[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www education/edu-software-tuxpaint.ja.html lic...
From: |
GNUN |
Subject: |
www education/edu-software-tuxpaint.ja.html lic... |
Date: |
Tue, 14 Jul 2015 02:01:04 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/07/14 02:01:04
Modified files:
education : edu-software-tuxpaint.ja.html
licenses : gpl-faq.es.html
philosophy/po : surveillance-vs-democracy.translist
proprietary : proprietary-jails.ja.html
Added files:
philosophy : surveillance-vs-democracy.ja.html
philosophy/po : surveillance-vs-democracy.ja-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/education/edu-software-tuxpaint.ja.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/gpl-faq.es.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ja.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.translist?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.ja-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.ja.html?cvsroot=www&r1=1.4&r2=1.5
Patches:
Index: education/edu-software-tuxpaint.ja.html
===================================================================
RCS file: /web/www/www/education/edu-software-tuxpaint.ja.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- education/edu-software-tuxpaint.ja.html 14 Jul 2015 00:59:26 -0000
1.39
+++ education/edu-software-tuxpaint.ja.html 14 Jul 2015 02:01:03 -0000
1.40
@@ -58,9 +58,9 @@
<div class="photo">
-<!-- GNUN: localize URL /education/misc/tuxpaint-start-sm.png,
/education/misc/tuxpaint-start.png -->
-<a href="/education/misc/tuxpaint-start.png">
-<img class="recessed" src="/education/misc/tuxpaint-start-sm.png"
+<!-- GNUN: localize URL /education/misc/tuxpaint-start-sm.ja.png,
/education/misc/tuxpaint-start.ja.png -->
+<a href="/education/misc/tuxpaint-start.ja.png">
+<img class="recessed" src="/education/misc/tuxpaint-start-sm.ja.png"
alt="Tux Paintã®ã¹ã¯ãªã¼ã³ã·ã§ãã"/></a>
</div>
@@ -202,7 +202,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2015/07/14 00:59:26 $
+$Date: 2015/07/14 02:01:03 $
<!-- timestamp end -->
</p>
Index: licenses/gpl-faq.es.html
===================================================================
RCS file: /web/www/www/licenses/gpl-faq.es.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- licenses/gpl-faq.es.html 14 Jul 2015 01:27:26 -0000 1.55
+++ licenses/gpl-faq.es.html 14 Jul 2015 02:01:03 -0000 1.56
@@ -2557,9 +2557,9 @@
divisoria entre el JavaScript (bajo copyleft) y el código del usuario
(normalmente bajo condiciones incompatibles).</p>
-<!-- GNUN: localize URL /licenses/template-diagram.png -->
-<p><a href="/licenses/template-diagram.png">
-<img src="/licenses/template-diagram.png"
+<!-- GNUN: localize URL /licenses/template-diagram.es.png -->
+<p><a href="/licenses/template-diagram.es.png">
+<img src="/licenses/template-diagram.es.png"
alt="Un diagrama del contenido arriba mencionado"/></a></p>
<p>Asà lo hace esta excepción para el código JavaScript:</p>
@@ -3935,7 +3935,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2015/07/14 01:27:26 $
+$Date: 2015/07/14 02:01:03 $
<!-- timestamp end -->
</p>
Index: philosophy/po/surveillance-vs-democracy.translist
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.translist,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- philosophy/po/surveillance-vs-democracy.translist 23 May 2015 07:09:37
-0000 1.9
+++ philosophy/po/surveillance-vs-democracy.translist 14 Jul 2015 02:01:04
-0000 1.10
@@ -6,6 +6,7 @@
<span dir="ltr"><a lang="es" hreflang="es"
href="/philosophy/surveillance-vs-democracy.es.html">español</a> [es]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/philosophy/surveillance-vs-democracy.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="it" hreflang="it"
href="/philosophy/surveillance-vs-democracy.it.html">italiano</a> [it]</span>
+<span dir="ltr"><a lang="ja" hreflang="ja"
href="/philosophy/surveillance-vs-democracy.ja.html">æ¥æ¬èª</a> [ja]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/philosophy/surveillance-vs-democracy.ru.html">ÑÑÑÑкий</a> [ru]</span>
<span dir="ltr"><a lang="sq" hreflang="sq"
href="/philosophy/surveillance-vs-democracy.sq.html">Shqip</a> [sq]</span>
<span dir="ltr"><a lang="uk" hreflang="uk"
href="/philosophy/surveillance-vs-democracy.uk.html">ÑкÑаÑнÑÑка</a> [uk]</span>
@@ -16,6 +17,7 @@
<link rel="alternate" type="text/html" lang="es" hreflang="es"
href="/philosophy/surveillance-vs-democracy.es.html" title="español" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/philosophy/surveillance-vs-democracy.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="it" hreflang="it"
href="/philosophy/surveillance-vs-democracy.it.html" title="italiano" />
+<link rel="alternate" type="text/html" lang="ja" hreflang="ja"
href="/philosophy/surveillance-vs-democracy.ja.html" title="æ¥æ¬èª" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/philosophy/surveillance-vs-democracy.ru.html" title="ÑÑÑÑкий" />
<link rel="alternate" type="text/html" lang="sq" hreflang="sq"
href="/philosophy/surveillance-vs-democracy.sq.html" title="Shqip" />
<link rel="alternate" type="text/html" lang="uk" hreflang="uk"
href="/philosophy/surveillance-vs-democracy.uk.html"
title="ÑкÑаÑнÑÑка" />
Index: proprietary/proprietary-jails.ja.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.ja.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-jails.ja.html 9 Jul 2015 00:35:49 -0000
1.4
+++ proprietary/proprietary-jails.ja.html 14 Jul 2015 02:01:04 -0000
1.5
@@ -12,7 +12,7 @@
<a
href="/philosophy/proprietary.html">ã»ãã®ãããã©ã¤ã¨ã¿ãªã»ãã«ã¦ã§ã¢ã®ä¾</a>
-<p><em>ç¢ç</em>ã®ãããã©ã¤ã¨ã¿ãªãªã·ã¹ãã
ã®ä¾ããã¡ãã§ããã¦ã¼ã¶ãèªç±ã«ã¢ããªã±ã¼ã·ã§ã³ãã¤ã³ã¹ãã¼ã«ãã¨ãèªãã¾ããã<a
+<p><em>ç¢ç</em>ã®ãããã©ã¤ã¨ã¿ãªãªã·ã¹ãã
ã®ä¾ããã¡ãã§ããã¦ã¼ã¶ãèªç±ã«ã¢ããªã±ã¼ã·ã§ã³ãã¤ã³ã¹ãã¼ã«ãããã¨ãèªãã¾ããã<a
href="http://i.imgur.com/ZRViDum.jpg">iPrisonã®ç»å</a>ããã®åé¡ãæãã¦ãã¾ãã</p>
<!-- embed http://i.imgur.com/ZRViDum.jpg here -->
@@ -30,8 +30,7 @@
<li>
<p>
<a
-href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">ãã£ã¨å¤ãã®Appleã®æ£æçã§ä¸è²«æ§ã®ãªãæ¤é²ã®ä¾inconsistent
-censorship</a>ã§ãã
+href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">ãã£ã¨å¤ãã®Appleã®æ£æçã§ä¸è²«æ§ã®ãªãæ¤é²ã®ä¾</a>ã§ãã
</p>
</li>
@@ -55,8 +54,7 @@
</li>
<li>
-<p>ã²ã¼ã ã»ã³ã³ã½ã¼ã«ãç¢çã§ãã
-ãã®ã³ã³ã½ã¼ã«ã§ã¯ã³ã³ã½ã¼ã«ã®è£½é æ¥è
ããªã¼ã½ã©ã¤ãºããªãããããã©ããªã²ã¼ã
ãå®è¡ã§ãã¾ãããããããã®äºå®ã«å¯¾ãã¦åç
§ã§ããè¨äºãè¦ã¤ãããã¨ãã§ãã¾ããããåç¥ã®æ¹ã¯ããããã¡ã«ãç¥ãããã
ããã
+<p>ã²ã¼ã
ã»ã³ã³ã½ã¼ã«ãç¢çã§ãããã®ã³ã³ã½ã¼ã«ã§ã¯ã³ã³ã½ã¼ã«ã®è£½é
æ¥è
ããªã¼ã½ã©ã¤ãºããªãããããã©ããªã²ã¼ã
ãå®è¡ã§ãã¾ãããããããã®äºå®ã«å¯¾ãã¦åç
§ã§ããè¨äºãè¦ã¤ãããã¨ãã§ãã¾ããããåç¥ã®æ¹ã¯ããããã¡ã«ãç¥ãããã
ããã
</p>
</li>
@@ -129,7 +127,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2015/07/09 00:35:49 $
+$Date: 2015/07/14 02:01:04 $
<!-- timestamp end -->
</p>
Index: philosophy/surveillance-vs-democracy.ja.html
===================================================================
RCS file: philosophy/surveillance-vs-democracy.ja.html
diff -N philosophy/surveillance-vs-democracy.ja.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ philosophy/surveillance-vs-democracy.ja.html 14 Jul 2015 02:01:04
-0000 1.1
@@ -0,0 +1,267 @@
+<!--#set var="ENGLISH_PAGE"
value="/philosophy/surveillance-vs-democracy.en.html" -->
+
+<!--#include virtual="/server/header.ja.html" -->
+<!-- Parent-Version: 1.77 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>æ°ä¸»ä¸»ç¾©ã¯ã©ããããç£è¦ã«èãå¾ãã? -
GNUããã¸ã§ã¯ã -
ããªã¼ã½ããã¦ã§ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³</title>
+
+<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
+<!--#include virtual="/server/banner.ja.html" -->
+<h2>æ°ä¸»ä¸»ç¾©ã¯ã©ããããç£è¦ã«èãå¾ãã?</h2>
+
+<p><a
href="http://www.stallman.org/">ãªãã£ã¼ãã»ã¹ãã¼ã«ãã³</a>è</p>
+
+<blockquote><p>ãã®å°è«ã®çã¯æåã«ã<a
+href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">Wired</a>ã§2013å¹´10æã«çºè¡¨ããã¾ããã</p></blockquote>
+
+<p>ã¨ãã¯ã¼ãã»ã¹ãã¼ãã³ã®æ´é²ã®ãããã§ã社ä¼ã«ãããç¾å¨ã®ä¸è¬ç£è¦ã®ã¬ãã«ã¯äººæ¨©ã¨ä¸¡ç«ããªããã¨ãç¥ãã¾ãããåè¡å½ãããã¯ã»ãã§ã®ãåä½å¶ã®äººã
ãæ
å
±æºãããã¦ã¸ã£ã¼ããªã¹ãã¸ç¹°ãè¿ããããã©ã¹ã¡ã³ãã¨åäºè¨´è¿½ã¯ããããè£ä»ãã¦ãã¾ããããããã¡ã¯ä¸è¬ç£è¦ã®ã¬ãã«ãåæ¸ããå¿
è¦ãããã¾ããããã£ããã©ãã¾ã§å¿
è¦ã§ãããã?
