www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www home.it.html planetfeeds.it.html philosophy...


From: GNUN
Subject: www home.it.html planetfeeds.it.html philosophy...
Date: Sat, 24 Oct 2015 21:59:06 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     15/10/24 21:59:06

Modified files:
        .              : home.it.html planetfeeds.it.html 
        philosophy     : amazon.it.html 
                         surveillance-vs-democracy.it.html 
                         words-to-avoid.it.html 
        philosophy/po  : amazon.it-en.html amazon.it.po 
                         surveillance-vs-democracy.it-en.html 
                         surveillance-vs-democracy.it.po 
                         words-to-avoid.it-en.html words-to-avoid.it.po 
        po             : home.it-en.html home.it.po planetfeeds.it.po 
        proprietary    : malware-apple.it.html malware-microsoft.it.html 
                         proprietary-back-doors.it.html 
                         proprietary-censorship.it.html 
                         proprietary-insecurity.it.html 
                         proprietary-sabotage.it.html 
                         proprietary-surveillance.it.html 
                         proprietary-tyrants.it.html 
        proprietary/po : malware-apple.it-en.html malware-apple.it.po 
                         malware-microsoft.it-en.html 
                         malware-microsoft.it.po 
                         proprietary-back-doors.it-en.html 
                         proprietary-back-doors.it.po 
                         proprietary-censorship.it-en.html 
                         proprietary-censorship.it.po 
                         proprietary-insecurity.it-en.html 
                         proprietary-insecurity.it.po 
                         proprietary-sabotage.it-en.html 
                         proprietary-sabotage.it.po 
                         proprietary-surveillance.it-en.html 
                         proprietary-surveillance.it.po 
                         proprietary-tyrants.it-en.html 
                         proprietary-tyrants.it.po 
        server         : sitemap.it.html 
        server/po      : sitemap.it-en.html sitemap.it.po 
        software       : software.it.html 
        software/po    : software.it-en.html software.it.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.it.html?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.it.html?cvsroot=www&r1=1.418&r2=1.419
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/amazon.it.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.it.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.it.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/amazon.it-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/amazon.it.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it-en.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it.po?cvsroot=www&r1=1.563&r2=1.564
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.it.po?cvsroot=www&r1=1.588&r2=1.589
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.it.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.it.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.it.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.it.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.it.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/software/software.it.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/software.it-en.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/software/po/software.it.po?cvsroot=www&r1=1.162&r2=1.163

Patches:
Index: home.it.html
===================================================================
RCS file: /web/www/www/home.it.html,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- home.it.html        16 Oct 2015 20:00:40 -0000      1.286
+++ home.it.html        24 Oct 2015 21:58:57 -0000      1.287
@@ -152,10 +152,10 @@
 riforma globale del copyright</a> con <a
 href="http://www.laquadrature.net/en/";>LQDN</a>.</li>
 
-<li>Support the efforts on net neutrality in Europe, <a
-href="http://www.savetheinternet.com"; title="Net neutrality in the United
-States of America">in the USA</a> and <a href="http://saveournet.ca/";
-title="Net neutrality in Canada">in Canada</a>.</li>
+<li>Sostenete gli sforzi per preservare la neutralità della rete in Europa, <a
+href="http://www.savetheinternet.com"; title="Neutralità della rete negli
+USA">negli USA</a> e <a href="http://saveournet.ca/"; title="Neutralità della
+rete in Canada">in Canada</a>.</li>
 
 <li><strong>Lottate contro i brevetti sul software:</strong> a livello <a
 href="http://www.endsoftpatents.org";>mondiale</a> e <a
@@ -268,7 +268,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultima modifica:
 
-$Date: 2015/10/16 20:00:40 $
+$Date: 2015/10/24 21:58:57 $
 
 <!-- timestamp end -->
 </p>

Index: planetfeeds.it.html
===================================================================
RCS file: /web/www/www/planetfeeds.it.html,v
retrieving revision 1.418
retrieving revision 1.419
diff -u -b -r1.418 -r1.419
--- planetfeeds.it.html 22 Oct 2015 04:59:18 -0000      1.418
+++ planetfeeds.it.html 24 Oct 2015 21:58:58 -0000      1.419
@@ -1,15 +1,11 @@
 
 <!-- Autogenerated by planetrss.pl 1.13 -->
 <p><a href='http://savannah.gnu.org/forum/forum.php?forum_id=8381'>
-GNU Parallel 20151022 ('Liquid Water') released</a>: GNU Parallel 20151022 
('Liquid Water') has been released. It is available
-for download at: http://ftp.gnu.org/gnu/parallel/ Haiku of the month...
+GNU Parallel 20151022 disponibile</a> 
 <a 
href='http://savannah.gnu.org/forum/forum.php?forum_id=8381'>&nbsp;<em>leggi 
tutto...</em></a></p>
 <p><a
 href='http://heronsperch.blogspot.com/2015/10/still-waiting-on-you-apple.html'>
-Still waiting on you, Apple...</a>: Back in July Apple promised to open source 
Swift. :) Well, Apple? What's
-going on? Is this still the plan, Apple?</p>
+Ancora in attesa di Apple...</a> </p>
 <p><a href='http://dustycloud.org/blog/hitchhikers-guide-to-data-formats/'>
-Hitchhiker's guide to data formats</a>: Just thinking out loud this morning on 
what data formats there are and how
-they work with the world: * XML: 2000's hippest technology. Combines a
-clear, par...
+La Guida Galattica ai formati di dati</a> 
 <a 
href='http://dustycloud.org/blog/hitchhikers-guide-to-data-formats/'>&nbsp;<em>leggi
 tutto...</em></a></p>

Index: philosophy/amazon.it.html
===================================================================
RCS file: /web/www/www/philosophy/amazon.it.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- philosophy/amazon.it.html   29 Aug 2015 21:29:07 -0000      1.37
+++ philosophy/amazon.it.html   24 Oct 2015 21:58:58 -0000      1.38
@@ -207,8 +207,8 @@
 
 <p>
 Da parte sua, Amazon sta facendo anche  <a
-href="http://www.salon.com/tech/log/1999/10/28/amazon/";>altre  cose
-odiose</a> presso un altro tribunale.  </p>
+href="https://web.archive.org/web/20140610154715/http://www.salon.com/1999/10/28/amazon_3/";>altre
+cose odiose</a> presso un altro tribunale.  </p>
 
 <p>
 Si veda <a href="http://progfree.org";>http://progfree.org/</a> oppure <a
@@ -301,7 +301,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/08/29 21:29:07 $
+$Date: 2015/10/24 21:58:58 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/surveillance-vs-democracy.it.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.it.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- philosophy/surveillance-vs-democracy.it.html        24 Sep 2015 17:59:07 
-0000      1.14
+++ philosophy/surveillance-vs-democracy.it.html        24 Oct 2015 21:58:58 
-0000      1.15
@@ -39,7 +39,7 @@
 href="/philosophy/free-software-even-more-important.html">come sostengo da
 30 anni</a>, è il primo passo per assumere il controllo delle nostre
 esistenze digitali. Non possiamo fidarci del software non libero; la NSA <a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
+href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>
 sfrutta</a> e addirittura <a
 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>crea</a>
 debolezze nel software non libero per invadere i nostri computer e
@@ -550,7 +550,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/09/24 17:59:07 $
+$Date: 2015/10/24 21:58:58 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/words-to-avoid.it.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.it.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- philosophy/words-to-avoid.it.html   24 Sep 2015 17:59:07 -0000      1.77
+++ philosophy/words-to-avoid.it.html   24 Oct 2015 21:58:58 -0000      1.78
@@ -853,8 +853,8 @@
 software. Essi parlano di "industrie" di sviluppo  del software e tentano
 così di argomentare che queste dovrebbero  essere soggette ai monopoli dei
 brevetti. <a
-href="http://web.archive.org/web/20071222001014/http://www.swpat.ffii.org/papers/europarl0309/";
-title="versione archiviata di http://swpat.ffii.org/papers/europarl0309/";>Il
+href="https://web.archive.org/web/20071211112325/http://eupat.ffii.org/papers/europarl0309/";
+title="versione archiviata di http://eupat.ffii.org/papers/europarl0309/";>Il
 Parlamento  Europeo, respingendo i brevetti software nel 2003, ha stabilito
 con votazione che "industria" è "produzione automatica di beni
 materiali"</a>.</p>
@@ -1027,7 +1027,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/09/24 17:59:07 $
+$Date: 2015/10/24 21:58:58 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/amazon.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/amazon.it-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- philosophy/po/amazon.it-en.html     29 Aug 2015 21:29:07 -0000      1.22
+++ philosophy/po/amazon.it-en.html     24 Oct 2015 21:58:58 -0000      1.23
@@ -199,7 +199,7 @@
 
