[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/philosophy po/surveillance-vs-democracy.tra...
From: |
GNUN |
Subject: |
www/philosophy po/surveillance-vs-democracy.tra... |
Date: |
Fri, 11 Apr 2014 08:41:55 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 14/04/11 08:41:55
Modified files:
philosophy/po : surveillance-vs-democracy.translist
surveillance-vs-democracy.uk.po
Added files:
philosophy : surveillance-vs-democracy.uk.html
philosophy/po : surveillance-vs-democracy.uk-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.uk.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.translist?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.uk-en.html?cvsroot=www&rev=1.1
Patches:
Index: po/surveillance-vs-democracy.translist
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.translist,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/surveillance-vs-democracy.translist 23 Feb 2014 15:59:45 -0000
1.6
+++ po/surveillance-vs-democracy.translist 11 Apr 2014 08:41:54 -0000
1.7
@@ -8,6 +8,7 @@
<span dir="ltr"><a lang="it" hreflang="it"
href="/philosophy/surveillance-vs-democracy.it.html">italiano</a> [it]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/philosophy/surveillance-vs-democracy.ru.html">ÑÑÑÑкий</a> [ru]</span>
<span dir="ltr"><a lang="sq" hreflang="sq"
href="/philosophy/surveillance-vs-democracy.sq.html">Shqip</a> [sq]</span>
+<span dir="ltr"><a lang="uk" hreflang="uk"
href="/philosophy/surveillance-vs-democracy.uk.html">ÑкÑаÑнÑÑка</a> [uk]</span>
</p>
</div>' -->
<!--#if expr="$HTML_BODY = yes" -->
Index: po/surveillance-vs-democracy.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.uk.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/surveillance-vs-democracy.uk.po 11 Apr 2014 07:51:32 -0000 1.2
+++ po/surveillance-vs-democracy.uk.po 11 Apr 2014 08:41:55 -0000 1.3
@@ -10,12 +10,12 @@
"PO-Revision-Date: 2014-04-11 10:23+0300\n"
"Last-Translator: Andriy Bandura <address@hidden>\n"
"Language-Team: Ukrainian <address@hidden>\n"
+"Language: uk\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
-"Content-Transfer-Encoding: ENCODING"
-"Language: uk\n"
-"Plural-Forms: nplurals=3; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10<"
-"=4 && (n%100<10 || n%100>=20) ? 1 : 2);\n"
+"Content-Transfer-Encoding: ENCODINGLanguage: uk\n"
+"Plural-Forms: nplurals=3; plural=(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n"
+"%10<=4 && (n%100<10 || n%100>=20) ? 1 : 2);\n"
"X-Generator: Lokalize 1.5\n"
#. type: Content of: <title>
@@ -36,16 +36,13 @@
#. type: Content of: <blockquote><p>
msgid ""
-"A version of this article was first published in <a "
-"href=\"http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for"
-"-democracy-to-survive-surveillance/\"> "
-"Wired</a> in October 2013."
-msgstr ""
-"ÐеÑвÑÑна веÑÑÑÑ ÑÑаÑÑÑ Ð±Ñла опÑблÑкована
в жовÑÐ½Ñ 2013 ÑÐ¾ÐºÑ Ñ "
-"<a "
-"href=\"http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for"
-"-democracy-to-survive-surveillance/\"> "
-"ÐаÑÑед</a>."
+"A version of this article was first published in <a href=\"http://www.wired."
+"com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-"
+"surveillance/\"> Wired</a> in October 2013."
+msgstr ""
+"ÐеÑвÑÑна веÑÑÑÑ ÑÑаÑÑÑ Ð±Ñла опÑблÑкована
в жовÑÐ½Ñ 2013 ÑÐ¾ÐºÑ Ñ <a href="
+"\"http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-"
+"democracy-to-survive-surveillance/\"> ÐаÑÑед</a>."
#. type: Content of: <p>
msgid ""
@@ -59,15 +56,15 @@
"functioning of democracy, in that whistleblowers (such as Snowden) are "
"likely to be caught."
msgstr ""
-"ÐавдÑки ÑакÑам, ÑÐºÑ ÑÑали вÑÐ´Ð¾Ð¼Ñ Ð·Ð°Ð²Ð´Ñки
ÐдÑаÑÐ´Ñ Ð¡Ð½Ð¾ÑденÑ, ми знаÑмо, "
-"Ñо ÑÑÑаÑний ÑÑÐ²ÐµÐ½Ñ ÑоÑалÑного ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²
ÑÑÑпÑлÑÑÑÐ²Ñ Ð½ÐµÑÑмÑÑний з пÑавами "
-"лÑдини. ÐеодноÑазове залÑкÑÐ²Ð°Ð½Ð½Ñ Ñ
пеÑеÑлÑдÑÐ²Ð°Ð½Ð½Ñ Ð´Ð¸ÑиденÑÑв, "
-"ÑнÑоÑмаÑоÑÑв Ñ Ð¶ÑÑналÑÑÑÑв в СШРÑа ÑнÑиÑ
кÑаÑнаÑ
пÑдÑвеÑджÑÑ Ñе. Ðам "
-"поÑÑÑбно знизиÑи ÑÑÐ²ÐµÐ½Ñ ÑоÑалÑного
ÑÑеженнÑ, але до ÑкиÑ
меж? Яким Ñ Ð´ÑйÑно "
-"<em>макÑималÑний допÑÑÑимий ÑÑвенÑ
ÑÑеженнÑ</em>, за Ð¼ÐµÐ¶Ñ Ñкого ми "
-"гаÑанÑовано не Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð²Ð¸Ñ
одиÑи? Це
ÑÑвенÑ, пÑи пеÑевиÑÐµÐ½Ð½Ñ Ñкого "
-"ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð¿Ð¾ÑÐ¸Ð½Ð°Ñ Ð²ÑÑÑÑаÑиÑÑ Ñ
ÑÑнкÑÑонÑÐ²Ð°Ð½Ð½Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÑÑ, коли "
-"ÑнÑоÑмаÑоÑÑв (ÑакиÑ
Ñк СноÑден), Ñк
пÑавило, вÑдловлÑÑÑÑ."
+"ÐавдÑки ÑакÑам, ÑÐºÑ ÑÑали вÑÐ´Ð¾Ð¼Ñ Ð·Ð°Ð²Ð´Ñки
ÐдÑаÑÐ´Ñ Ð¡Ð½Ð¾ÑденÑ, ми знаÑмо, Ñо "
+"ÑÑÑаÑний ÑÑÐ²ÐµÐ½Ñ ÑоÑалÑного ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²
ÑÑÑпÑлÑÑÑÐ²Ñ Ð½ÐµÑÑмÑÑний з пÑавами "
+"лÑдини. ÐеодноÑазове залÑкÑÐ²Ð°Ð½Ð½Ñ Ñ
пеÑеÑлÑдÑÐ²Ð°Ð½Ð½Ñ Ð´Ð¸ÑиденÑÑв, ÑнÑоÑмаÑоÑÑв Ñ "
+"жÑÑналÑÑÑÑв в СШРÑа ÑнÑиÑ
кÑаÑнаÑ
пÑдÑвеÑджÑÑ Ñе. Ðам поÑÑÑбно знизиÑи "
+"ÑÑÐ²ÐµÐ½Ñ ÑоÑалÑного ÑÑеженнÑ, але до ÑкиÑ
меж? Яким Ñ Ð´ÑйÑно <em>макÑималÑний "
+"допÑÑÑимий ÑÑÐ²ÐµÐ½Ñ ÑÑеженнÑ</em>, за межÑ
Ñкого ми гаÑанÑовано не Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ "
+"виÑ
одиÑи? Це ÑÑвенÑ, пÑи пеÑевиÑÐµÐ½Ð½Ñ Ñкого
ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð¿Ð¾ÑÐ¸Ð½Ð°Ñ Ð²ÑÑÑÑаÑиÑÑ Ñ "
+"ÑÑнкÑÑонÑÐ²Ð°Ð½Ð½Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÑÑ, коли
ÑнÑоÑмаÑоÑÑв (ÑакиÑ
Ñк СноÑден), Ñк пÑавило,
"
+"вÑдловлÑÑÑÑ."
#. type: Content of: <p>
msgid ""
@@ -78,26 +75,22 @@
"control over the state, we must reduce surveillance to the point where "
"whistleblowers know they are safe."
msgstr ""
-"Ð ÑмоваÑ
деÑÐ¶Ð°Ð²Ð½Ð¾Ñ ÑаÑмниÑÑ Ð¼Ð¸, наÑод,
залежний вÑд можливоÑÑÑ "
-"ÑнÑоÑмаÑоÑÑв <a
href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama"
-"\"> ÑозповÑдаÑи нам пÑо Ñе, Ñо ÑобиÑÑ
деÑжава</a>. Ðднак нинÑÑÐ½Ñ "
-"ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²ÑдлÑкÑÑ Ð¿Ð¾ÑенÑÑйниÑ
ÑнÑоÑмаÑоÑÑв, а Ñе знаÑиÑÑ, Ñо воно "
-"надÑо ÑилÑна. Щоб вÑдновиÑи демокÑаÑиÑний
конÑÑÐ¾Ð»Ñ Ð½Ð°ÑÐ¾Ð´Ñ Ð½Ð°Ð´ "
-"деÑжавоÑ, ми Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ ÑкоÑоÑиÑи ÑÑеженнÑ
до велиÑини, пÑи ÑкÑй "
-"лÑди бÑдÑÑÑ Ð·Ð½Ð°Ñи, Ñо вони в безпеÑÑ."
+"Ð ÑмоваÑ
деÑÐ¶Ð°Ð²Ð½Ð¾Ñ ÑаÑмниÑÑ Ð¼Ð¸, наÑод,
залежний вÑд можливоÑÑÑ ÑнÑоÑмаÑоÑÑв "
+"<a href=\"https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama\"> "
+"ÑозповÑдаÑи нам пÑо Ñе, Ñо ÑобиÑÑ
деÑжава</a>. Ðднак нинÑÑÐ½Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ "
+"вÑдлÑкÑÑ Ð¿Ð¾ÑенÑÑйниÑ
ÑнÑоÑмаÑоÑÑв, а Ñе
знаÑиÑÑ, Ñо воно надÑо ÑилÑна. Щоб "
+"вÑдновиÑи демокÑаÑиÑний конÑÑÐ¾Ð»Ñ Ð½Ð°ÑодÑ
над деÑжавоÑ, ми Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ ÑкоÑоÑиÑи "
+"ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´Ð¾ велиÑини, пÑи ÑкÑй лÑди бÑдÑÑÑ
знаÑи, Ñо вони в безпеÑÑ."
#. type: Content of: <p>
msgid ""
-"Using free/libre software, <a "
-"href=\"/philosophy/free-software-even-more-important.html\"> as I've "
-"advocated for 30 years</a>, is the first step in taking control of our "
-"digital lives, and that includes preventing surveillance. We can't trust "
-"nonfree software; the NSA <a "
-"href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-co"
-"mpany-ever-trust-microsoft-again/index.htm\"> "
-"uses</a> and even <a "
-"href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-"
-"security\"> "
+"Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
+"important.html\"> as I've advocated for 30 years</a>, is the first step in "
+"taking control of our digital lives, and that includes preventing "
+"surveillance. We can't trust nonfree software; the NSA <a href=\"http://"
+"blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-"
+"trust-microsoft-again/index.htm\"> uses</a> and even <a href=\"http://www."
+"theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\"> "
"creates</a> security weaknesses in nonfree software to invade our own "
"computers and routers. Free software gives us control of our own computers, "
"but <a href=\"http://www.wired.com/opinion/2013/10/149481/\"> that won't "
@@ -106,36 +99,33 @@
"ÐаÑÑоÑÑÐ²Ð°Ð½Ð½Ñ Ð²ÑлÑниÑ
пÑогÑам, <a
href=\"/philosophy/free-software-is-more-"
"important.html/\"> за Ñо Ñ Ð²Ð¸ÑÑÑÐ¿Ð°Ñ Ð²Ð¶Ðµ ÑÑидÑÑÑÑ
ÑокÑв</a> — "
"пеÑÑий кÑок до конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ÑиÑÑовоÑ
ÑÑоÑÐ¾Ð½Ð¾Ñ Ð½Ð°Ñого жиÑÑÑ, Ñо пеÑедбаÑÐ°Ñ "
-"пÑоÑидÑÑ ÑÑеженнÑ. ÐовÑÑÑÑи невÑлÑним
пÑогÑамам не можна; <a href="
-"\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-"
-"company-ever-trust-microsoft-again/index.htm\"> ÐгенÑÑÑво
наÑÑоналÑÐ½Ð¾Ñ "
-"безпеки коÑиÑÑÑÑÑÑÑÑ Ñ Ð½Ð°Ð²ÑÑÑ ÑÑвоÑÑÑ
ÑÐ»Ð°Ð±ÐºÑ Ð¼ÑÑÑÑ</a> в невÑлÑниÑ
"
-"пÑогÑами Ð´Ð»Ñ <a
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-"
-"gchq-encryption-codes-security\"> вÑоÑÐ³Ð½ÐµÐ½Ð½Ñ Ð½Ð° наÑÑ
комп'ÑÑеÑи</a> Ñа "
-"маÑÑÑÑÑизаÑоÑи. ÐÑлÑÐ½Ñ Ð¿ÑогÑами даÑÑÑ Ð½Ð°Ð¼
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ наÑими "
-"влаÑними комп'ÑÑеÑами, але <a
href=\"http://www.wired.com/"
-"opinion/2013/10/149481/\"> Ñе не заÑ
иÑÑиÑÑ Ð½Ð°Ñе
пÑиваÑне жиÑÑÑ, коли ми "
-"виÑ
одимо в ÐнÑеÑнеÑ</a>."
+"пÑоÑидÑÑ ÑÑеженнÑ. ÐовÑÑÑÑи невÑлÑним
пÑогÑамам не можна; <a href=\"http://"
+"blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-"
+"trust-microsoft-again/index.htm\"> ÐгенÑÑÑво
наÑÑоналÑÐ½Ð¾Ñ Ð±ÐµÐ·Ð¿ÐµÐºÐ¸ "
+"коÑиÑÑÑÑÑÑÑÑ Ñ Ð½Ð°Ð²ÑÑÑ ÑÑвоÑÑÑ ÑлабкÑ
мÑÑÑÑ</a> в невÑлÑниÑ
пÑогÑами Ð´Ð»Ñ <a "
+"href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
+"codes-security\"> вÑоÑÐ³Ð½ÐµÐ½Ð½Ñ Ð½Ð° наÑÑ ÐºÐ¾Ð¼Ð¿'ÑÑеÑи</a>
Ñа маÑÑÑÑÑизаÑоÑи. "
+"ÐÑлÑÐ½Ñ Ð¿ÑогÑами даÑÑÑ Ð½Ð°Ð¼ конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
наÑими влаÑними комп'ÑÑеÑами, але <a "
+"href=\"http://www.wired.com/opinion/2013/10/149481/\"> Ñе не заÑ
иÑÑиÑÑ Ð½Ð°Ñе "
+"пÑиваÑне жиÑÑÑ, коли ми виÑ
одимо в
ÐнÑеÑнеÑ</a>."
#. type: Content of: <p>
msgid ""
-"<a "
-"href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-a"
-"ct-author-bill\">Bipartisan "
-"legislation to “curtail the domestic surveillance powers”</a> in "
-"the U.S. is being drawn up, but it relies on limiting the government's use "
-"of our virtual dossiers. That won't suffice to protect whistleblowers if "
-"“catching the whistleblower” is grounds for access sufficient to "
-"identify him or her. We need to go further."
+"<a href=\"http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-"
+"patriot-act-author-bill\">Bipartisan legislation to “curtail the "
+"domestic surveillance powers”</a> in the U.S. is being drawn up, but "
+"it relies on limiting the government's use of our virtual dossiers. That "
+"won't suffice to protect whistleblowers if “catching the "
+"whistleblower” is grounds for access sufficient to identify him or "
+"her. We need to go further."
msgstr ""
"У СШРпÑоÑÑваÑÑÑ <a
href=\"http://www.theguardian.com/world/2013/oct/10/nsa-"
"surveillance-patriot-act-author-bill\"> двоÑÑоÑоннÑй
законопÑÐ¾ÐµÐºÑ Ð· меÑÐ¾Ñ "
"“ÑÑÑзаÑи Ñили ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²ÑеÑединÑ
кÑаÑни”</a>, але Ð´Ð»Ñ ÑÑого "
-"поÑÑÑбно "
-"обмежиÑи викоÑиÑÑÐ°Ð½Ð½Ñ Ð´ÐµÑжавними
оÑганами наÑиÑ
елекÑÑонниÑ
доÑÑÑ. "
+"поÑÑÑбно обмежиÑи викоÑиÑÑаннÑ
деÑжавними оÑганами наÑиÑ
елекÑÑонниÑ
доÑÑÑ. "
"ЦÑого не доÑÑаÑнÑо Ð´Ð»Ñ Ñого, Ñоб заÑ
иÑÑиÑи
ÑнÑоÑмаÑоÑÑв, ÑкÑо “"
-"пÑÐ¹Ð¼Ð°Ð½Ð½Ñ ÑнÑоÑмаÑоÑа” ÑÑÐ°Ñ Ð¿ÑдÑÑавоÑ
Ð´Ð»Ñ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾ даниÑ
, "
-"дозволÑÑ ÑденÑиÑÑкÑваÑи його. Ðам ÑÑеба
йÑи далÑ."
+"пÑÐ¹Ð¼Ð°Ð½Ð½Ñ ÑнÑоÑмаÑоÑа” ÑÑÐ°Ñ Ð¿ÑдÑÑавоÑ
Ð´Ð»Ñ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾ даниÑ
, дозволÑÑ "
+"ÑденÑиÑÑкÑваÑи його. Ðам ÑÑеба йÑи далÑ."
#. type: Content of: <h3>
msgid "The Upper Limit on Surveillance in a Democracy"
@@ -149,29 +139,24 @@
"reporter is too much surveillance—too much for democracy to endure."
msgstr ""
"ЯкÑо ÑнÑоÑмаÑоÑи не ÑмÑÑÑÑ Ð¿ÑолиÑи ÑвÑÑло
на злоÑини Ñ Ð±ÑеÑ
нÑ, ми вÑÑаÑаÑмо "
-"оÑÑаннÑй ÑмаÑок ÑакÑиÑного конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
ÑвоÑм ÑÑÑдом Ñ "
-"деÑжавними ÑÑÑановами. ÐÑÑ ÑÐ¾Ð¼Ñ ÑÑеженнÑ,
Ñке дозволÑÑ "
-"деÑÐ¶Ð°Ð²Ñ Ð´ÑзнаваÑиÑÑ, Ñ
Ñо говоÑив з
жÑÑналÑÑÑом, занадÑо велике — "
-"занадÑо велика, аби демокÑаÑÑÑ Ð¼Ð¾Ð³Ð»Ð° його
виÑÑимаÑи."
+"оÑÑаннÑй ÑмаÑок ÑакÑиÑного конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
ÑвоÑм ÑÑÑдом Ñ Ð´ÐµÑжавними "
+"ÑÑÑановами. ÐÑÑ ÑÐ¾Ð¼Ñ ÑÑеженнÑ, Ñке
дозволÑÑ Ð´ÐµÑÐ¶Ð°Ð²Ñ Ð´ÑзнаваÑиÑÑ, Ñ
Ñо говоÑив "
+"з жÑÑналÑÑÑом, занадÑо велике —
занадÑо велика, аби демокÑаÑÑÑ "
+"могла його виÑÑимаÑи."
#. type: Content of: <p>
msgid ""
"An unnamed U.S. government official ominously told journalists in 2011 that "
-"the <a "
-"href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/news-medi"
-"a-and-law-summer-2011/lessons-wye-river\"> "
-"U.S. would not subpoena reporters because “We know who you're talking "
-"to.”</a> Sometimes <a "
-"href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guil"
-"ty-associated-press\"> "
-"journalists' phone call records are subpoenaed</a> to find this out, but "
-"Snowden has shown us that in effect they subpoena all the phone call records "
-"of everyone in the U.S., all the time, <a "
-"href=\"http://www.theguardian.com/world/interactive/2013/jun/06/verizon-teleph"
-"one-data-court-order\"> "
-"from Verizon </a> and <a "
-"href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-bey"
-"ond-verizon-2013-06-07\"> "
+"the <a href=\"http://www.rcfp.org/browse-media-law-resources/news-media-law/"
+"news-media-and-law-summer-2011/lessons-wye-river\"> U.S. would not subpoena "
+"reporters because “We know who you're talking to.”</a> Sometimes "
+"<a href=\"http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-"
+"guilty-associated-press\"> journalists' phone call records are subpoenaed</"
+"a> to find this out, but Snowden has shown us that in effect they subpoena "
+"all the phone call records of everyone in the U.S., all the time, <a href="
+"\"http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-"
+"data-court-order\"> from Verizon </a> and <a href=\"http://www.marketwatch."
+"com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07\"> "
"from other companies too</a>."
msgstr ""
"ЯкаÑÑ Ð¿Ð¾Ñадова оÑоба адмÑнÑÑÑÑаÑÑÑ Ð¡Ð¨Ð
зловÑÑно заÑвило жÑÑналÑÑÑам Ñ "
@@ -179,35 +164,32 @@
"news-media-law/news-media-and-law-summer-2011/lessons-wye-river\"> СШÐ
не "
"бÑдÑÑÑ Ð´Ð¾Ð¿Ð¸ÑÑваÑи жÑÑналÑÑÑÑв, ÑÐ¾Ð¼Ñ Ñо
“ми знаÑмо, Ñ
Ñо з вами "
"говоÑив”</a>. ÐÐ½Ð¾Ð´Ñ Ð´Ð»Ñ ÑÑого <a
href=\"http://www.theguardian.com/"
-"media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\"> на "
-"Ð²Ð¸Ð¼Ð¾Ð³Ñ ÑÑÐ´Ñ Ð¿ÐµÑедаÑÑÑÑÑ Ð·Ð°Ð¿Ð¸Ñи ÑелеÑонниÑ
пеÑеговоÑÑв жÑÑналÑÑÑÑв</a>, але "
-"СноÑден показав нам, Ñо ÑакÑиÑно вони веÑÑ
ÑÐ°Ñ Ð¾ÑÑимÑÑÑÑ Ð·Ð°Ð¿Ð¸Ñи вÑÑÑ
"
-"ÑелеÑонниÑ
пеÑеговоÑÑв ÑÑÑÑ
лÑдей в СШÐ
вÑд<a "
-"href=\"http://www.theguardian.com/"
-"world/interactive/2013/jun/06/verizon-telephone-data-court-order\"> "
-"Verizon</a>, <a href=\"http://www.marketwatch.com/story/nsa-data-mining-"
-"digs-"
-"into-networks-beyond-verizon-2013-06-07\"> а Ñакож вÑд ÑнÑиÑ
компанÑй</a>."
+"media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press\"> на
Ð²Ð¸Ð¼Ð¾Ð³Ñ "
+"ÑÑÐ´Ñ Ð¿ÐµÑедаÑÑÑÑÑ Ð·Ð°Ð¿Ð¸Ñи ÑелеÑонниÑ
пеÑеговоÑÑв жÑÑналÑÑÑÑв</a>, але СноÑден "
+"показав нам, Ñо ÑакÑиÑно вони веÑÑ ÑаÑ
оÑÑимÑÑÑÑ Ð·Ð°Ð¿Ð¸Ñи вÑÑÑ
ÑелеÑонниÑ
"
+"пеÑеговоÑÑв ÑÑÑÑ
лÑдей в СШРвÑд<a
href=\"http://www.theguardian.com/world/"
+"interactive/2013/jun/06/verizon-telephone-data-court-order\"> Verizon</a>, "
+"<a href=\"http://www.marketwatch.com/story/nsa-data-mining-digs-into-"
+"networks-beyond-verizon-2013-06-07\"> а Ñакож вÑд ÑнÑиÑ
компанÑй</a>."
#. type: Content of: <p>
msgid ""
"Opposition and dissident activities need to keep secrets from states that "
-"are willing to play dirty tricks on them. The ACLU has demonstrated the "
-"U.S. government's <a "
-"href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf\"> systematic "
-"practice of infiltrating peaceful dissident groups</a> on the pretext that "
-"there might be terrorists among them. The point at which surveillance is "
-"too much is the point at which the state can find who spoke to a known "
-"journalist or a known dissident."
+"are willing to play dirty tricks on them. The ACLU has demonstrated the U."
+"S. government's <a href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"\"> systematic practice of infiltrating peaceful dissident groups</a> on the "
+"pretext that there might be terrorists among them. The point at which "
+"surveillance is too much is the point at which the state can find who spoke "
+"to a known journalist or a known dissident."
msgstr ""
"ÐÑÑлÑнÑÑÑÑ Ð´Ð¸ÑиденÑÑв Ñ Ð¾Ð¿Ð¾Ð·Ð¸ÑÑÑ Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ
збеÑÑгаÑи ÑоÑÑ Ñ ÑекÑеÑÑ Ð²Ñд "
-"деÑжави, Ñка не пÑоÑи пÑоÑобиÑи з ними Ñой
Ñи ÑнÑий бÑÑдний вÑинок. "
-"ACLU пÑодемонÑÑÑÑвала <a
href=\"http://www.aclu.org/files/assets/"
-"Spyfiles_2_0.pdf\"> ÑиÑÑемаÑиÑÐ½Ñ Ð¿ÑакÑикÑ
впÑÐ¾Ð²Ð°Ð´Ð¶ÐµÐ½Ð½Ñ Ð°Ð³ÐµÐ½ÑÑв Ñ Ð¼Ð¸ÑÐ½Ñ "
-"гÑÑпи диÑиденÑÑв</a> з Ð±Ð¾ÐºÑ Ð´ÐµÑжавниÑ
оÑганÑв СШРпÑд Ñим "
-"пÑиводом, Ñо ÑеÑед ниÑ
можÑÑÑ Ð²Ð¸ÑвиÑиÑÑ
ÑеÑоÑиÑÑи. ТоÑка, в ÑкÑй ÑÑÐµÐ¶ÐµÐ½Ð½Ñ "
-"ÑÑÐ°Ñ Ð·Ð°Ð½Ð°Ð´Ñо великим — Ñе Ñ ÑоÑка, в
ÑкÑй деÑжава "
-"може дÑзнаÑиÑÑ, Ñ
Ñо говоÑив з вÑдомим
жÑÑналÑÑÑом або вÑдомим диÑиденÑом."
+"деÑжави, Ñка не пÑоÑи пÑоÑобиÑи з ними Ñой
Ñи ÑнÑий бÑÑдний вÑинок. ACLU "
+"пÑодемонÑÑÑÑвала <a
href=\"http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"
+"\"> ÑиÑÑемаÑиÑÐ½Ñ Ð¿ÑакÑÐ¸ÐºÑ Ð²Ð¿ÑовадженнÑ
агенÑÑв Ñ Ð¼Ð¸ÑÐ½Ñ Ð³ÑÑпи диÑиденÑÑв</a> "
+"з Ð±Ð¾ÐºÑ Ð´ÐµÑжавниÑ
оÑганÑв СШРпÑд Ñим
пÑиводом, Ñо ÑеÑед ниÑ
можÑÑÑ Ð²Ð¸ÑвиÑиÑÑ "
+"ÑеÑоÑиÑÑи. ТоÑка, в ÑкÑй ÑÑÐµÐ¶ÐµÐ½Ð½Ñ ÑÑаÑ
занадÑо великим — Ñе Ñ "
+"ÑоÑка, в ÑкÑй деÑжава може дÑзнаÑиÑÑ, Ñ
Ñо
говоÑив з вÑдомим жÑÑналÑÑÑом або "
+"вÑдомим диÑиденÑом."
#. type: Content of: <h3>
msgid "Information, Once Collected, Will Be Misused"
@@ -219,76 +201,65 @@
"the first response is to propose limits on access to the accumulated data. "
"That sounds nice, but it won't fix the problem, not even slightly, even "
"supposing that the government obeys the rules. (The NSA has misled the FISA "
-"court, which said it was <a "
-"href=\"http://www.wired.com/threatlevel/2013/09/nsa-violations/\"> unable to "
-"effectively hold the NSA accountable</a>.) Suspicion of a crime will be "
-"grounds for access, so once a whistleblower is accused of "
-"“espionage,” finding the “spy” will provide an "
-"excuse to access the accumulated material."
+"court, which said it was <a href=\"http://www.wired.com/threatlevel/2013/09/"
+"nsa-violations/\"> unable to effectively hold the NSA accountable</a>.) "
+"Suspicion of a crime will be grounds for access, so once a whistleblower is "
+"accused of “espionage,” finding the “spy” will "
+"provide an excuse to access the accumulated material."
msgstr ""
-"Ðоли лÑди визнаÑÑÑ, Ñо ÑÑÐ²ÐµÐ½Ñ Ð·Ð°Ð³Ð°Ð»Ñного
ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°Ð½Ð°Ð´Ñо виÑокий, Ñамо ÑÐ¾Ð±Ð¾Ñ "
-"напÑоÑÑÑÑÑÑÑ Ð·Ð°Ð¿ÑопонÑваÑи Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ Ð½Ð°
доÑÑÑп до зÑбÑаниÑ
даниÑ
. Це "
+"Ðоли лÑди визнаÑÑÑ, Ñо ÑÑÐ²ÐµÐ½Ñ Ð·Ð°Ð³Ð°Ð»Ñного
ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°Ð½Ð°Ð´Ñо виÑокий, Ñамо "
+"ÑÐ¾Ð±Ð¾Ñ Ð½Ð°Ð¿ÑоÑÑÑÑÑÑÑ Ð·Ð°Ð¿ÑопонÑваÑи
Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ Ð½Ð° доÑÑÑп до зÑбÑаниÑ
даниÑ
. Це "
"звÑÑиÑÑ Ð½ÐµÐ¿Ð¾Ð³Ð°Ð½Ð¾, але пÑоблеми Ñе не
виÑÑÑиÑÑ, Ð½Ñ Ð½Ð° йоÑÑ, навÑÑÑ Ñ "
-"пÑипÑÑеннÑ, "
-"Ñо деÑжава пÑдкоÑиÑÑÑÑ Ñим пÑавилам.
(ÐаÑÑоналÑне агенÑÑÑво "
-"безпеки ввело в Ð¾Ð¼Ð°Ð½Ñ ÑÑд, Ñкий ÑозбиÑав
поÑÑÑÐµÐ½Ð½Ñ ÐÐ°ÐºÐ¾Ð½Ñ Ð¿Ñо ÑÑÐµÐ¶ÐµÐ½Ð½Ñ "
-"в ÑÑлÑÑ
зовнÑÑнÑÐ¾Ñ ÑозвÑдки, пÑÑÐ»Ñ Ñого
ÑÑд заÑвив, Ñо вÑн <a "
-"href=\"http://www."
