[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.fr.html malware-k...
From: |
GNUN |
Subject: |
www/proprietary malware-apple.fr.html malware-k... |
Date: |
Tue, 03 May 2016 19:33:53 +0000 |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/05/03 19:33:53
Modified files:
proprietary : malware-apple.fr.html
malware-kindle-swindle.fr.html
malware-mobiles.fr.html
proprietary-back-doors.fr.html
proprietary-censorship.fr.html
proprietary-deception.fr.html
proprietary-drm.fr.html
proprietary-insecurity.fr.html
proprietary-jails.fr.html
proprietary-sabotage.fr.html
proprietary-surveillance.fr.html
proprietary-tyrants.fr.html
proprietary/po : malware-apple.fr-en.html
malware-kindle-swindle.fr-en.html
malware-mobiles.fr-en.html
proprietary-back-doors.fr-en.html
proprietary-censorship.fr-en.html
proprietary-deception.fr-en.html
proprietary-drm.fr-en.html
proprietary-insecurity.fr-en.html
proprietary-jails.fr-en.html
proprietary-sabotage.fr-en.html
proprietary-surveillance.fr-en.html
proprietary-tyrants.fr-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-kindle-swindle.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.fr.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-deception.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.fr.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-kindle-swindle.fr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.fr-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.fr-en.html?cvsroot=www&r1=1.3&r2=1.4
Patches:
Index: malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- malware-apple.fr.html 23 Apr 2016 14:58:44 -0000 1.20
+++ malware-apple.fr.html 3 May 2016 19:33:50 -0000 1.21
@@ -19,7 +19,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Malveillance des systèmes d'exploitation Apple</h2>
-<p><a href="/philosophy/proprietary/">Autres exemples de malveillance dans le
+<p><a href="/proprietary/proprietary/">Autres exemples de malveillance dans le
logiciel privateur</a></p>
<div class="highlight-para">
@@ -196,7 +196,7 @@
Une « mise à niveau » du micrologiciel d'Apple a rendu inutilisables les
iPhones qui avaient été déverrouillés.</a> La « mise à niveau » a
également
désactivé les applications non validées par la <a
-href="/philosophy/proprietary-jails.html">censure d'Apple</a>. Tout ceci
+href="/proprietary/proprietary-jails.html">censure d'Apple</a>. Tout ceci
était apparemment intentionnel.</p>
</li>
@@ -463,7 +463,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/04/23 14:58:44 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: malware-kindle-swindle.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-kindle-swindle.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- malware-kindle-swindle.fr.html 6 Jul 2015 10:28:18 -0000 1.2
+++ malware-kindle-swindle.fr.html 3 May 2016 19:33:50 -0000 1.3
@@ -18,7 +18,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Malveillance du Kindle Swindle</h2>
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
le logiciel privateur</a>
<p>Nous appelons ce produit « <a
@@ -168,7 +168,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -186,7 +186,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/07/06 10:28:18 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-mobiles.fr.html 20 Mar 2016 09:35:58 -0000 1.5
+++ malware-mobiles.fr.html 3 May 2016 19:33:50 -0000 1.6
@@ -18,7 +18,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Malveillance des appareils mobiles</h2>
-<p><a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<p><a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
le logiciel privateur</a></p>
<div class="highlight-para">
@@ -43,7 +43,7 @@
</div>
<p>Voici des exemples de logiciels malveillants dans les appareils
-mobiles. Consultez également <a href="/philosophy/malware-apple.html">la
+mobiles. Consultez également <a href="/proprietary/malware-apple.html">la
page sur la malveillance d'Apple</a> qui concerne les fonctionnalités
malfaisantes spécifiques aux iTrucs.</p>
@@ -78,8 +78,9 @@
<h3 id="back-doors">Portes dérobées</h3>
<ul>
<li><p>La porte dérobée universelle des téléphones portables <a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">
-est utilisée pour écouter leur micro</a>.</p></li>
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">est
+utilisée pour écouter leur micro</a>.</p>
+ </li>
<li><p>La plupart des téléphones mobiles ont une porte dérobée
universelle qui a
été utilisée pour <a
@@ -94,9 +95,8 @@
données stockées dans l'appareil.</p>
</li>
- <li><p><a
href="/philosophy/proprietary/proprietary-back-doors.html#samsung"> La
-porte dérobée de Samsung</a> permet l'accès à n'importe quel fichier du
-système.</p>
+ <li><p><a href="/proprietary/proprietary-back-doors.html#samsung"> La porte
dérobée
+de Samsung</a> permet l'accès à n'importe quel fichier du système.</p>
</li>
<li>
@@ -106,13 +106,12 @@
distance</a> (elle est dans un programme appelé GTalkService).
