www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.fr.html malware-k...


From: GNUN
Subject: www/proprietary malware-apple.fr.html malware-k...
Date: Tue, 03 May 2016 19:33:53 +0000

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/05/03 19:33:53

Modified files:
        proprietary    : malware-apple.fr.html 
                         malware-kindle-swindle.fr.html 
                         malware-mobiles.fr.html 
                         proprietary-back-doors.fr.html 
                         proprietary-censorship.fr.html 
                         proprietary-deception.fr.html 
                         proprietary-drm.fr.html 
                         proprietary-insecurity.fr.html 
                         proprietary-jails.fr.html 
                         proprietary-sabotage.fr.html 
                         proprietary-surveillance.fr.html 
                         proprietary-tyrants.fr.html 
        proprietary/po : malware-apple.fr-en.html 
                         malware-kindle-swindle.fr-en.html 
                         malware-mobiles.fr-en.html 
                         proprietary-back-doors.fr-en.html 
                         proprietary-censorship.fr-en.html 
                         proprietary-deception.fr-en.html 
                         proprietary-drm.fr-en.html 
                         proprietary-insecurity.fr-en.html 
                         proprietary-jails.fr-en.html 
                         proprietary-sabotage.fr-en.html 
                         proprietary-surveillance.fr-en.html 
                         proprietary-tyrants.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.fr.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.fr.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-kindle-swindle.fr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.fr-en.html?cvsroot=www&r1=1.3&r2=1.4

Patches:
Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-apple.fr.html       23 Apr 2016 14:58:44 -0000      1.20
+++ malware-apple.fr.html       3 May 2016 19:33:50 -0000       1.21
@@ -19,7 +19,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Malveillance des systèmes d'exploitation Apple</h2>
 
-<p><a href="/philosophy/proprietary/">Autres exemples de malveillance dans le
+<p><a href="/proprietary/proprietary/">Autres exemples de malveillance dans le
 logiciel privateur</a></p>
 
 <div class="highlight-para">
@@ -196,7 +196,7 @@
 Une « mise à niveau » du micrologiciel d'Apple a rendu inutilisables les
 iPhones qui avaient été déverrouillés.</a> La « mise à niveau » a 
également
 désactivé les applications non validées par la <a
-href="/philosophy/proprietary-jails.html">censure d'Apple</a>. Tout ceci
+href="/proprietary/proprietary-jails.html">censure d'Apple</a>. Tout ceci
 était apparemment intentionnel.</p>
   </li>
 
@@ -463,7 +463,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/04/23 14:58:44 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: malware-kindle-swindle.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-kindle-swindle.fr.html      6 Jul 2015 10:28:18 -0000       1.2
+++ malware-kindle-swindle.fr.html      3 May 2016 19:33:50 -0000       1.3
@@ -18,7 +18,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Malveillance du Kindle Swindle</h2>
 
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
 le logiciel privateur</a>
 
 <p>Nous appelons ce produit « <a
@@ -168,7 +168,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -186,7 +186,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/07/06 10:28:18 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-mobiles.fr.html     20 Mar 2016 09:35:58 -0000      1.5
+++ malware-mobiles.fr.html     3 May 2016 19:33:50 -0000       1.6
@@ -18,7 +18,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Malveillance des appareils mobiles</h2>
 
-<p><a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<p><a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
 le logiciel privateur</a></p>
 
 <div class="highlight-para">
@@ -43,7 +43,7 @@
 </div>
 
 <p>Voici des exemples de logiciels malveillants dans les appareils
-mobiles. Consultez également <a href="/philosophy/malware-apple.html">la
+mobiles. Consultez également <a href="/proprietary/malware-apple.html">la
 page sur la malveillance d'Apple</a> qui concerne les fonctionnalités
 malfaisantes spécifiques aux iTrucs.</p>
 
