www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www proprietary/malware-apple.fr.html proprieta...


From: GNUN
Subject: www proprietary/malware-apple.fr.html proprieta...
Date: Tue, 12 Jan 2016 12:15:00 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/01/12 12:15:00

Modified files:
        proprietary    : malware-apple.fr.html malware-microsoft.fr.html 
                         proprietary-back-doors.fr.html 
                         proprietary-surveillance.fr.html 
        proprietary/po : malware-apple.fr-en.html 
                         malware-microsoft.fr-en.html 
                         proprietary-back-doors.fr-en.html 
                         proprietary-surveillance.fr-en.html 
        server         : sitemap.fr.html 
        server/po      : sitemap.fr-en.html sitemap.fr.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.fr.html?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr-en.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr.po?cvsroot=www&r1=1.332&r2=1.333

Patches:
Index: proprietary/malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/malware-apple.fr.html   1 Dec 2015 20:27:54 -0000       1.13
+++ proprietary/malware-apple.fr.html   12 Jan 2016 12:14:48 -0000      1.14
@@ -270,6 +270,11 @@
 <h3 id="drm">DRM</h3>
 <ul>
   <li><p><a
+href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017";>
+Apple utilise un logiciel à DRM pour empêcher les gens de charger un iTruc
+avec un cable USB générique</a>.</p></li>
+  
+  <li><p><a
 
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm";>
 Le <abbr title="Digital Restrictions Management">DRM</abbr> (dispositif de
 gestion numérique des restrictions) de MacOS</a>. Cet article porte
@@ -395,7 +400,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -413,7 +418,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/12/01 20:27:54 $
+$Date: 2016/01/12 12:14:48 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/malware-microsoft.fr.html       17 Oct 2015 12:28:41 -0000      
1.11
+++ proprietary/malware-microsoft.fr.html       12 Jan 2016 12:14:48 -0000      
1.12
@@ -72,6 +72,11 @@
 
 <h3 id="back-doors">Portes dérobées</h3>
 <ul>
+  <li><p><a
+href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+Microsoft a déjà implémenté une porte dérobée dans le chiffrement des
+disques</a>.</p></li>
+
   <li><p>Microsoft Windows a une porte dérobée universelle qui permet <a
 
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263";>d'imposer
 un changement aux utilisateurs, quel qu'il soit</a>.</p>
@@ -290,7 +295,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -308,7 +313,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/17 12:28:41 $
+$Date: 2016/01/12 12:14:48 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/proprietary-back-doors.fr.html  22 Dec 2015 16:58:22 -0000      
1.11
+++ proprietary/proprietary-back-doors.fr.html  12 Jan 2016 12:14:49 -0000      
1.12
@@ -17,7 +17,29 @@
 <p>Voici des exemples de portes dérobées documentées dans des logiciels
 privateurs.</p>
 
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <ul>
+  <li><p><a
+href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+Microsoft a déjà mis une porte dérobée dans le chiffrement des 
disques</a>.</p></li>
+
+  <li><p>Les sal&hellip;applis <a
+href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+rassemblent une grande variété de données sur leurs utilisateurs, ainsi que
+sur les amis et associés de leurs utilisateurs</a>.</p>
+
+      <p>Pire, cela se fait au moyen de réseaux publicitaires qui combinent 
les
+données rassemblées par diverses sal&hellip;applis et divers sites créés 
par
+différentes sociétés.</p>
+
+      <p>Ils utilisent ces données pour inciter les gens à faire des achats 
et font
+la chasse aux « baleines » qu'ils peuvent amener à faire de grosses
+dépenses. Ils utilisent aussi une porte dérobée afin de manipuler le
+déroulement du jeu pour des joueurs particuliers.</p>
+
+      <p>Bien que l'article décrive des jeux gratuits, les jeux payants 
peuvent
+utiliser la même tactique.</p>    
+  </li>
   <li>
     <p>Les ordinateurs Dell vendus avec Windows avaient un certificat racine 
bidon
 qui <a
@@ -322,7 +344,7 @@
 href="/server/standards/README.translations.html">guide de traduction</a>.</p>
 </div>
 
-<p>Copyright &copy; 2014-2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2016 Free Software Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -340,7 +362,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/12/22 16:58:22 $
+$Date: 2016/01/12 12:14:49 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/proprietary-surveillance.fr.html        12 Dec 2015 13:34:26 
-0000      1.27
+++ proprietary/proprietary-surveillance.fr.html        12 Jan 2016 12:14:51 
-0000      1.28
@@ -59,12 +59,14 @@
     <li><a href="#SpywareInTVSets">Téléviseurs</a></li>
       </ul>
     </li>
+    <li><a href="#SpywareAtPlay">Espions dans les jeux</a></li>
     <li><a href="#SpywareOnTheWeb">Espions sur le web</a>
       <ul>
         <li><a href="#SpywareInChrome">Chrome</a></li>
         <li><a href="#SpywareInFlash">Flash</a></li>
       </ul>
     </li>
+    <li><a href="#SpywareInChrome">Espions partout</a></li> 
   </ul>
 </div>
 
