[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.ja.html malware-k...
From: |
GNUN |
Subject: |
www/proprietary malware-apple.ja.html malware-k... |
Date: |
Mon, 06 Jul 2015 02:28:13 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/07/06 02:28:13
Modified files:
proprietary : malware-apple.ja.html
malware-kindle-swindle.ja.html
malware-microsoft.ja.html
malware-mobiles.ja.html
proprietary/po : malware-apple.ja-en.html malware-apple.ja.po
malware-kindle-swindle.ja-en.html
malware-kindle-swindle.ja.po
malware-microsoft.ja-en.html
malware-microsoft.ja.po
malware-mobiles.ja-en.html
malware-mobiles.ja.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ja.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.ja.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ja.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ja.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-kindle-swindle.ja-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-kindle-swindle.ja.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.6&r2=1.7
Patches:
Index: malware-apple.ja.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ja.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-apple.ja.html 3 Jun 2015 02:58:17 -0000 1.2
+++ malware-apple.ja.html 6 Jul 2015 02:28:10 -0000 1.3
@@ -7,6 +7,14 @@
<title>Appleã®ãªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã ã¯ãã«ã¦ã§ã¢ã -
GNUããã¸ã§ã¯ã -
ããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³</title>
<!--#include virtual="/proprietary/po/malware-apple.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+
+</style>
+
<!--#include virtual="/server/banner.ja.html" -->
<h2>Appleã®ãªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã ã¯ãã«ã¦ã§ã¢ã </h2>
@@ -27,8 +35,54 @@
<p>Appleã®ã·ã¹ãã
ãã©ããªã«ãã«ã¦ã§ã¢ããããã«èª¬æãã¾ãã</p>
+<div class="toc">
+<div class="malfunctions">
<ul>
+<li><strong>ãã«ã¦ã§ã¢ã®ã¿ã¤ã</strong></li>
+<li><a href="#back-doors">ããã¯ãã¢</a></li>
+
+<!--<li>
+<a href="#censorship">Censorship</a></li>-->
+<!--<li>
+<a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">妨害</a></li>
+
+<!--<li>
+<a href="#interference">Interference</a></li>-->
+<li><a href="#surveillance">ç£è¦</a></li>
+<li><a
+href="#drm">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯ã¦ã¼ã¶ããã®ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã</li>
+<li><a
href="#jails">ç¢ç</a>—ã¢ããªã±ã¼ã·ã§ã³ã»ããã°ã©ã
ã®æ¤é²ãå¼·è¦ããã·ã¹ãã ã</li>
+<li><a
href="#tyrants">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
ãæ絶ããã·ã¹ãã ã</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Appleã®ããã¯ãã¢</h3>
+<ul>
+
<li><p>iPhoneã¯ããã¯ãã¢ãæããAppleããä¸é©åãã¨èãã<a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">ã¢ããªãAppleãé
éã§åé¤ãããã¨ãå¯è½ã¨ãã¾ã</a>ãã¸ã§ããºã¯ãããããã¡ã¯Appleãä¿¡é
¼ã§ããã®ã§Appleããã®åãæããã®ã¯ããã
ããã¨è¨ã£ã¦ã¾ãã</p>
+ </li>
+
+ <li><p>iPhoneã¯<a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">é
éæé¤</a>ã®ããã®ããã¯ãã¢ãæãã¦ãã¾ãã常ã«æå¹ã¨ãªã£ã¦ããããã§ã¯ããã¾ããããã¦ã¼ã¶ã¯ç解ããªãã¾ã¾ã«æå¹ã¨ããããã«ä»åãããã¾ãã</p>
+ </li>
+</ul>
+<h3 id="sabotage">Appleã®å¦¨å®³</h3>
+<ul>
+ <li><p><a
+href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">Appleã®ãã¡ã¼ã
ã¦ã§ã¢ãã¢ããã°ã¬ã¼ããã¯ã¢ã³ããã¯ããã¦ããiPhonesãå£ãã¦ãã¾ãã¾ãã</a>ããã¢ããã°ã¬ã¼ããã¯<a
+href="/philosophy/proprietary-jails.html">Appleã®æ¤é²</a>ã«ãã£ã¦æ¿èªããã¦ããªãã¢ããªã±ã¼ã·ã§ã³ãåæ¢ããã¾ãããããã¯æããã«ãã¹ã¦æå³çã§ãã</p>
+ </li>
+
+ <li><p>Apple<a
+href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">ã¯iPodsããã¦ã¼ã¶ãiTunesã¨ç«¶äºããã¤ã³ã¿ã¼ãããé³æ¥½ã¹ãã¢ããè³¼å
¥ãé³æ¥½ãåé¤ãã¾ãã</a>ã</p>
+ </li>
+</ul>
+
+<h3 id="surveillance">Appleã®ç£è¦</h3>
+<ul>
<li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">MacOSã¯èªåçã«Appleã®ãµã¼ãã«ä¿åããã¦ããªãç·¨éä¸ã®ææ¸ãéä¿¡ãã¾ã</a>ã<a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">ä¿åããã決ãã¦ããªããã®ã¯ãã¡ã¤ã«ã«ä¿ç®¡ãããã®ãããããããªã±ã¼ãã§ã</a>ã</p>
@@ -54,23 +108,6 @@
</li>
<li><p><a
-href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">Apple
-iThingsã®ãªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
iOSã¯ã¦ã¼ã¶ã«ã¨ã£ã¦ç¢çã§ãã</a>
ã¤ã¾ããããã¯ãã¢ããªã±ã¼ã·ã§ã³ããã°ã©ã
ã®æ¤é²ãå¼·è¦ãã¾ãã</p>
-
- <p>Appleã¯ãã®åãiThingsã®<a
-href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">ãã¹ã¦ã®bitcoinã¢ããªãæ¤é²ãã</a>ã®ã«ä½¿ãã¾ããã</p>
-
-
<p>Appleã¯iThingsã«ããã¦ç¢çã§ããä¸è¬ç®çã®ã³ã³ãã¥ã¼ã¿ã®æ
£ç¿ãéæããiThingã®ã¦ã¼ã¶ã¯ãç¢çç
´ããã®ç¨èªãæ¤é²ããéãããã¨ãããã¦ä½¿ãããã«ãªãã¾ããã</p>
-
- <p>ãã¡ãã«<a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">ã³ã¼ãç½²å</a>ã«ã¤ãã¦ã®è¨äºãããã¾ãããããiThingsãã¦ã¼ã¶ãç¢çã«å
¥ããã®ã«ä½¿ããã®ã§ãã</p>
- </li>
-
- <li><p>Appleã¯æ£æçã«<a
-href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">ã¦ã¼ã¶ãiOSã®å¤ããã¼ã¸ã§ã³ãã¤ã³ã¹ãã¼ã«ããã®ããããã¯ãã¾ã</a>ã</p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">iOSã®ããã¤ãã®ãæ©è½ããåå¨ããããã¯ç£è¦ä»¥å¤ã®ããããç®çããªããããªãã®ã§ã</a>ããã¡ãã<a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf">æè¡çãªè§£èª¬ã§ã</a>ã</p>
</li>
@@ -79,51 +116,58 @@
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">iBeacon</a>ã¯iThingãæ£ç¢ºã«ã©ãã«ããããããã¦ã»ãã®æ
å ±ãåºã«ç¥ããã¾ãã</p>
</li>
- <li><p>iThingsã¯æ´åã®ããã¤ã¹ã§ã:
-ç°ãªãããããã¯å¤æ´ãããªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ãããã¨ãèªãã¾ãããAndroidãiThingsã«ç§»æ¤ãããã®ãããã¾ãããã¤ã³ã¹ãã¼ã«ããã«ã¯<a
-href="http://www.idroidproject.org/wiki/Status">
-ãã°ãããã¯ãå©æ´»ç¨ããã¿ã¤ã</a>ã¦ãç°ãªãã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ã§ããããã«ããå¿
è¦ãããã¾ãã</p>
+ <li><p>Appleã¯<a
+href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">é
éæä½ã§iPhonesããå½å®¶ã®ããã«ãããã¼ã¿ãæ½åºãã</a>ãã¨ãå¯è½ã§ãæ¥å¸¸çã«è¡ã£ã¦ãã¾ãã
+ </p>
+ <p>ããã¯<a
+href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">iOS
+8ã®ã»ãã¥ãªãã£æ¹å</a>ã§æ¹åããã¾ãããã<a
+href="https://firstlook.org/theintercept/?p=5199">Appleã主張ããã®ã¨åããããã®éã§ã¯ããã¾ãã</a>ã</p>
</li>
+</ul>
+<h3 id="drm">Appleã®DRM</h3>
+<ul>
<li><p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">MacOSã®DRM(ãã£ã¸ã¿ã«å¶éæ©æ§)</a>ããã®è¨äºã¯Macbookã®æ°ããã¢ãã«ãã¢ãã¿ã«æªæã®ãã¼ãã¦ã§ã¢ãæããè¦æ±ãå°å
¥ããã¨ããäºå®ã«ç¦ç¹ãå½ã¦ã¦ãã¾ããããããMacOSã®DRMã½ããã¦ã§ã¢ã¯ãã®ãã¼ãã¦ã§ã¢ãæå¹ã«ããã®ã«é¢ä¿ãã¦ãã¾ããiTunesã«ã¢ã¯ã»ã¹ããã½ããã¦ã§ã¢ã責任ãããã¾ãã</p>
</li>
<li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">ãã«ã¼ã¬ã¤ã®ãã£ã¹ã¯ãæä¾ããDRM</a>ã(ãã®è¨äºã¯ã¦ã£ã³ãã¦ãºã«ç¦ç¹ããã¦ã¦ãããMacOSãåããã¨ãç¶ãã¦ããã
ããã¨è¨ã£ã¦ã¾ãã)</p></li>
+</ul>
-
<li><p>iPhoneã¯ããã¯ãã¢ãæããAppleããä¸é©åãã¨èãã<a
-href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">ã¢ããªãAppleãé
éã§åé¤ãããã¨ãå¯è½ã¨ãã¾ã</a>ãã¸ã§ããºã¯ãããããã¡ã¯Appleãä¿¡é
¼ã§ããã®ã§Appleããã®åãæããã®ã¯ããã
ããã¨è¨ã£ã¦ã¾ãã</p>
- </li>
-
- <li><p>iPhoneã¯<a
-href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">é
éæé¤</a>ã®ããã®ããã¯ãã¢ãæãã¦ãã¾ãã常ã«æå¹ã¨ãªã£ã¦ããããã§ã¯ããã¾ããããã¦ã¼ã¶ã¯ç解ããªãã¾ã¾ã«æå¹ã¨ããããã«ä»åãããã¾ãã</p>
- </li>
-
+<h3 id="jails">Appleã®ç¢ç</h3>
+<ul>
<li><p><a
-href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">Appleã®ãã¡ã¼ã
ã¦ã§ã¢ãã¢ããã°ã¬ã¼ããã¯ã¢ã³ããã¯ããã¦ããiPhonesãå£ãã¦ãã¾ãã¾ãã</a>ããã¢ããã°ã¬ã¼ããã¯<a