 <p>
 On the side, Amazon is doing
-<a href="http://www.salon.com/tech/log/1999/10/28/amazon/";>other
+<a 
href="https://web.archive.org/web/20140610154715/http://www.salon.com/1999/10/28/amazon_3/";>other
 obnoxious things</a> in another courtroom, too.</p>
 
 <p>
@@ -272,7 +272,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/08/29 21:29:07 $
+$Date: 2015/10/24 21:58:58 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/amazon.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/amazon.it.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- philosophy/po/amazon.it.po  24 Oct 2015 21:46:00 -0000      1.36
+++ philosophy/po/amazon.it.po  24 Oct 2015 21:58:59 -0000      1.37
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 18:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 # type: Content of: <title>
@@ -463,15 +462,7 @@
 "sul successo del  boicottaggio ad Amazon</a>.  "
 
 # type: Content of: <p>
-# | On the side, Amazon is doing <a
-# | [-href=\"http://www.salon.com/tech/log/1999/10/28/amazon/\";>other-]
-# | 
{+href=\"https://web.archive.org/web/20140610154715/http://www.salon.com/1999/10/28/amazon_3/\";>other+}
-# | obnoxious things</a> in another courtroom, too.
-#. type: Content of: <p>
-#| msgid ""
-#| "On the side, Amazon is doing <a href=\"http://www.salon.com/tech/";
-#| "log/1999/10/28/amazon/\">other obnoxious things</a> in another courtroom, "
-#| "too."
+#. type: Content of: <p>
 msgid ""
 "On the side, Amazon is doing <a href=\"https://web.archive.org/";
 "web/20140610154715/http://www.salon.com/1999/10/28/amazon_3/\";>other "

Index: philosophy/po/surveillance-vs-democracy.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- philosophy/po/surveillance-vs-democracy.it-en.html  24 Sep 2015 17:59:07 
-0000      1.16
+++ philosophy/po/surveillance-vs-democracy.it-en.html  24 Oct 2015 21:58:59 
-0000      1.17
@@ -36,7 +36,7 @@
 I've advocated for 30 years</a>, is the first step in taking control
 of our digital lives, and that includes preventing surveillance.  We
 can't trust nonfree software; the NSA
-<a 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>uses</a>
+<a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>uses</a>
 and
 even <a 
href="http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security";>creates</a>
 security weaknesses in nonfree software to invade our own computers
@@ -521,7 +521,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/09/24 17:59:07 $
+$Date: 2015/10/24 21:58:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- philosophy/po/surveillance-vs-democracy.it.po       24 Oct 2015 21:46:00 
-0000      1.58
+++ philosophy/po/surveillance-vs-democracy.it.po       24 Oct 2015 21:58:59 
-0000      1.59
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 10:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -82,32 +81,7 @@
 "democratico sullo stato, dobbiamo ridurre la sorveglianza fino a un punto in "
 "cui tutti gli informatori sappiano che non possono essere scoperti."
 
-# | Using free/libre software, <a
-# | href=\"/philosophy/free-software-even-more-important.html\">as I've
-# | advocated for 30 years</a>, is the first step in taking control of our
-# | digital lives, and that includes preventing surveillance.  We can't trust
-# | nonfree software; the NSA <a
-# | 
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>uses</a>-]
-# | 
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\";>uses</a>+}
-# | and even <a
-# | 
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\";>creates</a>
-# | security weaknesses in nonfree software to invade our own computers and
-# | routers.  Free software gives us control of our own computers, but <a
-# | href=\"http://www.wired.com/opinion/2013/10/149481/\";>that won't protect
-# | our privacy once we set foot on the Internet</a>.
-#. type: Content of: <p>
-#| msgid ""
-#| "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
-#| "important.html\">as I've advocated for 30 years</a>, is the first step in "
-#| "taking control of our digital lives, and that includes preventing "
-#| "surveillance.  We can't trust nonfree software; the NSA <a href=\"http://";
-#| "blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-"
-#| "ever-trust-microsoft-again/index.htm\">uses</a> and even <a href=\"http://";
-#| "www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security"
-#| "\">creates</a> security weaknesses in nonfree software to invade our own "
-#| "computers and routers.  Free software gives us control of our own "
-#| "computers, but <a href=\"http://www.wired.com/opinion/2013/10/149481/";
-#| "\">that won't protect our privacy once we set foot on the Internet</a>."
+#. type: Content of: <p>
 msgid ""
 "Using free/libre software, <a href=\"/philosophy/free-software-even-more-"
 "important.html\">as I've advocated for 30 years</a>, is the first step in "

Index: philosophy/po/words-to-avoid.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- philosophy/po/words-to-avoid.it-en.html     24 Sep 2015 17:59:08 -0000      
1.70
+++ philosophy/po/words-to-avoid.it-en.html     24 Oct 2015 21:58:59 -0000      
1.71
@@ -952,7 +952,7 @@
 advocates of software patents.  They call software development
 &ldquo;industry&rdquo; and then try to argue that this means it should
 be subject to patent
-monopolies.  <a 
href="http://web.archive.org/web/20071222001014/http://www.swpat.ffii.org/papers/europarl0309/";
 title="archived version of http://swpat.ffii.org/papers/europarl0309/";> The
+monopolies.  <a 
href="https://web.archive.org/web/20071211112325/http://eupat.ffii.org/papers/europarl0309/";
 title="archived version of http://eupat.ffii.org/papers/europarl0309/";> The
 European Parliament, rejecting software patents in 2003, voted to
 define &ldquo;industry&rdquo; as &ldquo;automated production of
 material goods.&rdquo;</a></p>
@@ -1106,7 +1106,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/09/24 17:59:08 $
+$Date: 2015/10/24 21:58:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/words-to-avoid.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- philosophy/po/words-to-avoid.it.po  24 Oct 2015 21:46:00 -0000      1.178
+++ philosophy/po/words-to-avoid.it.po  24 Oct 2015 21:58:59 -0000      1.179
@@ -17,7 +17,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 18:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -230,8 +229,8 @@
 #. type: Content of: <p>
 msgid "&ldquo;<a href=\"#SharingEconomy\">Sharing economy</a>&rdquo; |"
 msgstr ""
-"&ldquo;<a href=\"#SharingEconomy\">Economia di condivisione (Sharing "
-"economy)</a>&rdquo; |"
+"&ldquo;<a href=\"#SharingEconomy\">Economia di condivisione (Sharing economy)"
+"</a>&rdquo; |"
 
 #. type: Content of: <p>
 msgid "&ldquo;<a href=\"#Skype\">Skype</a>&rdquo; |"
@@ -1905,9 +1904,9 @@
 "your privacy, try one of the <a href=\"https://libreplanet.org/wiki/Group:";
 "Skype_Replacement\"> numerous free Skype replacements</a>."
 msgstr ""
-"Non usate il neologismo &ldquo;skypare&rdquo; per indicare una "
-"(video)chiamata via Internet. Skype è solo uno dei tanti programmi per "
-"questo scopo, e per di più è software proprietario e <a href=\"/philosophy/"
+"Non usate il neologismo &ldquo;skypare&rdquo; per indicare una (video)"
+"chiamata via Internet. Skype è solo uno dei tanti programmi per questo "
+"scopo, e per di più è software proprietario e <a href=\"/philosophy/"
 "proprietary/proprietary-surveillance.html#SpywareInSkype\"> spia i propri "
 "utenti</a>. Per effettuare (video)chiamate via Internet in un modo che "
 "rispetti la vostra libertà e la vostra privacy, usate uno dei tanti <a href="
@@ -1933,28 +1932,7 @@
 "software esistono, e molte di  queste sviluppano software libero e non, ma "
 "quelle che sviluppano  software libero non sono come fabbriche."
 