-"wired.com/threatlevel/2013/09/nsa-violations/\"> ÑакÑиÑно не в
Ð·Ð¼Ð¾Ð·Ñ "
-"оÑÑимаÑи звÑÑ Ð¿Ñо дÑÑлÑнÑÑÑÑ
агенÑÑÑва</a>.) ÐÑдозÑа Ñ Ð²ÑÐ¸Ð½ÐµÐ½Ð½Ñ "
-"злоÑÐ¸Ð½Ñ ÑÑане пÑдÑÑÐ°Ð²Ð¾Ñ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпÑ, бо
Ñк ÑÑлÑки ÑнÑоÑмаÑоÑа "
-"звинÑваÑÑÑÑ Ñ “ÑпигÑнÑÑвє, поÑÑк
“ÑпигÑна” ÑÑане "
-"пÑиводом "
-"Ð´Ð»Ñ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾ накопиÑеного маÑеÑÑалÑ."
+"пÑипÑÑеннÑ, Ñо деÑжава пÑдкоÑиÑÑÑÑ Ñим
пÑавилам. (ÐаÑÑоналÑне агенÑÑÑво "
+"безпеки ввело в Ð¾Ð¼Ð°Ð½Ñ ÑÑд, Ñкий ÑозбиÑав
поÑÑÑÐµÐ½Ð½Ñ ÐÐ°ÐºÐ¾Ð½Ñ Ð¿Ñо ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð² "
+"ÑÑлÑÑ
зовнÑÑнÑÐ¾Ñ ÑозвÑдки, пÑÑÐ»Ñ Ñого ÑÑд
заÑвив, Ñо вÑн <a href=\"http://"
+"www.wired.com/threatlevel/2013/09/nsa-violations/\"> ÑакÑиÑно не в
Ð·Ð¼Ð¾Ð·Ñ "
+"оÑÑимаÑи звÑÑ Ð¿Ñо дÑÑлÑнÑÑÑÑ
агенÑÑÑва</a>.) ÐÑдозÑа Ñ Ð²ÑÐ¸Ð½ÐµÐ½Ð½Ñ Ð·Ð»Ð¾ÑÐ¸Ð½Ñ "
+"ÑÑане пÑдÑÑÐ°Ð²Ð¾Ñ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпÑ, бо Ñк ÑÑлÑки
ÑнÑоÑмаÑоÑа звинÑваÑÑÑÑ Ñ “"
+"ÑпигÑнÑÑвє, поÑÑк “ÑпигÑна”
ÑÑане пÑиводом Ð´Ð»Ñ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾ "
+"накопиÑеного маÑеÑÑалÑ."
#. type: Content of: <p>
msgid ""
"The state's surveillance staff will misuse the data for personal reasons "
-"too. Some NSA agents <a "
-"href=\"http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-survei"
-"llance-systems\"> "
-"used U.S. surveillance systems to track their lovers</a>—past, "
-"present, or wished-for—in a practice called “LOVEINT.” The "
-"NSA says it has caught and punished this a few times; we don't know how many "
-"other times it wasn't caught. But these events shouldn't surprise us, "
-"because police have long <a "
+"too. Some NSA agents <a href=\"http://www.theguardian.com/world/2013/aug/24/"
+"nsa-analysts-abused-surveillance-systems\"> used U.S. surveillance systems "
+"to track their lovers</a>—past, present, or wished-for—in a "
+"practice called “LOVEINT.” The NSA says it has caught and "
+"punished this a few times; we don't know how many other times it wasn't "
+"caught. But these events shouldn't surprise us, because police have long <a "
"href=\"http://www.sweetliberty.org/issues/privacy/lein1.htm\">used their "
"access to driver's license records to track down someone attractive</a>, a "
"practice known as “running a plate for a date.”"
msgstr ""
-"ÐеÑжавний пеÑÑонал ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð±Ñде
зловживаÑи даними Ñ Ð² оÑобиÑÑиÑ
"
-"ÑÑлÑÑ
. ÐеÑÐºÑ Ð°Ð³ÐµÐ½Ñи ÐÐÐ <a
href=\"http://www.theguardian.com/world/2013/"
-"aug/24/nsa-analysts-abused-surveillance-systems\"> коÑиÑÑÑвалиÑÑ
ÑиÑÑемами "
-"ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð¡Ð¨Ð Ð´Ð»Ñ Ð²ÑдÑÑÐµÐ¶ÐµÐ½Ð½Ñ ÑвоÑÑ
коÑ
аниÑ
</a> минÑлиÑ
, "
-"ÑепеÑÑÑнÑÑ
Ñ Ð±Ð°Ð¶Ð°Ð½Ð¸Ñ
ÑÑ Ð¿ÑакÑика
називаÑÑÑÑÑ “лÑбовна "
-"ÑозвÑдка”. ÐгÑдно ÐÐÐ, кÑлÑка ÑазÑв ÑÑ
викÑивало в ÑÑÐ¾Ð¼Ñ Ñ ÐºÐ°Ñало; "
-"ми не знаÑмо, ÑкÑлÑки бÑло ÑнÑиÑ
випадкÑв,
коли ÑÑ
не викÑили. Ðле Ñе "
-"не повинно Ð½Ð°Ñ Ð´Ð¸Ð²ÑваÑи, ÑÐ¾Ð¼Ñ Ñо полÑÑÑÑ
давно <a href=\"http://www."
-"sweetliberty.org/issues/privacy/lein1.htm\"> коÑиÑÑÑÑÑÑÑÑ
ÑвоÑм доÑÑÑпом до "
-"запиÑÑв пÑо номеÑи авÑомобÑлÑв, Ñоб
вÑдÑÑежÑваÑи пÑивабливиÑ
оÑÑб</"
-"a> пÑакÑика, вÑдома Ñк “пÑобиÑи
номеÑ, Ñоб "
-"пÑизнаÑиÑи побаÑеннє."
+"ÐеÑжавний пеÑÑонал ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð±Ñде
зловживаÑи даними Ñ Ð² оÑобиÑÑиÑ
ÑÑлÑÑ
. "
+"ÐеÑÐºÑ Ð°Ð³ÐµÐ½Ñи ÐÐÐ <a
href=\"http://www.theguardian.com/world/2013/aug/24/nsa-"
+"analysts-abused-surveillance-systems\"> коÑиÑÑÑвалиÑÑ
ÑиÑÑемами ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð¡Ð¨Ð "
+"Ð´Ð»Ñ Ð²ÑдÑÑÐµÐ¶ÐµÐ½Ð½Ñ ÑвоÑÑ
коÑ
аниÑ
</a>
минÑлиÑ
, ÑепеÑÑÑнÑÑ
Ñ "
+"бажаниÑ
ÑÑ Ð¿ÑакÑика називаÑÑÑÑÑ
“лÑбовна ÑозвÑдка”. "
+"ÐгÑдно ÐÐÐ, кÑлÑка ÑазÑв ÑÑ
викÑивало в
ÑÑÐ¾Ð¼Ñ Ñ ÐºÐ°Ñало; ми не знаÑмо, "
+"ÑкÑлÑки бÑло ÑнÑиÑ
випадкÑв, коли ÑÑ
не
викÑили. Ðле Ñе не повинно Ð½Ð°Ñ "
+"дивÑваÑи, ÑÐ¾Ð¼Ñ Ñо полÑÑÑÑ Ð´Ð°Ð²Ð½Ð¾ <a
href=\"http://www.sweetliberty.org/issues/"
+"privacy/lein1.htm\"> коÑиÑÑÑÑÑÑÑÑ ÑвоÑм доÑÑÑпом
до запиÑÑв пÑо номеÑи "
+"авÑомобÑлÑв, Ñоб вÑдÑÑежÑваÑи пÑивабливиÑ
оÑÑб</a> пÑакÑика, "
+"вÑдома Ñк “пÑобиÑи номеÑ, Ñоб
пÑизнаÑиÑи побаÑеннє."
#. type: Content of: <p>
msgid ""
"Surveillance data will always be used for other purposes, even if this is "
"prohibited. Once the data has been accumulated and the state has the "
"possibility of access to it, it can misuse that data in dreadful ways, as "
-"shown by examples from <a "
-"href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-"
-"used-against-the-citizens/\"> "
-"Europe</a> and <a "
+"shown by examples from <a href=\"http://falkvinge.net/2012/03/17/collected-"
+"personal-data-will-always-be-used-against-the-citizens/\"> Europe</a> and <a "
"href=\"https://en.wikipedia.org/wiki/Japanese_American_internment\"> the US "
"</a>."
msgstr ""
"ÐÐ°Ð½Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°Ð²Ð¶Ð´Ð¸ бÑдÑÑÑ
викоÑиÑÑовÑваÑиÑÑ Ð² ÑнÑиÑ
ÑÑлÑÑ
, навÑÑÑ
ÑкÑо Ñе "
-"бÑде забоÑонено. Як ÑÑлÑки Ð´Ð°Ð½Ñ Ð·ÑбÑÐ°Ð½Ñ Ð¹
Ñ Ð´ÐµÑжави Ñ Ð¼Ð¾Ð¶Ð»Ð¸Ð²ÑÑÑÑ "
-"доÑÑÑÐ¿Ñ Ð´Ð¾ ниÑ
, вона може зловживаÑи Ñими
даними ÑÑÑаÑ
ÑÑливим Ñином, Ñк "
-"показÑÑÑÑ <a "
-"href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-"
-"used-against-the-citizens/\"> "
-"пÑиклади з ÐвÑопи</a> Ñ <a href="
-"\"https://en.wikipedia.org/wiki/Japanese_American_internment\">СШÐ</a>."
+"бÑде забоÑонено. Як ÑÑлÑки Ð´Ð°Ð½Ñ Ð·ÑбÑÐ°Ð½Ñ Ð¹
Ñ Ð´ÐµÑжави Ñ Ð¼Ð¾Ð¶Ð»Ð¸Ð²ÑÑÑÑ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾ "
+"ниÑ
, вона може зловживаÑи Ñими даними
ÑÑÑаÑ
ÑÑливим Ñином, Ñк показÑÑÑÑ <a "
+"href=\"http://falkvinge.net/2012/03/17/collected-personal-data-will-always-"
+"be-used-against-the-citizens/\"> пÑиклади з ÐвÑопи</a> Ñ <a
href=\"https://"
+"en.wikipedia.org/wiki/Japanese_American_internment\">СШÐ</a>."
#. type: Content of: <p>
msgid ""
@@ -299,8 +270,8 @@
msgstr ""
"ТоÑалÑне ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð² поÑÐ´Ð½Ð°Ð½Ð½Ñ Ð·
ÑозпливÑаÑÑими ÑоÑмÑлÑваннÑми законÑв "
"вÑдкÑÐ¸Ð²Ð°Ñ Ð¼Ð¾Ð¶Ð»Ð¸Ð²Ð¾ÑÑÑ Ð¼Ð°Ñового полÑваннÑ
пÑоÑи ÑÐºÐ¾Ñ Ð·Ð°Ð²Ð³Ð¾Ð´Ð½Ð¾ меÑи. Щоб "
-"ÑбезпеÑиÑи жÑÑналÑÑÑÐ¸ÐºÑ Ñа демокÑаÑÑÑ, ми
Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð¾Ð±Ð¼ÐµÐ¶Ð¸Ñи збÑÑ Ð´Ð°Ð½Ð¸Ñ
, "
-"ÑÐºÑ Ð±ÑдÑÑÑ Ð»ÐµÐ³ÐºÐ¾ доÑÑÑÐ¿Ð½Ñ Ð´ÐµÑжавÑ."
+"ÑбезпеÑиÑи жÑÑналÑÑÑÐ¸ÐºÑ Ñа демокÑаÑÑÑ, ми
Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð¾Ð±Ð¼ÐµÐ¶Ð¸Ñи збÑÑ Ð´Ð°Ð½Ð¸Ñ
, ÑÐºÑ "
+"бÑдÑÑÑ Ð»ÐµÐ³ÐºÐ¾ доÑÑÑÐ¿Ð½Ñ Ð´ÐµÑжавÑ."
#. type: Content of: <h3>
msgid "Robust Protection for Privacy Must Be Technical"
@@ -309,32 +280,29 @@
#. type: Content of: <p>
msgid ""
"The Electronic Frontier Foundation and other organizations propose a set of "
-"legal principles designed to <a "
-"href=\"https://en.necessaryandproportionate.org/text\"> prevent the abuses "
-"of massive surveillance</a>. These principles include, crucially, explicit "
-"legal protection for whistleblowers; as a consequence, they would be "
-"adequate for protecting democratic freedoms—if adopted completely and "
-"enforced without exception forever."
+"legal principles designed to <a href=\"https://en.necessaryandproportionate."
+"org/text\"> prevent the abuses of massive surveillance</a>. These "
+"principles include, crucially, explicit legal protection for whistleblowers; "
+"as a consequence, they would be adequate for protecting democratic "
+"freedoms—if adopted completely and enforced without exception forever."
msgstr ""
"Фонд елекÑÑонниÑ
ÑÑбежÑв Ñа ÑнÑÑ
оÑганÑзаÑÑÑ Ð¿ÑопонÑÑÑÑ ÑÑд ÑÑидиÑниÑ
"
-"пÑинÑипÑв, ÑкладениÑ
Ð´Ð»Ñ <a
href=\"https://en.necessaryandproportionate."
-"org/text\"> запобÑÐ³Ð°Ð½Ð½Ñ Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ð½Ñ Ð¼Ð°Ñовим
ÑÑеженнÑм</a>. У ÑÑ "
-"пÑинÑипи вÑ
одиÑÑ (Ñо жиÑÑÑво важливо)
Ñвний ÑÑидиÑний заÑ
иÑÑ ÑнÑоÑмаÑоÑÑв; "
-"Ñк наÑлÑдок, ÑÑ Ð¿ÑинÑипи бÑдÑÑÑ Ð°Ð´ÐµÐºÐ²Ð°ÑнÑ
заÑ
иÑÑÑ Ð´ÐµÐ¼Ð¾ÐºÑаÑиÑниÑ
"
-"Ñвобод — ÑкÑо ÑÑ
пÑиймÑÑÑ Ñ Ð¿Ð¾Ð²Ð½Ð¾Ð¼Ñ
обÑÑÐ·Ñ Ñ Ð±ÑдÑÑÑ Ð´Ð¾ÑÑимÑваÑиÑÑ "
-"завжди "
-"Ñ Ð±ÐµÐ· винÑÑкÑв."
+"пÑинÑипÑв, ÑкладениÑ
Ð´Ð»Ñ <a
href=\"https://en.necessaryandproportionate.org/"
+"text\"> запобÑÐ³Ð°Ð½Ð½Ñ Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ð½Ñ Ð¼Ð°Ñовим
ÑÑеженнÑм</a>. У ÑÑ Ð¿ÑинÑипи вÑ
одиÑÑ "
+"(Ñо жиÑÑÑво важливо) Ñвний ÑÑидиÑний заÑ
иÑÑ ÑнÑоÑмаÑоÑÑв; Ñк наÑлÑдок, ÑÑ "
+"пÑинÑипи бÑдÑÑÑ Ð°Ð´ÐµÐºÐ²Ð°ÑÐ½Ñ Ð·Ð°Ñ
иÑÑÑ
демокÑаÑиÑниÑ
Ñвобод — ÑкÑо ÑÑ
"
+"пÑиймÑÑÑ Ñ Ð¿Ð¾Ð²Ð½Ð¾Ð¼Ñ Ð¾Ð±ÑÑÐ·Ñ Ñ Ð±ÑдÑÑÑ
доÑÑимÑваÑиÑÑ Ð·Ð°Ð²Ð¶Ð´Ð¸ Ñ Ð±ÐµÐ· винÑÑкÑв."
#. type: Content of: <p>
msgid ""
"However, such legal protections are precarious: as recent history shows, "
-"they can be repealed (as in the FISA Amendments Act), suspended, or <a "
-"href=\"http://www.nytimes.com/2009/04/16/us/16nsa.html\"> ignored</a>."
+"they can be repealed (as in the FISA Amendments Act), suspended, or <a href="
+"\"http://www.nytimes.com/2009/04/16/us/16nsa.html\"> ignored</a>."
msgstr ""
-"Ðднак Ñакого ÑÑидиÑного заÑ
иÑÑÑ Ð½Ðµ
доÑÑаÑнÑо: Ñк показÑÑÑÑ Ð½ÐµÐ´Ð°Ð²Ð½Ñ "
-"подÑÑ, вони можÑÑÑ Ð±ÑÑи вÑÐ´ÐºÐ»Ð¸ÐºÐ°Ð½Ñ (Ñк
Ðакон пÑо попÑавки в FISA), дÑÑ ÑÑ
"
-"може бÑÑи пÑипинена, наÑеÑÑÑ ÑÑ
можÑÑÑ <a
href=\"http://www.nytimes."
-"com/2009/04/16/us/16nsa.html\"> ÑгноÑÑваÑи</a>."
+"Ðднак Ñакого ÑÑидиÑного заÑ
иÑÑÑ Ð½Ðµ
доÑÑаÑнÑо: Ñк показÑÑÑÑ Ð½ÐµÐ´Ð°Ð²Ð½Ñ Ð¿Ð¾Ð´ÑÑ, "
+"вони можÑÑÑ Ð±ÑÑи вÑÐ´ÐºÐ»Ð¸ÐºÐ°Ð½Ñ (Ñк Ðакон пÑо
попÑавки в FISA), дÑÑ ÑÑ
може бÑÑи "
+"пÑипинена, наÑеÑÑÑ ÑÑ
можÑÑÑ <a
href=\"http://www.nytimes.com/2009/04/16/"
+"us/16nsa.html\"> ÑгноÑÑваÑи</a>."
#. type: Content of: <p>
msgid ""
@@ -342,10 +310,9 @@
"surveillance; any terrorist attack, even one that kills just a handful of "
"people, will give them an opportunity."
msgstr ""
-"У Ñой же ÑÐ°Ñ Ð´ÐµÐ¼Ð°Ð³Ð¾Ð³Ð¸ бÑдÑÑÑ Ð¿ÑиводиÑи
звиÑÐ°Ð¹Ð½Ñ Ð²Ñдмовки Ñк "
-"пÑдÑÑави Ð´Ð»Ñ ÑоÑалÑного ÑÑеженнÑ;
бÑдÑ-Ñкий ÑеÑоÑиÑÑиÑний акÑ, навÑÑÑ ÑкÑо в "
-"нÑÐ¾Ð¼Ñ "
-"загине кÑлÑка лÑдей, даÑÑÑ Ñм ÑакÑ
можливÑÑÑÑ."
+"У Ñой же ÑÐ°Ñ Ð´ÐµÐ¼Ð°Ð³Ð¾Ð³Ð¸ бÑдÑÑÑ Ð¿ÑиводиÑи
звиÑÐ°Ð¹Ð½Ñ Ð²Ñдмовки Ñк пÑдÑÑави Ð´Ð»Ñ "
+"ÑоÑалÑного ÑÑеженнÑ; бÑдÑ-Ñкий
ÑеÑоÑиÑÑиÑний акÑ, навÑÑÑ ÑкÑо в нÑомÑ
загине "
+"кÑлÑка лÑдей, даÑÑÑ Ñм ÑÐ°ÐºÑ Ð¼Ð¾Ð¶Ð»Ð¸Ð²ÑÑÑÑ."
#. type: Content of: <p>
msgid ""
@@ -359,15 +326,15 @@
"As for suspending or momentarily ignoring this law, the idea would hardly "
"make sense."
msgstr ""
-"ЯкÑо Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ Ð½Ð° доÑÑÑп до даниÑ
знÑмÑÑÑ,
Ñе бÑде вÑе одно, мовби "
-"вони нÑколи не ÑÑнÑвали: доÑÑÑ, накопиÑенÑ
за Ð´Ð¾Ð²Ð³Ñ Ñоки, вÑдÑÐ°Ð·Ñ ÑÑанÑÑÑ "
-"доÑÑÑÐ¿Ð½Ñ Ð´Ð»Ñ Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ð½Ñ Ð· Ð±Ð¾ÐºÑ Ð´ÐµÑжави Ñа
ÑÑ Ð°Ð³ÐµÐ½ÑÑв, а ÑкÑо ÑÑ
"
-"зÑбÑали компанÑÑ, Ñо Ñ Ð´Ð»Ñ Ð¿ÑиваÑниÑ
Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ð½Ñ Ð· ÑÑ
нÑого бокÑ. Ðднак ÑкÑо "
-"ми зÑпинимо збÑÑ Ð´Ð¾ÑÑÑ Ð½Ð° кожного, Ñо ÑиÑ
доÑÑÑ Ð½Ðµ бÑде Ñ Ð½Ðµ бÑде "
-"ÑпоÑобÑв зÑбÑаÑи ÑÑ
заднÑм ÑиÑлом. ÐовомÑ
анÑилÑбеÑалÑÐ½Ð¾Ð¼Ñ ÑÐµÐ¶Ð¸Ð¼Ñ Ð´Ð¾Ð²ÐµÐ»Ð¾ÑÑ Ð± "
+"ЯкÑо Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ Ð½Ð° доÑÑÑп до даниÑ
знÑмÑÑÑ,
Ñе бÑде вÑе одно, мовби вони "
+"нÑколи не ÑÑнÑвали: доÑÑÑ, накопиÑÐµÐ½Ñ Ð·Ð°
Ð´Ð¾Ð²Ð³Ñ Ñоки, вÑдÑÐ°Ð·Ñ ÑÑанÑÑÑ "
+"доÑÑÑÐ¿Ð½Ñ Ð´Ð»Ñ Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ð½Ñ Ð· Ð±Ð¾ÐºÑ Ð´ÐµÑжави Ñа
ÑÑ Ð°Ð³ÐµÐ½ÑÑв, а ÑкÑо ÑÑ
зÑбÑали "
+"компанÑÑ, Ñо Ñ Ð´Ð»Ñ Ð¿ÑиваÑниÑ
Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ð½Ñ Ð·
ÑÑ
нÑого бокÑ. Ðднак ÑкÑо ми "
+"зÑпинимо збÑÑ Ð´Ð¾ÑÑÑ Ð½Ð° кожного, Ñо ÑиÑ
доÑÑÑ Ð½Ðµ бÑде Ñ Ð½Ðµ бÑде ÑпоÑобÑв "
+"зÑбÑаÑи ÑÑ
заднÑм ÑиÑлом. ÐовомÑ
анÑилÑбеÑалÑÐ½Ð¾Ð¼Ñ ÑÐµÐ¶Ð¸Ð¼Ñ Ð´Ð¾Ð²ÐµÐ»Ð¾ÑÑ Ð± "
"ÑеалÑзовÑваÑи ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°Ð½Ð¾Ð²Ð¾, Ñ Ð´Ð°Ð½Ñ
збиÑалиÑÑ Ð± ÑÑлÑки поÑинаÑÑи з ÑÑого "
-"моменÑÑ. Що ÑÑоÑÑÑÑÑÑÑ Ð¿ÑизÑÐ¿Ð¸Ð½ÐµÐ½Ð½Ñ Ð´ÑÑ
або ÑгноÑÑÐ²Ð°Ð½Ð½Ñ ÑÑого законÑ, "
-"ÑÑ ÑÐ´ÐµÑ Ð½Ð°Ð²ÑÑд Ñи Ð¼Ð°Ñ ÑенÑ."
+"моменÑÑ. Що ÑÑоÑÑÑÑÑÑÑ Ð¿ÑизÑÐ¿Ð¸Ð½ÐµÐ½Ð½Ñ Ð´ÑÑ
або ÑгноÑÑÐ²Ð°Ð½Ð½Ñ ÑÑого законÑ, ÑÑ "
+"ÑÐ´ÐµÑ Ð½Ð°Ð²ÑÑд Ñи Ð¼Ð°Ñ ÑенÑ."
#. type: Content of: <h3>
msgid "First, Don't Be Foolish"
@@ -379,15 +346,14 @@
"protect your privacy is you. Don't tell a company such as Facebook anything "
"about you that you hesitate to publish in a newspaper. Don't tell a company "
"such as Facebook anything about your friends that they might not wish to "
-"publish in a newspaper. Better yet, don't be one of Facebook's users at "
-"all."
+"publish in a newspaper. Better yet, don't be one of Facebook's users at all."
msgstr ""
-"Щоб Ñ Ð²Ð°Ñ Ð±Ñла конÑÑденÑÑйнÑÑÑÑ, ви не
Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ ÑÑ Ð²Ð¸ÐºÐ¸Ð´Ð°Ñи: заÑ
иÑаÑи "
-"ваÑÑ ÐºÐ¾Ð½ÑÑденÑÑйнÑÑÑÑ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð½Ð°ÑампеÑед
ви ÑамÑ. Ðе ÑозповÑдайÑе "
-"компанÑÑ, Ñк Facebook, нÑÑого Ñакого, Ñо ви не
пеÑедали б Ð´Ð»Ñ "
-"пÑблÑкаÑÑÑ Ð² газеÑÑ. Ðе ÑозповÑдайÑе
компанÑÑ, Ñк Facebook, пÑо ÑвоÑÑ
"
-"знайомиÑ
нÑÑого Ñакого, Ñо вони не Ñ
оÑÑли
б опÑблÑкÑваÑи в газеÑÑ. Ð Ñе "
-"кÑаÑе не бÑÑи одним з коÑиÑÑÑваÑÑв Facebook
взагалÑ."
+"Щоб Ñ Ð²Ð°Ñ Ð±Ñла конÑÑденÑÑйнÑÑÑÑ, ви не
Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ ÑÑ Ð²Ð¸ÐºÐ¸Ð´Ð°Ñи: заÑ
иÑаÑи ваÑÑ "
+"конÑÑденÑÑйнÑÑÑÑ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð½Ð°ÑампеÑед ви
ÑамÑ. Ðе ÑозповÑдайÑе компанÑÑ, Ñк "
+"Facebook, нÑÑого Ñакого, Ñо ви не пеÑедали б
Ð´Ð»Ñ Ð¿ÑблÑкаÑÑÑ Ð² газеÑÑ. Ðе "
+"ÑозповÑдайÑе компанÑÑ, Ñк Facebook, пÑо ÑвоÑÑ
знайомиÑ
нÑÑого Ñакого, Ñо "
+"вони не Ñ
оÑÑли б опÑблÑкÑваÑи в газеÑÑ. Ð
Ñе кÑаÑе не бÑÑи одним з "
+"коÑиÑÑÑваÑÑв Facebook взагалÑ."
#. type: Content of: <p>
msgid ""
@@ -397,31 +363,29 @@
"service, provided you encrypted the data, including the file names, with "
"free software on your own computer before uploading it."
msgstr ""
-"ÐÑколи не пеÑедавайÑе Ð½Ñ Ð½Ð° Ñкий ÑайÑ
повний ÑпиÑок адÑÐµÑ ÐµÐ»ÐµÐºÑÑÐ¾Ð½Ð½Ð¾Ñ "
-"поÑÑи Ñа номеÑи ÑелеÑонÑв лÑдей, з Ñкими
ви ÑпÑлкÑÑÑеÑÑ. ТÑимайÑе ÑÐ²Ð¾Ñ "
-"Ð´Ð°Ð½Ñ Ñ Ñебе; не збеÑÑгайÑе ÑÐ²Ð¾Ñ Ð´Ð°Ð½Ñ Ð½Ð°
“зÑÑÑномє ÑеÑвеÑÑ "
-"компанÑÑ. Ðднак ÑÑлком безпеÑно довÑÑÑÑи
ÑезеÑÐ²Ð½Ñ ÐºÐ¾Ð¿ÑÑ Ð´Ð°Ð½Ð¸Ñ
"
-"Ñ ÐºÐ¾Ð¼ÐµÑÑÑйнÑй ÑлÑÐ¶Ð±Ñ Ð·Ð° Ñмови, Ñо ви
заÑиÑÑÑвали ÑÑ Ð´Ð°Ð½Ñ, в ÑÐ¾Ð¼Ñ ÑиÑÐ»Ñ "
-"Ñмена ÑайлÑв на ÑвоÑÐ¼Ñ ÐºÐ¾Ð¼Ð¿'ÑÑеÑÑ Ð·Ð°
Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ Ð²ÑлÑниÑ
пÑогÑам пеÑед Ñим, "
-"Ñк вÑдпÑавлÑÑи ÑÑ
на ÑеÑвеÑ."
+"ÐÑколи не пеÑедавайÑе Ð½Ñ Ð½Ð° Ñкий ÑайÑ
повний ÑпиÑок адÑÐµÑ ÐµÐ»ÐµÐºÑÑÐ¾Ð½Ð½Ð¾Ñ Ð¿Ð¾ÑÑи "
+"Ñа номеÑи ÑелеÑонÑв лÑдей, з Ñкими ви
ÑпÑлкÑÑÑеÑÑ. ТÑимайÑе ÑÐ²Ð¾Ñ Ð´Ð°Ð½Ñ Ñ "
+"Ñебе; не збеÑÑгайÑе ÑÐ²Ð¾Ñ Ð´Ð°Ð½Ñ Ð½Ð°
“зÑÑÑномє ÑеÑвеÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ. "
+"Ðднак ÑÑлком безпеÑно довÑÑÑÑи ÑезеÑвнÑ
копÑÑ Ð´Ð°Ð½Ð¸Ñ
Ñ ÐºÐ¾Ð¼ÐµÑÑÑйнÑй ÑлÑÐ¶Ð±Ñ Ð·Ð° "
+"Ñмови, Ñо ви заÑиÑÑÑвали ÑÑ Ð´Ð°Ð½Ñ, в ÑомÑ
ÑиÑÐ»Ñ Ñмена ÑайлÑв на ÑвоÑÐ¼Ñ "
+"комп'ÑÑеÑÑ Ð·Ð° Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ Ð²ÑлÑниÑ
пÑогÑам
пеÑед Ñим, Ñк вÑдпÑавлÑÑи ÑÑ
на "
+"ÑеÑвеÑ."
#. type: Content of: <p>
msgid ""
"For privacy's sake, you must avoid nonfree software since, as a consequence "
-"of giving others control of your computing, it is <a "
-"href=\"/philosophy/proprietary-surveillance.html\"> likely to spy on you "
-"</a>. Avoid <a href=\"/philosophy/who-does-that-server-really-serve.html\"> "
-"service as a software substitute </a>; as well as giving others control of "
-"your computing, it requires you to hand over all the pertinent data to the "
-"server."