-href="/philosophy/proprietary-jails.html">Appleã®æ¤é²</a>ã«ãã£ã¦æ¿èªããã¦ããªãã¢ããªã±ã¼ã·ã§ã³ãåæ¢ããã¾ãããããã¯æããã«ãã¹ã¦æå³çã§ãã</p>
- </li>
+href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">Apple
+iThingsã®ãªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
iOSã¯ã¦ã¼ã¶ã«ã¨ã£ã¦ç¢çã§ãã</a>
ã¤ã¾ããããã¯ãã¢ããªã±ã¼ã·ã§ã³ããã°ã©ã
ã®æ¤é²ãå¼·è¦ãã¾ãã</p>
- <li><p>Appleã¯<a
-href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">é
éæä½ã§iPhonesããå½å®¶ã®ããã«ãããã¼ã¿ãæ½åºãã</a>ãã¨ãå¯è½ã§ãæ¥å¸¸çã«è¡ã£ã¦ãã¾ãã
- </p>
- <p>ããã¯<a
-href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">iOS
-8ã®ã»ãã¥ãªãã£æ¹å</a>ã§æ¹åããã¾ãããã<a
-href="https://firstlook.org/theintercept/?p=5199">Appleã主張ããã®ã¨åããããã®éã§ã¯ããã¾ãã</a>ã</p>
- </li>
+ <p>Appleã¯ãã®åãiThingsã®<a
+href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">ãã¹ã¦ã®bitcoinã¢ããªãæ¤é²ãã</a>ã®ã«ä½¿ãã¾ããã</p>
- <li><p>Apple<a
-href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">ã¯iPodsããã¦ã¼ã¶ãiTunesã¨ç«¶äºããã¤ã³ã¿ã¼ãããé³æ¥½ã¹ãã¢ããè³¼å
¥ãé³æ¥½ãåé¤ãã¾ãã</a>ã</p>
+
<p>Appleã¯iThingsã«ããã¦ç¢çã§ããä¸è¬ç®çã®ã³ã³ãã¥ã¼ã¿ã®æ
£ç¿ãéæããiThingã®ã¦ã¼ã¶ã¯ãç¢çç
´ããã®ç¨èªãæ¤é²ããéãããã¨ãããã¦ä½¿ãããã«ãªãã¾ããã</p>
+
+ <p>ãã¡ãã«<a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">ã³ã¼ãç½²å</a>ã«ã¤ãã¦ã®è¨äºãããã¾ãããããiThingsãã¦ã¼ã¶ãç¢çã«å
¥ããã®ã«ä½¿ããã®ã§ãã</p>
</li>
<li><p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">Appleã®æ£æçã§ä¸è²«æ§ã®ãªãæ¤é²ã®ããå¤ãã®ä¾ã¯ãã¡ã</a>ã</p>
</li>
-
</ul>
+<h3 id="tyrants">ã¢ããã«ã®æ´å</h3>
+<ul>
+ <li><p>Appleã¯æ£æçã«<a
+href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">ã¦ã¼ã¶ãiOSã®å¤ããã¼ã¸ã§ã³ãã¤ã³ã¹ãã¼ã«ããã®ããããã¯ãã¾ã</a>ã</p>
+ </li>
+
+ <li><p>iThingsã¯æ´åã®ããã¤ã¹ã§ã:
+ç°ãªãããããã¯å¤æ´ãããªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ãããã¨ãèªãã¾ãããAndroidãiThingsã«ç§»æ¤ãããã®ãããã¾ãããã¤ã³ã¹ãã¼ã«ããã«ã¯<a
+href="http://www.idroidproject.org/wiki/Status">
+ãã°ãããã¯ãå©æ´»ç¨ããã¿ã¤ã</a>ã¦ãç°ãªãã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ã§ããããã«ããå¿
è¦ãããã¾ãã</p>
+ </li>
+</ul>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -162,7 +206,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -179,8 +223,8 @@
<p>Copyright © 2015 Free Software Foundation, Inc.</p>
<p>ãã®ãã¼ã¸ã¯<a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative Commons
-Attribution-NoDerivs 3.0 United States
License</a>ã®æ¡ä»¶ã§è¨±è«¾ããã¾ãã</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribution-NoDerivs 4.0 International
License</a>ã®æ¡ä»¶ã§è¨±è«¾ããã¾ãã</p>
<!--#include virtual="/server/bottom-notes.ja.html" -->
<div class="translators-credits">
@@ -191,7 +235,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2015/06/03 02:58:17 $
+$Date: 2015/07/06 02:28:10 $
<!-- timestamp end -->
</p>
Index: malware-kindle-swindle.ja.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.ja.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- malware-kindle-swindle.ja.html 15 Apr 2015 13:02:29 -0000 1.1
+++ malware-kindle-swindle.ja.html 6 Jul 2015 02:28:11 -0000 1.2
@@ -7,6 +7,14 @@
<title>ãã³ãã«(ã¤ã³ããã³ãã«)ã®ãã«ã¦ã§ã¢ -
GNUããã¸ã§ã¯ã -
ããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³</title>
<!--#include virtual="/proprietary/po/malware-kindle-swindle.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+
+</style>
+
<!--#include virtual="/server/banner.ja.html" -->
<h2>ãã³ãã«(ã¤ã³ããã³ãã«)ã®ãã«ã¦ã§ã¢</h2>
@@ -17,12 +25,44 @@
href="/philosophy/proprietary-drm.html">ãã£ã¸ã¿ã«å¶é管ç(DRM)</a>ã¨<a
href="/philosophy/ebooks.html">ã»ãã®æªæã®ããæ©è½</a>ãããããã§ãã</p>
+<div class="highlight-para">
<p>
ãã«ã¦ã§ã¢ã¨ä¸èªç±ãªã½ããã¦ã§ã¢ã¯ãäºã¤ã®ç°ãªãåé¡ã§ãããã«ã¦ã§ã¢ã¯å®è¡ããã¨ããã¦ã¼ã¶ãèå¾
ã害ããªãããã«è¨è¨ãããããã°ã©ã ãæå³ãã¾ãã<a
href="/philosophy/free-sw.html">èªç±ã½ããã¦ã§ã¢</a>ã¨ä¸èªç±ãªã½ããã¦ã§ã¢ã®éãã¯<a
href="/philosophy/free-software-even-more-important.html">ã¦ã¼ã¶ããã®ããã°ã©ã
ã®ã³ã³ããã¼ã«ãæãããã©ãããã¾ãã¯ããã®å対ã(ããã°ã©ã
ãã¦ã¼ã¶ãã³ã³ããã¼ã«)</a>ã«ããã¾ãããã®ããã°ã©ã
ãå®è¡æã«ä½ã<em>çºãã</em>ã¯ç´æ¥ã«ã¯åé¡ã§ã¯ããã¾ãããããããä¸èªç±ãªã½ããã¦ã§ã¢ã¯ãå®éããã°ãã°ãã«ã¦ã§ã¢ã§ãããªããªããã©ããªæªæã®æ©è½ã§ãã£ã¦ãã¦ã¼ã¶ã¯ä¿®æ£ããã«ãªãã®åããªããã¨ãç¥ãéçºè
ã¯ããããå°ãã°ããæ¼ãä»ããããã¨èªæãããããã§ãã
</p>
+</div>
+
+<div class="toc">
+<div class="malfunctions">
+<ul>
+<li><strong>ãã«ã¦ã§ã¢ã®ã¿ã¤ã</strong></li>
+<li><a href="#back-doors">ããã¯ãã¢</a></li>
+<!--<li>
+<a href="#censorship">Censorship</a></li>-->
+<!--<li>
+<a href="#insecurity">Insecurity</a></li>-->
+<!--<li>
+<a href="#sabotage">Sabotage</a></li>-->
+<!--<li>
+<a href="#interference">Interference</a></li>-->
+<li><a href="#surveillance">ç£è¦</a></li>
+<li><a
+href="#drm">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯ã¦ã¼ã¶ããã®ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã</li>
+
+<!--<li>
+<a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>-->
+<!--<li>
+<a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>-->
+</ul>
+</div>
+</div>
+
+<h3
id="back-doors">ã¢ãã¾ã³ã®ãã³ãã«(ã¤ã³ããã³ãã«)ã®ããã¯ãã¢</h3>
<ul>
<li><p>ã¢ãã¾ã³ã»ãã³ãã«ã«ã¯ããã¯ãã¢ãããã<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">é
éæä½ã§æ¸ç±ãæ¶å»ãã</a>ã®ã«ä½¿ããã¦ãã¾ããã</p>
@@ -32,14 +72,20 @@
<p>ã¢ãã¾ã³ã¯<a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">ã¦ã¼ã¶ã®ã¤ã³ããã³ãã«ã®ã½ããã¦ã§ã¢ããã¦ã³ã°ã¬ã¼ãã</a>ãã«ã¼ãç¹æ¨©ãæ¢ã«åããããã®ãã¾ã£ããåããªãããããã¨ãã¾ããã</p></li>
+</ul>
- <li><p><a
-href="http://science.opposingviews.com/kindle-drm-17841.html">ã¢ãã¾ã³ã»ãã³ãã«ã«ã¯DRMãããã¾ã</a>ããã®è¨äºã¯DRMãå«çã®åé¡ã¨ãã¦æ±ããã¨ã«å¤±æãã¦ãã¾ããã¢ãã¾ã³ããã®ã¦ã¼ã¶ã«ä½ããããã¨ã妥å½ã
ã¨ãä¸ãããããã®ã¨ãã¦æ±ã£ã¦ãã¾ããè¨äºã§ã¯DRMããã£ã¸ã¿ã«ã権éã管çã¨åç
§ãã¦ãããããã¯DRMã奨å±ããéçã®ç¨èªã§ããããããªãããäºå®ã®åç
§ã¨ãã¦ã¯å½¹ç«ã¡ã¾ãã</p></li>
-
+<h3
id="surveillance">ã¢ãã¾ã³ã»ãã³ãã«(ã¤ã³ããã³ãã«)ã®ç£è¦</h3>
+<ul>
<li><p>é»åããã³ãã£ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³ã¯<a
href="https://www.eff.org/pages/reader-privacy-chart-2012">ã¤ã³ããã³ãã«ã¨ã»ãã®é»åæ¸ç±ãªã¼ãã¼ãæ¤æ»ããæ§ã
ãªç¨®é¡ã®ç£è¦</a>ãã¿ã¤ãã¦ãã¾ãã</p></li>
</ul>
+<h3 id="drm">ãã³ãã«(ã¤ã³ããã³ãã«)ã®DRM</h3>
+<ul>
+ <li><p><a
+href="http://science.opposingviews.com/kindle-drm-17841.html">ã¢ãã¾ã³ã»ãã³ãã«ã«ã¯DRMãããã¾ã</a>ããã®è¨äºã¯DRMãå«çã®åé¡ã¨ãã¦æ±ããã¨ã«å¤±æãã¦ãã¾ããã¢ãã¾ã³ããã®ã¦ã¼ã¶ã«ä½ããããã¨ã妥å½ã
ã¨ãä¸ãããããã®ã¨ãã¦æ±ã£ã¦ãã¾ããè¨äºã§ã¯DRMããã£ã¸ã¿ã«ã権éã管çã¨åç
§ãã¦ãããããã¯DRMã奨å±ããéçã®ç¨èªã§ããããããªãããäºå®ã®åç
§ã¨ãã¦ã¯å½¹ç«ã¡ã¾ãã</p></li>
+</ul>
+
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -78,7 +124,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -95,8 +141,8 @@
<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
<p>ãã®ãã¼ã¸ã¯<a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative Commons
-Attribution-NoDerivs 3.0 United States
License</a>ã®æ¡ä»¶ã§è¨±è«¾ããã¾ãã</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribution-NoDerivs 4.0 International
License</a>ã®æ¡ä»¶ã§è¨±è«¾ããã¾ãã</p>
<!--#include virtual="/server/bottom-notes.ja.html" -->
<div class="translators-credits">
@@ -107,7 +153,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2015/04/15 13:02:29 $
+$Date: 2015/07/06 02:28:11 $
<!-- timestamp end -->
</p>