-# | The term &ldquo;industry&rdquo; is being used as propaganda by advocates
-# | of software patents.  They call software development
-# | &ldquo;industry&rdquo; and then try to argue that this means it should be
-# | subject to patent monopolies.  <a
-# | 
[-href=\"http://web.archive.org/web/20071222001014/http://www.swpat.ffii.org/papers/europarl0309/\"-]
-# | 
{+href=\"https://web.archive.org/web/20071211112325/http://eupat.ffii.org/papers/europarl0309/\"+}
-# | title=\"archived version of
-# | [-http://swpat.ffii.org/papers/europarl0309/\";>-]
-# | {+http://eupat.ffii.org/papers/europarl0309/\";>+} The European Parliament,
-# | rejecting software patents in 2003, voted to define &ldquo;industry&rdquo;
-# | as &ldquo;automated production of material goods.&rdquo;</a>
-#. type: Content of: <p>
-#| msgid ""
-#| "The term &ldquo;industry&rdquo; is being used as propaganda by advocates "
-#| "of software patents.  They call software development &ldquo;"
-#| "industry&rdquo; and then try to argue that this means it should be "
-#| "subject to patent monopolies.  <a href=\"http://web.archive.org/";
-#| "web/20071222001014/http://www.swpat.ffii.org/papers/europarl0309/\"; title="
-#| "\"archived version of http://swpat.ffii.org/papers/europarl0309/\";> The "
-#| "European Parliament, rejecting software patents in 2003, voted to define "
-#| "&ldquo;industry&rdquo; as &ldquo;automated production of material goods."
-#| "&rdquo;</a>"
+#. type: Content of: <p>
 msgid ""
 "The term &ldquo;industry&rdquo; is being used as propaganda by advocates of "
 "software patents.  They call software development &ldquo;industry&rdquo; and "

Index: po/home.it-en.html
===================================================================
RCS file: /web/www/www/po/home.it-en.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- po/home.it-en.html  23 Sep 2015 18:29:52 -0000      1.117
+++ po/home.it-en.html  24 Oct 2015 21:58:59 -0000      1.118
@@ -151,7 +151,7 @@
 <li>Support the efforts on net neutrality in Europe,
 <a href="http://www.savetheinternet.com"; title="Net
 neutrality in the United States of America">in the USA</a>
-and <a href="http://www.neutrality.ca"; title="Net neutrality in
+and <a href="http://saveournet.ca/"; title="Net neutrality in
 Canada">in Canada</a>.</li>
 
 <li><strong>Fight against software patents:</strong>
@@ -253,7 +253,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/09/23 18:29:52 $
+$Date: 2015/10/24 21:58:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/home.it.po
===================================================================
RCS file: /web/www/www/po/home.it.po,v
retrieving revision 1.563
retrieving revision 1.564
diff -u -b -r1.563 -r1.564
--- po/home.it.po       24 Oct 2015 21:46:00 -0000      1.563
+++ po/home.it.po       24 Oct 2015 21:58:59 -0000      1.564
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 19:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 # type: Content of: <title>
@@ -338,17 +337,7 @@
 "copyright</a> con <a href=\"http://www.laquadrature.net/en/\";>LQDN</a>."
 
 # type: Content of: <div><p>
-# | Support the efforts on net neutrality in Europe, <a
-# | href=\"http://www.savetheinternet.com\"; title=\"Net neutrality in the
-# | United States of America\">in the USA</a> and <a
-# | [-href=\"http://www.neutrality.ca\"-] {+href=\"http://saveournet.ca/\"+}
-# | title=\"Net neutrality in Canada\">in Canada</a>.
 #. type: Content of: <div><div><div><ul><li>
-#| msgid ""
-#| "Support the efforts on net neutrality in Europe, <a href=\"http://www.";
-#| "savetheinternet.com\" title=\"Net neutrality in the United States of "
-#| "America\">in the USA</a> and <a href=\"http://www.neutrality.ca\"; title="
-#| "\"Net neutrality in Canada\">in Canada</a>."
 msgid ""
 "Support the efforts on net neutrality in Europe, <a href=\"http://www.";
 "savetheinternet.com\" title=\"Net neutrality in the United States of America"

Index: po/planetfeeds.it.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.it.po,v
retrieving revision 1.588
retrieving revision 1.589
diff -u -b -r1.588 -r1.589
--- po/planetfeeds.it.po        24 Oct 2015 21:46:01 -0000      1.588
+++ po/planetfeeds.it.po        24 Oct 2015 21:59:00 -0000      1.589
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-15 04:57+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <p><a>
@@ -59,12 +58,7 @@
 "going on? Is this still the plan, Apple?"
 msgstr " "
 
-# | <a
-# | [-href='http://dustycloud.org/blog/minimalist-distributed-bugtracker/'>-]
-# | {+href='http://dustycloud.org/blog/hitchhikers-guide-to-data-formats/'>+}
 #. type: Content of: <p><a>
-#| msgid ""
-#| "<a href='http://dustycloud.org/blog/minimalist-distributed-bugtracker/'>"
 msgid ""
 "<a href='http://dustycloud.org/blog/hitchhikers-guide-to-data-formats/'>"
 msgstr ""

Index: proprietary/malware-apple.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.it.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/malware-apple.it.html   10 Oct 2015 14:59:26 -0000      1.7
+++ proprietary/malware-apple.it.html   24 Oct 2015 21:59:00 -0000      1.8
@@ -71,23 +71,46 @@
 
 <h3 id="back-doors">Backdoor di Apple</h3>
 <ul>
-  <li><p>L'iPhone ha una backdoor <a
+<li><p>
+Mac OS X ha avuto per 4 anni una <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+backdoor locale</a> intenzionale, che gli utenti potevano sfruttare per
+ottenere privilegi di amministratore.
+</p></li>
+
+<li><p>L'iPhone ha una backdoor <a
 
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>che
 permette ad Apple di disinstallare a distanza applicazioni</a> che reputa
 &ldquo;inappropriate&rdquo;. Jobs disse che è giusto che Apple abbia questo
-potere perché di Apple ci si può fidare, eccome.</p>
-  </li>
+potere perché di Apple ci si può fidare, eccome.
+</p></li>
 
-  <li><p>L'iPhone ha una backdoor per <a
+<li><p>L'iPhone ha una backdoor per <a
 
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>la
 formattazione a distanza</a>. Non è sempre abilitata, ma gli utenti vengono
-spinti ad abilitarla a loro insaputa.</p>
-  </li>
+spinti ad abilitarla a loro insaputa.
+</p></li>
 </ul>
 
 <h3 id="censorship">Censura di Apple</h3>
 <ul>
 <li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";> ha eliminato
+un programma dal suo App Store</a> perché i suoi sviluppatori hanno osato
+disassemblare alcuni degli iGadget.
+</p></li>
+
+<li><p>
+Apple ha rifiutato un'app che mostrava dove sono avvenuti gli attacchi
+omicidi di droni statunitensi, adducendo varie scuse. Ogni volta che gli
+sviluppatori sistemavano un &ldquo;problema&rdquo;, Apple ne trovava un
+altro. Dopo il quinto rifiuto, Apple ha ammesso che stava censurando
+l'applicazione <a
+href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>solo
+per il tema di cui trattava</a>.
+</p></li>
+
+<li><p>
 Nel 2015, Apple <a
 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>proibisce
 le applicazioni</a> che sostengono il diritto all'aborto o che aiuterebbero
@@ -283,9 +306,9 @@
   <li><p>Gli iGadget sono dispositivi tiranni: non permettono l'installazione 
di
 sistemi operativi diversi o modificati. Esiste una versione di Android per
 gli iGadget, ma installarla richiede <a
-href="http://www.idroidproject.org/wiki/Status";>trovare un bug o
-&ldquo;exploit&rdquo;</a> che renda possibile l'installazione di un sistema
-operativo diverso.</p>
+href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>trovare
+un bug o &ldquo;exploit&rdquo;</a> che renda possibile l'installazione di un
+sistema operativo diverso.</p>
   </li>
 </ul>
 <div class="translators-notes">
@@ -364,7 +387,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/10/10 14:59:26 $
+$Date: 2015/10/24 21:59:00 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/malware-microsoft.it.html       10 Oct 2015 14:59:26 -0000      
1.10
+++ proprietary/malware-microsoft.it.html       24 Oct 2015 21:59:02 -0000      
1.11
@@ -113,11 +113,11 @@
   </p></li>
 
   <li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>Microsoft
 informa l'NSA sui bug di Windows prima di sistemarli</a>.</p></li>
 
   <li><p><a
-href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>Microsoft
+href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
 ha smesso di rilasciare aggiornamenti di sicurezza per Windows XP a tutti
 meno che a quei pochi utenti disposti a pagare cifre esorbitanti</a>.</p>
 