@@ -78,8 +78,9 @@
 <h3 id="back-doors">Portes dérobées</h3>
 <ul>
   <li><p>La porte dérobée universelle des téléphones portables <a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>
-est utilisée pour écouter leur micro</a>.</p></li>
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>est
+utilisée pour écouter leur micro</a>.</p>
+  </li>
 
   <li><p>La plupart des téléphones mobiles ont une porte dérobée 
universelle qui a
 été utilisée pour <a
@@ -94,9 +95,8 @@
 données stockées dans l'appareil.</p>
   </li>
 
-  <li><p><a 
href="/philosophy/proprietary/proprietary-back-doors.html#samsung"> La
-porte dérobée de Samsung</a> permet l'accès à n'importe quel fichier du
-système.</p>
+  <li><p><a href="/proprietary/proprietary-back-doors.html#samsung"> La porte 
dérobée
+de Samsung</a> permet l'accès à n'importe quel fichier du système.</p>
   </li>
 
   <li>
@@ -106,13 +106,12 @@
 distance</a> (elle est dans un programme appelé GTalkService).
   </p>
 
-  <p>
-  Via GTalkService, Google peut aussi <a
-href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>
-installer des applis, de force et à distance</a> (ce service semble avoir
-fusionné avec Google Play depuis la parution de cet article).  Au final,
-cela donne une porte dérobée universelle.
-  </p>
+<p>Via GTalkService, Google peut aussi <a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="sur la Wayback Machine (archivé le 20 mai 2015)"> installer des
+applis, de force et à distance</a> (ce service semble avoir fusionné avec
+Google Play depuis la parution de cet article).  Au final, cela donne une
+porte dérobée universelle. </p>
 
   <p>
   Bien que <em>l'exercice</em> de ce pouvoir par Google n'ait pas été
@@ -239,10 +238,10 @@
 
 <h3 id="jails">Prisons</h3>
 <ul>
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";> 
Les
+  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>Les
 appareils mobiles livrés avec Windows 8 sont des tyrans</a>. <a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-Windows 8 est une prison pour les « appareils mobiles »</a>.</p>
+href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>WindowsÂ
 8
+est une prison pour les « appareils mobiles »</a>.</p>
   </li>
 </ul>
 
@@ -334,7 +333,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/03/20 09:35:58 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-back-doors.fr.html      25 Jan 2016 15:59:58 -0000      1.15
+++ proprietary-back-doors.fr.html      3 May 2016 19:33:50 -0000       1.16
@@ -11,7 +11,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Portes dérobées du logiciel privateur</h2>
 
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
 le logiciel privateur</a>
 
 <p>Voici des exemples de portes dérobées documentées dans des logiciels
@@ -20,8 +20,9 @@
 <!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <ul>  
   <li><p>La porte dérobée universelle des téléphones portables <a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>
-est utilisée pour écouter leur micro</a>.</p></li>
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>est
+utilisée pour écouter leur micro</a>.</p>
+  </li>
  
   <li><p><a
 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
@@ -250,7 +251,7 @@
 
 <li>
 <p><a
-href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code";>
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
 Certains routeurs D-Link</a> ont une porte dérobée pour changer les
 réglages.
 </p>
@@ -366,7 +367,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/01/25 15:59:58 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-censorship.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.fr.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-censorship.fr.html      30 Mar 2016 16:00:16 -0000      1.8
+++ proprietary-censorship.fr.html      3 May 2016 19:33:50 -0000       1.9
@@ -12,9 +12,9 @@
 
 <p>Voici des exemples de systèmes privateurs qui censurent les choses
 auxquelles leurs utilisateurs ont accès. Nous avons une <a
-href="/philosophy/proprietary/proprietary-jails.html">liste distincte des
-systèmes privateurs qui censurent l'installation</a> d'applications (on les
-appelle les &ldquo;prisons&rdquo;.)</p>
+href="/proprietary/proprietary-jails.html">liste distincte des systèmes
+privateurs qui censurent l'installation</a> d'applications (on les appelle
+les &ldquo;prisons&rdquo;.)</p>
 