+ãããè¶ãã¦ã¯ãªããªãã¨ä¿è¨¼ãã¹ã<em>æ大éãèªããããç£è¦ã®ã¬ãã«</em>ã¯ä¸ä½ã©ãã«ããã§ãããã?
+(ä»ã®ã¾ã¾ã§ã¯)ããã¯æ°ä¸»ä¸»ç¾©ã®æ©è½ã¨å¹²æ¸ãå§ããç£è¦ã®ã¬ãã«ãè¶ãããã®ã§ã(ã¹ãã¼ãã³ã®ãããª)åçºè
ãæã¾ã£ã¦ãã¾ããããªãã®ã§ãããã</p>
+
+<p>æ¿åºã®ç§å¯å³å®ã«å¯¾ãã¦ãããããã¡å¸æ°ã¯<a
+href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">å½ãä½ããã¦ããã®ããä¼ãã¦ããã</a>åçºè
ã«ä¾æ ãã¦ãã¾ããããããä»æ¥ã®ç£è¦ã¯æ½å¨çãªåçºè
ãè
ããã¦ãããããã¯ç£è¦ãç¨åº¦ãè¶ãã¦ãããã¨ãæå³ãã¾ããå½ã«å¯¾ããæ°ä¸»çãªå¶å¾¡ãå復ããã«ã¯ãåçºè
ãèªåãå®å
¨ã
ã¨ãããç¹ã¾ã§ç£è¦ãåæ¸ããªããã°ãªãã¾ããã</p>
+
+<p>èªç±/ãªãã¬ã®ã½ããã¦ã§ã¢ã使ãã®ã¯ã<a
+href="/philosophy/free-software-even-more-important.html">ããããã¡ã¯30å¹´ãã®ããã«æè·ãã¦ãã¾ãã</a>ãããããã¡ããã£ã¸ã¿ã«ã®æ®ããã®ã³ã³ããã¼ã«ãææ¡ãã第ä¸æ©ã§ãããããã«ã¯ç£è¦ãé»æ¢ãããã¨ãå«ã¾ãã¾ããä¸èªç±ãªã½ããã¦ã§ã¢ãä¿¡ç¨ãããã¨ã¯ã§ãã¾ãããä¸èªç±ãªã½ããã¦ã§ã¢ã®ã»ãã¥ãªãã£ã®å¼±ç¹ããNSAã¯<a
+href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">å©ç¨ã</a>ãããã¦<a
+href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">ä½ãåºããã¨</a>ãããã¦ãããããã¡èªèº«ã®ã³ã³ãã¥ã¼ã¿ãã«ã¼ã¿ã«ä¾µå
¥ããã®ã§ããèªç±ã½ããã¦ã§ã¢ã¯ãããããã¡èªèº«ã®ã³ã³ãã¥ã¼ã¿ã®ã³ã³ããã¼ã«ãä¸ãã¾ããã<a
+href="http://www.wired.com/opinion/2013/10/149481/">ã²ã¨ãã³ãã¤ã³ã¿ã¼ãããã«è¶³ãè¸ã¿å
¥ããã°ããã(ã
ã)ã§ã¯ããããã¡ã®ãã©ã¤ãã·ã¼ãå®ããªãã§ããã</a>ã</p>
+
+<p>åè¡å½ã§ã¯<a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">äºå¤§æ¿å
ææºã®ãèªå½ã®ç£è¦ã®åãåæ¸ãããæ³æ¡</a>ãä½æãããã¨ããã§ãããããã¯ãããããã¡ã®ãããã®è¨é²ã«å¯¾ããæ¿åºã®å©ç¨ã®å¶éã«ä¾åãã¦ãã¾ããããããåçºè
ãæã¾ããããã¨ãæ ¹æ ã¨ãã¦ãåçºè
ãåå®ããã®ã«å
åãªã¢ã¯ã»ã¹ã許ãããã¨ããã°ããã®æ³æ¡ã¯åçºè
ãå®ãã®ã«å
åã§ã¯ãªãã§ãããããã£ã¨å
ã«è¡ãå¿
è¦ãããã¾ãã</p>
+
+<h3>æ°ä¸»ä¸»ç¾©ã«ãããç£è¦ã®ä¸é</h3>
+
+<p>ãããåçºè
ãç¯ç½ªã¨èå½ãæãã«ããªããã°ãããããã¡ã®æ¿åºã¨æ©é¢ãå¹æçã«ã³ã³ããã¼ã«ããæå¾ã®æçã失ãã§ãããã誰ãè¨è
ã«è©±ããã®ããå½ãè¦ã¤ãåºããã¨ãå¯è½ã¨ãããããªç£è¦ã¯ããããã§ãæ°ä¸»ä¸»ç¾©ãèãå¾ã度ãè¶ãã¦ããã®ã§ãã</p>
+
+<p>å¿åã®åè¡å½æ¿åºã®å
¬åå¡ã¯ä¸æ°å³ã«2011å¹´ãã¸ã£ã¼ããªã¹ãã«ããè¨ãã¾ããã<a
+href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">åè¡å½ã¯è¨è
ãå¬åããªãã
ããããªããªããããããã¡ã¯ããªãæ¹ã誰ã«è©±ãã¦ããããç¥ã£ã¦ãããããã
</a>ãã¨ãæã
ã<a
+href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">ã¸ã£ã¼ããªã¹ãã®é話è¨é²ã«å¯¾ãã¦(è£å¤æã®)é示è«æ±</a>ããªããã誰ã誰ã«é話ããã調æ»ããã¾ãããåè¡å½ã常æãå
¨å¡ã®ãã¹ã¦ã®é話è¨é²ã<a
+href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">Verizonãã</a>ãã¾ãã<a
+href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">ã»ãã®ä¼ç¤¾ãããtoo</a>å®å¹çã«åéãã¦ãããã¨ããã¹ãã¼ãã³ã¯ããããã¡ã«ç¤ºããã®ã§ãã</p>
+
+<p>å対ã¨åä½å¶ã®æ´»åã¯å½ããç§å¿ãããå¿
è¦ãããã¾ããå½ã¯ãããã£ãæ´»åã«å¯¾ããåå£ãªä¼ã¿ããããã®ã
ããã§ããACLUã¯åè¡å½æ¿åºã®<a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">å¹³åçãªåä½å¶ã®ã°ã«ã¼ãã«æ½å
¥ããã·ã¹ããããã¯ãªæ
£ç¿</a>ã示ãã¾ãããããã¯ãã°ã«ã¼ãã®ä¸ã«ãããªã¹ãããããããããªãã¨ããå£å®ã§è¡ãããã®ã§ããç£è¦ãããããã§ããã¨ããç¹ã¯ãå½ãç¥ããã¦ããã¸ã£ã¼ããªã¹ããç¥ããã¦ããåä½å¶æ´¾ã¨è©±ãã人ãæ¢ãåºããã¨ããç¹ã§ãã</p>
+
+<h3>æ
å ±ã¯ä¸åº¦éç©ãããã°æªç¨ããã</h3>
+
+<p>人ã
ãä¸è¬ç£è¦ã®ã¬ãã«ãã¨ã¦ãé«ãã¨èªèããã¨ããæåã®åå¿ã¯éç©ããããã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ã®å¶éãææ¡ãããã¨ã§ããããã¯èããã¯ããã§ãããã»ãã®å°ãã§ããåé¡ã解決ãã¾ãããæ¿åºãã«ã¼ã«ã«ããããã¨æã£ã¦ããããã§ãããã(NSAã¯FIFAæ³å»·ã誤解ãããFIFAã¯ã<a
+href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">NSAã«å®è³ªã®èª¬æ責任ãããã¨ã¯ã¿ãªããªã</a>ã¨è¨ãã¾ããã)ç¯ç½ªã®å®¹çãã¢ã¯ã»ã¹ã¸ã®æ
¹æ ã¨ãªãã§ããããããä¸æ¦ãåçºè
ããã¹ãã¤æ´»åãã¨è¨´ããããã°ããã¹ãã¤ããæ¢ãã¨ããè¨ã訳ã§ãéç©ããããã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ãããã¨ã«ãªãã§ãããã</p>
+
+<p>å½ã®ç£è¦ã¹ã¿ããã¯å人çãªçç±ã§ãã®ãã¼ã¿ã®æªç¨ãããã§ããããNSAã®ã¨ã¼ã¸ã§ã³ãã¯<a
+href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">åè¡å½ã®ç£è¦ã·ã¹ãã
ããããã®æ人ãã¡ã追跡ããã®ã«ä½¿ãã¾ãã</a>(“LOVEINT.”ã¨å¼ã°ããæ
£ç¿ã§ãéå»ãç¾å¨ããããã¯å°æ¥ããæãæ人ã追跡ãã¾ã)ãNSAã¯ãä½åãæã¾ãã¦ç½°ããã¨è¨ãã¾ãããæã¾ããããªãã£ããã以å¤ã®åæ°ãããããã¡ã¯ç¥ãã¾ããããããããã®ãããªã¤ãã³ãã¯ããããã¡ãé©ããã¾ããããªããªããè¦å¯ã¯ããã£ã¨<a
+href="http://www.sweetliberty.org/issues/privacy/lein1.htm">誰ãé
åçãªäººã追跡ããã®ã«é転å
許ã®è¨é²ã¸ã®ã¢ã¯ã»ã¹ã使ã£ã¦ã¾ã</a>ãããããã¼ãã®ããã«ãã³ãã¼ãã¬ã¼ããç
§ä¼ãããã¨ãã¦ç¥ããã¦ããæ
£ç¿ã§ãã</p>
+