@@ -298,7 +298,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/10/10 14:59:26 $
+$Date: 2015/10/24 21:59:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.it.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-back-doors.it.html  26 Aug 2015 21:57:42 -0000      
1.4
+++ proprietary/proprietary-back-doors.it.html  24 Oct 2015 21:59:02 -0000      
1.5
@@ -17,6 +17,21 @@
 software proprietario.</p>
 
 <ul>
+<li><p>
+Mac OS X ha avuto per 4 anni una <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+backdoor locale</a> intenzionale.
+</p></li>
+
+<li><p>
+Alcuni utenti segnalano che <a
+href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+Microsoft li sta obbligando a sostituire Windows 7 e 8</a> con Windows 10,
+che spia tutto.</p>
+
+<p>
+Sembra che questo sfrutti una backdoor in Windows 7 e 8.
+</p></li>
 
 <li>
 <p>La maggior parte dei cellulari hanno una backdoor universale, che è stata
@@ -285,7 +300,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/08/26 21:57:42 $
+$Date: 2015/10/24 21:59:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-censorship.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.it.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/proprietary-censorship.it.html  10 Oct 2015 14:59:27 -0000      
1.3
+++ proprietary/proprietary-censorship.it.html  24 Oct 2015 21:59:02 -0000      
1.4
@@ -21,6 +21,22 @@
 
 <ul>
 <li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";> ha eliminato
+un programma dal suo App Store</a> perché i suoi sviluppatori hanno osato
+disassemblare alcuni degli iGadget.
+</p></li>
+
+<li><p>
+Apple ha rifiutato un'app che mostrava dove sono avvenuti gli attacchi
+omicidi di droni statunitensi, adducendo varie scuse. Ogni volta che gli
+sviluppatori sistemavano un &ldquo;problema&rdquo;, Apple ne trovava un
+altro. Dopo il quinto rifiuto, Apple ha ammesso che stava censurando
+l'applicazione <a
+href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>solo
+per il tema di cui trattava</a>.
+</p></li>
+
+<li><p>
 Nel 2015, Apple <a
 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>proibisce
 le applicazioni</a> che sostengono il diritto all'aborto o che aiuterebbero
@@ -115,7 +131,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-insecurity.it.html  10 Oct 2015 14:59:27 -0000      
1.8
+++ proprietary/proprietary-insecurity.it.html  24 Oct 2015 21:59:02 -0000      
1.9
@@ -26,31 +26,60 @@
 ripararle</em>.</p>
 
 <ul>
+<li>
+<p>
+I braccialetti per il monitoraggio della forma fisica di FitBit hanno <a
+href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
+una vulnerabilità Bluetooth</a> che permette ai malintenzionati di inviare
+malware ai dispositivi, che in seguito possono infettare computer e altri
+dispositivi simili con cui entrano in contatto.
+</p>
+</li>
+
+<li>
+<p>
+Le funzioni di &ldquo;cifratura nativa&rdquo; dei dischi usano firmware
+proprietario per cifrare, e sono pertanto inaffidabili. I dischi &ldquo;My
+Passport&rdquo; di Western Digital <a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>hanno
+una back door</a>.
+</p>
+</li>
+
+<li>
+<p>
+Mac OS X ha avuto per 4 anni una <a
+href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+backdoor locale</a> intenzionale, che gli utenti potevano sfruttare per
+ottenere privilegi di amministratore.
+</p>
+</li>
 
 <li>
 <p>Alcuni ricercatori in materia di sicurezza hanno scoperto <a
 
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
 falle nei dispositivi diagnostici</a> usati per il monitoraggio e
 l'assicurazione dei veicoli e hanno dimostrato di poter prendere il
-controllo di un'auto o un camion con un semplice SMS.</p>
+controllo di un'auto o un camion con un semplice SMS.
+</p>
 </li>
 
-  <li>
-    <p>
-      Alcuni cracker sono riusciti a <a
+<li>
+<p>
+Alcuni cracker sono riusciti a <a
 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>prendere
 il controllo di un'auto</a> &ldquo;connected car&rdquo; Jeep.
-      <br/>Hanno dimostrato di essere in grado di conoscere la posizione 
dell'auto, di
+<br/>Hanno dimostrato di essere in grado di conoscere la posizione dell'auto, 
di
 avviare o fermare il motore, di attivare e disattivare i freni e altro.
-    </p>
-    <p>
-      Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso.
-    </p>
-    <p>
-      Se si possiede un'automobile che contiene tra i suoi componenti un 
telefono
+</p>
+<p>
+Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso.
+</p>
+<p>
+Se si possiede un'automobile che contiene tra i suoi componenti un telefono
 cellulare, è opportuno considerare se disattivarlo.
-    </p>
-  </li>
+</p>
+</li>
   
 <li>
 <p>
@@ -271,7 +300,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-sabotage.it.html    13 Oct 2015 22:27:42 -0000      
1.6
+++ proprietary/proprietary-sabotage.it.html    24 Oct 2015 21:59:02 -0000      
1.7
@@ -18,28 +18,31 @@
 
 <ul>
 <li><p>
-Lenovo <a
-href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
-ha alterato il BIOS dei computer che vende</a> per assicurarsi che il suo
-spyware sia presente su qualsiasi sistema Windows installato sui quei
-computer, anche dopo una formattazione.
-</p></li>
+Alcuni utenti segnalano che <a
+href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+Microsoft li sta obbligando a sostituire Windows 7 e 8</a> con Windows 10,
+che spia tutto.</p>
 
-<li><p>
-Microsoft sta ripetutamente <a
-href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
-sollecitando molti utenti ad installare Windows 10</a>.
+<p>
+Sembra che questo sfrutti una backdoor in Windows 7 e 8.
 </p></li>
 
 <li><p>
 <a
-href="https://www.techdirt.com/articles/20150812/11395231925/lenovo-busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml";>
+href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
 Lenovo ha installato di nascosto software indesiderato tramite il BIOS</a>
 sui suoi dispositivi Windows.  Lo specifico metodo usato da Lenovo non aveva
 conseguenze per chi eseguiva GNU/Linux; tra l'altro, un'installazione
 &ldquo;pulita&rdquo; di Windows non è mai davvero pulita a causa del <a
 href="/proprietary/malware-microsoft.html">malware preinstallato da
-Microsoft</a>.</p></li>
+Microsoft</a>.
+</p></li>
+
+<li><p>
+Microsoft sta ripetutamente <a
+href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
+sollecitando molti utenti ad installare Windows 10</a>.
+</p></li>
 
 <li><p>Vizio <a
 href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
@@ -62,7 +65,7 @@
 
 <li><p>
 <a
-href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>Microsoft
 informa l'NSA sui bug di Windows prima di sistemarli</a>.
 </p></li>
 
@@ -86,7 +89,7 @@
 
 <li><p>
 <a
-href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>Microsoft
+href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
 ha smesso di rilasciare aggiornamenti di sicurezza per Windows XP a tutti
 meno che a quei pochi utenti disposti a pagare cifre esorbitanti</a>.</p>
 
@@ -260,7 +263,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/10/13 22:27:42 $
+$Date: 2015/10/24 21:59:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/proprietary-surveillance.it.html        10 Oct 2015 14:59:27 
-0000      1.10
+++ proprietary/proprietary-surveillance.it.html        24 Oct 2015 21:59:02 
-0000      1.11
@@ -33,6 +33,14 @@
     <li><a href="#SpywareInTVSets">Spyware nei giocattoli</a></li>
       </ul>
     </li>
+    <li><a href="#SpywareAtLowLevel">Spyware a basso livello</a>
+      <ul>
+    <li><a href="#SpywareInBIOS">Spyware nel BIOS</a></li>
+    
+      <!-- <li>
+<a href="#SpywareInFirmware">Spyware in Firmware</a></li> -->
+</ul>
+    </li>
     <li><a href="#SpywareAtWork">Spyware sul lavoro</a>
       <ul>
     <li><a href="#SpywareInSkype">Spyware in Skype</a></li>
@@ -334,6 +342,15 @@
 </div>
 
 <ul>
+  <li><p>Secondo Edward Snowden, <a 
href="http://www.bbc.com/news/uk-34444233";>le
+agenzie possono prendere il controllo degli smartphone</a> inviando SMS
+nascosti che permettono loro di accendere e spegnere il dispositivo,
+ascoltare il microfono, recuperare informazioni di geolocalizzazione dal
+GPS, fare foto, leggere i messaggi, leggere lo storico delle chiamate, della
+posizione geografica e della navigazione web, leggere la rubrica. Questo
+malware è progettato per mascherarsi dai tentativi di investigazione.</p>
+  </li>
+
   <li><p>Alcuni telefoni Samsung sono venduti con applicazioni preinstallate 
che <a
 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/";>gli
 utenti non possono cancellare</a>, e queste applicazioni inviano così tanti
@@ -468,6 +485,35 @@
   </li>
 </ul>
 