 <p>La vente de produits conçus comme des plateformes pour la censure imposée
 par une entreprise devrait être interdite par la loi, mais tel n'est pas le
@@ -151,7 +151,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/03/30 16:00:16 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-deception.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-deception.fr.html       1 Dec 2015 20:27:54 -0000       1.2
+++ proprietary-deception.fr.html       3 May 2016 19:33:50 -0000       1.3
@@ -11,7 +11,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Fraude au moyen de logiciel privateur</h2>
 
-<p><a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<p><a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
 le logiciel privateur</a></p>
 
 <p>Ce document cite des cas où le logiciel privateur se montre malhonnête, ou
@@ -101,7 +101,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -119,7 +119,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/12/01 20:27:54 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-drm.fr.html     21 Jan 2016 13:52:14 -0000      1.2
+++ proprietary-drm.fr.html     3 May 2016 19:33:50 -0000       1.3
@@ -10,7 +10,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>DRM du logiciel privateur</h2>
 
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
 le logiciel privateur</a>
 
 <p>Voici des exemples de programmes et de systèmes privateurs qui mettent en
@@ -231,7 +231,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/01/21 13:52:14 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-insecurity.fr.html      2 May 2016 20:01:40 -0000       1.20
+++ proprietary-insecurity.fr.html      3 May 2016 19:33:50 -0000       1.21
@@ -10,7 +10,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Insécurité du logiciel privateur</h2>
 
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
 le logiciel privateur</a>
 
 <p>Cette page répertorie des failles de sécurité de logiciels privateurs,
@@ -356,7 +356,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/05/02 20:01:40 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-jails.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-jails.fr.html   7 Oct 2015 07:08:16 -0000       1.5
+++ proprietary-jails.fr.html   3 May 2016 19:33:50 -0000       1.6
@@ -86,9 +86,8 @@
 
 <li>
 <p><a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-Windows 8 sur « terminaux mobiles » est une prison.</a>
-</p>
+href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.htm";>WindowsÂ
 8
+sur « terminaux mobiles » est une prison.</a></p>
 </li>
 
 <li>
@@ -159,7 +158,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -177,7 +176,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/07 07:08:16 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-sabotage.fr.html        23 Apr 2016 14:58:44 -0000      1.16
+++ proprietary-sabotage.fr.html        3 May 2016 19:33:50 -0000       1.17
@@ -10,7 +10,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Sabotage privateur</h2>
 
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
 le logiciel privateur</a>
 
 <p>Voici des exemples de logiciels privateurs qui ont des caractéristiques
@@ -159,11 +159,11 @@
 
 <li><p>
 <a
-href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
-Une « mise à niveau » du micrologiciel d'Apple a rendu inutilisables les
-iPhones qui avaient été déverrouillés.</a> La « mise à niveau » a 
également
+href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>Une
+« mise à niveau » du micrologiciel d'Apple a rendu inutilisables les 
iPhones
+qui avaient été déverrouillés.</a> La « mise à niveau » a également
 désactivé les applications non validées par la <a
-href="/philosophy/proprietary-jails.html">censure d'Apple</a>. Tout ceci
+href="/proprietary/proprietary-jails.html">censure d'Apple</a>. Tout ceci
 était apparemment intentionnel.
 </p></li>
 
@@ -207,9 +207,8 @@
 données personnelles.
 </p></li>
 
-<li><p>
-Le greffon Java non libre d'Oracle destiné aux navigateurs <a
-href="http://www.zdnet.com/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates-7000010038/?s_cid=e539";>installe
+<li><p>Le greffon Java non libre d'Oracle destiné aux navigateurs <a
+href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates";>installe
 furtivement d'autres logiciels, privateurs et exaspérants</a>.</p>
 
 <p>Cet article passe sous silence tous les autres inconvénients du logiciel
@@ -223,12 +222,10 @@
 <p>Nous ne sommes pas d'accord avec ce que dit l'article sur ces questions,
 mais nous le proposons comme référence factuelle.</p>
 