+<p>ç£è¦ãã¼ã¿ã¯ã»ãã®ç®çã«å¸¸ã«ä½¿ãããã§ãããããã¨ãç¦æ¢ããã¦ãã¦ãã§ããã²ã¨ãã³ããã¼ã¿ãéç©ãããå½ãããã«ã¢ã¯ã»ã¹ããå¯è½æ§ããããªããå½ã¯ããã®ãã¼ã¿ãæãããæ¹æ³ã§æªç¨ãããã®ã§ãããã¨ãã°ã<a
+href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">ã¨ã¼ããã</a>ã¨<a
+href="https://en.wikipedia.org/wiki/Japanese_American_internment">åè¡å½</a>ããã®ä¾ã§ç¤ºãããããã«ã</p>
+
+<p>å½å®¶ãéç©ããå人ã®ãã¼ã¿ã¯ãã¾ãããµã¼ãã®ã»ãã¥ãªãã£ãç
´ãã¯ã©ãã«ã¼ã«ãã£ã¦ç²å¾ããããã¨ããããã¾ãã<a
+href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">æµå¯¾çãªå½ã®ããã«åãã¦ããã¯ã©ãã«ã¼</a>ããç¥ãã¾ããã</p>
+
+<p>å
¨ä½ç£è¦ã¨å¼±ãæ³å¾ã®ä¿è·ã¯ã誰ã«å¯¾ãã¦ã§ããå½å®¶ã大éã®æ
å ±èª¿æ»ãå§ãããã¨ãå¯è½ã¨ãã¾ããã¸ã£ã¼ããªãºã
ã¨æ°ä¸»ä¸»ç¾©ãå®å
¨ã«ããããã«ã¯ãå½ã«ãã£ã¦ç°¡åã«ã¢ã¯ã»ã¹å¯è½ãªãã¼ã¿ã®éç©ãå¶éãããªããã°ãªãã¾ããã</p>
+
+<h3>ãã©ã¤ãã·ã®å
ç¢ãªä¿è·ã¯æè¡çã§ãªããã°ãªããªã</h3>
+
+<p>é»åããã³ãã£ã¢ãã¡ã¦ã³ãã¼ã·ã§ã³ã¨ã»ãã®å£ä½ã¯<a
+href="https://en.necessaryandproportionate.org/text">大éç£è¦ã®æªç¨ãç¦æ¢ãã</a>ããã«è¨è¨ãããæ³çãªååãææ¡ãã¦ãã¾ãããã®ååã¯ãåçºè
ã®æ確ãªæ³çä¿è·ãå¿
é
ã®ãã®ã¨ãã¦å«ã¿ã¾ããã§ããããçµæã¨ãã¦ãæ°ä¸»ä¸»ç¾©ã®èªç±ãä¿è·ããã«å
åã¨ãªãã§ãããããããå®å
¨ã«æ¡æãããä¾å¤ãªãã«æ°¸ä¹
ã«å®æ½ãããã®ã§ããã°ã</p>
+
+<p>ãããããããã£ãæ³çãªä¿è·ã¯ãã¦ã«ãªãã¾ãã:
æè¿ã®æ´å²ã¯ãããã¯å»æ¢(å¤å½è«å
±æ´»å調æ»æ³ä¿®æ£æ³ã«è¦ãããããã«)ãåæ¢ããããã¯<a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ç¡è¦ããã</a>ã®ã§ãã</p>
+
+<p>ãããã¦ããéã«ãããã´ã¼ã°ã¯å
¨ä½ç£è¦ã®æ ¹æ
ã¨ãã¦ãã¤ãã®ãããããå¼ç¨ããã§ãããããããªã¹ãã®æ»æããã£ãæ°äººã®äººã
ã殺ããã®ã§ããããã®ããããã«æ©ä¼ãä¸ããã§ãããã</p>
+
+<p>å¥ã«ãã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ã®å¶éãè¨å®ãããå
´åãã¾ã£ãããããã£ãå¶éãåå¨ããªããã®ããã«ãªãã§ããã:
+å¹´ã
ãã®ä¾¡å¤ãããè¨é²ãçªç¶ã«å½ã¨ãã®æ©é¢ã®èª¤ç¨ã«ããå©ç¨å¯è½ã¨ãªããä¼æ¥ã«ãã£ã¦éç©ãããã®ã§ããã°ãç§çãªèª¤ç¨ããããã¾ãããããããããªãããããããã¡ãå
¨å¡ã®è¨é²ã®éç©ãç¦æ¢ããã°ããã®æ§ãªè¨é²ã¯åå¨ãå¾ããé¡ã£ã¦ã¾ã¨ããæ¹æ³ã¯ãªãã®ã§ããæ°ããéèªç±ãªæ¿æ¨©ãç£è¦ãåã³å®è£
ããªããã°ãªããªããªãããç¥ãã¾ããããããã§ãããã®æç¹ããå§ãã¦ãã¼ã¿ãéç©ããã
ãã§ãããã®æ³å¾ãåæ¢ãããä¸æçã«ç¡è¦ããã«é¢ããéãããã®èãã¯æå³ãæã¤ã¨ã¯è¨ãé£ããã®ã§ãããã</p>
+
+<h3>ã¾ãããã«ãªãã¨ã¯ããããªãã</h3>
+
+<p>ãã©ã¤ãã·ãæããã«ã¯ããããæ¾ãæãã¦ã¯ããã¾ãã:
+第ä¸ã«ãã©ã¤ãã·ãå®ãã¹ããªã®ã¯ããªãã§ããã¦ã§ããµã¤ãã§ããªãèªèº«ãåå®ããããã¨ãé¿ããTorã使ã£ã¦éä¿¡ãã訪åè
ã追跡ãããããã®ä»çµã¿ããããã¯ãããã©ã¦ã¶ã使ãã¾ããããGNUãã©ã¤ãã·ã»ã¬ã¼ãã使ã£ã¦ãã¡ã¼ã«ã®ä¸èº«ãæå·åãã¾ããããç¾éã§è²·ãç©ããã¾ãããã</p>
+
+<p>èªåèªèº«ã®ãã¼ã¿ãä¿ç®¡ããä¼æ¥ã®ã便å©ãªããµã¼ãã«ããªãã®ãã¼ã¿ãç½®ããªããèªåèªèº«ã®ã³ã³ãã¥ã¼ã¿ã®èªç±ã½ããã¦ã§ã¢ã§ãã¢ãããã¼ãããåã«ããã¡ã¤ã«ãã¢ã¼ã«ã¤ãããã¢ã¼ã«ã¤ãå
¨ä½ãæå·åããã®ã§ããã°ãåç¨ãµã¼ãã¹ã¸ã®ãã¼ã¿ã®ããã¯ã¢ãããä¿¡ç¨ããã®ã¯ãããããªãããå®å
¨ã§ãããã</p>
+
+<p>ãã©ã¤ãã·ã®ããã«ãä¸èªç±ãªã½ããã¦ã§ã¢ãé¿ããªããã°ãªãã¾ããããªããªããããªãã®ã³ã³ãã¥ã¼ãã£ã³ã°ã®å¶å¾¡ãä»äººã«ä¸ããçµæã¨ãã¦ã<a
+href="/philosophy/proprietary-surveillance.html">ããªãã¯ã¹ãã¤ãããã§ããã</a>ããã§ããããªãã®ã³ã³ãã¥ã¼ãã£ã³ã°ã®å¶å¾¡ãä»äººã«ä¸ããã®ã¨åæ§ã«ã<a
+href="/philosophy/who-does-that-server-really-serve.html">ã½ããã¦ã§ã¢ä»£æ¿ã¨ãã¦ã®ãµã¼ãã¹</a>ãé¿ãã¾ãããããã¹ã¦ã®é¢é£ãããã¼ã¿ããµã¼ãã«è²ã渡ããã¨ãããã¯è¦æ±ããã®ã§ãã</p>
+
+<p>å人ãç¥äººã®ãã©ã¤ãã·
ãå®ãã¾ããããé£çµ¡æ¹æ³ä»¥å¤ã®<a
+href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">å人ç¥äººã®å人æ
å
±ã渡ããªãããã«ãã¾ããã</a>ãããã¦é»åã¡ã¼ã«ãé»è©±çªå·ã®ãªã¹ãã決ãã¦ã©ããªã¦ã§ããµã¤ãã«ã渡ããªãããã«ãFacebookã®ãããªä¼ç¤¾ã«ãå人ã®æ°èã«çºè¡¨ãããããªããããªãã¨ã«ã¤ãã¦ãä¼ããªãããã«ãã¾ããããããè¯ãã¯ãFacebookãå
¨ã使ããªããã¨ã§ããæ¬åãã¦ã¼ã¶ã«å¿
é
ã¨ããéä¿¡ã·ã¹ãã
ãæå¦ãã¾ãããããã¨ããããªããèªåã®æ¬åã使ãã¨ãã¦ãããã®ã·ã¹ãã
ã¯ã»ãã®äººã
ã«ãããã®ãã©ã¤ãã·ã諦ããå§åã¨ãªãã¾ãããã</p>
+
+<p>èªå·±é²è¡ãéè¦ã§ããããã£ã¨ãé
ä¸ãªèªå·±é²è¡ã§ãã£ãã¨ãã¦ãããªãã®ãã®ã§ã¯ãªãã·ã¹ãã
ãã§/ããããã©ã¤ãã·ãå®ãã«ã¯ä¸ååã§ããã»ãã®äººã¨éä¿¡ããããé½å¸ã移åãããããã¨ããããããã¡ã®ãã©ã¤ãã·ã¯ç¤¾ä¼ã®æ
£ç¿ã«ä¾åãã¾ããéä¿¡ã移åãç£è¦ããããã·ã¹ãã
ãé¿ãããã¨ã¯ã§ãã¾ããããã¹ã¦ãé¿ãããã¨ã¯ã§ãã¾ãããæããã«ããã¹ã¦ã®ãããã£ãã·ã¹ãã
ã(妥å½ãªå®¹çãããå ´å以å¤ã¯)人ã
ãç£è¦ããªãããã«åæ¢ããã®ããã£ã¨ããã解決çã§ãã</p>
+
+<h3>ãã©ã¤ãã·ã®ããã«ãã¹ã¦ã®ã·ã¹ãã
ãè¨è¨ããªããã°ãªããªã</h3>
+
+<p>å
¨ä½ç£è¦ç¤¾ä¼ãæã¾ãªãã®ã§ããã°ãç£è¦ãå
¬å®³ã®ä¸ç¨®ã¨èããªãã¦ã¯ãªãã¾ãããããã¦ãããããã®æ°ãããã£ã¸ã¿ã«ã·ã¹ãã
ã®ç£è¦ã®å½±é¿ãéå®ããªãã¦ã¯ãªãã¾ãããã¡ããã©ã建ç¯ç©ã®ç°å¢ã¸ã®å½±é¿ãéå®ããããã«ã</p>
+
+<p>ãã¨ãã°ãé»æ°ã®ãã¹ãã¼ããã¡ã¼ã¿ã¯ãé常ã®ã¦ã¼ã¶ã¨æ¯è¼ãã¦ä½¿ãæ¹ãã©ãããªã©ãåã