@@ -112,6 +114,13 @@
 </div>
 
 <ul>
+  <li><p><a
+href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+Microsoft a déjà mis une porte dérobée dans le chiffrement des 
disques</a>.</p></li>
+
+  <li>Il semble que <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
+Windows 10 rapporte à Microsoft quelles applications sont en 
service</a>.</li>
   <li><p>Une mise à jour régressive de Windows 10 a supprimé des 
applications servant
 à détecter la surveillance. Puis une autre a inséré un programme
 d'espionnage tous azimuths. Les utilisateurs s'en sont rendus compte, alors
@@ -776,8 +785,44 @@
   </li>
 </ul>
 
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+  <h3 id="SpywareAtPlay">Espions dans les jeux</h3>
+  <span class="anchor-reference-id">(<a
+href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+  <li><p>De nombreuses <a
+href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/";>
+consoles de jeu espionnent leurs utilisateurs et envoient sur
+Internet</a>&hellip; jusqu'à leur poids.</p>
+
+      <p>Une console de jeu est un ordinateur. Vous ne pouvez pas faire 
confiance à
+un ordinateur équipé d'un système d'exploitation non libre.</p>
+  </li>
+
+  <li><p>Les sal&hellip;applis <a
+href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+rassemblent une grande variété de données sur leurs utilisateurs, ainsi que
+sur les amis et associés de leurs utilisateurs</a>.</p>
+
+      <p>Pire, cela se fait au moyen de réseaux publicitaires qui combinent 
les
+données rassemblées par diverses sal&hellip;applis et divers sites créés 
par
+différentes sociétés.</p>
+
+      <p>Ils utilisent ces données pour inciter les gens à faire des achats 
et font
+la chasse aux « baleines » qu'ils peuvent amener à faire de grosses
+dépenses. Ils utilisent aussi une porte dérobée afin de manipuler le
+déroulement du jeu pour des joueurs particuliers.</p>
+
+      <p>Bien que cet article décrive des jeux gratuits, les jeux payants 
pouvent
+utiliser la même tactique.</p>    
+  </li>
+</ul>
+
 <!-- #SpywareOnTheWeb -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-section">
   <h3 id="SpywareOnTheWeb">Espions sur le web</h3>
   <span class="anchor-reference-id">(<a
@@ -802,7 +847,7 @@
   <li><p>Les pages qui contiennent des boutons <cite>Like</cite> <a
 
href="http://www.smh.com.au/technology/technology-news/facebooks-privacy-lie-aussie-exposes-tracking-as-new-patent-uncovered-20111004-1l61i.html";>
 permettent à Facebook de pister les visiteurs de ces pages</a>, même ceux
-qui n'ont pas de compte Facebook. </p>
+qui n'ont pas de compte Facebook.</p>
   </li>
 
   <li><p>De nombreux sites dénoncent leurs visiteurs aux réseaux 
publicitaires qui
@@ -832,6 +877,7 @@
   </li>
 </ul>
 
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-subsection">
   <h4 id="SpywareInChrome">Chrome</h4>
   <span class="anchor-reference-id">(<a
@@ -869,6 +915,22 @@
 <p>Une autre méthode de profilage fait usage de <a
 href="/philosophy/javascript-trap.html">code JavaScript</a>. </p>
 
+<!-- #SpywareEverywhere -->
+<div class="big-section">
+  <h3 id="SpywareEverywhere">Espions partout</h3>
+  <span class="anchor-reference-id">(<a
+href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+  <li><p><a
+href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping";>
+Les appareils d'Intel seront capables d'écouter la voix en permanence, même
+« à l'arrêt »</a>.</p>
+  </li>
+</ul>
+
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -931,7 +993,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -949,7 +1011,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/12/12 13:34:26 $
+$Date: 2016/01/12 12:14:51 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/malware-apple.fr-en.html     1 Dec 2015 20:27:54 -0000       
1.12
+++ proprietary/po/malware-apple.fr-en.html     12 Jan 2016 12:14:53 -0000      
1.13
@@ -236,6 +236,11 @@
 <h3 id="drm">Apple DRM</h3>
 <ul>
   <li><p><a
+  
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017";>
+  Apple uses DRM software to prevent people from charging an iThing with a 
+  generic USB cable</a>.</p></li>
+  
+  <li><p><a
   