+"of giving others control of your computing, it is <a href=\"/philosophy/"
+"proprietary-surveillance.html\"> likely to spy on you </a>. Avoid <a href="
+"\"/philosophy/who-does-that-server-really-serve.html\"> service as a "
+"software substitute </a>; as well as giving others control of your "
+"computing, it requires you to hand over all the pertinent data to the server."
msgstr ""
"ÐаÑади конÑÑденÑÑйноÑÑÑ Ð²Ð¸ повиннÑ
ÑникаÑи невÑлÑниÑ
пÑогÑам, оÑкÑлÑки "
"внаÑлÑдок пеÑедаÑÑ ÑнÑим конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
ваÑими обÑиÑленнÑми, вони, <a href=\"/"
"philosophy/proprietary-surveillance.html\">ймовÑÑно, ÑпигÑÑÑÑ
за вами</a>. "
"УникайÑе <a
href=\"/philosophy/who-does-that-server-really-serve.html\"> "
"поÑлÑг пÑдмÑни пÑогÑам</a>, а Ñакож
пеÑедаÑÑ ÑнÑим конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ваÑими "
-"обÑиÑленнÑми, Ñе Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ Ð²Ñд Ð²Ð°Ñ Ð½Ð°Ð´Ð°Ð½Ð½Ñ
вÑÑÑ
обÑоблÑваниÑ
даниÑ
"
-"на ÑеÑвеÑ."
+"обÑиÑленнÑми, Ñе Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ Ð²Ñд Ð²Ð°Ñ Ð½Ð°Ð´Ð°Ð½Ð½Ñ
вÑÑÑ
обÑоблÑваниÑ
даниÑ
на ÑеÑвеÑ."
#. type: Content of: <p>
msgid ""
@@ -431,9 +395,9 @@
"practices of society."
msgstr ""
"Ðднак навÑÑÑ Ð½Ð°Ð¹Ð¿Ð¸Ð»ÑнÑÑого ÑамозаÑ
иÑÑÑ
недоÑÑаÑнÑо, Ñоб заÑ
иÑÑиÑи ваÑÑ "
-"конÑÑденÑÑйнÑÑÑÑ Ð½Ð° ÑиÑÑемаÑ
, ÑÐºÑ Ð²Ð°Ð¼ не
належаÑÑ. Ðоли ми "
-"ÑпÑлкÑÑмоÑÑ Ð· ÑнÑими або пеÑеÑÑваÑмоÑÑ Ð¿Ð¾
мÑÑÑÑ, наÑа конÑÑденÑÑйнÑÑÑÑ "
-"залежиÑÑ Ð²Ñд ÑиÑÑаÑÑÑ Ð² ÑÑÑпÑлÑÑÑвÑ
пÑакÑики."
+"конÑÑденÑÑйнÑÑÑÑ Ð½Ð° ÑиÑÑемаÑ
, ÑÐºÑ Ð²Ð°Ð¼ не
належаÑÑ. Ðоли ми ÑпÑлкÑÑмоÑÑ Ð· "
+"ÑнÑими або пеÑеÑÑваÑмоÑÑ Ð¿Ð¾ мÑÑÑÑ, наÑа
конÑÑденÑÑйнÑÑÑÑ Ð·Ð°Ð»ÐµÐ¶Ð¸ÑÑ Ð²Ñд "
+"ÑиÑÑаÑÑÑ Ð² ÑÑÑпÑлÑÑÑÐ²Ñ Ð¿ÑакÑики."
#. type: Content of: <h3>
msgid "We Must Design Every System for Privacy"
@@ -447,10 +411,9 @@
"construction."
msgstr ""
"ЯкÑо ми не Ñ
оÑемо жиÑи Ñ ÑÑÑпÑлÑÑÑвÑ
ÑоÑалÑного ÑÑеженнÑ, ми Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ "
-"ÑозглÑдаÑи "
-"ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ñк Ñвого ÑÐ¾Ð´Ñ ÑоÑÑалÑне
забÑÑÐ´Ð½ÐµÐ½Ð½Ñ Ñ Ð¾Ð±Ð¼ÐµÐ¶ÑваÑи внеÑок Ñ ÑÑеженнÑ
"
-"ÐºÐ¾Ð¶Ð½Ð¾Ñ Ð½Ð¾Ð²Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ ÑиÑÑеми ÑоÑно Ñак
Ñамо, Ñк ми обмежÑÑмо вплив "
-"ÑÑзиÑниÑ
ÑпоÑÑд на навколиÑÐ½Ñ ÑеÑедовиÑе."
+"ÑозглÑдаÑи ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ñк Ñвого ÑодÑ
ÑоÑÑалÑне забÑÑÐ´Ð½ÐµÐ½Ð½Ñ Ñ Ð¾Ð±Ð¼ÐµÐ¶ÑваÑи внеÑок "
+"Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ ÐºÐ¾Ð¶Ð½Ð¾Ñ Ð½Ð¾Ð²Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ ÑиÑÑеми
ÑоÑно Ñак Ñамо, Ñк ми обмежÑÑмо "
+"вплив ÑÑзиÑниÑ
ÑпоÑÑд на навколиÑнÑ
ÑеÑедовиÑе."
#. type: Content of: <p>
msgid ""
@@ -469,14 +432,12 @@
"Ñо вони вÑдÑилаÑÑÑ Ð² енеÑгеÑиÑÐ½Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ
моменÑалÑÐ½Ñ Ð´Ð°Ð½Ñ Ð¿Ñо виÑÑаÑÑ "
"елекÑÑоенеÑгÑÑ ÐºÐ¾Ð¶Ð½Ð¸Ð¼ коÑиÑÑÑваÑем, Ñ
ÑÐ¾Ð¼Ñ ÑиÑÐ»Ñ Ð¿Ñо Ñе, Ñк виÑÑаÑа "
"ÑпÑввÑдноÑиÑÑÑÑ Ð· виÑÑаÑÐ¾Ñ ÑеÑеднÑого
коÑиÑÑÑваÑа. Це ÑеалÑзовано на оÑÐ½Ð¾Ð²Ñ "
-"ÑоÑалÑного ÑÑеженнÑ, але нÑÑкого ÑÑеженнÑ
Ð´Ð»Ñ ÑÑого не поÑÑÑбно. ÐнеÑгеÑиÑнÑй "
-"компанÑÑ "
-"бÑло б неважко виÑаÑ
овÑваÑи ÑеÑеднÑ
виÑÑаÑи Ñ Ð¶Ð¸ÑÐ»Ð¾Ð²Ð¾Ð¼Ñ ÑайонÑ, подÑливÑи "
-"загалÑÐ½Ñ "
-"виÑÑаÑÑ Ð½Ð° ÑиÑло абоненÑÑв, Ñ Ð²Ð¸ÑилаÑи
оÑÑимане знаÑÐµÐ½Ð½Ñ Ð½Ð° лÑÑилÑники. "
-"ÐлекÑÑолÑÑилÑник кожного клÑÑнÑа мÑг би
поÑÑвнÑваÑи Ñе з ÑвоÑми вимÑÑами "
-"за поÑÑÑбний пеÑÑод з ÑеÑеднÑм гÑаÑÑком
виÑÑÐ°Ñ Ð·Ð° Ñей пеÑÑод. Те ж Ñаме, "
-"ÑÑлÑки без ÑÑеженнÑ!"
+"ÑоÑалÑного ÑÑеженнÑ, але нÑÑкого ÑÑеженнÑ
Ð´Ð»Ñ ÑÑого не поÑÑÑбно. "
+"ÐнеÑгеÑиÑнÑй компанÑÑ Ð±Ñло б неважко
виÑаÑ
овÑваÑи ÑеÑÐµÐ´Ð½Ñ Ð²Ð¸ÑÑаÑи Ñ "
+"жиÑÐ»Ð¾Ð²Ð¾Ð¼Ñ ÑайонÑ, подÑливÑи загалÑнÑ
виÑÑаÑÑ Ð½Ð° ÑиÑло абоненÑÑв, Ñ Ð²Ð¸ÑилаÑи "
+"оÑÑимане знаÑÐµÐ½Ð½Ñ Ð½Ð° лÑÑилÑники.
ÐлекÑÑолÑÑилÑник кожного клÑÑнÑа мÑг би "
+"поÑÑвнÑваÑи Ñе з ÑвоÑми вимÑÑами за
поÑÑÑбний пеÑÑод з ÑеÑеднÑм гÑаÑÑком "
+"виÑÑÐ°Ñ Ð·Ð° Ñей пеÑÑод. Те ж Ñаме, ÑÑлÑки без
ÑÑеженнÑ!"
#. type: Content of: <p>
msgid "We need to design such privacy into all our digital systems."
@@ -499,15 +460,13 @@
"them."
msgstr ""
"<a name=\"dispersal\"></a>Ðдин Ð·Ñ ÑпоÑобÑв зÑобиÑи
безпеÑÐ½Ð¾Ñ Ð´Ð»Ñ "
-"ÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ "
-"конÑÑденÑÑйнÑÑÑÑ Ð·Ð°Ð»Ð¸ÑаÑи данÑ
ÑозоÑеÑедженими, без "
-"зÑÑÑного доÑÑÑпÑ. СÑаÑÐ¾Ð¼Ð¾Ð´Ð½Ñ ÐºÐ°Ð¼ÐµÑи
вÑдеоÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ Ð½Ðµ пÑедÑÑавлÑли "
-"загÑози "
-"конÑÑденÑÑйноÑÑÑ. ÐапиÑи велиÑÑ Ð½Ð° мÑÑÑÑ
Ñ Ð·Ð±ÐµÑÑгалиÑÑ Ð½Ðµ довÑе кÑлÑкоÑ
"
-"ÑижнÑв. ЧеÑез незÑÑÑноÑÑÑ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾ ÑиÑ
запиÑÑв до ниÑ
нÑколи не звеÑÑалиÑÑ "
-"багаÑо; запиÑи пÑднÑмали ÑÑлÑки в мÑÑÑÑÑ
,
де Ñ
ÑоÑÑ Ð¿Ð¾Ð²ÑдомлÑв пÑо "
-"злоÑин. ÐÑло ÑÑзиÑно неможливо збиÑаÑи
кожен Ð´ÐµÐ½Ñ Ð¼ÑлÑйони ÑÑÑÑÑок, "
-"а поÑÑм пеÑеглÑдаÑи або копÑÑваÑи ÑÑ
."
+"ÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ ÐºÐ¾Ð½ÑÑденÑÑйнÑÑÑÑ
залиÑаÑи Ð´Ð°Ð½Ñ ÑозоÑеÑедженими, "
+"без зÑÑÑного доÑÑÑпÑ. СÑаÑÐ¾Ð¼Ð¾Ð´Ð½Ñ ÐºÐ°Ð¼ÐµÑи
вÑдеоÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ Ð½Ðµ пÑедÑÑавлÑли "
+"загÑози конÑÑденÑÑйноÑÑÑ. ÐапиÑи велиÑÑ
на мÑÑÑÑ Ñ Ð·Ð±ÐµÑÑгалиÑÑ Ð½Ðµ довÑе "
+"кÑлÑкоÑ
ÑижнÑв. ЧеÑез незÑÑÑноÑÑÑ Ð´Ð¾ÑÑÑпÑ
до ÑиÑ
запиÑÑв до ниÑ
нÑколи не "
+"звеÑÑалиÑÑ Ð±Ð°Ð³Ð°Ñо; запиÑи пÑднÑмали
ÑÑлÑки в мÑÑÑÑÑ
, де Ñ
ÑоÑÑ Ð¿Ð¾Ð²ÑдомлÑв пÑо "
+"злоÑин. ÐÑло ÑÑзиÑно неможливо збиÑаÑи
кожен Ð´ÐµÐ½Ñ Ð¼ÑлÑйони ÑÑÑÑÑок, а поÑÑм "
+"пеÑеглÑдаÑи або копÑÑваÑи ÑÑ
."
#. type: Content of: <p>
msgid ""
@@ -528,24 +487,22 @@
#. type: Content of: <p>
msgid ""
"Internet-connected cameras often have lousy digital security themselves, so "
-"<a "
-"href=\"http://www.networkworld.com/community/blog/cia-wants-spy-you-through-yo"
-"ur-appliances\"> "
-"anyone could watch what the camera sees</a>. To restore privacy, we should "
-"ban the use of Internet-connected cameras aimed where and when the public is "
-"admitted, except when carried by people. Everyone must be free to post "
-"photos and video recordings occasionally, but the systematic accumulation of "
-"such data on the Internet must be limited."
+"<a href=\"http://www.networkworld.com/community/blog/cia-wants-spy-you-"
+"through-your-appliances\"> anyone could watch what the camera sees</a>. To "
+"restore privacy, we should ban the use of Internet-connected cameras aimed "
+"where and when the public is admitted, except when carried by people. "
+"Everyone must be free to post photos and video recordings occasionally, but "
+"the systematic accumulation of such data on the Internet must be limited."
msgstr ""
"ÐамеÑи, пÑд'ÑÐ´Ð½Ð°Ð½Ñ Ð´Ð¾ ÐнÑеÑнеÑÑ, ÑаÑÑо заÑ
иÑÐµÐ½Ñ Ð² ÑиÑÑÐ¾Ð²Ð¾Ð¼Ñ Ð²ÑдноÑÐµÐ½Ð½Ñ "
-"доÑиÑÑ Ð¿Ð¾Ð³Ð°Ð½Ð¾, ÑÐ¾Ð¼Ñ Ñо <a
href=\"http://www.networkworld.com/"
-"community/blog/cia-wants-spy-you-through-your-appliances\"> Ñ
Ñо
завгодно може "
-" пеÑеглÑдаÑи Ñе, на Ñо ÑпÑÑмована
камеÑа</a>. Щоб вÑдновиÑи "
-"конÑÑденÑÑйнÑÑÑÑ, нам ÑÑеба забоÑониÑи
коÑиÑÑÑÐ²Ð°Ð½Ð½Ñ ÐºÐ°Ð¼ÐµÑами, пÑд'Ñднаними до "
-"ÐнÑеÑнеÑÑ, коли вони напÑÐ°Ð²Ð»ÐµÐ½Ñ Ð½Ð°
гÑомадÑÑÐºÑ Ð¼ÑÑÑÑ, ÑкÑо ÑÑлÑки ÑÑ "
-"камеÑи не вÑÑÐ°Ð½Ð¾Ð²Ð»ÐµÐ½Ñ Ð½Ð° лÑдинÑ. Ðожен
повинен маÑи пÑаво вÑлÑно пÑблÑкÑваÑи "
-"ÑÐ½Ð¾Ð´Ñ ÑоÑо - Ñ Ð²ÑдеозапиÑи, але
ÑиÑÑемаÑиÑне накопиÑÐµÐ½Ð½Ñ ÑакиÑ
даниÑ
Ñ "
-"ÐнÑеÑнеÑÑ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ðµ обмежÑваÑиÑÑ."
+"доÑиÑÑ Ð¿Ð¾Ð³Ð°Ð½Ð¾, ÑÐ¾Ð¼Ñ Ñо <a
href=\"http://www.networkworld.com/community/blog/"
+"cia-wants-spy-you-through-your-appliances\"> Ñ
Ñо завгодно може
пеÑеглÑдаÑи "
+"Ñе, на Ñо ÑпÑÑмована камеÑа</a>. Щоб
вÑдновиÑи конÑÑденÑÑйнÑÑÑÑ, нам ÑÑеба "
+"забоÑониÑи коÑиÑÑÑÐ²Ð°Ð½Ð½Ñ ÐºÐ°Ð¼ÐµÑами,
пÑд'Ñднаними до ÐнÑеÑнеÑÑ, коли вони "
+"напÑÐ°Ð²Ð»ÐµÐ½Ñ Ð½Ð° гÑомадÑÑÐºÑ Ð¼ÑÑÑÑ, ÑкÑо
ÑÑлÑки ÑÑ ÐºÐ°Ð¼ÐµÑи не вÑÑÐ°Ð½Ð¾Ð²Ð»ÐµÐ½Ñ Ð½Ð° "
+"лÑдинÑ. Ðожен повинен маÑи пÑаво вÑлÑно
пÑблÑкÑваÑи ÑÐ½Ð¾Ð´Ñ ÑоÑо - Ñ "
+"вÑдеозапиÑи, але ÑиÑÑемаÑиÑне
накопиÑÐµÐ½Ð½Ñ ÑакиÑ
даниÑ
Ñ ÐнÑеÑнеÑÑ
повинне "
+"обмежÑваÑиÑÑ."
#. type: Content of: <h3>
msgid "Remedy for Internet Commerce Surveillance"
@@ -559,33 +516,29 @@
"done directly by the state or farmed out to a business, because the data "
"that the companies collect is systematically available to the state."
msgstr ""
-"ÐÑлÑÑÑÑÑÑ Ð·ÑбÑаниÑ
даниÑ
Ð²Ð¸Ð½Ð¸ÐºÐ°Ñ Ð²
ÑезÑлÑÑаÑÑ Ð²Ð»Ð°ÑÐ½Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ "
-"дÑÑлÑноÑÑÑ Ð»Ñдей. ÐазвиÑай Ð´Ð°Ð½Ñ ÑпоÑаÑкÑ
збиÑаÑÑÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑми. Ðле коли "
-"мова йде пÑо загÑÐ¾Ð·Ñ ÐºÐ¾Ð½ÑÑденÑÑйноÑÑÑ Ñ
демокÑаÑÑÑ, абÑолÑÑно байдÑже, "
-"пÑоводиÑÑÑÑ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´ÐµÑжавоÑ
безпоÑеÑеднÑо або ÑÑ Ð´Ð¾ÑÑÑаÑÑÑ
пÑдпÑиÑмÑÑвÑ, "
-"ÑÐ¾Ð¼Ñ Ñо данÑ, ÑÐºÑ Ð·Ð±Ð¸ÑаÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ,
ÑиÑÑемаÑиÑно доÑÑÑÐ¿Ð½Ñ "
-"деÑжавÑ."
+"ÐÑлÑÑÑÑÑÑ Ð·ÑбÑаниÑ
даниÑ
Ð²Ð¸Ð½Ð¸ÐºÐ°Ñ Ð²
ÑезÑлÑÑаÑÑ Ð²Ð»Ð°ÑÐ½Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ Ð´ÑÑлÑноÑÑÑ "
+"лÑдей. ÐазвиÑай Ð´Ð°Ð½Ñ ÑпоÑаÑÐºÑ Ð·Ð±Ð¸ÑаÑÑÑÑÑ
компанÑÑми. Ðле коли мова йде пÑо "
+"загÑÐ¾Ð·Ñ ÐºÐ¾Ð½ÑÑденÑÑйноÑÑÑ Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÑÑ,
абÑолÑÑно байдÑже, пÑоводиÑÑÑÑ "
+"ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´ÐµÑÐ¶Ð°Ð²Ð¾Ñ Ð±ÐµÐ·Ð¿Ð¾ÑеÑеднÑо або ÑÑ
доÑÑÑаÑÑÑ Ð¿ÑдпÑиÑмÑÑвÑ, ÑÐ¾Ð¼Ñ Ñо данÑ, "
+"ÑÐºÑ Ð·Ð±Ð¸ÑаÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ, ÑиÑÑемаÑиÑно
доÑÑÑÐ¿Ð½Ñ Ð´ÐµÑжавÑ."
#. type: Content of: <p>
msgid ""
-"The NSA, through PRISM, has <a "
-"href=\"https://www.commondreams.org/headline/2013/08/23-2\"> gotten into the "
-"databases of many large Internet corporations</a>. AT&T has saved all "
-"its phone call records since 1987 and <a "
-"href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-e"
-"clipsing-nsas.html?_r=0\"> "
-"makes them available to the DEA</a> to search on request. Strictly "
-"speaking, the U.S. government does not possess that data, but in practical "
-"terms it may as well possess it."
+"The NSA, through PRISM, has <a href=\"https://www.commondreams.org/"
+"headline/2013/08/23-2\"> gotten into the databases of many large Internet "
+"corporations</a>. AT&T has saved all its phone call records since 1987 "
+"and <a href=\"http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-"
+"phone-trove-eclipsing-nsas.html?_r=0\"> makes them available to the DEA</a> "
+"to search on request. Strictly speaking, the U.S. government does not "
+"possess that data, but in practical terms it may as well possess it."
msgstr ""
"ÐÐРз Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ PRISM <a href=\"https://www.commondreams.org/"
"headline/2013/08/23-2\"> пÑоникло в бази даниÑ
багаÑÑоÑ
великиÑ
коÑпоÑаÑÑй в "
"облаÑÑÑ ÐнÑеÑнеÑÑ</a>. AT&T збеÑÑÐ³Ð°Ñ Ð²ÑÑ
ÑÐ²Ð¾Ñ Ð·Ð°Ð¿Ð¸Ñи пÑо ÑелеÑÐ¾Ð½Ð½Ñ "
"пеÑеговоÑи з 1987 ÑÐ¾ÐºÑ Ñ <a
href=\"http://www.nytimes."
"com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?"
-"_r=0\"> Ð½Ð°Ð´Ð°Ñ ÑÑ
DEA</a> Ð´Ð»Ñ Ð¿Ð¾ÑÑÐºÑ Ð·Ð° запиÑом.
СÑÑого кажÑÑи, "
-"пÑавлÑÑий Ñежим СШРне володÑÑ Ñими
даними, але пÑакÑиÑно ÑÑзниÑÑ Ð½ÐµÐ¼Ð°Ñ "
-"жодноÑ."
+"_r=0\"> Ð½Ð°Ð´Ð°Ñ ÑÑ
DEA</a> Ð´Ð»Ñ Ð¿Ð¾ÑÑÐºÑ Ð·Ð° запиÑом.
СÑÑого кажÑÑи, пÑавлÑÑий "
+"Ñежим СШРне володÑÑ Ñими даними, але
пÑакÑиÑно ÑÑзниÑÑ Ð½ÐµÐ¼Ð°Ñ Ð¶Ð¾Ð´Ð½Ð¾Ñ."
#. type: Content of: <p>
msgid ""
@@ -596,57 +549,51 @@
"should not be allowed to keep them more than a short time beyond what is "
"inherently necessary for their dealings with us."
msgstr ""
-"ÐÑже, в ÑÑлÑÑ
забезпеÑÐµÐ½Ð½Ñ Ð±ÐµÐ·Ð¿ÐµÐºÐ¸
жÑÑналÑÑÑики Ñа демокÑаÑÑÑ "
-"поÑÑÑбно ÑкоÑоÑиÑи обÑÑг даниÑ
, зÑбÑаниÑ
пÑо лÑдей бÑдÑ-Ñкими оÑганÑзаÑÑÑми, "
-"а "
-"не ÑÑлÑки деÑжавоÑ. Ðи повиннÑ
пеÑепÑоекÑÑваÑи ÑиÑÑÐ¾Ð²Ñ ÑиÑÑеми Ñак, "
-"Ñоб вони не збиÑали Ð´Ð°Ð½Ñ Ð¿Ñо ÑвоÑÑ
коÑиÑÑÑваÑÑв. ЯкÑо Ñм поÑÑÑÐ±Ð½Ñ "
-"ÑиÑÑÐ¾Ð²Ñ Ð´Ð°Ð½Ñ Ð¿Ñо наÑиÑ
опеÑаÑÑÑÑ
, Ñм не
повинно бÑÑи дозволено збеÑÑгаÑи ÑÑ
"
-"довÑе, нÑж коÑоÑкий ÑÐ°Ñ Ð¿ÑÑÐ»Ñ Ñого, Ñо
пÑинÑипово необÑ
Ñдно Ñм Ð´Ð»Ñ "
-"ÑобоÑи з нами."
+"ÐÑже, в ÑÑлÑÑ
забезпеÑÐµÐ½Ð½Ñ Ð±ÐµÐ·Ð¿ÐµÐºÐ¸
жÑÑналÑÑÑики Ñа демокÑаÑÑÑ Ð¿Ð¾ÑÑÑбно "
+"ÑкоÑоÑиÑи обÑÑг даниÑ
, зÑбÑаниÑ
пÑо лÑдей
бÑдÑ-Ñкими оÑганÑзаÑÑÑми, а не "
+"ÑÑлÑки деÑжавоÑ. Ðи повиннÑ
пеÑепÑоекÑÑваÑи ÑиÑÑÐ¾Ð²Ñ ÑиÑÑеми Ñак, Ñоб
вони не "
+"збиÑали Ð´Ð°Ð½Ñ Ð¿Ñо ÑвоÑÑ
коÑиÑÑÑваÑÑв. ЯкÑо
Ñм поÑÑÑÐ±Ð½Ñ ÑиÑÑÐ¾Ð²Ñ Ð´Ð°Ð½Ñ Ð¿Ñо наÑиÑ
"
+"опеÑаÑÑÑÑ
, Ñм не повинно бÑÑи дозволено
збеÑÑгаÑи ÑÑ
довÑе, нÑж коÑоÑкий ÑÐ°Ñ "
+"пÑÑÐ»Ñ Ñого, Ñо пÑинÑипово необÑ
Ñдно Ñм длÑ
ÑобоÑи з нами."
#. type: Content of: <p>
msgid ""
"One of the motives for the current level of surveillance of the Internet is "
"that sites are financed through advertising based on tracking users' "
-"activities and propensities. This converts a mere "
-"annoyance—advertising that we can learn to ignore—into a "
-"surveillance system that harms us whether we know it or not. Purchases over "
-"the Internet also track their users. And we are all aware that "
-"“privacy policies” are more excuses to violate privacy than "
-"commitments to uphold it."
-msgstr ""
-"Ðдна Ñз ÑпонÑкалÑниÑ
пÑиÑин ÑÑÑаÑного
ÑÑÐ²Ð½Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð² ÐнÑеÑнеÑÑ "
-"полÑÐ³Ð°Ñ Ð² ÑомÑ, Ñо ÑайÑи ÑÑнанÑÑÑÑÑÑÑ Ð·
Ñеклами, заÑÐ½Ð¾Ð²Ð°Ð½Ð¾Ñ Ð½Ð° "
-"вÑдÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´ÑÑлÑноÑÑÑ Ñа ÑподобанÑ
коÑиÑÑÑваÑÑв. Це ÑобиÑÑ ÑÐµÐºÐ»Ð°Ð¼Ñ Ð½Ðµ "
-"пÑоÑÑо ÑимоÑÑ Ð½Ð°Ð±Ñидливим, на Ñо ми могли
б навÑиÑиÑÑ Ð½Ðµ звеÑÑаÑи Ñваги,"
-"— Ñе пеÑеÑвоÑÑÑ ÑÑ Ð² ÑиÑÑÐµÐ¼Ñ ÑÑеженнÑ,
Ñка ÑкодиÑÑ Ð½Ð°Ð¼ незалежно вÑд "
-"Ñого, знаÑмо ми пÑо Ñе Ñи нÑ. СиÑÑеми
покÑпок по ÐнÑеÑнеÑÑ Ñакож "
-"вÑдÑÑежÑÑÑÑ ÑвоÑÑ
коÑиÑÑÑваÑÑв. РвÑÑм
нам вÑдомо, Ñо “пÑавила "
-"конÑÑденÑÑйноÑÑÑ” ÑвлÑÑÑÑ ÑобоÑ
ÑкоÑÑÑе випÑÐ°Ð²Ð´Ð°Ð½Ð½Ñ Ð´Ð»Ñ Ð¿Ð¾ÑÑÑÐµÐ½Ð½Ñ "
-"конÑÑденÑÑйноÑÑÑ, нÑж намÑÑи
доÑÑимÑваÑиÑÑ ÑÑ."
+"activities and propensities. This converts a mere annoyance—"
+"advertising that we can learn to ignore—into a surveillance system "
+"that harms us whether we know it or not. Purchases over the Internet also "
+"track their users. And we are all aware that “privacy policies” "
+"are more excuses to violate privacy than commitments to uphold it."
+msgstr ""
+"Ðдна Ñз ÑпонÑкалÑниÑ
пÑиÑин ÑÑÑаÑного
ÑÑÐ²Ð½Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð² ÐнÑеÑнеÑÑ Ð¿Ð¾Ð»ÑÐ³Ð°Ñ Ð² "
+"ÑомÑ, Ñо ÑайÑи ÑÑнанÑÑÑÑÑÑÑ Ð· Ñеклами,
заÑÐ½Ð¾Ð²Ð°Ð½Ð¾Ñ Ð½Ð° вÑдÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´ÑÑлÑноÑÑÑ "
+"Ñа ÑÐ¿Ð¾Ð´Ð¾Ð±Ð°Ð½Ñ ÐºÐ¾ÑиÑÑÑваÑÑв. Це ÑобиÑÑ
ÑÐµÐºÐ»Ð°Ð¼Ñ Ð½Ðµ пÑоÑÑо ÑимоÑÑ Ð½Ð°Ð±Ñидливим, "
+"на Ñо ми могли б навÑиÑиÑÑ Ð½Ðµ звеÑÑаÑи
Ñваги,— Ñе пеÑеÑвоÑÑÑ ÑÑ Ð² "
+"ÑиÑÑÐµÐ¼Ñ ÑÑеженнÑ, Ñка ÑкодиÑÑ Ð½Ð°Ð¼
незалежно вÑд Ñого, знаÑмо ми пÑо Ñе Ñи "
+"нÑ. СиÑÑеми покÑпок по ÐнÑеÑнеÑÑ Ñакож
вÑдÑÑежÑÑÑÑ ÑвоÑÑ
коÑиÑÑÑваÑÑв. Ð "
+"вÑÑм нам вÑдомо, Ñо “пÑавила
конÑÑденÑÑйноÑÑÑ” ÑвлÑÑÑÑ ÑÐ¾Ð±Ð¾Ñ "
+"ÑкоÑÑÑе випÑÐ°Ð²Ð´Ð°Ð½Ð½Ñ Ð´Ð»Ñ Ð¿Ð¾ÑÑÑеннÑ
конÑÑденÑÑйноÑÑÑ, нÑж намÑÑи
доÑÑимÑваÑиÑÑ "
+"ÑÑ."
#. type: Content of: <p>
msgid ""
"We could correct both problems by adopting a system of anonymous "
"payments—anonymous for the payer, that is. (We don't want the payee "
-"to dodge taxes.) <a "
-"href=\"http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/"
-"\"> "
-"Bitcoin is not anonymous</a>, though there are efforts to develop ways to "
-"pay anonymously with Bitcoin. However, technology for <a "
-"href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\"> digital "
-"cash was first developed in the 1980s</a>; we need only suitable business "
-"arrangements, and for the state not to obstruct them."