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+<div class="big-section">
+  <h3 id="SpywareAtLowLevel">Spyware a basso livello</h3>
+  <span class="anchor-reference-id">(<a
+href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInBIOS">Spyware nel BIOS</h4>
+  <span class="anchor-reference-id">(<a
+href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a
+href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+Lenovo ha installato di nascosto software indesiderato tramite il BIOS</a>
+sui suoi dispositivi Windows.  Lo specifico metodo usato da Lenovo non aveva
+conseguenze per chi eseguiva GNU/Linux; tra l'altro, un'installazione
+&ldquo;pulita&rdquo; di Windows non è mai davvero pulita a causa del <a
+href="/proprietary/malware-microsoft.html">malware preinstallato da
+Microsoft</a>.
+</p></li>
+</ul>
+
 <!-- #SpywareAtWork -->
 <!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-section">
@@ -786,7 +832,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tyrants.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.it.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/proprietary-tyrants.it.html     18 Apr 2015 21:59:58 -0000      
1.2
+++ proprietary/proprietary-tyrants.it.html     24 Oct 2015 21:59:02 -0000      
1.3
@@ -29,9 +29,9 @@
 <li>
 <p>Tutti i vari iGadget di Apple sono dispositivi tiranni. Esiste una versione
 di Android compatibile, ma installarla richiede di <a
-href="http://www.idroidproject.org/wiki/Status";>trovare un bug o
-&ldquo;exploit&rdquo;</a> che renda possibile l'installazione di un sistema
-operativo diverso.
+href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>trovare
+un bug o &ldquo;exploit&rdquo;</a> che renda possibile l'installazione di un
+sistema operativo diverso.
 </p>
 </li>
 
@@ -109,7 +109,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -126,9 +126,8 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -139,7 +138,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/04/18 21:59:58 $
+$Date: 2015/10/24 21:59:02 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-apple.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/malware-apple.it-en.html     10 Oct 2015 14:59:27 -0000      
1.7
+++ proprietary/po/malware-apple.it-en.html     24 Oct 2015 21:59:03 -0000      
1.8
@@ -61,23 +61,45 @@
 
 <h3 id="back-doors">Apple Back Doors</h3>
 <ul>
-  <li><p>The iPhone has a back door <a
-  
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
-  that allows Apple to remotely delete apps</a> which Apple considers
-  &ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
-  power because of course we can trust Apple.</p>
-  </li>
+<li><p>
+Mac OS X had an
+<a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p></li>
 
-  <li><p>The iPhone has a back door for <a
-  
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
-  remote wipe</a>.  It's not always enabled, but users are led into
-  enabling it without understanding.</p>
-  </li>
+<li><p>The iPhone has a back door <a
+href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html";>
+that allows Apple to remotely delete apps</a> which Apple considers
+&ldquo;inappropriate&rdquo;. Jobs said it's OK for Apple to have this
+power because of course we can trust Apple.
+</p></li>
+
+<li><p>The iPhone has a back door for <a
+href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone";>
+remote wipe</a>.  It's not always enabled, but users are led into
+enabling it without understanding.
+</p></li>
 </ul>
 
 <h3 id="censorship">Apple Censorship</h3>
 <ul>
 <li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,
+Apple <a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>admitted
+it was censoring the app based on the subject matter</a>.
+</p></li>
+
+<li><p>
 As of 2015, Apple <a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>systematically
 bans apps that endorse abortion
 rights or would help women find abortions</a>.</p>
 
@@ -257,7 +279,7 @@
   <li><p>The iThings are tyrant devices: they do not permit
   installing a different or modified operating system.  There is a
   port of Android to the iThings, but installing it
-  requires <a href="http://www.idroidproject.org/wiki/Status";>
+  requires <a 
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>
   finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to
   install a different system.</p>
   </li>
@@ -320,7 +342,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/malware-apple.it.po  24 Oct 2015 21:46:01 -0000      1.24
+++ proprietary/po/malware-apple.it.po  24 Oct 2015 21:59:03 -0000      1.25
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 14:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -566,20 +565,7 @@
 "Apple <a href=\"http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";
 "\">non permette agli utenti di installare versioni precedenti di iOS</a>."
 
-# | The iThings are tyrant devices: they do not permit installing a different
-# | or modified operating system.  There is a port of Android to the iThings,
-# | but installing it requires <a
-# | [-href=\"http://www.idroidproject.org/wiki/Status\";>-]
-# | 
{+href=\"https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status\";>+}
-# | finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to install
-# | a different system.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "The iThings are tyrant devices: they do not permit installing a different "
-#| "or modified operating system.  There is a port of Android to the iThings, "
-#| "but installing it requires <a href=\"http://www.idroidproject.org/wiki/";
-#| "Status\"> finding a bug or &ldquo;exploit&rdquo;</a> to make it possible "
-#| "to install a different system."
+#. type: Content of: <ul><li><p>
 msgid ""
 "The iThings are tyrant devices: they do not permit installing a different or "
 "modified operating system.  There is a port of Android to the iThings, but "

Index: proprietary/po/malware-microsoft.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/malware-microsoft.it-en.html 10 Oct 2015 14:59:27 -0000      
1.11
+++ proprietary/po/malware-microsoft.it-en.html 24 Oct 2015 21:59:03 -0000      
1.12
@@ -94,10 +94,10 @@
   repeatedly nagging many users to install Windows 10</a>.
   </p></li>
 
-  <li><p><a 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
+  <li><p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>
   Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
 
-  <li><p><a 
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>
+  <li><p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
   Microsoft cut off security fixes for Windows XP, except to some big users
   that pay exorbitantly.</a></p>
 
@@ -250,7 +250,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/10 14:59:27 $
+$Date: 2015/10/24 21:59:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/malware-microsoft.it.po      24 Oct 2015 21:46:02 -0000      
1.39
+++ proprietary/po/malware-microsoft.it.po      24 Oct 2015 21:59:03 -0000      
1.40
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 10:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -206,15 +205,7 @@
 "technology/2015/sep/11/microsoft-downloading-windows-1\"> sollecitando molti "
 "utenti ad installare Windows 10</a>."
 
-# | <a
-# | 
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>-]
-# | 
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\";>+}
-# | Microsoft informs the NSA of bugs in Windows before fixing them.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-";
-#| "can-any-company-ever-trust-microsoft-again/index.htm\"> Microsoft informs "
-#| "the NSA of bugs in Windows before fixing them.</a>"
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-";
 "company-ever-trust-microsoft-again-3569376/\"> Microsoft informs the NSA of "
@@ -224,17 +215,7 @@
 "company-ever-trust-microsoft-again-3569376/\">Microsoft informa l'NSA sui "
 "bug di Windows prima di sistemarli</a>."
 
-# | <a
-# | 
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm\";>-]
-# | 
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/\";>+}
-# | Microsoft cut off security fixes for Windows XP, except to some big users
-# | that pay exorbitantly.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://blogs.computerworlduk.com/open-enterprise/2014/04/";
-#| "windows-xp-end-of-an-era-end-of-an-error/index.htm\"> Microsoft cut off "
-#| "security fixes for Windows XP, except to some big users that pay "
-#| "exorbitantly.</a>"
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-";
 "end-of-an-era-end-of-an-error-3569489/\"> Microsoft cut off security fixes "

Index: proprietary/po/proprietary-back-doors.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-back-doors.it-en.html    26 Aug 2015 21:57:42 
-0000      1.4
+++ proprietary/po/proprietary-back-doors.it-en.html    24 Oct 2015 21:59:03 
-0000      1.5
@@ -10,6 +10,19 @@
 <p>Here are examples of demonstrated back doors in proprietary software.</p>
 
 <ul>
+<li><p>
+Mac OS X had an <a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+intentional local back door for 4 years</a>.
+</p></li>
+
+<li><p>
+Users report <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+Microsoft is forcing them to replace Windows 7 and 8 with
+all-spying Windows 10</a>.</p>
+
+<p>
+This seems to involve use of a back door in Windows 7 and 8.
+</p></li>
 