</p>
- <p>
- Via GTalkService, Google peut aussi <a
-href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-installer des applis, de force et à distance</a> (ce service semble avoir
-fusionné avec Google Play depuis la parution de cet article). Au final,
-cela donne une porte dérobée universelle.
- </p>
+<p>Via GTalkService, Google peut aussi <a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
+title="sur la Wayback Machine (archivé le 20 mai 2015)"> installer des
+applis, de force et à distance</a> (ce service semble avoir fusionné avec
+Google Play depuis la parution de cet article). Au final, cela donne une
+porte dérobée universelle. </p>
<p>
Bien que <em>l'exercice</em> de ce pouvoir par Google n'ait pas été
@@ -239,10 +238,10 @@
<h3 id="jails">Prisons</h3>
<ul>
- <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
Les
+ <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">Les
appareils mobiles livrés avec Windows 8 sont des tyrans</a>. <a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
-Windows 8 est une prison pour les « appareils mobiles »</a>.</p>
+href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">WindowsÂ
8
+est une prison pour les « appareils mobiles »</a>.</p>
</li>
</ul>
@@ -334,7 +333,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/03/20 09:35:58 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-back-doors.fr.html 25 Jan 2016 15:59:58 -0000 1.15
+++ proprietary-back-doors.fr.html 3 May 2016 19:33:50 -0000 1.16
@@ -11,7 +11,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Portes dérobées du logiciel privateur</h2>
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
le logiciel privateur</a>
<p>Voici des exemples de portes dérobées documentées dans des logiciels
@@ -20,8 +20,9 @@
<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<ul>
<li><p>La porte dérobée universelle des téléphones portables <a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">
-est utilisée pour écouter leur micro</a>.</p></li>
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">est
+utilisée pour écouter leur micro</a>.</p>
+ </li>
<li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
@@ -250,7 +251,7 @@
<li>
<p><a
-href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code">
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
Certains routeurs D-Link</a> ont une porte dérobée pour changer les
réglages.
</p>
@@ -366,7 +367,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/01/25 15:59:58 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: proprietary-censorship.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.fr.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary-censorship.fr.html 30 Mar 2016 16:00:16 -0000 1.8
+++ proprietary-censorship.fr.html 3 May 2016 19:33:50 -0000 1.9
@@ -12,9 +12,9 @@
<p>Voici des exemples de systèmes privateurs qui censurent les choses
auxquelles leurs utilisateurs ont accès. Nous avons une <a
-href="/philosophy/proprietary/proprietary-jails.html">liste distincte des
-systèmes privateurs qui censurent l'installation</a> d'applications (on les
-appelle les “prisons”.)</p>
+href="/proprietary/proprietary-jails.html">liste distincte des systèmes
+privateurs qui censurent l'installation</a> d'applications (on les appelle
+les “prisons”.)</p>
<p>La vente de produits conçus comme des plateformes pour la censure imposée
par une entreprise devrait être interdite par la loi, mais tel n'est pas le