-msgstr ""
-"Ðи могли б виÑÑÑиÑи Ð¾Ð±Ð¸Ð´Ð²Ñ Ð¿Ñоблеми
введеннÑм ÑиÑÑеми анонÑмниÑ
плаÑежÑв "
-"— ÑобÑо анонÑмниÑ
Ð´Ð»Ñ ÑиÑ
, Ñ
Ñо плаÑиÑÑ
(ми не Ñ
оÑемо, Ñоб Ñой, ÐºÐ¾Ð¼Ñ "
-"плаÑÑÑÑ, ÑÑ
илÑвÑÑ Ð²Ñд подаÑкÑв). <a
href=\"http://www.wired.com/opinion/2013/0"
-"5/"
-"lets-cut-through-the-bitcoin-hype/\"> СиÑÑема Bitcoin не
анонÑмна</a>, але "
-"ÑеÑ
нÑка <a
href=\"http://www.wired.com/wired/archive/2.12/emoney_pr.html\"> "
-"ÑиÑÑÐ¾Ð²Ð¾Ñ Ð³Ð¾ÑÑвки впеÑÑе бÑла ÑозÑоблена Ñ
вÑÑÑмдеÑÑÑÑ Ñоки XX "
-"ÑÑолÑÑÑÑ</a>; нам бÑакÑÑ ÑÑлÑки
пÑдпÑиÑмÑÑв, ÑÐºÑ Ð·Ð°Ð¹Ð¼Ð°Ð»Ð¸ÑÑ Ð± Ñим, Ñ "
+"to dodge taxes.) <a href=\"http://www.wired.com/opinion/2013/05/lets-cut-"
+"through-the-bitcoin-hype/\"> Bitcoin is not anonymous</a>, though there are "
+"efforts to develop ways to pay anonymously with Bitcoin. However, "
+"technology for <a href=\"http://www.wired.com/wired/archive/2.12/emoney_pr."
+"html\"> digital cash was first developed in the 1980s</a>; we need only "
+"suitable business arrangements, and for the state not to obstruct them."
+msgstr ""
+"Ðи могли б виÑÑÑиÑи Ð¾Ð±Ð¸Ð´Ð²Ñ Ð¿Ñоблеми
введеннÑм ÑиÑÑеми анонÑмниÑ
"
+"плаÑежÑв — ÑобÑо анонÑмниÑ
Ð´Ð»Ñ ÑиÑ
, Ñ
Ñо плаÑиÑÑ (ми не Ñ
оÑемо, "
+"Ñоб Ñой, ÐºÐ¾Ð¼Ñ Ð¿Ð»Ð°ÑÑÑÑ, ÑÑ
илÑвÑÑ Ð²Ñд
подаÑкÑв). <a href=\"http://www.wired."
+"com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/\"> СиÑÑема
Bitcoin не "
+"анонÑмна</a>, але ÑеÑ
нÑка <a
href=\"http://www.wired.com/wired/archive/2.12/"
+"emoney_pr.html\"> ÑиÑÑÐ¾Ð²Ð¾Ñ Ð³Ð¾ÑÑвки впеÑÑе бÑла
ÑозÑоблена Ñ Ð²ÑÑÑмдеÑÑÑÑ Ñоки "
+"XX ÑÑолÑÑÑÑ</a>; нам бÑакÑÑ ÑÑлÑки
пÑдпÑиÑмÑÑв, ÑÐºÑ Ð·Ð°Ð¹Ð¼Ð°Ð»Ð¸ÑÑ Ð± Ñим, Ñ "
"деÑжави, Ñка не пеÑеÑкоджала б ÑÑомÑ."
#. type: Content of: <p>
@@ -654,14 +601,13 @@
"A further threat from sites' collection of personal data is that security "
"breakers might get in, take it, and misuse it. This includes customers' "
"credit card details. An anonymous payment system would end this danger: a "
-"security hole in the site can't hurt you if the site knows nothing about "
-"you."
+"security hole in the site can't hurt you if the site knows nothing about you."
msgstr ""
-"ÐодаÑÐºÐ¾Ð²Ñ Ð·Ð°Ð³ÑÐ¾Ð·Ñ Ð·Ð±ÑÑ Ð¾ÑобиÑÑиÑ
даниÑ
ÑайÑами ÑвлÑÑ ÑомÑ, Ñо "
-"зломлÑваÑÑ Ð¼Ð¾Ð¶ÑÑÑ Ð¿ÑоникаÑи на ÑеÑвеÑи,
бÑаÑи Ð´Ð°Ð½Ñ Ñ Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ñи ними. Ð "
-"в ÑÐ¾Ð¼Ñ ÑиÑÐ»Ñ Ð´Ð°Ð½Ð¸Ð¼Ð¸ пÑо кÑедиÑÐ½Ñ ÐºÐ°ÑÑки
клÑÑнÑÑв. СиÑÑема анонÑмниÑ
плаÑежÑв "
-"покÑнÑила б Ñз ÑÑÑÑ Ð·Ð°Ð³ÑозоÑ: пÑолом Ñ Ð·Ð°Ñ
иÑÑÑ ÑайÑÑ Ð½Ðµ може заÑкодиÑи вам, "
-"коли ÑÐ°Ð¹Ñ Ð½ÑÑого пÑо Ð²Ð°Ñ Ð½Ðµ знаÑ."
+"ÐодаÑÐºÐ¾Ð²Ñ Ð·Ð°Ð³ÑÐ¾Ð·Ñ Ð·Ð±ÑÑ Ð¾ÑобиÑÑиÑ
даниÑ
ÑайÑами ÑвлÑÑ ÑомÑ, Ñо зломлÑваÑÑ "
+"можÑÑÑ Ð¿ÑоникаÑи на ÑеÑвеÑи, бÑаÑи Ð´Ð°Ð½Ñ Ñ
зловживаÑи ними. Рв ÑÐ¾Ð¼Ñ ÑиÑÐ»Ñ "
+"даними пÑо кÑедиÑÐ½Ñ ÐºÐ°ÑÑки клÑÑнÑÑв.
СиÑÑема анонÑмниÑ
плаÑежÑв покÑнÑила б "
+"Ñз ÑÑÑÑ Ð·Ð°Ð³ÑозоÑ: пÑолом Ñ Ð·Ð°Ñ
иÑÑÑ ÑайÑÑ
не може заÑкодиÑи вам, коли ÑÐ°Ð¹Ñ "
+"нÑÑого пÑо Ð²Ð°Ñ Ð½Ðµ знаÑ."
#. type: Content of: <h3>
msgid "Remedy for Travel Surveillance"
@@ -671,43 +617,40 @@
msgid ""
"We must convert digital toll collection to anonymous payment (using digital "
"cash, for instance). License-plate recognition systems recognize all "
-"license plates, and the <a "
-"href=\"http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm\">
"
-"data can be kept indefinitely</a>; they should be required by law to notice "
-"and record only those license numbers that are on a list of cars sought by "
-"court orders. A less secure alternative would record all cars locally but "
-"only for a few days, and not make the full data available over the Internet; "
-"access to the data should be limited to searching for a list of "
-"court-ordered license-numbers."
-msgstr ""
-"Ðи Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð¿ÐµÑеÑвоÑиÑи ÑиÑÑÐ¾Ð²Ñ ÑиÑÑеми
збоÑÑ Ð¿Ð»Ð°ÑежÑв Ñ Ð°Ð½Ð¾Ð½ÑÐ¼Ð½Ñ "
-"(напÑиклад, з Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ Ð³Ð¾ÑÑвки).
СиÑÑеми ÑозпÑÐ·Ð½Ð°Ð²Ð°Ð½Ð½Ñ Ð½Ð¾Ð¼ÐµÑÑв "
-"маÑин ÑозпÑзнаÑÑÑ Ð²ÑÑ Ð½Ð¾Ð¼ÐµÑи, Ñ <a
href=\"http://news.bbc.co.uk/2/hi/"
-"programmes/whos_watching_you/8064333.stm\"> Ð´Ð°Ð½Ñ Ð¼Ð¾Ð¶ÑÑÑ
збеÑÑгаÑиÑÑ "
-"невизнаÑено довго</a>; закон повинен
вимагаÑи, Ñоб вÑдзнаÑалиÑÑ Ñ "
-"запиÑÑвалиÑÑ Ð½Ð¾Ð¼ÐµÑи ÑÑлÑки ÑиÑ
авÑомобÑлÑв, ÑÐºÑ Ð¿ÐµÑебÑваÑÑÑ Ñ ÑозÑÑкÑ. "
-"ÐÐµÐ½Ñ Ð±ÐµÐ·Ð¿ÐµÑÐ½Ð¾Ñ Ð°Ð»ÑÑеÑнаÑÐ¸Ð²Ð¾Ñ Ð±Ñло б
вÑдзнаÑаÑи вÑÑ Ð°Ð²ÑомобÑÐ»Ñ Ð½Ð° мÑÑÑÑ, але "
-"ÑÑлÑки на кÑлÑка днÑв, пÑиÑÐ¾Ð¼Ñ Ð¿Ð¾Ð²Ð½Ñ Ð´Ð°Ð½Ñ
не Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð±ÑÑи доÑÑÑÐ¿Ð½Ñ Ð¿Ð¾ "
-"ÐнÑеÑнеÑÑ; доÑÑÑп до даниÑ
повинен бÑÑи
обмежений ÑпиÑком номеÑÑв авÑомобÑлÑв "
-"Ñ ÑозÑÑкÑ."
+"license plates, and the <a href=\"http://news.bbc.co.uk/2/hi/programmes/"
+"whos_watching_you/8064333.stm\"> data can be kept indefinitely</a>; they "
+"should be required by law to notice and record only those license numbers "
+"that are on a list of cars sought by court orders. A less secure "
+"alternative would record all cars locally but only for a few days, and not "
+"make the full data available over the Internet; access to the data should be "
+"limited to searching for a list of court-ordered license-numbers."
+msgstr ""
+"Ðи Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð¿ÐµÑеÑвоÑиÑи ÑиÑÑÐ¾Ð²Ñ ÑиÑÑеми
збоÑÑ Ð¿Ð»Ð°ÑежÑв Ñ Ð°Ð½Ð¾Ð½ÑÐ¼Ð½Ñ (напÑиклад, "
+"з Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ Ð³Ð¾ÑÑвки). СиÑÑеми
ÑозпÑÐ·Ð½Ð°Ð²Ð°Ð½Ð½Ñ Ð½Ð¾Ð¼ÐµÑÑв маÑин "
+"ÑозпÑзнаÑÑÑ Ð²ÑÑ Ð½Ð¾Ð¼ÐµÑи, Ñ <a
href=\"http://news.bbc.co.uk/2/hi/programmes/"
+"whos_watching_you/8064333.stm\"> Ð´Ð°Ð½Ñ Ð¼Ð¾Ð¶ÑÑÑ Ð·Ð±ÐµÑÑгаÑиÑÑ
невизнаÑено довго</"
+"a>; закон повинен вимагаÑи, Ñоб
вÑдзнаÑалиÑÑ Ñ Ð·Ð°Ð¿Ð¸ÑÑвалиÑÑ Ð½Ð¾Ð¼ÐµÑи ÑÑлÑки "
+"ÑиÑ
авÑомобÑлÑв, ÑÐºÑ Ð¿ÐµÑебÑваÑÑÑ Ñ
ÑозÑÑкÑ. ÐÐµÐ½Ñ Ð±ÐµÐ·Ð¿ÐµÑÐ½Ð¾Ñ Ð°Ð»ÑÑеÑнаÑÐ¸Ð²Ð¾Ñ "
+"бÑло б вÑдзнаÑаÑи вÑÑ Ð°Ð²ÑомобÑÐ»Ñ Ð½Ð° мÑÑÑÑ,
але ÑÑлÑки на кÑлÑка днÑв, "
+"пÑиÑÐ¾Ð¼Ñ Ð¿Ð¾Ð²Ð½Ñ Ð´Ð°Ð½Ñ Ð½Ðµ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð±ÑÑи
доÑÑÑÐ¿Ð½Ñ Ð¿Ð¾ ÐнÑеÑнеÑÑ; доÑÑÑп до даниÑ
"
+"повинен бÑÑи обмежений ÑпиÑком номеÑÑв
авÑомобÑлÑв Ñ ÑозÑÑкÑ."
#. type: Content of: <p>
msgid ""
-"The U.S. “no-fly” list must be abolished because it is <a "
-"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-raci"
-"al-justice/victory-federal-court-recognizes\"> "
-"punishment without trial</a>."
-msgstr ""
-"“ÐезполÑÑний» ÑпиÑок СШРпоÑÑÑбно
ÑкаÑÑваÑи, ÑÐ¾Ð¼Ñ Ñо Ñе <a "
-"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty-raci"
-"al-justice/victory-federal-court-recognizes\"> покаÑÐ°Ð½Ð½Ñ Ð±ÐµÐ·
ÑÑдÑ</a>."
+"The U.S. “no-fly” list must be abolished because it is <a href="
+"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
+"justice/victory-federal-court-recognizes\"> punishment without trial</a>."
+msgstr ""
+"“ÐезполÑÑний» ÑпиÑок СШРпоÑÑÑбно
ÑкаÑÑваÑи, ÑÐ¾Ð¼Ñ Ñо Ñе <a href="
+"\"https://www.aclu.org/blog/national-security-technology-and-liberty-racial-"
+"justice/victory-federal-court-recognizes\"> покаÑÐ°Ð½Ð½Ñ Ð±ÐµÐ·
ÑÑдÑ</a>."
#. type: Content of: <p>
msgid ""
"It is acceptable to have a list of people whose person and luggage will be "
"searched with extra care, and anonymous passengers on domestic flights could "
-"be treated as if they were on this list. It is also acceptable to bar "
-"non-citizens, if they are not permitted to enter the country at all, from "
+"be treated as if they were on this list. It is also acceptable to bar non-"
+"citizens, if they are not permitted to enter the country at all, from "
"boarding flights to the country. This ought to be enough for all legitimate "
"purposes."
msgstr ""
@@ -728,8 +671,7 @@
msgstr ""
"У багаÑÑоÑ
ÑиÑÑемаÑ
пÑÐ¾Ð´Ð°Ð¶Ñ ÐºÐ²Ð¸ÑкÑв длÑ
плаÑежÑв заÑÑоÑовÑÑÑÑÑÑ ÑÑзного ÑÐ¾Ð´Ñ "
"елекÑÑÐ¾Ð½Ð½Ñ ÐºÐ°ÑÑи. Ð¦Ñ ÑиÑÑеми накопиÑÑÑÑÑ
оÑобиÑÑÑ Ð´Ð°Ð½Ñ: ÑкÑо ви одного ÑÐ°Ð·Ñ "
-"за "
-"Ð¿Ð¾Ð¼Ð¸Ð»ÐºÑ Ð¾Ð¿Ð»Ð°Ñили поÑÐ·Ð´ÐºÑ ÑимоÑÑ ÐºÑÑм
гоÑÑвки, вони назавжди пов'ÑзÑÑÑÑ "
+"за Ð¿Ð¾Ð¼Ð¸Ð»ÐºÑ Ð¾Ð¿Ð»Ð°Ñили поÑÐ·Ð´ÐºÑ ÑимоÑÑ ÐºÑÑм
гоÑÑвки, вони назавжди пов'ÑзÑÑÑÑ "
"елекÑÑÐ¾Ð½Ð½Ñ ÐºÐ°ÑÑÐºÑ Ð· ваÑим Ñм'Ñм. ÐÑлÑÑ
Ñого, вони запиÑÑÑÑÑ Ð²ÑÑ Ð¿Ð¾Ñздки, "
"пов'ÑÐ·Ð°Ð½Ñ Ð· ÐºÐ¾Ð¶Ð½Ð¾Ñ ÐºÐ°ÑÑкоÑ. ÐÑе Ñе Ñазом
ÑÑановиÑÑ ÑиÑÑÐµÐ¼Ñ Ð¼Ð°Ñового "
"ÑÑеженнÑ. ÐбÑÑ ÑиÑ
даниÑ
поÑÑÑбно
ÑкоÑоÑиÑи."
@@ -747,15 +689,15 @@
"telling anyone where the user is or wants to go."
msgstr ""
"СлÑжби навÑгаÑÑÑ Ð²ÐµÐ´ÑÑÑ ÑÑеженнÑ:
комп'ÑÑÐµÑ ÐºÐ¾ÑиÑÑÑваÑа пеÑÐµÐ´Ð°Ñ Ð² "
-"каÑÑогÑаÑÑÑÐ½Ñ ÑлÑÐ¶Ð±Ñ ÐºÐ¾Ð¾ÑдинаÑи
коÑиÑÑÑваÑа Ñ Ð¼ÑÑÑе, кÑди вÑн "
-"напÑавлÑÑÑÑÑÑ; пÑÑÐ»Ñ ÑÑого ÑеÑвеÑ
визнаÑÐ°Ñ Ð¼Ð°ÑÑÑÑÑ Ñа повеÑÑÐ°Ñ Ð¹Ð¾Ð³Ð¾ на "
-"комп'ÑÑÐµÑ ÐºÐ¾ÑиÑÑÑваÑа, де Ñей маÑÑÑÑÑ
вÑдобÑажаÑÑÑÑÑ. Рданий ÑÐ°Ñ "
-"ÑеÑвеÑ, ймовÑÑно, запиÑÑÑ ÐºÐ¾Ð¾ÑдинаÑи
коÑиÑÑÑваÑа, оÑкÑлÑки нÑÑо "
-"не пеÑеÑкоджаÑ. У ÑÑй ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð½ÐµÐ¼Ð°Ñ
пÑинÑÐ¸Ð¿Ð¾Ð²Ð¾Ñ Ð½ÐµÐ¾Ð±Ñ
ÑдноÑÑÑ, Ñ ÑÑ Ð¼Ð¾Ð¶Ð½Ð° "
-"ÑникнÑÑи, пеÑепÑоекÑÑвавÑи ÑиÑÑемÑ:
вÑлÑÐ½Ñ Ð¿ÑогÑами на комп'ÑÑеÑÑ "
-"коÑиÑÑÑваÑа могли б оÑÑимÑваÑи
каÑÑогÑаÑÑÑÐ½Ñ Ð´Ð°Ð½Ñ Ð¿ÑилеглиÑ
облаÑÑей "
-"(ÑкÑо вони Ñе не оÑÑимано), пÑокладаÑи
маÑÑÑÑÑ Ñ Ð²ÑдобÑажаÑи його, не "
-"пеÑедаÑÑи нÑкÑди ÑозÑаÑÑÐ²Ð°Ð½Ð½Ñ Ñа пÑнкÑ
пÑизнаÑеннÑ."
+"каÑÑогÑаÑÑÑÐ½Ñ ÑлÑÐ¶Ð±Ñ ÐºÐ¾Ð¾ÑдинаÑи
коÑиÑÑÑваÑа Ñ Ð¼ÑÑÑе, кÑди вÑн
напÑавлÑÑÑÑÑÑ; "
+"пÑÑÐ»Ñ ÑÑого ÑеÑÐ²ÐµÑ Ð²Ð¸Ð·Ð½Ð°ÑÐ°Ñ Ð¼Ð°ÑÑÑÑÑ Ñа
повеÑÑÐ°Ñ Ð¹Ð¾Ð³Ð¾ на комп'ÑÑÐµÑ "
+"коÑиÑÑÑваÑа, де Ñей маÑÑÑÑÑ
вÑдобÑажаÑÑÑÑÑ. Рданий ÑÐ°Ñ ÑеÑвеÑ,
ймовÑÑно, "
+"запиÑÑÑ ÐºÐ¾Ð¾ÑдинаÑи коÑиÑÑÑваÑа, оÑкÑлÑки
нÑÑо не пеÑеÑкоджаÑ. У ÑÑй ÑÑÐµÐ¶ÐµÐ½Ð½Ñ "
+"Ð½ÐµÐ¼Ð°Ñ Ð¿ÑинÑÐ¸Ð¿Ð¾Ð²Ð¾Ñ Ð½ÐµÐ¾Ð±Ñ
ÑдноÑÑÑ, Ñ ÑÑ
можна ÑникнÑÑи, пеÑепÑоекÑÑвавÑи "
+"ÑиÑÑемÑ: вÑлÑÐ½Ñ Ð¿ÑогÑами на комп'ÑÑеÑÑ
коÑиÑÑÑваÑа могли б оÑÑимÑваÑи "
+"каÑÑогÑаÑÑÑÐ½Ñ Ð´Ð°Ð½Ñ Ð¿ÑилеглиÑ
облаÑÑей
(ÑкÑо вони Ñе не оÑÑимано), пÑокладаÑи "
+"маÑÑÑÑÑ Ñ Ð²ÑдобÑажаÑи його, не пеÑедаÑÑи
нÑкÑди ÑозÑаÑÑÐ²Ð°Ð½Ð½Ñ Ñа пÑÐ½ÐºÑ "
+"пÑизнаÑеннÑ."
#. type: Content of: <p>
msgid ""
@@ -778,15 +720,14 @@
"ÑеÑ
нÑки. СиÑÑема ÑнÑоÑмÑвала б ÑÑÑ
ÑÑанÑÑÑ, Ñо одиниÑÑ “"
"зайнÑÑа”, ÑÐ¾Ð¼Ñ ÐºÐ¾Ð»Ð¸ коÑиÑÑÑваÑ
повеÑÑÐ°Ñ ÑÑ Ð½Ð° бÑдÑ-ÑкÑй ÑÑанÑÑÑ "
"(Ð²Ð·Ð°Ð³Ð°Ð»Ñ ÐºÐ°Ð¶ÑÑи, вÑдмÑÐ½Ð½Ð¾Ñ Ð²Ñд ÑÑÑÑ, де ÑÑ
взÑли), ÑÑ ÑÑанÑÑÑ Ð±Ñде знаÑи, де "
-"Ñ ÐºÐ¾Ð»Ð¸ взÑÑа ÑÑ Ð¾Ð´Ð¸Ð½Ð¸ÑÑ. СиÑÑема
пÑоÑнÑоÑмÑÑ ÑнÑÑ ÑÑанÑÑÑ, Ñо "
-"одиниÑÑ Ð±ÑлÑÑе не “зайнÑÑа”. Ðона
Ñкладе Ñакож ÑаÑ
Ñнок "
-"коÑиÑÑÑваÑа "
-"Ñ Ð²Ð¸Ñле його (ÑеÑез деÑке випадкове ÑиÑло Ñ
вилин) в ÑенÑÑ Ð¿Ð¾ кÑлÑÑÑ "
-"ÑÑанÑÑй, ÑÐ¾Ð¼Ñ Ð² ÑенÑÑÑ Ð½Ðµ бÑде вÑдомо,
звÑдки пÑийÑов ÑаÑ
Ñнок. Як ÑÑлÑки "
-"Ñе ÑÑанеÑÑÑÑ, ÑÑанÑÑÑ Ð¿Ð¾Ð²ÐµÑÐ½ÐµÐ½Ð½Ñ Ð¿Ð¾Ð²Ð½ÑÑÑÑ
забÑде пÑо ÑÑ Ð¾Ð¿ÐµÑаÑÑÑ. ЯкÑо "
-"одиниÑÑ Ð·Ð°Ð»Ð¸ÑаÑÑÑÑÑ “зайнÑÑоє
занадÑо довго, ÑÑанÑÑÑ, на ÑкÑй ÑÑ "
-"взÑли, може пÑоÑнÑоÑмÑваÑи ÑенÑÑ; Ñ ÑÑомÑ
Ð²Ð¸Ð¿Ð°Ð´ÐºÑ Ð²Ð¾Ð½Ð° могла б негайно "
-"повÑдомиÑи пÑо оÑобиÑÑоÑÑÑ Ñого, Ñ
Ñо взÑв
ÑÑ Ð¾Ð´Ð¸Ð½Ð¸ÑÑ."
+"Ñ ÐºÐ¾Ð»Ð¸ взÑÑа ÑÑ Ð¾Ð´Ð¸Ð½Ð¸ÑÑ. СиÑÑема
пÑоÑнÑоÑмÑÑ ÑнÑÑ ÑÑанÑÑÑ, Ñо одиниÑÑ
бÑлÑÑе "
+"не “зайнÑÑа”. Ðона Ñкладе Ñакож ÑаÑ
Ñнок коÑиÑÑÑваÑа Ñ Ð²Ð¸Ñле його "
+"(ÑеÑез деÑке випадкове ÑиÑло Ñ
вилин) в
ÑенÑÑ Ð¿Ð¾ кÑлÑÑÑ ÑÑанÑÑй, ÑÐ¾Ð¼Ñ Ð² "
+"ÑенÑÑÑ Ð½Ðµ бÑде вÑдомо, звÑдки пÑийÑов ÑаÑ
Ñнок. Як ÑÑлÑки Ñе ÑÑанеÑÑÑÑ, "
+"ÑÑанÑÑÑ Ð¿Ð¾Ð²ÐµÑÐ½ÐµÐ½Ð½Ñ Ð¿Ð¾Ð²Ð½ÑÑÑÑ Ð·Ð°Ð±Ñде пÑо ÑÑ
опеÑаÑÑÑ. ЯкÑо одиниÑÑ Ð·Ð°Ð»Ð¸ÑаÑÑÑÑÑ "
+"“зайнÑÑоє занадÑо довго, ÑÑанÑÑÑ,
на ÑкÑй ÑÑ Ð²Ð·Ñли, може "
+"пÑоÑнÑоÑмÑваÑи ÑенÑÑ; Ñ ÑÑÐ¾Ð¼Ñ Ð²Ð¸Ð¿Ð°Ð´ÐºÑ
вона могла б негайно повÑдомиÑи пÑо "
+"оÑобиÑÑоÑÑÑ Ñого, Ñ
Ñо взÑв ÑÑ Ð¾Ð´Ð¸Ð½Ð¸ÑÑ."
#. type: Content of: <h3>
msgid "Remedy for Communications Dossiers"
@@ -796,33 +737,28 @@
msgid ""
"Internet service providers and telephone companies keep extensive data on "
"their users' contacts (browsing, phone calls, etc). With mobile phones, "
-"they also <a "
-"href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-sp"
-"itz\"> "
-"record the user's physical location</a>. They keep these dossiers for a "
-"long time: over 30 years, in the case of AT&T. Soon they will even <a "
-"href=\"http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iph"
-"one-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\"> "
-"record the user's body activities</a>. It appears that the <a "
-"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-s"
-"ure-sounds-nsa-tracking-your-location\"> "
-"NSA collects cell phone location data</a> in bulk."
+"they also <a href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-"
+"protection-malte-spitz\"> record the user's physical location</a>. They "
+"keep these dossiers for a long time: over 30 years, in the case of AT&"
+"T. Soon they will even <a href=\"http://www.wired.com/opinion/2013/10/the-"
+"trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-"
+"activity-trackers/\"> record the user's body activities</a>. It appears "
+"that the <a href=\"https://www.aclu.org/blog/national-security-technology-"
+"and-liberty/it-sure-sounds-nsa-tracking-your-location\"> NSA collects cell "
+"phone location data</a> in bulk."
msgstr ""
"ÐоÑÑаÑалÑники поÑлÑг ÑнÑеÑнеÑÑ Ñ
ÑелеÑÐ¾Ð½Ð½Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ Ð·Ð±ÐµÑÑгаÑÑÑ Ð²ÐµÐ»Ð¸ÐºÑ "
-"вÑдомоÑÑÑ Ð¿Ñо "
-"конÑакÑи ÑвоÑÑ
коÑиÑÑÑваÑÑв (пеÑеглÑд
ÑÑоÑÑнок ÐнÑеÑнеÑÑ, ÑелеÑÐ¾Ð½Ð½Ñ Ð´Ð·Ð²Ñнки "
-"ÑоÑо). ÐÐ»Ñ ÑÑÑлÑниковиÑ
ÑелеÑонÑв вони <a "
-"href=\"http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-sp"
-"itz\"> запиÑÑÑÑÑ Ñакож "
-"ÑÑзиÑÐ½Ñ ÐºÐ¾Ð¾ÑдинаÑи коÑиÑÑÑваÑа</a>. Ðони
збеÑÑгаÑÑÑ ÑÑ Ð´Ð¾ÑÑÑ ÑÑивалий "
-"ÑаÑ: Ñ ÑÐ°Ð·Ñ AT&T понад ÑÑидÑÑÑÑ
ÑокÑв. Ð ÑкоÑо вони бÑдÑÑÑ "
-"<a "
-"href=\"http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iph"
-"one-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/\"> "
-"запиÑÑваÑи навÑÑÑ ÑÑзÑологÑÑÐ½Ñ Ð¿ÑоÑеÑи
коÑиÑÑÑваÑа</a>. ÐиÑвлÑÑÑÑÑÑ, <a "
-"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-s"
-"ure-sounds-nsa-tracking-your-location\"> ÐгенÑÑÑво
наÑÑоналÑÐ½Ð¾Ñ "
-"безпеки маÑово збиÑÐ°Ñ Ð´Ð°Ð½Ñ Ð¿Ñо мÑÑÑе знаÑ
Ð¾Ð´Ð¶ÐµÐ½Ð½Ñ ÑÑÑлÑниковиÑ
ÑелеÑонÑв</a>."
+"вÑдомоÑÑÑ Ð¿Ñо конÑакÑи ÑвоÑÑ
коÑиÑÑÑваÑÑв (пеÑеглÑд ÑÑоÑÑнок ÐнÑеÑнеÑÑ,
"
+"ÑелеÑÐ¾Ð½Ð½Ñ Ð´Ð·Ð²Ñнки ÑоÑо). ÐÐ»Ñ ÑÑÑлÑниковиÑ
ÑелеÑонÑв вони <a href=\"http://"
+"www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz\"> "
+"запиÑÑÑÑÑ Ñакож ÑÑзиÑÐ½Ñ ÐºÐ¾Ð¾ÑдинаÑи
коÑиÑÑÑваÑа</a>. Ðони збеÑÑгаÑÑÑ ÑÑ Ð´Ð¾ÑÑÑ "
+"ÑÑивалий ÑаÑ: Ñ ÑÐ°Ð·Ñ AT&T понад
ÑÑидÑÑÑÑ ÑокÑв. Ð ÑкоÑо вони "
+"бÑдÑÑÑ <a
href=\"http://www.wired.com/opinion/2013/10/the-trojan-horse-of-"
+"the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/"
+"\"> запиÑÑваÑи навÑÑÑ ÑÑзÑологÑÑÐ½Ñ Ð¿ÑоÑеÑи
коÑиÑÑÑваÑа</a>. ÐиÑвлÑÑÑÑÑÑ, <a "
+"href=\"https://www.aclu.org/blog/national-security-technology-and-liberty/it-"
+"sure-sounds-nsa-tracking-your-location\"> ÐгенÑÑÑво
наÑÑоналÑÐ½Ð¾Ñ Ð±ÐµÐ·Ð¿ÐµÐºÐ¸ "
+"маÑово збиÑÐ°Ñ Ð´Ð°Ð½Ñ Ð¿Ñо мÑÑÑе знаÑ
одженнÑ
ÑÑÑлÑниковиÑ
ÑелеÑонÑв</a>."
#. type: Content of: <p>
msgid ""
@@ -831,36 +767,33 @@
"must not be allowed to keep this information for very long, in the absence "
"of a court order to surveil a certain party."
msgstr ""
-"ÐонÑÑденÑÑйний зв'Ñзок неможливий, коли
ÑиÑÑеми ÑÑвоÑÑÑÑÑ ÑÐ°ÐºÑ Ð´Ð¾ÑÑÑ. Так "
-"Ñо збеÑÑÐ³Ð°Ð½Ð½Ñ ÑÑ
повинно бÑÑи незаконно.