Index: malware-microsoft.ja.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ja.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-microsoft.ja.html 3 Jun 2015 02:58:17 -0000 1.2
+++ malware-microsoft.ja.html 6 Jul 2015 02:28:11 -0000 1.3
@@ -7,10 +7,18 @@
<title>ãã¤ã¯ãã½ããã®ã½ããã¦ã§ã¢ã¯ãã«ã¦ã§ã¢ã -
GNUããã¸ã§ã¯ã -
ããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³</title>
<!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+
+</style>
+
<!--#include virtual="/server/banner.ja.html" -->
<h2>ãã¤ã¯ãã½ããã®ã½ããã¦ã§ã¢ã¯ãã«ã¦ã§ã¢ã </h2>
-<p><a
href="/philosophy/proprietary.html">ã»ãã®ãããã©ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®ä¾</a></p>
+<p><a
href="/proprietary/proprietary.html">ã»ãã®ãããã©ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®ä¾</a></p>
<div class="highlight-para">
<p>
@@ -25,14 +33,39 @@
</p>
</div>
+<div class="toc">
+<div class="malfunctions">
+<ul>
+<li><strong>ãã«ã¦ã§ã¢ã®ã¿ã¤ã</strong></li>
+<li><a href="#back-doors">ããã¯ãã¢</a></li>
+
+<!--<li>
+<a href="#censorship">Censorship</a></li>-->
+<!--<li>
+<a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">妨害</a></li>
+
+<!--<li>
+<a href="#interference">Interference</a></li>-->
+<li><a href="#surveillance">ç£è¦</a></li>
+<li><a
+href="#drm">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯ã¦ã¼ã¶ããã®ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã</li>
+<li><a
href="#jails">ç¢ç</a>—ã¢ããªã±ã¼ã·ã§ã³ã»ããã°ã©ã
ã®æ¤é²ãå¼·è¦ããã·ã¹ãã ã</li>
+<li><a
href="#tyrants">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
ãæ絶ããã·ã¹ãã ã</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">ãã¤ã¯ãã½ããã®ããã¯ãã¢</h3>
<ul>
- <li><p><a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">ã¦ã£ã³ãã¦ãº10ã¯å
¨ä½ãè¦ã観ããã¨ãèªãããã¨ãã¦ã¼ã¶ã«å¿
é
ã¨ã</a>ããã¡ã¤ã«ãã³ãã³ããããã¹ãå
¥åãé³å£°å
¥åããã¹ã¦ç£è¦ã®å¯¾è±¡ã§ãã</p></li>
<li><p>ãã¤ã¯ãã½ãã ã¦ã£ã³ãã¦ãºã¯<a
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">ã©ããªå¤æ´ãã¦ã¼ã¶ã«å¯¾ãã¦å¼·è¦ã§ãã</a>ä¸è½ããã¯ãã¢ãæãã¦ãã¾ãã</p>
<p>ãã詳ããããã¤ã<a
-href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">ããã使ããããã¯ããã¡ã</a>ã</p></li>
+href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">ããã使ããããã¯ããã¡ã</a>ã</p>
+
+ <p>ã¦ã£ã³ãã¦ãº10ã§ã¯ãä¸è½ããã¯ãã¢ã¯ãã¯ãé
ããã¦ãã¾ããããã¹ã¦ã®ãã¢ããã°ã¬ã¼ããã¯<a
+href="http://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=1&articleid=42633691&source=googleplus">å¼·å¶çã«ããã¤å³æã«æ¼ãä»ãããã¾ã</a>ã</p></li>
<li><p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">ã¦ã£ã³ãã¦ãº8ãé
éæä½ã§ã¢ããªãåé¤ããããã®ããã¯ãã¢ãæãã¾ã</a>ã</p>
@@ -41,18 +74,39 @@
<li><p>ã¦ã£ã³ãã¦ãº8ã®ããã¯ãã¢ã¯é©ãã¹ããã®ã§ã<a
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">ãã¤ãæ¿åºã¯ãããã¯ä¿¡ç¨ã§ããªããã¨æ±ºå®ãã¾ãã</a>ã</p></li>
+</ul>
+<h3 id="sabotage">ãã¤ã¯ãã½ããã®å¦¨å®³</h3>
+<ul>
<li><p><a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">ãã¢ãã¤ã«ããã¤ã¹ãã®ã¦ã£ã³ãã¦ãº8ã¯ç¢çã§ã</a>:
-ã¦ã¼ã¶ã®ã¢ããªã±ã¼ã·ã§ã³ããã°ã©ã
ã®é¸æãæ¤é²ãã¾ãã</p></li>
+href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">ãã¤ã¯ãã½ããã¯NSAã«ã¦ã£ã³ãã¦ãºã®ãã°ãä¿®æ£ããåã«ä¼ãã¦ãã¾ãã</a></p></li>
<li><p><a
-href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">ã¦ã£ã³ãã¦ãº8ã®ã¢ãã¤ã«ããã¤ã¹ã¯æ´åã§ã</a>:
-ã¦ã¼ã¶ãã»ãã®ãããã¯ä¿®æ£ããããªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ãããã¨ããããã¯ãã¾ãã</p></li>
+href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">ãã¤ã¯ãã½ããã¯ã¦ã£ã³ãã¦ãºXPã®ã»ãã¥ãªãã£ä¿®æ£ãçµäºãã¾ãããã¨ã¦ã¤ããªããéãæ¯æãããã¤ãã®å¤§ããªã¦ã¼ã¶ãé¤ãã¦ã</a></p>
+
+ <p>åæ§ã«ããã¤ã¯ãã½ããã¯<a
+href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
+ã¤ã³ã¿ã¼ãããã¨ã¯ã¹ããã¼ã©ã®ããã¤ãã®ãã¼ã¸ã§ã³ã®ãµãã¼ããçµäº</a>ãããã¨ãã¦ãã¾ãã</p>
+
+ <p>人ãã¾ãã¯ä¼ç¤¾ã¯ãç¹å®ã®ããã°ã©ã
ã«å¯¾ãã¦ã®ä»äºãæ¢ãã権å©ãããã¨ããããã¯èãã¾ããééãã¯ãã¦ã¼ã¶ããã¤ã¯ãã½ããã«ä¾åããããã«ããå¾ã§ãã¤ã¯ãã½ããããããå®æ½ãã¦ãããã¨ã§ããã§ãããããããã¯ã»ãã®èª°ãã«ãã®ããã°ã©ã
ã®ããã«ä»äºããã¦ãã ããã¨é
¼ãã®ã«èªç±ã§ã¯ãªãã§ãããã</p></li>
+</ul>
+
+<h3 id="surveillance">ãã¤ã¯ãã½ããã®ç£è¦</h3>
+<ul>
+ <li><p>
+
ãã¤ã¯ãã½ããã¯ã¦ã£ã³ãã¦ãº10ã®ããã©ã¤ãã·ã¼ã»ããªã·ã¼ãã使ããã¦ã¼ã¶ã®ãã¡ã¤ã«ããã¤ã§ãè¦ããããã«æç½ã«ã権å©ããæ¼ãä»ãã¾ããã¦ã£ã³ãã¦ãº10ã®ãã«ã»ãã£ã¹ã¯æå·åã¯<a
+href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">ãã¤ã¯ãã½ããã«éµã渡ãã¾ã</a>ã</p>
+
+
<p>ã§ããããã¦ã£ã³ãã¦ãºã¯ã»ãã®åé¡ã¨åãããç£è¦ã«é¢ãã¦ã¯æç½ã«ãã«ã¦ã§ã¢ã§ãã</p>
+
+
<p>ãã¤ã¯ãã½ãããåè¡å½æ¿åºã®ããã«ãè¦æ±ã«å¿ãã¦ã¦ã¼ã¶ã®ãã¡ã¤ã«ãè¦ããã¨æ³å®ã§ãã¾ããããã©ã¤ãã·ã¼ã»ããªã·ã¼ãã¯æ示ãã¦ããã¯ããã¾ããããä¸å½æ¿åºã®ããã«è¦æ±ã«å¿ãã¦ã¦ã¼ã¶ã®ãã¡ã¤ã«ãè¦ãã§ãããã?</p>
+
+
<p>ã¦ã¼ã¶ããããã®ã¦ãã¼ã¯ãªãåºåIDãã¯ãã»ãã®ä¼ç¤¾ããç¹å®ã®ã¦ã¼ã¶ããããã®é²è¦§ã追跡ãããã¨ãå¯è½ã«ãã¾ãã</p>
+
+ <p>ããã¯ãã¤ã¯ãã½ããããããã¨å
¨æ¬¡å
ã«æ大éã«ã¦ã£ã³ãã¦ãº10ã極æªã¨ãããã¨é¸æãããã®ããã§ããä»ãã¦ã£ã³ãã¦ãºãæ¨ã¦å»ããã¨ãããªã誰ã«å¯¾ãã¦ã§ãããã®å
¨æ¨©ãã¤ãããã¨ãã¦ã</p></li>
<li><p><a
-href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">ã¦ã£ã³ãã¦ãºã®DRM(ãã£ã¸ã¿ã«å¶éæ©æ§)</a>ã¯<a
-href="/philosophy/proprietary-drm.html#bluray">ãã«ã¼ã¬ã¤</a>ãã£ã¹ã¯ã®æä¾ãå°å
¥ãã¾ããã(ãã®è¨äºã¯ãã©ã®ããã«ãã¦åä¸ã®ãã«ã¦ã§ã¢ãå¾ã«MacOSã«ãå°å
¥ããããã«ã¤ãã¦ãè¿°ã¹ã¦ãã¾ãã)</p></li>
+href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">ã¦ã£ã³ãã¦ãº10ã¯å
¨ä½ãè¦ã観ããã¨ãèªãããã¨ãã¦ã¼ã¶ã«å¿
é
ã¨ã</a>ããã¡ã¤ã«ãã³ãã³ããããã¹ãå
¥åãé³å£°å
¥åããã¹ã¦ç£è¦ã®å¯¾è±¡ã§ãã</p></li>
<li>Spyware in Windows: <a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">ã¦ã£ã³ãã¦ãºã»ã¢ãããã¼ãã¯ã¦ã¼ã¶ãè¦ã観ã¾ãã</a>
@@ -61,24 +115,34 @@
ããã¦<a href="http://www.marketoracle.co.uk/Article40836.html">
ç§å¯ã®NSAéµãã¦ã£ã³ãã¦ãºã«ã¯ãã</a>ããã®æ©è½ã¯ããããã¡ã«ã¯ãããã¾ããã</li>
- <li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">ãã¤ã¯ãã½ããã¯NSAã«ã¦ã£ã³ãã¦ãºã®ãã°ãä¿®æ£ããåã«ä¼ãã¦ãã¾ãã</a></p></li>
-
<li><p>
<a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">ãã¤ã¯ãã½ããSkyDriveã¯NSAãç´æ¥ã¦ã¼ã¶ã®ãã¼ã¿ãæ¤æ»ãããã¨ãèªãã¦ãã¾ãã</a></p>
</li>
+</ul>
+<h3 id="drm">ãã¤ã¯ãã½ããã®DRM</h3>
+<ul>
<li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">ãã¤ã¯ãã½ããã¯ã¦ã£ã³ãã¦ãºXPã®ã»ãã¥ãªãã£ä¿®æ£ãçµäºãã¾ãããã¨ã¦ã¤ããªããéãæ¯æãããã¤ãã®å¤§ããªã¦ã¼ã¶ãé¤ãã¦ã</a></p>
+href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">ã¦ã£ã³ãã¦ãºã®DRM(ãã£ã¸ã¿ã«å¶éæ©æ§)</a>ã¯<a
+href="/proprietary/proprietary-drm.html#bluray">ãã«ã¼ã¬ã¤</a>ãã£ã¹ã¯ã®æä¾ãå°å
¥ãã¾ããã(ãã®è¨äºã¯ãã©ã®ããã«ãã¦åä¸ã®ãã«ã¦ã§ã¢ãå¾ã«MacOSã«ãå°å
¥ããããã«ã¤ãã¦ãè¿°ã¹ã¦ãã¾ãã)</p></li>
+</ul>
- <p>åæ§ã«ããã¤ã¯ãã½ããã¯<a
-href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
-ã¤ã³ã¿ã¼ãããã¨ã¯ã¹ããã¼ã©ã®ããã¤ãã®ãã¼ã¸ã§ã³ã®ãµãã¼ããçµäº</a>ãããã¨ãã¦ãã¾ãã</p>
+<h3 id="jails">ãã¤ã¯ãã½ããã®ç¢ç</h3>
+<ul>
+ <li><p><a
+href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">ãã¢ãã¤ã«ããã¤ã¹ãã®ã¦ã£ã³ãã¦ãº8ã¯ç¢çã§ã</a>:
+ã¦ã¼ã¶ã®ã¢ããªã±ã¼ã·ã§ã³ããã°ã©ã
ã®é¸æãæ¤é²ãã¾ãã</p></li>
+</ul>
- <p>人ãã¾ãã¯ä¼ç¤¾ã¯ãç¹å®ã®ããã°ã©ã
ã«å¯¾ãã¦ã®ä»äºãæ¢ãã権å©ãããã¨ããããã¯èãã¾ããééãã¯ãã¦ã¼ã¶ããã¤ã¯ãã½ããã«ä¾åããããã«ããå¾ã§ãã¤ã¯ãã½ããããããå®æ½ãã¦ãããã¨ã§ããã§ãããããããã¯ã»ãã®èª°ãã«ãã®ããã°ã©ã
ã®ããã«ä»äºããã¦ãã ããã¨é
¼ãã®ã«èªç±ã§ã¯ãªãã§ãããã</p></li>
+<h3 id="tyrants">ãã¤ã¯ãã½ããã®æ´å</h3>
+<ul>
+ <li><p><a
+href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">ã¦ã£ã³ãã¦ãº8ã®ã¢ãã¤ã«ããã¤ã¹ã¯æ´åã§ã</a>:
+ã¦ã¼ã¶ãã»ãã®ãããã¯ä¿®æ£ããããªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
ãã¤ã³ã¹ãã¼ã«ãããã¨ããããã¯ãã¾ãã</p></li>