-<p>
-En 2014, <a
-href="http://www.computerworld.com/s/article/9236273/Oracle_will_continue_to_bundle_crapware_with_Java";>Oracle
-a insisté pour continuer cette pratique.</a>
-</p></li>
-
+<p>En 2014, <a
+href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html";>Oracle
+a insisté pour continuer cette pratique.</a></p>
+</li>
 </ul>
 
 <div class="translators-notes">
@@ -307,7 +304,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/04/23 14:58:44 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-surveillance.fr.html    2 May 2016 20:01:40 -0000       1.37
+++ proprietary-surveillance.fr.html    3 May 2016 19:33:50 -0000       1.38
@@ -11,8 +11,8 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Espionnage par le logiciel privateur</h2>
 
-<p><a href="/philosophy/proprietary/proprietary.html"> Autres exemples de
-malveillance dans le logiciel privateur</a></p>
+<p><a href="/proprietary/proprietary.html"> Autres exemples de malveillance
+dans le logiciel privateur</a></p>
 
 <div class="toc">
   <h3 id="TableOfContents">Table des matières</h3>
@@ -79,14 +79,13 @@
 
 <p>Depuis des décennies, le mouvement du logiciel libre dénonce le dispositif
 de flicage mis en place par des éditeurs de <a
-href="/philosophy/proprietary/proprietary.html">logiciel privateur</a> comme
-<a href="/philosophy/proprietary/malware-microsoft.html">Microsoft</a> et <a
-href="/philosophy/proprietary/malware-apple.html">Apple</a>. Les années
-récentes ont vu cette tendance à observer les gens gagner l'ensemble de
-l'industrie, non seulement du logiciel mais aussi du matériel. En outre,
-elle s'est propagée de façon spectaculaire du clavier d'ordinateur à
-l'informatique mobile, au bureau, à la maison, aux systèmes de transport et
-à l'école.</p>
+href="/proprietary/proprietary.html">logiciel privateur</a> comme <a
+href="/proprietary/malware-microsoft.html">Microsoft</a> et <a
+href="/proprietary/malware-apple.html">Apple</a>. Les années récentes ont vu
+cette tendance à observer les gens gagner l'ensemble de l'industrie, non
+seulement du logiciel mais aussi du matériel. En outre, elle s'est propagée
+de façon spectaculaire du clavier d'ordinateur à l'informatique mobile, au
+bureau, à la maison, aux systèmes de transport et à l'école.</p>
 
 <p class="highlight-para">Ce document tente de recenser les <strong>cas 
clairement établis de
 logiciels privateurs espionnant l'utilisateur ou le suivant à la
@@ -185,7 +184,7 @@
   </li>
 
   <li><p><a
-href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
+href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
 Windows 8.1 espionne les recherches locales</a>.</p>
   </li>
 
@@ -197,7 +196,7 @@
 
 <p>Le flicage des utilisateurs par Microsoft n'a pas commencé avec
 Windows 10. Il y a bien d'autres <a
-href="/philosophy/proprietary/malware-microsoft.html"> logiciels Microsoft
+href="/proprietary/malware-microsoft.html"> logiciels Microsoft
 malveillants</a>.</p>
 
 
@@ -252,8 +251,7 @@
 
 <p>Il y a bien d'autres <a href="#SpywareIniThings">espions dans les
 iTrucs</a>, et bien d'autres <a
-href="/philosophy/proprietary/malware-apple.html">logiciels Apple
-malveillants</a>.</p>
+href="/proprietary/malware-apple.html">logiciels Apple malveillants</a>.</p>
 
 
 <div class="big-subsection">
@@ -304,9 +302,8 @@
 un logiciel de surveillance cachée tous azimuts comme Carrier IQ</a>.</p>
   </li>
 
-  <li><p><a 
href="/philosophy/proprietary/proprietary-back-doors.html#samsung"> La
-porte dérobée de Samsung</a> permet l'accès à n'importe quel fichier du
-système.</p>
+  <li><p><a href="/proprietary/proprietary-back-doors.html#samsung"> La porte 
dérobée
+de Samsung</a> permet l'accès à n'importe quel fichier du système.</p>
   </li>
 </ul>
 