ÐоÑÑаÑалÑникам поÑлÑг ÐнÑеÑнеÑÑ "
+"ÐонÑÑденÑÑйний зв'Ñзок неможливий, коли
ÑиÑÑеми ÑÑвоÑÑÑÑÑ ÑÐ°ÐºÑ Ð´Ð¾ÑÑÑ. Так Ñо "
+"збеÑÑÐ³Ð°Ð½Ð½Ñ ÑÑ
повинно бÑÑи незаконно.
ÐоÑÑаÑалÑникам поÑлÑг ÐнÑеÑнеÑÑ "
"ÑелеÑонним компанÑÑм не повинно бÑÑи
дозволено збеÑÑгаÑи ÑÑ Ð²ÑдомоÑÑÑ Ð½Ð°Ð´Ñо "
-"довго, ÑкÑо ÑÑлÑки ÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°
Ð¿ÐµÐ²Ð½Ð¾Ñ Ð¾ÑÐ¾Ð±Ð¾Ñ Ð½Ðµ вÑÑановлено в "
-"ÑÑÐ´Ð¾Ð²Ð¾Ð¼Ñ Ð¿Ð¾ÑÑдкÑ."
+"довго, ÑкÑо ÑÑлÑки ÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°
Ð¿ÐµÐ²Ð½Ð¾Ñ Ð¾ÑÐ¾Ð±Ð¾Ñ Ð½Ðµ вÑÑановлено в ÑÑÐ´Ð¾Ð²Ð¾Ð¼Ñ "
+"поÑÑдкÑ."
#. type: Content of: <p>
msgid ""
"This solution is not entirely satisfactory, because it won't physically stop "
"the government from collecting all the information immediately as it is "
-"generated—which is what the <a "
-"href=\"http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-c"
-"ourt-order\"> "
-"U.S. does with some or all phone companies</a>. We would have to rely on "
-"prohibiting that by law. However, that would be better than the current "
-"situation, where the relevant law (the PATRIOT Act) does not clearly "
-"prohibit the practice. In addition, if the government did resume this sort "
-"of surveillance, it would not get data about everyone's phone calls made "
-"prior to that time."
+"generated—which is what the <a href=\"http://www.guardian.co.uk/"
+"world/2013/jun/06/nsa-phone-records-verizon-court-order\"> U.S. does with "
+"some or all phone companies</a>. We would have to rely on prohibiting that "
+"by law. However, that would be better than the current situation, where the "
+"relevant law (the PATRIOT Act) does not clearly prohibit the practice. In "
+"addition, if the government did resume this sort of surveillance, it would "
+"not get data about everyone's phone calls made prior to that time."
msgstr ""
"ЦÑÑÑ Ð¼ÑÑи не ÑÑлком доÑÑаÑнÑо, оÑкÑлÑки ÑÑ
заÑÑоÑÑÐ²Ð°Ð½Ð½Ñ ÑÑзиÑно не Ð·Ð°Ð²Ð°Ð¶Ð°Ñ "
-"деÑÐ¶Ð°Ð²Ñ Ð·Ð±Ð¸ÑаÑи вÑдомоÑÑÑ Ð±ÐµÐ·Ð¿Ð¾ÑеÑеднÑо
в Ð¼Ð¾Ð¼ÐµÐ½Ñ ÑÑ
"
-"Ð²Ð¸Ð½Ð¸ÐºÐ½ÐµÐ½Ð½Ñ Ð° Ñаме Ñе <a
href=\"http://www.guardian.co.uk/"
-"world/2013/jun/06/nsa-phone-records-verizon-court-order\"> Ñ Ð¡Ð¨Ð
ÑоблÑÑÑ Ð· "
-"деÑкими або навÑÑÑ Ð²ÑÑма ÑелеÑонними
компанÑÑми</a>. Ðам довелоÑÑ Ð± "
-"ÑозÑаÑ
овÑваÑи на доÑÑÐ¸Ð¼Ð°Ð½Ð½Ñ Ð·Ð°ÐºÐ¾Ð½Ñ. Ðднак
Ñе бÑло б кÑаÑе нинÑÑнÑÐ¾Ñ "
-"ÑиÑÑаÑÑÑ, в ÑкÑй вÑдповÑдний закон (PATRIOT)
Ñвним Ñином не "
-"забоÑонÑÑ ÑÐ°ÐºÑ Ð¿ÑакÑикÑ. ÐÑÑм Ñого, ÑкÑо б
деÑжава Ð·Ð½Ð¾Ð²Ñ Ð²Ð²ÐµÐ»Ð° Ñаке "
-" ÑÑеженнÑ, воно не набÑло б Ð´Ð°Ð½Ñ Ð¿Ñо
ÑелеÑÐ¾Ð½Ð½Ñ Ð¿ÐµÑеговоÑи кожного, "
-"пÑÐ¾Ð²ÐµÐ´ÐµÐ½Ñ Ð´Ð¾ ÑÑого ÑаÑÑ."
+"деÑÐ¶Ð°Ð²Ñ Ð·Ð±Ð¸ÑаÑи вÑдомоÑÑÑ Ð±ÐµÐ·Ð¿Ð¾ÑеÑеднÑо
в Ð¼Ð¾Ð¼ÐµÐ½Ñ ÑÑ
Ð²Ð¸Ð½Ð¸ÐºÐ½ÐµÐ½Ð½Ñ Ð° "
+"Ñаме Ñе <a
href=\"http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-"
+"records-verizon-court-order\"> Ñ Ð¡Ð¨Ð ÑоблÑÑÑ Ð· деÑкими
або навÑÑÑ Ð²ÑÑма "
+"ÑелеÑонними компанÑÑми</a>. Ðам довелоÑÑ Ð±
ÑозÑаÑ
овÑваÑи на доÑÑÐ¸Ð¼Ð°Ð½Ð½Ñ "
+"законÑ. Ðднак Ñе бÑло б кÑаÑе нинÑÑнÑоÑ
ÑиÑÑаÑÑÑ, в ÑкÑй вÑдповÑдний закон "
+"(PATRIOT) Ñвним Ñином не забоÑонÑÑ ÑакÑ
пÑакÑикÑ. ÐÑÑм Ñого, ÑкÑо б деÑжава "
+"Ð·Ð½Ð¾Ð²Ñ Ð²Ð²ÐµÐ»Ð° Ñаке ÑÑеженнÑ, воно не набÑло
б Ð´Ð°Ð½Ñ Ð¿Ñо ÑелеÑÐ¾Ð½Ð½Ñ Ð¿ÐµÑеговоÑи "
+"кожного, пÑÐ¾Ð²ÐµÐ´ÐµÐ½Ñ Ð´Ð¾ ÑÑого ÑаÑÑ."
#. type: Content of: <h3>
msgid "But Some Surveillance Is Necessary"
@@ -875,66 +808,60 @@
"political reasons, but it is also necessary. Fortunately, this won't make "
"it possible to find whistleblowers after the fact."
msgstr ""
-"ÐÐ»Ñ ÑозÑÑÐºÑ Ð·Ð»Ð¾ÑинÑÑв деÑÐ¶Ð°Ð²Ñ Ð½ÐµÐ¾Ð±Ñ
Ñдна
можливÑÑÑÑ ÑозÑлÑдÑваÑи "
-"конкÑеÑÐ½Ñ Ð·Ð»Ð¾Ñини або конкÑеÑÐ½Ñ Ð·Ð°Ð¼Ð°Ñ
и за
оÑдеÑом ÑÑдÑ. Ð "
-"пÑиÑ
одом ÑнÑеÑнеÑÑ Ð¿Ð¾Ð²Ð½Ð¾Ð²Ð°Ð¶ÐµÐ½Ð½Ñ Ð¿ÑоÑлÑÑ
овÑваÑи ÑелеÑÐ¾Ð½Ð½Ñ Ð¿ÐµÑеговоÑи пÑиÑодно "
-"ÑозÑиÑÑÑÑÑÑÑ Ð½Ð° повноваженнÑ
пÑд'ÑднÑваÑиÑÑ Ð´Ð¾ з'ÑÐ´Ð½Ð°Ð½Ñ Ð· ÑнÑеÑнеÑом.
Цими "
-"повноваженнÑми легко зловживаÑи в
полÑÑиÑниÑ
ÑÑлÑÑ
, але вони необÑ
ÑднÑ. Ðа "
-"ÑаÑÑÑ, Ñе не Ð´Ð°Ñ Ð¼Ð¾Ð¶Ð»Ð¸Ð²Ð¾ÑÑÑ Ð·Ð½Ð°Ñ
одиÑи
ÑнÑоÑмаÑоÑÑв заднÑм ÑиÑлом."
+"ÐÐ»Ñ ÑозÑÑÐºÑ Ð·Ð»Ð¾ÑинÑÑв деÑÐ¶Ð°Ð²Ñ Ð½ÐµÐ¾Ð±Ñ
Ñдна
можливÑÑÑÑ ÑозÑлÑдÑваÑи конкÑеÑÐ½Ñ "
+"злоÑини або конкÑеÑÐ½Ñ Ð·Ð°Ð¼Ð°Ñ
и за оÑдеÑом
ÑÑдÑ. РпÑиÑ
одом ÑнÑеÑнеÑÑ "
+"Ð¿Ð¾Ð²Ð½Ð¾Ð²Ð°Ð¶ÐµÐ½Ð½Ñ Ð¿ÑоÑлÑÑ
овÑваÑи ÑелеÑоннÑ
пеÑеговоÑи пÑиÑодно ÑозÑиÑÑÑÑÑÑÑ Ð½Ð° "
+"Ð¿Ð¾Ð²Ð½Ð¾Ð²Ð°Ð¶ÐµÐ½Ð½Ñ Ð¿Ñд'ÑднÑваÑиÑÑ Ð´Ð¾ з'ÑÐ´Ð½Ð°Ð½Ñ Ð·
ÑнÑеÑнеÑом. Цими повноваженнÑми "
+"легко зловживаÑи в полÑÑиÑниÑ
ÑÑлÑÑ
, але
вони необÑ
ÑднÑ. Ðа ÑаÑÑÑ, Ñе не Ð´Ð°Ñ "
+"можливоÑÑÑ Ð·Ð½Ð°Ñ
одиÑи ÑнÑоÑмаÑоÑÑв заднÑм
ÑиÑлом."
#. type: Content of: <p>
msgid ""
"Individuals with special state-granted power, such as police, forfeit their "
"right to privacy and must be monitored. (In fact, police have their own "
-"jargon term for perjury, “<a "
-"href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552"
-"608302\">testilying</a>,” "
-"since they do it so frequently, particularly about protesters and <a "
-"href=\"http://photographyisnotacrime.com/\"> photographers</a>.) One city "
-"in California that required police to wear video cameras all the time found "
-"<a "
-"href=\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-p"
-"olice-edition\"> "
-"their use of force fell by 60%</a>. The ACLU is in favor of this."
+"jargon term for perjury, “<a href=\"https://en.wikipedia.org/w/index."
+"php?title=Police_perjury&oldid=552608302\">testilying</a>,” since "
+"they do it so frequently, particularly about protesters and <a href=\"http://"
+"photographyisnotacrime.com/\"> photographers</a>.) One city in California "
+"that required police to wear video cameras all the time found <a href="
+"\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-"
+"police-edition\"> their use of force fell by 60%</a>. The ACLU is in favor "
+"of this."
msgstr ""
"ÐÑоби з оÑобливими повноваженнÑми,
виданими деÑжавоÑ, ÑÐ°ÐºÑ Ñк пÑаÑÑвники "
-"полÑÑÑÑ, вÑÑаÑаÑÑÑ ÑÐ²Ð¾Ñ Ð¿Ñаво на
конÑÑденÑÑйнÑÑÑÑ, Ñ Ð·Ð° ними Ð¼Ð°Ñ "
-"веÑÑиÑÑ ÑпоÑÑеÑеженнÑ. (СпÑавдÑ, в
полÑÑейÑÑÐºÐ¾Ð¼Ñ Ð¶Ð°ÑÐ³Ð¾Ð½Ñ Ñ Ð¾Ñобливий "
-"виÑлÑв, “<a href=\"https://en.wikipedia.org/w/index.php?"
-"title=Police_perjury&oldid=552608302\">даваÑи
лжеÑвÑдÑеннÑ</a>”, бо "
-"вони ÑпÑÐ°Ð²Ð´Ñ Ñим займаÑÑÑÑÑ, оÑобливо
ÑÑоÑовно "
-" пÑоÑеÑÑÑвалÑникÑв Ñ <a
href=\"http://photographyisnotacrime.com/\"> "
-"ÑоÑогÑаÑÑв</a>.) У Ð¾Ð´Ð½Ð¾Ð¼Ñ Ð¼ÑÑÑеÑкÑ
ÐалÑÑоÑнÑÑ Ð±Ñло введено обов'Ñзкове "
-"поÑÑÑйне ноÑÑÐ½Ð½Ñ Ð²ÑдеокамеÑ
полÑÑейÑÑкими, Ñ Ð²Ð¸ÑвилоÑÑ, Ñо <a href="
-"\"http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-"
-"police-edition\"> заÑÑоÑÑÐ²Ð°Ð½Ð½Ñ Ñили
полÑÑейÑÑкими ÑкоÑоÑилоÑÑ Ð½Ð° 60%</a>. "
-"ACLU "
-"пÑдÑÑимÑÑ Ñе."
+"полÑÑÑÑ, вÑÑаÑаÑÑÑ ÑÐ²Ð¾Ñ Ð¿Ñаво на
конÑÑденÑÑйнÑÑÑÑ, Ñ Ð·Ð° ними Ð¼Ð°Ñ Ð²ÐµÑÑиÑÑ "
+"ÑпоÑÑеÑеженнÑ. (СпÑавдÑ, в полÑÑейÑÑкомÑ
жаÑÐ³Ð¾Ð½Ñ Ñ Ð¾Ñобливий виÑлÑв, “"
+"<a href=\"https://en.wikipedia.org/w/index.php?title=Police_perjury&"
+"oldid=552608302\">даваÑи лжеÑвÑдÑеннÑ</a>”, бо
вони ÑпÑÐ°Ð²Ð´Ñ Ñим "
+"займаÑÑÑÑÑ, оÑобливо ÑÑоÑовно
пÑоÑеÑÑÑвалÑникÑв Ñ <a href=\"http://"
+"photographyisnotacrime.com/\"> ÑоÑогÑаÑÑв</a>.) У одномÑ
мÑÑÑеÑÐºÑ ÐалÑÑоÑнÑÑ "
+"бÑло введено обов'Ñзкове поÑÑÑйне ноÑÑннÑ
вÑÐ´ÐµÐ¾ÐºÐ°Ð¼ÐµÑ Ð¿Ð¾Ð»ÑÑейÑÑкими, Ñ "
+"виÑвилоÑÑ, Ñо <a
href=\"http://www.motherjones.com/kevin-drum/2013/08/"
+"ubiquitous-surveillance-police-edition\"> заÑÑоÑÑÐ²Ð°Ð½Ð½Ñ Ñили
полÑÑейÑÑкими "
+"ÑкоÑоÑилоÑÑ Ð½Ð° 60%</a>. ACLU пÑдÑÑимÑÑ Ñе."
#. type: Content of: <p>
msgid ""
-"<a "
-"href=\"http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266"
-"\">Corporations "
-"are not people, and not entitled to human rights</a>. It is legitimate to "
-"require businesses to publish the details of processes that might cause "
-"chemical, biological, nuclear, fiscal, computational (e.g., <a "
-"href=\"http://DefectiveByDesign.org\">DRM</a>) or political (e.g., lobbying) "
-"hazards to society, to whatever level is needed for public well-being. The "
-"danger of these operations (consider the BP oil spill, the Fukushima "
-"meltdowns, and the 2008 fiscal crisis) dwarfs that of terrorism."
+"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
+"action_KEY=12266\">Corporations are not people, and not entitled to human "
+"rights</a>. It is legitimate to require businesses to publish the details "
+"of processes that might cause chemical, biological, nuclear, fiscal, "
+"computational (e.g., <a href=\"http://DefectiveByDesign.org\">DRM</a>) or "
+"political (e.g., lobbying) hazards to society, to whatever level is needed "
+"for public well-being. The danger of these operations (consider the BP oil "
+"spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs that of "
+"terrorism."
msgstr ""
"<a href=\"http://action.citizen.org/p/dia/action3/common/public/?"
"action_KEY=12266\"> ÐоÑпоÑаÑÑÑ — не лÑди, Ñ Ð½Ð¸Ñ
не повинно бÑÑи "
-"пÑав лÑдини</a>. ЦÑлком законно вимагаÑи
вÑд пÑдпÑиÑмÑÑв пÑблÑкаÑÑÑ "
-"деÑалей пÑоÑеÑÑв, ÑÐºÑ Ð¼Ð¾Ð³Ð»Ð¸ б ÑпÑиÑиниÑи
за ÑÐ¾Ð±Ð¾Ñ Ð½ÐµÐ±ÐµÐ·Ð¿ÐµÐºÐ¸ в Ñ
ÑмÑÑномÑ, "
-"бÑологÑÑномÑ, ÑдеÑномÑ, ÑÑнанÑовомÑ,
обÑиÑлÑвалÑÐ½Ð¾Ð¼Ñ (напÑ., <a href=\"http://"
-"DefectiveByDesign.org\"> ÑиÑÑове кеÑÑваннÑ
обмеженнÑми</a>або "
+"пÑав лÑдини</a>. ЦÑлком законно вимагаÑи
вÑд пÑдпÑиÑмÑÑв пÑблÑкаÑÑÑ Ð´ÐµÑалей "
+"пÑоÑеÑÑв, ÑÐºÑ Ð¼Ð¾Ð³Ð»Ð¸ б ÑпÑиÑиниÑи за ÑобоÑ
небезпеки в Ñ
ÑмÑÑномÑ, "
+"бÑологÑÑномÑ, ÑдеÑномÑ, ÑÑнанÑовомÑ,
обÑиÑлÑвалÑÐ½Ð¾Ð¼Ñ (напÑ., <a href="
+"\"http://DefectiveByDesign.org\"> ÑиÑÑове кеÑÑваннÑ
обмеженнÑми</a>або "
"полÑÑиÑÐ½Ð¾Ð¼Ñ (напÑ., Ð·Ð°Ð¼Ð¾Ð²Ð»ÐµÐ½Ð½Ñ Ð¿Ð¾Ð»ÑÑиÑниÑ
пÑоекÑÑв) ÑозÑмÑÐ½Ð½Ñ — "
-"пÑблÑкаÑÑÑ Ð½Ð°ÑÑÑлÑки докладноÑ,
наÑкÑлÑки Ñе Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ Ð³ÑомадÑÑкий "
-"добÑобÑÑ. ÐоÑÑвнÑно з Ð½ÐµÐ±ÐµÐ·Ð¿ÐµÐºÐ¾Ñ ÑакиÑ
дÑй (згадаймо виÑÑк "
-"наÑÑи BP, аваÑÑÑ Ð½Ð° ÐÐС Ñ Ð¤ÑкÑÑÑÐ¼Ñ Ñ
ÑÑнанÑÐ¾Ð²Ñ ÐºÑÐ¸Ð·Ñ 2008 ÑокÑ) "
-"загÑоза ÑеÑоÑÐ¸Ð·Ð¼Ñ Ð½Ð¸ÑÑвно мала."
+"пÑблÑкаÑÑÑ Ð½Ð°ÑÑÑлÑки докладноÑ,
наÑкÑлÑки Ñе Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ Ð³ÑомадÑÑкий добÑобÑÑ.
"
+"ÐоÑÑвнÑно з Ð½ÐµÐ±ÐµÐ·Ð¿ÐµÐºÐ¾Ñ ÑакиÑ
дÑй
(згадаймо виÑÑк наÑÑи BP, аваÑÑÑ Ð½Ð° ÐÐС Ñ "
+"ФÑкÑÑÑÐ¼Ñ Ñ ÑÑнанÑÐ¾Ð²Ñ ÐºÑÐ¸Ð·Ñ 2008 ÑокÑ)
загÑоза ÑеÑоÑÐ¸Ð·Ð¼Ñ Ð½Ð¸ÑÑвно мала."
#. type: Content of: <p>
msgid ""
@@ -942,19 +869,17 @@
"carried out as part of a business."
msgstr ""
"ÐÑоÑе жÑÑналÑÑÑÐ¸ÐºÑ Ð¿Ð¾ÑÑÑбно заÑ
иÑаÑи вÑд
ÑпоÑÑеÑеженнÑ, навÑÑÑ ÑкÑо вона "
-"ведеÑÑÑÑ Ð² "
-"Ñ
Ð¾Ð´Ñ Ð¿ÑдпÑиÑмниÑÑÐºÐ¾Ñ Ð´ÑÑлÑноÑÑÑ."
+"ведеÑÑÑÑ Ð² Ñ
Ð¾Ð´Ñ Ð¿ÑдпÑиÑмниÑÑкоÑ
дÑÑлÑноÑÑÑ."
#. type: Content of: <p>
msgid ""
"Digital technology has brought about a tremendous increase in the level of "
"surveillance of our movements, actions, and communications. It is far more "
-"than we experienced in the 1990s, and <a "
-"href=\"http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police"
-".html\"> "
-"far more than people behind the Iron Curtain experienced</a> in the 1980s, "
-"and would still be far more even with additional legal limits on state use "
-"of the accumulated data."
+"than we experienced in the 1990s, and <a href=\"http://blogs.hbr.org/"
+"cs/2013/06/your_iphone_works_for_the_secret_police.html\"> far more than "
+"people behind the Iron Curtain experienced</a> in the 1980s, and would still "
+"be far more even with additional legal limits on state use of the "
+"accumulated data."
msgstr ""
"ЦиÑÑова ÑеÑ
нÑка пÑинеÑла з ÑобоÑ
запамоÑоÑливе зÑоÑÑÐ°Ð½Ð½Ñ ÑÑÐ²Ð½Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð° "
"наÑими пеÑеÑÑваннÑми, дÑÑми Ñ
пеÑеговоÑами. Ðона набагаÑо виÑе ÑÑвнÑ
Ñого "
@@ -963,9 +888,8 @@
"your_iphone_works_for_the_secret_police.html\"> набагаÑо виÑа
ÑÑÐ²Ð½Ñ Ñого "
"ÑÑеженнÑ, Ñке випÑобовÑвали на ÑÐ¾Ð±Ñ Ð»Ñди
за залÑÐ·Ð½Ð¾Ñ Ð·Ð°Ð²ÑÑоÑ</a> Ñ "
"вÑÑÑмдеÑÑÑÑ Ñоки XX ÑÑолÑÑÑÑ, Ñ Ð²Ð¾Ð½Ð°
бÑло б набагаÑо виÑе, навÑÑÑ Ñкби "
-"на "
-"заÑÑоÑÑÐ²Ð°Ð½Ð½Ñ Ð´ÐµÑÐ¶Ð°Ð²Ð¾Ñ Ð½Ð°ÐºÐ¾Ð¿Ð¸ÑениÑ
даниÑ
бÑли Ð½Ð°ÐºÐ»Ð°Ð´ÐµÐ½Ñ Ð´Ð¾Ð´Ð°ÑÐºÐ¾Ð²Ñ "
-"ÑÑидиÑÐ½Ñ Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ."
+"на заÑÑоÑÑÐ²Ð°Ð½Ð½Ñ Ð´ÐµÑÐ¶Ð°Ð²Ð¾Ñ Ð½Ð°ÐºÐ¾Ð¿Ð¸ÑениÑ
даниÑ
бÑли Ð½Ð°ÐºÐ»Ð°Ð´ÐµÐ½Ñ Ð´Ð¾Ð´Ð°ÑÐºÐ¾Ð²Ñ ÑÑидиÑÐ½Ñ "
+"обмеженнÑ."
#. type: Content of: <p>
msgid ""
@@ -975,8 +899,8 @@
"stopping the accumulation of big data about people."
msgstr ""
"ЯкÑо ми не вважаÑмо, Ñо наÑÑ Ð²ÑлÑÐ½Ñ ÐºÑаÑни
в минÑÐ»Ð¾Ð¼Ñ ÑÑÑаждали вÑд гоÑÑÑого "
-"бÑÐ°ÐºÑ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ñ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð±ÑÑи пÑд
ÑÑвоÑÑÑим наглÑдом, нÑж РадÑнÑÑкий СоÑз "
-"Ñ Ð¡Ñ
Ñдна ÐÑмеÑÑина, нам поÑÑÑбно
повеÑнÑÑи Ñей ÑÑÐ²ÐµÐ½Ñ Ð½Ð° колиÑÐ½Ñ Ð¿Ð¾Ð·Ð¸ÑÑÑ.
ÐÐ»Ñ "
+"бÑÐ°ÐºÑ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ñ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð±ÑÑи пÑд
ÑÑвоÑÑÑим наглÑдом, нÑж РадÑнÑÑкий СоÑз Ñ "
+"СÑ
Ñдна ÐÑмеÑÑина, нам поÑÑÑбно повеÑнÑÑи
Ñей ÑÑÐ²ÐµÐ½Ñ Ð½Ð° колиÑÐ½Ñ Ð¿Ð¾Ð·Ð¸ÑÑÑ. ÐÐ»Ñ "
"ÑÑого поÑÑÑбно зÑпиниÑи маÑовий збÑÑ
даниÑ
пÑо лÑдей."
#. type: Content of: <blockquote><p>
@@ -985,14 +909,14 @@
#. type: Content of: <blockquote><p>
msgid ""
-"Licensed under the <a rel=\"license\" "
-"href=\"http://creativecommons.org/licenses/by-nd/3.0/us/\">Creative Commons "
-"Attribution-NoDerivs 3.0 United States License</a>"
-msgstr ""
-"ÐоÑÑÑпно на ÑмоваÑ
<a rel=\"license\" href=\"http://"
-"creativecommonsorg/licenses/by-nd/3.0/us/deed.uk\"> лÑÑензÑÑ Creative
"
-"Commons Attribution - NoDerivs (<em>Ðз зазнаÑеннÑм
авÑоÑÑÑва — Ðез "
-"поÑ
ÑдниÑ
ÑвоÑÑв</em>) 3.0 СполÑÑÐµÐ½Ñ Ð¨ÑаÑи</a>"
+"Licensed under the <a rel=\"license\" href=\"http://creativecommons.org/"
+"licenses/by-nd/3.0/us/\">Creative Commons Attribution-NoDerivs 3.0 United "
+"States License</a>"
+msgstr ""
+"ÐоÑÑÑпно на ÑмоваÑ
<a rel=\"license\"
href=\"http://creativecommonsorg/"
+"licenses/by-nd/3.0/us/deed.uk\"> лÑÑензÑÑ Creative Commons
Attribution - "
+"NoDerivs (<em>Ðз зазнаÑеннÑм авÑоÑÑÑва —
Ðез поÑ
ÑдниÑ
ÑвоÑÑв</"
+"em>) 3.0 СполÑÑÐµÐ½Ñ Ð¨ÑаÑи</a>"
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -1001,11 +925,11 @@
#. type: Content of: <div><div><p>
msgid ""
-"Please send general FSF & GNU inquiries to <a "
-"href=\"mailto:address@hidden"><address@hidden></a>. There are also <a "
-"href=\"/contact/\">other ways to contact</a> the FSF. Broken links and "
-"other corrections or suggestions can be sent to <a "
-"href=\"mailto:address@hidden"><address@hidden></a>."
+"Please send general FSF & GNU inquiries to <a
href=\"mailto:address@hidden"
+"\"><address@hidden></a>. There are also <a href=\"/contact/\">other
ways "
+"to contact</a> the FSF. Broken links and other corrections or suggestions "
+"can be sent to <a href=\"mailto:address@hidden"><address@hidden"
+"org></a>."
msgstr ""
"ÐÑÐ´Ñ Ð»Ð°Ñка, надÑилайÑе загалÑÐ½Ñ Ð·Ð°Ð¿Ð¸Ñи
ÑÐ¾Ð½Ð´Ñ Ñа GNU за адÑеÑÐ¾Ñ <a href="
"\"mailto:address@hidden"><address@hidden></a>. ÐаÑÐ²Ð½Ñ Ñакож
<a href=\"/"
@@ -1013,25 +937,25 @@
"Ñ ÑнÑÑ Ð²Ð¸Ð¿ÑÐ°Ð²Ð»ÐµÐ½Ð½Ñ Ñи пÑопозиÑÑÑ Ð¼Ð¾Ð¶Ð½Ð°
надÑилаÑи за адÑеÑÐ¾Ñ <a href=\"mailto:"
"address@hidden"><address@hidden></a>."
+#
+#
+#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
-#
#. We work hard and do our best to provide accurate, good quality
#. translations. However, we are not exempt from imperfection.
#. Please send your comments and general suggestions in this regard
#. to <a href="mailto:address@hidden">
-#
#. <address@hidden></a>.</p>
-#
#. <p>For information on coordinating and submitting translations of
#. our web pages, see <a
#. href="/server/standards/README.translations.html">Translations
#. README</a>.
#. type: Content of: <div><div><p>
msgid ""
-"Please see the <a "
-"href=\"/server/standards/README.translations.html\">Translations README</a> "
-"for information on coordinating and submitting translations of this article."
+"Please see the <a href=\"/server/standards/README.translations.html"
+"\">Translations README</a> for information on coordinating and submitting "
+"translations of this article."
msgstr ""
"Ðи намагалиÑÑ Ð·ÑобиÑи Ñей пеÑеклад ÑоÑним
Ñа ÑкÑÑним, але виклÑÑиÑи "
"можливÑÑÑÑ Ð¿Ð¾Ð¼Ð¸Ð»ÐºÐ¸ ми не можемо.
ÐадÑилайÑе, бÑÐ´Ñ Ð»Ð°Ñка, ÑÐ²Ð¾Ñ Ð·Ð°ÑÐ²Ð°Ð¶ÐµÐ½Ð½Ñ Ñ "
@@ -1046,9 +970,9 @@
#. type: Content of: <div><p>
msgid ""
-"This page is licensed under a <a rel=\"license\" "
-"href=\"http://creativecommons.org/licenses/by-nd/3.0/us/\">Creative Commons "
-"Attribution-NoDerivs 3.0 United States License</a>."
