www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/philosophy government-free-software.fr.html...


From: GNUN
Subject: www/philosophy government-free-software.fr.html...
Date: Fri, 14 Nov 2014 11:27:09 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     14/11/14 11:27:08

Modified files:
        philosophy     : government-free-software.fr.html 
                         words-to-avoid.fr.html 
        philosophy/po  : government-free-software.fr-en.html 
                         words-to-avoid.fr-en.html 
        philosophy/proprietary: proprietary-sabotage.fr.html 
                                proprietary-surveillance.fr.html 
        philosophy/proprietary/po: proprietary-sabotage.fr-en.html 
                                   proprietary-surveillance.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/government-free-software.fr.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.fr.html?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/government-free-software.fr-en.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.fr-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.11&r2=1.12

Patches:
Index: government-free-software.fr.html
===================================================================
RCS file: /web/www/www/philosophy/government-free-software.fr.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- government-free-software.fr.html    9 Nov 2014 12:29:03 -0000       1.44
+++ government-free-software.fr.html    14 Nov 2014 11:27:06 -0000      1.45
@@ -221,10 +221,23 @@
 </p></li>
 </ul>
 
+<h3>Neutralité technologique</h3>
+
 <p>Un tel train de mesures doit permettre à l'État de recouvrer le contrôle 
et
 la souveraineté de son informatique, ainsi que d'amener les citoyens, les
 entreprises et les organisations du pays à prendre le contrôle de leur
-informatique.</p>
+informatique. Toutefois, certains objectent que ceci violerait le
+« principe » de neutralité.</p>
+
+<p>La notion de neutralité technique est que l'État ne doit pas imposer de
+préférence arbitraire sur des choix techniques. On peut discuter la validité
+de ce principe, mais en tout état de cause il ne concerne que des questions
+purement techniques. Les mesures préconisées ici ont des enjeux d'importance
+éthique, sociétale et politique, et par conséquent <a
+href="/philosophy/technological-neutrality.html">n'entrent pas dans le cadre
+de la neutralité <em>technologique</em></a>. Seuls ceux qui désirent mettre
+un pays sous leur joug pourraient suggérer que son gouvernement soit
+« neutre » en ce qui concerne sa souveraineté et la liberté de ses 
citoyens.</p>
 
 <div class="translators-notes">
 
@@ -287,7 +300,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/11/09 12:29:03 $
+$Date: 2014/11/14 11:27:06 $
 
 <!-- timestamp end -->
 </p>

Index: words-to-avoid.fr.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.fr.html,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- words-to-avoid.fr.html      14 Aug 2014 21:27:39 -0000      1.141
+++ words-to-avoid.fr.html      14 Nov 2014 11:27:07 -0000      1.142
@@ -274,21 +274,24 @@
 contenu) et l'appliquer à des œuvres de l'esprit, écrites ou autres, 
reflète
 une attitude que vous feriez mieux d'éviter. Cela revient à considérer ces
 œuvres comme des marchandises dont le but est de remplir des boîtes et de
-faire de l'argent. De fait, ce terme ne respecte pas les œuvres 
elles-mêmes.</p>
+faire de l'argent. De fait, ce terme les rabaisse. Si vous n'êtes pas
+d'accord avec cette attitude, vous pouvez les appeler « œuvres » ou
+« publications ».
+</p>
 <p>
-Ceux qui utilisent ce terme sont souvent les éditeurs qui s'efforcent
-d'obtenir des pouvoirs de copyright accrus au nom des auteurs
-(« créateurs », comme ils disent) des œuvres. Le terme « contenu » 
révèle ce
-qu'ils pensent vraiment de ces œuvres et des ces auteurs (consultez <a
+Ceux qui utilisent le terme « contenu » sont souvent les éditeurs qui
+s'efforcent d'obtenir des pouvoirs de copyright accrus au nom des auteurs
+(« créateurs », comme ils disent) des œuvres. « Contenu » révèle 
ce qu'ils
+pensent vraiment de ces œuvres et de leurs auteurs (consultez <a
 
