www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www licenses/gpl-faq.it.html philosophy/governm...


From: GNUN
Subject: www licenses/gpl-faq.it.html philosophy/governm...
Date: Sat, 30 Jul 2016 17:29:55 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/07/30 17:29:55

Modified files:
        licenses       : gpl-faq.it.html 
        philosophy     : government-free-software.it.html 
                         nonfree-games.it.html 
                         open-source-misses-the-point.it.html 
                         right-to-read.it.html 
                         surveillance-vs-democracy.it.html 
                         when-free-software-isnt-practically-superior.it.html 
                         who-does-that-server-really-serve.it.html 
                         words-to-avoid.it.html 
        philosophy/po  : government-free-software.it-en.html 
                         government-free-software.it.po 
                         nonfree-games.it-en.html nonfree-games.it.po 
                         open-source-misses-the-point.it-en.html 
                         open-source-misses-the-point.it.po 
                         right-to-read.it-en.html right-to-read.it.po 
                         surveillance-vs-democracy.it-en.html 
                         surveillance-vs-democracy.it.po 
                         
when-free-software-isnt-practically-superior.it-en.html 
                         when-free-software-isnt-practically-superior.it.po 
                         who-does-that-server-really-serve.it-en.html 
                         who-does-that-server-really-serve.it.po 
                         words-to-avoid.it-en.html words-to-avoid.it.po 
        proprietary    : malware-apple.it.html malware-microsoft.it.html 
                         proprietary-censorship.it.html 
                         proprietary-drm.it.html 
                         proprietary-insecurity.it.html 
                         proprietary-sabotage.it.html 
                         proprietary-surveillance.it.html 
                         proprietary-tyrants.it.html proprietary.it.html 
        proprietary/po : malware-apple.it-en.html malware-apple.it.po 
                         malware-microsoft.it-en.html 
                         malware-microsoft.it.po 
                         proprietary-censorship.it-en.html 
                         proprietary-censorship.it.po 
                         proprietary-drm.it-en.html 
                         proprietary-drm.it.po 
                         proprietary-insecurity.it-en.html 
                         proprietary-insecurity.it.po 
                         proprietary-sabotage.it-en.html 
                         proprietary-sabotage.it.po 
                         proprietary-surveillance.it-en.html 
                         proprietary-surveillance.it.po 
                         proprietary-tyrants.it-en.html 
                         proprietary-tyrants.it.po 
                         proprietary.it-en.html proprietary.it.po 
        server/po      : sitemap.it-en.html sitemap.it.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/gpl-faq.it.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/government-free-software.it.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/nonfree-games.it.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/open-source-misses-the-point.it.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/right-to-read.it.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.it.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/when-free-software-isnt-practically-superior.it.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/who-does-that-server-really-serve.it.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.it.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/government-free-software.it-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/government-free-software.it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/nonfree-games.it-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/nonfree-games.it.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.it-en.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/open-source-misses-the-point.it.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.it-en.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/right-to-read.it.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/surveillance-vs-democracy.it.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/when-free-software-isnt-practically-superior.it-en.html?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/when-free-software-isnt-practically-superior.it.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.it-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/who-does-that-server-really-serve.it.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it-en.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.it.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.it.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.it.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.it.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.it.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.it.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-en.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-en.html?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it.po?cvsroot=www&r1=1.101&r2=1.102

Patches:
Index: licenses/gpl-faq.it.html
===================================================================
RCS file: /web/www/www/licenses/gpl-faq.it.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- licenses/gpl-faq.it.html    30 Jul 2016 16:27:50 -0000      1.15
+++ licenses/gpl-faq.it.html    30 Jul 2016 17:29:52 -0000      1.16
@@ -2601,9 +2601,9 @@
 d'autore. Bisogna tracciare una linea tra il codice JavaScript (copyleft),
 ed il codice utente (di solito rilasciato sotto termini incompatibili).</p>
 
-<!-- GNUN: localize URL /licenses/template-diagram.png -->
+<!-- GNUN: localize URL /licenses/template-diagram.it.png -->
 <p id="template-diagram"><a href="/licenses/template-diagram.it.png">
-<img src="/licenses/template-diagram.png"
+<img src="/licenses/template-diagram.it.png"
      alt="Un diagramma del contenuto sopra descritto"/></a></p>
 
 <p>Ecco un'eccezione per codice JavaScript che fa questo:</p>
@@ -3850,7 +3850,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/07/30 16:27:50 $
+$Date: 2016/07/30 17:29:52 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/government-free-software.it.html
===================================================================
RCS file: /web/www/www/philosophy/government-free-software.it.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- philosophy/government-free-software.it.html 8 Feb 2016 06:34:41 -0000       
1.34
+++ philosophy/government-free-software.it.html 30 Jul 2016 17:29:52 -0000      
1.35
@@ -95,7 +95,11 @@
 standardizzate). Ad esempio, non devono distribuire registrazioni audio o
 video in formati che richiedano Flash o codec non liberi, e le biblioteche
 pubbliche non devono distribuire opere in cui sistemi di gestione digitale
-delle restrizioni siano presenti. </p></li>
+delle restrizioni siano presenti. </p>
+
+<p>Per sostenere la politica di disribuire pubblicazioni e opere in formati che
+rispettano la libertà, lo stato deve insistere affinché tutti i suoi
+documenti siano consegnati in formati che rispettano la libertà.</p></li>
 
 <li><p><b>Disaccoppiare i computer dalle licenze</b><br />
 La vendita di un computer non deve imporre l'acquisto di una licenza di
@@ -212,8 +216,10 @@
 sviluppare, installare e usare software sostitutivo per qualsiasi software
 installato che il produttore ha la possibilità di aggiornare. In particolare
 questo si applicherebbe a qualsiasi dispositivo in cui è necessaria
-un'operazione di &ldquo;jailbreaking&rdquo; per installare un altro sistema
-operativo o in cui le interfacce di alcune periferiche sono segrete.
+un'operazione di <a
+href="/proprietary/proprietary-jails.html">&ldquo;jailbreaking&rdquo;</a>
+per installare un altro sistema operativo o in cui le interfacce di alcune
+periferiche sono segrete.
 </p></li>
 </ul>
 
@@ -294,7 +300,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/02/08 06:34:41 $
+$Date: 2016/07/30 17:29:52 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/nonfree-games.it.html
===================================================================
RCS file: /web/www/www/philosophy/nonfree-games.it.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/nonfree-games.it.html    1 Apr 2016 21:28:03 -0000       1.2
+++ philosophy/nonfree-games.it.html    30 Jul 2016 17:29:52 -0000      1.3
@@ -90,6 +90,12 @@
 href="http://libreplanet.org/wiki/Group:LibrePlanet_Gaming_Collective";>
 "free gaming night"</a> del Collettivo LibrePlanet Gaming.  </p>
 
+<h3>Note</h3>
+
+<p>
+<a href="https://onpon4.github.io/other/gaming-trap/";>Attenzione ai
+&ldquo;dati non liberi per giochi&rdquo; contenenti software.</a></p>
+
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -165,7 +171,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/04/01 21:28:03 $
+$Date: 2016/07/30 17:29:52 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/open-source-misses-the-point.it.html
===================================================================
RCS file: /web/www/www/philosophy/open-source-misses-the-point.it.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- philosophy/open-source-misses-the-point.it.html     22 May 2016 19:30:05 
-0000      1.47
+++ philosophy/open-source-misses-the-point.it.html     30 Jul 2016 17:29:52 
-0000      1.48
@@ -158,9 +158,9 @@
 problema a livello semantico. Ed anche il termine  “software open source”
 rientra in questa categoria. </p>
 
-<p>La <a href="https://opensource.org/definition/";>definizione ufficiale di
-“software open source”</a> (che è pubblicata dalla  Open Source 
Initiative e
-che è troppo lunga per essere citata qui) venne creata derivandola in modo
+<p>La <a href="https://opensource.org/osd/";>definizione ufficiale di 
“software
+open source”</a> (che è pubblicata dalla  Open Source Initiative e che è
+troppo lunga per essere citata qui) venne creata derivandola in modo
 indiretto  dai nostri criteri per il software libero. Tuttavia non è la
 stessa cosa: è più permissiva in alcuni aspetti. Ma nella pratica è una
 definizione abbastanza vicina alla nostra. </p>
@@ -342,6 +342,12 @@
 programmi liberi, sarebbero stati in grado di  “vendere” più efficacemente
 il software a certi clienti, in particolar modo in ambito aziendale. </p>
 
+<p>Quando i sostenitori dell'open source parlano di concetti più profondi, di
+solito si limitano al'idea di "donare" codice sorgente
+all'umanità. Presentare questo come un atto di bontà che va oltre gli
+obblighi morali presuppone che anche distribuire software proprietario senza
+codice sorgente sia moralmente accettabile.</p>
+
 <p>Questo approccio si è mostrato, a modo suo, efficace. La retorica dell'open
 source ha convinto molte aziende e persone private ad utilizzare, e persino
 sviluppare, software libero, cosa che ha fatto estendere la nostra comunità,
@@ -411,11 +417,11 @@
 <p>Quindi gli attivisti del software libero devono riflettere prima di lavorare
 su un'attività che si definisce "open", perché anche se l'attività in sé è
 buona, ogni contributo che si fa ad essa ha dei piccoli effetti collaterali
-negativi. Meglio contribuire a una delle tante altre attività che si
-definiscono "libere", perché in questo caso ogni contributo ha piccoli
-effetti collaterali in senso positivo. Con tanti progetti utili a
-disposizione, perché non sceglierne uno che che ha effetti collaterali
-positivi?</p>
+negativi legati alla promozione dell'idea di "open source". Meglio
+contribuire a una delle tante altre attività che si definiscono "libere",
+perché in questo caso ogni contributo ha piccoli effetti collaterali in
+senso positivo. Con tanti progetti utili a disposizione, perché non
+sceglierne uno che che ha effetti collaterali positivi?</p>
 
 <h3>Conclusioni</h3>
 
@@ -505,7 +511,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:05 $
+$Date: 2016/07/30 17:29:52 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/right-to-read.it.html
===================================================================
RCS file: /web/www/www/philosophy/right-to-read.it.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- philosophy/right-to-read.it.html    1 Apr 2016 21:28:03 -0000       1.55
+++ philosophy/right-to-read.it.html    30 Jul 2016 17:29:52 -0000      1.56
@@ -1,10 +1,17 @@
 <!--#set var="ENGLISH_PAGE" value="/philosophy/right-to-read.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Il diritto a leggere - Progetto GNU - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+hr { margin: 1.2em 0; }
+#content ul li p { margin-top: 1em; }
+#AuthorsNote ul li { margin-top: 1.3em; }
+#content div.announcement { margin-bottom: 2em; }
+-->
+</style>
 
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
@@ -13,14 +20,10 @@
 <p>
 di <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
 
-<blockquote class="note">
-<p><a href="http://defectivebydesign.org/ebooks.html";>Iscrivetevi alla nostra
-mailing list sui rischi degli e-book</a>.</p>
-</blockquote>
-
 <p>
 <em>Questo articolo è apparso nel numero di febbraio 1997 di
-<strong>Communications of the ACM</strong> (volume 40, numero 2).</em></p>
+<cite>Communications of the ACM</cite> (volume 40, numero 2).</em></p>
+<hr />
 
 <blockquote><p>
             Da <cite>La strada per Tycho</cite>, una raccolta di articoli sugli
@@ -108,9 +111,8 @@
 noccioli liberi, addirittura interi sistemi operativi, che erano esistiti
 attorno al cambio di secolo. Ma non solo erano illegali, come i debugger, ma
 per installarli dovevi conoscere la parola segreta primaria del tuo
-computer, quella più segreta di tutte, e né l'<abbr title="Federal Bureau of
-Investigation">FBI</abbr> né il supporto clienti della Microsoft te
-l'avrebbero mai svelata.</p>
+computer, quella più segreta di tutte, e né l'FBI né il supporto clienti
+della Microsoft te l'avrebbero mai svelata.</p>
 
 <p>
 Dan si rese conto che non poteva semplicemente prestare il suo computer a
@@ -160,89 +162,97 @@
 Tycho nel 2062, il diritto universale a leggere ne divenne presto uno degli
 obiettivi centrali.</p>
 
+<div class="announcement">
+<blockquote>
+<p><a href="http://defectivebydesign.org/ebooks.html";>Iscrivetevi alla nostra
+mailing list sui rischi degli e-book</a>.</p>
+</blockquote>
+</div>
 
-<h3 id="AuthorsNote">Note dell'autore</h3>
+<div id="AuthorsNote">
+<h3>Note dell'autore</h3>
 
 <ul>
 <li>Questa storia finge di essere un articolo storico scritto nel futuro da
 altri autori, per descrivere la giovinezza di Dan Halbert in una società
-repressiva forgiata dai nemici che usano "pirata" come termine di
+repressiva forgiata dalle forze ingiuste che usano "pirata" come termine di
 propaganda. Quindi usa la terminologia di quella società. Ho cercato di
-rendere la storia come se si svolgesse ai giorni nostri in modo che sembri
-ancora più opprimente. Vedere <a
+rendere la storia come se si svolgesse in un futuro ancora più
+opprimente. Vedere <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Pirateria&rdquo;</a>.
 </li>
 