@@ -917,9 +914,9 @@
   <li><p>De nombreux sites dénoncent leurs visiteurs aux réseaux 
publicitaires qui
 font du pistage. Une statistique prenant en compte les 1000 sites web les
 plus populaires a montré que <a
-href="https://www.law.berkeley.edu/index.htmlcenters/berkeley-center-for-law-technology/research/privacy-at-bclt/web-privacy-census/";>
-93% d'entre eux servaient à leurs visiteurs des cookies tierces permettant à
-d'autres sites de les suivre à la trace</a>. </p>
+href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/";>84%Â
 d'entre
+eux (le 17 mai 2012) servaient à leurs visiteurs des cookies tierces
+permettant à d'autres sites de les suivre à la trace</a>. </p>
   </li>
 
   <li><p>Beaucoup envoient à Google un rapport sur chacun de leurs visiteurs 
par le
@@ -950,12 +947,13 @@
 
 <ul>
   <li><p>Dans Google Chrome, les extensions ont toute facilité pour <a
-href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy";>
-espionner en détail la navigation de l'utilisateur</a>, et beaucoup ne s'en
-privent pas. </p>
+href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>espionner
+en détail la navigation de l'utilisateur</a>, et beaucoup ne s'en privent
+pas. </p>
   </li>
 </ul>
 
+
 <div class="big-subsection">
   <h4 id="SpywareInFlash">Flash</h4>
   <span class="anchor-reference-id">(<a
@@ -1082,7 +1080,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2016/05/02 20:01:40 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-tyrants.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.fr.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-tyrants.fr.html 16 Oct 2015 21:01:44 -0000      1.3
+++ proprietary-tyrants.fr.html 3 May 2016 19:33:50 -0000       1.4
@@ -10,7 +10,7 @@
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Tyrans privateurs</h2>
 
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
 le logiciel privateur</a>
 
 <p>Un appareil <em>tyran</em> a comme particularité de refuser aux 
utilisateurs
@@ -122,7 +122,7 @@
      
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>Cette page peut être utilisée suivant les conditions de la licence <a
 rel="license"
@@ -140,7 +140,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2015/10/16 21:01:44 $
+$Date: 2016/05/03 19:33:50 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/malware-apple.fr-en.html 23 Apr 2016 14:58:45 -0000      1.19
+++ po/malware-apple.fr-en.html 3 May 2016 19:33:51 -0000       1.20
@@ -12,7 +12,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Apple's Operating Systems Are Malware</h2>
 
-<p><a href="/philosophy/proprietary/">Other examples of proprietary 
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
 <div class="highlight-para">
 <p>
@@ -170,7 +170,7 @@
   <li><p><a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>
   An Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
   unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
-  not approved by <a href="/philosophy/proprietary-jails.html">Apple
+  not approved by <a href="/proprietary/proprietary-jails.html">Apple
   censorship</a>.  All this was apparently intentional.</p>
   </li>
 
@@ -401,7 +401,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/04/23 14:58:45 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-kindle-swindle.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-kindle-swindle.fr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-kindle-swindle.fr-en.html        6 Jul 2015 10:28:19 -0000       
1.2
+++ po/malware-kindle-swindle.fr-en.html        3 May 2016 19:33:51 -0000       
1.3
@@ -12,7 +12,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in the Kindle Swindle</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>We refer to this product as the
 <a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
@@ -137,7 +137,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -147,7 +147,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/07/06 10:28:19 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-mobiles.fr-en.html       20 Mar 2016 09:35:59 -0000      1.5
+++ po/malware-mobiles.fr-en.html       3 May 2016 19:33:51 -0000       1.6
@@ -12,7 +12,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Malware in Mobile Devices</h2>
 