@@ -151,7 +151,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/03/30 16:00:16 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: proprietary-deception.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-deception.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-deception.fr.html 1 Dec 2015 20:27:54 -0000 1.2
+++ proprietary-deception.fr.html 3 May 2016 19:33:50 -0000 1.3
@@ -11,7 +11,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Fraude au moyen de logiciel privateur</h2>
-<p><a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<p><a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
le logiciel privateur</a></p>
<p>Ce document cite des cas où le logiciel privateur se montre malhonnête, ou
@@ -101,7 +101,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, 2016 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -119,7 +119,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/12/01 20:27:54 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-drm.fr.html 21 Jan 2016 13:52:14 -0000 1.2
+++ proprietary-drm.fr.html 3 May 2016 19:33:50 -0000 1.3
@@ -10,7 +10,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>DRM du logiciel privateur</h2>
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
le logiciel privateur</a>
<p>Voici des exemples de programmes et de systèmes privateurs qui mettent en
@@ -231,7 +231,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/01/21 13:52:14 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-insecurity.fr.html 2 May 2016 20:01:40 -0000 1.20
+++ proprietary-insecurity.fr.html 3 May 2016 19:33:50 -0000 1.21
@@ -10,7 +10,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Insécurité du logiciel privateur</h2>
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
le logiciel privateur</a>
<p>Cette page répertorie des failles de sécurité de logiciels privateurs,
@@ -356,7 +356,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/05/02 20:01:40 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: proprietary-jails.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary-jails.fr.html 7 Oct 2015 07:08:16 -0000 1.5
+++ proprietary-jails.fr.html 3 May 2016 19:33:50 -0000 1.6
@@ -86,9 +86,8 @@
<li>
<p><a
-href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
-Windows 8 sur « terminaux mobiles » est une prison.</a>
-</p>
+href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.htm">WindowsÂ
8
+sur « terminaux mobiles » est une prison.</a></p>
</li>
<li>
@@ -159,7 +158,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -177,7 +176,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/10/07 07:08:16 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-sabotage.fr.html 23 Apr 2016 14:58:44 -0000 1.16
+++ proprietary-sabotage.fr.html 3 May 2016 19:33:50 -0000 1.17
@@ -10,7 +10,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Sabotage privateur</h2>
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
le logiciel privateur</a>
<p>Voici des exemples de logiciels privateurs qui ont des caractéristiques
@@ -159,11 +159,11 @@
<li><p>
<a
-href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
-Une « mise à niveau » du micrologiciel d'Apple a rendu inutilisables les
-iPhones qui avaient été déverrouillés.</a> La « mise à niveau » a
également
+href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">Une
+« mise à niveau » du micrologiciel d'Apple a rendu inutilisables les
iPhones
+qui avaient été déverrouillés.</a> La « mise à niveau » a également
désactivé les applications non validées par la <a
-href="/philosophy/proprietary-jails.html">censure d'Apple</a>. Tout ceci
+href="/proprietary/proprietary-jails.html">censure d'Apple</a>. Tout ceci
était apparemment intentionnel.
</p></li>
@@ -207,9 +207,8 @@
données personnelles.