href="http://archive.salon.com/tech/feature/2000/06/14/love/print.html";>Courtney
 Love's open letter to Steve Case</a> [en] – Lettre ouverte de Courtney Love
-à Steve Case –  et recherchez <cite>content provider</cite> dans cette
-page ; hélas, Madame Love n'est pas consciente que le terme « propriété
+à Steve Case – et recherchez <cite>content provider</cite> dans cette 
page ;
+hélas, Madame Love n'est pas consciente que le terme « propriété
 intellectuelle » est aussi <a href="#IntellectualProperty">trompeur</a>).</p>
 <p>
-Quoi qu'il en soit, aussi longtemps que d'autres personnes utiliseront le
-terme « fournisseurs de contenu » <cite>[content providers]</cite>, les
-dissidents politiques peuvent tout aussi bien se donner le nom de
+Quoi qu'il en soit, aussi longtemps que d'autres personnes utiliseront
+l'expression « fournisseurs de contenu » <cite>[content providers]</cite>,
+les dissidents politiques peuvent tout aussi bien se donner le nom de
 « fournisseurs de mécontentement » <cite>[malcontent 
providers]</cite>.</p>
 <p>
 Le terme de « gestion de contenu » remporte le prix de la
@@ -965,7 +968,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/08/14 21:27:39 $
+$Date: 2014/11/14 11:27:07 $
 
 <!-- timestamp end -->
 </p>

Index: po/government-free-software.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/government-free-software.fr-en.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- po/government-free-software.fr-en.html      9 Nov 2014 12:29:03 -0000       
1.37
+++ po/government-free-software.fr-en.html      14 Nov 2014 11:27:07 -0000      
1.38
@@ -204,9 +204,23 @@
 </p></li>
 </ul>
 
-<p>With these measures, the state can recover control over its computing,
-and lead the country's citizens, businesses and organizations towards
-control over their computing.</p>
+<h3>Technological neutrality</h3>
+
+<p>With the measures in this article, the state can recover control
+over its computing, and lead the country's citizens, businesses and
+organizations towards control over their computing.  However, some
+object on the grounds that this would violate the
+&ldquo;principle&rdquo; of technological neutrality.</p>
+
+<p>The idea of technological neutrality is that the state should not
+impose arbitrary preferences on technical choices.  Whether that is a
+valid principle is disputable, but it is limited in any case to issues
+that are merely technical.  The measures advocated here address issues
+of ethical, social and political importance, so they are
+<a href="/philosophy/technological-neutrality.html">outside the scope
+of <em>technological</em> neutrality</a>.  Only those who wish to
+subjugate a country would suggest that its goverment be
+&ldquo;neutral&rdquo; about its sovereignty or its citizens' freedom.</p>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -248,7 +262,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/11/09 12:29:03 $
+$Date: 2014/11/14 11:27:07 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/words-to-avoid.fr-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.fr-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- po/words-to-avoid.fr-en.html        5 Aug 2014 13:27:02 -0000       1.70
+++ po/words-to-avoid.fr-en.html        14 Nov 2014 11:27:07 -0000      1.71
@@ -331,17 +331,20 @@
 noun to describe written and other works of authorship adopts an
 attitude you might rather avoid.  It regards these works as a
 commodity whose purpose is to fill a box and make money.  In effect,
-it disparages the works themselves.</p>
+it disparages the works themselves.  If you don't agree with that
+attitude, you can call them &ldquo;works&rdquo; or &ldquo;publications.&rdquo;
+</p>
 <p>
-Those who use this term are often the publishers that push for
-increased copyright power in the name of the authors
+Those who use the term &ldquo;content&rdquo; are often the publishers
+that push for increased copyright power in the name of the authors
 (&ldquo;creators,&rdquo; as they say) of the works.  The term
-&ldquo;content&rdquo; reveals their real attitude towards these works and 
their authors.
+&ldquo;content&rdquo; reveals their real attitude towards these works
+and their authors.
 (See <a 
href="http://archive.salon.com/tech/feature/2000/06/14/love/print.html";>Courtney
 Love's open letter to Steve Case</a> and search for &ldquo;content
 provider&rdquo; in that page.  Alas, Ms. Love is unaware that the term
-&ldquo;intellectual property&rdquo; is also <a href="#IntellectualProperty">
-biased and confusing</a>.)</p>
+&ldquo;intellectual property&rdquo; is
+also <a href="#IntellectualProperty"> biased and confusing</a>.)</p>
 <p>
 However, as long as other people use the term &ldquo;content
 provider,&rdquo; political dissidents can well call themselves
@@ -976,7 +979,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/08/05 13:27:02 $
+$Date: 2014/11/14 11:27:07 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/proprietary-sabotage.fr.html    24 Oct 2014 17:27:07 -0000      
1.2
+++ proprietary/proprietary-sabotage.fr.html    14 Nov 2014 11:27:07 -0000      
1.3
@@ -86,6 +86,18 @@
 </li>
 
