www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www distros/free-distros.it.html distros/free-n...


From: GNUN
Subject: www distros/free-distros.it.html distros/free-n...
Date: Sat, 27 Jun 2015 15:00:44 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/06/27 15:00:44

Modified files:
        distros        : free-distros.it.html 
                         free-non-gnu-distros.it.html 
                         free-system-distribution-guidelines.it.html 
        distros/po     : free-distros.it-en.html free-distros.it.po 
                         free-non-gnu-distros.it-en.html 
                         free-non-gnu-distros.it.po 
                         free-system-distribution-guidelines.it-en.html 
                         free-system-distribution-guidelines.it.po 
        philosophy     : surveillance-vs-democracy.it.html 
        philosophy/po  : surveillance-vs-democracy.it-en.html 
                         surveillance-vs-democracy.it.po 
        proprietary    : malware-apple.it.html 
                         malware-kindle-swindle.it.html 
                         malware-mobiles.it.html 
                         proprietary-insecurity.it.html 
        proprietary/po : malware-apple.it-en.html malware-apple.it.po 
                         malware-kindle-swindle.it-en.html 
                         malware-kindle-swindle.it.po 
                         malware-microsoft.it.po 
                         malware-mobiles.it-en.html 
                         malware-mobiles.it.po 
                         proprietary-insecurity.it-en.html 
                         proprietary-insecurity.it.po 
                         proprietary-surveillance.it.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/free-distros.it.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/free-non-gnu-distros.it.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/free-system-distribution-guidelines.it.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.it-en.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-distros.it.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-non-gnu-distros.it-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-non-gnu-distros.it.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-system-distribution-guidelines.it-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/distros/po/free-system-distribution-guidelines.it.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.it.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.it.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.it.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-kindle-swindle.it-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-kindle-swindle.it.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.10&r2=1.11

Patches:
Index: distros/free-distros.it.html
===================================================================
RCS file: /web/www/www/distros/free-distros.it.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- distros/free-distros.it.html        20 Apr 2015 13:58:25 -0000      1.78
+++ distros/free-distros.it.html        27 Jun 2015 15:00:39 -0000      1.79
@@ -202,8 +202,8 @@
 <p>Se siete i responsabili di una distribuzione che rispetta le nostre <a
 href="/distros/free-system-distribution-guidelines.html">linee guida</a> e
 volete essere elencati su questa pagina, scriveteci a <a
-href="mailto:address@hidden";>&lt;address@hidden&gt;</a> inviandoci
-una presentazione e un collegamento al sito del vostro progetto. Poi noi vi
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a> inviandoci una
+presentazione e un collegamento al sito del vostro progetto. Poi noi vi
 spiegheremo i dettagli del nostro processo di valutazione e cercheremo di
 agire rapidamente.</p>
 
@@ -253,7 +253,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -270,9 +270,8 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -284,7 +283,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/04/20 13:58:25 $
+$Date: 2015/06/27 15:00:39 $
 
 <!-- timestamp end -->
 </p>

Index: distros/free-non-gnu-distros.it.html
===================================================================
RCS file: /web/www/www/distros/free-non-gnu-distros.it.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- distros/free-non-gnu-distros.it.html        13 Jan 2015 13:57:07 -0000      
1.3
+++ distros/free-non-gnu-distros.it.html        27 Jun 2015 15:00:39 -0000      
1.4
@@ -26,6 +26,14 @@
 </li>
 </ul>
 
+<p>Se siete i responsabili di una distribuzione non-GNU che rispetta le nostre
+<a href="/distros/free-system-distribution-guidelines.html">linee guida</a>
+e volete essere elencati su questa pagina, scriveteci a <a
+href="mailto:address@hidden";>&lt;address@hidden&gt;</a> inviandoci una
+presentazione e un collegamento al sito del vostro progetto. Poi noi vi
+spiegheremo i dettagli del nostro processo di valutazione e cercheremo di
+agire rapidamente. Aspettiamo le vostre segnalazioni!</p>
+
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -72,7 +80,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -89,9 +97,8 @@
 <p>Copyright &copy; 2014 Free Software Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -102,7 +109,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/01/13 13:57:07 $
+$Date: 2015/06/27 15:00:39 $
 
 <!-- timestamp end -->
 </p>

Index: distros/free-system-distribution-guidelines.it.html
===================================================================
RCS file: /web/www/www/distros/free-system-distribution-guidelines.it.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- distros/free-system-distribution-guidelines.it.html 15 Apr 2015 08:28:43 
-0000      1.46
+++ distros/free-system-distribution-guidelines.it.html 27 Jun 2015 15:00:39 
-0000      1.47
@@ -283,7 +283,7 @@
 distribuzioni di sistema GNU libere</a> di cui siamo a conoscenza. Se
 conoscete qualche distribuzione libera che non è nella lista, per favore
 chiedete agli sviluppatori di scriverci a &lt;<a class="reference"
-href="mailto:address@hidden";>address@hidden</a>&gt; e di darci una
+href="mailto:address@hidden";>address@hidden</a>&gt; e di darci una
 descrizione del loro sistema e l'indirizzo del relativo sito web.</p>
 
 <p>Manteniamo anche un elenco delle <a
@@ -292,7 +292,7 @@
 
 <p>Se avete domande o commenti su queste linee guida, sentitevi liberi di
 inviarceli a &lt;<a class="reference"
-href="mailto:address@hidden";>address@hidden</a>&gt;. Speriamo che
+href="mailto:address@hidden";>address@hidden</a>&gt;. Speriamo che
 questo aiuti tutti a comprendere meglio quali sono le questioni importanti
 per avere distribuzioni di sistema libere, e ci auguriamo di poter
 promuovere sempre più distribuzioni in futuro.</p>
@@ -343,7 +343,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -360,9 +360,8 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -374,7 +373,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/04/15 08:28:43 $
+$Date: 2015/06/27 15:00:39 $
 
 <!-- timestamp end -->
 </p>

Index: distros/po/free-distros.it-en.html
===================================================================
RCS file: /web/www/www/distros/po/free-distros.it-en.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- distros/po/free-distros.it-en.html  20 Apr 2015 13:58:27 -0000      1.54
+++ distros/po/free-distros.it-en.html  27 Jun 2015 15:00:40 -0000      1.55
@@ -199,7 +199,7 @@
 the <a href="/distros/free-system-distribution-guidelines.html">Free
 System Distribution Guidelines</a> and would like to be listed here,
 please write to us
-at <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+at <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
 with an introduction and a link to the project Web site.  When you do,
 we'll explain more about our evaluation process to you, and get
 started on it quickly.  We look forward to hearing from you!</p>
@@ -236,7 +236,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -254,14 +254,14 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/04/20 13:58:27 $
+$Date: 2015/06/27 15:00:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: distros/po/free-distros.it.po
===================================================================
RCS file: /web/www/www/distros/po/free-distros.it.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- distros/po/free-distros.it.po       27 Jun 2015 14:41:01 -0000      1.150
+++ distros/po/free-distros.it.po       27 Jun 2015 15:00:40 -0000      1.151
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-25 16:28+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 # type: Content of: <title>
@@ -454,24 +453,7 @@
 "quella pagina e pensate che rispetti le nostre linee guida, chiedete ai "
 "responsabili di quella distribuzione di mettersi in contatto con noi."
 
-# | If you maintain a distribution that follows the <a
-# | href=\"/distros/free-system-distribution-guidelines.html\">Free System
-# | Distribution Guidelines</a> and would like to be listed here, please write
-# | to us at <a
-# | [-href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a>-]
-# | {+href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a>+} with
-# | an introduction and a link to the project Web site.  When you do, we'll
-# | explain more about our evaluation process to you, and get started on it
-# | quickly.  We look forward to hearing from you!
-#. type: Content of: <p>
-#| msgid ""
-#| "If you maintain a distribution that follows the <a href=\"/distros/free-"
-#| "system-distribution-guidelines.html\">Free System Distribution "
-#| "Guidelines</a> and would like to be listed here, please write to us at <a "
-#| "href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> with an "
-#| "introduction and a link to the project Web site.  When you do, we'll "
-#| "explain more about our evaluation process to you, and get started on it "
-#| "quickly.  We look forward to hearing from you!"
+#. type: Content of: <p>
 msgid ""
 "If you maintain a distribution that follows the <a href=\"/distros/free-"
 "system-distribution-guidelines.html\">Free System Distribution Guidelines</"
@@ -540,12 +522,7 @@
 msgid "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: distros/po/free-non-gnu-distros.it-en.html
===================================================================
RCS file: /web/www/www/distros/po/free-non-gnu-distros.it-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- distros/po/free-non-gnu-distros.it-en.html  13 Jan 2015 13:57:07 -0000      
1.2
+++ distros/po/free-non-gnu-distros.it-en.html  27 Jun 2015 15:00:40 -0000      
1.3
@@ -22,6 +22,15 @@
 </li>
 </ul>
 