</p></li>
-<li><p>
-Le greffon Java non libre d'Oracle destiné aux navigateurs <a
-href="http://www.zdnet.com/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates-7000010038/?s_cid=e539">installe
+<li><p>Le greffon Java non libre d'Oracle destiné aux navigateurs <a
+href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates">installe
furtivement d'autres logiciels, privateurs et exaspérants</a>.</p>
<p>Cet article passe sous silence tous les autres inconvénients du logiciel
@@ -223,12 +222,10 @@
<p>Nous ne sommes pas d'accord avec ce que dit l'article sur ces questions,
mais nous le proposons comme référence factuelle.</p>
-<p>
-En 2014, <a
-href="http://www.computerworld.com/s/article/9236273/Oracle_will_continue_to_bundle_crapware_with_Java">Oracle
-a insisté pour continuer cette pratique.</a>
-</p></li>
-
+<p>En 2014, <a
+href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">Oracle
+a insisté pour continuer cette pratique.</a></p>
+</li>
</ul>
<div class="translators-notes">
@@ -307,7 +304,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/04/23 14:58:44 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-surveillance.fr.html 2 May 2016 20:01:40 -0000 1.37
+++ proprietary-surveillance.fr.html 3 May 2016 19:33:50 -0000 1.38
@@ -11,8 +11,8 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Espionnage par le logiciel privateur</h2>
-<p><a href="/philosophy/proprietary/proprietary.html"> Autres exemples de
-malveillance dans le logiciel privateur</a></p>
+<p><a href="/proprietary/proprietary.html"> Autres exemples de malveillance
+dans le logiciel privateur</a></p>
<div class="toc">
<h3 id="TableOfContents">Table des matières</h3>
@@ -79,14 +79,13 @@
<p>Depuis des décennies, le mouvement du logiciel libre dénonce le dispositif
de flicage mis en place par des éditeurs de <a
-href="/philosophy/proprietary/proprietary.html">logiciel privateur</a> comme
-<a href="/philosophy/proprietary/malware-microsoft.html">Microsoft</a> et <a
-href="/philosophy/proprietary/malware-apple.html">Apple</a>. Les années
-récentes ont vu cette tendance à observer les gens gagner l'ensemble de
-l'industrie, non seulement du logiciel mais aussi du matériel. En outre,
-elle s'est propagée de façon spectaculaire du clavier d'ordinateur Ã
-l'informatique mobile, au bureau, à la maison, aux systèmes de transport et
-à l'école.</p>
+href="/proprietary/proprietary.html">logiciel privateur</a> comme <a
+href="/proprietary/malware-microsoft.html">Microsoft</a> et <a
+href="/proprietary/malware-apple.html">Apple</a>. Les années récentes ont vu
+cette tendance à observer les gens gagner l'ensemble de l'industrie, non
+seulement du logiciel mais aussi du matériel. En outre, elle s'est propagée
+de façon spectaculaire du clavier d'ordinateur à l'informatique mobile, au
+bureau, à la maison, aux systèmes de transport et à l'école.</p>
<p class="highlight-para">Ce document tente de recenser les <strong>cas
clairement établis de
logiciels privateurs espionnant l'utilisateur ou le suivant à la
@@ -185,7 +184,7 @@
</li>
<li><p><a
-href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 espionne les recherches locales</a>.</p>
</li>
@@ -197,7 +196,7 @@
<p>Le flicage des utilisateurs par Microsoft n'a pas commencé avec
Windows 10. Il y a bien d'autres <a
-href="/philosophy/proprietary/malware-microsoft.html"> logiciels Microsoft
+href="/proprietary/malware-microsoft.html"> logiciels Microsoft
malveillants</a>.</p>
@@ -252,8 +251,7 @@
<p>Il y a bien d'autres <a href="#SpywareIniThings">espions dans les
iTrucs</a>, et bien d'autres <a
-href="/philosophy/proprietary/malware-apple.html">logiciels Apple
-malveillants</a>.</p>
+href="/proprietary/malware-apple.html">logiciels Apple malveillants</a>.</p>
<div class="big-subsection">
@@ -304,9 +302,8 @@
un logiciel de surveillance cachée tous azimuts comme Carrier IQ</a>.</p>
</li>
- <li><p><a
href="/philosophy/proprietary/proprietary-back-doors.html#samsung"> La
-porte dérobée de Samsung</a> permet l'accès à n'importe quel fichier du
-système.</p>
+ <li><p><a href="/proprietary/proprietary-back-doors.html#samsung"> La porte
dérobée
+de Samsung</a> permet l'accès à n'importe quel fichier du système.</p>
</li>
</ul>
@@ -917,9 +914,9 @@
<li><p>De nombreux sites dénoncent leurs visiteurs aux réseaux
publicitaires qui
font du pistage. Une statistique prenant en compte les 1000Â sites web les
plus populaires a montré que <a
-href="https://www.law.berkeley.edu/index.htmlcenters/berkeley-center-for-law-technology/research/privacy-at-bclt/web-privacy-census/">
-93% d'entre eux servaient à leurs visiteurs des cookies tierces permettant Ã
-d'autres sites de les suivre à la trace</a>. </p>
+href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%Â