 <li>
+<p>Les applications d'Adobe contiennent des bombes à retardement : elles <a
+href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>
+cessent de fonctionner au bout d'un certain temps</a>, après quoi
+l'utilisateur doit payer pour prolonger cette durée.</p>
+
+<p>Il y a eu une fois un problème sur les serveurs qu'utilisent ces programmes
+pour vérifier qui a payé et <a
+href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out";>
+les applications ont cessé de fonctionner pour tout le monde</a>.</p>
+</li>
+
+<li>
 <p>Sony <a
 
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>a
 saboté la Playstation 3</a> avec une rétrogradation du micrologiciel
@@ -208,7 +220,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/10/24 17:27:07 $
+$Date: 2014/11/14 11:27:07 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/philosophy/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/proprietary-surveillance.fr.html        6 Nov 2014 09:28:11 
-0000       1.13
+++ proprietary/proprietary-surveillance.fr.html        14 Nov 2014 11:27:08 
-0000      1.14
@@ -11,7 +11,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Surveillance par le logiciel privateur</h2>
 
-<p><a href="/philosophy/proprietary/proprietary.html">Autres exemples de
+<p><a href="/philosophy/proprietary/proprietary.html"> Autres exemples de
 malveillance dans le logiciel privateur</a></p>
 
 <div class="toc">
@@ -79,42 +79,13 @@
 logiciels privateurs espionnant l'utilisateur ou le suivant à la
 trace</strong>.</p>
 
-<!-- Latest entries: you can add new articles there, and the
-webmasters will categorize them.  Make sure to open a ticket! -->
-<h3 id="LatestAdditions">Ajouts récents</h3>
-<ul>
-  <li><p>Apple a fait en sorte que différents <a
-href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>programmes
-de MacOS lui envoient des fichiers sans en demander la permission</a>. Ceci
-expose ces fichiers à Big Brother et peut-être à d'autres fouineurs.</p>
-  </li>
-  <li><p>Diverses opérations effectuées dans <a
-href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>le
-dernier MacOS</a> envoient des rapports aux serveurs d'Apple.</p>
-  </li>
 
-  <li><p>Apple reconnaît que <a
-href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>l'un
-de ses moteurs de recherche espionne</a>, mais il existe <a
-href="https://github.com/fix-macosx/yosemite-phone-home";>d'autres
-dispositifs fouineurs dont Apple n'a jamais parlé</a>.</p>
-  </li>
+<h3 id="LatestAdditions">Ajouts récents</h3>
 
-  <li><p><a
-href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
-Le moteur de recherche de fichiers <cite>Spotlight</cite></a> envoie à Apple
-les termes recherchés par l'utilisateur.</p>
-  </li>
-
-  <li><p>Cela ne fait qu'empirer avec le temps. <a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
-Windows 10 exige des utilisateurs qu'ils acceptent la totale en fait de
-fouinage</a>, ce qui inclut leurs fichiers, leurs commandes, ainsi que leurs
-entrées texte et audio.</p>
-  </li>
-</ul>
+<p>Les ajouts récents se trouvent au début de chaque catégorie</p>
 
 <!-- #OSSpyware -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-section">
   <h3 id="OSSpyware">Espions dans les systèmes d'exploitation</h3>
   <span class="anchor-reference-id">(<a
@@ -130,6 +101,13 @@
 </div>
 