 <li>
 <p>Most mobile phones have a universal back door, which has been used to
@@ -246,7 +259,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/08/26 21:57:42 $
+$Date: 2015/10/24 21:59:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-back-doors.it.po 24 Oct 2015 21:46:02 -0000      
1.17
+++ proprietary/po/proprietary-back-doors.it.po 24 Oct 2015 21:59:03 -0000      
1.18
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 09:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-censorship.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/proprietary-censorship.it-en.html    10 Oct 2015 14:59:28 
-0000      1.3
+++ proprietary/po/proprietary-censorship.it-en.html    24 Oct 2015 21:59:03 
-0000      1.4
@@ -17,6 +17,21 @@
 
 <ul>
 <li><p>
+Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
+banned a program from the App Store</a> because its developers
+committed the enormity of disassembling some iThings.
+</p></li>
+
+<li><p>
+Apple rejected an app that displayed the locations of US drone
+assassinations, giving various excuses. Each time the developers
+fixed one &ldquo;problem&rdquo;, Apple complained about another.
+After the fifth rejection,
+Apple <a 
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/";>admitted
+it was censoring the app based on the subject matter</a>.
+</p></li>
+
+<li><p>
 As of 2015, Apple <a 
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights";>systematically
 bans apps that endorse abortion
 rights or would help women find abortions</a>.</p>
 
@@ -91,7 +106,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/10 14:59:28 $
+$Date: 2015/10/24 21:59:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-censorship.it.po 24 Oct 2015 21:46:02 -0000      
1.10
+++ proprietary/po/proprietary-censorship.it.po 24 Oct 2015 21:59:04 -0000      
1.11
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 14:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-insecurity.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-insecurity.it-en.html    10 Oct 2015 14:59:28 
-0000      1.8
+++ proprietary/po/proprietary-insecurity.it-en.html    24 Oct 2015 21:59:04 
-0000      1.9
@@ -20,31 +20,58 @@
 deliberately, and <em>the users are helpless to fix them</em>.</p>
 
 <ul>
+<li>
+<p>
+FitBit fitness trackers <a 
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/";>
+have a Bluetooth vulnerability</a> that allows
+attackers to send malware to the devices, which can subsequently spread
+to computers and other FitBit trackers that interact with them.
+</p>
+</li>
+
+<li>
+<p>
+&ldquo;Self-encrypting&rdquo; disk drives do the encryption with proprietary
+firmware so you can't trust it. Western Digital's &ldquo;My Passport&rdquo;
+drives
+<a 
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption";>have
 a back door</a>.
+</p>
+</li>
+
+<li>
+<p>
+Mac OS X had an
+<a 
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/";>
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p>
+</li>
 
 <li>
 <p>Security researchers discovered a
 <a 
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text";>
 vulnerability in diagnostic dongles used for vehicle tracking and
 insurance</a> that let them take remote control of a car or
-lorry using an SMS.</p>
+lorry using an SMS.
+</p>
 </li>
 
-  <li>
-    <p>
-      Crackers were able to
-      <a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>take
 remote control of the Jeep</a>
-      &ldquo;connected car&rdquo;.
-      <br/>They could track the car, start or stop the engine, and
-      activate or deactivate the brakes, and more.
-    </p>
-    <p>
-      I expect that Chrysler and the NSA can do this too.
-    </p>
-    <p>
-      If I ever own a car, and it contains a portable phone, I will
-      deactivate that.
-    </p>
-  </li>
+<li>
+<p>
+Crackers were able to
+<a 
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/";>take
 remote control of the Jeep</a>
+&ldquo;connected car&rdquo;.
+<br/>They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.
+</p>
+<p>
+I expect that Chrysler and the NSA can do this too.
+</p>
+<p>
+If I ever own a car, and it contains a portable phone, I will
+deactivate that.
+</p>
+</li>
   
 <li>
 <p>
@@ -233,7 +260,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/10 14:59:28 $
+$Date: 2015/10/24 21:59:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary-insecurity.it.po 24 Oct 2015 21:46:02 -0000      
1.38
+++ proprietary/po/proprietary-insecurity.it.po 24 Oct 2015 21:59:04 -0000      
1.39
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-19 13:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-sabotage.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-sabotage.it-en.html      13 Oct 2015 22:27:42 
-0000      1.6
+++ proprietary/po/proprietary-sabotage.it-en.html      24 Oct 2015 21:59:04 
-0000      1.7
@@ -13,25 +13,27 @@
 
 <ul>
 <li><p>
-Lenovo <a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
-has sabotaged the BIOS of the machines they sell</a> to make
-sure their
-spyware is present on every Windows system that is installed on them -
-even after formatting the disks.
-</p></li>
+Users report <a 
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+Microsoft is forcing them to replace Windows 7 and 8 with
+all-spying Windows 10</a>.</p>
 
-<li><p>
-Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
-repeatedly nagging many users to install Windows 10</a>.
+<p>
+This seems to involve use of a back door in Windows 7 and 8.
 </p></li>
 
 <li><p>
-<a 
href="https://www.techdirt.com/articles/20150812/11395231925/lenovo-busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml";>
-Lenovo stealthily installed crapware via BIOS</a> on Windows installs.
+<a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows 
installs.
 Note that the specific sabotage method Lenovo used did not affect
 GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
 clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.</p></li>
+puts in its own malware</a>.
+</p></li>
+
+<li><p>
+Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
+repeatedly nagging many users to install Windows 10</a>.
+</p></li>
 
 <li><p>Vizio
 <a href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html";>
@@ -50,7 +52,7 @@
 </p></li>
 
 <li><p>
-<a 
href="http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
+<a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>Microsoft
 informs the NSA of bugs in Windows before fixing them.</a>
 </p></li>
 
@@ -71,7 +73,7 @@
 </p></li>
 
 <li><p>
-<a 
href="http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm";>Microsoft
+<a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>Microsoft
 cut off security fixes for Windows XP, except to some big
     users that pay exorbitantly.</a></p>
 
@@ -216,7 +218,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/13 22:27:42 $
+$Date: 2015/10/24 21:59:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-sabotage.it.po   24 Oct 2015 21:46:03 -0000      
1.23
+++ proprietary/po/proprietary-sabotage.it.po   24 Oct 2015 21:59:04 -0000      
1.24
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 08:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -58,24 +57,7 @@
 msgid "This seems to involve use of a back door in Windows 7 and 8."
 msgstr "Sembra che questo sfrutti una backdoor in Windows 7 e 8."
 
-# | <a
-# | 
[-href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-busted-stealthily-installing-crapware-via-bios-fresh-windows-installs.shtml\";>-]
-# | 
{+href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\";>+}
-# | Lenovo stealthily installed crapware {+and spyware+} via BIOS</a> on
-# | Windows installs.  Note that the specific sabotage method Lenovo used did
-# | not affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not
-# | really clean since <a
-# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
-# | malware</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"https://www.techdirt.com/articles/20150812/11395231925/lenovo-";
-#| "busted-stealthily-installing-crapware-via-bios-fresh-windows-installs."
-#| "shtml\"> Lenovo stealthily installed crapware via BIOS</a> on Windows "
-#| "installs.  Note that the specific sabotage method Lenovo used did not "
-#| "affect GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not "
-#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
-#| "\">Microsoft puts in its own malware</a>."
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-";
 "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -137,15 +119,7 @@
 "deleted-music-ipods-rivals-steve-jobs\">ha cancellato dagli iPod la musica "
 "scaricata da negozi di musica digitale che fanno concorrenza a iTunes</a>."
 
-# | <a
-# | 
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>Microsoft-]
-# | 
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\";>Microsoft+}
-# | informs the NSA of bugs in Windows before fixing them.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://blogs.computerworlduk.com/open-enterprise/2013/06/how-";
-#| "can-any-company-ever-trust-microsoft-again/index.htm\">Microsoft informs "
-#| "the NSA of bugs in Windows before fixing them.</a>"
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-";
 "company-ever-trust-microsoft-again-3569376/\">Microsoft informs the NSA of "
@@ -187,17 +161,7 @@
 "of-hardware-hackers/\">sabotare chip alternativi compatibili</a> così da "
 "impedirne il funzionamento."
 