</ul>
+
<p>ãã®ãã¼ã¸ã示ãããã«ããããã³ã³ãã¥ã¼ã¿ãããã«ã¦ã§ã¢ããã¬ã¤ã«ããããªãã°ãæåã«åé¤ããã½ããã¦ã§ã¢ã¯ã¦ã£ã³ãã¦ãºã§ãã</p>
<div class="translators-notes">
@@ -119,7 +183,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -136,8 +200,8 @@
<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
<p>ãã®ãã¼ã¸ã¯<a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative Commons
-Attribution-NoDerivs 3.0 United States
License</a>ã®æ¡ä»¶ã§è¨±è«¾ããã¾ãã</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribution-NoDerivs 4.0 International
License</a>ã®æ¡ä»¶ã§è¨±è«¾ããã¾ãã</p>
<!--#include virtual="/server/bottom-notes.ja.html" -->
<div class="translators-credits">
@@ -148,7 +212,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2015/06/03 02:58:17 $
+$Date: 2015/07/06 02:28:11 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.ja.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ja.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-mobiles.ja.html 3 Jun 2015 02:58:17 -0000 1.2
+++ malware-mobiles.ja.html 6 Jul 2015 02:28:11 -0000 1.3
@@ -7,11 +7,20 @@
<title>ã¢ãã¤ã«ã»ããã¤ã¹ã®ãã«ã¦ã§ã¢ - GNUããã¸ã§ã¯ã -
ããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³</title>
<!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+
+</style>
+
<!--#include virtual="/server/banner.ja.html" -->
<h2>ã¢ãã¤ã«ã»ããã¤ã¹ã®ãã«ã¦ã§ã¢</h2>
-<a
href="/philosophy/proprietary.html">ã»ãã®ãããã©ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®ä¾</a>
+<p><a
href="/philosophy/proprietary.html">ã»ãã®ãããã©ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®ä¾</a></p>
+<div class="highlight-para">
<p>
<em>ãã«ã¦ã§ã¢</em>ã¨ã¯ãã¦ã¼ã¶ãèå¾
ãã害ããªãæ¹æ³ã§æ©è½ããããã«è¨è¨ãããã½ããã¦ã§ã¢ã§ãã(ããã«ã¯ãäºæ
ã§ã®ããã¾ãã¯å«ã¾ãã¾ããã)
</p>
@@ -21,19 +30,39 @@
href="/philosophy/free-sw.html">èªç±ã½ããã¦ã§ã¢</a>ã¨ä¸èªç±ãªã½ããã¦ã§ã¢ã®éãã¯<a
href="/philosophy/free-software-even-more-important.html">ã¦ã¼ã¶ãããã°ã©ã
ã®ã³ã³ããã¼ã«ãæãããã©ãããã¾ãã¯ããã®å対ã(ããã°ã©ã
ãã¦ã¼ã¶ãã³ã³ããã¼ã«)</a>ã«ããã¾ãããã®ããã°ã©ã
ãå®è¡æã«ä½ã<em>çºãã</em>ã¯ãç´æ¥ã«ã¯åé¡ã§ã¯ããã¾ãããããããä¸èªç±ãªã½ããã¦ã§ã¢ã¯ãå®éããã°ãã°ãã«ã¦ã§ã¢ã§ãããªããªããã©ããªæªæã®æ©è½ã§ãã£ã¦ãã¦ã¼ã¶ã¯ä¿®æ£ããã«ãªãã®åããªããã¨ãç¥ãéçºè
ã¯ããããå°ãã°ããæ¼ãä»ãããããã¨èªæãããããã§ãã
</p>
+</div>
<p>ããã«ã¢ãã¤ã«ã»ããã¤ã¹ã®ãã«ã¦ã§ã¢ã®ä¾ãæãã¾ããApple
iThingsç¹æã®æªæããæ©è½ã«ã¤ãã¦ã¯ã<a
href="/philosophy/malware-apple.html">Appleã®ãã«ã¦ã§ã¢ã®ãã¼ã¸</a>ãã覧ãã
ããã</p>
+<div class="toc">
+<div class="malfunctions">
<ul>
-
<li><p>å¤ãã®ã¢ãã¤ã«ã»ããã¤ã¹ã®ããã®ãããã©ã¤ã¨ã¿ãªãªã¢ããªãã©ããªã»ãã®ã¢ããªãã¦ã¼ã¶ãã¤ã³ã¹ãã¼ã«ããããå
±åãã¾ãã<a
-href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitterã¯ãããªãã¨ãè¦ãã¦ãªãã·ã§ãã«ã®ããæ¹ã§ãããå®è¡ãã¾ã</a>ãã»ãã®äººãã¡ãå®è¡ããã®ã¨åãããã«æªããªããã¨ã</p>
- </li>
+<li><strong>ãã«ã¦ã§ã¢ã®ã¿ã¤ã</strong></li>
+<li><a href="#back-doors">ããã¯ãã¢</a></li>
- <li><p>GPSã®ã¤ããæºå¸¯é»è©±ã¯ãã®GPSã®ä½ç½®ãé
éã³ãã³ãã§éããã¦ã¼ã¶ã¯ãããåæ¢ã§ãã¾ãã: <a
-href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>ã(åè¡å½ã¯æçµçã«ã¯ãã¹ã¦ã®æ°ããæºå¸¯é»è©±ã«GPSãå¿
é ã¨ãªãã¨è¨ã£ã¦ãã¾ãã)</p>
- </li>
+<!--<li>
+<a href="#censorship">Censorship</a></li>-->
+<li><a href="#insecurity">å±éºæ§</a></li>
+
+<!--<li>
+<a href="#sabotage">Sabotage</a></li>-->
+<!--<li>
+<a href="#interference">Interference</a></li>-->
+<li><a href="#surveillance">ç£è¦</a></li>
+
+<!--<li>
+<a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>-->
+<li><a
href="#jails">ç¢ç</a>—ã¢ããªã±ã¼ã·ã§ã³ã»ããã°ã©ã
ã®æ¤é²ãå¼·è¦ããã·ã¹ãã ã</li>
+<li><a
href="#tyrants">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªãã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã
ãæ絶ããã·ã¹ãã ã</li>
+</ul>
+</div>
+</div>
+<h3 id="back-doors">ã¢ãã¤ã«ã®ããã¯ãã¢</h3>
+<ul>
<li><p>ã»ã¨ãã©ã®æºå¸¯é»è©±ã¯ä¸è½ããã¯ãã¢ãæãã¦ããããã®æ©è½ã¯<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">æºå¸¯é»è©±ãæªæã®ãããã®ã«å¤ãã</a>ã®ã«ä½¿ããã¦ãã¾ããã</p>
</li>
@@ -42,11 +71,46 @@
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">ãµã
ã½ã³ã®Galaxyããã¤ã¹ã¯ãããã©ã¨ã¿ãªãªã¢ã³ããã¤ãã®ãã¼ã¸ã§ã³ãå®è¡ããããã¯ãã¢ãä»ãã¦ãã</a>ãããã¤ã¹ã«ä¿åããããã¼ã¿ã®é
éããã®ã¢ã¯ã»ã¹ãæä¾ãã¾ãã</p>
</li>
+ <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+ãµã ã½ã³ã®ããã¯ãã¢</a>ã¯ã·ã¹ãã
ä¸ã®ã©ããªãã¡ã¤ã«ã«ãã¢ã¯ã»ã¹ãæä¾ãã¾ãã</p>
+ </li>
+
+ <li>
+ <p>ã¢ã³ããã¤ãã§<a
+href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">ã°ã¼ã°ã«ã¯é
éã§ã¢ããªãåé¤ããããã¯ãã¢ãæãã¦ãã¾ãã</a>
+(GTalkServiceã¨å¼ã°ããããã°ã©ã ã®ä¸ã«ããã¾ã)ã
+ </p>
+
+ <p>
+ ã°ã¼ã°ã«ã¯ãã¾ããGTalkServiceãéãã¦<a
+href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">å¼·å¶çã«é
éã§ã¢ããªãã¤ã³ã¹ãã¼ã«ã§ããã®ã§ã</a>ã(ãã®è¨äºã®å¾ãGTalkServiceã¯Google
+Playã¨ä¸ç·ã«ãªã£ãããã§ãã)
ããã§ãä¸è½ããã¯ãã¢ã®åºæ¥ä¸ããã§ãã
+ </p>
+
+ <p>
+
ã°ã¼ã°ã«ã®ãã®åã®<em>è¡ä½¿</em>ã¯ããã¾ã§æªæã®ãããã®ã§ã¯ããã¾ããã§ããããåé¡ã¯ãããã£ãåã¯èª°ãæã¤ã¹ãã§ã¯ãªããããã¯æªæã«ã使ããå¾ããã¨ãããã¨ã§ããè¯ãèããå¾ãããã»ãã¥ãªãã£ãµã¼ãã¹ãé
éæä½ã§æªæã®ããã¨èããããããã°ã©ã
ã<em>ç¡å¹ã¨ãã</em>ãããããªãã決ãããã¨ãããã§ããããããããããã°ã©ã
ã<em>åé¤</em>ãããã¨ãèªããã¨ããã®ã«ã¯ãå¼è§£ã®ä½å°ãããã¾ãããããã¦ããã®ãããªæ¹æ³ã§èª°ã(åå¨ããã°ã§ãã)ä¿¡é
¼ãããã決ãã権å©ãããªãã«ããã¹ãã§ãã
+ </p>
+ </li>
+</ul>
+
+<h3 id="insecurity">ã¢ãã¤ã«ã®å±éºæ§</h3>
+<ul>
<li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">NSAã¯iPhone,
ã¢ã³ããã¤ããBlackBerryã®ãå«ãã¹ãã¼ããã©ã³ã®ãã¼ã¿ãçã¿è¦ããã¨ãã§ãã¾ã</a>ã詳細ã¯ãããã¾ããããã»ã¨ãã©ã®æºå¸¯é»è©±ã«ãããã¨ãããã£ã¦ããä¸è½ããã¯ãã¢ãéãã¦è¡ãããã®ã§ã¯ãªãããã§ããããã¯ããã¾ãã¾ãªãã°ã®å©æ´»ç¨ã«é¢ä¿ããããããã¾ããã<a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">æºå¸¯é»è©±ã®é»æ³¢ã½ããã¦ã§ã¢ã«ã¯ããããã®ãã°ããã</a>ã®ã§ãã</p>
</li>
+</ul>
+
+<h3 id="surveillance">ã¢ãã¤ã«ã®ç£è¦</h3>
+<ul>
+
<li><p>å¤ãã®ã¢ãã¤ã«ã»ããã¤ã¹ã®ããã®ãããã©ã¤ã¨ã¿ãªãªã¢ããªãã©ããªã»ãã®ã¢ããªãã¦ã¼ã¶ãã¤ã³ã¹ãã¼ã«ããããå
±åãã¾ãã<a
+href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitterã¯ãããªãã¨ãè¦ãã¦ãªãã·ã§ãã«ã®ããæ¹ã§ãããå®è¡ãã¾ã</a>ãã»ãã®äººãã¡ãå®è¡ããã®ã¨åãããã«æªããªããã¨ã</p>
+ </li>
+
+ <li><p>GPSã®ã¤ããæºå¸¯é»è©±ã¯ãã®GPSã®ä½ç½®ãé
éã³ãã³ãã§éããã¦ã¼ã¶ã¯ãããåæ¢ã§ãã¾ãã: <a
+href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>ã(åè¡å½ã¯æçµçã«ã¯ãã¹ã¦ã®æ°ããæºå¸¯é»è©±ã«GPSãå¿
é ã¨ãªãã¨è¨ã£ã¦ãã¾ãã)</p>
+ </li>
<li><p>Cisco TNP IPé»è©±ã®ã¹ãã¤ã¦ã§ã¢: <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a>ã</p></li>
@@ -71,32 +135,10 @@
<p>ã¢ããªã®éçºè
ãã¦ã¼ã¶ãããåæãã¾ããã¨è¨ããããã©ããã®åé¡ã«ãæ°ããããããªãã§ãã
ãããããã¯ããã«ã¦ã§ã¢ã®å¼è§£ã«ã¯ãªãã¾ããã</p>
</li>
+</ul>
- <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
-ãµã ã½ã³ã®ããã¯ãã¢</a>ã¯ã·ã¹ãã
ä¸ã®ã©ããªãã¡ã¤ã«ã«ãã¢ã¯ã»ã¹ãæä¾ãã¾ãã</p>
- </li>
-
- <li>
- <p>ã¢ã³ããã¤ãã§<a
-href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">ã°ã¼ã°ã«ã¯é
éã§ã¢ããªãåé¤ããããã¯ãã¢ãæãã¦ãã¾ãã</a>
-(GTalkServiceã¨å¼ã°ããããã°ã©ã ã®ä¸ã«ããã¾ã)ã
- </p>
-
- <p>
- ã°ã¼ã°ã«ã¯ãã¾ããGTalkServiceãéãã¦<a
-href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">å¼·å¶çã«é
éã§ã¢ããªãã¤ã³ã¹ãã¼ã«ã§ããã®ã§ã</a>ã(ãã®è¨äºã®å¾ãGTalkServiceã¯Google
-Playã¨ä¸ç·ã«ãªã£ãããã§ãã)
ããã§ãä¸è½ããã¯ãã¢ã®åºæ¥ä¸ããã§ãã
- </p>
-
- <p>
-
ã°ã¼ã°ã«ã®ãã®åã®<em>è¡ä½¿</em>ã¯ããã¾ã§æªæã®ãããã®ã§ã¯ããã¾ããã§ããããåé¡ã¯ãããã£ãåã¯èª°ãæã¤ã¹ãã§ã¯ãªããããã¯æªæã«ã使ããå¾ããã¨ãããã¨ã§ããè¯ãèããå¾ãããã»ãã¥ãªãã£ãµã¼ãã¹ãé
éæä½ã§æªæã®ããã¨èããããããã°ã©ã