+<p>If you maintain a non-GNU distribution that follows
+the <a href="/distros/free-system-distribution-guidelines.html">Free
+System Distribution Guidelines</a> and would like to be listed here,
+please write to us
+at <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
+with an introduction and a link to the project Web site.  When you do,
+we'll explain more about our evaluation process to you, and get
+started on it quickly.  We look forward to hearing from you!</p>
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -54,7 +63,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -72,14 +81,14 @@
 <p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/01/13 13:57:07 $
+$Date: 2015/06/27 15:00:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: distros/po/free-non-gnu-distros.it.po
===================================================================
RCS file: /web/www/www/distros/po/free-non-gnu-distros.it.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- distros/po/free-non-gnu-distros.it.po       27 Jun 2015 14:41:01 -0000      
1.9
+++ distros/po/free-non-gnu-distros.it.po       27 Jun 2015 15:00:40 -0000      
1.10
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-25 16:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -118,12 +117,7 @@
 msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014 Free Software Foundation, Inc."
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: distros/po/free-system-distribution-guidelines.it-en.html
===================================================================
RCS file: 
/web/www/www/distros/po/free-system-distribution-guidelines.it-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- distros/po/free-system-distribution-guidelines.it-en.html   15 Apr 2015 
08:28:44 -0000      1.29
+++ distros/po/free-system-distribution-guidelines.it-en.html   27 Jun 2015 
15:00:40 -0000      1.30
@@ -280,7 +280,7 @@
 GNU system distributions</a> we know about.  If you know about a free
 distribution that isn't listed there, please ask its developers write
 to &lt;<a class="reference"
-href="mailto:address@hidden";>address@hidden</a>&gt; with a description of
+href="mailto:address@hidden";>address@hidden</a>&gt; with a description of
 their system and a link to their web page.</p>
 
 <p>We also list <a href="/distros/free-non-gnu-distros.html">free
@@ -288,7 +288,7 @@
 
 <p>If you have questions or comments about these guidelines
 themselves, feel free to send those to &lt;<a class="reference"
-href="mailto:address@hidden";>address@hidden</a>&gt;.  We hope
+href="mailto:address@hidden";>address@hidden</a>&gt;.  We hope
 that they help everyone better understand the issues that are important
 for free system distributions, and we look forward to promoting more
 of them in the future.</p>
@@ -325,7 +325,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -343,14 +343,14 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/04/15 08:28:44 $
+$Date: 2015/06/27 15:00:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: distros/po/free-system-distribution-guidelines.it.po
===================================================================
RCS file: /web/www/www/distros/po/free-system-distribution-guidelines.it.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- distros/po/free-system-distribution-guidelines.it.po        27 Jun 2015 
14:41:01 -0000      1.73
+++ distros/po/free-system-distribution-guidelines.it.po        27 Jun 2015 
15:00:41 -0000      1.74
@@ -13,7 +13,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-25 16:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 # type: Content of: <title>
@@ -659,21 +658,7 @@
 msgstr "Note finali"
 
 # type: Content of: <p>
-# | We maintain a list of the <a href=\"/distros/free-distros.html\">free GNU
-# | system distributions</a> we know about.  If you know about a free
-# | distribution that isn't listed there, please ask its developers write to
-# | &lt;<a class=\"reference\"
-# | [-href=\"mailto:address@hidden";>address@hidden</a>&gt;-]
-# | {+href=\"mailto:address@hidden";>address@hidden</a>&gt;+} with a
-# | description of their system and a link to their web page.
-#. type: Content of: <p>
-#| msgid ""
-#| "We maintain a list of the <a href=\"/distros/free-distros.html\">free GNU "
-#| "system distributions</a> we know about.  If you know about a free "
-#| "distribution that isn't listed there, please ask its developers write to "
-#| "&lt;<a class=\"reference\" href=\"mailto:address@hidden";
-#| "\">address@hidden</a>&gt; with a description of their system and a "
-#| "link to their web page."
+#. type: Content of: <p>
 msgid ""
 "We maintain a list of the <a href=\"/distros/free-distros.html\">free GNU "
 "system distributions</a> we know about.  If you know about a free "
@@ -697,21 +682,7 @@
 "\">distribuzioni libere non-GNU</a> alle stesse condizioni etiche."
 
 # type: Content of: <p>
-# | If you have questions or comments about these guidelines themselves, feel
-# | free to send those to &lt;<a class=\"reference\"
-# | [-href=\"mailto:address@hidden";>address@hidden</a>&gt;.-]
-# | {+href=\"mailto:address@hidden";>address@hidden</a>&gt;.+}  We hope
-# | that they help everyone better understand the issues that are important
-# | for free system distributions, and we look forward to promoting more of
-# | them in the future.
-#. type: Content of: <p>
-#| msgid ""
-#| "If you have questions or comments about these guidelines themselves, feel "
-#| "free to send those to &lt;<a class=\"reference\" href=\"mailto:";
-#| "address@hidden">address@hidden</a>&gt;.  We hope that they help "
-#| "everyone better understand the issues that are important for free system "
-#| "distributions, and we look forward to promoting more of them in the "
-#| "future."
+#. type: Content of: <p>
 msgid ""
 "If you have questions or comments about these guidelines themselves, feel "
 "free to send those to &lt;<a class=\"reference\" href=\"mailto:address@hidden";
@@ -777,12 +748,7 @@
 msgid "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: philosophy/surveillance-vs-democracy.it.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.it.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- philosophy/surveillance-vs-democracy.it.html        8 Jan 2015 08:58:06 
-0000       1.11
+++ philosophy/surveillance-vs-democracy.it.html        27 Jun 2015 15:00:41 
-0000      1.12
@@ -121,10 +121,15 @@
 href="https://en.wikipedia.org/wiki/Japanese_American_internment";> negli
 Stati Uniti</a>.</p>
 
-<p>La sorveglianza totale, unita a una legislazione vaga, fornisce
-l’opportunità per una imponente spedizione di pesca verso qualunque
-obiettivo desiderato. Per mettere al sicuro il giornalismo e la democrazia,
-dobbiamo limitare l’accumulazione di dati facilmente accessibili allo 
stato.</p>
+<p>I dati personali raccolti dallo stato diventano disponibili anche ai
+criminali informatici che ne violano i server, compresi quelli che <a
+href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml";>lavorano
+per potenze nemiche</a>.</p>
+
+<p>La sorveglianza totale, unita a una protezione legislativa vaga, fornisce
+l’opportunità agli stati per una imponente spedizione di pesca verso
+chiunque. Per mettere al sicuro il giornalismo e la democrazia, dobbiamo
+limitare l’accumulazione di dati facilmente accessibili allo stato.</p>
 
 <h3>Una forte tutela della privacy dev’essere tecnica</h3>
 
@@ -505,7 +510,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -522,9 +527,8 @@
 <p>Copyright &copy; 2015 Richard Stallman</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -535,7 +539,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/01/08 08:58:06 $
+$Date: 2015/06/27 15:00:41 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/surveillance-vs-democracy.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- philosophy/po/surveillance-vs-democracy.it-en.html  8 Jan 2015 08:58:07 
-0000       1.13
+++ philosophy/po/surveillance-vs-democracy.it-en.html  27 Jun 2015 15:00:42 
-0000      1.14
@@ -118,10 +118,15 @@
 and <a href="https://en.wikipedia.org/wiki/Japanese_American_internment";>the
 US </a>.</p>
 
-<p>Total surveillance plus vague law provides an opening for a massive
-fishing expedition against any desired target.  To make journalism and
-democracy safe, we must limit the accumulation of data that is easily
-accessible to the state.</p>
+<p>Personal data collected by the state is also likely to be obtained
+by crackers that break the security of the servers, even
+by <a 
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml";>crackers
+working for hostile states</a>.</p>
+
+<p>Total surveillance plus weak legal protections enable the state to
+launch a massive fishing expedition against any person.  To make
+journalism and democracy safe, we must limit the accumulation of data
+that is easily accessible to the state.</p>
 
 <h3>Robust Protection for Privacy Must Be Technical</h3>
 
@@ -480,7 +485,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -498,14 +503,14 @@
 <p>Copyright &copy; 2015 Richard Stallman</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/01/08 08:58:07 $
+$Date: 2015/06/27 15:00:42 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- philosophy/po/surveillance-vs-democracy.it.po       27 Jun 2015 14:41:02 
-0000      1.43
+++ philosophy/po/surveillance-vs-democracy.it.po       27 Jun 2015 15:00:42 
-0000      1.44
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-21 14:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -270,17 +269,7 @@
 "\"https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-";
 "revealed-even-worse-than-first.shtml\">lavorano per potenze nemiche</a>."
 