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm";>
   DRM (digital restrictions mechanisms) in MacOS</a>. This article
   focuses on the fact that a new model of Macbook introduced a requirement
@@ -344,7 +349,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -354,7 +359,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/12/01 20:27:54 $
+$Date: 2016/01/12 12:14:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/malware-microsoft.fr-en.html 17 Oct 2015 12:28:42 -0000      
1.11
+++ proprietary/po/malware-microsoft.fr-en.html 12 Jan 2016 12:14:54 -0000      
1.12
@@ -60,6 +60,9 @@
 
 <h3 id="back-doors">Microsoft Back Doors</h3>
 <ul>
+  <li><p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+  Microsoft has already backdoored its disk encryption</a>.</p></li>
+
   <li><p>Microsoft Windows has a universal back door through which <a 
href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263";>
   any change whatsoever can be imposed on the users</a>.</p>
 
@@ -240,7 +243,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -250,7 +253,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/17 12:28:42 $
+$Date: 2016/01/12 12:14:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/proprietary-back-doors.fr-en.html    22 Dec 2015 16:58:23 
-0000      1.11
+++ proprietary/po/proprietary-back-doors.fr-en.html    12 Jan 2016 12:14:55 
-0000      1.12
@@ -9,7 +9,27 @@
 
 <p>Here are examples of demonstrated back doors in proprietary software.</p>
 
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <ul>
+  <li><p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+      Microsoft has already backdoored its disk encryption</a>.</p></li>
+
+  <li><p>Modern gratis game cr&hellip;apps
+      <a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+      collect a wide range of data about their users and their users' 
+      friends and associates</a>.</p>
+
+      <p>Even nastier, they do it through ad networks that merge the data
+      collected by various cr&hellip;apps and sites made by different 
+      companies.</p>
+
+      <p>They use this data to manipulate people to buy things, and hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
+      also use a back door to manipulate the game play for specific 
players.</p>
+
+      <p>While the article describes gratis games, games that cost money 
+      can use the same tactics.</p>    
+  </li>
   <li>
     <p>Dell computers, shipped with Windows, had a bogus root
       certificate that
@@ -281,7 +301,7 @@
 of this article.</p>
 </div>
 
-<p>Copyright &copy; 2014-2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014-2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -291,7 +311,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/12/22 16:58:23 $
+$Date: 2016/01/12 12:14:55 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-surveillance.fr-en.html  12 Dec 2015 13:34:27 
-0000      1.24
+++ proprietary/po/proprietary-surveillance.fr-en.html  12 Jan 2016 12:14:56 
-0000      1.25
@@ -52,12 +52,14 @@
     <li><a href="#SpywareInTVSets">Spyware in TV Sets</a></li>
       </ul>
     </li>
+    <li><a href="#SpywareAtPlay">Spyware at Play</a></li>
     <li><a href="#SpywareOnTheWeb">Spyware on the Web</a>
       <ul>
         <li><a href="#SpywareInChrome">Spyware in Chrome</a></li>
         <li><a href="#SpywareInFlash">Spyware in Flash</a></li>
       </ul>
     </li>
+    <li><a href="#SpywareEverywhere">Spyware Everywhere</a></li> 
   </ul>
 </div><!-- /class="toc" -->
 
@@ -107,6 +109,13 @@
 </div>
 
 <ul>
+  <li><p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
+      Microsoft has already backdoored its disk encryption</a>.</p></li>
+
+  <li>It appears
+      <a 
href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
+      Windows 10 sends data to Microsoft about what applications are 
+      running</a>.</li>
   <li><p>A downgrade to Windows 10 deleted surveillance-detection
       applications.  Then another downgrade inserted a general spying
       program.  Users noticed this and complained, so Microsoft
@@ -707,10 +716,42 @@
   </li>
 </ul>
 
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+  <h3 id="SpywareAtPlay">Spyware at Play</h3>
+  <span class="anchor-reference-id">(<a 
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+  <li><p>Many 
+      <a 
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/";>
+      video game consoles snoop on their users and report to the 
+      internet</a>&mdash; even what their users weigh.</p>
+
+      <p>A game console is a computer, and you can't trust a computer with 
+      a nonfree operating system.</p>
+  </li>
+
+  <li><p>Modern gratis game cr&hellip;apps
+      <a 
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/";>
+      collect a wide range of data about their users and their users' 
+      friends and associates</a>.</p>
+
+      <p>Even nastier, they do it through ad networks that merge the data
+      collected by various cr&hellip;apps and sites made by different 
+      companies.</p>
+
+      <p>They use this data to manipulate people to buy things, and hunt 
+      for &ldquo;whales&rdquo; who can be led to spend a lot of money. They 
+      also use a back door to manipulate the game play for specific 
players.</p>
 