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
 malware</a></p>
 
 <div class="highlight-para">
@@ -35,7 +35,7 @@
 </div>
 
 <p>Here are examples of malware in mobile devices.  See also
-the <a href="/philosophy/malware-apple.html">the Apple malware
+the <a href="/proprietary/malware-apple.html">the Apple malware
 page</a> for malicious functionalities specific to the Apple iThings.</p>
 
 <div class="toc">
@@ -62,9 +62,10 @@
 
 <h3 id="back-doors">Mobile Back Doors</h3>
 <ul>
-  <li><p>The universal back door in portable phones 
-      <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>
-      is employed to listen through their microphones</a>.</p></li>
+  <li><p>The universal back door in portable phones <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
+    employed to listen through their microphones</a>.</p>
+  </li>
 
   <li><p>Most mobile phones have a universal back door, which has been
   used to <a
@@ -78,7 +79,7 @@
   device.</p>
   </li>
 
-  <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+  <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
   Samsung's back door</a> provides access to any file on the system.</p>
   </li>
 
@@ -89,13 +90,11 @@
   called GTalkService).
   </p>
 
-  <p>
-  Google can
-  also <a 
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";>forcibly
-  and remotely install apps</a> through GTalkService (which seems, since
-  that article, to have been merged into Google Play).  This adds up to
-  a universal back door.
-  </p>
+<p>Google can also <a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/";
+title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
+install apps</a> through GTalkService (which seems, since that article, to have
+been merged into Google Play).  This adds up to a universal back door. </p>
 
   <p>
   Although Google's <em>exercise</em> of this power has not been
@@ -208,10 +207,11 @@
 
 <h3 id="jails">Mobile Jails</h3>
 <ul>
-  <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
-  Mobile devices that come with Windows 8 are tyrants</a>. <a
-  
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-  Windows 8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
+  <li><p><a
+  href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>Mobile
+  devices that come with Windows 8 are tyrants</a>. <a
+  
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>Windows
+  8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
   </li>
 </ul>
 
@@ -279,7 +279,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/03/20 09:35:59 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/proprietary-back-doors.fr-en.html        25 Jan 2016 15:59:59 -0000      
1.15
+++ po/proprietary-back-doors.fr-en.html        3 May 2016 19:33:51 -0000       
1.16
@@ -5,15 +5,16 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Back Doors</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>Here are examples of demonstrated back doors in proprietary software.</p>
 
 <!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <ul>  
-  <li><p>The universal back door in portable phones 
-      <a 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>
-      is employed to listen through their microphones</a>.</p></li>
+  <li><p>The universal back door in portable phones <a
+    
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
+    employed to listen through their microphones</a>.</p>
+  </li>
  
   <li><p><a 
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/";>
       Microsoft has already backdoored its disk encryption</a>.</p></li>
@@ -226,7 +227,7 @@
 </li>
 
 <li>
-<p><a 
href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code";>
+<p><a 
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html";>
 Some D-Link routers</a> have a back door for changing settings in a dlink
 of an eye.
 </p>
@@ -316,7 +317,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/01/25 15:59:59 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-censorship.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-censorship.fr-en.html        30 Mar 2016 16:00:16 -0000      
1.8
+++ po/proprietary-censorship.fr-en.html        3 May 2016 19:33:51 -0000       
1.9
@@ -7,7 +7,7 @@
 
 <p>Here are examples of proprietary systems that impose censorship on
 what their users can access. We have a <a
-href="/philosophy/proprietary/proprietary-jails.html">separate
+href="/proprietary/proprietary-jails.html">separate
 list of proprietary systems that censor installation</a> of
 application programs (we call them &ldquo;jails&rdquo;.)</p>
 
@@ -123,7 +123,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/03/30 16:00:16 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-deception.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/proprietary-deception.fr-en.html 1 Dec 2015 20:27:55 -0000       1.2
+++ po/proprietary-deception.fr-en.html 3 May 2016 19:33:51 -0000       1.3
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Deception</h2>
 