-# | Total surveillance plus [-vague law provides an opening for-] {+weak legal
-# | protections enable the state to launch+} a massive fishing expedition
-# | against any [-desired target.-] {+person.+}  To make journalism and
-# | democracy safe, we must limit the accumulation of data that is easily
-# | accessible to the state.
-#. type: Content of: <p>
-#| msgid ""
-#| "Total surveillance plus vague law provides an opening for a massive "
-#| "fishing expedition against any desired target.  To make journalism and "
-#| "democracy safe, we must limit the accumulation of data that is easily "
-#| "accessible to the state."
+#. type: Content of: <p>
 msgid ""
 "Total surveillance plus weak legal protections enable the state to launch a "
 "massive fishing expedition against any person.  To make journalism and "
@@ -1047,12 +1036,7 @@
 msgid "Copyright &copy; 2015 Richard Stallman"
 msgstr "Copyright &copy; 2015 Richard Stallman"
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: proprietary/malware-apple.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.it.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/malware-apple.it.html   15 Apr 2015 13:02:27 -0000      1.1
+++ proprietary/malware-apple.it.html   27 Jun 2015 15:00:42 -0000      1.2
@@ -8,6 +8,14 @@
 Foundation</title>
 
 <!--#include virtual="/proprietary/po/malware-apple.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+
+</style>
+
 <!--#include virtual="/server/banner.it.html" -->
 <h2>I sistemi operativi di Apple sono malware</h2>
 
@@ -35,8 +43,67 @@
 
 <p>Ecco alcune delle motivazioni per cui i sistemi di Apple sono malware.</p>
 
+<div class="toc">
+<div class="malfunctions">
+<ul>
+<li><strong>Tipo&nbsp;di malware</strong></li>
+<li><a href="#back-doors">Backdoor</a></li>
+
+<!--<li>
+<a href="#censorship">Censorship</a></li>-->
+<!--<li>
+<a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">Sabotaggio</a></li>
+<li><a href="#surveillance">Sorveglianza</a></li>
+<li><a href="#drm">DRM</a>  (che chiamiamo “Digital restrictions 
management”, in
+italiano, “gestione digitale delle restrizioni”) significa funzionalità
+volte a limitare il controllo che gli utenti hanno sui dati contenuti nei
+propri computer.</li>
+<li><a href="#jails">Prigioni</a>&mdash;sistemi che impongono restrizioni alle
+applicazioni.</li>
+<li><a href="#tyrants">Tiranni</a>&mdash;sistemi che vietano l'installazione di
+sistemi operativi non “autorizzati” dal produttore.</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Backdoor di Apple</h3>
 <ul>
+  <li><p>L'iPhone ha una backdoor <a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>che
+permette ad Apple di disinstallare a distanza applicazioni</a> che reputa
+&ldquo;inappropriate&rdquo;. Jobs disse che è giusto che Apple abbia questo
+potere perché di Apple ci si può fidare, eccome.</p>
+  </li>
+
+  <li><p>L'iPhone ha una backdoor per <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>la
+formattazione a distanza</a>. Non è sempre abilitata, ma gli utenti vengono
+spinti ad abilitarla a loro insaputa.</p>
+  </li>
+</ul>
 
+<h3 id="sabotage">Sabotaggio di Apple</h3>
+<ul>
+  <li><p><a
+href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>Un
+&ldquo;aggiornamento&rdquo; di Apple al firmware degli iPhone ha reso
+inutilizzabili i dispositivi che erano stati
+sbloccati</a>. L'&ldquo;aggiornamento&rdquo; ha anche disattivato le
+applicazioni non approvate dalla <a
+href="/philosophy/proprietary-jails.html">censura di Apple</a>. Tutto questo
+era apparentemente intenzionale.</p>
+  </li>
+
+  <li><p>Apple <a
+href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>ha
+cancellato dagli iPod la musica scaricata da negozi di musica digitale
+concorrenti di iTunes</a>.</p>
+  </li>
+</ul>
+
+<h3 id="surveillance">Sorveglianza di Apple</h3>
+<ul>
   <li><p><a
 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/";>MacOS
 invia in automatico ai server di Apple i documenti non salvati che si stanno
@@ -77,31 +144,6 @@
   </li>
   
   <li><p><a
-href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html";>iOS,
-il sistema operativo dei vai iGadget di Apple, è una prigione per gli
-utenti</a>. Questo vuol dire che censura le applicazioni.</p>
-
-  <p>Apple ha usato questo potere per <a
-href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>censurare
-tutte le applicazioni di bitcoin</a> per i vari iGadget.</p>
-
-  <p>Apple, tramite i vari iGadget, ha introdotto la pratica del rendere i
-computer per uso generale delle prigioni, ed il termine "prigione" viene
-proprio dagli utenti degli iGadget, che hanno coniato il termine
-&ldquo;jailbreaking&rdquo; (evasione carceraria) per descrivere
-l'aggiramento della censura.</p>
-
-  <p>Ecco un articolo sulla <a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>firma
-digitale del codice</a> usata dagli iGadget per imprigionare l'utente.</p>
-  </li>
-
-  <li><p>Apple <a
-href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>non
-permette agli utenti di installare versioni precedenti di iOS</a>.</p>
-  </li>
-
-  <li><p><a
 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>Molte
 &ldquo;funzionalità&rdquo; di iOS sembrano esistere al solo possibile scopo
 di permettere la sorveglianza</a>. Ecco la <a
@@ -115,14 +157,20 @@
 ottenere altre informazioni.</p>
   </li>
 
-  <li><p>Gli iGadget sono dispositivi tiranni: non permettono l'installazione 
di
-sistemi operativi diversi o modificati. Esiste una versione di Android per
-gli iGadget, ma installarla richiede <a
-href="http://www.idroidproject.org/wiki/Status";>trovare un bug o
-&ldquo;exploit&rdquo;</a> che renda possibile l'installazione di un sistema
-operativo diverso.</p>
+  <li><p>Apple può (e spesso lo fa) <a
+href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>estrarre
+dati dagli iPhone a distanza per il governo</a>.
+  </p>
+  <p>Questo potrebbe essere cambiato con <a
+href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>i
+miglioramenti di sicurezza di iOS8</a>; ma <a
+href="https://firstlook.org/theintercept/?p=5199";>meno di quanto affermato
+da Apple</a>.</p>
   </li>
+</ul>
 
+<h3 id="drm">DRM di Apple</h3>
+<ul>
   <li><p><a
 
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm";>DRM
 (digital restriction mechanisms, meccanismi per restrizioni digitali) in
@@ -135,54 +183,51 @@
   <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>DRM
 introdotto per soddisfare i requisiti dei dischi Bluray</a>. (L'articolo si
 concentra su Windows ma afferma che MacOS farà lo stesso in seguito.)</p></li>
+</ul>
    
-  <li><p>L'iPhone ha una backdoor <a
-href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>che
-permette ad Apple di disinstallare a distanza applicazioni</a> che reputa
-&ldquo;inappropriate&rdquo;. Jobs disse che è giusto che Apple abbia questo
-potere perché di Apple ci si può fidare, eccome.</p>
-  </li>
-
-  <li><p>L'iPhone ha una backdoor per <a
-href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>la
-formattazione a distanza</a>. Non è sempre abilitata, ma gli utenti vengono
-spinti ad abilitarla a loro insaputa.</p>
-  </li>
-
+<h3 id="jails">Prigioni di Apple</h3>
+<ul>
   <li><p><a
-href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>Un
-&ldquo;aggiornamento&rdquo; di Apple al firmware degli iPhone ha reso
-inutilizzabili i dispositivi che erano stati
-sbloccati</a>. L'&ldquo;aggiornamento&rdquo; ha anche disattivato le
-applicazioni non approvate dalla <a
-href="/philosophy/proprietary-jails.html">censura di Apple</a>. Tutto questo
-era apparentemente intenzionale.</p>
-  </li>
+href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html";>iOS,
+il sistema operativo dei vai iGadget di Apple, è una prigione per gli
+utenti</a>. Questo vuol dire che censura le applicazioni.</p>
 
-  <li><p>Apple può (e spesso lo fa) <a
-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>estrarre
-dati dagli iPhone a distanza per il governo</a>.
-  </p>
-  <p>Questo potrebbe essere cambiato con <a
-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>i
-miglioramenti di sicurezza di iOS8</a>; ma <a
-href="https://firstlook.org/theintercept/?p=5199";>meno di quanto affermato
-da Apple</a>.</p>
-  </li>
+  <p>Apple ha usato questo potere per <a
+href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>censurare
+tutte le applicazioni di bitcoin</a> per i vari iGadget.</p>
 