ã<em>ç¡å¹ã¨ãã</em>ãããããªãã決ãããã¨ãããã§ããããããããããã°ã©ã
ã<em>åé¤</em>ãããã¨ãèªããã¨ããã®ã«ã¯ãå¼è§£ã®ä½å°ãããã¾ãããããã¦ããã®ãããªæ¹æ³ã§èª°ã(åå¨ããã°ã§ãã)ä¿¡é
¼ãããã決ãã権å©ãããªãã«ããã¹ãã§ãã
- </p>
- </li>
-
- <li><p><a
-href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">ããã¤ãã®ã¢ã³ããã¤ãæºå¸¯é»è©±ã¯æ´åã§ã</a>(ãã®å¶éãæã¡ç
´ãæ¹æ³ã誰ããã¿ã¤ãã¾ããã)ã幸ããªãã¨ã«ãã»ã¨ãã©ã®ã¢ã³ããã¤ãããã¤ã¹ã¯æ´åã§ã¯ããã¾ããã</p>
- </li>
-
+<h3 id="jails">ã¢ãã¤ã«ã®ç¢ç</h3>
+<ul>
<li><p><a
href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">ã¦ã£ã³ãã¦ãº8ã¨ä¸ç·ã«æ¥ãã¢ãã¤ã«ã»ããã¤ã¹ã¯æ´åã§ã</a>ã<a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
@@ -104,6 +146,12 @@
</li>
</ul>
+<h3 id="tyrants">ã¢ãã¤ã«ã®æ´å</h3>
+<ul>
+ <li><p><a
+href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">ããã¤ãã®ã¢ã³ããã¤ãæºå¸¯é»è©±ã¯æ´åã§ã</a>(ãã®å¶éãæã¡ç
´ãæ¹æ³ã誰ããã¿ã¤ãã¾ããã)ã幸ããªãã¨ã«ãã»ã¨ãã©ã®ã¢ã³ããã¤ãããã¤ã¹ã¯æ´åã§ã¯ããã¾ããã</p>
+ </li>
+</ul>
<div class="translators-notes">
<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -142,7 +190,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -159,8 +207,8 @@
<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
<p>ãã®ãã¼ã¸ã¯<a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative Commons
-Attribution-NoDerivs 3.0 United States
License</a>ã®æ¡ä»¶ã§è¨±è«¾ããã¾ãã</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribution-NoDerivs 4.0 International
License</a>ã®æ¡ä»¶ã§è¨±è«¾ããã¾ãã</p>
<!--#include virtual="/server/bottom-notes.ja.html" -->
<div class="translators-credits">
@@ -171,7 +219,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2015/06/03 02:58:17 $
+$Date: 2015/07/06 02:28:11 $
<!-- timestamp end -->
</p>
Index: po/malware-apple.ja-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-apple.ja-en.html 15 Apr 2015 13:03:05 -0000 1.1
+++ po/malware-apple.ja-en.html 6 Jul 2015 02:28:11 -0000 1.2
@@ -3,6 +3,12 @@
<title>Apple's Operating Systems are Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-apple.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
<!--#include virtual="/server/banner.html" -->
<h2>Apple's Operating Systems Are Malware</h2>
@@ -31,8 +37,62 @@
<p>Here's how Apple's systems are malware.</p>
+<div class="toc">
+<div class="malfunctions">
<ul>
+<li><strong>Type of malware</strong></li>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a href="#censorship">Censorship</a></li>-->
+<!--<li><a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">Sabotage</a></li>
+<!--<li><a href="#interference">Interference</a></li>-->
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>
+<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Apple Back Doors</h3>
+<ul>
+ <li><p>The iPhone has a back door <a
+
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+ that allows Apple to remotely delete apps</a> which Apple considers
+ “inappropriate”. Jobs said it's OK for Apple to have this
+ power because of course we can trust Apple.</p>
+ </li>
+
+ <li><p>The iPhone has a back door for <a
+
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ remote wipe</a>. It's not always enabled, but users are led into
+ enabling it without understanding.</p>
+ </li>
+</ul>
+
+<h3 id="sabotage">Apple Sabotage</h3>
+<ul>
+ <li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
+ An Apple firmware “upgrade” bricked iPhones that had been
+ unlocked.</a> The “upgrade” also deactivated applications
+ not approved by <a href="/philosophy/proprietary-jails.html">Apple
+ censorship</a>. All this was apparently intentional.</p>
+ </li>
+ <li><p>Apple
+ <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
+ deleted from iPods the music that users had got from internet music
+ stores that competed with iTunes</a>.</p>
+ </li>
+</ul>
+
+<h3 id="surveillance">Apple Surveillance</h3>
+<ul>
<li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
MacOS automatically sends to Apple servers unsaved documents being
edited</a>. The <a
@@ -70,28 +130,6 @@
more snooping that Apple has not talked about</a>.</p>
</li>
- <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
- iOS, the operating system of the Apple iThings, is a jail for
- users.</a> That means it imposes censorship of application programs.</p>
-
- <p>Apple has used this power to
- <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- censor all bitcoin apps</a> for the iThings.</p>
-
- <p>Apple, in the iThings, pioneered the practice of general purpose
- computers that are jails, and the term comes from iThing users, who
- referred to escaping from the censorship as “jailbreaking.”</p>
-
- <p>Here is an article about the <a
- href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the iThings use to jail the user.</p>
- </li>
-
- <li><p>Apple arbitrarily
- <a href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
- blocks users from installing old versions of iOS</a>.</p>
- </li>
-
<li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
Several “features” of iOS seem to exist for no possible
purpose other than surveillance</a>. Here is the <a
@@ -105,14 +143,20 @@
get other info too.</p>
</li>
- <li><p>The iThings are tyrant devices: they do not permit
- installing a different or modified operating system. There is a
- port of Android to the iThings, but installing it
- requires <a href="http://www.idroidproject.org/wiki/Status">
- finding a bug or “exploit”</a> to make it possible to
- install a different system.</p>
+ <li><p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/?p=5199">
+ not as much as Apple claims</a>.</p>
</li>
+</ul>
+<h3 id="drm">Apple DRM</h3>
+<ul>
<li><p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
DRM (digital restrictions mechanisms) in MacOS</a>. This article
@@ -125,50 +169,47 @@
<li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
DRM that caters to Bluray disks</a>. (The article focused on Windows
and said that MacOS would do the same thing subsequently.)</p></li>
+</ul>
- <li><p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have this
- power because of course we can trust Apple.</p>
- </li>
-
- <li><p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
- remote wipe</a>. It's not always enabled, but users are led into
- enabling it without understanding.</p>
- </li>
+<h3 id="jails">Apple Jails</h3>
+<ul>
+ <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
+ iOS, the operating system of the Apple iThings, is a jail for
+ users.</a> That means it imposes censorship of application programs.</p>
- <li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
- An Apple firmware “upgrade” bricked iPhones that had been
- unlocked.</a> The “upgrade” also deactivated applications
- not approved by <a href="/philosophy/proprietary-jails.html">Apple
- censorship</a>. All this was apparently intentional.</p>
- </li>
+ <p>Apple has used this power to
+ <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ censor all bitcoin apps</a> for the iThings.</p>
- <li><p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.