d'entre
+eux (le 17 mai 2012) servaient à leurs visiteurs des cookies tierces
+permettant à d'autres sites de les suivre à la trace</a>. </p>
</li>
<li><p>Beaucoup envoient à Google un rapport sur chacun de leurs visiteurs
par le
@@ -950,12 +947,13 @@
<ul>
<li><p>Dans Google Chrome, les extensions ont toute facilité pour <a
-href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy">
-espionner en détail la navigation de l'utilisateur</a>, et beaucoup ne s'en
-privent pas. </p>
+href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">espionner
+en détail la navigation de l'utilisateur</a>, et beaucoup ne s'en privent
+pas. </p>
</li>
</ul>
+
<div class="big-subsection">
<h4 id="SpywareInFlash">Flash</h4>
<span class="anchor-reference-id">(<a
@@ -1082,7 +1080,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2016/05/02 20:01:40 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: proprietary-tyrants.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.fr.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-tyrants.fr.html 16 Oct 2015 21:01:44 -0000 1.3
+++ proprietary-tyrants.fr.html 3 May 2016 19:33:50 -0000 1.4
@@ -10,7 +10,7 @@
<!--#include virtual="/server/banner.fr.html" -->
<h2>Tyrans privateurs</h2>
-<a href="/philosophy/proprietary.html">Autres exemples de malveillance dans
+<a href="/proprietary/proprietary.html">Autres exemples de malveillance dans
le logiciel privateur</a>
<p>Un appareil <em>tyran</em> a comme particularité de refuser aux
utilisateurs
@@ -122,7 +122,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -140,7 +140,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2015/10/16 21:01:44 $
+$Date: 2016/05/03 19:33:50 $
<!-- timestamp end -->
</p>
Index: po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/malware-apple.fr-en.html 23 Apr 2016 14:58:45 -0000 1.19
+++ po/malware-apple.fr-en.html 3 May 2016 19:33:51 -0000 1.20
@@ -12,7 +12,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Apple's Operating Systems Are Malware</h2>
-<p><a href="/philosophy/proprietary/">Other examples of proprietary
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
<div class="highlight-para">
<p>
@@ -170,7 +170,7 @@
<li><p><a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">
An Apple firmware “upgrade” bricked iPhones that had been
unlocked.</a> The “upgrade” also deactivated applications
- not approved by <a href="/philosophy/proprietary-jails.html">Apple
+ not approved by <a href="/proprietary/proprietary-jails.html">Apple
censorship</a>. All this was apparently intentional.</p>
</li>
@@ -401,7 +401,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/04/23 14:58:45 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-kindle-swindle.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-kindle-swindle.fr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/malware-kindle-swindle.fr-en.html 6 Jul 2015 10:28:19 -0000
1.2
+++ po/malware-kindle-swindle.fr-en.html 3 May 2016 19:33:51 -0000
1.3
@@ -12,7 +12,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Malware in the Kindle Swindle</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>We refer to this product as the
<a href="/philosophy/why-call-it-the-swindle.html">Amazon Swindle</a>
@@ -137,7 +137,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -147,7 +147,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/07/06 10:28:19 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- po/malware-mobiles.fr-en.html 20 Mar 2016 09:35:59 -0000 1.5
+++ po/malware-mobiles.fr-en.html 3 May 2016 19:33:51 -0000 1.6
@@ -12,7 +12,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Malware in Mobile Devices</h2>
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
<div class="highlight-para">
@@ -35,7 +35,7 @@
</div>
<p>Here are examples of malware in mobile devices. See also
-the <a href="/philosophy/malware-apple.html">the Apple malware
+the <a href="/proprietary/malware-apple.html">the Apple malware
page</a> for malicious functionalities specific to the Apple iThings.</p>
<div class="toc">
@@ -62,9 +62,10 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
- <li><p>The universal back door in portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">
- is employed to listen through their microphones</a>.</p></li>
+ <li><p>The universal back door in portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed to listen through their microphones</a>.</p>
+ </li>
<li><p>Most mobile phones have a universal back door, which has been
used to <a
@@ -78,7 +79,7 @@
device.</p>
</li>
- <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+ <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the system.</p>
</li>
@@ -89,13 +90,11 @@
called GTalkService).