-  <li><p>Apple <a
-href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>ha
-cancellato dagli iPod la musica scaricata da negozi di musica digitale
-concorrenti di iTunes</a>.</p>
+  <p>Apple, tramite i vari iGadget, ha introdotto la pratica del rendere i
+computer per uso generale delle prigioni, ed il termine "prigione" viene
+proprio dagli utenti degli iGadget, che hanno coniato il termine
+&ldquo;jailbreaking&rdquo; (evasione carceraria) per descrivere
+l'aggiramento della censura.</p>
+
+  <p>Ecco un articolo sulla <a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>firma
+digitale del codice</a> usata dagli iGadget per imprigionare l'utente.</p>
   </li> 
 
   <li><p><a
 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>Altri
 esempi della censura arbitraria ed incoerente perpetrata da Apple</a>.</p>
   </li>
-
 </ul>
 
+<h3 id="tyrants">Tiranni di Apple</h3>
+<ul>
+  <li><p>Apple <a
+href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>non
+permette agli utenti di installare versioni precedenti di iOS</a>.</p>
+  </li>
+
+  <li><p>Gli iGadget sono dispositivi tiranni: non permettono l'installazione 
di
+sistemi operativi diversi o modificati. Esiste una versione di Android per
+gli iGadget, ma installarla richiede <a
+href="http://www.idroidproject.org/wiki/Status";>trovare un bug o
+&ldquo;exploit&rdquo;</a> che renda possibile l'installazione di un sistema
+operativo diverso.</p>
+  </li>
+</ul>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -229,7 +274,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -246,9 +291,8 @@
 <p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -260,7 +304,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/04/15 13:02:27 $
+$Date: 2015/06/27 15:00:42 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-kindle-swindle.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.it.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/malware-kindle-swindle.it.html  15 Apr 2015 13:02:28 -0000      
1.1
+++ proprietary/malware-kindle-swindle.it.html  27 Jun 2015 15:00:42 -0000      
1.2
@@ -7,6 +7,14 @@
 <title>Malware nel Kindle Swindle - Progetto GNU - Free Software 
Foundation</title>
 
 <!--#include virtual="/proprietary/po/malware-kindle-swindle.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+
+</style>
+
 <!--#include virtual="/server/banner.it.html" -->
 <h2>Malware nel Kindle Swindle</h2>
 
@@ -21,6 +29,7 @@
 digitali")</a> ed <a href="/philosophy/ebooks.html">altre funzionalità
 malevole</a>.</p>
 
+<div class="highlight-para">
 <p>
 Malware e software non libero sono due problemi separati. La differenza tra
 <a href="/philosophy/free-sw.html">software libero</a> e software non libero
@@ -31,7 +40,38 @@
 consapevoli dell'impossibilità da parte degli utenti di riparare eventuali
 funzionalità malevole, sono tentati ad imporne.
 </p>
+</div>
+
+<div class="toc">
+<div class="malfunctions">
+<ul>
+<li><strong>Typo&nbsp;di malware</strong></li>
+<li><a href="#back-doors">Backdoor</a></li>
+
+<!--<li>
+<a href="#censorship">Censorship</a></li>-->
+<!--<li>
+<a href="#insecurity">Insecurity</a></li>-->
+<!--<li>
+<a href="#sabotage">Sabotage</a></li>-->
+<li><a href="#surveillance">Sorveglianza</a></li>
+<li><a href="#drm">DRM</a>  (che chiamiamo “Digital restrictions 
management”, in
+italiano, “gestione digitale delle restrizioni”) significa funzionalità
+volte a limitare il controllo che gli utenti hanno sui dati contenuti nei
+propri computer.</li>
+
+<!--<li>
+<a href="#jails">Jails</a>&mdash;systems
+    that impose censorship on application programs.</li>-->
+<!--<li>
+<a href="#tyrants">Tyrants</a>&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.</li>-->
+</ul>
+</div>
+</div>
 
+<h3 id="back-doors">Backdoor di Amazon Kindle "Swindle"</h3>
 <ul>
   <li><p>Il Kindle di Amazon ha una backdoor che è stata usata per <a
 
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>cancellare
@@ -46,7 +86,18 @@
 ha installato una vecchia versione del software nei Kindle</a> (che noi
 chiamiamo Swindle) degli utenti in modo che quelli di cui gli utenti avevano
 preso il controllo smettessero di funzionare.</p></li>
+</ul>
 
+<h3 id="surveillance">Sorveglianza di Amazon Kindle "Swindle"</h3>
+<ul>
+  <li><p>La Electronic Frontier Foundation ha esaminato e trovato <a
+href="https://www.eff.org/pages/reader-privacy-chart-2012";>vari tipi di
+sorveglianza nel Kindle (che noi chiamiamo Swindle) ed in altri lettori
+e-book</a>.</p></li>
+</ul>
+
+<h3 id="drm">DRM di Amazon Kindle "Swindle"</h3>
+<ul>
   <li><p><a href="http://science.opposingviews.com/kindle-drm-17841.html";>Il 
Kindle
 di Amazon ha il DRM</a>. Questo articolo è fallace perché non considera il
 DRM come una questione etica; dà per scontato che qualsiasi cosa Amazon
@@ -54,11 +105,6 @@
 digitale dei &ldquo;diritti&rdquo;, parola usata per manipolare l'opinione
 pubblica a favore del DRM. Ciò nonostante, l'articolo rimane una cronaca dei
 fatti.</p></li>
-
-  <li><p>La Electronic Frontier Foundation ha esaminato e trovato <a
-href="https://www.eff.org/pages/reader-privacy-chart-2012";>vari tipi di
-sorveglianza nel Kindle (che noi chiamiamo Swindle) ed in altri lettori
-e-book</a>.</p></li>
 </ul>
 
 <div class="translators-notes">
@@ -107,7 +153,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -124,9 +170,8 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -137,7 +182,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/04/15 13:02:28 $
+$Date: 2015/06/27 15:00:42 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/malware-mobiles.it.html 15 Apr 2015 13:02:32 -0000      1.1
+++ proprietary/malware-mobiles.it.html 27 Jun 2015 15:00:42 -0000      1.2
@@ -7,12 +7,21 @@
 <title>Malware nei dispositivi mobili - Progetto GNU - Free Software 
Foundation</title>
 
 <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+
+</style>
+
 <!--#include virtual="/server/banner.it.html" -->
 <h2>Malware nei dispositivi mobili</h2>
 
-<a href="/philosophy/proprietary.html">Altri esempi di malware
-proprietario</a>
+<p><a href="/philosophy/proprietary.html">Altri esempi di malware
+proprietario</a></p>
 
+<div class="highlight-para">
 <p>
 <em>Malware</em> significa software progettato per funzionare in modi che
 maltrattano o danneggiano l'utente. (Questo non include errori accidentali.)
@@ -28,28 +37,41 @@
 consapevoli dell'impossibilità da parte degli utenti di riparare eventuali
 funzionalità malevole, sono tentati ad imporne.
 </p>
+</div>
 
 <p>Ecco degli esempi di malware nei dispositivi mobili. Si prega di fare
 riferimento anche alla <a href="/philosophy/malware-apple.html">pagina del
 malware di Apple</a> per funzionalità malevole specifiche ai vari iGadget di
 Apple.</p>
 
+<div class="toc">
+<div class="malfunctions">
 <ul>
-  <li><p>Molte applicazioni proprietarie per dispositivi mobili comunicano agli
-autori la lista delle altre applicazioni installate dall'utente. <a
-href="http://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter lo sta
-facendo in maniera perlomeno visibile ed opzionale</a>. Altri programmi
-fanno di peggio.</p>
-  </li>
+<li><strong>Tipo&nbsp;di malware</strong></li>
+<li><a href="#back-doors">Backdoor</a></li>
 
-  <li><p>I cellulari con GPS invieranno la loro posizione geografica sotto 
comando
-remoto e gli utenti non possono fermarli: <a
-href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
-http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
-(Gli Stati Uniti affermano che in futuro tutti i cellulari dovranno essere
-muniti di GPS.)</p>
-  </li>
+<!--<li>
+<a href="#censorship">Censorship</a></li>-->
+<li><a href="#insecurity">Scarsa sicurezza</a></li>
+
+<!--<li>
+<a href="#sabotage">Sabotage</a></li>-->
+<li><a href="#surveillance">Sorveglianza</a></li>
+
+<!--<li>
+<a href="#drm">Digital restrictions
+    management</a> or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.</li>-->
+<li><a href="#jails">Prigioni</a>&mdash;sistemi che impongono restrizioni alle
+applicazioni.</li>
+<li><a href="#tyrants">Tiranni</a>&mdash;sistemi che vietano l'installazione di
+sistemi operativi non “autorizzati” dal produttore.</li>
+</ul>
+</div>
+</div>
 
+<h3 id="back-doors">Backdoor in dispositivi mobili</h3>
+<ul>
   <li><p>La maggior parte dei cellulari hanno una backdoor universale, che è 
stata
 usata per <a
 
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>renderli
@@ -63,6 +85,40 @@
 dispositivo.</p>
   </li>
 