 <ul>
+  <li><p>Cela ne fait qu'empirer avec le temps. <a
+href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
+Windows 10 exige des utilisateurs qu'ils acceptent la totale en fait de
+fouinage</a>, ce qui inclut leurs fichiers, leurs commandes, ainsi que leurs
+entrées texte et audio.</p>
+  </li>
+
   <li><p><a
 href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
 Windows Update espionne l'utilisateur</a>.</p>
@@ -144,17 +122,10 @@
 href="http://www.marketoracle.co.uk/Article40836.html";> une clé secrète de
 la NSA</a> dont nous ne connaissons pas la fonction. </p>
   </li>
-
-  <li><p>Cela ne fait qu'empirer avec le temps. <a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
-Windows 10 exige des utilisateurs qu'ils acceptent la totale en fait de
-fouinage</a>, ce qui inclut leurs fichiers, leurs commandes, ainsi que leurs
-entrées texte et audio.</p>
-  </li>
 </ul>
 
 <p>Il y a bien d'autres <a
-href="/philosophy/proprietary/malware-microsoft.html">logiciels Microsoft
+href="/philosophy/proprietary/malware-microsoft.html"> logiciels Microsoft
 malveillants</a>.</p>
 
 
@@ -166,9 +137,10 @@
 
 <ul>
   <li><p>Apple a fait en sorte que différents <a
-href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>programmes
-de MacOS lui envoient des fichiers sans en demander la permission</a>. Ceci
-expose ces fichiers à Big Brother et peut-être à d'autres fouineurs.</p>
+href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>
+programmes de MacOS lui envoient des fichiers sans en demander la
+permission</a>. Ceci expose ces fichiers à Big Brother et peut-être à
+d'autres fouineurs.</p>
 
        <p>Cela montre aussi pourquoi on ne peut pas faire confiance au logiciel
 privateur : même si la version d'aujourd'hui n'a pas de fonctionnalité
@@ -177,14 +149,15 @@
 utilisateurs ne la rejettent fermement et ils ne peuvent pas l'enlever
 eux-mêmes.</p>
   </li>
+
   <li><p>Diverses opérations effectuées dans <a
 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>le
 dernier MacOS</a> envoient des rapports aux serveurs d'Apple.</p>
   </li>
 
   <li><p>Apple reconnaît que <a
-href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>l'un
-de ses moteurs de recherche espionne</a>, mais il existe <a
+href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
+l'un de ses moteurs de recherche espionne</a>, mais il existe <a
 href="https://github.com/fix-macosx/yosemite-phone-home";>d'autres
 dispositifs fouineurs dont Apple n'a jamais parlé</a>.</p>
   </li>
@@ -228,6 +201,7 @@
 </ul>
 
 <!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-section">
   <h3 id="SpywareOnMobiles">Espions dans les mobiles</h3>
   <span class="anchor-reference-id">(<a
@@ -372,6 +346,7 @@
 </ul>
 
 <!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-section">
   <h3 id="SpywareAtWork">Espions sur le lieu de travail</h3>
   <span class="anchor-reference-id">(<a
@@ -404,6 +379,7 @@
 </ul>
 
 <!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-section">
   <h3 id="SpywareOnTheRoad">Espions sur la route</h3>
   <span class="anchor-reference-id">(<a
@@ -428,8 +404,8 @@
   <li><p>Adobe a fait en sorte que « Digital Editions » (la liseuse 
utilisée par la
 plupart des bibliothèques aux États-Unis) <a
 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>
-lui envoie énormément de données</a>. Leur excuse : on en a besoin pour
-vérifier les DRM !</p>
+lui envoie une quantité énorme de données</a>. Leur excuse : on en a besoin
+pour vérifier les DRM !</p>
   </li>
 </ul>
 
@@ -452,6 +428,7 @@
 </ul>
 
 <!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-section">
   <h3 id="SpywareAtHome">Espions à la maison</h3>
   <span class="anchor-reference-id">(<a
@@ -496,6 +473,7 @@
 </ul>
 