</p>
- <p>
- Google can
- also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">forcibly
- and remotely install apps</a> through GTalkService (which seems, since
- that article, to have been merged into Google Play). This adds up to
- a universal back door.
- </p>
+<p>Google can also <a
+href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
+title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
+install apps</a> through GTalkService (which seems, since that article, to have
+been merged into Google Play). This adds up to a universal back door. </p>
<p>
Although Google's <em>exercise</em> of this power has not been
@@ -208,10 +207,11 @@
<h3 id="jails">Mobile Jails</h3>
<ul>
- <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/">
- Mobile devices that come with Windows 8 are tyrants</a>. <a
-
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
- Windows 8 on “mobile devices” is a jail.</a></p>
+ <li><p><a
+ href="https://fsf.org/campaigns/secure-boot-vs-restricted-boot/">Mobile
+ devices that come with Windows 8 are tyrants</a>. <a
+
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows
+ 8 on “mobile devices” is a jail.</a></p>
</li>
</ul>
@@ -279,7 +279,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/03/20 09:35:59 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- po/proprietary-back-doors.fr-en.html 25 Jan 2016 15:59:59 -0000
1.15
+++ po/proprietary-back-doors.fr-en.html 3 May 2016 19:33:51 -0000
1.16
@@ -5,15 +5,16 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Back Doors</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>Here are examples of demonstrated back doors in proprietary software.</p>
<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<ul>
- <li><p>The universal back door in portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">
- is employed to listen through their microphones</a>.</p></li>
+ <li><p>The universal back door in portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed to listen through their microphones</a>.</p>
+ </li>
<li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
Microsoft has already backdoored its disk encryption</a>.</p></li>
@@ -226,7 +227,7 @@
</li>
<li>
-<p><a
href="http://www.itworld.com/data-protection/378427/backdoor-found-d-link-router-firmware-code">
+<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a back door for changing settings in a dlink
of an eye.
</p>
@@ -316,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/01/25 15:59:59 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-censorship.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.fr-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- po/proprietary-censorship.fr-en.html 30 Mar 2016 16:00:16 -0000
1.8
+++ po/proprietary-censorship.fr-en.html 3 May 2016 19:33:51 -0000
1.9
@@ -7,7 +7,7 @@
<p>Here are examples of proprietary systems that impose censorship on
what their users can access. We have a <a
-href="/philosophy/proprietary/proprietary-jails.html">separate
+href="/proprietary/proprietary-jails.html">separate
list of proprietary systems that censor installation</a> of
application programs (we call them “jails”.)</p>
@@ -123,7 +123,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/03/30 16:00:16 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-deception.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/proprietary-deception.fr-en.html 1 Dec 2015 20:27:55 -0000 1.2
+++ po/proprietary-deception.fr-en.html 3 May 2016 19:33:51 -0000 1.3
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Deception</h2>
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
<p>This document reports instances where proprietary software is
dishonest or conceals deception or trickery.</p>
@@ -82,7 +82,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2015, 2016 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -92,7 +92,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/12/01 20:27:55 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- po/proprietary-drm.fr-en.html 21 Jan 2016 13:52:15 -0000 1.2
+++ po/proprietary-drm.fr-en.html 3 May 2016 19:33:51 -0000 1.3
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary DRM</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>Here are examples of proprietary programs and systems that
implement <em>digital restrictions management</em> (DRM):
@@ -192,7 +192,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/01/21 13:52:15 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- po/proprietary-insecurity.fr-en.html 2 May 2016 20:01:41 -0000
1.19
+++ po/proprietary-insecurity.fr-en.html 3 May 2016 19:33:51 -0000
1.20