+  <li><p><a 
href="/philosophy/proprietary/proprietary-back-doors.html#samsung">La
+backdoor di Samsung</a> fornisce accesso a qualsiasi file sul sistema.</p>
+  </li>
+
+  <li>
+  <p>In Android, <a
+href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>Google
+ha una backdoor per disinstallare applicazioni a distanza</a>. (Si trova
+all'interno di un programma chiamato GTalkService).
+  </p>
+
+  <p>
+  Google può anche <a
+href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>forzare
+l'installazione di programmi a distanza</a> tramite GTalkService (che pare
+sia diventato parte di Google Play dopo la pubblicazione
+dell'articolo). Questo ammonta ad una backdoor universale.
+  </p>
+
+  <p>
+  Anche se l'<em>esercizio</em> di questo potere da parte di Google non è
+stato finora malevolo, il punto è che nessuno dovrebbe avere tale potere,
+che potrebbe anche essere usato in maniera malevola. Si potrebbe benissimo
+decidere di permettere ad un servizio di sicurezza di cui ci si fida di
+<em>disattivare</em> a distanza programmi da esso considerati malevoli. Ma
+non c'è nessuna scusa per permettergli di <em>disinstallare</em> i
+programmi, e si dovrebbe avere il diritto di decidere in chi (ammesso che ci
+sia qualcuno) riporre questa fiducia.
+  </p>
+  </li>
+</ul>
+
+<h3 id="insecurity">Scarsa sicurezza in dispositivi mobili</h3>
+<ul>
   <li><p><a
 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>La
 NSA può intercettare dati in vari smartphone, tra cui iPhone, Android e
@@ -73,6 +129,24 @@
 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>molti
 bug nei programmi di radiocomunicazione dei telefoni</a>.</p>
   </li>
+</ul>
+
+<h3 id="surveillance">Sorveglianza in dispositivi mobili</h3>
+<ul>
+  <li><p>Molte applicazioni proprietarie per dispositivi mobili comunicano agli
+autori la lista delle altre applicazioni installate dall'utente. <a
+href="http://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter lo sta
+facendo in maniera perlomeno visibile ed opzionale</a>. Altri programmi
+fanno di peggio.</p>
+  </li>
+
+  <li><p>I cellulari con GPS invieranno la loro posizione geografica sotto 
comando
+remoto e gli utenti non possono fermarli: <a
+href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
+http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+(Gli Stati Uniti affermano che in futuro tutti i cellulari dovranno essere
+muniti di GPS.)</p>
+  </li>
 
   <li><p>Spyware nei telefoni VoIP di Cisco: <a
 href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
@@ -108,52 +182,26 @@
 applicazione riescono a ottenere un &ldquo;Sì, acconsento&rdquo; da parte
 degli utenti.</p>
   </li>
+</ul>
 
-  <li><p><a 
href="/philosophy/proprietary/proprietary-back-doors.html#samsung">La
-backdoor di Samsung</a> fornisce accesso a qualsiasi file sul sistema.</p>
-  </li>
-
-  <li>
-  <p>In Android, <a
-href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>Google
-ha una backdoor per disinstallare applicazioni a distanza</a>. (Si trova
-all'interno di un programma chiamato GTalkService).
-  </p>
-
-  <p>
-  Google può anche <a
-href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>forzare
-l'installazione di programmi a distanza</a> tramite GTalkService (che pare
-sia diventato parte di Google Play dopo la pubblicazione
-dell'articolo). Questo ammonta ad una backdoor universale.
-  </p>
-
-  <p>
-  Anche se l'<em>esercizio</em> di questo potere da parte di Google non è
-stato finora malevolo, il punto è che nessuno dovrebbe avere tale potere,
-che potrebbe anche essere usato in maniera malevola. Si potrebbe benissimo
-decidere di permettere ad un servizio di sicurezza di cui ci si fida di
-<em>disattivare</em> a distanza programmi da esso considerati malevoli. Ma
-non c'è nessuna scusa per permettergli di <em>disinstallare</em> i
-programmi, e si dovrebbe avere il diritto di decidere in chi (ammesso che ci
-sia qualcuno) riporre questa fiducia.
-  </p>
+<h3 id="jails">Prigioni in dispositivi mobili</h3>
+<ul>
+  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>I
+dispositivi mobili che hanno Windows 8 preinstallato sono tiranni</a>. <a
+href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>Windows
+8 sui &ldquo;dispositivi mobili&rdquo; è una prigione</a>.</p>
   </li>
+</ul>
 
+<h3 id="tyrants">Tiranni in dispositivi mobili</h3>
+<ul>
   <li><p><a
 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>Alcuni
 telefoni Android sono tiranni</a> (anche se qualcuno ha trovato un modo per
 aggirare la limitazione). Fortunatamente, la maggior parte dei dispositivi
 Android non sono tiranni.</p>
   </li>
-
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>I
-dispositivi mobili che hanno Windows 8 preinstallato sono tiranni</a>. <a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>Windows
-8 sui &ldquo;dispositivi mobili&rdquo; è una prigione</a>.</p>
-  </li>
 </ul>
-
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -200,7 +248,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -217,9 +265,8 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -230,7 +277,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/04/15 13:02:32 $
+$Date: 2015/06/27 15:00:42 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-insecurity.it.html  31 May 2015 23:58:03 -0000      
1.4
+++ proprietary/proprietary-insecurity.it.html  27 Jun 2015 15:00:43 -0000      
1.5
@@ -25,16 +25,31 @@
 possono fare niente per ripararle</em>.</p>
 
 <ul>
-  <li>
-    <p>Le pompe Hospira, che sono usate per somministrare farmaci ai pazienti, 
sono
+
+<li>
+<p>
+Le pompe Hospira, che sono usate per somministrare farmaci ai pazienti, sono
 state classificate come &ldquo;<a
 
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/";>il
 dispositivo IP meno sicuro mai visto</a>&rdquo; da un ricercatore in tema di
-sicurezza.</p>
-    <p>A seconda del tipo di farmaco che viene somministrato, questa 
insicurezza
-potrebbe consentire di perpetrare omicidi.</p>
-  </li>
-  <li>
+sicurezza.
+</p>
+<p>
+A seconda del tipo di farmaco che viene somministrato, questa insicurezza
+potrebbe consentire di perpetrare omicidi.
+</p>
+</li>
+
+<li>
+<p>
+I criminali informatici potrebbero sfruttare problemi di sicurezza in un
+erogatore di farmaci per <a
+href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>uccidere
+pazienti</a>.
+</p>
+</li>
+
+<li>
 <p>
 <a
 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>La
@@ -146,13 +161,13 @@
 <li>
 <p><a
 
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
-Molte applicazioni per smartphone usano metodi di autenticazione insicuri
-quando memorizzano i dati personali dell'utente nei servizi
-&ldquo;cloud&rdquo;</a> rendendo così vulnerabili informazioni come
-indirizzi e-mail, password e informazioni sullo stato di salute. Dato che
-queste applicazioni sono proprietarie è impossibile sapere di preciso quali
-siano a rischio.</p>
+Molte applicazioni per smartphone usano metodi di autenticazione
+insicuri</a> quando memorizzano i dati personali dell'utente su server
+remoti rendendo così vulnerabili informazioni come indirizzi e-mail,
+password e informazioni sullo stato di salute. Dato che queste applicazioni
+sono proprietarie è impossibile sapere di preciso quali siano a rischio.</p>
 </li>
+
 </ul>
 
 <div class="translators-notes">
@@ -230,7 +245,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/05/31 23:58:03 $
+$Date: 2015/06/27 15:00:43 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-apple.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/po/malware-apple.it-en.html     15 Apr 2015 13:03:04 -0000      
1.1
+++ proprietary/po/malware-apple.it-en.html     27 Jun 2015 15:00:43 -0000      
1.2
@@ -3,6 +3,12 @@
 <title>Apple's Operating Systems are Malware
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-apple.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Apple's Operating Systems Are Malware</h2>
 
@@ -31,8 +37,61 @@
 
 <p>Here's how Apple's systems are malware.</p>
 
+<div class="toc">
+<div class="malfunctions">
 <ul>
+<li><strong>Type&nbsp;of malware</strong></li>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a href="#censorship">Censorship</a></li>-->
+<!--<li><a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">Sabotage</a></li>
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+    management</a> or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.</li>
+<li><a href="#jails">Jails</a>&mdash;systems
+    that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Apple Back Doors</h3>
+<ul>
+  <li><p>The iPhone has a back door <a
+  
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
+  that allows Apple to remotely delete apps</a> which Apple considers
+  &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
+  power because of course we can trust Apple.</p>
+  </li>
+
+  <li><p>The iPhone has a back door for <a
+  
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+  remote wipe</a>.  It's not always enabled, but users are led into
+  enabling it without understanding.</p>
+  </li>
+</ul>
+
+<h3 id="sabotage">Apple Sabotage</h3>
+<ul>
+  <li><p><a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
+  An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
+  unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
+  not approved by <a href="/philosophy/proprietary-jails.html">Apple
+  censorship</a>.  All this was apparently intentional.</p>
+  </li>
 