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
 
 <p>This document reports instances where proprietary software is
   dishonest or conceals deception or trickery.</p>
@@ -82,7 +82,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -92,7 +92,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/12/01 20:27:55 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/proprietary-drm.fr-en.html       21 Jan 2016 13:52:15 -0000      1.2
+++ po/proprietary-drm.fr-en.html       3 May 2016 19:33:51 -0000       1.3
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary DRM</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>Here are examples of proprietary programs and systems that
 implement <em>digital restrictions management</em> (DRM):
@@ -192,7 +192,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/01/21 13:52:15 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-insecurity.fr-en.html        2 May 2016 20:01:41 -0000       
1.19
+++ po/proprietary-insecurity.fr-en.html        3 May 2016 19:33:51 -0000       
1.20
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Insecurity</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
@@ -309,7 +309,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/02 20:01:41 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-jails.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary-jails.fr-en.html     7 Oct 2015 06:33:01 -0000       1.4
+++ po/proprietary-jails.fr-en.html     3 May 2016 19:33:51 -0000       1.5
@@ -73,9 +73,8 @@
 </li>
 
 <li>
-<p><a 
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown";>
-Windows 8 on &ldquo;mobile devices&rdquo; is a jail.</a>
-</p>
+<p><a
+href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html";>Windows
 8 on &ldquo;mobile devices&rdquo; is a jail.</a></p>
 </li>
 
 <li>
@@ -135,7 +134,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -145,7 +144,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/07 06:33:01 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-sabotage.fr-en.html  23 Apr 2016 14:58:45 -0000      1.16
+++ po/proprietary-sabotage.fr-en.html  3 May 2016 19:33:51 -0000       1.17
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Sabotage</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>Here are examples of proprietary software that has something
 worse than a back door.</p>
@@ -138,7 +138,7 @@
 <a 
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html";>An
 Apple firmware &ldquo;upgrade&rdquo; bricked iPhones that had been
 unlocked.</a>  The &ldquo;upgrade&rdquo; also deactivated applications
-not approved by <a href="/philosophy/proprietary-jails.html">Apple
+not approved by <a href="/proprietary/proprietary-jails.html">Apple
 censorship</a>.  All this was apparently intentional.
 </p></li>
 
@@ -177,27 +177,21 @@
 begin to snoop on them and distribute their personal data.
 </p></li>
 
-<li><p>
-Oracle's nonfree Java plug-in for
-browsers <a 
href="http://www.zdnet.com/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates-7000010038/?s_cid=e539";>sneakily
-installs other annoying proprietary software</a>.</p>
-
-<p>That article disregards all other bad things about proprietary
-software.  For instance, it regards the inclusion of proprietary Flash
-Player (which has
-a <a 
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/";>surveillance
-feature</a> and DRM) in Chrome as a good thing.  Chrome is a
-proprietary browser with a universal back door.</p>
-
-<p>We don't agree with the article's views on those issues, but we
-present it as a factual reference.</p>
-
-<p>
-In
-2014, <a 
href="http://www.computerworld.com/s/article/9236273/Oracle_will_continue_to_bundle_crapware_with_Java";>Oracle
-insisted on continuing this practice.</a>
-</p></li>
+<li><p>Oracle's nonfree Java plug-in for browsers <a
+href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/";>sneakily
 installs other annoying proprietary software</a>.</p>
 
+<p>That article disregards all other bad things about proprietary software.  
For
+instance, it regards the inclusion of proprietary Flash Player (which  has a <a
+href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/";>surveillance
 feature</a> and DRM) in Chrome as a good thing.  Chrome
+is a proprietary browser with a universal back door.</p>
+
+<p>We don't agree with the article's views on those issues, but we present it
+as a factual reference.</p>
+
+<p>In 2014, <a
+href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html";>Oracle
 insisted on continuing
+this practice.</a></p>
+</li>
 </ul>
 