+      <p>While the article describes gratis games, games that cost money 
+      can use the same tactics.</p>    
+  </li>
+</ul>
 
 <!-- #SpywareOnTheWeb -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 
 <div class="big-section">
   <h3 id="SpywareOnTheWeb">Spyware on the Web</h3>
@@ -760,6 +801,7 @@
   </li>
 </ul>
 
+<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <div class="big-subsection">
   <h4 id="SpywareInChrome">Spyware in Chrome</h4>
   <span class="anchor-reference-id">(<a 
href="#SpywareInChrome">#SpywareInChrome</a>)</span>
@@ -792,6 +834,20 @@
 <p><a href="/philosophy/javascript-trap.html">Javascript code</a>
 is another method of &ldquo;fingerprinting&rdquo; devices.</p>
 
+
+<!-- #SpywareEverywhere -->
+<div class="big-section">
+  <h3 id="SpywareEverywhere">Spyware Everywhere</h3>
+  <span class="anchor-reference-id">(<a 
href="#SpywareEverywhere">#SpywareEverywhere</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+  <li><p><a 
href="http://www.pocket-lint.com/news/134954-cortana-is-always-listening-with-new-wake-on-voice-tech-even-when-windows-10-is-sleeping";>
+      Intel devices will be able to listen for speech all the time, even when 
&ldquo;off.&rdquo;</a></p>
+  </li>
+</ul>
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -839,7 +895,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -849,7 +905,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/12/12 13:34:27 $
+$Date: 2016/01/12 12:14:56 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/sitemap.fr.html
===================================================================
RCS file: /web/www/www/server/sitemap.fr.html,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- server/sitemap.fr.html      10 Jan 2016 18:03:02 -0000      1.282
+++ server/sitemap.fr.html      12 Jan 2016 12:14:57 -0000      1.283
@@ -1922,7 +1922,7 @@
   <dd>Thank GNUs, 2014</dd>
   <dt><a href="/thankgnus/2015supporters.html">2015supporters.html</a></dt>
   <dd>Thank GNUs, 2015</dd>
-  <dt><a href="/thankgnus/2016supporters.html">2016supporters.html</a></dt>
+  <dt><a href="/thankgnus/2006supporters.html">2016supporters.html</a></dt>
   <dd>Thank GNUs, 2016</dd>
   <dt><a href="/thankgnus/thankgnus.old.html">thankgnus.old.html</a></dt>
   <dd>Old Thanks GNUs</dd>
@@ -2044,7 +2044,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/01/10 18:03:02 $
+$Date: 2016/01/12 12:14:57 $
 
 <!-- timestamp end -->
 </p>

Index: server/po/sitemap.fr-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr-en.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- server/po/sitemap.fr-en.html        1 Jan 2016 18:02:27 -0000       1.174
+++ server/po/sitemap.fr-en.html        12 Jan 2016 12:14:59 -0000      1.175
@@ -1789,6 +1789,8 @@
   <dd>Thank GNUs, 2014</dd>
   <dt><a href="/thankgnus/2015supporters.html">2015supporters.html</a></dt>
   <dd>Thank GNUs, 2015</dd>
+  <dt><a href="/thankgnus/2016supporters.html">2016supporters.html</a></dt>
+  <dd>Thank GNUs, 2016</dd>
   <dt><a href="/thankgnus/thankgnus.old.html">thankgnus.old.html</a></dt>
   <dd>Old Thanks GNUs</dd>
 </dl>
@@ -1895,7 +1897,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/01/01 18:02:27 $
+$Date: 2016/01/12 12:14:59 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.fr.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- server/po/sitemap.fr.po     12 Jan 2016 11:34:33 -0000      1.332
+++ server/po/sitemap.fr.po     12 Jan 2016 12:14:59 -0000      1.333
@@ -4814,8 +4814,8 @@
 msgid ""
 "FSF's Position on W3 Consortium &ldquo;Royalty-Free&rdquo; Patent Policy"
 msgstr ""
-"Position de la FSF sur la politique de brevets « libres de droits » "
-"<cite>[royalty-free]</cite> du W3 Consortium"
+"Position de la FSF sur la politique de brevets « libres de droits » 
<cite>"
+"[royalty-free]</cite> du W3 Consortium"
 
 #. type: Content of: <div><dl><dd><dl><dt>
 msgid "<a href=\"/philosophy/wassenaar.html\">wassenaar.html</a>"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]