+  <li><p>Apple
+  <a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
+  deleted from iPods the music that users had got from internet music
+  stores that competed with iTunes</a>.</p>
+  </li>
+</ul>
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<ul>
   <li><p><a 
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/";>
   MacOS automatically sends to Apple servers unsaved documents being 
   edited</a>. The <a 
@@ -70,28 +129,6 @@
   more snooping that Apple has not talked about</a>.</p>
   </li>
   
-  <li><p><a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html";>
-  iOS, the operating system of the Apple iThings, is a jail for
-   users.</a>  That means it imposes censorship of application programs.</p>
-
-  <p>Apple has used this power to 
-  <a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
-  censor all bitcoin apps</a> for the iThings.</p>
-
-  <p>Apple, in the iThings, pioneered the practice of general purpose
-  computers that are jails, and the term comes from iThing users, who
-  referred to escaping from the censorship as &ldquo;jailbreaking.&rdquo;</p>
-
-  <p>Here is an article about the <a 
-  href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";> 
-  code signing</a> that the iThings use to jail the user.</p>
-  </li>
-
-  <li><p>Apple arbitrarily 
-  <a href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>
-  blocks users from installing old versions of iOS</a>.</p>
-  </li>
-
   <li><p><a 
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services";>
   Several &ldquo;features&rdquo; of iOS seem to exist for no possible 
   purpose other than surveillance</a>.  Here is the <a 
@@ -105,14 +142,20 @@
   get other info too.</p>
   </li>
 
-  <li><p>The iThings are tyrant devices: they do not permit
-  installing a different or modified operating system.  There is a
-  port of Android to the iThings, but installing it
-  requires <a href="http://www.idroidproject.org/wiki/Status";>
-  finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to
-  install a different system.</p>
+  <li><p>Apple can, and regularly does, <a
+  
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
+  remotely extract some data from iPhones for the state</a>.
+  </p>
+  <p>This may have improved with
+  <a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>
+  iOS 8 security improvements</a>; but
+  <a href="https://firstlook.org/theintercept/?p=5199";>
+  not as much as Apple claims</a>.</p>
   </li>
+</ul>
 
+<h3 id="drm">Apple DRM</h3>
+<ul>
   <li><p><a 
   
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm";>
   DRM (digital restrictions mechanisms) in MacOS</a>. This article 
@@ -125,50 +168,47 @@
   <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/";>
   DRM that caters to Bluray disks</a>.  (The article focused on Windows
   and said that MacOS would do the same thing subsequently.)</p></li>
+</ul>
    
-  <li><p>The iPhone has a back door <a 
-  
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
-  that allows Apple to remotely delete apps</a> which Apple considers 
-  &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this 
-  power because of course we can trust Apple.</p>
-  </li>
-
-  <li><p>The iPhone has a back door for <a 
-  
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
-  remote wipe</a>.  It's not always enabled, but users are led into 
-  enabling it without understanding.</p>
-  </li>
+<h3 id="jails">Apple Jails</h3>
+<ul>
+  <li><p><a 
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html";>
+  iOS, the operating system of the Apple iThings, is a jail for
+   users.</a>  That means it imposes censorship of application programs.</p>
 
-  <li><p><a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
-  An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
-  unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
-  not approved by <a href="/philosophy/proprietary-jails.html">Apple
-  censorship</a>.  All this was apparently intentional.</p>
-  </li>
+  <p>Apple has used this power to
+  <a 
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html";>
+  censor all bitcoin apps</a> for the iThings.</p>
 
-  <li><p>Apple can, and regularly does, <a 
-  
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/";>
-  remotely extract some data from iPhones for the state</a>.
-  </p>
-  <p>This may have improved with 
-  <a 
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html";>
-  iOS 8 security improvements</a>; but 
-  <a href="https://firstlook.org/theintercept/?p=5199";>
-  not as much as Apple claims</a>.</p>
-  </li>
+  <p>Apple, in the iThings, pioneered the practice of general purpose
+  computers that are jails, and the term comes from iThing users, who
+  referred to escaping from the censorship as &ldquo;jailbreaking.&rdquo;</p>
 
-  <li><p>Apple 
-  <a 
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs";>
-  deleted from iPods the music that users had got from internet music 
-  stores that competed with iTunes</a>.</p>
+  <p>Here is an article about the <a
+  href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/";>
+  code signing</a> that the iThings use to jail the user.</p>
   </li> 
 
   <li><p><a 
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans";>
   More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
   </li>
-
 </ul>
 
+<h3 id="tyrants">Apple Tyrants</h3>
+<ul>
+  <li><p>Apple arbitrarily
+  <a href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";>
+  blocks users from installing old versions of iOS</a>.</p>
+  </li>
+
+  <li><p>The iThings are tyrant devices: they do not permit
+  installing a different or modified operating system.  There is a
+  port of Android to the iThings, but installing it
+  requires <a href="http://www.idroidproject.org/wiki/Status";>
+  finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to
+  install a different system.</p>
+  </li>
+</ul>
 </div><!-- for id="content", starts in the include above -->
 
 <!--#include virtual="/server/footer.html" -->
@@ -202,7 +242,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -220,14 +260,14 @@
 <p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/04/15 13:03:04 $
+$Date: 2015/06/27 15:00:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/malware-apple.it.po  27 Jun 2015 14:41:03 -0000      1.3
+++ proprietary/po/malware-apple.it.po  27 Jun 2015 15:00:43 -0000      1.4
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-26 18:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -467,12 +466,7 @@
 msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: proprietary/po/malware-kindle-swindle.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-kindle-swindle.it-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/po/malware-kindle-swindle.it-en.html    15 Apr 2015 13:03:07 
-0000      1.1
+++ proprietary/po/malware-kindle-swindle.it-en.html    27 Jun 2015 15:00:43 
-0000      1.2
@@ -3,6 +3,12 @@
 <title>Malware in the Kindle Swindle
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-kindle-swindle.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in the Kindle Swindle</h2>
 
@@ -14,6 +20,7 @@
 management (DRM)</a>  and <a href="/philosophy/ebooks.html"> 
 other malicious functionalities</a>.</p>
 
+<div class="highlight-para">
 <p>
 Malware and nonfree software are two different issues.  Malware means
 the program is designed to mistreat or harm users when it runs.  The
@@ -26,7 +33,30 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 </p>
+</div>
 
+<div class="toc">
+<div class="malfunctions">
+<ul>
+<li><strong>Type&nbsp;of malware</strong></li>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a href="#censorship">Censorship</a></li>-->
+<!--<li><a href="#insecurity">Insecurity</a></li>-->
+<!--<li><a href="#sabotage">Sabotage</a></li>-->
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+    management</a> or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.</li>
+<!--<li><a href="#jails">Jails</a>&mdash;systems
+    that impose censorship on application programs.</li>-->
+<!--<li><a href="#tyrants">Tyrants</a>&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.</li>-->
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
 <ul>
   <li><p>The Amazon Kindle has a back door that has been used to <a 
   
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/";>
@@ -39,7 +69,17 @@
   <p>Amazon <a 
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml";>
       downgraded the software in users' Swindles</a>
     so that those already rooted would cease to function at all.</p></li>
+</ul>
+
+<h3 id="surveillance">Amazon Kindle Swindle Surveillance</h3>
+<ul>
+  <li><p>The Electronic Frontier Foundation has examined and found <a
+  href="https://www.eff.org/pages/reader-privacy-chart-2012";>various kinds of
+  surveillance in the Swindle and other e-readers</a>.</p></li>
+</ul>
 
+<h3 id="drm">Amazon Kindle Swindle DRM</h3>
+<ul>
   <li><p><a href="http://science.opposingviews.com/kindle-drm-17841.html";>
   The Amazon Kindle has DRM</a>. That article is flawed in that it
   fails to treat DRM as an ethical question; it takes for granted that
@@ -47,10 +87,6 @@
   as digital &ldquo;rights&rdquo; management, which is the spin term
   used to promote DRM. Nonetheless it serves as a reference for the 
   facts.</p></li>
-
-  <li><p>The Electronic Frontier Foundation has examined and found <a 
-  href="https://www.eff.org/pages/reader-privacy-chart-2012";>various kinds of 
-  surveillance in the Swindle and other e-readers</a>.</p></li>
 </ul>
 
 </div><!-- for id="content", starts in the include above -->
@@ -85,7 +121,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -103,14 +139,14 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/04/15 13:03:07 $
+$Date: 2015/06/27 15:00:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-kindle-swindle.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-kindle-swindle.it.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/malware-kindle-swindle.it.po 27 Jun 2015 14:41:03 -0000      
1.3
+++ proprietary/po/malware-kindle-swindle.it.po 27 Jun 2015 15:00:43 -0000      
1.4
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-26 18:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -141,9 +140,7 @@
 "www.eff.org/pages/reader-privacy-chart-2012\">vari tipi di sorveglianza nel "
 "Kindle (che noi chiamiamo Swindle) ed in altri lettori e-book</a>."
 