 <!-- #SpywareOnTheWeb -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-section">
   <h3 id="SpywareOnTheWeb">Espions sur le web</h3>
   <span class="anchor-reference-id">(<a
@@ -651,7 +629,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2014/11/06 09:28:11 $
+$Date: 2014/11/14 11:27:08 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: 
/web/www/www/philosophy/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/proprietary-sabotage.fr-en.html      24 Oct 2014 17:27:07 
-0000      1.3
+++ proprietary/po/proprietary-sabotage.fr-en.html      14 Nov 2014 11:27:08 
-0000      1.4
@@ -24,7 +24,7 @@
 user agrees to a new EULA.</a>
 </p>
 <p>We can be quite sure this EULA is is unjust because injustice is
-the only motive for imposing a EULA.
+the only motive for imposing an EULA.
 </p>
 </li>
 
@@ -73,6 +73,17 @@
 </li>
 
 <li>
+<p>Adobe applications have time bombs:
+they <a 
href="http://techcrunch.com/2013/05/06/adobe-goes-all-in-with-subscription-based-creative-cloud-will-stop-selling-regular-cs-licenses-shrink-wrapped-boxes/";>stop
+working after a certain time</a>, after which the user must pay to
+extend the time.</p>
+
+<p>Once there was a problem with the servers that these programs use
+to check who has paid, and
+<a 
href="http://www.macuser.co.uk/9015-adobe-creative-cloud-outage-leaves-adobe-users-locked-out";>the
 applications refused to work for anyone</a>.</p>
+</li>
+
+<li>
 <p>Sony <a 
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>sabotaged
 the Playstation 3</a> with a firmware downgrade that removed the
 feature that allowed users to run GNU/Linux on it.</p>
@@ -171,7 +182,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/10/24 17:27:07 $
+$Date: 2014/11/14 11:27:08 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: 
/web/www/www/philosophy/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/proprietary-surveillance.fr-en.html  6 Nov 2014 09:28:12 
-0000       1.11
+++ proprietary/po/proprietary-surveillance.fr-en.html  14 Nov 2014 11:27:08 
-0000      1.12
@@ -6,7 +6,8 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Surveillance</h2>
 
-<p><a href="/philosophy/proprietary/proprietary.html">Other examples of 
proprietary malware</a></p>
+<p><a href="/philosophy/proprietary/proprietary.html">
+   Other examples of proprietary malware</a></p>
 
 <div class="toc">
   <h3 id="TableOfContents">Table of Contents</h3>
@@ -76,44 +77,13 @@
 track <strong>clearly established cases of proprietary software that
 spies on or track users</strong>.</p>
 
-<!-- Latest entries: you can add new articles there, and the
-webmasters will categorize them.  Make sure to open a ticket! -->
 
 <h3 id="LatestAdditions">Latest additions</h3>
-<ul>
-  <li><p>Apple has made
-         various <a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>MacOS
-         programs send files to Apple servers without asking
-         permission</a>. This exposes the files to Big Brother and perhaps to
-         other snoops.</p>
-  </li>
-  <li><p>Various operations in
-      <a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
-       the latest MacOS send reports to Apple</a> servers.</p>
-  </li>
-
-  <li><p>Apple admits the
-      <a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
-       spying in a search facility</a>,
-      but there's a lot
-      <a href="https://github.com/fix-macosx/yosemite-phone-home";>more 
snooping that Apple has not talked about</a>.</p>
-  </li>
-
-  <li><p><a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
-      Spotlight search</a>
-      sends users' search terms to Apple.</p>
-  </li>
-
-  <li><p>It only gets worse with time.
-      <a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
-      Windows 10 requires users to give permission for total snooping</a>,
-      including their files, their commands, their text input, and their voice 
input.</p>
-  </li>
-</ul>
-
 
+<p>Latest additions are found on top under each category.</p>
 
 <!-- #OSSpyware -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
 <div class="big-section">
   <h3 id="OSSpyware">Spyware in Operating Systems</h3>
@@ -128,6 +98,13 @@
 </div>
 