 <li>
+<p>Le restrizioni imposte tramite computer per il prestito e la lettura dei
+liberi (e altre opere pubblicate) sono note come DRM, che noi chiamiamo
+&ldquo;Digital Restrictions Management&rdquo;.  Per eliminare i DRM, la Free
+Software Foundation ha lanciato la campagna <a
+href="http://DefectiveByDesign.org";>Defective by Design</a> e chiede il
+vostro aiuto.</p>
+</li>
+
+<li>
 <p>Questa nota è stata aggiornata più volte dalla prima pubblicazione di 
questa
 storia.</p>
 
 <p>
 Il diritto a leggere è una battaglia che si combatte oggi. Sebbene possano
-volerci 50 anni perché il nostro stile di vita presente si dissolva
+volerci 50 anni perché le nostre libertà presenti si dissolvano
 nell'oscurità, la maggior parte delle leggi e delle procedure legali
 specifiche descritte sopra sono già state proposte; molte sono state
 tradotte in legge negli USA e altrove. Negli USA, il Digital Millennium
-Copyright Act (DMCA) del 1998 ha stabilito le basi legali per restringere la
-lettura ed il prestito di libri elettronici (e anche di altre
-opere). L'Unione Europea ha imposto restrizioni simili in una direttiva del
-2001 sul diritto d'autore. In Francia, secondo la legge DADVSI adottata nel
-2006, il solo possesso di una copia di DeCSS, il programma libero per
-decrittare i video nei dvd, è un reato.</p>
-
-<p>
-Nel 2001 il senatore Hollings, finanziato dalla Disney, presentò una
-proposta di legge chiamata SSSCA che imporrebbe che ogni nuovo computer
-avesse dei dispositivi obbligatori di restrizione della copia che l'utente
-non potesse scavalcare. Dopo il chip Clipper e similari proposte del governo
-USA di accesso alle chiavi, questo mostra una tendenza di lungo termine: i
-sistemi informatici vengono via via sempre più impostati in modo da dare
-poteri di controllo a dei supervisori distanti sopra alle persone che usano
-realmente il sistema informatico. L'SSSCA fu poi rinominato
-nell'impronunciabile CBDTPA, che fu parafrasato in &ldquo;Consume But Don't
-Try Programming Act&rdquo; (&ldquo;Codice del consuma ma non provare a
-programmare&rdquo;).
-</p>
-
-<p>
-I Repubblicani ottennero il controllo del senato USA poco dopo. Essi sono
-meno legati ad Holliwood dei Democratici, così non premettero su queste
-proposte di legge. Adesso che i Democratici sono tornati al controllo, il
-pericolo è di nuovo più alto.</p>
-
-<p>
-Nel 2001 gli USA cominciarono a cercare d'usare il proposto trattato della
-"Free Trade" Area of Americas (FTAA; &ldquo;Area di libero scambio delle
-Americhe&rdquo;) per imporre le stesse regole su tutti i paesi nell'emisfero
-occidentale. L'FTAA è uno dei cosiddetti trattati di &ldquo;libero
-scambio&rdquo;, che sono invero disegnati per dare alle aziende un potere
-accresciuto sui governi democratici; l'imposizione di leggi come la DMCA è
-tipica di questo spirito. L'FTAA è stata di fatto affossata da Lula,
-presidente del Brasile, che ha rifiutato gli obblighi della DMCA e altri.</p>
-
-<p>
-Da allora, gli USA hanno imposto obblighi simili a paesi come l'Australia e
-il Messico attraverso degli accordi di &ldquo;libero scambio&rdquo;
-bilaterali, e a paesi come il Costa Rica attraverso un altro trattato, il
-CAFTA. Il presidente dell'Ecuador, Correa ha rifiutato di firmare il
-trattato di &ldquo;libero scambio&rdquo; con gli Stati Uniti, ma l'Ecuador a
-quanto mi risulta ha adottato qualcosa di simile al DMCA nel 2003.</p>
+Copyright Act (DMCA) del 1998 ha dato il supporto del governo alle
+restrizioni digitali note come DRM, rendendo un reato la distribuzione di
+programmi che possano superare i DRM. L'Unione Europea ha imposto
+restrizioni simili, anche se non altrettanto forti, in una direttiva del
+2001 sul diritto d'autore.</p>
+
+<p>
+Il governo statunitense vuole imporre tali regole sul resto del mondo
+attraverso i trattati che chiama sul "libero scambio", ma che si dovrebbero
+chiamare sulla <a
+href="https://stallman.org/business-supremacy-treaties.html";> supremazia
+degli affari</a>, perché mettono le aziende a capo di stati che
+ufficialmente sono democratici. La politica del DMCA di criminalizzare i
+programmi che aggirano i DRM è una fra le tante politiche ingiuste imposte
+da questi trattati in vari campi.</p>
+
+<p>
+Il governo statunitense ha imposto il DMCA con accordi bilaterali con
+Australia, Panama, Colombia e corea del Sud, e con il trattato CAFTA con la
+Costa Rica. Obama ha alzato il livello con due altre proposte di trattato,
+TPP e TTIP.  TPP imporrebbe DMCA e molte altre leggi negative a 12 paesi del
+Pacifico. TTIP farebbe lo stesso in Europa. Gli statunitensi devono impedire
+che TPP sia approvato dal Congresso appena dopo le elezioni presidenziali
+del 2016.</p>
+
+<p>
+Con Windows vista, Microsoft ha ammesso di avere inserito una backdoor per
+installare "aggiornamenti" software anche se indesiderati dall'utente. Può
+anche imporre a tutti i PC che usano Vista di non eseguire un certo driver
+di dispositivo hardware. Lo scopo principale era quello di imporre DRM che
+l'utente non potesse superare.</p>
+
+<p>
+Anche il World Wide Web Consortium sta cedendo al potere delle aziende; sta
+per approvare un sistema DRM come parte ufficiale delle specifiche del web.</p>
+
+<p>
+Il software non libero tende ad avere <a href="/proprietary/">abusi di vario
+genere</a>, che fanno concludere che <a
+href="/philosophy/free-software-even-more-important.html">non si può mai
+avere fiducia in un programma non libero</a>.  Dobbiamo respingere i
+programmi non liberi.</p>
 
 <p>
 Una delle idee nel racconto non è stata proposta nella realtà prima del
-2002, quella che l'<abbr>FBI</abbr> e Microsoft terranno le parole segrete
-primarie per il tuo computer personale, senza fornirtele.</p>
+2002, quella che l'FBI e Microsoft terranno le parole segrete primarie per
+il tuo computer personale, senza fornirtele.</p>
 
 <p>
-I proponenti di questo schema gli hanno dato nomi come &ldquo;trusted
-computing&rdquo; (informatica fidata) e &ldquo;Palladium&rdquo;. Noi lo
-chiamiamo <a href="/philosophy/can-you-trust.html">&ldquo;treacherous
-computing&rdquo;</a> (informatica infida), perché l'effetto è che il tuo
-computer obbedisce alle aziende commerciali invece al punto che può
-disobbedire a te stesso e sfidarti. È stato implementato nel 2007 come parte
-di <a href="http://badvista.org/";>Windows Vista</a>; ci aspettiamo che Apple
-faccia qualcosa di simile. In tale schema, è il produttore che tiene il
-codice segreto, ma l'FBI lo ottiene facilmente.</p>
+I sostenitori di questo schema l'hanno all'inizio chiamato &ldquo;trusted
+computing&rdquo; o &ldquo;Palladium&rdquo;, ma alla fine è diventato noto
+come &ldquo;secure boot&rdquo;.</p>
 
 <p>
 Quella che tiene Microsoft non è esattamente una parola segreta in senso
@@ -250,26 +260,26 @@
 di firma e cifratura che corrisponde ad una seconda chiave inclusa nel tuo
 computer. Dà a Microsoft, e potenzialmente a ogni sito web che coopera con
 Microsoft, il controllo ultimo sopra quello che l'utente può fare o meno col
-proprio computer.</p>
-
-<p>
-Vista dà a Microsoft anche più poteri, per esempio Microsoft può forzare
-l'installazione di aggiornamenti, e può ordinare a tutte le macchine con
-Vista di rifiutare un certo software di dispositivo. Lo scopo principale
-delle tante restrizioni in Vista è quello di fare un DRM (Digital
-Restrictions Management, &ldquo;gestione delle restrizioni digitali&rdquo;)
-che gli utenti non possano scavalcare. La minaccia di DRM è il motivo che ci
-ha portato a lanciare la campagna <a href="http://DefectiveByDesign.org";>
-Defective By Design</a>.</p>
-
-<p>
-Quando questo racconto fu scritto all'inizio, la SPA stava minacciando dei
-piccoli fornitori di accesso a Internet, pretendendo che essi le
-permettessero di monitorare i loro utenti. I più s'arresero alle minacce,
-poiché non potevano permettersi una causa legale. Solo uno, Community
-ConneXion, di Oakland, California, rifiutò ed in effetti gli fu fatta
-causa. La SPA più tardi lascio cadere quella causa, ma ottenne il DMCA che
-diede loro il potere che cercavano.</p>
+proprio computer.  Microsoft isprobabilmente userà quel controllo per conto
+dell'FBI quando le verrà chiesto di farlo: già ora <a
+href="/proprietary/malware-microsoft.html">mostra alla NSA bug di sicurezza
+in Windows</a>.</p>
+
+<p>
+Il "secure boot" può essere implementato in un modo che permette all'utente
+di scegliere quale software firmare (con la sua chiave), ma in pratica i PC
+progettati per Windows 10 hanno solo la chiave di Microsoft e il fatto di
+poter installare un altro sistema (come GNU/Linux) è sotto il controllo di
+Microsoft. Noi lo chiamiamo <em>restricted boot</em>.</p>
+
+<p>
+Nel 1997, quando fu scritta la prima versione di questo racconto, la SPA
+stava minacciando dei piccoli fornitori di accesso a Internet, pretendendo
+che essi le permettessero di monitorare i loro utenti. I più s'arresero alle
+minacce, poiché non potevano permettersi una causa legale. Solo uno,
+Community ConneXion, di Oakland, California, rifiutò ed in effetti gli fu
+fatta causa. La SPA più tardi lasciò cadere quella causa, ma il DMCA diede
+loro il potere che cercavano.</p>
 
 <p>
 La SPA [ndt: APS in italiano nel racconto], che sta in effetti per Software
@@ -279,7 +289,7 @@
 ricordano l'ex Unione Sovietica, invita le persone a spiare i colleghi di
 lavoro e gli amici. Una campagna mediatica terroristica della BSA in
 Argentina nel 2001 avanzava velate minacce che le persone che condividevano
-il software sarebbero state violentate.</p>
+il software sarebbero state violentate in carcere.</p>
 
 <p>
 Le politiche di sicurezza delle università descritte sopra non sono
@@ -305,35 +315,43 @@
 i più a rinunciare ai propri diritti che questo garantisce.</p>
 </li>
 </ul>
+</div>
 
 <h3 id="BadNews">Cattive notizie</h3>
 
 <p>
 La battaglia per il diritto a leggere è già in corso. Il nemico è
-organizzato e noi non lo siamo, quindi al momento stiamo subendo. Ecco
-alcuni articoli sugli eventi negativi che si sono verificati dal momento
-della prima pubblicazione di questo articolo.</p>
+organizzato e noi non lo siamo, quindi al momento stiamo subendo.
+</p>
+
+<p>Gli e-book commerciali di oggi <a
+href="/philosophy/the-danger-of-ebooks.html"> negano le libertà
+tradizionali</a> ai lettori. Il lettore di Amazon, che noi chiamiamo
+&ldquo;Amazon Swindle&rdquo; perché truffa (NdT: "swindle" significa
+"truffa") i lettori privandoli della libertà, è gestito da software che ha
+<a href="/proprietary/malware-kindle-swindle.html">funzioni Orwelliane</a>,
+ciascuna delle quali abbastanza grave per abbandonare il prodotto:</p>
 
 <ul>
-<li>Gli e-book commerciali di oggi <a
-href="/philosophy/the-danger-of-ebooks.html"> privano gli utenti delle loro
-tradizionali libertà</a>.</li>
-<li><a href="http://www.nature.com/nature_education/biology.html";> Un sito
-contenente un "libro di testo per la biologia"</a> che potete leggere solo
-firmando un <a href="http://www.nature.com/principles/viewTermsOfUse";>
-contratto che vi proibisce di prestarlo ad altri</a> e che l'editore può
-ritirare in qualsiasi momento.</li>
-<li><a
-href="http://www.zdnet.com/article/seybold-opens-chapter-on-digital-books/";>Electronic
-Publishing:</a> un articolo sulla distribuzione dei libri in forma
-elettronica, e questioni di diritti di copia con effetti sul diritto a
-leggerli.</li>
-<li><a
-href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx";>Books
-inside Computers:</a> software per controllare chi può leggere libri e
-documenti su un PC.</li>
+<li><p>Spia il lettore: riferisce quale libro viene letto, a quale pagina, e
+traccia le sottolineature e le note.</p></li>
+
+<li><p>Ha DRM per evitare che gli utenti condividano copie.</p></li>
+
+<li><p>Ha una backdoor che Amazon può usare per cancellare da remoto qualsiasi
+libro e che nel 2009 è stata usata per cancellare copie del libro "1984" di
+George Orwell.</p></li>
+
+<li><p>Se questo non è abbastanza Orwelliano c'è una backdoor universale con 
cui
+Amazon può cambiare il software da remoto, introducendo qualsiasi tipo di
+funzioni.</p></li>
 </ul>
 