+"This page is licensed under a <a rel=\"license\" href=\"http://"
+"creativecommons.org/licenses/by-nd/3.0/us/\">Creative Commons Attribution-"
+"NoDerivs 3.0 United States License</a>."
msgstr ""
"Ð¦Ñ ÑÑоÑÑнка доÑÑÑпна на ÑмоваÑ
<a rel=\"license\"
href=\"http://"
"creativecommons.org/licenses/by-nd/3.0/us/deed.uk\"> лÑÑензÑÑ
Creative "
@@ -1065,4 +989,3 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ðновлено:"
-
Index: surveillance-vs-democracy.uk.html
===================================================================
RCS file: surveillance-vs-democracy.uk.html
diff -N surveillance-vs-democracy.uk.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ surveillance-vs-democracy.uk.html 11 Apr 2014 08:41:53 -0000 1.1
@@ -0,0 +1,520 @@
+
+
+<!--#include virtual="/server/header.uk.html" -->
+<!-- Parent-Version: 1.76 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+ <!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
+
+<title>СкÑлÑки ÑÑÐµÐ¶ÐµÐ½Ñ Ð¼Ð¾Ð¶Ðµ виÑÑимаÑи
демокÑаÑÑÑ? - ÐÑÐ¾ÐµÐºÑ GNU - Фонд вÑлÑного
+пÑогÑамного забезпеÑеннÑ</title>
+
+<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
+<!--#include virtual="/server/banner.uk.html" -->
+<h2>СкÑлÑки ÑÑÐµÐ¶ÐµÐ½Ñ Ð¼Ð¾Ð¶Ðµ виÑÑимаÑи
демокÑаÑÑÑ?</h2>
+
+<p><a href="http://www.stallman.org/">Ð ÑÑаÑд СÑолмен</a></p>
+
+<blockquote><p>ÐеÑвÑÑна веÑÑÑÑ ÑÑаÑÑÑ Ð±Ñла
опÑблÑкована в жовÑÐ½Ñ 2013 ÑÐ¾ÐºÑ Ñ <a
+href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">
+ÐаÑÑед</a>.</p></blockquote>
+
+<p>ÐавдÑки ÑакÑам, ÑÐºÑ ÑÑали вÑÐ´Ð¾Ð¼Ñ Ð·Ð°Ð²Ð´Ñки
ÐдÑаÑÐ´Ñ Ð¡Ð½Ð¾ÑденÑ, ми знаÑмо, Ñо
+ÑÑÑаÑний ÑÑÐ²ÐµÐ½Ñ ÑоÑалÑного ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²
ÑÑÑпÑлÑÑÑÐ²Ñ Ð½ÐµÑÑмÑÑний з пÑавами
+лÑдини. ÐеодноÑазове залÑкÑÐ²Ð°Ð½Ð½Ñ Ñ
пеÑеÑлÑдÑÐ²Ð°Ð½Ð½Ñ Ð´Ð¸ÑиденÑÑв, ÑнÑоÑмаÑоÑÑв Ñ
+жÑÑналÑÑÑÑв в СШРÑа ÑнÑиÑ
кÑаÑнаÑ
пÑдÑвеÑджÑÑ Ñе. Ðам поÑÑÑбно знизиÑи
+ÑÑÐ²ÐµÐ½Ñ ÑоÑалÑного ÑÑеженнÑ, але до ÑкиÑ
меж? Яким Ñ Ð´ÑйÑно <em>макÑималÑний
+допÑÑÑимий ÑÑÐ²ÐµÐ½Ñ ÑÑеженнÑ</em>, за межÑ
Ñкого ми гаÑанÑовано не повиннÑ
+виÑ
одиÑи? Це ÑÑвенÑ, пÑи пеÑевиÑÐµÐ½Ð½Ñ Ñкого
ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð¿Ð¾ÑÐ¸Ð½Ð°Ñ Ð²ÑÑÑÑаÑиÑÑ Ñ
+ÑÑнкÑÑонÑÐ²Ð°Ð½Ð½Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÑÑ, коли
ÑнÑоÑмаÑоÑÑв (ÑакиÑ
Ñк СноÑден), Ñк пÑавило,
+вÑдловлÑÑÑÑ.</p>
+
+<p>Ð ÑмоваÑ
деÑÐ¶Ð°Ð²Ð½Ð¾Ñ ÑаÑмниÑÑ Ð¼Ð¸, наÑод,
залежний вÑд можливоÑÑÑ ÑнÑоÑмаÑоÑÑв
+<a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">
ÑозповÑдаÑи
+нам пÑо Ñе, Ñо ÑобиÑÑ Ð´ÐµÑжава</a>. Ðднак
нинÑÑÐ½Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²ÑдлÑкÑÑ
+поÑенÑÑйниÑ
ÑнÑоÑмаÑоÑÑв, а Ñе знаÑиÑÑ, Ñо
воно надÑо ÑилÑна. Щоб вÑдновиÑи
+демокÑаÑиÑний конÑÑÐ¾Ð»Ñ Ð½Ð°ÑÐ¾Ð´Ñ Ð½Ð°Ð´
деÑжавоÑ, ми Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ ÑкоÑоÑиÑи ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´Ð¾
+велиÑини, пÑи ÑкÑй лÑди бÑдÑÑÑ Ð·Ð½Ð°Ñи, Ñо
вони в безпеÑÑ.</p>
+
+<p>ÐаÑÑоÑÑÐ²Ð°Ð½Ð½Ñ Ð²ÑлÑниÑ
пÑогÑам, <a
+href="/philosophy/free-software-is-more-important.html/"> за Ñо Ñ
виÑÑÑпаÑ
+вже ÑÑидÑÑÑÑ ÑокÑв</a> — пеÑÑий кÑок до
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ ÑиÑÑовоÑ
+ÑÑоÑÐ¾Ð½Ð¾Ñ Ð½Ð°Ñого жиÑÑÑ, Ñо пеÑедбаÑаÑ
пÑоÑидÑÑ ÑÑеженнÑ. ÐовÑÑÑÑи невÑлÑним
+пÑогÑамам не можна; <a
+href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+ÐгенÑÑÑво наÑÑоналÑÐ½Ð¾Ñ Ð±ÐµÐ·Ð¿ÐµÐºÐ¸
коÑиÑÑÑÑÑÑÑÑ Ñ Ð½Ð°Ð²ÑÑÑ ÑÑвоÑÑÑ ÑлабкÑ
+мÑÑÑÑ</a> в невÑлÑниÑ
пÑогÑами Ð´Ð»Ñ <a
+href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">
+вÑоÑÐ³Ð½ÐµÐ½Ð½Ñ Ð½Ð° наÑÑ ÐºÐ¾Ð¼Ð¿'ÑÑеÑи</a> Ñа
маÑÑÑÑÑизаÑоÑи. ÐÑлÑÐ½Ñ Ð¿ÑогÑами даÑÑÑ
+нам конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ наÑими влаÑними
комп'ÑÑеÑами, але <a
+href="http://www.wired.com/opinion/2013/10/149481/"> Ñе не заÑ
иÑÑиÑÑ Ð½Ð°Ñе
+пÑиваÑне жиÑÑÑ, коли ми виÑ
одимо в
ÐнÑеÑнеÑ</a>.</p>
+
+<p>У СШРпÑоÑÑваÑÑÑ <a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">
+двоÑÑоÑоннÑй законопÑÐ¾ÐµÐºÑ Ð· меÑоÑ
“ÑÑÑзаÑи Ñили ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²ÑеÑединÑ
+кÑаÑни”</a>, але Ð´Ð»Ñ ÑÑого поÑÑÑбно
обмежиÑи викоÑиÑÑÐ°Ð½Ð½Ñ Ð´ÐµÑжавними
+оÑганами наÑиÑ
елекÑÑонниÑ
доÑÑÑ. ЦÑого не
доÑÑаÑнÑо Ð´Ð»Ñ Ñого, Ñоб заÑ
иÑÑиÑи
+ÑнÑоÑмаÑоÑÑв, ÑкÑо “пÑйманнÑ
ÑнÑоÑмаÑоÑа” ÑÑÐ°Ñ Ð¿ÑдÑÑÐ°Ð²Ð¾Ñ Ð´Ð»Ñ
+доÑÑÑÐ¿Ñ Ð´Ð¾ даниÑ
, дозволÑÑ ÑденÑиÑÑкÑваÑи
його. Ðам ÑÑеба йÑи далÑ.</p>
+
+<h3>ÐеÑÑ
Ð½Ñ Ð¼ÐµÐ¶Ð° ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð¿Ñи демокÑаÑÑÑ</h3>
+
+<p>ЯкÑо ÑнÑоÑмаÑоÑи не ÑмÑÑÑÑ Ð¿ÑолиÑи
ÑвÑÑло на злоÑини Ñ Ð±ÑеÑ
нÑ, ми вÑÑаÑаÑмо
+оÑÑаннÑй ÑмаÑок ÑакÑиÑного конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
ÑвоÑм ÑÑÑдом Ñ Ð´ÐµÑжавними
+ÑÑÑановами. ÐÑÑ ÑÐ¾Ð¼Ñ ÑÑеженнÑ, Ñке
дозволÑÑ Ð´ÐµÑÐ¶Ð°Ð²Ñ Ð´ÑзнаваÑиÑÑ, Ñ
Ñо говоÑив
+з жÑÑналÑÑÑом, занадÑо велике —
занадÑо велика, аби демокÑаÑÑÑ
+могла його виÑÑимаÑи.</p>
+
+<p>ЯкаÑÑ Ð¿Ð¾Ñадова оÑоба адмÑнÑÑÑÑаÑÑÑ Ð¡Ð¨Ð
зловÑÑно заÑвило жÑÑналÑÑÑам Ñ
+2011 ÑоÑÑ, Ñо <a
+href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">
+СШРне бÑдÑÑÑ Ð´Ð¾Ð¿Ð¸ÑÑваÑи жÑÑналÑÑÑÑв, ÑомÑ
Ñо “ми знаÑмо, Ñ
Ñо з вами
+говоÑив”</a>. ÐÐ½Ð¾Ð´Ñ Ð´Ð»Ñ ÑÑого <a
+href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">
+на Ð²Ð¸Ð¼Ð¾Ð³Ñ ÑÑÐ´Ñ Ð¿ÐµÑедаÑÑÑÑÑ Ð·Ð°Ð¿Ð¸Ñи
ÑелеÑонниÑ
пеÑеговоÑÑв жÑÑналÑÑÑÑв</a>,
+але СноÑден показав нам, Ñо ÑакÑиÑно вони
веÑÑ ÑÐ°Ñ Ð¾ÑÑимÑÑÑÑ Ð·Ð°Ð¿Ð¸Ñи вÑÑÑ
+ÑелеÑонниÑ
пеÑеговоÑÑв ÑÑÑÑ
лÑдей в СШÐ
вÑд<a
+href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">
+Verizon</a>, <a
+href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">
+а Ñакож вÑд ÑнÑиÑ
компанÑй</a>.</p>
+
+<p>ÐÑÑлÑнÑÑÑÑ Ð´Ð¸ÑиденÑÑв Ñ Ð¾Ð¿Ð¾Ð·Ð¸ÑÑÑ
Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ Ð·Ð±ÐµÑÑгаÑи ÑоÑÑ Ñ ÑекÑеÑÑ Ð²Ñд
+деÑжави, Ñка не пÑоÑи пÑоÑобиÑи з ними Ñой
Ñи ÑнÑий бÑÑдний вÑинок. ACLU
+пÑодемонÑÑÑÑвала <a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">
ÑиÑÑемаÑиÑнÑ
+пÑакÑÐ¸ÐºÑ Ð²Ð¿ÑÐ¾Ð²Ð°Ð´Ð¶ÐµÐ½Ð½Ñ Ð°Ð³ÐµÐ½ÑÑв Ñ Ð¼Ð¸ÑнÑ
гÑÑпи диÑиденÑÑв</a> з Ð±Ð¾ÐºÑ Ð´ÐµÑжавниÑ
+оÑганÑв СШРпÑд Ñим пÑиводом, Ñо ÑеÑед ниÑ
можÑÑÑ Ð²Ð¸ÑвиÑиÑÑ
+ÑеÑоÑиÑÑи. ТоÑка, в ÑкÑй ÑÑÐµÐ¶ÐµÐ½Ð½Ñ ÑÑаÑ
занадÑо великим — Ñе Ñ
+ÑоÑка, в ÑкÑй деÑжава може дÑзнаÑиÑÑ, Ñ
Ñо
говоÑив з вÑдомим жÑÑналÑÑÑом або
+вÑдомим диÑиденÑом.</p>
+
+<h3>Ðдного ÑÐ°Ð·Ñ Ð·ÑбÑаними вÑдомоÑÑÑми
бÑдÑÑÑ Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ñи</h3>
+
+<p>Ðоли лÑди визнаÑÑÑ, Ñо ÑÑÐ²ÐµÐ½Ñ Ð·Ð°Ð³Ð°Ð»Ñного
ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°Ð½Ð°Ð´Ñо виÑокий, Ñамо
+ÑÐ¾Ð±Ð¾Ñ Ð½Ð°Ð¿ÑоÑÑÑÑÑÑÑ Ð·Ð°Ð¿ÑопонÑваÑи
Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ Ð½Ð° доÑÑÑп до зÑбÑаниÑ
даниÑ
. Це
+звÑÑиÑÑ Ð½ÐµÐ¿Ð¾Ð³Ð°Ð½Ð¾, але пÑоблеми Ñе не
виÑÑÑиÑÑ, Ð½Ñ Ð½Ð° йоÑÑ, навÑÑÑ Ñ
+пÑипÑÑеннÑ, Ñо деÑжава пÑдкоÑиÑÑÑÑ Ñим
пÑавилам. (ÐаÑÑоналÑне агенÑÑÑво
+безпеки ввело в Ð¾Ð¼Ð°Ð½Ñ ÑÑд, Ñкий ÑозбиÑав
поÑÑÑÐµÐ½Ð½Ñ ÐÐ°ÐºÐ¾Ð½Ñ Ð¿Ñо ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²
+ÑÑлÑÑ
зовнÑÑнÑÐ¾Ñ ÑозвÑдки, пÑÑÐ»Ñ Ñого ÑÑд
заÑвив, Ñо вÑн <a
+href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">
ÑакÑиÑно не
+в Ð·Ð¼Ð¾Ð·Ñ Ð¾ÑÑимаÑи звÑÑ Ð¿Ñо дÑÑлÑнÑÑÑÑ
агенÑÑÑва</a>.) ÐÑдозÑа Ñ Ð²ÑиненнÑ
+злоÑÐ¸Ð½Ñ ÑÑане пÑдÑÑÐ°Ð²Ð¾Ñ Ð´Ð»Ñ Ð´Ð¾ÑÑÑпÑ, бо Ñк
ÑÑлÑки ÑнÑоÑмаÑоÑа звинÑваÑÑÑÑ Ñ
+“ÑпигÑнÑÑвє, поÑÑк “ÑпигÑна”
ÑÑане пÑиводом длÑ
+доÑÑÑÐ¿Ñ Ð´Ð¾ накопиÑеного маÑеÑÑалÑ.</p>
+
+<p>ÐеÑжавний пеÑÑонал ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð±Ñде
зловживаÑи даними Ñ Ð² оÑобиÑÑиÑ
+ÑÑлÑÑ
. ÐеÑÐºÑ Ð°Ð³ÐµÐ½Ñи ÐÐÐ <a
+href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">
+коÑиÑÑÑвалиÑÑ ÑиÑÑемами ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð¡Ð¨Ð Ð´Ð»Ñ
вÑдÑÑÐµÐ¶ÐµÐ½Ð½Ñ ÑвоÑÑ
+коÑ
аниÑ
</a> минÑлиÑ
, ÑепеÑÑÑнÑÑ
Ñ
бажаниÑ
ÑÑ
+пÑакÑика називаÑÑÑÑÑ “лÑбовна
ÑозвÑдка”. ÐгÑдно ÐÐÐ, кÑлÑка
+ÑазÑв ÑÑ
викÑивало в ÑÑÐ¾Ð¼Ñ Ñ ÐºÐ°Ñало; ми не
знаÑмо, ÑкÑлÑки бÑло ÑнÑиÑ
+випадкÑв, коли ÑÑ
не викÑили. Ðле Ñе не
повинно Ð½Ð°Ñ Ð´Ð¸Ð²ÑваÑи, ÑÐ¾Ð¼Ñ Ñо
+полÑÑÑÑ Ð´Ð°Ð²Ð½Ð¾ <a
+href="http://www.sweetliberty.org/issues/privacy/lein1.htm">
коÑиÑÑÑÑÑÑÑÑ
+ÑвоÑм доÑÑÑпом до запиÑÑв пÑо номеÑи
авÑомобÑлÑв, Ñоб вÑдÑÑежÑваÑи
+пÑивабливиÑ
оÑÑб</a> пÑакÑика, вÑдома
Ñк “пÑобиÑи номеÑ,
+Ñоб пÑизнаÑиÑи побаÑеннє.</p>
+
+<p>ÐÐ°Ð½Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°Ð²Ð¶Ð´Ð¸ бÑдÑÑÑ
викоÑиÑÑовÑваÑиÑÑ Ð² ÑнÑиÑ
ÑÑлÑÑ
, навÑÑÑ
ÑкÑо Ñе
+бÑде забоÑонено. Як ÑÑлÑки Ð´Ð°Ð½Ñ Ð·ÑбÑÐ°Ð½Ñ Ð¹ Ñ
деÑжави Ñ Ð¼Ð¾Ð¶Ð»Ð¸Ð²ÑÑÑÑ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾
+ниÑ
, вона може зловживаÑи Ñими даними ÑÑÑаÑ
ÑÑливим Ñином, Ñк показÑÑÑÑ <a
+href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">
+пÑиклади з ÐвÑопи</a> Ñ <a
+href="https://en.wikipedia.org/wiki/Japanese_American_internment">СШÐ</a>.</p>
+
+<p>ТоÑалÑне ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð² поÑÐ´Ð½Ð°Ð½Ð½Ñ Ð·
ÑозпливÑаÑÑими ÑоÑмÑлÑваннÑми законÑв
+вÑдкÑÐ¸Ð²Ð°Ñ Ð¼Ð¾Ð¶Ð»Ð¸Ð²Ð¾ÑÑÑ Ð¼Ð°Ñового полÑваннÑ
пÑоÑи ÑÐºÐ¾Ñ Ð·Ð°Ð²Ð³Ð¾Ð´Ð½Ð¾ меÑи. Щоб
+ÑбезпеÑиÑи жÑÑналÑÑÑÐ¸ÐºÑ Ñа демокÑаÑÑÑ, ми
Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð¾Ð±Ð¼ÐµÐ¶Ð¸Ñи збÑÑ Ð´Ð°Ð½Ð¸Ñ
, ÑкÑ
+бÑдÑÑÑ Ð»ÐµÐ³ÐºÐ¾ доÑÑÑÐ¿Ð½Ñ Ð´ÐµÑжавÑ.</p>
+
+<h3>СÑÑйкий заÑ
иÑÑ Ð¾ÑобиÑÑого жиÑÑÑ Ð¿Ð¾Ð²Ð¸Ð½ÐµÐ½
бÑÑи ÑеÑ
нÑÑним</h3>
+
+<p>Фонд елекÑÑонниÑ
ÑÑбежÑв Ñа ÑнÑÑ
оÑганÑзаÑÑÑ Ð¿ÑопонÑÑÑÑ ÑÑд ÑÑидиÑниÑ
+пÑинÑипÑв, ÑкладениÑ
Ð´Ð»Ñ <a
+href="https://en.necessaryandproportionate.org/text"> запобÑганнÑ
зловживанÑ
+маÑовим ÑÑеженнÑм</a>. У ÑÑ Ð¿ÑинÑипи вÑ
одиÑÑ
(Ñо жиÑÑÑво важливо) Ñвний
+ÑÑидиÑний заÑ
иÑÑ ÑнÑоÑмаÑоÑÑв; Ñк
наÑлÑдок, ÑÑ Ð¿ÑинÑипи бÑдÑÑÑ Ð°Ð´ÐµÐºÐ²Ð°ÑнÑ
+заÑ
иÑÑÑ Ð´ÐµÐ¼Ð¾ÐºÑаÑиÑниÑ
Ñвобод — ÑкÑо
ÑÑ
пÑиймÑÑÑ Ñ Ð¿Ð¾Ð²Ð½Ð¾Ð¼Ñ Ð¾Ð±ÑÑзÑ
+Ñ Ð±ÑдÑÑÑ Ð´Ð¾ÑÑимÑваÑиÑÑ Ð·Ð°Ð²Ð¶Ð´Ð¸ Ñ Ð±ÐµÐ·
винÑÑкÑв.</p>
+
+<p>Ðднак Ñакого ÑÑидиÑного заÑ
иÑÑÑ Ð½Ðµ
доÑÑаÑнÑо: Ñк показÑÑÑÑ Ð½ÐµÐ´Ð°Ð²Ð½Ñ Ð¿Ð¾Ð´ÑÑ,
+вони можÑÑÑ Ð±ÑÑи вÑÐ´ÐºÐ»Ð¸ÐºÐ°Ð½Ñ (Ñк Ðакон пÑо
попÑавки в FISA), дÑÑ ÑÑ
може бÑÑи
+пÑипинена, наÑеÑÑÑ ÑÑ
можÑÑÑ <a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html">
ÑгноÑÑваÑи</a>.</p>
+
+<p>У Ñой же ÑÐ°Ñ Ð´ÐµÐ¼Ð°Ð³Ð¾Ð³Ð¸ бÑдÑÑÑ Ð¿ÑиводиÑи
звиÑÐ°Ð¹Ð½Ñ Ð²Ñдмовки Ñк пÑдÑÑави длÑ
+ÑоÑалÑного ÑÑеженнÑ; бÑдÑ-Ñкий
ÑеÑоÑиÑÑиÑний акÑ, навÑÑÑ ÑкÑо в нÑомÑ
загине
+кÑлÑка лÑдей, даÑÑÑ Ñм ÑÐ°ÐºÑ Ð¼Ð¾Ð¶Ð»Ð¸Ð²ÑÑÑÑ.</p>
+
+<p>ЯкÑо Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ Ð½Ð° доÑÑÑп до даниÑ
знÑмÑÑÑ, Ñе бÑде вÑе одно, мовби вони
+нÑколи не ÑÑнÑвали: доÑÑÑ, накопиÑÐµÐ½Ñ Ð·Ð°
Ð´Ð¾Ð²Ð³Ñ Ñоки, вÑдÑÐ°Ð·Ñ ÑÑанÑÑÑ
+доÑÑÑÐ¿Ð½Ñ Ð´Ð»Ñ Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ð½Ñ Ð· Ð±Ð¾ÐºÑ Ð´ÐµÑжави Ñа
ÑÑ Ð°Ð³ÐµÐ½ÑÑв, а ÑкÑо ÑÑ
зÑбÑали
+компанÑÑ, Ñо Ñ Ð´Ð»Ñ Ð¿ÑиваÑниÑ
Ð·Ð»Ð¾Ð²Ð¶Ð¸Ð²Ð°Ð½Ñ Ð·
ÑÑ
нÑого бокÑ. Ðднак ÑкÑо ми
+зÑпинимо збÑÑ Ð´Ð¾ÑÑÑ Ð½Ð° кожного, Ñо ÑиÑ
доÑÑÑ Ð½Ðµ бÑде Ñ Ð½Ðµ бÑде ÑпоÑобÑв
+зÑбÑаÑи ÑÑ
заднÑм ÑиÑлом. ÐовомÑ
анÑилÑбеÑалÑÐ½Ð¾Ð¼Ñ ÑÐµÐ¶Ð¸Ð¼Ñ Ð´Ð¾Ð²ÐµÐ»Ð¾ÑÑ Ð±
+ÑеалÑзовÑваÑи ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°Ð½Ð¾Ð²Ð¾, Ñ Ð´Ð°Ð½Ñ
збиÑалиÑÑ Ð± ÑÑлÑки поÑинаÑÑи з ÑÑого
+моменÑÑ. Що ÑÑоÑÑÑÑÑÑÑ Ð¿ÑизÑÐ¿Ð¸Ð½ÐµÐ½Ð½Ñ Ð´ÑÑ
або ÑгноÑÑÐ²Ð°Ð½Ð½Ñ ÑÑого законÑ, ÑÑ
+ÑÐ´ÐµÑ Ð½Ð°Ð²ÑÑд Ñи Ð¼Ð°Ñ ÑенÑ.</p>
+
+<h3>Ðо-пеÑÑе, не бÑÑи дÑÑнÑми</h3>
+
+<p>Щоб Ñ Ð²Ð°Ñ Ð±Ñла конÑÑденÑÑйнÑÑÑÑ, ви не
Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ ÑÑ Ð²Ð¸ÐºÐ¸Ð´Ð°Ñи: заÑ
иÑаÑи ваÑÑ
+конÑÑденÑÑйнÑÑÑÑ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð½Ð°ÑампеÑед ви
ÑамÑ. Ðе ÑозповÑдайÑе компанÑÑ, Ñк
+Facebook, нÑÑого Ñакого, Ñо ви не пеÑедали б длÑ
пÑблÑкаÑÑÑ Ð² газеÑÑ. Ðе
+ÑозповÑдайÑе компанÑÑ, Ñк Facebook, пÑо ÑвоÑÑ
знайомиÑ
нÑÑого Ñакого, Ñо
+вони не Ñ
оÑÑли б опÑблÑкÑваÑи в газеÑÑ. Ð
Ñе кÑаÑе не бÑÑи одним з
+коÑиÑÑÑваÑÑв Facebook взагалÑ.</p>
+
+<p>ÐÑколи не пеÑедавайÑе Ð½Ñ Ð½Ð° Ñкий ÑайÑ
повний ÑпиÑок адÑÐµÑ ÐµÐ»ÐµÐºÑÑÐ¾Ð½Ð½Ð¾Ñ Ð¿Ð¾ÑÑи
+Ñа номеÑи ÑелеÑонÑв лÑдей, з Ñкими ви
ÑпÑлкÑÑÑеÑÑ. ТÑимайÑе ÑÐ²Ð¾Ñ Ð´Ð°Ð½Ñ Ñ
+Ñебе; не збеÑÑгайÑе ÑÐ²Ð¾Ñ Ð´Ð°Ð½Ñ Ð½Ð°
“зÑÑÑномє ÑеÑвеÑÑ
+компанÑÑ. Ðднак ÑÑлком безпеÑно довÑÑÑÑи
ÑезеÑÐ²Ð½Ñ ÐºÐ¾Ð¿ÑÑ Ð´Ð°Ð½Ð¸Ñ
Ñ ÐºÐ¾Ð¼ÐµÑÑÑйнÑй
+ÑлÑÐ¶Ð±Ñ Ð·Ð° Ñмови, Ñо ви заÑиÑÑÑвали ÑÑ Ð´Ð°Ð½Ñ,
в ÑÐ¾Ð¼Ñ ÑиÑÐ»Ñ Ñмена ÑайлÑв на
+ÑвоÑÐ¼Ñ ÐºÐ¾Ð¼Ð¿'ÑÑеÑÑ Ð·Ð° Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ Ð²ÑлÑниÑ
пÑогÑам пеÑед Ñим, Ñк вÑдпÑавлÑÑи ÑÑ
+на ÑеÑвеÑ.</p>
+
+<p>ÐаÑади конÑÑденÑÑйноÑÑÑ Ð²Ð¸ повиннÑ
ÑникаÑи невÑлÑниÑ
пÑогÑам, оÑкÑлÑки
+внаÑлÑдок пеÑедаÑÑ ÑнÑим конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
ваÑими обÑиÑленнÑми, вони, <a
+href="/philosophy/proprietary-surveillance.html">ймовÑÑно,
ÑпигÑÑÑÑ Ð·Ð°
+вами</a>. УникайÑе <a
+href="/philosophy/who-does-that-server-really-serve.html"> поÑлÑг
пÑдмÑни
+пÑогÑам</a>, а Ñакож пеÑедаÑÑ ÑнÑим конÑÑолÑ
над ваÑими обÑиÑленнÑми, Ñе
+Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ Ð²Ñд Ð²Ð°Ñ Ð½Ð°Ð´Ð°Ð½Ð½Ñ Ð²ÑÑÑ
обÑоблÑваниÑ
даниÑ
на ÑеÑвеÑ.</p>
+
+<p>Ðднак навÑÑÑ Ð½Ð°Ð¹Ð¿Ð¸Ð»ÑнÑÑого ÑамозаÑ
иÑÑÑ
недоÑÑаÑнÑо, Ñоб заÑ
иÑÑиÑи ваÑÑ
+конÑÑденÑÑйнÑÑÑÑ Ð½Ð° ÑиÑÑемаÑ
, ÑÐºÑ Ð²Ð°Ð¼ не
належаÑÑ. Ðоли ми ÑпÑлкÑÑмоÑÑ Ð·
+ÑнÑими або пеÑеÑÑваÑмоÑÑ Ð¿Ð¾ мÑÑÑÑ, наÑа
конÑÑденÑÑйнÑÑÑÑ Ð·Ð°Ð»ÐµÐ¶Ð¸ÑÑ Ð²Ñд
+ÑиÑÑаÑÑÑ Ð² ÑÑÑпÑлÑÑÑÐ²Ñ Ð¿ÑакÑики.</p>
+
+<h3>ÐÐ¾Ð¶Ð½Ñ ÑиÑÑÐµÐ¼Ñ Ð¿Ð¾ÑÑÑбно пÑоекÑÑваÑи з
ÑÑаÑ
ÑваннÑм конÑÑденÑÑйноÑÑÑ</h3>
+
+<p>ЯкÑо ми не Ñ
оÑемо жиÑи Ñ ÑÑÑпÑлÑÑÑвÑ
ÑоÑалÑного ÑÑеженнÑ, ми повиннÑ
+ÑозглÑдаÑи ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ñк Ñвого ÑодÑ
ÑоÑÑалÑне забÑÑÐ´Ð½ÐµÐ½Ð½Ñ Ñ Ð¾Ð±Ð¼ÐµÐ¶ÑваÑи внеÑок
+Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ ÐºÐ¾Ð¶Ð½Ð¾Ñ Ð½Ð¾Ð²Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ ÑиÑÑеми
ÑоÑно Ñак Ñамо, Ñк ми обмежÑÑмо
+вплив ÑÑзиÑниÑ
ÑпоÑÑд на навколиÑнÑ
ÑеÑедовиÑе.</p>
+
+<p>ÐапÑиклад: “ÑнÑелекÑÑалÑнє
елекÑÑолÑÑилÑники ÑозÑ
валÑÑÑÑ Ð·Ð° Ñе,
+Ñо вони вÑдÑилаÑÑÑ Ð² енеÑгеÑиÑÐ½Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ
моменÑалÑÐ½Ñ Ð´Ð°Ð½Ñ Ð¿Ñо виÑÑаÑÑ
+елекÑÑоенеÑгÑÑ ÐºÐ¾Ð¶Ð½Ð¸Ð¼ коÑиÑÑÑваÑем, Ñ
ÑÐ¾Ð¼Ñ ÑиÑÐ»Ñ Ð¿Ñо Ñе, Ñк виÑÑаÑа
+ÑпÑввÑдноÑиÑÑÑÑ Ð· виÑÑаÑÐ¾Ñ ÑеÑеднÑого
коÑиÑÑÑваÑа. Це ÑеалÑзовано на оÑновÑ
+ÑоÑалÑного ÑÑеженнÑ, але нÑÑкого ÑÑеженнÑ
Ð´Ð»Ñ ÑÑого не
+поÑÑÑбно. ÐнеÑгеÑиÑнÑй компанÑÑ Ð±Ñло б
неважко виÑаÑ
овÑваÑи ÑеÑÐµÐ´Ð½Ñ Ð²Ð¸ÑÑаÑи
+Ñ Ð¶Ð¸ÑÐ»Ð¾Ð²Ð¾Ð¼Ñ ÑайонÑ, подÑливÑи загалÑнÑ
виÑÑаÑÑ Ð½Ð° ÑиÑло абоненÑÑв, Ñ
+виÑилаÑи оÑÑимане знаÑÐµÐ½Ð½Ñ Ð½Ð° лÑÑилÑники.