 <ul>
+  <li><p>It only gets worse with time.
+      <a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
+      Windows 10 requires users to give permission for total snooping</a>,
+      including their files, their commands, their text input, and their 
+      voice input.</p>
+  </li>
+
   <li><p><a 
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
       Windows Update snoops on the user.</a></p>
   </li>
@@ -141,15 +118,10 @@
       secret NSA key in Windows</a>,
       whose functions we don't know.</p>
   </li>
-
-  <li><p>It only gets worse with time.
-      <a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
-      Windows 10 requires users to give permission for total snooping</a>,
-      including their files, their commands, their text input, and their voice 
input.</p>
-  </li>
 </ul>
 
-<p>There's a lot more <a 
href="/philosophy/proprietary/malware-microsoft.html">Microsoft malware</a>.</p>
+<p>There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
+   Microsoft malware</a>.</p>
 
 
 <div class="big-subsection">
@@ -158,9 +130,9 @@
 </div>
 
 <ul>
-  <li><p>Apple has made
-         various <a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>MacOS
-         programs send files to Apple servers without asking
+  <li><p>Apple has made various 
+      <a 
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud";>
+      MacOS programs send files to Apple servers without asking
          permission</a>. This exposes the files to Big Brother and perhaps to
          other snoops.</p>
 
@@ -170,6 +142,7 @@
          remove the malfeature unless many users push back hard, and the users
          can't remove it themselves.</p>
   </li>
+
   <li><p>Various operations in
       <a 
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540";>
        the latest MacOS send reports to Apple</a> servers.</p>
@@ -177,19 +150,18 @@
 
   <li><p>Apple admits the
       <a 
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/";>
-       spying in a search facility</a>,
-      but there's a lot
-      <a href="https://github.com/fix-macosx/yosemite-phone-home";>more 
snooping that Apple has not talked about</a>.</p>
+      spying in a search facility</a>, but there's a lot
+      <a href="https://github.com/fix-macosx/yosemite-phone-home";>
+      more snooping that Apple has not talked about</a>.</p>
   </li>
 
   <li><p><a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
-      Spotlight search</a>
-      sends users' search terms to Apple.</p>
+      Spotlight search</a> sends users' search terms to Apple.</p>
   </li>
 </ul>
 
-<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>,
-and <a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
+<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and 
+<a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
 
 
 <div class="big-subsection">
@@ -198,8 +170,8 @@
 </div>
 
 <ul>
-  <li><p>Spyware is present in some Android devices when they are
-      sold.  Some Motorola phones modify Android to
+  <li><p>Spyware is present in some Android devices when they are sold.  
+      Some Motorola phones modify Android to
       <a 
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html";>
       send personal data to Motorola</a>.</p>
   </li>
@@ -210,14 +182,14 @@
   </li>
 
   <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
-      Samsung's back door</a>
-      provides access to any file on the system.</p>
+      Samsung's back door</a> provides access to any file on the system.</p>
   </li>
 </ul>
 
 
 
 <!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
 <div class="big-section">
   <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
@@ -239,20 +211,20 @@
   <!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
   </li>
 
-  <li><p>There is also a feature for web sites to track users, which
-      is <a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
+  <li><p>There is also a feature for web sites to track users, which is 
+      <a 
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/";>
       enabled by default</a>.  (That article talks about iOS 6, but it
       is still true in iOS 7.)</p>
   </li>
 
-  <li><p>The iThing
-      also <a 
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
+  <li><p>The iThing also 
+      <a 
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
       tells Apple its geolocation</a> by default, though that can be
       turned off.</p>
   </li>
 
-  <li><p>Apple can, and regularly
-      does, <a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
+  <li><p>Apple can, and regularly does, 
+      <a 
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
       remotely extract some data from iPhones for the state</a>.</p>
   </li>
 
@@ -263,8 +235,8 @@
 
   <li><p><a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
       Several &ldquo;features&rdquo; of iOS seem to exist for no
-      possible purpose other than surveillance</a>.  Here is
-      the <a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf";>
+      possible purpose other than surveillance</a>.  Here is the 
+      <a 
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf";>
       Technical presentation</a>.</p>
   </li>
 </ul>
@@ -349,6 +321,7 @@
 
 
 <!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
 <div class="big-section">
   <h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -382,6 +355,7 @@
 
 
 <!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
 <div class="big-section">
   <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
@@ -402,9 +376,9 @@
   </li>
 