 </div><!-- for id="content", starts in the include above -->
@@ -257,7 +251,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/04/23 14:58:45 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- po/proprietary-surveillance.fr-en.html      2 May 2016 20:01:41 -0000       
1.33
+++ po/proprietary-surveillance.fr-en.html      3 May 2016 19:33:51 -0000       
1.34
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Surveillance</h2>
 
-<p><a href="/philosophy/proprietary/proprietary.html">
+<p><a href="/proprietary/proprietary.html">
    Other examples of proprietary malware</a></p>
 
 <div class="toc">
@@ -72,11 +72,11 @@
 
 <p>For decades, the Free Software movement has been denouncing the
 abusive surveillance machine of
-<a href="/philosophy/proprietary/proprietary.html">proprietary software</a>
+<a href="/proprietary/proprietary.html">proprietary software</a>
 companies such as
-<a href="/philosophy/proprietary/malware-microsoft.html">Microsoft</a>
+<a href="/proprietary/malware-microsoft.html">Microsoft</a>
 and
-<a href="/philosophy/proprietary/malware-apple.html">Apple</a>.
+<a href="/proprietary/malware-apple.html">Apple</a>.
 
 In the recent years, this tendency to watch people has spread across
 industries, not only in the software business, but also in the
@@ -170,7 +170,7 @@
       voice input.</p>
   </li>
 
-  <li><p><a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
+  <li><p><a 
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html";>
       Windows 8.1 snoops on local searches.</a>.</p>
   </li>
 
@@ -181,7 +181,7 @@
 </ul>
 
 <p>Microsoft's snooping on users did not start with Windows 10.
-   There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
+   There's a lot more <a href="/proprietary/malware-microsoft.html">
    Microsoft malware</a>.</p>
 
 
@@ -230,7 +230,7 @@
 </ul>
 
 <p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and
-<a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
+<a href="/proprietary/malware-apple.html">Apple malware</a>.</p>
 
 
 <div class="big-subsection">
@@ -273,7 +273,7 @@
       hidden general surveillance package such as Carrier IQ.</a></p>
   </li>
 
-  <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+  <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
       Samsung's back door</a> provides access to any file on the system.</p>
   </li>
 </ul>
@@ -837,12 +837,11 @@
       users that don't have Facebook accounts.</p>
   </li>
 
-  <li><p>Many web sites rat their visitors to advertising networks
-      that track users.  Of the top 1000 web sites,
-      <a 
href="https://www.law.berkeley.edu/index.htmlcenters/berkeley-center-for-law-technology/research/privacy-at-bclt/web-privacy-census/";>
-      93% fed
-      their visitors third-party cookies, allowing other sites to
-      track them</a>.</p>
+  <li><p>Many web sites rat their visitors to advertising networks that track
+      users.  Of the top 1000 web sites, <a
+      
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/";>84%
+      (as of 5/17/2012) fed their visitors third-party cookies, allowing other
+      sites to track them</a>.</p>
   </li>
 
   <li><p>Many web sites report all their visitors to Google by using
@@ -868,12 +867,13 @@
 </div>
 
 <ul>
-  <li><p>Google Chrome makes it easy for an extension to
-      do <a 
href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy";>total
+  <li><p>Google Chrome makes it easy for an extension to do <a
+    
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/";>total
       snooping on the user's browsing</a>, and many of them do so.</p>
   </li>
 </ul>
 
+
 <div class="big-subsection">
   <h4 id="SpywareInFlash">Spyware in Flash</h4>
   <span class="anchor-reference-id">(<a 
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
@@ -972,7 +972,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/02 20:01:41 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-tyrants.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.fr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary-tyrants.fr-en.html   16 Oct 2015 21:01:45 -0000      1.3
+++ po/proprietary-tyrants.fr-en.html   3 May 2016 19:33:51 -0000       1.4
@@ -6,7 +6,7 @@
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Tyrants</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
 <p>A <em>tyrant</em> device is one that refuses to allow users to
 install a different operating system or a modified operating
@@ -104,7 +104,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -114,7 +114,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/16 21:01:45 $
+$Date: 2016/05/03 19:33:51 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]