ã®é¡§å®¢ã®é»æ°ã®ä½¿ç¨ã«ã¤ãã¦ã®ãã¼ã¿ãå»ã
ã¨é»åä¼ç¤¾ã«éä¿¡ããã¨ãã¦ãå§èªããã¾ããããã¯ä¸è¬ç£è¦ã«ãã¨ã¥ãã¦å®è£
ããã¾ãããç£è¦ã¯å¿
è¦ã§ã¯ããã¾ãããè¿é£ã®å¹³å使ç¨ã¯å
¨ä½ä½¿ç¨ãå©ç¨è
æ°ã§å²ç®ããã°é»åä¼ç¤¾ã¯ç°¡åã«è¨ç®ã§ããã¡ã¼ã¿ã«éä¿¡ã§ãã¾ããåã
ã®é¡§å®¢ã¯ä»»æã®æå®ãããæéã§èªåã®ä½¿ç¨ãå¹³å使ç¨ã®ãã¿ã¼ã³ã¨æ¯è¼ã§ãã¾ããåãå©ä¾¿æ§ãç£è¦ãªãã§ã§ããã®ã§ã!</p>
+
+<p>ãã¹ã¦ã®ããããã¡ã®ãã£ã¸ã¿ã«ã»ã·ã¹ãã
ã§ããã®ãããªãã©ã¤ãã·ãè¨è¨ããå¿
è¦ãããã¾ãã</p>
+
+<h3>ãã¼ã¿ã®éç©ã«å¯¾ãã対ç:
ã¾ãæ£ãããã¾ã¾ã«ãã</h3>
+
+<p><a
+name="dispersal">ãã¼ã¿ãã¾ãæ£ããç¶ããã¢ã¯ã»ã¹ãé£ãããã</a>ã®ãããã©ã¤ãã·ã«å¯¾ããã¢ãã¿ãªã³ã°ããå®å
¨ã«ããæ¹çã®ä¸ã¤ã§ããå¤ãã¹ã¿ã¤ã«ã®ã»ãã¥ãªãã£ã»ã«ã¡ã©ã¯ãã©ã¤ãã·ã«å¯¾ããè
å¨ã§ã¯ããã¾ããã§ãã(<a
+href="#privatespace">*</a>)ãè¨é²ã¯æ§å
ã«ä¿åãããä¿ç®¡æéã¯æ大ã§ãæ°é±éã§ããããããã£ãè¨é²ã¸ã®ã¢ã¯ã»ã¹ã®ä¸ä¾¿ããã大éã«è¡ããããã¨ã¯ãªããç¯ç½ªã¨ãã¦éå
±ãããå ´æã
ãã§ã¢ã¯ã»ã¹ããã¾ãããæ¯æ¥æ°ç¾ä¸æ¬ã®ãã¼ããç©ççã«éç©ããè¦è´ãããã³ãã¼ãããã¨ã¯ä¸å¯è½ã§ããã</p>
+
+<p>ä»æ¥ã§ã¯ãã»ãã¥ãªãã£ã»ã«ã¡ã©ã¯ç£è¦ã«ã¡ã©ã«ãªã£ã¦ãã¾ãã¾ãã:
+ã¤ã³ã¿ã¼ãããã«æ¥ç¶ãããã¼ã¿ã»ã³ã¿ã¼ã«è¨é²ã¯éç©ããã¦æ°¸ä¹
ã«ä¿åããã¾ããããã¯æ¢ã«å±éºã§ãããããã«æªãæãã¤ã¤ããã¾ããé¡èªèã®é²å±ã¯çãã®ããã¸ã£ã¼ããªã¹ããè¡ã§å¸¸æ追跡ããã誰ã¨è©±ããããè¦ãããã¨ããæ¥ãæ¥ããã¨ãããããã§ãããã</p>
+
+<p>ã¤ã³ã¿ã¼ãããã«æ¥ç¶ãããã«ã¡ã©ã¯ããããã²ã©ããã¸ã¿ã«ã»ã»ãã¥ãªãã£ã¨ãªã£ã¦ããã<a
+href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">ã«ã¡ã©ãåããã®ã誰ã§ãè¦ããã¨ãã§ãã</a>ããã«ãªã£ã¦ã¾ãããã©ã¤ãã·ã¼ãå復ããã«ã¯ãå
¬è¡ãç«ã¡å
¥ãããå
´æ/æéã«é¢ãã¦ã¯ã人ã«ãã£ã¦æã¡éã°ããæ以å¤ã¯ãã¤ã³ã¿ã¼ãããã«æ¥ç¶ãããã«ã¡ã©ã®ä½¿ç¨ãç¦æ¢ããã¹ãã§ãã誰ããåçå±ãããªæ
åãèªç±ã«æ稿ã§ããã¹ãã§ãããã¤ã³ã¿ã¼ãããã«ããããã®ãããªãã¼ã¿ã®ã·ã¹ããããã¯ãªéç©ã¯å¶éãããªãã¦ã¯ãªãã¾ããã</p>
+
+<p><a
+name="privatespace"><b>*</b></a>ããã§ãã»ãã¥ãªãã£ã«ã¡ã©ãåºã®ä¸ã§ããããã¯è¡è§ã§åãããã¦ãããã¨ããä»®å®ãã¦ãã¾ãã誰ãã®ãã©ã¤ãã¼ããªç©ºéã«ã»ãã®èª°ãã«ãã£ã¦åãããã¦ããã©ããªã«ã¡ã©ããã©ã¤ãã·ã侵害ãã¾ãããããã¯å¥ã®åé¡ã§ãã</p>
+
+<h3
id="digitalcash">ã¤ã³ã¿ã¼ãããã»ã³ãã¼ã¹ã®ç£è¦ã®å¯¾ç</h3>
+
+<p>ã»ã¨ãã©ã®ãã¼ã¿ã®éç©ã¯äººã
èªèº«ã®ãã£ã¸ã¿ã«ãªæ´»åããè¡ããã¾ããé常ããã¼ã¿ã¯ã¾ãä¼ç¤¾ã«ãã£ã¦éãããã¾ãããããããã©ã¤ãã·ã¨æ°ä¸»ä¸»ç¾©ã®è
å¨ã«ã¤ãã¦èããéãç£è¦ãç´æ¥ã«å½ã«ãã£ã¦è¡ããããããã¸ãã¹ã«é
ãããããã«ã¯ãéããããã¾ããããªããªããä¼ç¤¾ã«ãã£ã¦éç©ããããã¼ã¿ã¯ã·ã¹ããããã¯ã«å½ã«å©ç¨å¯è½ã
ããã§ãã</p>
+
+<p>PRISMãéãã¦ãNSAã¯<a
+href="https://www.commondreams.org/headline/2013/08/23-2">ããããã®å¤§ããªã¤ã³ã¿ã¼ãããä¼æ¥ã®ãã¼ã¿ãã¼ã¹ã«ä¹ãè¾¼ã¿ã¾ãã</a>ãAT&Tã¯ã1987å¹´ãããã¹ã¦ã®é»è©±ã®å¼ã³åºãã®è¨é²ãä¿ç®¡ãã<a
+href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">DEAã«å©ç¨å¯è½ã¨ã</a>ãè¦æ±ã«å¿ãã¦æ¤ç´¢ãããããããã«ãã¦ãã¾ããå³å¯ã«è¨ãã°ãåè¡å½æ¿åºã¯ãã¼ã¿ãææãã¦ãã¾ããããå®éã®åé¡ã¨ãã¦ã¯ææãã¦ããã®ã¨åãã§ãã</p>
+
+<p>ã¸ã£ã¼ããªãºã ã¨æ°ä¸»ä¸»ç¾©ãå®å
¨ã§ããããã«ããã¨ããç®æ¨ã¯ãã§ããããããããã¡ããå½ã
ãã§ãªããã©ããªçµç¹ã§ããã人ã
ã«é¢ãããã¼ã¿ãéç©ãããã®ãåæ¸ãããã¨ãè¦è«ãã¾ãããã®ã¦ã¼ã¶ã«é¢ãããã¼ã¿ãéç©ããªãããã«ãã£ã¸ã¿ã«ã®ã·ã¹ãã
ãåè¨è¨ããªããã°ãªãã¾ãããããããã¡ã®ãã©ã³ã¶ã¯ã·ã§ã³ã®ãã£ã¸ã¿ã«ãã¼ã¿ã«ã¤ãã¦å¿
è¦ãªå ´åã¯ãããããã¡ã¨ããã¨ãããã©ããã¦ãå¿
è¦ãªçãæéãè¶ãã¦ä¿æãããã¨ã許ãããã¹ãã§ã¯ããã¾ããã</p>
+
+<p>ç¾ç¶ã®ã¬ãã«ã®ã¤ã³ã¿ã¼ãããã®ç£è¦ã®ä¸ã¤ã®åæ©ã¯ãã¦ã¼ã¶ã®æ´»åã¨æ§åã追跡ãããã¨ã«è«æ
ã¨ããåºåãéãã¦è³éçã«ãµã¤ããéç¨ããã¦ããã¨ãããã¨ã§ããããã¯ãããªãåä»äº(ç¡è¦ããããã«ã¨å¦ã¹ã°ãããããªåºå)ããããããã¡ããããç¥ã£ã¦ãããããã¾ããæ害ã¨ãªãç£è¦ã·ã¹ãã
ã¸ã¨å¤æãã¦ãã¾ãã¾ããã¤ã³ã¿ã¼ããããéããè³¼å
¥ããã®ã¦ã¼ã¶ã追跡ãã¾ããããã©ã¤ãã·ã»ããªã·ã¼ããå®ãã¹ãå
¬ç´ããã¯ãã©ã¤ãã·ã侵害ããè¨ã訳ã¨ãªã£ã¦ããç¾ç¶ã«ã¤ãã¦ãããããã¡ã¯ããç¥ã£ã¦ãã¾ãã</p>
+
+<p>å¿åã®æ¯æã(æ¯æã人ã«ã¨ã£ã¦ã®å¿åæ§)ã®ã·ã¹ãã
ãæ¡ç¨ãããã¨ã§ä¸¡æ¹ã®åé¡ãä¿®æ£ã§ããã§ãããã(ååå´ãç¨ãåé¿ããã®ãããããã¡ã¯æã¿ã¾ããã)<a
+href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoinã¯å¿åã§ã¯ãªã</a>ã®ã§ãããBitcoinã§å¿åæ§ãæã£ã¦æ¯æãæ¹æ³ãéçºãã試ã¿ã¯ããã¾ããããããªãããæè¡ã¨ãã¦ã¯ã<a
+href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">æåã1980年代ã«ãã£ã¸ã¿ã«ã®ãéã¯éçºããã</a>ã®ã§ããé©åãªãã¸ãã¹ã®åã決ããå¿
è¦ãªã ãã§ãå½å®¶ã¯ããã妨害ããªããã°ããã®ã§ãã</p>
+
+<p>ãµã¤ãã®å人æ
å ±ã®éç©ããã®ãããªãè
å¨ã¯ãã»ãã¥ãªãã£ç ´å£è
ãä¾µå
¥ãããããåå¾ãã¦æªç¨ãããã¨ã§ãã顧客ã®ã¯ã¬ã¸ããã«ã¼ãã®è©³ç´°ãããã«å«ã¾ãã¾ããå¿åã®æ¯æãã·ã¹ãã
ããã®å±éºãããã¾ãã«ããããããã¾ãã:
+ãµã¤ãã®ã»ãã¥ãªãã£ã»ãã¼ã«ã¯ããµã¤ããããªãã«ã¤ãã¦ãªã«ãç¥ããªããã°ãããªãã害ãããã¨ã¯ã§ãã¾ããã</p>
+