+<p>Anche la vendita di e-book di Amazon non rispetta la libertà. Identifica
+l'utente e lo associa ai libri; gli chiede di non condividere copie (il male
+minore sarebbe quello di sfidare la richiesta e condividerle; ma per essere
+a posto la soluzione è di non accettare la condizione).</p>
+
 <p>Per fermare il susseguirsi di cattive notizie e averne qualcuna buona,
 dobbiamo organizzarci e combattere. La campagna <a
 href="http://defectivebydesign.org";> Defective by Design</a> della FSF è un
@@ -460,7 +478,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/04/01 21:28:03 $
+$Date: 2016/07/30 17:29:52 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/surveillance-vs-democracy.it.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.it.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- philosophy/surveillance-vs-democracy.it.html        22 May 2016 19:30:05 
-0000      1.18
+++ philosophy/surveillance-vs-democracy.it.html        30 Jul 2016 17:29:52 
-0000      1.19
@@ -254,13 +254,13 @@
 
 <p>Spesso le telecamere connesse a Internet sono le prime ad avere una pessima
 sicurezza digitale, così che <a
-href="http://www.networkworld.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html";>
-chiunque può vedere</a> attraverso di esse. Per garantire di nuovo la
-privacy, dovremmo bandire l’uso delle telecamere connesse a Internet nei
-luoghi e negli orari frequentati dal pubblico, a meno che non siano portate
-da persone. Tutti devono essere liberi di pubblicare foto e video ogni
-tanto, ma l’accumulazione sistematica di tali dati su Internet dev’essere
-limitata.</p>
+href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances";>
+chiunque può vedere</a> attraverso di esse. Questo le rende pericolose in
+termini di sicurezza e di privacy. Per garantire di nuovo la privacy,
+dovremmo bandire l’uso delle telecamere connesse a Internet nei luoghi e
+negli orari frequentati dal pubblico, a meno che non siano portate da
+persone. Tutti devono essere liberi di pubblicare foto e video ogni tanto,
+ma l’accumulazione sistematica di tali dati su Internet dev’essere 
limitata.</p>
 
 <p><a name="privatespace"><b>*</b></a>Qui si dà per scontato che la telecamera
 di sorveglianza sia puntata verso l'interno di un negozio, o verso la
@@ -559,7 +559,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:05 $
+$Date: 2016/07/30 17:29:52 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/when-free-software-isnt-practically-superior.it.html
===================================================================
RCS file: 
/web/www/www/philosophy/when-free-software-isnt-practically-superior.it.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- philosophy/when-free-software-isnt-practically-superior.it.html     1 Jan 
2016 15:15:29 -0000       1.4
+++ philosophy/when-free-software-isnt-practically-superior.it.html     30 Jul 
2016 17:29:52 -0000      1.5
@@ -11,6 +11,10 @@
 <!--#include virtual="/server/banner.it.html" -->
 <h2> A volte il software libero non è (nei fatti) superiore</h2>
 
+<p>
+di <a href="https://mako.cc/writing/";><strong>Benjamin Mako
+Hill</strong></a></p>
+
 <p>La missione aziendale dell'Open Source Initiative (l'organizzazione dietro
 il movimento open source) afferma: &ldquo;l'open source è un metodo di
 sviluppo del software che sfrutta le potenzialità di un sistema di revisione
@@ -212,7 +216,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/01/01 15:15:29 $
+$Date: 2016/07/30 17:29:52 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/who-does-that-server-really-serve.it.html
===================================================================
RCS file: /web/www/www/philosophy/who-does-that-server-really-serve.it.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- philosophy/who-does-that-server-really-serve.it.html        8 Feb 2016 
21:05:11 -0000       1.7
+++ philosophy/who-does-that-server-really-serve.it.html        30 Jul 2016 
17:29:52 -0000      1.8
@@ -21,7 +21,13 @@
 Software Substitute, SaaSS) è un altro modo per lasciare che qualcun altro
 abbia potere sulle vostre attività informatiche.</strong></p>
 
-SaaSS [NdT: in italiano, &ldquo;servizio come surrogato del software&rdquo;,
+<p>Il punto è che si può avere il controllo di un programma che qualcun altro
+ha scritto (se è libero), ma non si può mai avere il controllo di un
+servizio fornito da un altro: quindi mai usare un servizio quando un
+programma potrebbe fare la stessa cosa.</p>
+
+
+<p>SaaSS [NdT: in italiano, &ldquo;servizio come surrogato del software&rdquo;,
 in contrasto al &ldquo;Software as a Service&rdquo;, cioè &ldquo;software
 come servizio&rdquo;] significa usare un servizio implementato da qualcun
 altro come surrogato dell'esecuzione della vostra copia del programma. Il
@@ -30,7 +36,7 @@
 il vago e fuorviante termine &ldquo;cloud&rdquo;, che raggruppa il SaaSS con
 diverse altre pratiche, alcune offensive, altre accettabili. Grazie alla
 spiegazione e agli esempi di questa pagina potrete distinguere quando un
-servizio è un SaaSS.
+servizio è un SaaSS.</p>
 
 <h3>Premessa. Come il software proprietario vi sottrae la libertà</h3>
 
@@ -485,7 +491,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/02/08 21:05:11 $
+$Date: 2016/07/30 17:29:52 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/words-to-avoid.it.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.it.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- philosophy/words-to-avoid.it.html   27 Mar 2016 21:28:35 -0000      1.85
+++ philosophy/words-to-avoid.it.html   30 Jul 2016 17:29:52 -0000      1.86
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/philosophy/words-to-avoid.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Termini da evitare (o usare con cura) perché imprecisi o fuorvianti -
@@ -23,33 +23,79 @@
 chiamiamo Swindle</a>.</p></blockquote>
 </div>
 
-<p>
-  <a href="/philosophy/philosophy.html">Altri testi da leggere</a> | &ldquo;<a 
href="#Ad-blocker">Ad-blocker</a>&rdquo; | &ldquo;<a 
href="#Access">Accesso</a>&rdquo; | &ldquo;<a 
href="#Alternative">Alternativa</a>&rdquo; | &ldquo;<a 
href="#BSD-style">Licenze tipo-BSD</a>&rdquo; | &ldquo;<a 
href="#Closed">Chiuso</a>&rdquo; | &ldquo;<a href="#CloudComputing">Cloud 
Computing</a>&rdquo; | &ldquo;<a href="#Commercial">Commerciale</a>&rdquo; | 
&ldquo;<a href="#Compensation">Compenso</a>&rdquo; | &ldquo;<a 
href="#Consume">Consumare</a>&rdquo; | &ldquo;<a 
href="#Consumer">Consumatore</a>&rdquo; | &ldquo;<a 
href="#Content">Contenuto</a>&rdquo; | &ldquo;<a 
href="#CreativeCommonsLicensed">Sotto licenza Creative
-Commons</a>&rdquo; | &ldquo;<a href="#Creator">Creatore</a>&rdquo; | &ldquo;<a 
href="#DigitalGoods">Beni digitali (Digital Goods)</a>&rdquo; | &ldquo;<a 
href="#DigitalLocks">Lucchetti digitali (Digital Locks)</a>&rdquo;
-| &ldquo;<a href="#DigitalRightsManagement">Digital Rights Management
-(Gestione digitale dei diritti)</a>&rdquo; | &ldquo;<a 
href="#Ecosystem">Ecosistema</a>&rdquo; | &ldquo;<a 
href="#FLOSS">FLOSS</a>&rdquo; | &ldquo;<a href="#ForFree">For free</a>&rdquo; 
| &ldquo;<a href="#FOSS">FOSS</a>&rdquo; | &ldquo;<a 
href="#FreelyAvailable">Liberamente disponibile</a>&rdquo; | &ldquo;<a 
href="#Freeware">Freeware</a>&rdquo; | &ldquo;<a 
href="#GiveAwaySoftware">Regalare software</a>&rdquo; | &ldquo;<a 
href="#Google">Googlare</a>&rdquo; | &ldquo;<a href="#Hacker">Hacker</a>&rdquo; 
| &ldquo;<a href="#IntellectualProperty">Proprietà intellettuale</a>&rdquo; | 
&ldquo;<a href="#LAMP">Sistema LAMP</a>&rdquo; | &ldquo;<a 
href="#Linux">Sistema Linux</a>&rdquo; | &ldquo;<a 
href="#Market">Mercato</a>&rdquo; | &ldquo;<a 
href="#Monetize">Monetizzare</a>&rdquo; | &ldquo;<a href="#MP3Player">MP3 
player</a>&rdquo; | &ldquo;<a href="#Open">Aperto</a>&rdquo; | &ldquo;<a 
href="#PC">PC</a>&rdquo; | &ldquo;<a href="#Photoshop">Photoshop</a>&rdquo; | 
&ldquo;<a href="#Piracy"
 >Pirateria</a>&rdquo; | &ldquo;<a href="#PowerPoint">PowerPoint</a>&rdquo; | 
 >&ldquo;<a href="#Protection">Protezione</a>&rdquo; | &ldquo;<a 
 >href="#RAND">RAND</a>&rdquo; | &ldquo;<a href="#SaaS">SaaS</a>&rdquo; | 
 >&ldquo;<a href="#SellSoftware">Vendere software</a>&rdquo; | &ldquo;<a 
 >href="#SharingEconomy">Economia di condivisione (Sharing
-economy)</a>&rdquo; | &ldquo;<a href="#Skype">Skypare</a>&rdquo; | &ldquo;<a 
href="#SoftwareIndustry">Industria del software</a>&rdquo; | &ldquo;<a 
href="#SourceModel">Modello di sorgente (Source model)</a>&rdquo;
+<p> <!-- GNUN-SORT-START -->
+&ldquo;<a href="#Access">Accesso</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Ad-blocker">Ad-blocker</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
+&ldquo;<a href="#Alternative">Alternativa</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Open">Aperto</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#DigitalGoods">Beni digitali (Digital Goods)</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Closed">Chiuso</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#CloudComputing">Cloud Computing</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Commercial">Commerciale</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
+&ldquo;<a href="#Compensation">Compenso</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
+&ldquo;<a href="#Consume">Consumare</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Consumer">Consumatore</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
+&ldquo;<a href="#Content">Contenuto</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Creator">Creatore</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#DigitalRightsManagement">Digital Rights Management
+(Gestione digitale dei diritti)</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#SharingEconomy">Economia di condivisione (Sharing
+economy)</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Ecosystem">Ecosistema</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
+&ldquo;<a href="#FLOSS">FLOSS</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#ForFree">For free</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#FOSS">FOSS</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Freeware">Freeware</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Theft">Furto</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Google">Googlare</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Hacker">Hacker</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#SoftwareIndustry">Industria del software</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#FreelyAvailable">Liberamente disponibile</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#BSD-style">Licenze tipo-BSD</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#DigitalLocks">Lucchetti digitali (Digital Locks)</a>&rdquo;
+| <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Market">Mercato</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#SourceModel">Modello di sorgente (Source model)</a>&rdquo;
 |
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Monetize">Monetizzare</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
+&ldquo;<a href="#MP3Player">MP3 player</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
+&ldquo;<a href="#PC">PC</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Photoshop">Photoshop</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Piracy">Pirateria</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#PowerPoint">PowerPoint</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
+&ldquo;<a href="#IntellectualProperty">Proprietà intellettuale</a>&rdquo; | 
<!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Protection">Protezione</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
+&ldquo;<a href="#RAND">RAND</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#GiveAwaySoftware">Regalare software</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#SaaS">SaaS</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#LAMP">Sistema LAMP</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Linux">Sistema Linux</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Skype">Skypare</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#CreativeCommonsLicensed">Sotto licenza Creative
+Commons</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
 <!--#if expr="$LANGUAGE_SUFFIX = /^.(es)$/" -->
 <!-- TRANSLATORS: translate if this word is used often in your
      language to refer to mobile computers; otherwise,
      fill the translation with a space. -->
-&ldquo;<a href="#Terminal">Terminale</a>&rdquo; | <!--#endif -->
-&ldquo;<a href="#Theft">Furto</a>&rdquo; | &ldquo;<a 
href="#TrustedComputing">Trusted Computing (informatica
-fidata)</a>&rdquo; | &ldquo;<a href="#Vendor">Venditore</a>&rdquo;
+<!-- GNUN-SORT-BEGIN-KEY -->
+&ldquo;<a href="#Terminal">Terminale</a>&rdquo; | <!-- GNUN-SORT-END-KEY -->
+<!--#endif
+ -->
+<!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#TrustedComputing">Trusted Computing (informatica
+fidata)</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#SellSoftware">Vendere software</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Vendor">Venditore</a>&rdquo;
+<!-- GNUN-SORT-STOP -->
 </p>
 