-# | <a
-# | 
[-href=\"http://blogs.computerworlduk.com/open-enterprise/2014/04/windows-xp-end-of-an-era-end-of-an-error/index.htm\";>Microsoft-]
-# | 
{+href=\"http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/\";>Microsoft+}
-# | cut off security fixes for Windows XP, except to some big users that pay
-# | exorbitantly.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://blogs.computerworlduk.com/open-enterprise/2014/04/";
-#| "windows-xp-end-of-an-era-end-of-an-error/index.htm\">Microsoft cut off "
-#| "security fixes for Windows XP, except to some big users that pay "
-#| "exorbitantly.</a>"
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-";
 "end-of-an-era-end-of-an-error-3569489/\">Microsoft cut off security fixes "

Index: proprietary/po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary-surveillance.it-en.html  10 Oct 2015 14:59:28 
-0000      1.10
+++ proprietary/po/proprietary-surveillance.it-en.html  24 Oct 2015 21:59:04 
-0000      1.11
@@ -29,6 +29,12 @@
     <li><a href="#SpywareInToys">Spyware in Toys</a></li>
       </ul>
     </li>
+    <li><a href="#SpywareAtLowLevel">Spyware at Low Level</a>
+      <ul>
+    <li><a href="#SpywareInBIOS">Spyware in BIOS</a></li>
+    <!-- <li><a href="#SpywareInFirmware">Spyware in Firmware</a></li> -->
+      </ul>
+    </li>
     <li><a href="#SpywareAtWork">Spyware at Work</a>
       <ul>
     <li><a href="#SpywareInSkype">Spyware in Skype</a></li>
@@ -319,6 +325,15 @@
 </div>
 
 <ul>
+  <li><p>According to Edward Snowden,
+      <a href="http://www.bbc.com/news/uk-34444233";>agencies can take over 
smartphones</a>
+      by sending hidden text messages which enable them to turn the phones
+      on and off, listen to the microphone, retrieve geo-location data from the
+      GPS, take photographs, read text messages, read call, location and web
+      browsing history, and read the contact list. This malware is designed to
+      disguise itself from investigation.</p>
+  </li>
+
   <li><p>Samsung phones come with
       <a 
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/";>apps
 that users can't delete</a>,
       and they send so much data that their transmission is a
@@ -448,6 +463,32 @@
 </ul>
 
 
+<!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
+
+<div class="big-section">
+  <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+  <span class="anchor-reference-id">(<a 
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+  <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+  <span class="anchor-reference-id">(<a 
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
+</div>
+
+<ul>
+<li><p>
+<a 
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html";>
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows 
installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also, a &ldquo;clean&rdquo; Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
 <!-- #SpywareAtWork -->
 <!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
@@ -733,7 +774,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/10 14:59:28 $
+$Date: 2015/10/24 21:59:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-surveillance.it.po       24 Oct 2015 21:46:03 
-0000      1.42
+++ proprietary/po/proprietary-surveillance.it.po       24 Oct 2015 21:59:04 
-0000      1.43
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 08:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -82,17 +81,11 @@
 msgid "<a href=\"#SpywareInToys\">Spyware in Toys</a>"
 msgstr "<a href=\"#SpywareInTVSets\">Spyware nei giocattoli</a>"
 
-# | <a [-href=\"#SpywareAtHome\">Spyware-]
-# | {+href=\"#SpywareAtLowLevel\">Spyware+} at [-Home</a>-] {+Low Level</a>+}
 #. type: Content of: <div><ul><li>
-#| msgid "<a href=\"#SpywareAtHome\">Spyware at Home</a>"
 msgid "<a href=\"#SpywareAtLowLevel\">Spyware at Low Level</a>"
 msgstr "<a href=\"#SpywareAtLowLevel\">Spyware a basso livello</a>"
 
-# | <a [-href=\"#SpywareInMacOS\">Spyware-]
-# | {+href=\"#SpywareInBIOS\">Spyware+} in [-MacOS</a>-] {+BIOS</a>+}
 #. type: Content of: <div><ul><li><ul><li>
-#| msgid "<a href=\"#SpywareInMacOS\">Spyware in MacOS</a>"
 msgid "<a href=\"#SpywareInBIOS\">Spyware in BIOS</a>"
 msgstr "<a href=\"#SpywareInBIOS\">Spyware nel BIOS</a>"
 
@@ -904,19 +897,11 @@
 "Barbie <a href=\"http://www.mirror.co.uk/news/technology-science/technology/";
 "wi-fi-spy-barbie-records-childrens-5177673\">spia bambini e adulti</a>."
 
-# | Spyware at [-Home-] {+Low Level+}
 #. type: Content of: <div><h3>
-#| msgid "Spyware at Home"
 msgid "Spyware at Low Level"
 msgstr "Spyware a basso livello"
 
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareAtHome\">#SpywareAtHome</a>)</span>-]
-# | {+href=\"#SpywareAtLowLevel\">#SpywareAtLowLevel</a>)</span>+}
-#. type: Content of: <div>
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareAtHome"
-#| "\">#SpywareAtHome</a>)</span>"
+#. type: Content of: <div>
 msgid ""
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareAtLowLevel"
 "\">#SpywareAtLowLevel</a>)</span>"
@@ -924,19 +909,11 @@
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareAtLowLevel"
 "\">#SpywareAtLowLevel</a>)</span>"
 
-# | Spyware in [-MacOS-] {+BIOS+}
 #. type: Content of: <div><h4>
-#| msgid "Spyware in MacOS"
 msgid "Spyware in BIOS"
 msgstr "Spyware nel BIOS"
 
-# | <span class=\"anchor-reference-id\">(<a
-# | [-href=\"#SpywareInMacOS\">#SpywareInMacOS</a>)</span>-]
-# | {+href=\"#SpywareInBIOS\">#SpywareInBIOS</a>)</span>+}
-#. type: Content of: <div>
-#| msgid ""
-#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMacOS"
-#| "\">#SpywareInMacOS</a>)</span>"
+#. type: Content of: <div>
 msgid ""
 "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInBIOS"
 "\">#SpywareInBIOS</a>)</span>"

Index: proprietary/po/proprietary-tyrants.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary/po/proprietary-tyrants.it-en.html       18 Apr 2015 21:59:59 
-0000      1.2
+++ proprietary/po/proprietary-tyrants.it-en.html       24 Oct 2015 21:59:04 
-0000      1.3
@@ -25,7 +25,7 @@
 <li>
 <p>The Apple iThings are tyrant devices.  There is a port of Android
 to the iThings, but installing it
-requires <a href="http://www.idroidproject.org/wiki/Status";> finding a
+requires <a 
href="https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status";>
 finding a
 bug or &ldquo;exploit&rdquo;</a> to make it possible to install a
 different system.
 </p>
@@ -89,7 +89,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -107,14 +107,14 @@
 <p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/04/18 21:59:59 $
+$Date: 2015/10/24 21:59:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tyrants.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-tyrants.it.po    24 Oct 2015 21:46:03 -0000      
1.6
+++ proprietary/po/proprietary-tyrants.it.po    24 Oct 2015 21:59:05 -0000      
1.7
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 18:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -55,18 +54,7 @@
 "Apple <a href=\"http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/";
 "\">non permette agli utenti di installare versioni precedenti di iOS</a>."
 
-# | The Apple iThings are tyrant devices.  There is a port of Android to the
-# | iThings, but installing it requires <a
-# | [-href=\"http://www.idroidproject.org/wiki/Status\";>-]
-# | 
{+href=\"https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status\";>+}
-# | finding a bug or &ldquo;exploit&rdquo;</a> to make it possible to install
-# | a different system.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "The Apple iThings are tyrant devices.  There is a port of Android to the "
-#| "iThings, but installing it requires <a href=\"http://www.idroidproject.";
-#| "org/wiki/Status\"> finding a bug or &ldquo;exploit&rdquo;</a> to make it "
-#| "possible to install a different system."
+#. type: Content of: <ul><li><p>
 msgid ""
 "The Apple iThings are tyrant devices.  There is a port of Android to the "
 "iThings, but installing it requires <a href=\"https://web.archive.org/";
@@ -162,12 +150,7 @@
 msgid "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2014, 2015 Free Software Foundation, Inc."
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"