+<h3>æ
è¡ã®ç£è¦ã®å¯¾ç</h3>
+
+<p>ããããã¡ã¯ãã£ã¸ã¿ã«ã®æéå¾´åãå¿åæ¯æã(ãã¨ãã°ããã£ã¸ã¿ã«ç¾éã使ã£ã¦)ã«å¤æããªããã°ããã¾ãããè»ã®ãã³ãã¼èªèã·ã¹ãã
ã¯ãã¹ã¦ã®ãã³ãã¼ãèªèãã<a
+href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">ãã®ãã¼ã¿ã¯æéãªãã«ä¿ç®¡ããã¾ã</a>ãè£å¤æã®å½ä»¤ã«ããææ»ã®è»ã®ãªã¹ãã«è¼ã£ã¦ãããã³ãã¼ã
ãã®éç¥ã¨è¨é²ã«ã¨ã©ããããæ³å¾ã§è¦è«ãããã¹ãã§ãããããããã»ãã¥ã¢ã§ãªã代æ¿ã¯ãã¹ã¦ã®è»ã«ã¤ãã¦ãæ°æ¥éã
ããã¼ã«ã«ã«ä¿ç®¡ããå
¨é¨ã®ãã¼ã¿ãã¤ã³ã¿ã¼ãããä¸ã§å©ç¨å¯è½ã¨ããã®ã§ã¯ãªããã¨ãããã®ã§ããããã¦ããã¼ã¿ã¸ã®ã¢ã¯ã»ã¹ã¯è£å¤æã®ä»¤ç¶ã«ãããã³ãã¼ã®ãªã¹ãã«éã£ã¦æ¢ç´¢ãããã¹ãã§ãã</p>
+
+<p>åè¡å½ã®ãé£è¡ãã¦ã¯ãããªãããªã¹ãã¯æ¨ã¦å»ãã¹ãã§ãããªããªããããã¯<a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">è£å¤ãªãã®ç½°</a>ã
ããã§ãã</p>
+
+<p>人ã
ã®ãªã¹ããæãã¦ããã®äººã¨è·ç©ãç¹å¥ãªæ³¨æã§æ¢ç´¢ããããã¨ãããã¦ãå½å
ã®ãã©ã¤ãã®å¿åã®ä¹å®¢ããã®ãªã¹ãã«è¼ã£ã¦ãããã®ã¨ãã¦æ±ããããã¨ãã¯å®¹èªã§ãã¾ããããå½ã¸ã®ãã©ã¤ãã®æä¹ãããã®å½ã¸ã®å
¥å½ãã¾ã£ãã許ããã¦ããªãéå¸æ°ã«å¯¾ãã¦ç¦æ¢ããã®ã容èªã§ãã¾ããããã¯ãã¹ã¦ã®å¦¥å½ãªç®çã«å
åã§ãã</p>
+
+<p>å¤ãã®ãã¹ã«å¯¾ãã交éã·ã¹ãã
ããã¹ãã¼ãã«ã¼ããRFIDã®é¡ãæ¯æãã«ä½¿ãã¾ãããããã®ã·ã¹ãã
ã¯å人æ
å ±ãéç©ãã¾ã:
+ç¾é以å¤ã®ãªã«ãã§æ¯æãã¨ããéã¡ãä¸åº¦ã§ãããã°ããã®ã·ã¹ãã
ã¯æ°¸ä¹
ã«ããªãã®ååã¨ã«ã¼ããçµã³ã¤ãã¾ããããã«ãããããã®ã«ã¼ãã«é¢é£ãã¦ãã¹ã¦ã®æ
ç¨ãè¨é²ããã§ããããåããã¦ã大éç£è¦ã¨ãªãã¾ãããããã£ããã¼ã¿ã®éç©ã¯åæ¸ãããã¹ãã§ãã</p>
+
+<p>ããã²ã¼ã·ã§ã³ã»ãµã¼ãã¹ã¯ç£è¦ãè¡ãã¾ããã¦ã¼ã¶ã®ã³ã³ãã¥ã¼ã¿ã¯å°å³ãµã¼ãã¹ã«ã¦ã¼ã¶ã®ä½ç½®ã¨ã©ãã¸è¡ãããããä¼ãããµã¼ãã¯çµè·¯ã決ãã¦ã¦ã¼ã¶ã®ã³ã³ãã¥ã¼ã¿ã«éãè¿ãã表示ããã¾ããä»æ¥ã§ã¯ããµã¼ãã¯ããããã¦ã¼ã¶ã®ä½ç½®ãè¨é²ããã§ãããããªã«ããããæ¢ãããã®ããªãã®ã§ããããç£è¦ã¯æ¬è³ªçã«ã¯å¿
è¦ã§ã¯ãªããåè¨è¨ã§é¿ãããã¨ãã§ãã¾ããã¦ã¼ã¶ã®ã³ã³ãã¥ã¼ã¿ã®èªç±ã½ããã¦ã§ã¢ã¯é©åãªé¨åã®å°å³ãã¼ã¿ã(以åã«ãããã¦ãªããã°)ãã¦ã³ãã¼ãããçµè·¯ãè¨ç®ãã表示ã§ãã¾ããã¦ã¼ã¶ãã©ãã«ãã¦ã©ãã«è¡ããããã誰ã«ãä¼ãããã¨ãªããã§ãã</p>
+
+<p>èªè»¢è»ã®ã¬ã³ã¿ã«ã®ã·ã¹ãã
çã¯ãèªè»¢è»ã貸ä¸ãããã¹ãã¼ã·ã§ã³å
ã§ã
ããåãã人ã®ã¢ã¤ãã³ãã£ãã£ãç¥ããã¦ãããã¨ããããã«è¨è¨ã§ãã¾ãã貸åºã®éããã¹ã¦ã®ã¹ãã¼ã·ã§ã³ã«ã©ã®ã¹ãã¼ã·ã§ã³ããã貸åºä¸ãã¨ãªã£ãããä¼ããã°ãã¦ã¼ã¶ãã©ã®ã¹ãã¼ã·ã§ã³(ä¸è¬çã«ã¯ç°ãªãã¹ãã¼ã·ã§ã³)ã«è¿å´ãã¦ãããã®ã¹ãã¼ã·ã§ã³ã¯ãã©ãã§ãã¤èªè»¢è»ã貸ä¸ãããããããã¾ããããã¦ãå
ã®ã¹ãã¼ã·ã§ã³ã«èªè»¢è»ãã貸åºä¸ãã§ã¯ãªãã¨ä¼ãã¾ããã¦ã¼ã¶ã¸ã®è«æ±ãè¨ç®ããã¹ãã¼ã·ã§ã³ã®è¼ªã«ãã£ã¦ã(ã©ã³ãã
ãªåã®éå¾
ã£ãå¾ã«)æ¬åºã«éãã¾ããããã§ãæ¬åºã¯ã©ã®ã¹ãã¼ã·ã§ã³ããè«æ±æ¸ãæ¥ããåãããªãã§ãããããã£ããããããªãããã°ã(èªè»¢è»ã)è¿å´ãããã¹ãã¼ã·ã§ã³ã¯ããã©ã³ã¶ã¯ã·ã§ã³ã«ã¤ãã¦ãã¹ã¦å¿ããã§ããããèªè»¢è»ãé·ãéã貸åºä¸ãã®ã¾ã¾ã®å
´åã貸ä¸ããã¹ãã¼ã·ã§ã³ã¯æ¬åºã«ä¼ãããã¾ãããã®å
´åã«ã¯ãã¹ãã¼ã·ã§ã³ããåãã人ã®ã¢ã¤ãã³ãã£ãã£ãç´ã¡ã«éãããã§ãããã</p>
+
+<h3>éä¿¡ã®è¨é²ã®å¯¾ç</h3>
+
+<p>ã¤ã³ã¿ã¼ããããµã¼ãã¹ãããã¤ãã¨é»è©±ä¼ç¤¾ã¯ã¦ã¼ã¶ã¨ã®å¥ç´ã§å¤§éã®ãã¼ã¿(ãã©ã¦ãºãé»è©±ä¼è©±ããã®ã»ã)ãä¿ç®¡ãã¦ãã¾ããæºå¸¯é»è©±ã§ã¯ã<a
+href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">ã¦ã¼ã¶ã®ç©ççä½ç½®</a>ã¾ã§è¨é²ãã¦ãã¾ããä¼æ¥ã¯ããããã£ãè¨é²ãé·ãéä¿æãã¾ã:
+AT&Tã®å ´åã30年以ä¸ã§ããããã«ãä¼æ¥ã¯<a
+href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">ã¦ã¼ã¶ã®ä½ã®æ´»å</a>ãè¨é²ããã§ãããã<a
+href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSAã¯æºå¸¯é»è©±ã®ä½ç½®æ
å ±ã®éç©</a>ã大éã«è¡ã£ã¦ããããã§ãã</p>
+
+<p>éä¿¡è¨é²ãä½æãããã·ã¹ãã
ã§ã¯ãç£è¦ãããªãéä¿¡ã¯ä¸å¯è½ã§ããã§ãããããããä½æãããä¿æããããããã¨ãéæ³ã¨ãã¹ãã§ããISPã¨é»è©±ä¼ç¤¾ã¯ãããå£ä½ã«å¯¾ã調æ»ããæ³å»·ã®å½ä»¤ãªãã«é·æéã«æ¸¡ã£ã¦ãã®æ
å ±ãä¿æãããã¨ã許ãããã¹ãã§ã¯ããã¾ããã</p>
+
+<p>ãã®è§£æ±ºæ³ã¯å®å
¨ã«æºè¶³ã§ãããã®ã§ã¯ããã¾ããããªããªããããã¯ç©ççã«æ¿åºããè¨é²ãçæãããéã«ããã¹ã¦ã®æ
å
±ãéç©ãããã¨ãç´ã¡ã«åæ¢ãããªãããã§ãã—ãããã<a
+href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">åè¡å½ãããã¤ãã¾ãã¯ãã¹ã¦ã®é»è©±ä¼ç¤¾ã«è¡ã£ã¦ãããã¨ãªã®ã§ã</a>ããããç¦æ¢ããã«ã¯æ³å¾ã«é
¼ããããããªãããããã¾ãããããããªããããã®æ¹ãç¾å¨ã®ç¶æ³ãããããã§ããããé¢é£ããæ³å¾(PATRIOTæ³)ã¯ãã®æ
£ç¿ãæ確ã«ã¯ç¦ãã¦ããªãã®ã§ããããå
ãã¦ãæ¿åºããã®ç¨®ã®ç£è¦ãåéãããªãã°ããã®æç¹ãããåã«ä½æãããå
¨å¡ã®é話è¨é²ã«ã¤ãã¦ãã¼ã¿ãåå¾ããªãã§ãããã</p>
+
+<p>誰ã¨é»åã¡ã¼ã«ãããã¨ããããã®ãã©ã¤ãã·ã¯ãåç´ãªé¨åçãªè§£æ±ºçã¯ãããªãã¨ã»ãã®äººããããªãèªèº«ã®æ¿åºã¨æ±ºãã¦ååããªããããªå½ã®é»åã¡ã¼ã«ãµã¼ãã¹ã§ãæå·ã使ã£ã¦ãããããéä¿¡ãããã¨ãããã®ã§ããããããLader
+Levison(åè¡å½æ¿åºã®ç£è¦ãå®å
¨ã«è»¢è½ããããã¨ããã¡ã¼ã«ãµã¼ãã¹Lavabitã®ãªã¼ãã¼)ã¯ãã£ã¨æ´ç·´ãããæå·ã·ã¹ãã