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Insecurity</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>This page lists clearly established cases of insecurity in
proprietary software that has grave consequences or is otherwise
@@ -309,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/05/02 20:01:41 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-jails.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- po/proprietary-jails.fr-en.html 7 Oct 2015 06:33:01 -0000 1.4
+++ po/proprietary-jails.fr-en.html 3 May 2016 19:33:51 -0000 1.5
@@ -73,9 +73,8 @@
</li>
<li>
-<p><a
href="http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown">
-Windows 8 on “mobile devices” is a jail.</a>
-</p>
+<p><a
+href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows
8 on “mobile devices” is a jail.</a></p>
</li>
<li>
@@ -135,7 +134,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -145,7 +144,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/07 06:33:01 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-sabotage.fr-en.html 23 Apr 2016 14:58:45 -0000 1.16
+++ po/proprietary-sabotage.fr-en.html 3 May 2016 19:33:51 -0000 1.17
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Sabotage</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>Here are examples of proprietary software that has something
worse than a back door.</p>
@@ -138,7 +138,7 @@
<a
href="http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html">An
Apple firmware “upgrade” bricked iPhones that had been
unlocked.</a> The “upgrade” also deactivated applications
-not approved by <a href="/philosophy/proprietary-jails.html">Apple
+not approved by <a href="/proprietary/proprietary-jails.html">Apple
censorship</a>. All this was apparently intentional.
</p></li>
@@ -177,27 +177,21 @@
begin to snoop on them and distribute their personal data.
</p></li>
-<li><p>
-Oracle's nonfree Java plug-in for
-browsers <a
href="http://www.zdnet.com/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates-7000010038/?s_cid=e539">sneakily
-installs other annoying proprietary software</a>.</p>
-
-<p>That article disregards all other bad things about proprietary
-software. For instance, it regards the inclusion of proprietary Flash
-Player (which has
-a <a
href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">surveillance
-feature</a> and DRM) in Chrome as a good thing. Chrome is a
-proprietary browser with a universal back door.</p>
-
-<p>We don't agree with the article's views on those issues, but we
-present it as a factual reference.</p>
-
-<p>
-In
-2014, <a
href="http://www.computerworld.com/s/article/9236273/Oracle_will_continue_to_bundle_crapware_with_Java">Oracle
-insisted on continuing this practice.</a>
-</p></li>
+<li><p>Oracle's nonfree Java plug-in for browsers <a
+href="http://www.zdnet.com/article/a-close-look-at-how-oracle-installs-deceptive-software-with-java-updates/">sneakily
installs other annoying proprietary software</a>.</p>
+<p>That article disregards all other bad things about proprietary software.
For
+instance, it regards the inclusion of proprietary Flash Player (which has a <a
+href="http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/">surveillance
feature</a> and DRM) in Chrome as a good thing. Chrome
+is a proprietary browser with a universal back door.</p>
+
+<p>We don't agree with the article's views on those issues, but we present it
+as a factual reference.</p>
+
+<p>In 2014, <a
+href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">Oracle
insisted on continuing
+this practice.</a></p>
+</li>
</ul>
</div><!-- for id="content", starts in the include above -->
@@ -257,7 +251,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/04/23 14:58:45 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- po/proprietary-surveillance.fr-en.html 2 May 2016 20:01:41 -0000
1.33
+++ po/proprietary-surveillance.fr-en.html 3 May 2016 19:33:51 -0000
1.34
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Surveillance</h2>
-<p><a href="/philosophy/proprietary/proprietary.html">
+<p><a href="/proprietary/proprietary.html">
Other examples of proprietary malware</a></p>
<div class="toc">
@@ -72,11 +72,11 @@
<p>For decades, the Free Software movement has been denouncing the
abusive surveillance machine of
-<a href="/philosophy/proprietary/proprietary.html">proprietary software</a>
+<a href="/proprietary/proprietary.html">proprietary software</a>
companies such as
-<a href="/philosophy/proprietary/malware-microsoft.html">Microsoft</a>
+<a href="/proprietary/malware-microsoft.html">Microsoft</a>
and
-<a href="/philosophy/proprietary/malware-apple.html">Apple</a>.