- </p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but
- <a href="https://firstlook.org/theintercept/?p=5199">
- not as much as Apple claims</a>.</p>
- </li>
+ <p>Apple, in the iThings, pioneered the practice of general purpose
+ computers that are jails, and the term comes from iThing users, who
+ referred to escaping from the censorship as “jailbreaking.”</p>
- <li><p>Apple
- <a
href="http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs">
- deleted from iPods the music that users had got from internet music
- stores that competed with iTunes</a>.</p>
+ <p>Here is an article about the <a
+ href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+ code signing</a> that the iThings use to jail the user.</p>
</li>
<li><p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
More examples of Apple's arbitrary and inconsistent censorship</a>.</p>
</li>
-
</ul>
+<h3 id="tyrants">Apple Tyrants</h3>
+<ul>
+ <li><p>Apple arbitrarily
+ <a href="http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/">
+ blocks users from installing old versions of iOS</a>.</p>
+ </li>
+
+ <li><p>The iThings are tyrant devices: they do not permit
+ installing a different or modified operating system. There is a
+ port of Android to the iThings, but installing it
+ requires <a href="http://www.idroidproject.org/wiki/Status">
+ finding a bug or “exploit”</a> to make it possible to
+ install a different system.</p>
+ </li>
+</ul>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -202,7 +243,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -220,14 +261,14 @@
<p>Copyright © 2015 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/04/15 13:03:05 $
+$Date: 2015/07/06 02:28:11 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-apple.ja.po 6 Jul 2015 02:00:29 -0000 1.5
+++ po/malware-apple.ja.po 6 Jul 2015 02:28:12 -0000 1.6
@@ -93,23 +93,24 @@
"means functionalities designed to restrict what users can do with the data "
"in their computers."
msgstr ""
-"<a href=\"#drm\">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯"
-"ã¦ã¼ã¶ããã®ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã"
+"<a
href=\"#drm\">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯ã¦ã¼ã¶ããã®"
+"ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã"
#. type: Content of: <div><div><ul><li>
msgid ""
"<a href=\"#jails\">Jails</a>—systems that impose censorship on "
"application programs."
msgstr ""
-"<a href=\"#jails\">ç¢ç</a>—ã¢ããªã±ã¼ã·ã§ã³ã»ããã°ã©ã
ã®æ¤é²ãå¼·è¦ããã·ã¹ãã ã"
+"<a href=\"#jails\">ç¢ç</a>—ã¢ããªã±ã¼ã·ã§ã³ã»ããã°ã©ã
ã®æ¤é²ãå¼·è¦ã"
+"ãã·ã¹ãã ã"
#. type: Content of: <div><div><ul><li>
msgid ""
"<a href=\"#tyrants\">Tyrants</a>—systems that reject any operating "
"system not “authorized” by the manufacturer."
msgstr ""
-"<a
href=\"#tyrants\">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªãã¬ã¼ãã£ã³ã°ã»"
-"ã·ã¹ãã ãæ絶ããã·ã¹ãã ã"
+"<a
href=\"#tyrants\">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªã"
+"ã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã ãæ絶ããã·ã¹ãã ã"
#. type: Content of: <h3>
msgid "Apple Back Doors"
Index: po/malware-kindle-swindle.ja-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-kindle-swindle.ja-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-kindle-swindle.ja-en.html 15 Apr 2015 13:03:08 -0000
1.1
+++ po/malware-kindle-swindle.ja-en.html 6 Jul 2015 02:28:12 -0000
1.2
@@ -3,6 +3,12 @@
<title>Malware in the Kindle Swindle
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-kindle-swindle.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
<!--#include virtual="/server/banner.html" -->
<h2>Malware in the Kindle Swindle</h2>
@@ -14,6 +20,7 @@
management (DRM)</a> and <a href="/philosophy/ebooks.html">
other malicious functionalities</a>.</p>
+<div class="highlight-para">
<p>
Malware and nonfree software are two different issues. Malware means
the program is designed to mistreat or harm users when it runs. The
@@ -26,7 +33,31 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
+</div>
+<div class="toc">
+<div class="malfunctions">
+<ul>
+<li><strong>Type of malware</strong></li>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a href="#censorship">Censorship</a></li>-->
+<!--<li><a href="#insecurity">Insecurity</a></li>-->
+<!--<li><a href="#sabotage">Sabotage</a></li>-->
+<!--<li><a href="#interference">Interference</a></li>-->
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>
+<!--<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>-->
+<!--<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>-->
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Amazon Kindle Swindle Back Doors</h3>
<ul>
<li><p>The Amazon Kindle has a back door that has been used to <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
@@ -39,7 +70,17 @@
<p>Amazon <a
href="https://www.techdirt.com/articles/20150321/13350230396/while-bricking-jailbroken-fire-tvs-last-year-amazon-did-same-to-kindle-devices.shtml">
downgraded the software in users' Swindles</a>
so that those already rooted would cease to function at all.</p></li>
+</ul>
+
+<h3 id="surveillance">Amazon Kindle Swindle Surveillance</h3>
+<ul>
+ <li><p>The Electronic Frontier Foundation has examined and found <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012">various kinds of
+ surveillance in the Swindle and other e-readers</a>.</p></li>
+</ul>
+<h3 id="drm">Amazon Kindle Swindle DRM</h3>
+<ul>
<li><p><a href="http://science.opposingviews.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
fails to treat DRM as an ethical question; it takes for granted that
@@ -47,10 +88,6 @@
as digital “rights” management, which is the spin term
used to promote DRM. Nonetheless it serves as a reference for the
facts.</p></li>
-
- <li><p>The Electronic Frontier Foundation has examined and found <a
- href="https://www.eff.org/pages/reader-privacy-chart-2012">various kinds of
- surveillance in the Swindle and other e-readers</a>.</p></li>
</ul>
</div><!-- for id="content", starts in the include above -->
@@ -85,7 +122,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -103,14 +140,14 @@
<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/04/15 13:03:08 $
+$Date: 2015/07/06 02:28:12 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-kindle-swindle.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-kindle-swindle.ja.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/malware-kindle-swindle.ja.po 6 Jul 2015 02:00:29 -0000 1.3
+++ po/malware-kindle-swindle.ja.po 6 Jul 2015 02:28:12 -0000 1.4
@@ -86,8 +86,8 @@
"means functionalities designed to restrict what users can do with the data "
"in their computers."
msgstr ""
-"<a href=\"#drm\">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯"
-"ã¦ã¼ã¶ããã®ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã"
+"<a
href=\"#drm\">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯ã¦ã¼ã¶ããã®"
+"ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã"
#. type: Content of: <h3>
msgid "Amazon Kindle Swindle Back Doors"
Index: po/malware-microsoft.ja-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-microsoft.ja-en.html 15 Apr 2015 13:03:11 -0000 1.1
+++ po/malware-microsoft.ja-en.html 6 Jul 2015 02:28:12 -0000 1.2
@@ -3,10 +3,17 @@
<title>Microsoft's Software Is Malware
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-microsoft.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
<!--#include virtual="/server/banner.html" -->
+
<h2>Microsoft's Software is Malware</h2>
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
<div class="highlight-para">
@@ -29,22 +36,40 @@
</p>
</div>
+<div class="toc">
+<div class="malfunctions">
<ul>
- <li><p><a
-
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
- Windows 10 requires users to give permission for total snooping</a>,
- including their files, their commands, their text input, and their
- voice input.</p></li>
- <li><p>Microsoft Windows has a universal back door through which <a
-
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">
+<li><strong>Type of malware</strong></li>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a href="#censorship">Censorship</a></li>-->
+<!--<li><a href="#insecurity">Insecurity</a></li>-->
+<li><a href="#sabotage">Sabotage</a></li>
+<!--<li><a href="#interference">Interference</a></li>-->
+<li><a href="#surveillance">Surveillance</a></li>
+<li><a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>
+<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>
+</ul>
+</div>
+</div>
+
+<h3 id="back-doors">Microsoft Back Doors</h3>
+<ul>
+ <li><p>Microsoft Windows has a universal back door through which <a
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263">
any change whatsoever can be imposed on the users</a>.</p>
- <p>More information on when <a
- href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- this was used</a>.</p></li>
+ <p>More information on when <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ this was used</a>.</p>
- <li><p><a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ <p>In Windows 10, the universal back door is no longer hidden; all
“upgrades” will be
+ <a
href="http://www.appy-geek.com/Web/ArticleWeb.aspx?regionid=1&articleid=42633691&source=googleplus">forcibly
and immediately imposed</a>.</p></li>
+
+ <li><p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
Windows 8 also has a back door for remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
@@ -52,58 +77,93 @@
But there is no excuse for <em>deleting</em> the programs, and you
should have the right to decide who (if anyone) to trust in this
way.</p></li>
- <li><p>Windows 8's back doors are so gaping that <a
-
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
+ <li><p>Windows 8's back doors are so gaping that <a
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
the German government has decided it can't be trusted</a>.</p></li>
+</ul>
- <li><p><a
-
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
- Windows 8 on “mobile devices” is a jail</a>: it censors the
- user's choice of application programs.</p></li>
+<h3 id="sabotage">Microsoft Sabotage</h3>
+<ul>
+ <li><p><a
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
+ Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
- <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
- Mobile devices that come with Windows 8 are tyrants</a>: they block
- users from installing other or modified operating systems.</p></li>
+ <li><p><a
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">
+ Microsoft cut off security fixes for Windows XP, except to some big users
+ that pay exorbitantly.</a></p>
- <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM (digital restrictions mechanisms) in Windows</a>, introduced to
- cater to <a href="/philosophy/proprietary-drm.html#bluray">Bluray</a> disks.