-<h3 id="Ad-blocker">&ldquo;Ad-blocker&rdquo;</h3>
-<p>
-Quando lo scopo di un programma è bloccare la pubblicità,
-&ldquo;ad-blocker&rdquo; è una definizione corretta. Ma ad esempio IceCat,
-il browser di GNU, blocca pubblicità che traccia l'utente, e implementa
-altre funzioni per prevenire la sorveglianza da parte dei siti web. A questo
-punto, più che di &ldquo;ad-blocker,&rdquo; si deve parlare di
-<em>protezione contro la sorveglianza</em>.</p>
-
+<!-- GNUN-SORT-START -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Access">&ldquo;Accesso&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 &Egrave; piuttosto frequente commettere l'errore di pensare che software
 libero coincida con l'avere "accesso" pubblico a un programma, ma questo non
@@ -79,7 +125,24 @@
 vale nel caso particolare in cui l'utente ha già una copia del programma in
 forma non sorgente.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="Ad-blocker">&ldquo;Ad-blocker&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
+<p>
+Quando lo scopo di un programma è bloccare la pubblicità,
+&ldquo;ad-blocker&rdquo; è una definizione corretta. Ma ad esempio IceCat,
+il browser di GNU, blocca pubblicità che traccia l'utente, e implementa
+altre funzioni per prevenire la sorveglianza da parte dei siti web. A questo
+punto, più che di &ldquo;ad-blocker,&rdquo; si deve parlare di
+<em>protezione contro la sorveglianza</em>.</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Alternative">&ldquo;Alternativa&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Non descriviamo il software libero come "alternativa" al software
 proprietario, perché questo termine presuppone che tutte le "alternative"
@@ -96,20 +159,44 @@
 al software libero.
 </p>
 
-<h3 id="BSD-style">&ldquo;Licenze tipo-BSD&rdquo;</h3>
-<p>
-L'espressione "licenza di tipo BSD" crea confusione perché  <a
-href="/licenses/bsd.html">fa un solo fascio di licenze che  presentano
-differenze importanti</a>. Ad esempio, la licenza BSD  originale con la sua
-clausola pubblicitaria è incompatibile con  la Licenza Pubblica Generica
-(GPL), mentre invece la nuova  licenza BSD è compatibile con la GPL.</p>
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="Open">&ldquo;Aperto&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
-Per evitare confusioni, è meglio indicare <a href=
-"/licenses/license-list.html">la specifica licenza cui ci si  riferisce</a>
-evitando la vaga locuzione "di tipo BSD".</p>
+Per favore evitate di usare la parola "aperto" come sostituto  di "software
+libero". Un <a href=  "/philosophy/open-source-misses-the-point.html">altro
+gruppo</a>, i cui valori sono meno idealistici dei nostri, usa  "sorgente
+aperto" (open source) come proprio slogan. Il movimento per il software
+libero si batte per la vostra libertà nelle elaborazioni digitali, come
+questione di giustizia. L'open source non fa alcun tipo di campagna del
+genere.</p>
+
+<p>Solo quando ci si riferisce alle opinioni "open source" è corretto usare
+quel termine; non va invece usato quando si parla di noi, del nostro
+software, delle nostre opinioni, altrimenti si rischia che il nostro punto
+di vista sia confuso con il loro.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="DigitalGoods">&ldquo;Beni digitali (Digital Goods)&rdquo;</h3>
 
+<!-- GNUN-SORT-END-KEY -->
+<p>
+Il termine &ldquo;beni digitali&rdquo; usato in riferimento a copie di opere
+di ingegno li paragona ai beni fisici, che non si possono copiare e che
+quindi vanno prodotti in quantità e venduti. Questa metafora incoraggia a
+giudicare questioni riguardanti il software o altre opere digitali secondo i
+punti di vista che ciascuno ha sui beni fisici. Tra l'altro, inquadra il
+problema in termini economici, che sono troppo poco approfonditi e limitati
+per cogliere i valori della libertà e della comunità.</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Closed">&ldquo;Chiuso&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Se descriviamo software non libero come "chiuso" facciamo un  chiaro
 riferimento al termine "open source". Nel Movimento per il  Software Libero,
@@ -120,8 +207,11 @@
 software non libero come  "chiuso". Lo chiamiamo "non-libero" o <a href=
 "/philosophy/categories.html#ProprietarySoftware">  "proprietario"</a>.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="CloudComputing">&ldquo;Cloud Computing&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Il termine "cloud computing" (o semplicemente <a
 name="Cloud">&ldquo;cloud&rdquo;</a>, nel contesto dell'informatica) non ha
@@ -194,7 +284,11 @@
 ideali che animano la nostra azione.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Commercial">&ldquo;Commerciale&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 È bene non usare "commerciale" come sinonimo di "non-libero".  Ciò confonde
 due questioni del tutto diverse tra loro.</p>
@@ -220,8 +314,11 @@
 combinazione "libero commerciale", scartando  questa possibilità. Bisogna
 stare attenti a non utilizzare il  termine "commerciale" in tal senso.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Compensation">&ldquo;Compenso&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Parlare di &ldquo;compenso all'autore&rdquo; facendo riferimento al diritto
 d'autore dà per scontato che: (1) il diritto d'autore esista a beneficio
@@ -237,7 +334,11 @@
 stesse case editrici che fanno pressione per imporci leggi ingiuste.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Consume">&ldquo;Consumare&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 &ldquo;Consumare&rdquo; è quello che facciamo con il cibo: dopo che è stato
 ingerito, non esiste più in quella forma. Per analogia, usiamo lo stesso
@@ -289,7 +390,11 @@
 
 <p>Vedere anche la voce seguente.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Consumer">&ldquo;Consumatore&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Il termine &ldquo;consumatore&rdquo;, quando usato per riferirsi agli utenti
 di computer, ha molti sottintesi errati. Alcuni vengono dall'idea che usare
@@ -314,7 +419,11 @@
 da altri</a>.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Content">&ldquo;Contenuto&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Se vuoi esprimere un sentimento di benessere e soddisfazione,  giustamente
 dici di essere "contento" (content), ma è meglio  evitare l'utilizzo del
@@ -356,24 +465,11 @@
 &ldquo;sistema di revisione di siti web&rdquo;, o &ldquo;web site revision
 system&rdquo; (WRS) in quei casi.</p>
 
-
-<h3 id="CreativeCommonsLicensed">&ldquo;Sotto licenza Creative 
Commons&rdquo;</h3>
-<p>
-La caratteristica più importante della licenza di un'opera è se è o non è
-libera. Creative Commons pubblica sette licenze, di cui tre (CC BY, CC BY-SA
-e CC0) libere e le altre no. Quindi dire che un'opera è sotto "licenza
-Creative Commons" non dice se è libera, e sminuisce l'importanza della
-questione: la frase può essere corretta, ma l'omissione è dannosa.
-</p>
-
-<p>
-Per incoraggiare il pubblico a prestare attenzione alla distinzione più
-importante, occorre specificare sempre <em>quale</em> licenza Creative
-Commons è in uso, ad esempio "rilasciato con licenza CC BY-SA". Se non si sa
-quale licenza precisa è usata da una certa opera, occorre determinarla.
-</p>
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Creator">&ldquo;Creatore&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Applicare il termine "creatore" agli autori significa  paragonarli
 implicitamente a una deità ("il creatore"). Questo  termine viene usato
@@ -384,48 +480,11 @@
 copyright" è ciò  che si intende. Questi due termini non sono equivalenti: è
 piuttosto comune che il detentore del copyright non sia l'autore.</p>
 
-
-<h3 id="DigitalGoods">&ldquo;Beni digitali (Digital Goods)&rdquo;</h3>
-<p>
-Il termine &ldquo;beni digitali&rdquo; usato in riferimento a copie di opere
-di ingegno li paragona ai beni fisici, che non si possono copiare e che
-quindi vanno prodotti in quantità e venduti. Questa metafora incoraggia a
-giudicare questioni riguardanti il software o altre opere digitali secondo i
-punti di vista che ciascuno ha sui beni fisici. Tra l'altro, inquadra il
-problema in termini economici, che sono troppo poco approfonditi e limitati
-per cogliere i valori della libertà e della comunità.</p>
-
-
-<h3 id="DigitalLocks">&ldquo;Lucchetti digitali (Digital Locks)&rdquo;</h3>
-<p>
-Alcuni usano il termine &ldquo;lucchetti digitali&rdquo; per fare
-riferimento, criticandola, alla gestione digitale delle restrizioni (DRM),
-ma questo termine non evidenzia correttamente i motivi per cui la tecnologia
-DRM è malvagia. Chi ha adottato questo termine non ci ha riflettuto
-abbastanza.</p>
-<p>
-I lucchetti non sono necessariamente sbagliati o opprimenti. Tutti
-probabilmente possediamo lucchetti, e le corrispondenti chiavi o codici; che
-li si trovi utili o inutili, certamente non sono opprimenti: li possiamo
-aprire e chiudere.  Allo stesso modo, troviamo utilissima la <a
-href="http://www.theguardian.com/technology/2015/may/01/encryption-wont-work-if-it-has-a-back-door-only-the-good-guys-have-keys-to-";>protezione
-crittografica</a> dei nostri file. Anche questo è un lucchetto digitale su
-cui abbiamo controllo.</p>
-<p>
-La tecnologia DRM è invece un lucchetto messo a voi da qualcun altro che non
-vi dà la chiave: è più simile a delle <em>manette</em> che a un
-lucchetto. Quindi la metefora migliore quando si parla di DRM è
-&ldquo;manette digitali&rdquo; anziché &ldquo;lucchetti digitali&rdquo;.</p>
-<p>
-Varie campagne di opposizione hanno scelto di usare l'infelice termine
-&ldquo;lucchetti digitali&rdquo;; per correggere l'imprecisione, dobbiamo
-ripetere insistentemente la correzione. Noi come FSF potremo dare supporto a
-campagne contro i &ldquo;lucchetti digitali&rdquo;, se siamo sostanzialmente
-d'accordo con la causa; ma quando capiterà sostituiremo il termine con
-&ldquo;manette digitali&rdquo;, spiegandone le ragioni.</p>
-
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="DigitalRightsManagement">&ldquo;Digital Rights Management (Gestione 
digitale dei diritti)&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Il software per il "Digital Rights Management" (Gestione digitale dei
 diritti, abbreviato DRM) in realtà è  progettato per imporre restrizioni
@@ -440,7 +499,26 @@
 Partecipate alla nostra <a href="http://DefectiveByDesign.org/";> campagna
 per abolire DRM</a>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="SharingEconomy">&ldquo;Economia di condivisione (Sharing 
economy)&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
+<p>
+Il termine &ldquo;sharing economy&rdquo; ("economia di condivisione") non è
+corretto per servizi come Uber e Airbnb che gestiscono affari tra
+privati. Per noi la condivisione è invece la collaborazione non commerciale,
+come ad esempio la ridistribuzione non commerciale di copie esatte di
+un'opera pubblicata. Estenderne il significato rischia di creare 
confusione.</p>
+<p>
+Un termine più adatto per descrivere il caso di aziende come Uber è quello
+di "economia di servizi su transazioni singole".</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Ecosystem">&ldquo;Ecosistema&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 &Egrave; sconsigliabile definire una qualsiasi comunità umana, come la
 comunità del software libero, come "ecosistema", perché quella parola
@@ -465,7 +543,11 @@
 pericolo, le arti tradizionali... e la libertà degli utenti di computer.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="FLOSS">&ldquo;FLOSS&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Il termine &ldquo;FLOSS&rdquo;, che sta per &ldquo;Free/Libre and Open
 Source Software&rdquo;, è stato creato come opzione per essere <a
@@ -474,7 +556,11 @@
 scelta migliore; ma chi vuole difendere la libertà non dovrebbe usare
 termini neutrali.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="ForFree">&ldquo;For free&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Quando ci si riferisce a un programma di software libero (free  software),
 meglio non dire che è disponibile "for free",  gratuitamente. Questo termine
@@ -491,7 +577,11 @@
 Onde evitare confusioni, si può dire che il programma è  disponibile "come
 software libero".</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="FOSS">&ldquo;FOSS&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Il termine &ldquo;FOSS&rdquo;, che sta per &ldquo;Free and Open Source
 Software&rdquo;, è stato creato come opzione per essere <a
@@ -500,18 +590,11 @@
 neutrale, è meglio usare &ldquo;FLOSS&rdquo;; ma chi vuole difendere la
 libertà non dovrebbe usare termini neutrali.</p>
 
-<h3 id="FreelyAvailable">&ldquo;Liberamente disponibile&rdquo;</h3>
-<p>
-Non usate &ldquo;software liberamente disponibile&rdquo; come sinonimo di
-&ldquo;software libero&rdquo;: sono termini diversi. Il software è
-&ldquo;liberamente disponibile&rdquo; se chiunque ne può avere una copia
-facilmente. Invece &ldquo;software libero&rdquo; è definito in funzione
-della libertà degli utenti che ne hanno una copia. Queste sono risposte a
-domande diverse.
-</p>
-
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Freeware">&ldquo;Freeware&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Evitiamo per favore il termine "freeware" come sinonimo di  "software
 libero". Il termine "freeware" veniva spesso usato  negli anni '80 per
@@ -534,17 +617,46 @@
 tratta.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="Theft">&ldquo;Furto&rdquo;</h3>
 