   <li><p>Adobe made &ldquo;Digital Editions,&rdquo; the e-reader used
-      by most US
-      libraries, <a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>send
-      lots of data to Adobe</a>.  Adobe's &ldquo;excuse&rdquo;: it's
+      by most US libraries, 
+      <a 
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/";>
+      send lots of data to Adobe</a>.  Adobe's &ldquo;excuse&rdquo;: it's
       needed to check DRM!</p>
   </li>
 </ul>
@@ -417,19 +391,17 @@
 
 <ul>
   <li><p>Tesla cars allow the company to extract data remotely and
-      determine the car's location at any time. 
-      (See <a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
-      Section 2, paragraphs b and c.</a>).
-      The company says it doesn't store this information, but if the
-      state orders it to get the data and hand it over, the state can
-      store it.</p>
+      determine the car's location at any time. (See 
+      <a 
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf";>
+      Section 2, paragraphs b and c.</a>). The company says it doesn't 
+      store this information, but if the state orders it to get the data 
+      and hand it over, the state can store it.</p>
   </li>
 </ul>
 
 
-
-
 <!-- #SpywareAtHome -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
 <div class="big-section">
   <h3 id="SpywareAtHome">Spyware at Home</h3>
@@ -452,11 +424,10 @@
 <ul>
   <li><p>Spyware in
       <a 
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html";>
-      LG &ldquo;smart&rdquo; TVs</a>
-      reports what the user watches, and the switch to turn this off
-      has no effect.  (The fact that the transmission reports a 404
-      error really means nothing; the server could save that data
-      anyway.)</p>
+      LG &ldquo;smart&rdquo; TVs</a> reports what the user watches, and 
+      the switch to turn this off has no effect.  (The fact that the 
+      transmission reports a 404 error really means nothing; the server 
+      could save that data anyway.)</p>
 
       <p>Even worse, it
       <a 
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/";>
@@ -466,14 +437,14 @@
       happen in any product.</p>
 
       <p>However, LG TVs
-      <a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
-      do lots of spying anyway</a>.</p>
+      <a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>
 do lots of spying anyway</a>.</p>
   </li>
 </ul>
 
 
 
 <!-- #SpywareOnTheWeb -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
 <div class="big-section">
   <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
@@ -481,10 +452,11 @@
 </div>
 <div style="clear: left;"></div>
 
-<p>In addition, many web sites spy on their visitors.  Web sites are not 
programs, so it 
-<a href="/philosophy/network-services-arent-free-or-nonfree.html">
-makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;</a>,
-but the surveillance is an abuse all the same.</p>
+<p>In addition, many web sites spy on their visitors.  Web sites are not 
+   programs, so it 
+   <a href="/philosophy/network-services-arent-free-or-nonfree.html">
+   makes no sense to call them &ldquo;free&rdquo; or 
&ldquo;proprietary&rdquo;</a>,
+   but the surveillance is an abuse all the same.</p>
 
 <ul>
   <li><p><a 
href="http://japandailypress.com/government-warns-agencies-against-using-chinas-baidu-application-after-data-transmissions-discovered-2741553/";>
@@ -507,8 +479,7 @@
   <li><p>Many web sites report all their visitors to Google by using
       the Google Analytics service, which
       <a 
href="http://www.pcworld.idg.com.au/article/434164/google_analytics_breaks_norwegian_privacy_laws_local_agency_said/";>
-      tells Google the IP address and the page that was
-      visited.</a></p>
+      tells Google the IP address and the page that was visited.</a></p>
   </li>
 
   <li><p>Many web sites try to collect users' address books (the
@@ -535,8 +506,7 @@
 
   <li><p>Flash is also used for
       <a 
href="http://arstechnica.com/security/2013/10/top-sites-and-maybe-the-nsa-track-users-with-device-fingerprinting/";>
-      &ldquo;fingerprinting&rdquo; devices </a>
-      to identify users.</p>
+      &ldquo;fingerprinting&rdquo; devices </a> to identify users.</p>
   </li>
 </ul>
 
@@ -600,7 +570,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2014/11/06 09:28:12 $
+$Date: 2014/11/14 11:27:08 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]