ÐлекÑÑолÑÑилÑник кожного клÑÑнÑа
+мÑг би поÑÑвнÑваÑи Ñе з ÑвоÑми вимÑÑами за
поÑÑÑбний пеÑÑод з ÑеÑеднÑм
+гÑаÑÑком виÑÑÐ°Ñ Ð·Ð° Ñей пеÑÑод. Те ж Ñаме,
ÑÑлÑки без ÑÑеженнÑ!</p>
+
+<p>Ðам ÑÑеба вбÑдовÑваÑи ÑÐ°ÐºÑ Ð¶
конÑÑденÑÑйнÑÑÑÑ Ñ Ð²ÑÑ Ð½Ð°ÑÑ ÑиÑÑовÑ
ÑиÑÑеми.</p>
+
+<h3>ÐаÑ
Ñд пÑоÑи збоÑÑ Ð´Ð°Ð½Ð¸Ñ
: залиÑайÑе ÑÑ
ÑозоÑеÑедженими</h3>
+
+<p><a name="dispersal"></a>Ðдин Ð·Ñ ÑпоÑобÑв зÑобиÑи
безпеÑÐ½Ð¾Ñ Ð´Ð»Ñ ÑпоÑÑеÑеженнÑ
+конÑÑденÑÑйнÑÑÑÑ Ð·Ð°Ð»Ð¸ÑаÑи данÑ
ÑозоÑеÑедженими, без зÑÑÑного
+доÑÑÑпÑ. СÑаÑÐ¾Ð¼Ð¾Ð´Ð½Ñ ÐºÐ°Ð¼ÐµÑи
вÑдеоÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ Ð½Ðµ пÑедÑÑавлÑли
загÑози
+конÑÑденÑÑйноÑÑÑ. ÐапиÑи велиÑÑ Ð½Ð° мÑÑÑÑ Ñ
збеÑÑгалиÑÑ Ð½Ðµ довÑе кÑлÑкоÑ
+ÑижнÑв. ЧеÑез незÑÑÑноÑÑÑ Ð´Ð¾ÑÑÑÐ¿Ñ Ð´Ð¾ ÑиÑ
запиÑÑв до ниÑ
нÑколи не звеÑÑалиÑÑ
+багаÑо; запиÑи пÑднÑмали ÑÑлÑки в мÑÑÑÑÑ
,
де Ñ
ÑоÑÑ Ð¿Ð¾Ð²ÑдомлÑв пÑо
+злоÑин. ÐÑло ÑÑзиÑно неможливо збиÑаÑи
кожен Ð´ÐµÐ½Ñ Ð¼ÑлÑйони ÑÑÑÑÑок, а поÑÑм
+пеÑеглÑдаÑи або копÑÑваÑи ÑÑ
.</p>
+
+<p>ÐамеÑи вÑдеоÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ ÑÑали
камеÑами ÑÑеженнÑ: вони пÑдклÑÑÐµÐ½Ñ Ð´Ð¾
+ÐнÑеÑнеÑÑ, ÑÐ¾Ð¼Ñ Ð·Ð°Ð¿Ð¸Ñи можна збиÑаÑи в
ÑнÑоÑмаÑÑÐ¹Ð½Ð¾Ð¼Ñ ÑенÑÑÑ Ñ Ð·Ð±ÐµÑÑгаÑи
+вÑÑно. Це вже небезпеÑно, але ÑÑановиÑе
погÑÑÑÑваÑимеÑÑÑÑ. ÐÑогÑÐµÑ Ð²
+ÑозпÑÐ·Ð½Ð°Ð²Ð°Ð½Ð½Ñ Ð¾ÑÑб може пÑизвеÑÑи до Ñого,
Ñо в один пÑекÑаÑний денÑ
+пÑдозÑÑваниÑ
жÑÑналÑÑÑÑв зможÑÑÑ
поÑÑÑйно вÑдÑлÑдковÑваÑи на вÑлиÑÑ, Ñоб
+побаÑиÑи, з ким вони ÑпÑлкÑÑÑÑÑÑ.</p>
+
+<p>ÐамеÑи, пÑд'ÑÐ´Ð½Ð°Ð½Ñ Ð´Ð¾ ÐнÑеÑнеÑÑ, ÑаÑÑо заÑ
иÑÐµÐ½Ñ Ð² ÑиÑÑÐ¾Ð²Ð¾Ð¼Ñ Ð²ÑдноÑеннÑ
+доÑиÑÑ Ð¿Ð¾Ð³Ð°Ð½Ð¾, ÑÐ¾Ð¼Ñ Ñо <a
+href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">
+Ñ
Ñо завгодно може пеÑеглÑдаÑи Ñе, на Ñо
ÑпÑÑмована камеÑа</a>. Щоб
+вÑдновиÑи конÑÑденÑÑйнÑÑÑÑ, нам ÑÑеба
забоÑониÑи коÑиÑÑÑÐ²Ð°Ð½Ð½Ñ ÐºÐ°Ð¼ÐµÑами,
+пÑд'Ñднаними до ÐнÑеÑнеÑÑ, коли вони
напÑÐ°Ð²Ð»ÐµÐ½Ñ Ð½Ð° гÑомадÑÑÐºÑ Ð¼ÑÑÑÑ, ÑкÑо
+ÑÑлÑки ÑÑ ÐºÐ°Ð¼ÐµÑи не вÑÑÐ°Ð½Ð¾Ð²Ð»ÐµÐ½Ñ Ð½Ð° лÑдинÑ.
Ðожен повинен маÑи пÑаво вÑлÑно
+пÑблÑкÑваÑи ÑÐ½Ð¾Ð´Ñ ÑоÑо - Ñ Ð²ÑдеозапиÑи, але
ÑиÑÑемаÑиÑне накопиÑÐµÐ½Ð½Ñ ÑакиÑ
+даниÑ
Ñ ÐнÑеÑнеÑÑ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ðµ обмежÑваÑиÑÑ.</p>
+
+<h3>ÐаÑ
оди пÑоÑи комеÑÑÑйного ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð²
ÐнÑеÑнеÑÑ</h3>
+
+<p>ÐÑлÑÑÑÑÑÑ Ð·ÑбÑаниÑ
даниÑ
Ð²Ð¸Ð½Ð¸ÐºÐ°Ñ Ð²
ÑезÑлÑÑаÑÑ Ð²Ð»Ð°ÑÐ½Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ Ð´ÑÑлÑноÑÑÑ
+лÑдей. ÐазвиÑай Ð´Ð°Ð½Ñ ÑпоÑаÑÐºÑ Ð·Ð±Ð¸ÑаÑÑÑÑÑ
компанÑÑми. Ðле коли мова йде пÑо
+загÑÐ¾Ð·Ñ ÐºÐ¾Ð½ÑÑденÑÑйноÑÑÑ Ñ Ð´ÐµÐ¼Ð¾ÐºÑаÑÑÑ,
абÑолÑÑно байдÑже, пÑоводиÑÑÑÑ
+ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´ÐµÑÐ¶Ð°Ð²Ð¾Ñ Ð±ÐµÐ·Ð¿Ð¾ÑеÑеднÑо або ÑÑ
доÑÑÑаÑÑÑ Ð¿ÑдпÑиÑмÑÑвÑ, ÑÐ¾Ð¼Ñ Ñо данÑ,
+ÑÐºÑ Ð·Ð±Ð¸ÑаÑÑÑ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ, ÑиÑÑемаÑиÑно
доÑÑÑÐ¿Ð½Ñ Ð´ÐµÑжавÑ.</p>
+
+<p>ÐÐРз Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ PRISM <a
+href="https://www.commondreams.org/headline/2013/08/23-2"> пÑоникло в
бази
+даниÑ
багаÑÑоÑ
великиÑ
коÑпоÑаÑÑй в
облаÑÑÑ ÐнÑеÑнеÑÑ</a>. AT&T збеÑÑгаÑ
+вÑÑ ÑÐ²Ð¾Ñ Ð·Ð°Ð¿Ð¸Ñи пÑо ÑелеÑÐ¾Ð½Ð½Ñ Ð¿ÐµÑеговоÑи
з 1987 ÑÐ¾ÐºÑ Ñ <a
+href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">
+Ð½Ð°Ð´Ð°Ñ ÑÑ
DEA</a> Ð´Ð»Ñ Ð¿Ð¾ÑÑÐºÑ Ð·Ð° запиÑом. СÑÑого
кажÑÑи, пÑавлÑÑий Ñежим СШÐ
+не володÑÑ Ñими даними, але пÑакÑиÑно
ÑÑзниÑÑ Ð½ÐµÐ¼Ð°Ñ Ð¶Ð¾Ð´Ð½Ð¾Ñ.</p>
+
+<p>ÐÑже, в ÑÑлÑÑ
забезпеÑÐµÐ½Ð½Ñ Ð±ÐµÐ·Ð¿ÐµÐºÐ¸
жÑÑналÑÑÑики Ñа демокÑаÑÑÑ Ð¿Ð¾ÑÑÑбно
+ÑкоÑоÑиÑи обÑÑг даниÑ
, зÑбÑаниÑ
пÑо лÑдей
бÑдÑ-Ñкими оÑганÑзаÑÑÑми, а не
+ÑÑлÑки деÑжавоÑ. Ðи повиннÑ
пеÑепÑоекÑÑваÑи ÑиÑÑÐ¾Ð²Ñ ÑиÑÑеми Ñак, Ñоб
вони не
+збиÑали Ð´Ð°Ð½Ñ Ð¿Ñо ÑвоÑÑ
коÑиÑÑÑваÑÑв. ЯкÑо
Ñм поÑÑÑÐ±Ð½Ñ ÑиÑÑÐ¾Ð²Ñ Ð´Ð°Ð½Ñ Ð¿Ñо наÑиÑ
+опеÑаÑÑÑÑ
, Ñм не повинно бÑÑи дозволено
збеÑÑгаÑи ÑÑ
довÑе, нÑж коÑоÑкий ÑаÑ
+пÑÑÐ»Ñ Ñого, Ñо пÑинÑипово необÑ
Ñдно Ñм длÑ
ÑобоÑи з нами.</p>
+
+<p>Ðдна Ñз ÑпонÑкалÑниÑ
пÑиÑин ÑÑÑаÑного
ÑÑÐ²Ð½Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð² ÐнÑеÑнеÑÑ Ð¿Ð¾Ð»ÑÐ³Ð°Ñ Ð²
+ÑомÑ, Ñо ÑайÑи ÑÑнанÑÑÑÑÑÑÑ Ð· Ñеклами,
заÑÐ½Ð¾Ð²Ð°Ð½Ð¾Ñ Ð½Ð° вÑдÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð´ÑÑлÑноÑÑÑ
+Ñа ÑÐ¿Ð¾Ð´Ð¾Ð±Ð°Ð½Ñ ÐºÐ¾ÑиÑÑÑваÑÑв. Це ÑобиÑÑ
ÑÐµÐºÐ»Ð°Ð¼Ñ Ð½Ðµ пÑоÑÑо ÑимоÑÑ Ð½Ð°Ð±Ñидливим,
+на Ñо ми могли б навÑиÑиÑÑ Ð½Ðµ звеÑÑаÑи
Ñваги,— Ñе пеÑеÑвоÑÑÑ ÑÑ Ð²
+ÑиÑÑÐµÐ¼Ñ ÑÑеженнÑ, Ñка ÑкодиÑÑ Ð½Ð°Ð¼
незалежно вÑд Ñого, знаÑмо ми пÑо Ñе Ñи
+нÑ. СиÑÑеми покÑпок по ÐнÑеÑнеÑÑ Ñакож
вÑдÑÑежÑÑÑÑ ÑвоÑÑ
коÑиÑÑÑваÑÑв. Ð
+вÑÑм нам вÑдомо, Ñо “пÑавила
конÑÑденÑÑйноÑÑÑ” ÑвлÑÑÑÑ ÑобоÑ
+ÑкоÑÑÑе випÑÐ°Ð²Ð´Ð°Ð½Ð½Ñ Ð´Ð»Ñ Ð¿Ð¾ÑÑÑеннÑ
конÑÑденÑÑйноÑÑÑ, нÑж намÑÑи доÑÑимÑваÑиÑÑ
+ÑÑ.</p>
+
+<p>Ðи могли б виÑÑÑиÑи Ð¾Ð±Ð¸Ð´Ð²Ñ Ð¿Ñоблеми
введеннÑм ÑиÑÑеми анонÑмниÑ
+плаÑежÑв — ÑобÑо анонÑмниÑ
Ð´Ð»Ñ ÑиÑ
, Ñ
Ñо плаÑиÑÑ (ми не Ñ
оÑемо,
+Ñоб Ñой, ÐºÐ¾Ð¼Ñ Ð¿Ð»Ð°ÑÑÑÑ, ÑÑ
илÑвÑÑ Ð²Ñд
подаÑкÑв). <a
+href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">
+СиÑÑема Bitcoin не анонÑмна</a>, але ÑеÑ
нÑка <a
+href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"> ÑиÑÑовоÑ
+гоÑÑвки впеÑÑе бÑла ÑозÑоблена Ñ
вÑÑÑмдеÑÑÑÑ Ñоки XX ÑÑолÑÑÑÑ</a>; нам
+бÑакÑÑ ÑÑлÑки пÑдпÑиÑмÑÑв, ÑÐºÑ Ð·Ð°Ð¹Ð¼Ð°Ð»Ð¸ÑÑ Ð±
Ñим, Ñ Ð´ÐµÑжави, Ñка не
+пеÑеÑкоджала б ÑÑомÑ.</p>
+
+<p>ÐодаÑÐºÐ¾Ð²Ñ Ð·Ð°Ð³ÑÐ¾Ð·Ñ Ð·Ð±ÑÑ Ð¾ÑобиÑÑиÑ
даниÑ
ÑайÑами ÑвлÑÑ ÑомÑ, Ñо зломлÑваÑÑ
+можÑÑÑ Ð¿ÑоникаÑи на ÑеÑвеÑи, бÑаÑи Ð´Ð°Ð½Ñ Ñ
зловживаÑи ними. Рв ÑÐ¾Ð¼Ñ ÑиÑлÑ
+даними пÑо кÑедиÑÐ½Ñ ÐºÐ°ÑÑки клÑÑнÑÑв.
СиÑÑема анонÑмниÑ
плаÑежÑв покÑнÑила б
+Ñз ÑÑÑÑ Ð·Ð°Ð³ÑозоÑ: пÑолом Ñ Ð·Ð°Ñ
иÑÑÑ ÑайÑÑ Ð½Ðµ
може заÑкодиÑи вам, коли ÑайÑ
+нÑÑого пÑо Ð²Ð°Ñ Ð½Ðµ знаÑ.</p>
+
+<h3>ÐаÑ
оди пÑоÑи ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°
пеÑеÑÑваннÑми</h3>
+
+<p>Ðи Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð¿ÐµÑеÑвоÑиÑи ÑиÑÑÐ¾Ð²Ñ ÑиÑÑеми
збоÑÑ Ð¿Ð»Ð°ÑежÑв Ñ Ð°Ð½Ð¾Ð½ÑÐ¼Ð½Ñ (напÑиклад,
+з Ð´Ð¾Ð¿Ð¾Ð¼Ð¾Ð³Ð¾Ñ ÑиÑÑÐ¾Ð²Ð¾Ñ Ð³Ð¾ÑÑвки). СиÑÑеми
ÑозпÑÐ·Ð½Ð°Ð²Ð°Ð½Ð½Ñ Ð½Ð¾Ð¼ÐµÑÑв маÑин
+ÑозпÑзнаÑÑÑ Ð²ÑÑ Ð½Ð¾Ð¼ÐµÑи, Ñ <a
+href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">
+Ð´Ð°Ð½Ñ Ð¼Ð¾Ð¶ÑÑÑ Ð·Ð±ÐµÑÑгаÑиÑÑ Ð½ÐµÐ²Ð¸Ð·Ð½Ð°Ñено
довго</a>; закон повинен вимагаÑи, Ñоб
+вÑдзнаÑалиÑÑ Ñ Ð·Ð°Ð¿Ð¸ÑÑвалиÑÑ Ð½Ð¾Ð¼ÐµÑи ÑÑлÑки
ÑиÑ
авÑомобÑлÑв, ÑÐºÑ Ð¿ÐµÑебÑваÑÑÑ Ñ
+ÑозÑÑкÑ. ÐÐµÐ½Ñ Ð±ÐµÐ·Ð¿ÐµÑÐ½Ð¾Ñ Ð°Ð»ÑÑеÑнаÑивоÑ
бÑло б вÑдзнаÑаÑи вÑÑ Ð°Ð²ÑомобÑÐ»Ñ Ð½Ð°
+мÑÑÑÑ, але ÑÑлÑки на кÑлÑка днÑв, пÑиÑомÑ
Ð¿Ð¾Ð²Ð½Ñ Ð´Ð°Ð½Ñ Ð½Ðµ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð±ÑÑи
+доÑÑÑÐ¿Ð½Ñ Ð¿Ð¾ ÐнÑеÑнеÑÑ; доÑÑÑп до даниÑ
повинен бÑÑи обмежений ÑпиÑком
+номеÑÑв авÑомобÑлÑв Ñ ÑозÑÑкÑ.</p>
+
+<p>“ÐезполÑÑний» ÑпиÑок СШРпоÑÑÑбно
ÑкаÑÑваÑи, ÑÐ¾Ð¼Ñ Ñо Ñе <a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">
+покаÑÐ°Ð½Ð½Ñ Ð±ÐµÐ· ÑÑдÑ</a>.</p>
+
+<p>ÐопÑÑÑимо веÑÑи ÑпиÑок лÑдей,
оÑобиÑÑÑÑÑÑ Ñ Ð±Ð°Ð³Ð°Ð¶ ÑкиÑ
конÑÑолÑÑÑÑ
+ÑеÑелÑнÑÑе, а анонÑмниÑ
паÑажиÑÑв на
внÑÑÑÑÑнÑÑ
лÑнÑÑÑ
можна бÑло б вважаÑи
+вклÑÑеними Ñ Ñей ÑпиÑок. Також допÑÑÑимо
забоÑонÑÑи негÑомадÑнам, ÑкÑо Ñм
+Ð²Ð·Ð°Ð³Ð°Ð»Ñ Ð½Ðµ дозволено в'Ñзд в кÑаÑнÑ, доÑÑÑп
на ÑейÑи з поÑадками в ÑÑй
+кÑаÑнÑ. ЦÑого повинно бÑÑи доÑÑаÑнÑо длÑ
вÑÑÑ
законниÑ
ÑÑлей.</p>
+
+<p>У багаÑÑоÑ
ÑиÑÑемаÑ
пÑÐ¾Ð´Ð°Ð¶Ñ ÐºÐ²Ð¸ÑкÑв длÑ
плаÑежÑв заÑÑоÑовÑÑÑÑÑÑ ÑÑзного ÑодÑ
+елекÑÑÐ¾Ð½Ð½Ñ ÐºÐ°ÑÑи. Ð¦Ñ ÑиÑÑеми накопиÑÑÑÑÑ
оÑобиÑÑÑ Ð´Ð°Ð½Ñ: ÑкÑо ви одного ÑазÑ
+за Ð¿Ð¾Ð¼Ð¸Ð»ÐºÑ Ð¾Ð¿Ð»Ð°Ñили поÑÐ·Ð´ÐºÑ ÑимоÑÑ ÐºÑÑм
гоÑÑвки, вони назавжди пов'ÑзÑÑÑÑ
+елекÑÑÐ¾Ð½Ð½Ñ ÐºÐ°ÑÑÐºÑ Ð· ваÑим Ñм'Ñм. ÐÑлÑÑ
Ñого, вони запиÑÑÑÑÑ Ð²ÑÑ Ð¿Ð¾Ñздки,
+пов'ÑÐ·Ð°Ð½Ñ Ð· ÐºÐ¾Ð¶Ð½Ð¾Ñ ÐºÐ°ÑÑкоÑ. ÐÑе Ñе Ñазом
ÑÑановиÑÑ ÑиÑÑÐµÐ¼Ñ Ð¼Ð°Ñового
+ÑÑеженнÑ. ÐбÑÑ ÑиÑ
даниÑ
поÑÑÑбно
ÑкоÑоÑиÑи.</p>
+
+<p>СлÑжби навÑгаÑÑÑ Ð²ÐµÐ´ÑÑÑ ÑÑеженнÑ:
комп'ÑÑÐµÑ ÐºÐ¾ÑиÑÑÑваÑа пеÑÐµÐ´Ð°Ñ Ð²
+каÑÑогÑаÑÑÑÐ½Ñ ÑлÑÐ¶Ð±Ñ ÐºÐ¾Ð¾ÑдинаÑи
коÑиÑÑÑваÑа Ñ Ð¼ÑÑÑе, кÑди вÑн
напÑавлÑÑÑÑÑÑ;
+пÑÑÐ»Ñ ÑÑого ÑеÑÐ²ÐµÑ Ð²Ð¸Ð·Ð½Ð°ÑÐ°Ñ Ð¼Ð°ÑÑÑÑÑ Ñа
повеÑÑÐ°Ñ Ð¹Ð¾Ð³Ð¾ на комп'ÑÑеÑ
+коÑиÑÑÑваÑа, де Ñей маÑÑÑÑÑ
вÑдобÑажаÑÑÑÑÑ. Рданий ÑÐ°Ñ ÑеÑвеÑ,
ймовÑÑно,
+запиÑÑÑ ÐºÐ¾Ð¾ÑдинаÑи коÑиÑÑÑваÑа, оÑкÑлÑки
нÑÑо не пеÑеÑкоджаÑ. У ÑÑй ÑÑеженнÑ
+Ð½ÐµÐ¼Ð°Ñ Ð¿ÑинÑÐ¸Ð¿Ð¾Ð²Ð¾Ñ Ð½ÐµÐ¾Ð±Ñ
ÑдноÑÑÑ, Ñ ÑÑ Ð¼Ð¾Ð¶Ð½Ð°
ÑникнÑÑи, пеÑепÑоекÑÑвавÑи
+ÑиÑÑемÑ: вÑлÑÐ½Ñ Ð¿ÑогÑами на комп'ÑÑеÑÑ
коÑиÑÑÑваÑа могли б оÑÑимÑваÑи
+каÑÑогÑаÑÑÑÐ½Ñ Ð´Ð°Ð½Ñ Ð¿ÑилеглиÑ
облаÑÑей
(ÑкÑо вони Ñе не оÑÑимано), пÑокладаÑи
+маÑÑÑÑÑ Ñ Ð²ÑдобÑажаÑи його, не пеÑедаÑÑи
нÑкÑди ÑозÑаÑÑÐ²Ð°Ð½Ð½Ñ Ñа пÑнкÑ
+пÑизнаÑеннÑ.</p>
+
+<p>СиÑÑеми пÑокаÑÑ Ð²ÐµÐ»Ð¾ÑипедÑв Ñ Ñ. п. можна
ÑпÑоекÑÑваÑи Ñак, Ñоб оÑобиÑÑÑÑÑÑ
+оÑендаÑÑ Ð±Ñла вÑдома ÑÑлÑки вÑеÑединÑ
ÑÑанÑÑÑ, на ÑкÑй взÑÑа одиниÑÑ
+ÑеÑ
нÑки. СиÑÑема ÑнÑоÑмÑвала б ÑÑÑ
ÑÑанÑÑÑ, Ñо одиниÑÑ
+“зайнÑÑа”, ÑÐ¾Ð¼Ñ ÐºÐ¾Ð»Ð¸ коÑиÑÑÑваÑ
повеÑÑÐ°Ñ ÑÑ Ð½Ð° бÑдÑ-ÑкÑй ÑÑанÑÑÑ
+(Ð²Ð·Ð°Ð³Ð°Ð»Ñ ÐºÐ°Ð¶ÑÑи, вÑдмÑÐ½Ð½Ð¾Ñ Ð²Ñд ÑÑÑÑ, де ÑÑ
взÑли), ÑÑ ÑÑанÑÑÑ Ð±Ñде знаÑи, де
+Ñ ÐºÐ¾Ð»Ð¸ взÑÑа ÑÑ Ð¾Ð´Ð¸Ð½Ð¸ÑÑ. СиÑÑема
пÑоÑнÑоÑмÑÑ ÑнÑÑ ÑÑанÑÑÑ, Ñо одиниÑÑ Ð±ÑлÑÑе
+не “зайнÑÑа”. Ðона Ñкладе Ñакож ÑаÑ
Ñнок коÑиÑÑÑваÑа Ñ Ð²Ð¸Ñле його
+(ÑеÑез деÑке випадкове ÑиÑло Ñ
вилин) в
ÑенÑÑ Ð¿Ð¾ кÑлÑÑÑ ÑÑанÑÑй, ÑÐ¾Ð¼Ñ Ð²
+ÑенÑÑÑ Ð½Ðµ бÑде вÑдомо, звÑдки пÑийÑов ÑаÑ
Ñнок. Як ÑÑлÑки Ñе ÑÑанеÑÑÑÑ,
+ÑÑанÑÑÑ Ð¿Ð¾Ð²ÐµÑÐ½ÐµÐ½Ð½Ñ Ð¿Ð¾Ð²Ð½ÑÑÑÑ Ð·Ð°Ð±Ñде пÑо ÑÑ
опеÑаÑÑÑ. ЯкÑо одиниÑÑ Ð·Ð°Ð»Ð¸ÑаÑÑÑÑÑ
+“зайнÑÑоє занадÑо довго, ÑÑанÑÑÑ, на
ÑкÑй ÑÑ Ð²Ð·Ñли, може
+пÑоÑнÑоÑмÑваÑи ÑенÑÑ; Ñ ÑÑÐ¾Ð¼Ñ Ð²Ð¸Ð¿Ð°Ð´ÐºÑ Ð²Ð¾Ð½Ð°
могла б негайно повÑдомиÑи пÑо
+оÑобиÑÑоÑÑÑ Ñого, Ñ
Ñо взÑв ÑÑ Ð¾Ð´Ð¸Ð½Ð¸ÑÑ.</p>
+
+<h3>ÐаÑ
оди пÑоÑи комÑнÑкаÑÑйниÑ
доÑÑÑ</h3>
+
+<p>ÐоÑÑаÑалÑники поÑлÑг ÑнÑеÑнеÑÑ Ñ
ÑелеÑÐ¾Ð½Ð½Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½ÑÑ Ð·Ð±ÐµÑÑгаÑÑÑ Ð²ÐµÐ»Ð¸ÐºÑ
+вÑдомоÑÑÑ Ð¿Ñо конÑакÑи ÑвоÑÑ
коÑиÑÑÑваÑÑв
(пеÑеглÑд ÑÑоÑÑнок ÐнÑеÑнеÑÑ,
+ÑелеÑÐ¾Ð½Ð½Ñ Ð´Ð·Ð²Ñнки ÑоÑо). ÐÐ»Ñ ÑÑÑлÑниковиÑ
ÑелеÑонÑв вони <a
+href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">
+запиÑÑÑÑÑ Ñакож ÑÑзиÑÐ½Ñ ÐºÐ¾Ð¾ÑдинаÑи
коÑиÑÑÑваÑа</a>. Ðони збеÑÑгаÑÑÑ ÑÑ Ð´Ð¾ÑÑÑ
+ÑÑивалий ÑаÑ: Ñ ÑÐ°Ð·Ñ AT&T понад
ÑÑидÑÑÑÑ ÑокÑв. Ð ÑкоÑо вони
+бÑдÑÑÑ <a
+href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">
+запиÑÑваÑи навÑÑÑ ÑÑзÑологÑÑÐ½Ñ Ð¿ÑоÑеÑи
коÑиÑÑÑваÑа</a>. ÐиÑвлÑÑÑÑÑÑ, <a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">
+ÐгенÑÑÑво наÑÑоналÑÐ½Ð¾Ñ Ð±ÐµÐ·Ð¿ÐµÐºÐ¸ маÑово
збиÑÐ°Ñ Ð´Ð°Ð½Ñ Ð¿Ñо мÑÑÑе знаÑ
одженнÑ
+ÑÑÑлÑниковиÑ
ÑелеÑонÑв</a>.</p>
+
+<p>ÐонÑÑденÑÑйний зв'Ñзок неможливий, коли
ÑиÑÑеми ÑÑвоÑÑÑÑÑ ÑÐ°ÐºÑ Ð´Ð¾ÑÑÑ. Так Ñо
+збеÑÑÐ³Ð°Ð½Ð½Ñ ÑÑ
повинно бÑÑи незаконно.