-<h3 id="GiveAwaySoftware">&ldquo;Regalare software&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
-È fuorviante usare il termine "regalare" (give away) quando si  vuole
-intendere "distribuire un programma come software libero".  È lo stesso
-problema già visto in "for free" (in inglese):  implica che il punto in
-questione sia il prezzo, non la libertà.  Un modo per evitare questa
-confusione consiste nel dire:  "rilasciare come software libero".</p>
+I sostenitori di una forma troppo rigida e oppressiva di copyright spesso
+usano termini quali  "rubato" e "furto" per descrivere le infrazioni al
+copyright.  Questa è un'esagerazione, ma costoro vorrebbero che questa
+venisse considerata una verità oggettiva.</p>
+<p>
+Il sistema giuridico - almeno negli USA - non considera l'infrazione al
+diritto d'autore un "furto". Le leggi sui furti non si applicano alle
+infrazioni al diritto d'autore. I sostenitori di una forma oppressiva di
+copyright si  appellano a un'autorità... e presentano in maniera sbagliata
+quanto sostiene tale autorità.</p>
+<p>
+Come argomentazione, potete fare riferimento a questo <a
+href="http://www.guardian.co.uk/books/2013/may/04/harper-lee-kill-mockingbird-copyright";>
+caso reale</a> che mostra quello che potrebbe essere definito &ldquo;furto
+di copyright&rdquo;.</p>
+<p>
+La copia non autorizzata è proibita dalla legge sul copyright in molte
+circostanze (non tutte!), ma il fatto che sia proibita non la rende
+automaticamente sbagliata. In generale, le leggi non definiscono cose giuste
+e sbagliate, ma semplicemente applicano la giustizia. Se le leggi
+(l'applicazione) non rispettano le nostre idee di giusto e sbagliato (la
+specifica), allora le leggi dovrebbero essere cambiate.</p>
 
+<p>
+Un giudice statunitense, nell'ambito di un processo riguardante un caso di
+violazione del copyright, ha ammesso che <a
+href="http://torrentfreak.com/mpaa-banned-from-using-piracy-and-theft-terms-in-hotfile-trial-131129/";>&ldquo;pirateria&rdquo;
+e &ldquo;furto&rdquo; sono parole diffamatorie</a>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Google">&ldquo;Googlare&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Non usate il neologismo &ldquo;googlare&rdquo; per indicare l'azione di
 effettuare una ricerca su Internet: &ldquo;Google&rdquo; è solo uno dei
@@ -555,8 +667,11 @@
 href="https://duckduckgo.com/";>DuckDuckGo</a> garantisce (anche se noi non
 possiamo verificarlo in prima persona) di non tracciare i propri utenti.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Hacker">&ldquo;Hacker&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Un hacker è qualcuno a cui piace <a
 href="http://stallman.org/articles/on-hacking.html";> divertirsi
@@ -570,58 +685,95 @@
 <p>
 Non diffondete questo errore: chi viola la sicurezza è un "cracker".</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="SoftwareIndustry">&ldquo;Industria del software&rdquo;</h3>
 
-<h3 id="IntellectualProperty">&ldquo;Proprietà  intellettuale&rdquo;</h3>
-<p>
-Editori e avvocati amano descrivere il diritto d'autore come  "proprietà
-intellettuale" - un termine che include anche i  brevetti, marchi registrati
-e altre più oscure aree della legge.  Tali leggi hanno così poco in comune,
-e differiscono così tanto,  che è sconsigliato fare generalizzazioni. È
-meglio parlare  specificatamente di "copyright", "brevetti" o "marchi
-registrati".</p>
+<!-- GNUN-SORT-END-KEY -->
 <p>
-Il termine "proprietà intellettuale" contiene un presupposto  nascosto - che
-il modo più naturale di considerare tali questioni  disparate sia basato su
-un'analogia con gli oggetti fisici, e  sull'idea di considerarli una
-proprietà.</p>
-<p>
-Quando si parla di copia, quest'analogia ignora la differenza  cruciale
-esistente tra gli oggetti materiali e l'informazione:  l'informazione può
-essere copiata e condivisa quasi senza sforzo,  mentre ciò non è vero degli
-oggetti materiali.</p>
-<p>
-Per evitare pregiudizi e confusione sul termine, è bene  prendere una
-decisione ferma <a href=  "/philosophy/not-ipr.xhtml">di non parlare e
-nemmeno pensare in  termini di "proprietà intellettuale"</a>.</p>
+Il termine "industria del software" incoraggia le persone a  pensare che il
+software è sempre sviluppato da una sorta di  fabbrica e poi dato ai
+consumatori. Non è così per la comunità  del software libero. Le aziende di
+software esistono, e molte di  queste sviluppano software libero e non, ma
+quelle che sviluppano  software libero non sono come fabbriche.</p>
 <p>
-L'ipocrisia di chiamare questi poteri "diritti" sta <a href=
-"/philosophy/wipo-PublicAwarenessOfCopyright-2002.html">provocando
-imbarazzo nel WIPO</a>.</p>
+Il termine "industria" è usato come propaganda dai sostenitori  dei brevetti
+software. Essi parlano di "industrie" di sviluppo  del software e tentano
+così di argomentare che queste dovrebbero  essere soggette ai monopoli dei
+brevetti. <a
+href="https://web.archive.org/web/20071215073111/http://eupat.ffii.org/papers/europarl0309/";
+title="versione archiviata di http://eupat.ffii.org/papers/europarl0309/";>Il
+Parlamento  Europeo, respingendo i brevetti software nel 2003, ha stabilito
+con votazione che "industria" è "produzione automatica di beni
+materiali"</a>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="FreelyAvailable">&ldquo;Liberamente disponibile&rdquo;</h3>
 
-<h3 id="LAMP">&ldquo;Sistema LAMP&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
-&ldquo;LAMP&rdquo; sta per &ldquo;Linux, Apache, MySQL e PHP&rdquo;: una
-combinazione di software comunemente utilizzata nei web server. Tuttavia, in
-questo contesto &ldquo;Linux&rdquo; sta per il sistema GNU/Linux.  Quindi
-invece di &ldquo;LAMP&rdquo; dovrebbe essere &ldquo;GLAMP&rdquo;:
-&ldquo;GNU, Linux, Apache, MySQL e PHP&rdquo;.
+Non usate &ldquo;software liberamente disponibile&rdquo; come sinonimo di
+&ldquo;software libero&rdquo;: sono termini diversi. Il software è
+&ldquo;liberamente disponibile&rdquo; se chiunque ne può avere una copia
+facilmente. Invece &ldquo;software libero&rdquo; è definito in funzione
+della libertà degli utenti che ne hanno una copia. Queste sono risposte a
+domande diverse.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="BSD-style">&ldquo;Licenze tipo-BSD&rdquo;</h3>
 
-<h3 id="Linux">&ldquo;Sistema Linux&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
-Linux è il nome del kernel che Linus Torvalds ha sviluppato a partire dal
-1991. Il sistema operativo in cui si usa Linux è in pratica GNU con
-l'aggiunta di Linux, quindi usare solo &ldquo;Linux&rdquo; per denotare
-l'intero sistema è ingiusto e fuorviante.  Il sistema completo deve essere
-chiamato <a href="/gnu/linux-and-gnu.html"> GNU/Linux</a>, sia per
-riconoscere i meriti di GNU sia per distinguere l'intero sistema dal
-semplice kernel.
-</p>
+L'espressione "licenza di tipo BSD" crea confusione perché  <a
+href="/licenses/bsd.html">fa un solo fascio di licenze che  presentano
+differenze importanti</a>. Ad esempio, la licenza BSD  originale con la sua
+clausola pubblicitaria è incompatibile con  la Licenza Pubblica Generica
+(GPL), mentre invece la nuova  licenza BSD è compatibile con la GPL.</p>
+<p>
+Per evitare confusioni, è meglio indicare <a href=
+"/licenses/license-list.html">la specifica licenza cui ci si  riferisce</a>
+evitando la vaga locuzione "di tipo BSD".</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="DigitalLocks">&ldquo;Lucchetti digitali (Digital Locks)&rdquo;</h3>
 
+<!-- GNUN-SORT-END-KEY -->
+<p>
+Alcuni usano il termine &ldquo;lucchetti digitali&rdquo; per fare
+riferimento, criticandola, alla gestione digitale delle restrizioni (DRM),
+ma questo termine non evidenzia correttamente i motivi per cui la tecnologia
+DRM è malvagia. Chi ha adottato questo termine non ci ha riflettuto
+abbastanza.</p>
+<p>
+I lucchetti non sono necessariamente sbagliati o opprimenti. Tutti
+probabilmente possediamo lucchetti, e le corrispondenti chiavi o codici; che
+li si trovi utili o inutili, certamente non sono opprimenti: li possiamo
+aprire e chiudere.  Allo stesso modo, troviamo utilissima la <a
+href="http://www.theguardian.com/technology/2015/may/01/encryption-wont-work-if-it-has-a-back-door-only-the-good-guys-have-keys-to-";>protezione
+crittografica</a> dei nostri file. Anche questo è un lucchetto digitale su
+cui abbiamo controllo.</p>
+<p>
+La tecnologia DRM è invece un lucchetto messo a voi da qualcun altro che non
+vi dà la chiave: è più simile a delle <em>manette</em> che a un
+lucchetto. Quindi la metefora migliore quando si parla di DRM è
+&ldquo;manette digitali&rdquo; anziché &ldquo;lucchetti digitali&rdquo;.</p>
+<p>
+Varie campagne di opposizione hanno scelto di usare l'infelice termine
+&ldquo;lucchetti digitali&rdquo;; per correggere l'imprecisione, dobbiamo
+ripetere insistentemente la correzione. Noi come FSF potremo dare supporto a
+campagne contro i &ldquo;lucchetti digitali&rdquo;, se siamo sostanzialmente
+d'accordo con la causa; ma quando capiterà sostituiremo il termine con
+&ldquo;manette digitali&rdquo;, spiegandone le ragioni.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Market">&ldquo;Mercato&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 È fuorviante descrivere gli utenti del software libero, o gli  utenti del
 software in generale, come un "mercato".</p>
@@ -638,8 +790,27 @@
 libertà alla campagna di  un'impresa per il suo successo è sminuire la
 libertà.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="SourceModel">&ldquo;Modello di sorgente (Source model)&rdquo;</h3>
 
+<!-- GNUN-SORT-END-KEY -->
+<p>
+Wikipedia usa il termine &ldquo;modello di sorgente&rdquo; in modo confuso e
+ambiguo. Apparentemente si riferisce a come è distribuito il codice sorgente
+di un programma, ma la descrizione fa confusione tra questo e la metodologia
+di sviluppo. Inoltre &ldquo;open source&rdquo; e &rdquo;shared source&rdquo;
+sono considerate situazioni diverse, ma si sovrappongono: Microsoft usa
+quest'ultima terminologia  per indicare varie pratiche, alcune delle quali
+sono &ldquo;open source&rdquo;. Insomma, questo termine non fornisce alcuna
+informazione chiara, ma dà l'opportunità di usare &ldquo;open source&rdquo;
+in pagine dedicate al software libero.</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Monetize">&ldquo;Monetizzare&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Il significato corretto di &ldquo;monetizzare&rdquo; (NdT:
 &ldquo;monetize&rdquo; in inglese) è &ldquo;usare qualcosa come
@@ -657,8 +828,11 @@
 Un'azienda produttiva ed etica può certamente fare denaro, ma se fa
 dipendere tutto dal profitto è difficile che rimanga etica.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="MP3Player">&ldquo;MP3 Player&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Nei tardi anni Novanta divenne possibile produrre riproduttori audio
 digitali portatili, con memorie allo stato solido. Molti, ma non tutti,
@@ -670,23 +844,11 @@
 &ldquo;riproduttore audio digitale&rdquo; o semplicamente
 &ldquo;riproduttore audio&rdquo; se adatto al contesto.</p>
 
-
-<h3 id="Open">&ldquo;Aperto&rdquo;</h3>
-<p>
-Per favore evitate di usare la parola "aperto" come sostituto  di "software
-libero". Un <a href=  "/philosophy/open-source-misses-the-point.html">altro
-gruppo</a>, i cui valori sono meno idealistici dei nostri, usa  "sorgente
-aperto" (open source) come proprio slogan. Il movimento per il software
-libero si batte per la vostra libertà nelle elaborazioni digitali, come
-questione di giustizia. L'open source non fa alcun tipo di campagna del
-genere.</p>
-
-<p>Solo quando ci si riferisce alle opinioni "open source" è corretto usare
-quel termine; non va invece usato quando si parla di noi, del nostro
-software, delle nostre opinioni, altrimenti si rischia che il nostro punto
-di vista sia confuso con il loro.</p>
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="PC">&ldquo;PC&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 &Egrave; corretto usare l'abbreviazione &ldquo;PC&rdquo; per parlare di un
 computer dal punto di vista hardware, ma non è corretto dare per scontato
@@ -696,7 +858,11 @@
 <p>
 Per un computer con Windows è stato suggerito il termine &ldquo;WC&rdquo;.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Photoshop">&ldquo;Photoshop&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Bisogna evitare l'uso di &ldquo;photoshoppare&rdquo; come verbo legato alla
 manipolazione di immagini. Photoshop è solo il nome di un preciso programma
@@ -704,7 +870,11 @@
 programmi liberi per manipolare immagini, come <a
 href="/software/gimp">GIMP</a>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Piracy">&ldquo;Pirateria&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Spesso gli editori descrivono l'attività della copia, se  proibita, come
 "pirateria" (piracy). In questo modo,  sottintendono che effettuare una
@@ -728,7 +898,11 @@
 
href="http://torrentfreak.com/mpaa-banned-from-using-piracy-and-theft-terms-in-hotfile-trial-131129/";>&ldquo;pirateria&rdquo;
 e &ldquo;furto&rdquo; sono parole diffamatorie</a>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="PowerPoint">&ldquo;PowerPoint&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Non si deve usare il termine &ldquo;PowerPoint&rdquo; per tutti i tipi di
 presentazioni con slides. &ldquo;PowerPoint&rdquo; è solo il nome di un
@@ -737,8 +911,42 @@
 sono molte possibilità libere, ad esempio <tt>beamer</tt> per TeX e Impress,
 incluso anche in LibreOffice.org.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="IntellectualProperty">&ldquo;Proprietà  intellettuale&rdquo;</h3>
 