ã®èããæã£ã¦ãã¾ããããã§ã¯ãããªãã®é»åã¡ã¼ã«ãµã¼ãã¹ã¯ããããã®é»åã¡ã¼ã«ãµã¼ãã¹ã®ããã¦ã¼ã¶ã¸ããªããã¡ã¼ã«ãéã£ãäºã
ãããããããããã®é»åã¡ã¼ã«ãµã¼ãã¹ã¯ãããªãã®é»åã¡ã¼ã«ãµã¼ãã¹ã®ããã¦ã¼ã¶ããããããã¡ã¼ã«ãåãåã£ããã¨ã
ããããããããããããªãããããã«ã¡ã¼ã«ãéã£ããã¨ã確å®ãããã®ã¯å°é£ã§ãããã¨ããã·ã¹ãã
ã§ãã</p>
+
+<h3>ããããããç£è¦ã¯å¿
è¦ã </h3>
+
+<p>ç¯ç½ªè
ãè¦ã¤ãåºãããã«å½ã¯ãè£å¤æã®å½ä»¤ã®å
ãç¹å®ã®ç¯ç½ªãããã¯ç¹å®ã®è¨ç»ããã¦ããç¯ç½ªã®å®¹çãææ»ã§ãããã¨ãå¿
è¦ã§ããã¤ã³ã¿ã¼ãããã§ã¯é»è©±ã®ä¼è©±ã®ååã®æ¨©éã¯ãã¤ã³ã¿ã¼ãããã®æ¥ç¶ã®ååã®æ¨©éã«èªç¶ã«æ¡å¼µãããã§ãããã幸éãªãã¨ã«ãããã¯äºå¾ã«åçºè
ãè¦ã¤ãããã¨ãå¯è½ã¨ããªãã§ããããããã(ããããæ¨å¥¨ããããã«)ããããã¡ãäºåã«å¤§éã®æ¸é¡ãéç©ãããã£ã¸ã¿ã«ã»ã·ã¹ãã
ãç¦æ¢ããã°ã</p>
+
+<p>è¦å¯ã®ãããªå½ãä¸ããåãæã¤åã
人ã¯ã代åã¨ãã¦ãã©ã¤ãã·ã®æ¨©å©ãå·®ãã
ããç£ç£ãããã°ããã¾ããã(å®éãè¦å¯ã§ã¯èªèº«ã®é
èªã§ã¯ãå½è¨¼ãã<a
+href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying(ä¸æ©å«ã«)</a>ãã¨ããã¦ã¾ããããã¯è¦å¯ãã¨ã¦ãé
»ç¹ã«ããããããã§ãæè°ãã人ã<a
+href="http://photographyisnotacrime.com/">åç家</a>ã«å¯¾ãã¦ã¯ç¹ã«ãããªã®ã§ãã)
+ã«ã«ãã©ã«ãã¢ã®ããå¸ã§ã¯ã常æããããªã«ã¡ã©ã®çç¨ã義åä»ãããã<a
+href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">è¦å¯ã®æ¦å¨ã®ä½¿ç¨ã60%éä¸ããããã§ã</a>ãACLUã¯ããã好ã¾ããèãã¦ãã¾ãã</p>
+
+<p><a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">ä¼æ¥ã¯äººã
ã§ã¯ãªãã人権ã®è³æ
¼ã¯ããã¾ãã</a>ãåå¦çãçç©å¦çãæ¾å°è½ã®é¢ã財æ¿çãã³ã³ãã¥ãã¼ã·ã§ã³ã®é¢(ãã¨ãã°,
+<a
+href="http://DefectiveByDesign.org">DRM</a>)ããããã¯æ¿æ²»ç(ãã¨ãã°ãããã¼ã¤ã³ã°)ãªã社ä¼ã®å±éºãããããã§ãããããã»ã¹ã®è©³ç´°ã«ã¤ãã¦ãå
Œ
±ã®ç¦ç¥ã«å¿
è¦ã¨ãããã¬ãã«ã§å
¬éãã¹ããã¨ããã¸ãã¹ã«èª²ããã¨ã¯å¦¥å½ã§ãããããã£ãè¡çºã®å±éº(BP社ã®åæ²¹æµåºäºæ
ãç¦å³¶ã®ååç溶èã2008å¹´ã®ä¸çéèå±æ©ãèãã¦ã¿ã¦ãã
ãã)ã¯ããããªãºã ã«ããå±éºãå°ããè¦ãã¾ãã</p>
+
+<p>ããããªãããã¸ã£ã¼ããªãºã
ã¯ç£è¦ããå®ãããã¹ãã§ãããã¨ãããããããã¸ãã¹ã®ä¸é¨ã¨ãã¦å®æ½ããã¦ããæã§ãã</p>
+
+<hr />
+
+<p>ãã£ã¸ã¿ã«æè¡ã¯ããããã¡ã®éåãè¡åãããã¦éä¿¡ã®ç£è¦ã®ã¬ãã«ãè¨å¤§ã«å¢é·ããã¾ãããããã¯ã1990年代ã«ããããã¡ãçµé¨ãããããã¨ã¦ãå¤ããããã¦1980年代ã®<a
+href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">éã®ã«ã¼ãã³ã®åããã®äººã
ãããã¨ã¦ãå¤ã</a>ã¨ãªã£ã¦ãããéç©ããããã¼ã¿ã®å½ã«ãã使ç¨ã«é¢ãã¦å
ããããæ³çå¶éããã£ãã¨ãã¦ãããªããã¨ã¦ãå¤ããã®ã§ãããã</p>
+
+<p>ããããã¡ã®èªç±ãªå½ã
ãé大ãªç£è¦ã®ä¸è¶³ã«ãã£ã¦ä»¥åã«è¢«å®³ã被ãããã¤ã¦ã½é£ã¨æ±ãã¤ããããã§ãã£ããããç£è¦ãããã¹ãã§ããã®ã§ãªããã°ãããããã¡ã¯ãã®å¢å
ãã²ã£ããè¿ããªããã°ãªãã¾ãããããã«ã¯ã人ã
ã«ã¤ãã¦ã®ããã°ãã¼ã¿ã®éç©ãæ¢ãããã¨ãå¿
è¦ã§ãã</p>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.ja.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>FSFããã³GNUã«é¢ããåãåããã¯<a
+href="mailto:address@hidden"><address@hidden></a>ã¾ã§ãé¡ããã¾ã(è±èª)ãFSFã¸ã®é£çµ¡ã¯<a
+href="/contact/">ä»ã®æ¹æ³</a>ãããã¾ãããªã³ã¯åããä»ã®ä¿®æ£ãææ¡ã¯<a
+href="mailto:address@hidden"><address@hidden></a>ã¾ã§ãéããã
ããã</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+æ£ç¢ºã§è¯ãå質ã®ç¿»è¨³ãæä¾ããããåªåãã¦ãã¾ãããä¸å®å
¨ãªå
´åããããã¨æãã¾ãã翻訳ã«é¢ããã³ã¡ã³ãã¨ææ¡ã¯ã<a
+href="mailto:address@hidden"><address@hidden></a>ã«ãããããã¾ãã</p><p>ããããã¡ã®ã¦ã§ããã¼ã¸ã®ç¿»è¨³ã®èª¿æ´ã¨æåºã«ã¤ãã¦ã¯ã<a
+href="/server/standards/README.translations.html">翻訳
README</a>ãã覧ãã ããã</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2015 Richard Stallman</p>
+
+<p>ãã®ãã¼ã¸ã¯<a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative Commons
+Attribution-NoDerivs 4.0 International
License</a>ã®æ¡ä»¶ã§è¨±è«¾ããã¾ãã</p>
+
+<!--#include virtual="/server/bottom-notes.ja.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+ </div>
+
+<p class="unprintable"><!-- timestamp start -->
+æçµæ´æ°:
+
+$Date: 2015/07/14 02:01:04 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
Index: philosophy/po/surveillance-vs-democracy.ja-en.html
===================================================================
RCS file: philosophy/po/surveillance-vs-democracy.ja-en.html
diff -N philosophy/po/surveillance-vs-democracy.ja-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ philosophy/po/surveillance-vs-democracy.ja-en.html 14 Jul 2015 02:01:04
-0000 1.1
@@ -0,0 +1,519 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.77 -->
+<title>How Much Surveillance Can Democracy Withstand?