ÐоÑÑаÑалÑникам поÑлÑг ÐнÑеÑнеÑÑ
+ÑелеÑонним компанÑÑм не повинно бÑÑи
дозволено збеÑÑгаÑи ÑÑ Ð²ÑдомоÑÑÑ Ð½Ð°Ð´Ñо
+довго, ÑкÑо ÑÑлÑки ÑпоÑÑеÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð° певноÑ
оÑÐ¾Ð±Ð¾Ñ Ð½Ðµ вÑÑановлено в ÑÑдовомÑ
+поÑÑдкÑ.</p>
+
+<p>ЦÑÑÑ Ð¼ÑÑи не ÑÑлком доÑÑаÑнÑо, оÑкÑлÑки
ÑÑ Ð·Ð°ÑÑоÑÑÐ²Ð°Ð½Ð½Ñ ÑÑзиÑно не заважаÑ
+деÑÐ¶Ð°Ð²Ñ Ð·Ð±Ð¸ÑаÑи вÑдомоÑÑÑ Ð±ÐµÐ·Ð¿Ð¾ÑеÑеднÑо в
Ð¼Ð¾Ð¼ÐµÐ½Ñ ÑÑ
Ð²Ð¸Ð½Ð¸ÐºÐ½ÐµÐ½Ð½Ñ Ð°
+Ñаме Ñе <a
+href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">
+Ñ Ð¡Ð¨Ð ÑоблÑÑÑ Ð· деÑкими або навÑÑÑ Ð²ÑÑма
ÑелеÑонними компанÑÑми</a>. Ðам
+довелоÑÑ Ð± ÑозÑаÑ
овÑваÑи на доÑÑиманнÑ
законÑ. Ðднак Ñе бÑло б кÑаÑе
+нинÑÑнÑÐ¾Ñ ÑиÑÑаÑÑÑ, в ÑкÑй вÑдповÑдний
закон (PATRIOT) Ñвним Ñином не
+забоÑонÑÑ ÑÐ°ÐºÑ Ð¿ÑакÑикÑ. ÐÑÑм Ñого, ÑкÑо б
деÑжава Ð·Ð½Ð¾Ð²Ñ Ð²Ð²ÐµÐ»Ð° Ñаке
+ÑÑеженнÑ, воно не набÑло б Ð´Ð°Ð½Ñ Ð¿Ñо
ÑелеÑÐ¾Ð½Ð½Ñ Ð¿ÐµÑеговоÑи кожного, пÑоведенÑ
+до ÑÑого ÑаÑÑ.</p>
+
+<h3>Ðле ÑÐ½Ð¾Ð´Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð½ÐµÐ¾Ð±Ñ
Ñдне</h3>
+
+<p>ÐÐ»Ñ ÑозÑÑÐºÑ Ð·Ð»Ð¾ÑинÑÑв деÑÐ¶Ð°Ð²Ñ Ð½ÐµÐ¾Ð±Ñ
Ñдна
можливÑÑÑÑ ÑозÑлÑдÑваÑи конкÑеÑнÑ
+злоÑини або конкÑеÑÐ½Ñ Ð·Ð°Ð¼Ð°Ñ
и за оÑдеÑом
ÑÑдÑ. РпÑиÑ
одом ÑнÑеÑнеÑÑ
+Ð¿Ð¾Ð²Ð½Ð¾Ð²Ð°Ð¶ÐµÐ½Ð½Ñ Ð¿ÑоÑлÑÑ
овÑваÑи ÑелеÑоннÑ
пеÑеговоÑи пÑиÑодно ÑозÑиÑÑÑÑÑÑÑ Ð½Ð°
+Ð¿Ð¾Ð²Ð½Ð¾Ð²Ð°Ð¶ÐµÐ½Ð½Ñ Ð¿Ñд'ÑднÑваÑиÑÑ Ð´Ð¾ з'ÑÐ´Ð½Ð°Ð½Ñ Ð·
ÑнÑеÑнеÑом. Цими повноваженнÑми
+легко зловживаÑи в полÑÑиÑниÑ
ÑÑлÑÑ
, але
вони необÑ
ÑднÑ. Ðа ÑаÑÑÑ, Ñе не даÑ
+можливоÑÑÑ Ð·Ð½Ð°Ñ
одиÑи ÑнÑоÑмаÑоÑÑв заднÑм
ÑиÑлом.</p>
+
+<p>ÐÑоби з оÑобливими повноваженнÑми,
виданими деÑжавоÑ, ÑÐ°ÐºÑ Ñк пÑаÑÑвники
+полÑÑÑÑ, вÑÑаÑаÑÑÑ ÑÐ²Ð¾Ñ Ð¿Ñаво на
конÑÑденÑÑйнÑÑÑÑ, Ñ Ð·Ð° ними Ð¼Ð°Ñ Ð²ÐµÑÑиÑÑ
+ÑпоÑÑеÑеженнÑ. (СпÑавдÑ, в полÑÑейÑÑкомÑ
жаÑÐ³Ð¾Ð½Ñ Ñ Ð¾Ñобливий виÑлÑв,
+“<a
+href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">даваÑи
+лжеÑвÑдÑеннÑ</a>”, бо вони ÑпÑÐ°Ð²Ð´Ñ Ñим
займаÑÑÑÑÑ, оÑобливо ÑÑоÑовно
+пÑоÑеÑÑÑвалÑникÑв Ñ <a
href="http://photographyisnotacrime.com/">
+ÑоÑогÑаÑÑв</a>.) У Ð¾Ð´Ð½Ð¾Ð¼Ñ Ð¼ÑÑÑеÑкÑ
ÐалÑÑоÑнÑÑ Ð±Ñло введено обов'Ñзкове
+поÑÑÑйне ноÑÑÐ½Ð½Ñ Ð²ÑдеокамеÑ
полÑÑейÑÑкими, Ñ Ð²Ð¸ÑвилоÑÑ, Ñо <a
+href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">
+заÑÑоÑÑÐ²Ð°Ð½Ð½Ñ Ñили полÑÑейÑÑкими
ÑкоÑоÑилоÑÑ Ð½Ð° 60%</a>. ACLU пÑдÑÑимÑÑ Ñе.</p>
+
+<p><a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">
+ÐоÑпоÑаÑÑÑ — не лÑди, Ñ Ð½Ð¸Ñ
не повинно
бÑÑи пÑав
+лÑдини</a>. ЦÑлком законно вимагаÑи вÑд
пÑдпÑиÑмÑÑв пÑблÑкаÑÑÑ Ð´ÐµÑалей
+пÑоÑеÑÑв, ÑÐºÑ Ð¼Ð¾Ð³Ð»Ð¸ б ÑпÑиÑиниÑи за ÑобоÑ
небезпеки в Ñ
ÑмÑÑномÑ,
+бÑологÑÑномÑ, ÑдеÑномÑ, ÑÑнанÑовомÑ,
обÑиÑлÑвалÑÐ½Ð¾Ð¼Ñ (напÑ., <a
+href="http://DefectiveByDesign.org"> ÑиÑÑове кеÑÑваннÑ
обмеженнÑми</a>або
+полÑÑиÑÐ½Ð¾Ð¼Ñ (напÑ., Ð·Ð°Ð¼Ð¾Ð²Ð»ÐµÐ½Ð½Ñ Ð¿Ð¾Ð»ÑÑиÑниÑ
пÑоекÑÑв) ÑозÑмÑÐ½Ð½Ñ —
+пÑблÑкаÑÑÑ Ð½Ð°ÑÑÑлÑки докладноÑ, наÑкÑлÑки
Ñе Ð²Ð¸Ð¼Ð°Ð³Ð°Ñ Ð³ÑомадÑÑкий
+добÑобÑÑ. ÐоÑÑвнÑно з Ð½ÐµÐ±ÐµÐ·Ð¿ÐµÐºÐ¾Ñ ÑакиÑ
дÑй
(згадаймо виÑÑк наÑÑи BP, аваÑÑÑ
+на ÐÐС Ñ Ð¤ÑкÑÑÑÐ¼Ñ Ñ ÑÑнанÑÐ¾Ð²Ñ ÐºÑизÑ
2008 ÑокÑ) загÑоза ÑеÑоÑизмÑ
+ниÑÑвно мала.</p>
+
+<p>ÐÑоÑе жÑÑналÑÑÑÐ¸ÐºÑ Ð¿Ð¾ÑÑÑбно заÑ
иÑаÑи
вÑд ÑпоÑÑеÑеженнÑ, навÑÑÑ ÑкÑо вона
+ведеÑÑÑÑ Ð² Ñ
Ð¾Ð´Ñ Ð¿ÑдпÑиÑмниÑÑкоÑ
дÑÑлÑноÑÑÑ.</p>
+
+<hr />
+
+<p>ЦиÑÑова ÑеÑ
нÑка пÑинеÑла з ÑобоÑ
запамоÑоÑливе зÑоÑÑÐ°Ð½Ð½Ñ ÑÑÐ²Ð½Ñ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ð·Ð°
+наÑими пеÑеÑÑваннÑми, дÑÑми Ñ
пеÑеговоÑами. Ðона набагаÑо виÑе ÑÑÐ²Ð½Ñ Ñого
+ÑÑеженнÑ, ÑÐºÑ Ð¼Ð¸ вÑдÑÑвали на ÑÐ¾Ð±Ñ Ð²
дев'ÑноÑÑÑ Ñоки XX ÑÑолÑÑÑÑ, <a
+href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">
+набагаÑо виÑа ÑÑÐ²Ð½Ñ Ñого ÑÑеженнÑ, Ñке
випÑобовÑвали на ÑÐ¾Ð±Ñ Ð»Ñди за
+залÑÐ·Ð½Ð¾Ñ Ð·Ð°Ð²ÑÑоÑ</a> Ñ Ð²ÑÑÑмдеÑÑÑÑ Ñоки
XX ÑÑолÑÑÑÑ, Ñ Ð²Ð¾Ð½Ð° бÑло б
+набагаÑо виÑе, навÑÑÑ Ñкби на заÑÑоÑÑваннÑ
деÑÐ¶Ð°Ð²Ð¾Ñ Ð½Ð°ÐºÐ¾Ð¿Ð¸ÑениÑ
даниÑ
бÑли
+Ð½Ð°ÐºÐ»Ð°Ð´ÐµÐ½Ñ Ð´Ð¾Ð´Ð°ÑÐºÐ¾Ð²Ñ ÑÑидиÑÐ½Ñ Ð¾Ð±Ð¼ÐµÐ¶ÐµÐ½Ð½Ñ.</p>
+
+<p>ЯкÑо ми не вважаÑмо, Ñо наÑÑ Ð²ÑлÑнÑ
кÑаÑни в минÑÐ»Ð¾Ð¼Ñ ÑÑÑаждали вÑд гоÑÑÑого
+бÑÐ°ÐºÑ ÑÑÐµÐ¶ÐµÐ½Ð½Ñ Ñ Ð¿Ð¾Ð²Ð¸Ð½Ð½Ñ Ð±ÑÑи пÑд
ÑÑвоÑÑÑим наглÑдом, нÑж РадÑнÑÑкий СоÑз Ñ
+СÑ
Ñдна ÐÑмеÑÑина, нам поÑÑÑбно повеÑнÑÑи
Ñей ÑÑÐ²ÐµÐ½Ñ Ð½Ð° колиÑÐ½Ñ Ð¿Ð¾Ð·Ð¸ÑÑÑ. ÐлÑ
+ÑÑого поÑÑÑбно зÑпиниÑи маÑовий збÑÑ Ð´Ð°Ð½Ð¸Ñ
пÑо лÑдей.</p>
+
+<blockquote>
+<p>Copyright 2013 Ð ÑÑаÑд СÑолмен<br />
+ÐоÑÑÑпно на ÑмоваÑ
<a rel="license"
+href="http://creativecommonsorg/licenses/by-nd/3.0/us/deed.uk">
лÑÑензÑÑ
+Creative Commons Attribution - NoDerivs (<em>Ðз зазнаÑеннÑм
+авÑоÑÑÑва — Ðез поÑ
ÑдниÑ
ÑвоÑÑв</em>) 3.0
СполÑÑÐµÐ½Ñ Ð¨ÑаÑи</a></p>
+</blockquote>
+
+
+<div style="font-size: small;">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.uk.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>ÐÑÐ´Ñ Ð»Ð°Ñка, надÑилайÑе загалÑÐ½Ñ Ð·Ð°Ð¿Ð¸Ñи
ÑÐ¾Ð½Ð´Ñ Ñа GNU за адÑеÑÐ¾Ñ <a
+href="mailto:address@hidden"><address@hidden></a>. ÐаÑвнÑ
Ñакож <a
+href="/contact/">ÑнÑÑ ÑпоÑоби зв'ÑзкÑ</a> з Ñондом.
ÐвÑÑи пÑо непÑаÑÑÑÑÑ
+поÑÐ¸Ð»Ð°Ð½Ð½Ñ Ñ ÑнÑÑ Ð²Ð¸Ð¿ÑÐ°Ð²Ð»ÐµÐ½Ð½Ñ Ñи
пÑопозиÑÑÑ Ð¼Ð¾Ð¶Ð½Ð° надÑилаÑи за адÑеÑÐ¾Ñ <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Ðи намагалиÑÑ Ð·ÑобиÑи Ñей пеÑеклад ÑоÑним
Ñа ÑкÑÑним, але виклÑÑиÑи
+можливÑÑÑÑ Ð¿Ð¾Ð¼Ð¸Ð»ÐºÐ¸ ми не можемо.
ÐадÑилайÑе, бÑÐ´Ñ Ð»Ð°Ñка, ÑÐ²Ð¾Ñ Ð·Ð°ÑÐ²Ð°Ð¶ÐµÐ½Ð½Ñ Ñ
+пÑопозиÑÑÑ Ñодо пеÑÐµÐºÐ»Ð°Ð´Ñ Ð·Ð° адÑеÑÐ¾Ñ <a
+href="mailto:address@hidden"><address@hidden></a>.
+</p><p>ÐÑдомоÑÑÑ Ð· кооÑдинаÑÑÑ Ñа пÑопозиÑÑй
пеÑекладÑв наÑиÑ
ÑÑаÑей див. Ñ
+<a href="/server/standards/README.translations.html">“ÐоÑÑбникÑ
з
+пеÑекладє</a>.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2013 Фонд вÑлÑного пÑогÑамного
забезпеÑеннÑ, Inc.</p>
+
+<p>Ð¦Ñ ÑÑоÑÑнка доÑÑÑпна на ÑмоваÑ
<a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.uk">
лÑÑензÑÑ
+Creative Commons Attribution-NoDerivs (<em>Ðз зазнаÑеннÑм
+авÑоÑÑÑва — Ðез поÑ
ÑдниÑ
ÑвоÑÑв</em>) 3.0
СполÑÑÐµÐ½Ñ Ð¨ÑаÑи</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.uk.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+ÐÑдÑÑимка ÑкÑаÑнÑÑкого пеÑекладÑ: ÐндÑÑй
ÐандÑÑа
+(address@hidden)</div>
+
+
+ <p></p><p class="unprintable"><!-- timestamp start -->
+Ðновлено:
+
+$Date: 2014/04/11 08:41:53 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
Index: po/surveillance-vs-democracy.uk-en.html
===================================================================
RCS file: po/surveillance-vs-democracy.uk-en.html
diff -N po/surveillance-vs-democracy.uk-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ po/surveillance-vs-democracy.uk-en.html 11 Apr 2014 08:41:54 -0000
1.1
@@ -0,0 +1,498 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.76 -->
+<title>How Much Surveillance Can Democracy Withstand?
+- GNU Project - Free Software Foundation</title>
+<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>How Much Surveillance Can Democracy Withstand?</h2>
+
+<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
+
+<blockquote><p>A version of this article was first published in <a
+href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">
+Wired</a> in October 2013.</p></blockquote>
+
+<p>Thanks to Edward Snowden's disclosures, we know that the current
+level of general surveillance in society is incompatible with human
+rights. The repeated harassment and prosecution of dissidents,
+sources, and journalists in the US and elsewhere provides
+confirmation. We need to reduce the level of general surveillance,
+but how far? Where exactly is the
+<em>maximum tolerable level of surveillance</em>, which we must ensure
+is not exceeded? It is the level beyond which surveillance starts to
+interfere with the functioning of democracy, in that whistleblowers
+(such as Snowden) are likely to be caught.</p>
+
+<p>Faced with government secrecy, we the people depend on
+whistleblowers
+to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">
+tell us what the state is doing</a>. However, today's surveillance
+intimidates potential whistleblowers, which means it is too much. To
+recover our democratic control over the state, we must reduce
+surveillance to the point where whistleblowers know they are safe.</p>
+
+<p>Using free/libre
+software, <a href="/philosophy/free-software-even-more-important.html">
+as I've advocated for 30 years</a>, is the first step in taking
+control of our digital lives, and that includes preventing
+surveillance. We can't trust nonfree software; the NSA
+<a
+href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+uses</a> and
+even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">
+creates</a> security weaknesses in nonfree software to invade our own
+computers and routers. Free software gives us control of our own
+computers, but <a href="http://www.wired.com/opinion/2013/10/149481/">
+that won't protect our privacy once we set foot on the
+Internet</a>.</p>
+
+<p><a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
+legislation to “curtail the domestic surveillance
+powers”</a> in the U.S. is being drawn up, but it relies on
+limiting the government's use of our virtual dossiers. That won't
+suffice to protect whistleblowers if “catching the
+whistleblower” is grounds for access sufficient to identify him
+or her. We need to go further.</p>
+
+<h3>The Upper Limit on Surveillance in a Democracy</h3>
+
+<p>If whistleblowers don't dare reveal crimes and lies, we lose the
+last shred of effective control over our government and institutions.
+That's why surveillance that enables the state to find out who has
+talked with a reporter is too much surveillance—too much for
+democracy to endure.</p>
+
+<p>An unnamed U.S. government official ominously told journalists in
+2011 that
+the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">
+U.S. would not subpoena reporters because “We know who you're
+talking to.”</a>
+Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">
+journalists' phone call records are subpoenaed</a> to find this out,
+but Snowden has shown us that in effect they subpoena all the phone
+call records of everyone in the U.S., all the
+time, <a
href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">
+from Verizon </a>
+and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">
+from other companies too</a>.</p>
+
+<p>Opposition and dissident activities need to keep secrets from
+states that are willing to play dirty tricks on them. The ACLU has
+demonstrated the U.S. government's <a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf"> systematic
+practice of infiltrating peaceful dissident groups</a> on the pretext
+that there might be terrorists among them. The point at which
+surveillance is too much is the point at which the state can find who
+spoke to a known journalist or a known dissident.</p>
+
+<h3>Information, Once Collected, Will Be Misused</h3>
+
+<p>When people recognize that the level of general surveillance is too
+high, the first response is to propose limits on access to the
+accumulated data. That sounds nice, but it won't fix the problem, not
+even slightly, even supposing that the government obeys the rules.
+(The NSA has misled the FISA court, which said it was <a
+href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">
+unable to effectively hold the NSA accountable</a>.) Suspicion of a
+crime will be grounds for access, so once a whistleblower is accused
+of “espionage,” finding the “spy” will provide
+an excuse to access the accumulated material.</p>
+
+<p>The state's surveillance staff will misuse the data for personal
+reasons too. Some NSA agents <a
+href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">
+used U.S. surveillance systems to track their lovers</a>—past,
+present, or wished-for—in a practice called
+“LOVEINT.” The NSA says it has caught and punished this a
+few times; we don't know how many other times it wasn't caught. But
+these events shouldn't surprise us, because police have long <a
+href="http://www.sweetliberty.org/issues/privacy/lein1.htm">used their
+access to driver's license records to track down someone
+attractive</a>, a practice known as “running a plate for a
+date.”</p>
+
+<p>Surveillance data will always be used for other purposes, even if
+this is prohibited. Once the data has been accumulated and the state
+has the possibility of access to it, it can misuse that data in
+dreadful ways, as shown by examples
+from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">
+Europe</a>
+and <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">
+the US </a>.</p>
+
+<p>Total surveillance plus vague law provides an opening for a massive
+fishing expedition against any desired target. To make journalism and
+democracy safe, we must limit the accumulation of data that is easily
+accessible to the state.</p>
+
+<h3>Robust Protection for Privacy Must Be Technical</h3>
+
+<p>The Electronic Frontier Foundation and other organizations propose
+a set of legal principles designed to <a
+href="https://en.necessaryandproportionate.org/text"> prevent the
+abuses of massive surveillance</a>. These principles include,
+crucially, explicit legal protection for whistleblowers; as a
+consequence, they would be adequate for protecting democratic
+freedoms—if adopted completely and enforced without exception
+forever.</p>
+
+<p>However, such legal protections are precarious: as recent history
+shows, they can be repealed (as in the FISA Amendments Act),
+suspended, or <a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html">
+ignored</a>.</p>
+
+<p>Meanwhile, demagogues will cite the usual excuses as grounds for
+total surveillance; any terrorist attack, even one that kills just a
+handful of people, will give them an opportunity.</p>
+
+<p>If limits on access to the data are set aside, it will be as if
+they had never existed: years worth of dossiers would suddenly become
+available for misuse by the state and its agents and, if collected by
+companies, for their private misuse as well. If, however, we stop the
+collection of dossiers on everyone, those dossiers won't exist, and
+there will be no way to compile them retroactively. A new illiberal
+regime would have to implement surveillance afresh, and it would only
+collect data starting at that date. As for suspending or momentarily
+ignoring this law, the idea would hardly make sense.</p>
+
+<h3>First, Don't Be Foolish</h3>
+
+<p>To have privacy, you must not throw it away: the first one who has
+to protect your privacy is you. Don't tell a company such as Facebook
+anything about you that you hesitate to publish in a newspaper. Don't
+tell a company such as Facebook anything about your friends that they
+might not wish to publish in a newspaper. Better yet, don't be one
+of Facebook's users at all.</p>
+
+<p>Never give any web site your entire list of email or phone
+contacts. Keep your own data; don't store your data in a company's
+“convenient” server. It's safe, however, to entrust a
+data backup to a commercial service, provided you encrypted the data,
+including the file names, with free software on your own computer
+before uploading it.</p>
+
+<p>For privacy's sake, you must avoid nonfree software since, as a
+consequence of giving others control of your computing, it
+is <a href="/philosophy/proprietary-surveillance.html"> likely to spy
+on you </a>.
+Avoid <a href="/philosophy/who-does-that-server-really-serve.html">
+service as a software substitute </a>; as well as giving others
+control of your computing, it requires you to hand over all the
+pertinent data to the server.</p>
+
+<p>However, even the most rigorous self-protection is insufficient to
+protect your privacy on or from systems that don't belong to you.
+When we communicate with others or move around the city, our
+privacy depends on the practices of society.</p>
+
+<h3>We Must Design Every System for Privacy</h3>
+
+<p>If we don't want a total surveillance society, we must consider
+surveillance a kind of social pollution, and limit the surveillance
+impact of each new digital system just as we limit the environmental
+impact of physical construction.</p>
+
+<p>For example: “Smart” meters for electricity are touted
+for sending the power company moment-by-moment data about each
+customer's electric usage, including how usage compares with users in
+general. This is implemented based on general surveillance, but does
+not require any surveillance. It would be easy for the power company
+to calculate the average usage in a residential neighborhood by
+dividing the total usage by the number of subscribers, and send that
+to the meters. Each customer's meter could compare her usage, over
+any desired period of time, with the average usage pattern for that
+period. The same benefit, with no surveillance!</p>
+
+<p>We need to design such privacy into all our digital systems.</p>
+
+<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+
+<p>One way to make monitoring safe for privacy is to <a name="dispersal">
+keep the data
+dispersed and inconvenient to access</a>. Old-fashioned security cameras
+were no threat to privacy. The recording was stored on the premises,
+and kept for a few weeks at most. Because of the inconvenience of
+accessing these recordings, it was never done massively; they were
+accessed only in the places where someone reported a crime. It would
+not be feasible to physically collect millions of tapes every day and
+watch them or copy them.</p>
+
+<p>Nowadays, security cameras have become surveillance cameras: they
+are connected to the Internet so recordings can be collected in a data
+center and saved forever. This is already dangerous, but it is going
+to get worse. Advances in face recognition may bring the day when
+suspected journalists can be tracked on the street all the time to see
+who they talk with.</p>
+
+<p>Internet-connected cameras often have lousy digital security
+themselves, so <a
+href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">
+anyone could watch what the camera sees</a>. To restore privacy, we
+should ban the use of Internet-connected cameras aimed where and when
+the public is admitted, except when carried by people. Everyone must
+be free to post photos and video recordings occasionally, but the
+systematic accumulation of such data on the Internet must be
+limited.</p>
+
+<h3>Remedy for Internet Commerce Surveillance</h3>
+
+<p>Most data collection comes from people's own digital activities.
+Usually the data is collected first by companies. But when it comes
+to the threat to privacy and democracy, it makes no difference whether
+surveillance is done directly by the state or farmed out to a
+business, because the data that the companies collect is
+systematically available to the state.</p>
+
+<p>The NSA, through PRISM, has <a
+href="https://www.commondreams.org/headline/2013/08/23-2"> gotten into
+the databases of many large Internet corporations</a>. AT&T has
+saved all its phone call records since 1987 and <a
+href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">
+makes them available to the DEA</a> to search on request. Strictly
+speaking, the U.S. government does not possess that data, but in
+practical terms it may as well possess it.</p>
+
+<p>The goal of making journalism and democracy safe therefore requires
+that we reduce the data collected about people by any organization,
+not just by the state. We must redesign digital systems so that they
+do not accumulate data about their users. If they need digital data
+about our transactions, they should not be allowed to keep them more
+than a short time beyond what is inherently necessary for their
+dealings with us.</p>
+
+<p>One of the motives for the current level of surveillance of the
+Internet is that sites are financed through advertising based on
+tracking users' activities and propensities. This converts a mere
+annoyance—advertising that we can learn to ignore—into a
+surveillance system that harms us whether we know it or not.
+Purchases over the Internet also track their users. And we are all
+aware that “privacy policies” are more excuses to violate
+privacy than commitments to uphold it.</p>
+
+<p>We could correct both problems by adopting a system of anonymous
+payments—anonymous for the payer, that is. (We don't want the
+payee to dodge taxes.) <a
+href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">
+Bitcoin is not anonymous</a>, though there are efforts to develop
+ways to pay anonymously with Bitcoin. However, technology for <a
+href="http://www.wired.com/wired/archive/2.12/emoney_pr.html"> digital
+cash was first developed in the 1980s</a>; we need only suitable
+business arrangements, and for the state not to obstruct them.</p>
+
+<p>A further threat from sites' collection of personal data is that
+security breakers might get in, take it, and misuse it. This includes
+customers' credit card details. An anonymous payment system would end
+this danger: a security hole in the site can't hurt you if the site
+knows nothing about you.</p>
+
+<h3>Remedy for Travel Surveillance</h3>
+
+<p>We must convert digital toll collection to anonymous payment (using
+digital cash, for instance). License-plate recognition systems
+recognize all license plates, and the <a
+href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">
+data can be kept indefinitely</a>; they should be required by law to
+notice and record only those license numbers that are on a list of
+cars sought by court orders. A less secure alternative would record
+all cars locally but only for a few days, and not make the full data
+available over the Internet; access to the data should be limited to
+searching for a list of court-ordered license-numbers.</p>
+
+<p>The U.S. “no-fly” list must be abolished because it is
+<a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">
+punishment without trial</a>.</p>
+
+<p>It is acceptable to have a list of people whose person and luggage
+will be searched with extra care, and anonymous passengers on domestic
+flights could be treated as if they were on this list. It is also
+acceptable to bar non-citizens, if they are not permitted to enter the
+country at all, from boarding flights to the country. This ought to
+be enough for all legitimate purposes.</p>
+
+<p>Many mass transit systems use some kind of smart cards or RFIDs for
+payment. These systems accumulate personal data: if you once make the
+mistake of paying with anything but cash, they associate the card
+permanently with your name. Furthermore, they record all travel
+associated with each card. Together they amount to massive
+surveillance. This data collection must be reduced.</p>
+
+<p>Navigation services do surveillance: the user's computer tells the
+map service the user's location and where the user wants to go; then
+the server determines the route and sends it back to the user's
+computer, which displays it. Nowadays, the server probably records
+the user's locations, since there is nothing to prevent it. This
+surveillance is not inherently necessary, and redesign could avoid it:
+free/libre software in the user's computer could download map data for
+the pertinent regions (if not downloaded previously), compute the
+route, and display it, without ever telling anyone where the user is
+or wants to go.</p>
+
+<p>Systems for borrowing bicycles, etc., can be designed so that the
+borrower's identity is known only inside the station where the item
+was borrowed. Borrowing would inform all stations that the item is
+“out,” so when the user returns it at any station (in
+general, a different one), that station will know where and when that
+item was borrowed. It will inform the other station that the item is
+no longer “out.” It will also calculate the user's bill,
+and send it (after waiting some random number of minutes) to
+headquarters along a ring of stations, so that headquarters would not
+find out which station the bill came from. Once this is done, the
+return station would forget all about the transaction. If an item
+remains “out” for too long, the station where it was
+borrowed can inform headquarters; in that case, it could send the
+borrower's identity immediately.</p>
+
+<h3>Remedy for Communications Dossiers</h3>
+
+<p>Internet service providers and telephone companies keep extensive
+data on their users' contacts (browsing, phone calls, etc). With
+mobile phones, they also <a
+href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">
+record the user's physical location</a>. They keep these dossiers for
+a long time: over 30 years, in the case of AT&T. Soon they will
+even <a
+href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">
+record the user's body activities</a>. It appears that the <a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">
+NSA collects cell phone location data</a> in bulk.</p>
+
+<p>Unmonitored communication is impossible where systems create such
+dossiers. So it should be illegal to create or keep them. ISPs and
+phone companies must not be allowed to keep this information for very
+long, in the absence of a court order to surveil a certain party.</p>
+
+<p>This solution is not entirely satisfactory, because it won't
+physically stop the government from collecting all the information
+immediately as it is generated—which is what the <a
+href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">
+U.S. does with some or all phone companies</a>. We would have to rely
+on prohibiting that by law. However, that would be better than the
+current situation, where the relevant law (the PATRIOT Act) does not
+clearly prohibit the practice. In addition, if the government did
+resume this sort of surveillance, it would not get data about
+everyone's phone calls made prior to that time.</p>
+
+<h3>But Some Surveillance Is Necessary</h3>
+
+<p>For the state to find criminals, it needs to be able to investigate
+specific crimes, or specific suspected planned crimes, under a court
+order. With the Internet, the power to tap phone conversations would
+naturally extend to the power to tap Internet connections. This power
+is easy to abuse for political reasons, but it is also necessary.
+Fortunately, this won't make it possible to find whistleblowers after
+the fact.</p>
+
+<p>Individuals with special state-granted power, such as police,
+forfeit their right to privacy and must be monitored. (In fact,
+police have their own jargon term for perjury, “<a
+href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”
since they do
+it so frequently, particularly about protesters and <a
+href="http://photographyisnotacrime.com/"> photographers</a>.) One
+city in California that required police to wear video cameras all the
+time found <a
+href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">
+their use of force fell by 60%</a>. The ACLU is in favor of this.</p>
+
+<p><a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+are not people, and not entitled to human rights</a>. It is
+legitimate to require businesses to publish the details of processes
+that might cause chemical, biological, nuclear, fiscal, computational
+(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
+(e.g., lobbying) hazards to society, to whatever level is needed for
+public well-being. The danger of these operations (consider the BP
+oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
+that of terrorism.</p>
+
+<p>However, journalism must be protected from surveillance even when
+it is carried out as part of a business.</p>
+
+<hr />
+
+<p>Digital technology has brought about a tremendous increase in the
+level of surveillance of our movements, actions, and communications.
+It is far more than we experienced in the 1990s, and <a
+href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">
+far more than people behind the Iron Curtain experienced</a> in the
+1980s, and would still be far more even with additional legal limits
+on state use of the accumulated data.</p>
+
+<p>Unless we believe that our free countries previously suffered from
+a grave surveillance deficit, and ought to be surveilled more than the
+Soviet Union and East Germany were, we must reverse this increase.
+That requires stopping the accumulation of big data about people.</p>
+
+<blockquote>
+<p>Copyright 2013 Richard Stallman<br />
+Licensed under the <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative Commons
+Attribution-NoDerivs 3.0 United States License</a></p>
+</blockquote>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2013 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative Commons
+Attribution-NoDerivs 3.0 United States License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p></p><p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2014/04/11 08:41:54 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/philosophy po/surveillance-vs-democracy.tra...,
GNUN <=