+<!-- GNUN-SORT-END-KEY -->
+<p>
+Editori e avvocati amano descrivere il diritto d'autore come  "proprietà
+intellettuale" - un termine che include anche i  brevetti, marchi registrati
+e altre più oscure aree della legge.  Tali leggi hanno così poco in comune,
+e differiscono così tanto,  che è sconsigliato fare generalizzazioni. È
+meglio parlare  specificatamente di "copyright", "brevetti" o "marchi
+registrati".</p>
+<p>
+Il termine "proprietà intellettuale" contiene un presupposto  nascosto - che
+il modo più naturale di considerare tali questioni  disparate sia basato su
+un'analogia con gli oggetti fisici, e  sull'idea di considerarli una
+proprietà.</p>
+<p>
+Quando si parla di copia, quest'analogia ignora la differenza  cruciale
+esistente tra gli oggetti materiali e l'informazione:  l'informazione può
+essere copiata e condivisa quasi senza sforzo,  mentre ciò non è vero degli
+oggetti materiali.</p>
+<p>
+Per evitare pregiudizi e confusione sul termine, è bene  prendere una
+decisione ferma <a href=  "/philosophy/not-ipr.xhtml">di non parlare e
+nemmeno pensare in  termini di "proprietà intellettuale"</a>.</p>
+<p>
+L'ipocrisia di chiamare questi poteri "diritti" sta <a href=
+"/philosophy/wipo-PublicAwarenessOfCopyright-2002.html">provocando
+imbarazzo nel WIPO</a>.</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Protection">&ldquo;Protezione&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Gli avvocati degli editori adorano ricorrere al termine  "protezione" o
 "tutela" in riferimento al copyright. Questi  termini implicano l'idea di
@@ -767,7 +975,11 @@
 si veda la campagna <a href="http://DefectiveByDesign.org";> Defective by
 Design</a>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="RAND">&ldquo;RAND (Reasonable and Non-Discriminatory)&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Gli organismi incaricati di stabilire gli standard limitati  dai brevetti
 che vietano il software libero in genere seguono la  prassi di ottenere
@@ -797,8 +1009,23 @@
 descrizione accurata perché la sola condizione per  queste licenze è il
 pagamento di una tariffa uniforme per le  royalty.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="GiveAwaySoftware">&ldquo;Regalare software&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
+<p>
+È fuorviante usare il termine "regalare" (give away) quando si  vuole
+intendere "distribuire un programma come software libero".  È lo stesso
+problema già visto in "for free" (in inglese):  implica che il punto in
+questione sia il prezzo, non la libertà.  Un modo per evitare questa
+confusione consiste nel dire:  "rilasciare come software libero".</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="SaaS">&ldquo;SaaS&rdquo; o &ldquo;Software as a Service&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Abbiamo detto che il SaaS (abbreviazione di &ldquo;Software as a
 Service&rdquo;, software come servizio) è un'ingiustizia, ma poi abbiamo
@@ -815,35 +1042,39 @@
 perché il gioco di parole con &ldquo;software como ser vicio&rdquo;
 (software come se fosse un vizio) è troppo azzeccato per abbandonarlo.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="LAMP">&ldquo;Sistema LAMP&rdquo;</h3>
 
-<h3 id="SellSoftware">&ldquo;Vendere software&rdquo;</h3>
-<p>
-L'espressione "vendere software" è ambigua. In senso stretto,  scambiare la
-copia di un programma libero con una somma di denaro  significa <a
-href="/philosophy/selling.html"> vendere il programma</a>, il che è
-perfettamente accettabile, ma in genere si associa il termine "vendere
-software"  alle restrizioni proprietarie nel successivo utilizzo del
-software. Per essere più chiari, ed evitare confusione, si può  dire:
-"distribuire copie di un programma dietro pagamento" oppure  "imporre
-restrizioni proprietarie sull'uso di un programma".</p>
+<!-- GNUN-SORT-END-KEY -->
 <p>
-Vedere <a href="/philosophy/selling.html">Vendere Software  Libero</a> per
-altre discussioni sull'argomento.</p>
+&ldquo;LAMP&rdquo; sta per &ldquo;Linux, Apache, MySQL e PHP&rdquo;: una
+combinazione di software comunemente utilizzata nei web server. Tuttavia, in
+questo contesto &ldquo;Linux&rdquo; sta per il sistema GNU/Linux.  Quindi
+invece di &ldquo;LAMP&rdquo; dovrebbe essere &ldquo;GLAMP&rdquo;:
+&ldquo;GNU, Linux, Apache, MySQL e PHP&rdquo;.
+</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="Linux">&ldquo;Sistema Linux&rdquo;</h3>
 
-<h3 id="SharingEconomy">&ldquo;Economia di condivisione (Sharing 
economy)&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
-Il termine &ldquo;sharing economy&rdquo; ("economia di condivisione") non è
-corretto per servizi come Uber e Airbnb che gestiscono affari tra
-privati. Per noi la condivisione è invece la collaborazione non commerciale,
-come ad esempio la ridistribuzione non commerciale di copie esatte di
-un'opera pubblicata. Estenderne il significato rischia di creare 
confusione.</p>
-<p>
-Un termine più adatto per descrivere il caso di aziende come Uber è quello
-di "economia di servizi su transazioni singole".</p>
-
+Linux è il nome del kernel che Linus Torvalds ha sviluppato a partire dal
+1991. Il sistema operativo in cui si usa Linux è in pratica GNU con
+l'aggiunta di Linux, quindi usare solo &ldquo;Linux&rdquo; per denotare
+l'intero sistema è ingiusto e fuorviante.  Il sistema completo deve essere
+chiamato <a href="/gnu/linux-and-gnu.html"> GNU/Linux</a>, sia per
+riconoscere i meriti di GNU sia per distinguere l'intero sistema dal
+semplice kernel.
+</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Skype">&ldquo;Skypare&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Non usate il neologismo &ldquo;skypare&rdquo; per indicare una
 (video)chiamata via Internet. Skype è solo uno dei tanti programmi per
@@ -854,81 +1085,46 @@
 <a href="https://libreplanet.org/wiki/Group:Skype_Replacement";> programmi
 equivalenti a Skype</a>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="CreativeCommonsLicensed">&ldquo;Sotto licenza Creative 
Commons&rdquo;</h3>
 
-<h3 id="SoftwareIndustry">&ldquo;Industria del software&rdquo;</h3>
-<p>
-Il termine "industria del software" incoraggia le persone a  pensare che il
-software è sempre sviluppato da una sorta di  fabbrica e poi dato ai
-consumatori. Non è così per la comunità  del software libero. Le aziende di
-software esistono, e molte di  queste sviluppano software libero e non, ma
-quelle che sviluppano  software libero non sono come fabbriche.</p>
+<!-- GNUN-SORT-END-KEY -->
 <p>
-Il termine "industria" è usato come propaganda dai sostenitori  dei brevetti
-software. Essi parlano di "industrie" di sviluppo  del software e tentano
-così di argomentare che queste dovrebbero  essere soggette ai monopoli dei
-brevetti. <a
-href="https://web.archive.org/web/20071215073111/http://eupat.ffii.org/papers/europarl0309/";
-title="versione archiviata di http://eupat.ffii.org/papers/europarl0309/";>Il
-Parlamento  Europeo, respingendo i brevetti software nel 2003, ha stabilito
-con votazione che "industria" è "produzione automatica di beni
-materiali"</a>.</p>
+La caratteristica più importante della licenza di un'opera è se è o non è
+libera. Creative Commons pubblica sette licenze, di cui tre (CC BY, CC BY-SA
+e CC0) libere e le altre no. Quindi dire che un'opera è sotto "licenza
+Creative Commons" non dice se è libera, e sminuisce l'importanza della
+questione: la frase può essere corretta, ma l'omissione è dannosa.
+</p>
 
-<h3 id="SourceModel">&ldquo;Modello di sorgente (Source model)&rdquo;</h3>
 <p>
-Wikipedia usa il termine &ldquo;modello di sorgente&rdquo; in modo confuso e
-ambiguo. Apparentemente si riferisce a come è distribuito il codice sorgente
-di un programma, ma la descrizione fa confusione tra questo e la metodologia
-di sviluppo. Inoltre &ldquo;open source&rdquo; e &rdquo;shared source&rdquo;
-sono considerate situazioni diverse, ma si sovrappongono: Microsoft usa
-quest'ultima terminologia  per indicare varie pratiche, alcune delle quali
-sono &ldquo;open source&rdquo;. Insomma, questo termine non fornisce alcuna
-informazione chiara, ma dà l'opportunità di usare &ldquo;open source&rdquo;
-in pagine dedicate al software libero.</p>
+Per incoraggiare il pubblico a prestare attenzione alla distinzione più
+importante, occorre specificare sempre <em>quale</em> licenza Creative
+Commons è in uso, ad esempio "rilasciato con licenza CC BY-SA". Se non si sa
+quale licenza precisa è usata da una certa opera, occorre determinarla.
+</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
 <!--#if expr="$LANGUAGE_SUFFIX = /^.(es)$/" -->
 <!-- TRANSLATORS: translate if this word is used often in your
      language to refer to mobile computers; otherwise,
      fill the translation with a space. -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Terminal">&ldquo;Terminale&rdquo;</h3>
 
+<!-- GNUN-SORT-END-KEY -->
 <p>I telefoni cellulari e i tablet sono computer e deve essere possibile usarli
 come computer e con software libero. Chiamarli &ldquo;terminali&rdquo;
 potrebbe lasciare intendere che si possano usare solo per connettersi a
 server, che è un modo sbagliato di usare un computer.</p>
 
 <!--#endif -->
-<h3 id="Theft">&ldquo;Furto&rdquo;</h3>
-<p>
-I sostenitori di una forma troppo rigida e oppressiva di copyright spesso
-usano termini quali  "rubato" e "furto" per descrivere le infrazioni al
-copyright.  Questa è un'esagerazione, ma costoro vorrebbero che questa
-venisse considerata una verità oggettiva.</p>
-<p>
-Il sistema giuridico - almeno negli USA - non considera l'infrazione al
-diritto d'autore un "furto". Le leggi sui furti non si applicano alle
-infrazioni al diritto d'autore. I sostenitori di una forma oppressiva di
-copyright si  appellano a un'autorità... e presentano in maniera sbagliata
-quanto sostiene tale autorità.</p>
-<p>
-Come argomentazione, potete fare riferimento a questo <a
-href="http://www.guardian.co.uk/books/2013/may/04/harper-lee-kill-mockingbird-copyright";>
-caso reale</a> che mostra quello che potrebbe essere definito &ldquo;furto
-di copyright&rdquo;.</p>
-<p>
-La copia non autorizzata è proibita dalla legge sul copyright in molte
-circostanze (non tutte!), ma il fatto che sia proibita non la rende
-automaticamente sbagliata. In generale, le leggi non definiscono cose giuste
-e sbagliate, ma semplicemente applicano la giustizia. Se le leggi
-(l'applicazione) non rispettano le nostre idee di giusto e sbagliato (la
-specifica), allora le leggi dovrebbero essere cambiate.</p>
-
-<p>
-Un giudice statunitense, nell'ambito di un processo riguardante un caso di
-violazione del copyright, ha ammesso che <a
-href="http://torrentfreak.com/mpaa-banned-from-using-piracy-and-theft-terms-in-hotfile-trial-131129/";>&ldquo;pirateria&rdquo;
-e &ldquo;furto&rdquo; sono parole diffamatorie</a>.</p>
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="TrustedComputing">&ldquo;Trusted Computing (informatica 
fidata)&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 <a href="/philosophy/can-you-trust.html">&ldquo;Trusted computing
 (informatica fidata)&rdquo;</a> è il nome usato dai sostenitori per indicare
@@ -938,8 +1134,29 @@
 &ldquo;infido&rdquo;.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="SellSoftware">&ldquo;Vendere software&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
+<p>
+L'espressione "vendere software" è ambigua. In senso stretto,  scambiare la
+copia di un programma libero con una somma di denaro  significa <a
+href="/philosophy/selling.html"> vendere il programma</a>, il che è
+perfettamente accettabile, ma in genere si associa il termine "vendere
+software"  alle restrizioni proprietarie nel successivo utilizzo del
+software. Per essere più chiari, ed evitare confusione, si può  dire:
+"distribuire copie di un programma dietro pagamento" oppure  "imporre
+restrizioni proprietarie sull'uso di un programma".</p>
+<p>
+Vedere <a href="/philosophy/selling.html">Vendere Software  Libero</a> per
+altre discussioni sull'argomento.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Vendor">&ldquo;Venditore&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Per favore non usate il termine "venditore" per far  riferimento generico
 allo sviluppatore di un pacchetto software.  Molti programmi sono sviluppati
@@ -952,12 +1169,7 @@
 termine generico "fornitore".
 </p>
 