+- GNU Project - Free Software Foundation</title>
+<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>How Much Surveillance Can Democracy Withstand?</h2>
+
+<p>by <a href="http://www.stallman.org/">Richard Stallman</a></p>
+
+<blockquote><p>A version of this article was first published
+in <a
href="http://www.wired.com/opinion/2013/10/a-necessary-evil-what-it-takes-for-democracy-to-survive-surveillance/">Wired</a>
+in October 2013.</p></blockquote>
+
+<p>Thanks to Edward Snowden's disclosures, we know that the current
+level of general surveillance in society is incompatible with human
+rights. The repeated harassment and prosecution of dissidents,
+sources, and journalists in the US and elsewhere provides
+confirmation. We need to reduce the level of general surveillance,
+but how far? Where exactly is the
+<em>maximum tolerable level of surveillance</em>, which we must ensure
+is not exceeded? It is the level beyond which surveillance starts to
+interfere with the functioning of democracy, in that whistleblowers
+(such as Snowden) are likely to be caught.</p>
+
+<p>Faced with government secrecy, we the people depend on
+whistleblowers
+to <a href="https://www.eff.org/deeplinks/2013/11/reddit-tpp-ama">tell
+us what the state is doing</a>. However, today's surveillance
+intimidates potential whistleblowers, which means it is too much. To
+recover our democratic control over the state, we must reduce
+surveillance to the point where whistleblowers know they are safe.</p>
+
+<p>Using free/libre
+software, <a href="/philosophy/free-software-even-more-important.html">as
+I've advocated for 30 years</a>, is the first step in taking control
+of our digital lives, and that includes preventing surveillance. We
+can't trust nonfree software; the NSA
+<a
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">uses</a>
+and
+even <a
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security">creates</a>
+security weaknesses in nonfree software to invade our own computers
+and routers. Free software gives us control of our own computers,
+but <a href="http://www.wired.com/opinion/2013/10/149481/">that won't
+protect our privacy once we set foot on the Internet</a>.</p>
+
+<p><a
+href="http://www.theguardian.com/world/2013/oct/10/nsa-surveillance-patriot-act-author-bill">Bipartisan
+legislation to “curtail the domestic surveillance
+powers”</a> in the U.S. is being drawn up, but it relies on
+limiting the government's use of our virtual dossiers. That won't
+suffice to protect whistleblowers if “catching the
+whistleblower” is grounds for access sufficient to identify him
+or her. We need to go further.</p>
+
+<h3>The Upper Limit on Surveillance in a Democracy</h3>
+
+<p>If whistleblowers don't dare reveal crimes and lies, we lose the
+last shred of effective control over our government and institutions.
+That's why surveillance that enables the state to find out who has
+talked with a reporter is too much surveillance—too much for
+democracy to endure.</p>
+
+<p>An unnamed U.S. government official ominously told journalists in
+2011 that
+the <a
href="http://www.rcfp.org/browse-media-law-resources/news-media-law/news-media-and-law-summer-2011/lessons-wye-river">U.S.
would
+not subpoena reporters because “We know who you're talking
+to.”</a>
+Sometimes <a
href="http://www.theguardian.com/media/2013/sep/24/yemen-leak-sachtleben-guilty-associated-press">journalists'
+phone call records are subpoenaed</a> to find this out, but Snowden
+has shown us that in effect they subpoena all the phone call records
+of everyone in the U.S., all the
+time, <a
href="http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order">from
+Verizon</a>
+and <a
href="http://www.marketwatch.com/story/nsa-data-mining-digs-into-networks-beyond-verizon-2013-06-07">from
+other companies too</a>.</p>
+
+<p>Opposition and dissident activities need to keep secrets from
+states that are willing to play dirty tricks on them. The ACLU has
+demonstrated the U.S. government's <a
+href="http://www.aclu.org/files/assets/Spyfiles_2_0.pdf">systematic
+practice of infiltrating peaceful dissident groups</a> on the pretext
+that there might be terrorists among them. The point at which
+surveillance is too much is the point at which the state can find who
+spoke to a known journalist or a known dissident.</p>
+
+<h3>Information, Once Collected, Will Be Misused</h3>
+
+<p>When people recognize that the level of general surveillance is too
+high, the first response is to propose limits on access to the
+accumulated data. That sounds nice, but it won't fix the problem, not
+even slightly, even supposing that the government obeys the rules.
+(The NSA has misled the FISA court, which said it
+was <a href="http://www.wired.com/threatlevel/2013/09/nsa-violations/">unable
+to effectively hold the NSA accountable</a>.) Suspicion of a crime
+will be grounds for access, so once a whistleblower is accused of
+“espionage,” finding the “spy” will provide an
+excuse to access the accumulated material.</p>
+
+<p>The state's surveillance staff will misuse the data for personal
+reasons too. Some NSA
+agents <a
href="http://www.theguardian.com/world/2013/aug/24/nsa-analysts-abused-surveillance-systems">used
+U.S. surveillance systems to track their lovers</a>—past,
+present, or wished-for—in a practice called
+“LOVEINT.” The NSA says it has caught and punished this a
+few times; we don't know how many other times it wasn't caught. But
+these events shouldn't surprise us, because police have
+long <a href="http://www.sweetliberty.org/issues/privacy/lein1.htm">used
+their access to driver's license records to track down someone
+attractive</a>, a practice known as “running a plate for a
+date.”</p>
+
+<p>Surveillance data will always be used for other purposes, even if
+this is prohibited. Once the data has been accumulated and the state
+has the possibility of access to it, it can misuse that data in
+dreadful ways, as shown by examples
+from <a
href="http://falkvinge.net/2012/03/17/collected-personal-data-will-always-be-used-against-the-citizens/">Europe</a>
+and <a href="https://en.wikipedia.org/wiki/Japanese_American_internment">the
+US </a>.</p>
+
+<p>Personal data collected by the state is also likely to be obtained
+by crackers that break the security of the servers, even
+by <a
href="https://www.techdirt.com/articles/20150612/16334231330/second-opm-hack-revealed-even-worse-than-first.shtml">crackers
+working for hostile states</a>.</p>
+
+<p>Total surveillance plus weak legal protections enable the state to
+launch a massive fishing expedition against any person. To make
+journalism and democracy safe, we must limit the accumulation of data
+that is easily accessible to the state.</p>
+
+<h3>Robust Protection for Privacy Must Be Technical</h3>
+
+<p>The Electronic Frontier Foundation and other organizations propose
+a set of legal principles designed to <a
+href="https://en.necessaryandproportionate.org/text">prevent the
+abuses of massive surveillance</a>. These principles include,
+crucially, explicit legal protection for whistleblowers; as a
+consequence, they would be adequate for protecting democratic
+freedoms—if adopted completely and enforced without exception
+forever.</p>
+
+<p>However, such legal protections are precarious: as recent history
+shows, they can be repealed (as in the FISA Amendments Act),
+suspended, or <a
+href="http://www.nytimes.com/2009/04/16/us/16nsa.html">ignored</a>.</p>
+
+<p>Meanwhile, demagogues will cite the usual excuses as grounds for
+total surveillance; any terrorist attack, even one that kills just a
+handful of people, will give them an opportunity.</p>
+
+<p>If limits on access to the data are set aside, it will be as if
+they had never existed: years worth of dossiers would suddenly become
+available for misuse by the state and its agents and, if collected by
+companies, for their private misuse as well. If, however, we stop the
+collection of dossiers on everyone, those dossiers won't exist, and
+there will be no way to compile them retroactively. A new illiberal
+regime would have to implement surveillance afresh, and it would only
+collect data starting at that date. As for suspending or momentarily
+ignoring this law, the idea would hardly make sense.</p>
+
+<h3>First, Don't Be Foolish</h3>
+
+<p>To have privacy, you must not throw it away: the first one who has
+to protect your privacy is you. Avoid identifying yourself to web
+sites, contact them with Tor, and use browsers that block the schemes
+they use to track visitors. Use the GNU Privacy Guard to encrypt the
+contents of your email. Pay for things with cash.</p>
+
+<p>Keep your own data; don't store your data in a company's
+“convenient” server. It's safe, however, to entrust a
+data backup to a commercial service, provided you put the files in an
+archive and encrypt the whole archive, including the names of the
+files, with free software on your own computer before uploading
+it.</p>
+
+<p>For privacy's sake, you must avoid nonfree software since, as a
+consequence of giving others control of your computing, it
+is <a href="/philosophy/proprietary-surveillance.html">likely to spy
+on you</a>.
+Avoid <a href="/philosophy/who-does-that-server-really-serve.html">service
+as a software substitute</a>; as well as giving others control of your
+computing, it requires you to hand over all the pertinent data to the
+server.</p>
+
+<p>Protect your friends' and acquaintances' privacy,
+too. <a
href="http://bits.blogs.nytimes.com/2014/05/21/in-cybersecurity-sometimes-the-weakest-link-is-a-family-member/">Don't
+give out their personal information</a> except how to contact them,
+and never give any web site your list of email or phone contacts.
+Don't tell a company such as Facebook anything about your friends that
+they might not wish to publish in a newspaper. Better yet, don't be
+used by Facebook at all. Reject communication systems that require
+users to give their real names, even if you are going to give yours,
+since they pressure other people to surrender their privacy.</p>
+
+<p>Self-protection is essential, but even the most rigorous
+self-protection is insufficient to protect your privacy on or from
+systems that don't belong to you. When we communicate with others or
+move around the city, our privacy depends on the practices of society.
+We can avoid some of the systems that surveil our communications and
+movements, but not all of them. Clearly, the better solution is to
+make all these systems stop surveilling people other than legitimate
+suspects.</p>
+
+<h3>We Must Design Every System for Privacy</h3>
+
+<p>If we don't want a total surveillance society, we must consider
+surveillance a kind of social pollution, and limit the surveillance
+impact of each new digital system just as we limit the environmental
+impact of physical construction.</p>
+
+<p>For example: “smart” meters for electricity are touted
+for sending the power company moment-by-moment data about each
+customer's electric usage, including how usage compares with users in
+general. This is implemented based on general surveillance, but does
+not require any surveillance. It would be easy for the power company
+to calculate the average usage in a residential neighborhood by
+dividing the total usage by the number of subscribers, and send that
+to the meters. Each customer's meter could compare her usage, over
+any desired period of time, with the average usage pattern for that
+period. The same benefit, with no surveillance!</p>
+
+<p>We need to design such privacy into all our digital systems.</p>
+
+<h3>Remedy for Collecting Data: Leaving It Dispersed</h3>
+
+<p>One way to make monitoring safe for privacy is
+to <a name="dispersal">keep the data dispersed and inconvenient to
+access</a>. Old-fashioned security cameras were no threat to privacy(<a
href="#privatespace">*</a>).