- (The article also talks about how the same malware would later be introduced
- in MacOS.)</p></li>
+ <p>Microsoft is going to
+ <a
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
+ cut off support for some Internet Explorer versions</a> in the same way.</p>
+
+ <p>I think a person or company has the right to cease to work on a
+ particular program; the wrong here is Microsoft does this after having
+ made the users dependent on Microsoft, so they are not free to ask
+ someone else to work on the program for them.</p></li>
+</ul>
- <li>Spyware in Windows: <a
- href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+<h3 id="surveillance">Microsoft Surveillance</h3>
+<ul>
+ <li><p>
+ Microsoft uses Windows 10's “privacy policy” to overtly impose a
+ “right” to look at users' files at any time. Windows 10 full disk
+ encryption <a
href="https://edri.org/microsofts-new-small-print-how-your-personal-data-abused/">
+ gives Microsoft a key</a>.</p>
+
+ <p>Thus, Windows is overt malware in regard to surveillance,
+ as in other issues.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on demand?</p>
+
+ <p>The unique “advertising ID” for each user enables other
companies to
+ track the browsing of each specific user.</p>
+
+ <p>It's as if Microsoft has deliberately chosen to make Windows 10
+ maximally evil on every dimeinsion; to make a grab for total power
+ over anyone that doesn't drop Windows now.</p></li>
+
+ <li><p><a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
+ Windows 10 requires users to give permission for total snooping</a>,
+ including their files, their commands, their text input, and their
+ voice input.</p></li>
+
+ <li>Spyware in Windows: <a
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user.</a>
- <a
-
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ <a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
Windows 8.1 snoops on local searches.</a> And there's a
<a href="http://www.marketoracle.co.uk/Article40836.html">
secret NSA key in Windows</a>, whose functions we don't know.</li>
- <li><p><a
-
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
- Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
-
<li><p>
<a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
</li>
+</ul>
- <li><p><a
-
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm">
- Microsoft cut off security fixes for Windows XP, except to some big users
- that pay exorbitantly.</a></p>
+<h3 id="drm">Microsoft DRM</h3>
+<ul>
+ <li><p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM (digital restrictions mechanisms) in Windows</a>, introduced to
+ cater to <a href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
+ (The article also talks about how the same malware would later be introduced
+ in MacOS.)</p></li>
+</ul>
- <p>Microsoft is going to
- <a
href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/">
- cut off support for some Internet Explorer versions</a> in the same
way.</p>
+<h3 id="jails">Microsoft Jails</h3>
+<ul>
+ <li><p><a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
+ Windows 8 on “mobile devices” is a jail</a>: it censors the
+ user's choice of application programs.</p></li>
+</ul>
- <p>I think a person or company has the right to cease to work on a
- particular program; the wrong here is Microsoft does this after having
- made the users dependent on Microsoft, so they are not free to ask
- someone else to work on the program for them.</p></li>
+<h3 id="tyrants">Microsoft Tyrants</h3>
+<ul>
+ <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
+ Mobile devices that come with Windows 8 are tyrants</a>: they block
+ users from installing other or modified operating systems.</p></li>
</ul>
+
<p>As this page shows, if you do want to clean your computer of malware,
the first software to delete is Windows.</p>
@@ -139,7 +199,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -157,14 +217,14 @@
<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/04/15 13:03:11 $
+$Date: 2015/07/06 02:28:12 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- po/malware-microsoft.ja.po 6 Jul 2015 02:00:29 -0000 1.7
+++ po/malware-microsoft.ja.po 6 Jul 2015 02:28:12 -0000 1.8
@@ -31,8 +31,8 @@
"<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
"malware</a>"
msgstr ""
-"<a
href=\"/proprietary/proprietary.html\">ã»ãã®ãããã©ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®ä¾"
-"</a>"
+"<a
href=\"/proprietary/proprietary.html\">ã»ãã®ãããã©ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®"
+"ä¾</a>"
#. type: Content of: <div><p>
msgid ""
@@ -87,23 +87,24 @@
"means functionalities designed to restrict what users can do with the data "
"in their computers."
msgstr ""
-"<a href=\"#drm\">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯"
-"ã¦ã¼ã¶ããã®ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã"
+"<a
href=\"#drm\">ãã£ã¸ã¿ã«æ¨©é管ç</a>ã¾ã㯓DRM”ã¯ã¦ã¼ã¶ããã®"
+"ã³ã³ãã¥ã¼ã¿ã®ãã¼ã¿ã«ã§ãããã¨ãå¶éããããã«è¨è¨ãããæ©è½ãæå³ãã¾ãã"
#. type: Content of: <div><div><ul><li>
msgid ""
"<a href=\"#jails\">Jails</a>—systems that impose censorship on "
"application programs."
msgstr ""
-"<a href=\"#jails\">ç¢ç</a>—ã¢ããªã±ã¼ã·ã§ã³ã»ããã°ã©ã
ã®æ¤é²ãå¼·è¦ããã·ã¹ãã ã"
+"<a href=\"#jails\">ç¢ç</a>—ã¢ããªã±ã¼ã·ã§ã³ã»ããã°ã©ã
ã®æ¤é²ãå¼·è¦ã"
+"ãã·ã¹ãã ã"
#. type: Content of: <div><div><ul><li>
msgid ""
"<a href=\"#tyrants\">Tyrants</a>—systems that reject any operating "
"system not “authorized” by the manufacturer."
msgstr ""
-"<a
href=\"#tyrants\">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªãã¬ã¼ãã£ã³ã°ã»"
-"ã·ã¹ãã ãæ絶ããã·ã¹ãã ã"
+"<a
href=\"#tyrants\">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªã"
+"ã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã ãæ絶ããã·ã¹ãã ã"
#. type: Content of: <h3>
msgid "Microsoft Back Doors"
@@ -135,10 +136,10 @@
"aspx?regionid=1&articleid=42633691&source=googleplus\">forcibly and "
"immediately imposed</a>."
msgstr ""
-"ã¦ã£ã³ãã¦ãº10ã§ã¯ãä¸è½ããã¯ãã¢ã¯ãã¯ãé
ããã¦ãã¾ããããã¹ã¦ã®ãã¢ããã°ã¬ã¼ããã¯"
-"<a href=\"http://www.appy-geek.com/Web/ArticleWeb."
-"aspx?regionid=1&articleid=42633691&source=googleplus\">å¼·å¶çã«ã"
-"ãã¤å³æã«æ¼ãä»ãããã¾ã</a>ã"
+"ã¦ã£ã³ãã¦ãº10ã§ã¯ãä¸è½ããã¯ãã¢ã¯ãã¯ãé
ããã¦ãã¾ããããã¹ã¦ã®ãã¢ãã"
+"ã°ã¬ã¼ããã¯<a href=\"http://www.appy-geek.com/Web/ArticleWeb.aspx?"
+"regionid=1&articleid=42633691&source=googleplus\">å¼·å¶çã«ããã¤å³æ"
+"ã«æ¼ãä»ãããã¾ã</a>ã"
#. type: Content of: <ul><li><p>
msgid ""
@@ -233,16 +234,17 @@
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
"your-personal-data-abused/\"> gives Microsoft a key</a>."
msgstr ""
-"ãã¤ã¯ãã½ããã¯ã¦ã£ã³ãã¦ãº10ã®ããã©ã¤ãã·ã¼ã»ããªã·ã¼ãã使ããã¦ã¼ã¶ã®ãã¡ã¤ã«ã"
-"ãã¤ã§ãè¦ããããã«æç½ã«ã権å©ããæ¼ãä»ãã¾ããã¦ã£ã³ãã¦ãº10ã®ãã«ã»ãã£ã¹ã¯æå·åã¯"
-"<a href=\"https://edri.org/microsofts-new-small-print-how-"
-"your-personal-data-abused/\">ãã¤ã¯ãã½ããã«éµã渡ãã¾ã</a>ã"
+"ãã¤ã¯ãã½ããã¯ã¦ã£ã³ãã¦ãº10ã®ããã©ã¤ãã·ã¼ã»ããªã·ã¼ãã使ããã¦ã¼ã¶ã®"
+"ãã¡ã¤ã«ããã¤ã§ãè¦ããããã«æç½ã«ã権å©ããæ¼ãä»ãã¾ããã¦ã£ã³ãã¦ãº10ã®"
+"ãã«ã»ãã£ã¹ã¯æå·åã¯<a
href=\"https://edri.org/microsofts-new-small-print-"
+"how-your-personal-data-abused/\">ãã¤ã¯ãã½ããã«éµã渡ãã¾ã</a>ã"
#. type: Content of: <ul><li><p>
msgid ""
"Thus, Windows is overt malware in regard to surveillance, as in other issues."
msgstr ""
-"ã§ããããã¦ã£ã³ãã¦ãºã¯ã»ãã®åé¡ã¨åãããç£è¦ã«é¢ãã¦ã¯æç½ã«ãã«ã¦ã§ã¢ã§ãã"
+"ã§ããããã¦ã£ã³ãã¦ãºã¯ã»ãã®åé¡ã¨åãããç£è¦ã«é¢ãã¦ã¯æç½ã«ãã«ã¦ã§ã¢ã§"
+"ãã"
#. type: Content of: <ul><li><p>
msgid ""
@@ -250,17 +252,17 @@
"demand, though the “privacy policy” does not explicit say so. "
"Will it look at users' files for the Chinese government on demand?"
msgstr ""
-"ãã¤ã¯ãã½ãããåè¡å½æ¿åºã®ããã«ãè¦æ±ã«å¿ãã¦ã¦ã¼ã¶ã®ãã¡ã¤ã«ãè¦ããã¨"
-"æ³å®ã§ãã¾ããããã©ã¤ãã·ã¼ã»ããªã·ã¼ãã¯æ示ãã¦ããã¯ããã¾ãããã"
-"ä¸å½æ¿åºã®ããã«è¦æ±ã«å¿ãã¦ã¦ã¼ã¶ã®ãã¡ã¤ã«ãè¦ãã§ãããã?"