-<div class="announcement">
-<blockquote><p>Vedere anche <a href="/philosophy/categories.html">Categorie  
di Software
-Libero</a> e <a href="/philosophy/why-call-it-the-swindle.html">Perché lo
-chiamiamo Swindle</a>.</p></blockquote>
-</div>
-
+<!-- GNUN-SORT-STOP -->
 <hr />
 <blockquote id="fsfs"><p class="big">Questo testo è stato pubblicato in <a
 href="http://shop.fsf.org/product/free-software-free-society/";><cite>  Free
@@ -1042,7 +1254,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/03/27 21:28:35 $
+$Date: 2016/07/30 17:29:52 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/government-free-software.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/government-free-software.it-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- philosophy/po/government-free-software.it-en.html   2 Jan 2016 10:29:22 
-0000       1.31
+++ philosophy/po/government-free-software.it-en.html   30 Jul 2016 17:29:53 
-0000      1.32
@@ -86,7 +86,11 @@
 well as standardized ones.)  For example, they must not distribute
 audio or video recordings in formats that require Flash or nonfree
 codecs, and public libraries must not distribute works with Digital
-Restrictions Management.</p></li>
+Restrictions Management.</p>
+
+<p>To support the policy of distributing publications and works in
+freedom-respecting formats, the state must insist that all reports
+developed for it be delivered in freedom-respecting formats.</p></li>
 
 <li><p><b>Untie computers from licenses</b><br />
 Sale of computers must not require purchase of a proprietary
@@ -198,7 +202,7 @@
 restrictions prevent users from developing, installing and using
 replacements for any and all of the installed software that the
 manufacturer could upgrade.  This would apply, in particular, to any
-device on which &ldquo;jailbreaking&rdquo; is needed to install a
+device on which <a 
href="/proprietary/proprietary-jails.html">&ldquo;jailbreaking&rdquo;</a> is 
needed to install a
 different operating system, or in which the interfaces for some
 peripherals are secret.
 </p></li>
@@ -261,7 +265,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/01/02 10:29:22 $
+$Date: 2016/07/30 17:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/government-free-software.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/government-free-software.it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55

Index: philosophy/po/nonfree-games.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/nonfree-games.it-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/nonfree-games.it-en.html      1 Apr 2016 21:28:03 -0000       
1.2
+++ philosophy/po/nonfree-games.it-en.html      30 Jul 2016 17:29:53 -0000      
1.3
@@ -82,6 +82,12 @@
 Collective's <a 
href="http://libreplanet.org/wiki/Group:LibrePlanet_Gaming_Collective";>
 free gaming night.</a> </p>
 
+<h3>Notes</h3>
+
+<p>
+<a href="https://onpon4.github.io/other/gaming-trap/";>Watch out for
+&ldquo;nonfree game data&rdquo; that actually contains software.</a></p>
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -139,7 +145,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/04/01 21:28:03 $
+$Date: 2016/07/30 17:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/nonfree-games.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/nonfree-games.it.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- philosophy/po/nonfree-games.it.po   30 Jul 2016 16:22:35 -0000      1.9
+++ philosophy/po/nonfree-games.it.po   30 Jul 2016 17:29:53 -0000      1.10
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-07 05:25+0000\n"
 "Plural-Forms: nplurals=2; plural=(n != 1);\n"
 "X-Generator: Poedit 1.5.4\n"
 

Index: philosophy/po/open-source-misses-the-point.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.it-en.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- philosophy/po/open-source-misses-the-point.it-en.html       22 May 2016 
19:30:05 -0000      1.30
+++ philosophy/po/open-source-misses-the-point.it-en.html       30 Jul 2016 
17:29:53 -0000      1.31
@@ -141,7 +141,7 @@
 &ldquo;free software&rdquo; has some kind of semantic problem&mdash;and 
 this includes &ldquo;open source software.&rdquo;</p>
 
-<p>The <a href="https://opensource.org/definition/";>official definition of
+<p>The <a href="https://opensource.org/osd";>official definition of
 &ldquo;open source software&rdquo;</a> (which is published by the Open
 Source Initiative and is too long to include here) was derived
 indirectly from our criteria for free software.  It is not the same;
@@ -312,6 +312,12 @@
 certain free software, they might be able to &ldquo;sell&rdquo; the
 software more effectively to certain users, especially business.</p>
 
+<p>When open source proponents talk about anything deeper than that,
+it is usually the idea of making a &ldquo;gift&rdquo; of source code
+to humanity.  Presenting this as a special good deed, beyond what is
+morally required, presumes that distributing proprietary software
+without source code is morally legitimate.</p>
+
 <p>This approach has proved effective, in its own terms.  The rhetoric
 of open source has convinced many businesses and individuals to use,
 and even develop, free software, which has extended our
@@ -378,11 +384,11 @@
 <p>Thus, free software activists are well advised to decline to work
 on an activity that calls itself &ldquo;open.&rdquo;  Even if the
 activity is good in and of itself, each contribution you make does a
-little harm on the side.  There are plenty of other good activities
-which call themselves &ldquo;free&rdquo; or &ldquo;libre.&rdquo; Each
-contribution to those projects does a little extra good on the side.
-With so many useful projects to choose from, why not choose one
-which does extra good?</p>
+little harm on the side by promoting the open source idea.  There are
+plenty of other good activities which call themselves
+&ldquo;free&rdquo; or &ldquo;libre.&rdquo; Each contribution to those
+projects does a little extra good on the side.  With so many useful
+projects to choose from, why not choose one which does extra good?</p>
 
 <h3>Conclusion</h3>
 
@@ -453,7 +459,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:05 $
+$Date: 2016/07/30 17:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/open-source-misses-the-point.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/open-source-misses-the-point.it.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- philosophy/po/open-source-misses-the-point.it.po    30 Jul 2016 16:22:35 
-0000      1.71
+++ philosophy/po/open-source-misses-the-point.it.po    30 Jul 2016 17:29:53 
-0000      1.72
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-07 05:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -332,21 +331,7 @@
 "problema a livello semantico. Ed anche il termine  “software open source” 
"
 "rientra in questa categoria. "
 
-# | The <a [-href=\"https://opensource.org/definition/\";>official-]
-# | {+href=\"https://opensource.org/osd\";>official+} definition of &ldquo;open
-# | source software&rdquo;</a> (which is published by the Open Source
-# | Initiative and is too long to include here) was derived indirectly from
-# | our criteria for free software.  It is not the same; it is a little looser
-# | in some respects.  Nonetheless, their definition agrees with our
-# | definition in most cases.
-#. type: Content of: <p>
-#| msgid ""
-#| "The <a href=\"https://opensource.org/definition/\";>official definition of "
-#| "&ldquo;open source software&rdquo;</a> (which is published by the Open "
-#| "Source Initiative and is too long to include here) was derived indirectly "
-#| "from our criteria for free software.  It is not the same; it is a little "
-#| "looser in some respects.  Nonetheless, their definition agrees with our "
-#| "definition in most cases."
+#. type: Content of: <p>
 msgid ""
 "The <a href=\"https://opensource.org/osd\";>official definition of &ldquo;"
 "open source software&rdquo;</a> (which is published by the Open Source "
@@ -883,23 +868,7 @@
 "infittiscono la nebbia che nasconde gli ideali del movimento per il software "
 "libero."
 
-# | Thus, free software activists are well advised to decline to work on an
-# | activity that calls itself &ldquo;open.&rdquo; Even if the activity is
-# | good in and of itself, each contribution you make does a little harm on
-# | the [-side.-] {+side by promoting the open source idea.+}  There are
-# | plenty of other good activities which call themselves &ldquo;free&rdquo;
-# | or &ldquo;libre.&rdquo; Each contribution to those projects does a little
-# | extra good on the side.  With so many useful projects to choose from, why
-# | not choose one which does extra good?
-#. type: Content of: <p>
-#| msgid ""
-#| "Thus, free software activists are well advised to decline to work on an "
-#| "activity that calls itself &ldquo;open.&rdquo; Even if the activity is "
-#| "good in and of itself, each contribution you make does a little harm on "
-#| "the side.  There are plenty of other good activities which call "
-#| "themselves &ldquo;free&rdquo; or &ldquo;libre.&rdquo; Each contribution "
-#| "to those projects does a little extra good on the side.  With so many "
-#| "useful projects to choose from, why not choose one which does extra good?"
+#. type: Content of: <p>
 msgid ""
 "Thus, free software activists are well advised to decline to work on an "
 "activity that calls itself &ldquo;open.&rdquo; Even if the activity is good "

Index: philosophy/po/right-to-read.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.it-en.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/po/right-to-read.it-en.html      1 Apr 2016 21:28:03 -0000       
1.29
+++ philosophy/po/right-to-read.it-en.html      30 Jul 2016 17:29:53 -0000      
1.30
@@ -1,7 +1,13 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 <title>The Right to Read
 - GNU Project - Free Software Foundation</title>
+<style type="text/css" media="print,screen"><!--
+hr { margin: 1.2em 0; }
+#content ul li p { margin-top: 1em; }
+#AuthorsNote ul li { margin-top: 1.3em; }
+#content div.announcement { margin-bottom: 2em; }
+--></style>
 <!--#include virtual="/philosophy/po/right-to-read.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>The Right to Read</h2>
@@ -9,14 +15,11 @@
 <p>
 by <a href="http://www.stallman.org/";><strong>Richard Stallman</strong></a></p>
 
-<blockquote class="note">
-<p><a href="http://defectivebydesign.org/ebooks.html";>Join our mailing list 
about the dangers of eBooks</a>.</p>
-</blockquote>
-
 <p>
 <em>This article appeared in the February 1997 issue
-of <strong>Communications of the ACM</strong> (Volume 40, Number
+of <cite>Communications of the ACM</cite> (Volume 40, Number
 2).</em></p>
+<hr />
 
 <blockquote><p>
             From <cite>The Road To Tycho</cite>, a collection of
@@ -101,7 +104,7 @@
 the turn of the century.  But not only were they illegal, like
 debuggers&mdash;you could not install one if you had one, without
 knowing your computer's root password.  And neither
-the <abbr title="Federal Bureau of Investigation">FBI</abbr> nor
+the FBI nor
 Microsoft Support would tell you that.</p>
 
 <p>
@@ -151,87 +154,101 @@
 the long arm of the SPA.  When the Tycho Uprising began in 2062, the
 universal right to read soon became one of its central aims.</p>
 
+<div class="announcement">
+<blockquote>
+<p><a href="http://defectivebydesign.org/ebooks.html";>Join our mailing list 
about the dangers of eBooks</a>.</p>
+</blockquote>
+</div>
 
-<h3 id="AuthorsNote">Author's Notes</h3>
+<div id="AuthorsNote">
+<h3>Author's Notes</h3>
 
 <ul>
 <li>This story is supposedly a historical article that will be written in
 the future by someone else, describing Dan Halbert's youth under a
-repressive society shaped by the enemies that use &ldquo;pirate&rdquo; as
+repressive society shaped by the unjust forces that use &ldquo;pirate&rdquo; as
 propaganda. So it uses the terminology of that society.
-I have tried to project it from today so as to sound even more
+I have tried to project it forwards into something more visibly
 oppressive. See <a
 href="/philosophy/words-to-avoid.html#Piracy">&ldquo;Piracy&rdquo;</a>.
 </li>
 
 <li>
+<p>Computer-enforced restrictions on lending or reading books (and other
+kinds of published works) are known as DRM, short for
+&ldquo;Digital Restrictions Management&rdquo;.  To
+eliminate DRM, the Free Software Foundation has
+established the <a href="http://DefectiveByDesign.org";>Defective by
+Design</a> campaign.  We ask for your support.</p>
+</li>
+
+<li>
 <p>The following note has been updated several times since the first
 publication of the story.</p>
 