+The recording was stored on the premises, and kept for a few weeks at
+most. Because of the inconvenience of accessing these recordings, it
+was never done massively; they were accessed only in the places where
+someone reported a crime. It would not be feasible to physically
+collect millions of tapes every day and watch them or copy them.</p>
+
+<p>Nowadays, security cameras have become surveillance cameras: they
+are connected to the Internet so recordings can be collected in a data
+center and saved forever. This is already dangerous, but it is going
+to get worse. Advances in face recognition may bring the day when
+suspected journalists can be tracked on the street all the time to see
+who they talk with.</p>
+
+<p>Internet-connected cameras often have lousy digital security
+themselves,
+so <a
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances">anyone
+could watch what the camera sees</a>. To restore privacy, we should
+ban the use of Internet-connected cameras aimed where and when the
+public is admitted, except when carried by people. Everyone must be
+free to post photos and video recordings occasionally, but the
+systematic accumulation of such data on the Internet must be
+limited.</p>
+
+<p><a name="privatespace"><b>*</b></a>I assume here that the security
+camera points at the inside of a store, or at the street. Any camera
+pointed at someone's private space by someone else violates privacy,
+but that is another issue.</p>
+
+<h3 id="digitalcash">Remedy for Internet Commerce Surveillance</h3>
+
+<p>Most data collection comes from people's own digital activities.
+Usually the data is collected first by companies. But when it comes
+to the threat to privacy and democracy, it makes no difference whether
+surveillance is done directly by the state or farmed out to a
+business, because the data that the companies collect is
+systematically available to the state.</p>
+
+<p>The NSA, through PRISM,
+has <a href="https://www.commondreams.org/headline/2013/08/23-2">gotten
+into the databases of many large Internet corporations</a>. AT&T
+has saved all its phone call records since 1987
+and <a
href="http://www.nytimes.com/2013/09/02/us/drug-agents-use-vast-phone-trove-eclipsing-nsas.html?_r=0">makes
+them available to the DEA</a> to search on request. Strictly
+speaking, the U.S. government does not possess that data, but in
+practical terms it may as well possess it.</p>
+
+<p>The goal of making journalism and democracy safe therefore requires
+that we reduce the data collected about people by any organization,
+not just by the state. We must redesign digital systems so that they
+do not accumulate data about their users. If they need digital data
+about our transactions, they should not be allowed to keep them more
+than a short time beyond what is inherently necessary for their
+dealings with us.</p>
+
+<p>One of the motives for the current level of surveillance of the
+Internet is that sites are financed through advertising based on
+tracking users' activities and propensities. This converts a mere
+annoyance—advertising that we can learn to ignore—into a
+surveillance system that harms us whether we know it or not.
+Purchases over the Internet also track their users. And we are all
+aware that “privacy policies” are more excuses to violate
+privacy than commitments to uphold it.</p>
+
+<p>We could correct both problems by adopting a system of anonymous
+payments—anonymous for the payer, that is. (We don't want the
+payee to dodge
+taxes.) <a
href="http://www.wired.com/opinion/2013/05/lets-cut-through-the-bitcoin-hype/">Bitcoin
+is not anonymous</a>, though there are efforts to develop ways to pay
+anonymously with Bitcoin. However, technology
+for <a href="http://www.wired.com/wired/archive/2.12/emoney_pr.html">digital
+cash was first developed in the 1980s</a>; we need only suitable
+business arrangements, and for the state not to obstruct them.</p>
+
+<p>A further threat from sites' collection of personal data is that
+security breakers might get in, take it, and misuse it. This includes
+customers' credit card details. An anonymous payment system would end
+this danger: a security hole in the site can't hurt you if the site
+knows nothing about you.</p>
+
+<h3>Remedy for Travel Surveillance</h3>
+
+<p>We must convert digital toll collection to anonymous payment (using
+digital cash, for instance). License-plate recognition systems
+recognize all license plates, and
+the <a
href="http://news.bbc.co.uk/2/hi/programmes/whos_watching_you/8064333.stm">data
+can be kept indefinitely</a>; they should be required by law to notice
+and record only those license numbers that are on a list of cars
+sought by court orders. A less secure alternative would record all
+cars locally but only for a few days, and not make the full data
+available over the Internet; access to the data should be limited to
+searching for a list of court-ordered license-numbers.</p>
+
+<p>The U.S. “no-fly” list must be abolished because it is
+<a
href="https://www.aclu.org/blog/national-security-technology-and-liberty-racial-justice/victory-federal-court-recognizes">punishment
+without trial</a>.</p>
+
+<p>It is acceptable to have a list of people whose person and luggage
+will be searched with extra care, and anonymous passengers on domestic
+flights could be treated as if they were on this list. It is also
+acceptable to bar non-citizens, if they are not permitted to enter the
+country at all, from boarding flights to the country. This ought to
+be enough for all legitimate purposes.</p>
+
+<p>Many mass transit systems use some kind of smart cards or RFIDs for
+payment. These systems accumulate personal data: if you once make the
+mistake of paying with anything but cash, they associate the card
+permanently with your name. Furthermore, they record all travel
+associated with each card. Together they amount to massive
+surveillance. This data collection must be reduced.</p>
+
+<p>Navigation services do surveillance: the user's computer tells the
+map service the user's location and where the user wants to go; then
+the server determines the route and sends it back to the user's
+computer, which displays it. Nowadays, the server probably records
+the user's locations, since there is nothing to prevent it. This
+surveillance is not inherently necessary, and redesign could avoid it:
+free/libre software in the user's computer could download map data for
+the pertinent regions (if not downloaded previously), compute the
+route, and display it, without ever telling anyone where the user is
+or wants to go.</p>
+
+<p>Systems for borrowing bicycles, etc., can be designed so that the
+borrower's identity is known only inside the station where the item
+was borrowed. Borrowing would inform all stations that the item is
+“out,” so when the user returns it at any station (in
+general, a different one), that station will know where and when that
+item was borrowed. It will inform the other station that the item is
+no longer “out.” It will also calculate the user's bill,
+and send it (after waiting some random number of minutes) to
+headquarters along a ring of stations, so that headquarters would not
+find out which station the bill came from. Once this is done, the
+return station would forget all about the transaction. If an item
+remains “out” for too long, the station where it was
+borrowed can inform headquarters; in that case, it could send the
+borrower's identity immediately.</p>
+
+<h3>Remedy for Communications Dossiers</h3>
+
+<p>Internet service providers and telephone companies keep extensive
+data on their users' contacts (browsing, phone calls, etc). With
+mobile phones, they
+also <a
href="http://www.zeit.de/digital/datenschutz/2011-03/data-protection-malte-spitz">record
+the user's physical location</a>. They keep these dossiers for a long
+time: over 30 years, in the case of AT&T. Soon they will
+even <a
href="http://www.wired.com/opinion/2013/10/the-trojan-horse-of-the-latest-iphone-with-the-m7-coprocessor-we-all-become-qs-activity-trackers/">record
+the user's body activities</a>. It appears that
+the <a
href="https://www.aclu.org/blog/national-security-technology-and-liberty/it-sure-sounds-nsa-tracking-your-location">NSA
+collects cell phone location data</a> in bulk.</p>
+
+<p>Unmonitored communication is impossible where systems create such
+dossiers. So it should be illegal to create or keep them. ISPs and
+phone companies must not be allowed to keep this information for very
+long, in the absence of a court order to surveil a certain party.</p>
+
+<p>This solution is not entirely satisfactory, because it won't
+physically stop the government from collecting all the information
+immediately as it is generated—which is what
+the <a
href="http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order">U.S.
does
+with some or all phone companies</a>. We would have to rely on
+prohibiting that by law. However, that would be better than the
+current situation, where the relevant law (the PATRIOT Act) does not
+clearly prohibit the practice. In addition, if the government did
+resume this sort of surveillance, it would not get data about
+everyone's phone calls made prior to that time.</p>
+
+<p>For privacy about who you exchange email with, a simple partial
+solution is for you and others to use email services in a country that
+would never cooperate with your own government, and which communicate
+with each other using encryption. However, Ladar Levison (owner of
+the mail service Lavabit that US surveillance sought to corrupt
+completely) has a more sophisticated idea for an encryption system
+through which your email service would know only that you sent mail to
+some user of my email service, and my email service would know only
+that I received mail from some user of your email service, but it
+would be hard to determine that you had sent mail to me.</p>
+
+<h3>But Some Surveillance Is Necessary</h3>
+
+<p>For the state to find criminals, it needs to be able to investigate
+specific crimes, or specific suspected planned crimes, under a court
+order. With the Internet, the power to tap phone conversations would
+naturally extend to the power to tap Internet connections. This power
+is easy to abuse for political reasons, but it is also necessary.
+Fortunately, this won't make it possible to find whistleblowers after
+the fact, if (as I recommend) we prevent digital systems from accumulating
+massive dossiers before the fact.</p>
+
+<p>Individuals with special state-granted power, such as police,
+forfeit their right to privacy and must be monitored. (In fact,
+police have their own jargon term for perjury,
+“<a
href="https://en.wikipedia.org/w/index.php?title=Police_perjury&oldid=552608302">testilying</a>,”
+since they do it so frequently, particularly about protesters
+and <a href="http://photographyisnotacrime.com/">photographers</a>.)
+One city in California that required police to wear video cameras all
+the time
+found <a
href="http://www.motherjones.com/kevin-drum/2013/08/ubiquitous-surveillance-police-edition">their
+use of force fell by 60%</a>. The ACLU is in favor of this.</p>
+
+<p><a
+href="http://action.citizen.org/p/dia/action3/common/public/?action_KEY=12266">Corporations
+are not people, and not entitled to human rights</a>. It is
+legitimate to require businesses to publish the details of processes
+that might cause chemical, biological, nuclear, fiscal, computational
+(e.g., <a href="http://DefectiveByDesign.org">DRM</a>) or political
+(e.g., lobbying) hazards to society, to whatever level is needed for
+public well-being. The danger of these operations (consider the BP
+oil spill, the Fukushima meltdowns, and the 2008 fiscal crisis) dwarfs
+that of terrorism.</p>
+
+<p>However, journalism must be protected from surveillance even when
+it is carried out as part of a business.</p>
+
+<hr />
+
+<p>Digital technology has brought about a tremendous increase in the
+level of surveillance of our movements, actions, and communications.
+It is far more than we experienced in the 1990s,
+and <a
href="http://blogs.hbr.org/cs/2013/06/your_iphone_works_for_the_secret_police.html">far
+more than people behind the Iron Curtain experienced</a> in the 1980s,
+and would still be far more even with additional legal limits on state
+use of the accumulated data.</p>
+
+<p>Unless we believe that our free countries previously suffered from
+a grave surveillance deficit, and ought to be surveilled more than the
+Soviet Union and East Germany were, we must reverse this increase.
+That requires stopping the accumulation of big data about people.</p>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2015 Richard Stallman</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2015/07/14 02:01:04 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>