+"ãã¤ã¯ãã½ãããåè¡å½æ¿åºã®ããã«ãè¦æ±ã«å¿ãã¦ã¦ã¼ã¶ã®ãã¡ã¤ã«ãè¦ããã¨æ³"
+"å®ã§ãã¾ããããã©ã¤ãã·ã¼ã»ããªã·ã¼ãã¯æ示ãã¦ããã¯ããã¾ããããä¸å½æ¿åº"
+"ã®ããã«è¦æ±ã«å¿ãã¦ã¦ã¼ã¶ã®ãã¡ã¤ã«ãè¦ãã§ãããã?"
#. type: Content of: <ul><li><p>
msgid ""
"The unique “advertising ID” for each user enables other "
"companies to track the browsing of each specific user."
msgstr ""
-"ã¦ã¼ã¶ããããã®ã¦ãã¼ã¯ãªãåºåIDãã¯ãã»ãã®ä¼ç¤¾ããç¹å®ã®ã¦ã¼ã¶ããããã®é²è¦§ã"
-"追跡ãããã¨ãå¯è½ã«ãã¾ãã"
+"ã¦ã¼ã¶ããããã®ã¦ãã¼ã¯ãªãåºåIDãã¯ãã»ãã®ä¼ç¤¾ããç¹å®ã®ã¦ã¼ã¶ããããã®"
+"é²è¦§ã追跡ãããã¨ãå¯è½ã«ãã¾ãã"
#. type: Content of: <ul><li><p>
msgid ""
@@ -268,8 +270,9 @@
"evil on every dimeinsion; to make a grab for total power over anyone that "
"doesn't drop Windows now."
msgstr ""
-"ããã¯ãã¤ã¯ãã½ããããããã¨å
¨æ¬¡å
ã«æ大éã«ã¦ã£ã³ãã¦ãº10ã極æªã¨ãããã¨é¸æãããã®"
-"ããã§ããä»ãã¦ã£ã³ãã¦ãºãæ¨ã¦å»ããã¨ãããªã誰ã«å¯¾ãã¦ã§ãããã®å
¨æ¨©ãã¤ãããã¨ãã¦ã"
+"ããã¯ãã¤ã¯ãã½ããããããã¨å
¨æ¬¡å
ã«æ大éã«ã¦ã£ã³ãã¦ãº10ã極æªã¨ãããã¨"
+"é¸æãããã®ããã§ããä»ãã¦ã£ã³ãã¦ãºãæ¨ã¦å»ããã¨ãããªã誰ã«å¯¾ãã¦ã§ãã"
+"ãã®å
¨æ¨©ãã¤ãããã¨ãã¦ã"
#. type: Content of: <ul><li><p>
msgid ""
Index: po/malware-mobiles.ja-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/malware-mobiles.ja-en.html 15 Apr 2015 13:03:14 -0000 1.1
+++ po/malware-mobiles.ja-en.html 6 Jul 2015 02:28:12 -0000 1.2
@@ -3,12 +3,19 @@
<title>Malware in Mobile Devices
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
+<style type="text/css" media="print,screen">
+<!--
+#content div.toc li { list-style: none; margin-bottom: 1em; }
+#content div.toc { margin-top: 1em; }
+-->
+</style>
<!--#include virtual="/server/banner.html" -->
<h2>Malware in Mobile Devices</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
-malware</a>
+<p><a href="/philosophy/proprietary.html">Other examples of proprietary
+malware</a></p>
+<div class="highlight-para">
<p>
<em>Malware</em> means software designed to function in ways that
mistreat or harm the user. (This does not include accidental errors.)
@@ -25,27 +32,36 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
+</div>
<p>Here are examples of malware in mobile devices. See also
the <a href="/philosophy/malware-apple.html">the Apple malware
page</a> for malicious functionalities specific to the Apple iThings.</p>
+<div class="toc">
+<div class="malfunctions">
<ul>
- <li><p>Many proprietary apps for mobile devices report which other
- apps the user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and
- optional</a>. Not as bad as what the others do.</p>
- </li>
-
- <li><p>Portable phones with GPS will send their GPS location on remote
- command and users cannot stop them: <a
-
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones to have
- GPS.)</p>
- </li>
+<li><strong>Type of malware</strong></li>
+<li><a href="#back-doors">Back doors</a></li>
+<!--<li><a href="#censorship">Censorship</a></li>-->
+<li><a href="#insecurity">Insecurity</a></li>
+<!--<li><a href="#sabotage">Sabotage</a></li>-->
+<!--<li><a href="#interference">Interference</a></li>-->
+<li><a href="#surveillance">Surveillance</a></li>
+<!--<li><a href="#drm">Digital restrictions
+ management</a> or “DRM” means functionalities designed
+ to restrict what users can do with the data in their computers.</li>-->
+<li><a href="#jails">Jails</a>—systems
+ that impose censorship on application programs.</li>
+<li><a href="#tyrants">Tyrants</a>—systems
+ that reject any operating system not “authorized” by the
+ manufacturer.</li>
+</ul>
+</div>
+</div>
+<h3 id="back-doors">Mobile Back Doors</h3>
+<ul>
<li><p>Most mobile phones have a universal back door, which has been
used to <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
@@ -58,6 +74,39 @@
device.</p>
</li>
+ <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the system.</p>
+ </li>
+
+ <li>
+ <p>In Android, <a
+
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete apps.</a> (It is in a program
+ called GTalkService).
+ </p>
+
+ <p>
+ Google can
+ also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">forcibly
+ and remotely install apps</a> through GTalkService (which seems, since
+ that article, to have been merged into Google Play). This adds up to
+ a universal back door.
+ </p>
+
+ <p>
+ Although Google's <em>exercise</em> of this power has not been
+ malicious so far, the point is that nobody should have such power,
+ which could also be used maliciously. You might well decide to let a
+ security service remotely <em>deactivate</em> programs that it
+ considers malicious. But there is no excuse for allowing it
+ to <em>delete</em> the programs, and you should have the right to
+ decide who (if anyone) to trust in this way.
+ </p>
+ </li>
+</ul>
+
+<h3 id="insecurity">Mobile Insecurity</h3>
+<ul>
<li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones, Android, and
BlackBerry</a>. While there is not much detail here, it seems that this
@@ -66,6 +115,24 @@
<a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
lots of bugs in the phones' radio software</a>.</p>
</li>
+</ul>
+
+<h3 id="surveillance">Mobile Surveillance</h3>
+<ul>
+ <li><p>Many proprietary apps for mobile devices report which other
+ apps the user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way that at least is visible and
+ optional</a>. Not as bad as what the others do.</p>
+ </li>
+
+ <li><p>Portable phones with GPS will send their GPS location on remote
+ command and users cannot stop them: <a
+
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones to have
+ GPS.)</p>
+ </li>
<li><p>Spyware in Cisco TNP IP phones: <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
@@ -98,42 +165,10 @@
<p>Don't be distracted by the question of whether the app developers get
users to say “I agree”. That is no excuse for malware.</p>
</li>
+</ul>
- <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the system.</p>
- </li>
-
- <li>
- <p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete apps.</a> (It is in a program
- called GTalkService).
- </p>
-
- <p>
- Google can
- also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">forcibly
- and remotely install apps</a> through GTalkService (which seems, since
- that article, to have been merged into Google Play). This adds up to
- a universal back door.
- </p>
-
- <p>
- Although Google's <em>exercise</em> of this power has not been
- malicious so far, the point is that nobody should have such power,
- which could also be used maliciously. You might well decide to let a
- security service remotely <em>deactivate</em> programs that it
- considers malicious. But there is no excuse for allowing it
- to <em>delete</em> the programs, and you should have the right to
- decide who (if anyone) to trust in this way.
- </p>
- </li>
-
- <li><p><a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
- Some Android phones are tyrants</a> (though someone found a way to crack
- the restriction). Fortunately, most Android devices are not tyrants.</p>
- </li>
-
+<h3 id="jails">Mobile Jails</h3>
+<ul>
<li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Mobile devices that come with Windows 8 are tyrants</a>. <a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
@@ -141,6 +176,13 @@
</li>
</ul>
+<h3 id="tyrants">Mobile Tyrants</h3>
+<ul>
+ <li><p><a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
+ Some Android phones are tyrants</a> (though someone found a way to crack
+ the restriction). Fortunately, most Android devices are not tyrants.</p>
+ </li>
+</ul>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
<div id="footer">
@@ -173,7 +215,7 @@
<!-- Regarding copyright, in general, standalone pages (as opposed to
files generated as part of manuals) on the GNU web server should
- be under CC BY-ND 3.0 US. Please do NOT change or remove this
+ be under CC BY-ND 4.0. Please do NOT change or remove this
without talking with the webmasters or licensing team first.
Please make sure the copyright date is consistent with the
document. For web pages, it is ok to list just the latest year the
@@ -191,14 +233,14 @@
<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/">Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
<!--#include virtual="/server/bottom-notes.html" -->
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/04/15 13:03:14 $
+$Date: 2015/07/06 02:28:12 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- po/malware-mobiles.ja.po 6 Jul 2015 02:00:29 -0000 1.6
+++ po/malware-mobiles.ja.po 6 Jul 2015 02:28:12 -0000 1.7
@@ -93,15 +93,16 @@
"<a href=\"#jails\">Jails</a>—systems that impose censorship on "
"application programs."
msgstr ""
-"<a href=\"#jails\">ç¢ç</a>—ã¢ããªã±ã¼ã·ã§ã³ã»ããã°ã©ã
ã®æ¤é²ãå¼·è¦ããã·ã¹ãã ã"
+"<a href=\"#jails\">ç¢ç</a>—ã¢ããªã±ã¼ã·ã§ã³ã»ããã°ã©ã
ã®æ¤é²ãå¼·è¦ã"
+"ãã·ã¹ãã ã"
#. type: Content of: <div><div><ul><li>
msgid ""
"<a href=\"#tyrants\">Tyrants</a>—systems that reject any operating "
"system not “authorized” by the manufacturer."
msgstr ""
-"<a
href=\"#tyrants\">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªãã¬ã¼ãã£ã³ã°ã»"
-"ã·ã¹ãã ãæ絶ããã·ã¹ãã ã"
+"<a
href=\"#tyrants\">æ´å</a>—ã¡ã¼ã«ã«ãã£ã¦ãæ¿èªãããã¦ããªããªã"
+"ã¬ã¼ãã£ã³ã°ã»ã·ã¹ãã ãæ絶ããã·ã¹ãã ã"
#. type: Content of: <h3>
msgid "Mobile Back Doors"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-apple.ja.html malware-k...,
GNUN <=