+<a href="/proprietary/malware-apple.html">Apple</a>.
In the recent years, this tendency to watch people has spread across
industries, not only in the software business, but also in the
@@ -170,7 +170,7 @@
voice input.</p>
</li>
- <li><p><a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ <li><p><a
href="http://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches.</a>.</p>
</li>
@@ -181,7 +181,7 @@
</ul>
<p>Microsoft's snooping on users did not start with Windows 10.
- There's a lot more <a href="/philosophy/proprietary/malware-microsoft.html">
+ There's a lot more <a href="/proprietary/malware-microsoft.html">
Microsoft malware</a>.</p>
@@ -230,7 +230,7 @@
</ul>
<p>There's a lot more <a href="#SpywareIniThings">iThing spyware</a>, and
-<a href="/philosophy/proprietary/malware-apple.html">Apple malware</a>.</p>
+<a href="/proprietary/malware-apple.html">Apple malware</a>.</p>
<div class="big-subsection">
@@ -273,7 +273,7 @@
hidden general surveillance package such as Carrier IQ.</a></p>
</li>
- <li><p><a href="/philosophy/proprietary/proprietary-back-doors.html#samsung">
+ <li><p><a href="/proprietary/proprietary-back-doors.html#samsung">
Samsung's back door</a> provides access to any file on the system.</p>
</li>
</ul>
@@ -837,12 +837,11 @@
users that don't have Facebook accounts.</p>
</li>
- <li><p>Many web sites rat their visitors to advertising networks
- that track users. Of the top 1000 web sites,
- <a
href="https://www.law.berkeley.edu/index.htmlcenters/berkeley-center-for-law-technology/research/privacy-at-bclt/web-privacy-census/">
- 93% fed
- their visitors third-party cookies, allowing other sites to
- track them</a>.</p>
+ <li><p>Many web sites rat their visitors to advertising networks that track
+ users. Of the top 1000 web sites, <a
+
href="https://www.law.berkeley.edu/research/bclt/research/privacy-at-bclt/web-privacy-census/">84%
+ (as of 5/17/2012) fed their visitors third-party cookies, allowing other
+ sites to track them</a>.</p>
</li>
<li><p>Many web sites report all their visitors to Google by using
@@ -868,12 +867,13 @@
</div>
<ul>
- <li><p>Google Chrome makes it easy for an extension to
- do <a
href="http://labs.detectify.com/post/133528218381/chrome-extensions-aka-total-absence-of-privacy">total
+ <li><p>Google Chrome makes it easy for an extension to do <a
+
href="https://labs.detectify.com/2015/07/28/how-i-disabled-your-chrome-security-extensions/">total
snooping on the user's browsing</a>, and many of them do so.</p>
</li>
</ul>
+
<div class="big-subsection">
<h4 id="SpywareInFlash">Spyware in Flash</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInFlash">#SpywareInFlash</a>)</span>
@@ -972,7 +972,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/05/02 20:01:41 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-tyrants.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.fr-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- po/proprietary-tyrants.fr-en.html 16 Oct 2015 21:01:45 -0000 1.3
+++ po/proprietary-tyrants.fr-en.html 3 May 2016 19:33:51 -0000 1.4
@@ -6,7 +6,7 @@
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Tyrants</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
<p>A <em>tyrant</em> device is one that refuses to allow users to
install a different operating system or a modified operating
@@ -104,7 +104,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -114,7 +114,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2015/10/16 21:01:45 $
+$Date: 2016/05/03 19:33:51 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-apple.fr.html malware-k...,
GNUN <=