-# | [-Malware in the-]{+Amazon+} Kindle Swindle {+DRM+}
 #. type: Content of: <h3>
-#| msgid "Malware in the Kindle Swindle"
 msgid "Amazon Kindle Swindle DRM"
 msgstr "DRM di Amazon Kindle \"Swindle\""
 
@@ -214,12 +211,7 @@
 msgid "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/malware-microsoft.it.po      27 Jun 2015 14:41:03 -0000      
1.10
+++ proprietary/po/malware-microsoft.it.po      27 Jun 2015 15:00:43 -0000      
1.11
@@ -28,13 +28,7 @@
 msgid "Microsoft's Software is Malware"
 msgstr "Il software di Microsoft è malware"
 
-# | <a [-href=\"/philosophy/proprietary.html\">Other-]
-# | {+href=\"https://gnu.org/philosophy/proprietary.html\";>Other+} examples of
-# | proprietary malware</a>
 #. type: Content of: <p>
-#| msgid ""
-#| "<a href=\"/philosophy/proprietary.html\">Other examples of proprietary "
-#| "malware</a>"
 msgid ""
 "<a href=\"https://gnu.org/philosophy/proprietary.html\";>Other examples of "
 "proprietary malware</a>"
@@ -52,28 +46,7 @@
 "maltrattano o danneggiano l'utente. (Questo non include errori accidentali.) "
 "Questa pagina spiega come il software di Microsoft sia malware."
 
-# | Malware and nonfree software are two different issues.  The difference
-# | between <a [-href=\"/philosophy/free-sw.html\">free-]
-# | {+href=\"https://gnu.org/philosophy/free-sw.html\";>free+} software</a> and
-# | nonfree software is in <a
-# | [-href=\"/philosophy/free-software-even-more-important.html\">-]
-# | 
{+href=\"https://gnu.org/philosophy/free-software-even-more-important.html\";>+}
-# | whether the users have control of the program or vice versa</a>.  It's not
-# | directly a question of what the program <em>does</em> when it runs.
-# | However, in practice nonfree software is often malware, because the
-# | developer's awareness that the users would be powerless to fix any
-# | malicious functionalities tempts the developer to impose some.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "Malware and nonfree software are two different issues.  The difference "
-#| "between <a href=\"/philosophy/free-sw.html\">free software</a> and "
-#| "nonfree software is in <a href=\"/philosophy/free-software-even-more-"
-#| "important.html\"> whether the users have control of the program or vice "
-#| "versa</a>.  It's not directly a question of what the program <em>does</"
-#| "em> when it runs.  However, in practice nonfree software is often "
-#| "malware, because the developer's awareness that the users would be "
-#| "powerless to fix any malicious functionalities tempts the developer to "
-#| "impose some."
 msgid ""
 "Malware and nonfree software are two different issues.  The difference "
 "between <a href=\"https://gnu.org/philosophy/free-sw.html\";>free software</"
@@ -160,16 +133,7 @@
 "Ulteriori informazioni su quando <a href=\"http://slated.org/";
 "windows_by_stealth_the_updates_you_dont_want\">è stata usata</a>."
 
-# | In Windows 10, the universal back door is no longer hidden; all
-# | [-&ldquo;upgrades&ldquo;-] {+“upgrades“+} will be <a
-# | 
href=\"http://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=1&amp;articleid=42633691&amp;source=googleplus\";>forcibly
-# | and immediately imposed</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "In Windows 10, the universal back door is no longer hidden; all &ldquo;"
-#| "upgrades&ldquo; will be <a href=\"http://www.appy-geek.com/Web/ArticleWeb.";
-#| "aspx?regionid=1&amp;articleid=42633691&amp;source=googleplus\">forcibly "
-#| "and immediately imposed</a>."
+#. type: Content of: <ul><li><p>
 msgid ""
 "In Windows 10, the universal back door is no longer hidden; all 
“upgrades“ "
 "will be <a href=\"http://www.appy-geek.com/Web/ArticleWeb.aspx?";
@@ -216,9 +180,7 @@
 "not-to-use-windows-8-linked-to-nsa/\">far concludere al governo tedesco che "
 "non ci si possa fidare di questo</a>."
 
-# | [-Microsoft's Software is Malware-]{+Microsoft Sabotage+}
 #. type: Content of: <h3>
-#| msgid "Microsoft's Software is Malware"
 msgid "Microsoft Sabotage"
 msgstr "Sabotaggio di Microsoft"
 
@@ -266,9 +228,7 @@
 "quindi non è libera di chiedere a qualcun altro di lavorare al programma in "
 "sua vece."
 
-# | [-Microsoft's Software is Malware-]{+Microsoft Surveillance+}
 #. type: Content of: <h3>
-#| msgid "Microsoft's Software is Malware"
 msgid "Microsoft Surveillance"
 msgstr "Sorveglianza di Microsoft"
 
@@ -347,19 +307,7 @@
 msgid "Microsoft DRM"
 msgstr "DRM di Microsoft"
 
-# | <a href=\"http://arstechnica.com/apple/2007/08/aacs-tentacles/\";> DRM
-# | (digital restrictions mechanisms) in Windows</a>, introduced to cater to
-# | <a [-href=\"/philosophy/proprietary-drm.html#bluray\">Bluray</a>-]
-# | 
{+href=\"https://gnu.org/philosophy/proprietary-drm.html#bluray\";>Bluray</a>+}
-# | disks.  (The article also talks about how the same malware would later be
-# | introduced in MacOS.)
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://arstechnica.com/apple/2007/08/aacs-tentacles/\";> DRM "
-#| "(digital restrictions mechanisms) in Windows</a>, introduced to cater to "
-#| "<a href=\"/philosophy/proprietary-drm.html#bluray\">Bluray</a> disks.  "
-#| "(The article also talks about how the same malware would later be "
-#| "introduced in MacOS.)"
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"http://arstechnica.com/apple/2007/08/aacs-tentacles/\";> DRM "
 "(digital restrictions mechanisms) in Windows</a>, introduced to cater to <a "
@@ -377,15 +325,7 @@
 msgid "Microsoft Jails"
 msgstr "Prigioni di Microsoft"
 
-# | <a
-# | 
href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown\";>
-# | Windows 8 on [-&ldquo;mobile devices&rdquo;-] {+“mobile devices”+} is a
-# | jail</a>: it censors the user's choice of application programs.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
-#| "app-store-lockdown\"> Windows 8 on &ldquo;mobile devices&rdquo; is a "
-#| "jail</a>: it censors the user's choice of application programs."
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-";
 "app-store-lockdown\"> Windows 8 on “mobile devices” is a jail</a>: it "

Index: proprietary/po/malware-mobiles.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/po/malware-mobiles.it-en.html   15 Apr 2015 13:03:14 -0000      
1.1
+++ proprietary/po/malware-mobiles.it-en.html   27 Jun 2015 15:00:43 -0000      
1.2
@@ -3,12 +3,19 @@
 <title>Malware in Mobile Devices
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in Mobile Devices</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary
-malware</a>
+<p><a href="/philosophy/proprietary.html">Other examples of proprietary
+malware</a></p>
 
+<div class="highlight-para">
 <p>
 <em>Malware</em> means software designed to function in ways that
 mistreat or harm the user.  (This does not include accidental errors.)
@@ -25,27 +32,35 @@
 the developer's awareness that the users would be powerless to fix any
 malicious functionalities tempts the developer to impose some.
 </p>
+</div>
 
 <p>Here are examples of malware in mobile devices.  See also
 the <a href="/philosophy/malware-apple.html">the Apple malware
 page</a> for malicious functionalities specific to the Apple iThings.</p>
 
+<div class="toc">
+<div class="malfunctions">
 <ul>
-  <li><p>Many proprietary apps for mobile devices report which other
-       apps the user has
-       installed.  <a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter
-       is doing this in a way that at least is visible and
-       optional</a>. Not as bad as what the others do.</p>
-  </li>
-
-  <li><p>Portable phones with GPS will send their GPS location on remote
-  command and users cannot stop them: <a
-  
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
-  
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
-  (The US says it will eventually require all new portable phones to have
-  GPS.)</p>
-  </li>
+<li><strong>Type&nbsp;of malware</strong></li>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a href="#censorship">Censorship</a></li>-->
+<li><a href="#insecurity">Insecurity</a></li>
+<!--<li><a href="#sabotage">Sabotage</a></li>-->
+<li><a href="#surveillance">Surveillance</a></li>
+<!--<li><a href="#drm">Digital restrictions
+    management</a> or &ldquo;DRM&rdquo; means functionalities designed
+    to restrict what users can do with the data in their computers.</li>-->
+<li><a href="#jails">Jails</a>&mdash;systems
+    that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>&mdash;systems
+    that reject any operating system not &ldquo;authorized&rdquo; by the
+    manufacturer.</li>
+</ul>
+</div>
+</div>
 
