="https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa">original
+ article in German</a>), due to potential back
door capabilities of the TPM 2.0 chip.</p>
</li>
@@ -812,7 +803,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/04 07:31:23 $
+$Date: 2019/03/06 09:30:54 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary-back-doors.ja.po 19 Jan 2019 09:30:12 -0000 1.92
+++ proprietary-back-doors.ja.po 6 Mar 2019 09:30:54 -0000 1.93
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -912,22 +912,13 @@
"ããæå·åã®ãã¹ã¦ã®ãããã©ã¤ã¨ã¿ãªã®ããã°ã©ã
ã«å¯è½æ§ãããã¾ãã"
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"https://web.archive."
-#| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-"
-#| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-#| "\"> the German government has decided it can't be trusted</a>."
-msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"ã¦ã£ã³ãã¦ãº8ã®ããã¯ãã¢ã¯é©ãã¹ããã®ã§ã<a
href=\"https://web.archive.org/"
-"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">ãã¤ãæ¿"
-"åºã¯ãããã¯ä¿¡ç¨ã§ããªããã¨æ±ºå®ãã¾ãã</a>ã"
+msgid ""
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
#, fuzzy
@@ -1061,6 +1052,23 @@
msgid "Updated:"
msgstr "æçµæ´æ°:"
+#, fuzzy
+#~| msgid ""
+#~| "Windows 8's back doors are so gaping that <a href=\"https://web.archive."
+#~| "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-"
+#~| "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~| "\"> the German government has decided it can't be trusted</a>."
+#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "ã¦ã£ã³ãã¦ãº8ã®ããã¯ãã¢ã¯é©ãã¹ããã®ã§ã<a
href=\"https://web.archive."
+#~ "org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~
"\">ãã¤ãæ¿åºã¯ãããã¯ä¿¡ç¨ã§ããªããã¨æ±ºå®ãã¾ãã</a>ã"
+
#~ msgid ""
#~ "Users reported that <a href=\"http://www.networkworld.com/article/2993490/"
#~ "windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-"
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-back-doors.pot 19 Jan 2019 09:30:12 -0000 1.62
+++ proprietary-back-doors.pot 6 Mar 2019 09:30:54 -0000 1.63
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -623,9 +623,11 @@
#. type: Content of: <ul><li><p>
msgid ""
"The German government <a "
-"href=\"http://drleonardcoldwell.com/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers
"
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"href=\"https://www.theregister.co.uk/2013/08/23/nsa_germany_windows_8/\">veers
"
+"away from Windows 8 computers with TPM 2.0</a> (<a "
+"href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-computing-microsoft-windows-8-nsa\">original
"
+"article in German</a>), due to potential back door capabilities of the TPM "
+"2.0 chip."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary-back-doors.ru.po 25 Feb 2019 09:37:05 -0000 1.166
+++ proprietary-back-doors.ru.po 6 Mar 2019 09:30:54 -0000 1.167
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-19 09:26+0000\n"
+"POT-Creation-Date: 2019-03-06 09:27+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-06 09:27+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -894,15 +895,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"ÐÑавиÑелÑÑÑво ÐеÑмании <a
href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">оÑвеÑнÑлоÑÑ Ð¾Ñ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑов под Windows 8
Ñ TPM 2.0</a> из-за "
-"поÑенÑиалÑной лазейки в микÑоÑÑ
еме
TPM 2.0."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -1023,6 +1021,17 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "ÐÑавиÑелÑÑÑво ÐеÑмании <a
href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">оÑвеÑнÑлоÑÑ Ð¾Ñ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑов под
Windows 8 Ñ TPM 2.0</a> из-за "
+#~ "поÑенÑиалÑной лазейки в микÑоÑÑ
еме
TPM 2.0."
