[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-microsoft.de.po malw...
From: |
GNUN |
Subject: |
www/proprietary/po malware-microsoft.de.po malw... |
Date: |
Sat, 15 Aug 2015 09:27:40 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 15/08/15 09:27:40
Modified files:
proprietary/po : malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po malware-microsoft.it.po
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po
proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it.po
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary-sabotage.de.po
proprietary-sabotage.fr.po
proprietary-sabotage.it.po
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru.po
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it.po
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.22&r2=1.23
Patches:
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-microsoft.de.po 10 Aug 2015 18:27:25 -0000 1.15
+++ malware-microsoft.de.po 15 Aug 2015 09:27:35 -0000 1.16
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: address@hidden"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-23 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -271,6 +271,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-microsoft.es.po 12 Aug 2015 11:07:29 -0000 1.16
+++ malware-microsoft.es.po 15 Aug 2015 09:27:35 -0000 1.17
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2015-08-12 12:49+0300\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Dora Scilipoti <dora AT gnu DOT org>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
"X-Poedit-Language: Spanish\n"
#. type: Content of: <title>
@@ -250,6 +251,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-microsoft.fr.po 13 Aug 2015 10:59:58 -0000 1.14
+++ malware-microsoft.fr.po 15 Aug 2015 09:27:35 -0000 1.15
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-08-13 11:22+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -248,6 +249,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- malware-microsoft.it.po 11 Aug 2015 07:43:49 -0000 1.26
+++ malware-microsoft.it.po 15 Aug 2015 09:27:35 -0000 1.27
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-08-11 09:18+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -244,6 +245,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-microsoft.ja.po 10 Aug 2015 18:27:26 -0000 1.14
+++ malware-microsoft.ja.po 15 Aug 2015 09:27:35 -0000 1.15
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-23 17:24+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -244,6 +244,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- malware-microsoft.pot 10 Aug 2015 18:27:26 -0000 1.9
+++ malware-microsoft.pot 15 Aug 2015 09:27:37 -0000 1.10
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -181,6 +181,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a "
+"href=\"http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\">
"
+"Windows 10 sends identifiable information to Microsoft</a>, even if a user "
+"turns off its Bing search and Cortana features, and activates the "
+"privacy-protection settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a "
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-microsoft.ru.po 11 Aug 2015 04:57:22 -0000 1.19
+++ malware-microsoft.ru.po 15 Aug 2015 09:27:37 -0000 1.20
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-08-10 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -247,6 +248,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-insecurity.de.po 25 Jul 2015 12:52:14 -0000 1.16
+++ proprietary-insecurity.de.po 15 Aug 2015 09:27:37 -0000 1.17
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: address@hidden"
-"POT-Creation-Date: 2015-07-22 17:55+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-23 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -57,6 +58,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Security researchers discovered a <a href=\"http://www.theguardian.com/"
+"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
+"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
+"take remote control of a car or lorry using an SMS."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
"remote control of the Jeep</a> “connected car”."
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-insecurity.fr.po 23 Jul 2015 11:10:31 -0000 1.19
+++ proprietary-insecurity.fr.po 15 Aug 2015 09:27:37 -0000 1.20
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-07-22 17:55+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-23 13:09+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -61,6 +62,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Security researchers discovered a <a href=\"http://www.theguardian.com/"
+"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
+"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
+"take remote control of a car or lorry using an SMS."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
"remote control of the Jeep</a> “connected car”."
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-insecurity.it.po 23 Jul 2015 21:27:27 -0000 1.27
+++ proprietary-insecurity.it.po 15 Aug 2015 09:27:38 -0000 1.28
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-07-22 17:55+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-23 23:20+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -60,6 +61,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Security researchers discovered a <a href=\"http://www.theguardian.com/"
+"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
+"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
+"take remote control of a car or lorry using an SMS."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
"remote control of the Jeep</a> “connected car”."
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-insecurity.ja.po 23 Jul 2015 08:57:14 -0000 1.21
+++ proprietary-insecurity.ja.po 15 Aug 2015 09:27:38 -0000 1.22
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-07-22 17:55+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-23 17:32+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -58,6 +59,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Security researchers discovered a <a href=\"http://www.theguardian.com/"
+"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
+"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
+"take remote control of a car or lorry using an SMS."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
"remote control of the Jeep</a> “connected car”."
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-insecurity.pot 22 Jul 2015 17:57:24 -0000 1.11
+++ proprietary-insecurity.pot 15 Aug 2015 09:27:38 -0000 1.12
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-07-22 17:55+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -47,6 +47,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Security researchers discovered a <a "
+"href=\"http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text\">
"
+"vulnerability in diagnostic dongles used for vehicle tracking and "
+"insurance</a> that let them take remote control of a car or lorry using an "
+"SMS."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers were able to <a "
"href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take
"
"remote control of the Jeep</a> “connected car”."
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-insecurity.ru.po 22 Jul 2015 19:27:25 -0000 1.23
+++ proprietary-insecurity.ru.po 15 Aug 2015 09:27:38 -0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2015-07-22 17:55+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-22 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -60,6 +61,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Security researchers discovered a <a href=\"http://www.theguardian.com/"
+"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
+"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
+"take remote control of a car or lorry using an SMS."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
"remote control of the Jeep</a> “connected car”."
Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary-sabotage.de.po 10 Aug 2015 18:27:26 -0000 1.9
+++ proprietary-sabotage.de.po 15 Aug 2015 09:27:38 -0000 1.10
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: address@hidden"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-05-10 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -42,6 +42,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-"
+"busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml"
+"\"> Lenovo stealthily installed crapware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio <a href=\"http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-"
"s.html\"> used a firmware “upgrade” to make its TVs snoop on "
"what users watch</a>. The TVs did not do that when first sold."
Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-sabotage.fr.po 11 Aug 2015 09:44:41 -0000 1.6
+++ proprietary-sabotage.fr.po 15 Aug 2015 09:27:38 -0000 1.7
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-08-11 11:41+0200\n"
"Last-Translator: Sébastien Poher <sbphr @T volted.net>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -44,6 +45,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-"
+"busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml"
+"\"> Lenovo stealthily installed crapware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio <a href=\"http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-"
"s.html\"> used a firmware “upgrade” to make its TVs snoop on "
"what users watch</a>. The TVs did not do that when first sold."
Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-sabotage.it.po 11 Aug 2015 07:43:49 -0000 1.8
+++ proprietary-sabotage.it.po 15 Aug 2015 09:27:39 -0000 1.9
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-08-11 09:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -43,6 +44,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-"
+"busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml"
+"\"> Lenovo stealthily installed crapware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio <a href=\"http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-"
"s.html\"> used a firmware “upgrade” to make its TVs snoop on "
"what users watch</a>. The TVs did not do that when first sold."
Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary-sabotage.ja.po 10 Aug 2015 18:27:27 -0000 1.9
+++ proprietary-sabotage.ja.po 15 Aug 2015 09:27:39 -0000 1.10
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-09 09:18+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -44,6 +44,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-"
+"busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml"
+"\"> Lenovo stealthily installed crapware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio <a href=\"http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-"
"s.html\"> used a firmware “upgrade” to make its TVs snoop on "
"what users watch</a>. The TVs did not do that when first sold."
Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-sabotage.pot 10 Aug 2015 18:27:27 -0000 1.5
+++ proprietary-sabotage.pot 15 Aug 2015 09:27:39 -0000 1.6
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -38,6 +38,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a "
+"href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml\">
"
+"Lenovo stealthily installed crapware via BIOS</a> on Windows installs. Note "
+"that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio <a "
"href=\"http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html\">
"
"used a firmware “upgrade” to make its TVs snoop on what users "
Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-sabotage.ru.po 11 Aug 2015 04:57:22 -0000 1.8
+++ proprietary-sabotage.ru.po 15 Aug 2015 09:27:39 -0000 1.9
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2015-08-10 18:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-08-10 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -43,6 +44,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-"
+"busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml"
+"\"> Lenovo stealthily installed crapware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio <a href=\"http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-"
"s.html\"> used a firmware “upgrade” to make its TVs snoop on "
"what users watch</a>. The TVs did not do that when first sold."
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-surveillance.de.po 6 Aug 2015 16:27:51 -0000 1.16
+++ proprietary-surveillance.de.po 15 Aug 2015 09:27:39 -0000 1.17
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: address@hidden"
-"POT-Creation-Date: 2015-08-06 16:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-06 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -186,6 +186,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-surveillance.fr.po 13 Aug 2015 10:59:58 -0000 1.22
+++ proprietary-surveillance.fr.po 15 Aug 2015 09:27:39 -0000 1.23
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2015-08-06 16:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-08-13 11:22+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -187,6 +188,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-surveillance.it.po 6 Aug 2015 22:28:28 -0000 1.26
+++ proprietary-surveillance.it.po 15 Aug 2015 09:27:39 -0000 1.27
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2015-08-06 16:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-08-07 00:23+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -186,6 +187,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary-surveillance.ja.po 6 Aug 2015 16:27:52 -0000 1.19
+++ proprietary-surveillance.ja.po 15 Aug 2015 09:27:39 -0000 1.20
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2015-08-06 16:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-07-07 09:19+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -187,6 +187,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-surveillance.pot 6 Aug 2015 16:27:52 -0000 1.11
+++ proprietary-surveillance.pot 15 Aug 2015 09:27:40 -0000 1.12
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2015-08-06 16:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -169,6 +169,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a "
+"href=\"http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\">
"
+"Windows 10 sends identifiable information to Microsoft</a>, even if a user "
+"turns off its Bing search and Cortana features, and activates the "
+"privacy-protection settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-surveillance.ru.po 6 Aug 2015 16:58:10 -0000 1.22
+++ proprietary-surveillance.ru.po 15 Aug 2015 09:27:40 -0000 1.23
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2015-08-06 16:25+0000\n"
+"POT-Creation-Date: 2015-08-15 09:25+0000\n"
"PO-Revision-Date: 2015-08-06 17:00+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2015-08-15 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -190,6 +191,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"<a href=\"http://arstechnica.com/information-technology/2015/08/even-when-"
+"told-not-to-windows-10-just-cant-stop-talking-to-microsoft/\"> Windows 10 "
+"sends identifiable information to Microsoft</a>, even if a user turns off "
+"its Bing search and Cortana features, and activates the privacy-protection "
+"settings."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Microsoft uses Windows 10's “privacy policy” to overtly impose a "
"“right” to look at users' files at any time. Windows 10 full "
"disk encryption <a href=\"https://edri.org/microsofts-new-small-print-how-"