Index: server/sitemap.it.html
===================================================================
RCS file: /web/www/www/server/sitemap.it.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- server/sitemap.it.html      23 Oct 2015 17:03:16 -0000      1.36
+++ server/sitemap.it.html      24 Oct 2015 21:59:05 -0000      1.37
@@ -828,8 +828,8 @@
   <dt><a href="/licenses/200104_seminar.html">200104_seminar.html</a></dt>
   <dd>FSF Seminar: Detailed Study and Analysis of GPL and LGPL</dd>
   <dt><a href="/licenses/210104_seminar.html">210104_seminar.html</a></dt>
-  <dd>FSF Seminar: GPL Compliance Case Studies and Legal Ethics in Free 
Software
-Licensing</dd>
+  <dd>Seminario della FSF: Casi di studio sul rispetto della GPL ed etica 
legale
+nelle licenze di software libero</dd>
   <dt><a 
href="/licenses/agpl-3.0-standalone.html">agpl-3.0-standalone.html</a></dt>
   <dd>GNU Affero General Public License</dd>
   <dt><a href="/licenses/agpl-3.0.html">agpl-3.0.html</a></dt>
@@ -1789,7 +1789,7 @@
   <dt><a href="/software/reliability.html">reliability.html</a></dt>
   <dd>Il software libero &egrave; pi&ugrave; affidabile!</dd>
   <dt><a href="/software/repo-criteria.html">repo-criteria.html</a></dt>
-  <dd>GNU ethical repository criteria</dd>
+  <dd>Criteri etici per i repository di GNU</dd>
   <dt><a href="/software/year2000-list.html">year2000-list.html</a></dt>
   <dd>List GNU Software and Year 2000 Problems</dd>
   <dt><a href="/software/year2000.html">year2000.html</a></dt>
@@ -1993,7 +1993,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/10/23 17:03:16 $
+$Date: 2015/10/24 21:59:05 $
 
 <!-- timestamp end -->
 </p>

Index: server/po/sitemap.it-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.it-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- server/po/sitemap.it-en.html        10 Oct 2015 14:59:29 -0000      1.17
+++ server/po/sitemap.it-en.html        24 Oct 2015 21:59:05 -0000      1.18
@@ -826,7 +826,8 @@
   <dt><a href="/licenses/200104_seminar.html">200104_seminar.html</a></dt>
   <dd>FSF Seminar: Detailed Study and Analysis of GPL and LGPL</dd>
   <dt><a href="/licenses/210104_seminar.html">210104_seminar.html</a></dt>
-  <dd>FSF Seminar: Case Study and Legal Ethics</dd>
+  <dd>FSF Seminar: GPL
+Compliance Case Studies and Legal Ethics in Free Software Licensing</dd>
   <dt><a 
href="/licenses/agpl-3.0-standalone.html">agpl-3.0-standalone.html</a></dt>
   <dd>GNU Affero General Public License</dd>
   <dt><a href="/licenses/agpl-3.0.html">agpl-3.0.html</a></dt>
@@ -1686,6 +1687,8 @@
   <dd>Recent Software Releases</dd>
   <dt><a href="/software/reliability.html">reliability.html</a></dt>
   <dd>Free Software is More Reliable!</dd>
+  <dt><a href="/software/repo-criteria.html">repo-criteria.html</a></dt>
+  <dd>GNU ethical repository criteria</dd>
   <dt><a href="/software/year2000-list.html">year2000-list.html</a></dt>
   <dd>List GNU Software and Year 2000 Problems</dd>
   <dt><a href="/software/year2000.html">year2000.html</a></dt>
@@ -1876,7 +1879,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/10 14:59:29 $
+$Date: 2015/10/24 21:59:05 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.it.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.it.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- server/po/sitemap.it.po     24 Oct 2015 21:46:01 -0000      1.51
+++ server/po/sitemap.it.po     24 Oct 2015 21:59:05 -0000      1.52
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-17 17:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: software/software.it.html
===================================================================
RCS file: /web/www/www/software/software.it.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- software/software.it.html   13 Mar 2015 23:26:59 -0000      1.74
+++ software/software.it.html   24 Oct 2015 21:59:05 -0000      1.75
@@ -135,7 +135,10 @@
 
 <p>Se state scrivendo un nuovo programma e vorreste farlo diventare un
 pacchetto GNU ufficiale, utilizzate il <a
-href="/help/evaluation.html">modulo di richiesta</a> apposito.</p>
+href="/help/evaluation.html">modulo di richiesta</a> apposito. Quando
+scegliete il servizio di hosting che volete usare per il vostro progetto,
+non dimenticate <a href="/software/repo-criteria.html">i nostri criteri
+etici</a>.</p>
 
 <p>Se siete i responsabili o gli sviluppatori di un pacchetto GNU, recente o
 meno, troverete utile il nostro breve <a
@@ -266,7 +269,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -283,9 +286,8 @@
 <p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/deed.it";>Creative
-Commons Attribuzione - Non opere derivate 3.0 Stati Uniti</a> (CC BY-ND
-3.0).</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
+Attribuzione - Non opere derivate 4.0 internazionale</a> (CC BY-ND 4.0).</p>
 
 <!--#include virtual="/server/bottom-notes.it.html" -->
 <div class="translators-credits">
@@ -297,7 +299,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2015/03/13 23:26:59 $
+$Date: 2015/10/24 21:59:05 $
 
 <!-- timestamp end -->
 </p>

Index: software/po/software.it-en.html
===================================================================
RCS file: /web/www/www/software/po/software.it-en.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- software/po/software.it-en.html     13 Mar 2015 23:26:59 -0000      1.34
+++ software/po/software.it-en.html     24 Oct 2015 21:59:06 -0000      1.35
@@ -128,10 +128,13 @@
 packages and helping with development, see the <a
 href="/help/help.html">GNU help wanted</a> page.</p>
 
-<p>If you're writing a new program and would like to make your software
-an official GNU package, see the <a
-href="/help/evaluation.html">evaluation information and submission
-form</a>.</p>
+<p>If you're writing a new program and would like to make your
+  software an official GNU package, see
+  the <a href="/help/evaluation.html">evaluation information and
+  submission form</a>. Refer to
+  the <a href="/software/repo-criteria.html">ethical repository
+  criteria</a> for guidance choosing a hosting service for your
+  project.</p>
 
 <p>If you're maintaining or developing a GNU package, whether newly
 dubbed or of long standing, this short list of <a
@@ -296,7 +299,7 @@
 
 <!-- Regarding copyright, in general, standalone pages (as opposed to
      files generated as part of manuals) on the GNU web server should
-     be under CC BY-ND 3.0 US.  Please do NOT change or remove this
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
      without talking with the webmasters or licensing team first.
      Please make sure the copyright date is consistent with the
      document.  For web pages, it is ok to list just the latest year the
@@ -314,14 +317,14 @@
 <p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
-href="http://creativecommons.org/licenses/by-nd/3.0/us/";>Creative
-Commons Attribution-NoDerivs 3.0 United States License</a>.</p>
+href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
 
 <!--#include virtual="/server/bottom-notes.html" -->
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/03/13 23:26:59 $
+$Date: 2015/10/24 21:59:06 $
 <!-- timestamp end -->
 </p>
 </div>

Index: software/po/software.it.po
===================================================================
RCS file: /web/www/www/software/po/software.it.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- software/po/software.it.po  24 Oct 2015 21:46:01 -0000      1.162
+++ software/po/software.it.po  24 Oct 2015 21:59:06 -0000      1.163
@@ -13,7 +13,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2015-10-16 17:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 # type: Content of: <title>
@@ -283,16 +282,7 @@
 "aiutare nello sviluppo, potete dare uno sguardo alla pagina delle <a href=\"/"
 "help/help.html\">richieste di aiuto</a>."
 
-# | If you're writing a new program and would like to make your software an
-# | official GNU package, see the <a href=\"/help/evaluation.html\">evaluation
-# | information and submission form</a>. {+Refer to the <a
-# | href=\"/software/repo-criteria.html\">ethical repository criteria</a> for
-# | guidance choosing a hosting service for your project.+}
-#. type: Content of: <p>
-#| msgid ""
-#| "If you're writing a new program and would like to make your software an "
-#| "official GNU package, see the <a href=\"/help/evaluation.html"
-#| "\">evaluation information and submission form</a>."
+#. type: Content of: <p>
 msgid ""
 "If you're writing a new program and would like to make your software an "
 "official GNU package, see the <a href=\"/help/evaluation.html\">evaluation "
@@ -515,12 +505,7 @@
 msgid "Copyright &copy; 2015 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2015 Free Software Foundation, Inc."
 
-# || No change detected.  The change might only be in amounts of spaces.
 #. type: Content of: <div><p>
-#| msgid ""
-#| "This page is licensed under a <a rel=\"license\" href=\"http://";
-#| "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
-#| "NoDerivatives 4.0 International License</a>."
 msgid ""
 "This page is licensed under a <a rel=\"license\" href=\"http://";
 "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]