+
+#~ msgid ""
#~ "The back door is in the “modem processor”, whose job is to "
#~ "communicate with the radio network. In most phones, the modem processor "
#~ "controls the microphone. In most phones it has the power to rewrite the "
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- pt-br.po 4 Mar 2019 09:00:10 -0000 1.55
+++ pt-br.po 6 Mar 2019 09:30:54 -0000 1.56
@@ -3249,10 +3249,11 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
msgstr ""
#. type: Content of: <ul><li><p>
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- ru.po 4 Mar 2019 09:20:39 -0000 1.92
+++ ru.po 6 Mar 2019 09:30:54 -0000 1.93
@@ -465,10 +465,10 @@
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
"watch, and fake videos too</a>."
msgstr ""
-"ÐамеÑа — двеÑной глазок Ring (ÑейÑаÑ
Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ "
-"вÑе вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
href=\"https://"
-"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> ÑмоÑÑеÑÑ Ð² нее
Ð¼Ð¾Ð¶ÐµÑ ÐºÑо Ñгодно, "
-"и даже подделÑваÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð¸Ð·Ð¾Ð±Ñажение</a>."
+"ÐамеÑа — двеÑной глазок Ring (ÑейÑаÑ
Amazon) Ð¼Ð¾Ð¶ÐµÑ ÑмоÑÑеÑÑ Ð²Ñе "
+"вÑемÑ. Ð Ð²Ð¾Ñ Ð¾ÐºÐ°Ð·ÑваеÑÑÑ, ÑÑо <a
href=\"https://dojo.bullguard.com/dojo-by-"
+"bullguard/blog/ring/\"> ÑмоÑÑеÑÑ Ð² нее Ð¼Ð¾Ð¶ÐµÑ ÐºÑо
Ñгодно, и даже подделÑваÑÑ "
+"видеоизобÑажение</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -479,9 +479,8 @@
msgstr ""
"УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
"полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво "
-"пÑогÑаммÑ, коÑоÑое <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">позволÑÐµÑ "
-"Amazon ÑмоÑÑеÑÑ ÑеÑез камеÑÑ</a>."
+"пÑогÑаммÑ, коÑоÑое <a
href=\"/proprietary/proprietary-surveillance."
+"html#M201901100\">позволÑÐµÑ Amazon ÑмоÑÑеÑÑ ÑеÑез
камеÑÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -4453,15 +4452,12 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
-msgstr ""
-"ÐÑавиÑелÑÑÑво ÐеÑмании <a
href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
-"\">оÑвеÑнÑлоÑÑ Ð¾Ñ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑов под Windows 8
Ñ TPM 2.0</a> из-за "
-"поÑенÑиалÑной лазейки в микÑоÑÑ
еме
TPM 2.0."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
+msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
@@ -9543,6 +9539,17 @@
"пÑоÑеÑÑоÑаÑ
Intel бÑдÑÑ Ð²ÑÑÑоеннÑе
неÑвободнÑе пÑогÑаммÑ-ÑиÑанÑ</a>."
#~ msgid ""
+#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
+#~ "back door capabilities of the TPM 2.0 chip."
+#~ msgstr ""
+#~ "ÐÑавиÑелÑÑÑво ÐеÑмании <a
href=\"http://drleonardcoldwell.com/leaked-"
+#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
+#~ "\">оÑвеÑнÑлоÑÑ Ð¾Ñ ÐºÐ¾Ð¼Ð¿ÑÑÑеÑов под
Windows 8 Ñ TPM 2.0</a> из-за "
+#~ "поÑенÑиалÑной лазейки в микÑоÑÑ
еме
TPM 2.0."
+
+#~ msgid ""
#~ "Even though the ink subscription program may be cheaper in some specific "
#~ "cases, it spies on users, and involves totally unacceptable restrictions "
#~ "in the use of a printer that would otherwise be in working order."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- zh-tw.po 4 Mar 2019 09:00:11 -0000 1.41
+++ zh-tw.po 6 Mar 2019 09:30:54 -0000 1.42
@@ -3126,10 +3126,11 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The German government <a href=\"http://drleonardcoldwell.com/leaked-german-"
-"government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">veers "
-"away from Windows 8 computers with TPM 2.0</a>, due to potential back door "
-"capabilities of the TPM 2.0 chip."
+"The German government <a href=\"https://www.theregister.co.uk/2013/08/23/"
+"nsa_germany_windows_8/\">veers away from Windows 8 computers with TPM 2.0</"
+"a> (<a href=\"https://www.zeit.de/digital/datenschutz/2013-08/trusted-"
+"computing-microsoft-windows-8-nsa\">original article in German</a>), due to "
+"potential back door capabilities of the TPM 2.0 chip."
msgstr ""
#. type: Content of: <ul><li><p>
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/04
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/26
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/03/30