+<h3 id="back-doors">Mobile Back Doors</h3>
+<ul>
   <li><p>Most mobile phones have a universal back door, which has been
   used to <a
   
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html";>
@@ -58,6 +73,39 @@
   device.</p>
   </li>
 
+  <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+  Samsung's back door</a> provides access to any file on the system.</p>
+  </li>
+
+  <li>
+  <p>In Android, <a
+  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
+  Google has a back door to remotely delete apps.</a>  (It is in a program
+  called GTalkService).
+  </p>
+
+  <p>
+  Google can
+  also <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>forcibly
+  and remotely install apps</a> through GTalkService (which seems, since
+  that article, to have been merged into Google Play).  This adds up to
+  a universal back door.
+  </p>
+
+  <p>
+  Although Google's <em>exercise</em> of this power has not been
+  malicious so far, the point is that nobody should have such power,
+  which could also be used maliciously.  You might well decide to let a
+  security service remotely <em>deactivate</em> programs that it
+  considers malicious.  But there is no excuse for allowing it
+  to <em>delete</em> the programs, and you should have the right to
+  decide who (if anyone) to trust in this way.
+  </p>
+  </li>
+</ul>
+
+<h3 id="insecurity">Mobile Insecurity</h3>
+<ul>
   <li><p><a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
   The NSA can tap data in smart phones, including iPhones, Android, and
   BlackBerry</a>. While there is not much detail here, it seems that this
@@ -66,6 +114,24 @@
   <a 
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone";>
   lots of bugs in the phones' radio software</a>.</p>
   </li>
+</ul>
+
+<h3 id="surveillance">Mobile Surveillance</h3>
+<ul>
+  <li><p>Many proprietary apps for mobile devices report which other
+  apps the user has
+  installed.  <a 
href="http://techcrunch.com/2014/11/26/twitter-app-graph/";>Twitter
+  is doing this in a way that at least is visible and
+  optional</a>. Not as bad as what the others do.</p>
+  </li>
+
+  <li><p>Portable phones with GPS will send their GPS location on remote
+  command and users cannot stop them: <a
+  
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers";>
+  
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+  (The US says it will eventually require all new portable phones to have
+  GPS.)</p>
+  </li>
 
   <li><p>Spyware in Cisco TNP IP phones: <a
   href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
@@ -98,42 +164,10 @@
   <p>Don't be distracted by the question of whether the app developers get
   users to say &ldquo;I agree&rdquo;. That is no excuse for malware.</p>
   </li>
+</ul>
 
-  <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
-  Samsung's back door</a> provides access to any file on the system.</p>
-  </li>
-
-  <li>
-  <p>In Android, <a
-  
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html";>
-  Google has a back door to remotely delete apps.</a>  (It is in a program
-  called GTalkService).
-  </p>
-
-  <p>
-  Google can
-  also <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>forcibly
-  and remotely install apps</a> through GTalkService (which seems, since
-  that article, to have been merged into Google Play).  This adds up to
-  a universal back door.
-  </p>
-
-  <p>
-  Although Google's <em>exercise</em> of this power has not been
-  malicious so far, the point is that nobody should have such power,
-  which could also be used maliciously.  You might well decide to let a
-  security service remotely <em>deactivate</em> programs that it
-  considers malicious.  But there is no excuse for allowing it
-  to <em>delete</em> the programs, and you should have the right to
-  decide who (if anyone) to trust in this way.
-  </p>
-  </li>
-
-  <li><p><a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
-  Some Android phones are tyrants</a> (though someone found a way to crack
-  the restriction). Fortunately, most Android devices are not tyrants.</p>
-  </li>
-
+<h3 id="jails">Mobile Jails</h3>
+<ul>
   <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
   Mobile devices that come with Windows 8 are tyrants</a>. <a
   
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
@@ -141,6 +175,13 @@
   </li>
 </ul>
 
+<h3 id="tyrants">Mobile Tyrants</h3>
+<ul>
+  <li><p><a 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
+  Some Android phones are tyrants</a> (though someone found a way to crack
+  the restriction). Fortunately, most Android devices are not tyrants.</p>
+  </li>
+</ul>
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -173,7 +214,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -191,14 +232,14 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/04/15 13:03:14 $
+$Date: 2015/06/27 15:00:43 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-mobiles.it.po        27 Jun 2015 14:41:03 -0000      
1.4
+++ proprietary/po/malware-mobiles.it.po        27 Jun 2015 15:00:43 -0000      
1.5
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-26 18:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -396,12 +395,7 @@
 msgid "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: proprietary/po/proprietary-insecurity.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-insecurity.it-en.html    31 May 2015 23:58:04 
-0000      1.4
+++ proprietary/po/proprietary-insecurity.it-en.html    27 Jun 2015 15:00:44 
-0000      1.5
@@ -20,17 +20,30 @@
 are helpless to fix them</em>.</p>
 
 <ul>
-  <li>
-    <p>Hospira infusion pumps, which are used to administer drugs to
-      a patient, were rated
-      &ldquo;<a
+
+<li>
+<p>
+Hospira infusion pumps, which are used to administer drugs to
+a patient, were rated
+&ldquo;<a
 
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/";>least
-      secure IP device I've ever seen</a>&rdquo;
-      by a security researcher.</p>
-    <p>Depending on what drug is being infused, the insecurity could
-      open the door to murder.</p>
-  </li>
-  <li>
+secure IP device I've ever seen</a>&rdquo;
+by a security researcher.
+</p>
+<p>
+Depending on what drug is being infused, the insecurity could
+open the door to murder.
+</p>
+</li>
+
+<li>
+<p>
+Due to bad security in a drug pump, crackers could use it to
+<a 
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/";>kill
 patients</a>.
+</p>
+</li>
+
+<li>
 <p>
 <a 
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html";>
 The NSA can tap data in smart phones, including iPhones, Android, and
@@ -131,10 +144,11 @@
 <li>
 <p><a 
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html";>
 Many smartphone apps use insecure authentication methods when storing
-your personal data in &ldquo;cloud&rdquo; services.</a>
+your personal data on remote servers.</a>
 This leaves personal information like email addresses, passwords, and health 
information vulnerable. Because many
 of these apps are proprietary it makes it hard to impossible to know which 
apps are at risk.</p>
 </li>
+
 </ul>
 
 </div><!-- for id="content", starts in the include above -->
@@ -194,7 +208,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/05/31 23:58:04 $
+$Date: 2015/06/27 15:00:44 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-insecurity.it.po 27 Jun 2015 14:41:03 -0000      
1.22
+++ proprietary/po/proprietary-insecurity.it.po 27 Jun 2015 15:00:44 -0000      
1.23
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-06-03 13:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -255,22 +254,7 @@
 "archiviazione di massa</a>. Questo rende ogni sistema vulnerabile ad "
 "attacchi persistenti e non individuabili tramite i normali metodi forensi."
 
-# | <a
-# | 
href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\";>
-# | Many smartphone apps use insecure authentication methods when storing your
-# | personal data [-in &ldquo;cloud&rdquo; services.</a>-] {+on remote
-# | servers.</a>+} This leaves personal information like email addresses,
-# | passwords, and health information vulnerable. Because many of these apps
-# | are proprietary it makes it hard to impossible to know which apps are at
-# | risk.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-";
-#| "millions-users.html\"> Many smartphone apps use insecure authentication "
-#| "methods when storing your personal data in &ldquo;cloud&rdquo; services.</"
-#| "a> This leaves personal information like email addresses, passwords, and "
-#| "health information vulnerable. Because many of these apps are proprietary "
-#| "it makes it hard to impossible to know which apps are at risk."
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-";
 "users.html\"> Many smartphone apps use insecure authentication methods when "

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-surveillance.it.po       27 Jun 2015 14:41:03 
-0000      1.10
+++ proprietary/po/proprietary-surveillance.it.po       27 Jun 2015 15:00:44 
-0000      1.11
@@ -249,10 +249,10 @@
 "E c'è una <a href=\"http://www.marketoracle.co.uk/Article40836.html\";>chiave 
"
 "segreta dell'NSA in Windows</a>, le cui funzioni sono a noi ignote."
 
+#. type: Content of: <p>
 # | {+Microsoft's snooping on users did not start with Windows 10.+}  There's
 # | a lot more <a href=\"/philosophy/proprietary/malware-microsoft.html\">
 # | Microsoft malware</a>.
-#. type: Content of: <p>
 #, fuzzy
 #| msgid ""
 #| "There's a lot more <a href=\"/philosophy/proprietary/malware-microsoft."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]