 <p>
-The right to read is a battle being fought today.  Although it may
-take 50 years for our present way of life to fade into obscurity, most
-of the specific laws and practices described above have already been
-proposed; many have been enacted into law in the US and elsewhere.  In
-the US, the 1998 Digital Millennium Copyright Act (DMCA) established the legal
-basis to restrict the reading and lending of computerized books (and
-other works as well).  The European Union imposed similar restrictions
-in a 2001 copyright directive.  In France, under the DADVSI law
-adopted in 2006, mere possession of a copy of DeCSS, the free program
-to decrypt video on a DVD, is a crime.</p>
-
-<p>
-In 2001, Disney-funded Senator Hollings proposed a bill called the
-SSSCA that would require every new computer to have mandatory
-copy-restriction facilities that the user cannot bypass.  Following
-the Clipper chip and similar US government key-escrow proposals, this
-shows a long-term trend: computer systems are increasingly set up to
-give absentees with clout control over the people actually using the
-computer system.  The SSSCA was later renamed to the unpronounceable
-CBDTPA, which was glossed as the &ldquo;Consume But Don't Try
-Programming Act&rdquo;.
-</p>
-
-<p>
-The Republicans took control of the US senate shortly thereafter.
-They are less tied to Hollywood than the Democrats, so they did not
-press these proposals.  Now that the Democrats are back in control,
-the danger is once again higher.</p>
-
-<p>
-In 2001 the US began attempting to use the proposed &ldquo;Free Trade&rdquo; 
Area of
-the Americas (FTAA) treaty to impose the same rules on all the countries in
-the Western Hemisphere.  The FTAA is one of the so-called free
-trade treaties, which are actually designed to give business
-increased power over democratic governments; imposing laws like the
-DMCA is typical of this spirit.  The FTAA was effectively killed by
-Lula, President of Brazil, who rejected the DMCA requirement and
-others.</p>
-
-<p>
-Since then, the US has imposed similar requirements on countries such
-as Australia and Mexico through bilateral &ldquo;free trade&rdquo;
-agreements, and on countries such as Costa Rica through another
-treaty, CAFTA.  Ecuador's President Correa refused to sign a
-&ldquo;free trade&rdquo; agreement with the US, but I've heard Ecuador
-had adopted something like the DMCA in 2003.</p>
+The battle for the right to read is already being fought.  Although it
+may take 50 years for our past freedoms to fade into obscurity, most
+of the specific repressive laws and practices described above have
+already been proposed; some have been enacted into law in the US and
+elsewhere.  In the US, the 1998 Digital Millennium Copyright Act
+(DMCA) gave explicit government backing to the
+computer-enforced restrictions known as DRM, by making the
+distribution of programs that can break DRM a crime.  The European
+Union imposed similar restrictions in a 2001 copyright directive, in a
+form not quite as strong.</p>
+
+<p>
+The US campaigns to impose such rules on the rest of the world through
+so-called &ldquo;free trade&rdquo; treaties.
+<a href="https://stallman.org/business-supremacy-treaties.html";>
+Business-supremacy treaties</a> is a more fitting term for them, since
+they are designed to give business dominion over nominally democratic
+states.  The DMCA's policy of criminalizing programs that
+break DRM is one of many unjust policies that these treaties impose
+across a wide range of fields.</p>
+
+<p>
+The US has imposed DMCA requirements on Australia, Panama, Colombia
+and South Korea through bilateral agreements, and on countries such as
+Costa Rica through another treaty, CAFTA.  Obama has escalated the
+campaign with two new proposed treaties, the TPP and the TTIP.  The
+TPP would impose the DMCA, along with many other wrongs, on 12
+countries on the Pacific Ocean.  The TTIP would impose similar
+strictures on Europe.  Americans should demand their congressional
+representatives reject the attempt to approve the TPP in the lame-duck
+session after the 2016 election.</p>
+
+<p>
+With Windows Vista, Microsoft admitted it had built in a back door:
+Microsoft can use it to forcibly install software
+&ldquo;upgrades,&rdquo; even if users consider them rather to be
+downgrades.  It can also order all machines running Vista to refuse to
+run a certain device driver.  The main purpose of Vista's clampdown on
+users was to impose DRM that users can't overcome.</p>
+
+<p>
+Even the World Wide Web Consortium has fallen under the shadow of the
+copyright industry; it is on the verge of approving a DRM system as an
+official part of the web specifications.</p>
+
+<p>
+Nonfree software tends to have <a href="/proprietary/">abusive
+features of many kinds</a>, which support the conclusion that
+<a href="/philosophy/free-software-even-more-important.html">you can
+never trust a nonfree program</a>.  We must insist on free (libre)
+software only, and reject nonfree programs.</p>
 
 <p>
 One of the ideas in the story was not proposed in reality until 2002.
-This is the idea that the <abbr>FBI</abbr> and Microsoft will keep the
+This is the idea that the FBI and Microsoft will keep the
 root passwords for your personal computers, and not let you have
 them.</p>
 
 <p>
-The proponents of this scheme have given it names such as
-&ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;.  We call
-it <a href="/philosophy/can-you-trust.html">&ldquo;treacherous
-computing&rdquo;</a> because the effect is to make your computer obey
-companies even to the extent of disobeying and defying you.  This was
-implemented in 2007 as part of <a href="http://badvista.org/";>Windows
-Vista</a>; we expect Apple to do something similar.  In this scheme,
-it is the manufacturer that keeps the secret code, but
-the <abbr>FBI</abbr> would have little trouble getting it.</p>
+The proponents of this scheme gave early versions names such as
+&ldquo;trusted computing&rdquo; and &ldquo;Palladium&rdquo;, but as
+ultimately put into use, it is called &ldquo;secure boot&rdquo;.</p>
 
 <p>
 What Microsoft keeps is not exactly a password in the traditional
@@ -239,34 +256,37 @@
 signature and encryption key that corresponds to a second key stored
 in your computer.  This enables Microsoft, and potentially any web
 sites that cooperate with Microsoft, the ultimate control over what
-the user can do on his own computer.</p>
-
-<p>
-Vista also gives Microsoft additional powers; for instance, Microsoft
-can forcibly install upgrades, and it can order all machines running
-Vista to refuse to run a certain device driver.  The main purpose of
-Vista's many restrictions is to impose DRM (Digital Restrictions
-Management) that users can't overcome.  The threat of DRM is why we
-have established the <a href="http://DefectiveByDesign.org";>
-Defective by Design</a> campaign.</p>
-
-<p>
-When this story was first written, the SPA was threatening small
-Internet service providers, demanding they permit the SPA to monitor
-all users.  Most ISPs surrendered when threatened, because they cannot
-afford to fight back in court.  One ISP, Community ConneXion in
-Oakland, California, refused the demand and was actually sued.  The
-SPA later dropped the suit, but obtained the DMCA, which gave them the
-power they sought.</p>
-
-<p>
-The SPA, which actually stands for Software Publishers Association,
-has been replaced in its police-like role by the Business
-Software Alliance.  The BSA is not, today, an official police force;
-unofficially, it acts like one.  Using methods reminiscent of the
-erstwhile Soviet Union, it invites people to inform on their coworkers
-and friends.  A BSA terror campaign in Argentina in 2001 made
-slightly veiled threats that people sharing software would be raped.</p>
+the user can do on per own computer.  Microsoft is likely to use that
+control on behalf of the FBI when asked: it
+already <a href="/proprietary/malware-microsoft.html">shows
+the NSA security bugs in Windows</a> to exploit.</p>
+
+<p>
+Secure boot can be implemented in a way that permits the user to
+specify the signature key and decide what software to sign.  In
+practice, PCs designed for Windows 10 carry only Microsoft's key, and
+whether the machine's owner can install any other system (such as
+GNU/Linux) is under Microsoft's control.  We call this <em>restricted
+boot</em>.</p>
+
+<p>
+In 1997, when this story was first published, the SPA was
+threatening small Internet service providers, demanding they permit
+the SPA to monitor all users.  Most ISPs surrendered when
+threatened, because they could not afford to fight back in court.  One
+ISP, Community ConneXion in Oakland, California, refused the demand
+and was actually sued.  The SPA later dropped the suit,
+but the DMCA gave it the power it sought.</p>
+
+<p>
+The SPA, which actually stands for Software Publishers
+Association, has been replaced in its police-like role by the Business
+Software Alliance.  The BSA is not, today, an official
+police force; unofficially, it acts like one.  Using methods
+reminiscent of the erstwhile Soviet Union, it invites people to inform
+on their coworkers and friends.  A BSA terror campaign in
+Argentina in 2001 made slightly veiled threats that people sharing
+software would be raped in prison.</p>
 
 <p>
 The university security policies described above are not imaginary.
@@ -291,32 +311,49 @@
 everyone to agree, in advance, to waive their rights under it.</p>
 </li>
 </ul>
+</div>
 
 <h3 id="BadNews">Bad News</h3>
 
 <p>
 The battle for the right to read is already in progress,
 The enemy is organized, while we are not, so it is going against us.
-Here are articles about bad things that have happened since the
-original publication of this article.</p>
+</p>
+
+<p>Today's commercial
+ebooks <a href="/philosophy/the-danger-of-ebooks.html"> abolish
+readers' traditional freedoms</a>.  Amazon's e-book reader product,
+which I call the &ldquo;Amazon Swindle&rdquo; because it's designed to
+swindle readers out of the traditional freedoms of readers of books,
+is run by software with several
+demonstrated <a href="/proprietary/malware-kindle-swindle.html">Orwellian
+functionalities</a>.  Any one of them calls for rejecting the product
+completely:</p>
 
 <ul>
-<li>Today's commercial ebooks <a href="/philosophy/the-danger-of-ebooks.html">
-     abolish readers' traditional freedoms.</a></li>
-<li><a href="http://www.nature.com/nature_education/biology.html";>
-     A "biology textbook" web site</a> that you can access only by signing
-     a <a href="http://www.nature.com/principles/viewTermsOfUse";>
-     contract not to lend it to anyone else</a>, which the publisher can
-     revoke at will.</li>
-<li><a 
href="http://www.zdnet.com/article/seybold-opens-chapter-on-digital-books/";>Electronic
-     Publishing:</a> An article about distribution of books in
-     electronic form, and copyright issues affecting the right to read
-     a copy.</li>
-<li><a 
href="http://www.microsoft.com/en-us/news/press/1999/Aug99/SeyboldPR.aspx";>Books
-     inside Computers:</a> Software to control who can read
-     books and documents on a PC.</li>
+<li><p>It spies on everything the user does: it reports which book the
+user is reading, and which page, and it reports when the user highlights
+text, and any notes the user enters.</p></li>
+
+<li><p>It has DRM, which is intended to block users from
+sharing copies.</p></li>
+
+<li><p>It has a back door with which Amazon can remotely erase any book.
+In 2009, it erased thousands of copies of 1984, by George Orwell.</p></li>
+
+<li><p>In case all that isn't Orwellian enough, there is a universal
+back door with which Amazon can remotely change the software, and
+introduce any other form of nastiness.</p></li>
 </ul>
 
+<p>Amazon's e-book distribution is oppressive, too.  It identifies the
+user and records what books the user obtains.  It also requires
+users to agree to an antisocial contract that they won't share copies
+with others.  My conscience tells me that, if I had agreed to such a
+contract, the lesser evil would be to defy it and share copies
+anyway; however, to be entirely good, we should not agree to it in the
+first place.</p>
+
 <p>If we want to stop the bad news and create some good news, we need
 to organize and fight.  The
 FSF's <a href="http://defectivebydesign.org";> Defective by Design</a>
@@ -422,7 +459,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/04/01 21:28:03 $
+$Date: 2016/07/30 17:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/right-to-read.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/right-to-read.it.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- philosophy/po/right-to-read.it.po   30 Jul 2016 16:22:35 -0000      1.96
+++ philosophy/po/right-to-read.it.po   30 Jul 2016 17:29:53 -0000      1.97
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-30 09:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 # type: Content of: <title>
@@ -36,13 +35,7 @@
 "di <a href=\"http://www.stallman.org/\";><strong>Richard Stallman</strong></a>"
 
 # type: Content of: <p>
-# | <em>This article appeared in the February 1997 issue of
-# | [-<strong>Communications-] {+<cite>Communications+} of the
-# | [-ACM</strong>-] {+ACM</cite>+} (Volume 40, Number 2).</em>
-#. type: Content of: <p>
-#| msgid ""
-#| "<em>This article appeared in the February 1997 issue of "
-#| "<strong>Communications of the ACM</strong> (Volume 40, Number 2).</em>"
+#. type: Content of: <p>
 msgid ""
 "<em>This article appeared in the February 1997 issue of <cite>Communications "
 "of the ACM</cite> (Volume 40, Number 2).</em>"
@@ -209,24 +202,7 @@
 "che lo confinava unicamente all'uso per gli esercizi in classe."
 
 # type: Content of: <p>
-# | It was also possible to bypass the copyright monitors by installing a
-# | modified system kernel.  Dan would eventually find out about the free
-# | kernels, even entire free operating systems, that had existed around the
-# | turn of the century.  But not only were they illegal, like
-# | debuggers&mdash;you could not install one if you had one, without knowing
-# | your computer's root password.  And neither the [-<abbr title=\"Federal
-# | Bureau of Investigation\">FBI</abbr>-] {+FBI+} nor Microsoft Support would
-# | tell you that.
-#. type: Content of: <p>
-#| msgid ""
-#| "It was also possible to bypass the copyright monitors by installing a "
-#| "modified system kernel.  Dan would eventually find out about the free "
-#| "kernels, even entire free operating systems, that had existed around the "
-#| "turn of the century.  But not only were they illegal, like "
-#| "debuggers&mdash;you could not install one if you had one, without knowing "
-#| "your computer's root password.  And neither the <abbr title=\"Federal "
-#| "Bureau of Investigation\">FBI</abbr> nor Microsoft Support would tell you "
-#| "that."
+#. type: Content of: <p>
 msgid ""
 "It was also possible to bypass the copyright monitors by installing a "
 "modified system kernel.  Dan would eventually find out about the free "
@@ -356,21 +332,7 @@
 msgid "Author's Notes"
 msgstr "Note dell'autore"
 
-# | This story is supposedly a historical article that will be written in the
-# | future by someone else, describing Dan Halbert's youth under a repressive
-# | society shaped by the [-enemies-] {+unjust forces+} that use
-# | &ldquo;pirate&rdquo; as propaganda. So it uses the terminology of that
-# | society.  I have tried to project it [-from today so as to sound even-]
-# | {+forwards into something+} more {+visibly+} oppressive. See <a
-# | href=\"/philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>.
 #. type: Content of: <div><ul><li>
-#| msgid ""
-#| "This story is supposedly a historical article that will be written in the "
-#| "future by someone else, describing Dan Halbert's youth under a repressive "
-#| "society shaped by the enemies that use &ldquo;pirate&rdquo; as "
-#| "propaganda. So it uses the terminology of that society.  I have tried to "
-#| "project it from today so as to sound even more oppressive. See <a href=\"/"
-#| "philosophy/words-to-avoid.html#Piracy\">&ldquo;Piracy&rdquo;</a>."
 msgid ""
 "This story is supposedly a historical article that will be written in the "
 "future by someone else, describing Dan Halbert's youth under a repressive "
@@ -411,33 +373,7 @@
 "storia."
 
 # type: Content of: <p>
-# | The {+battle for the+} right to read is [-a battle-] {+already+} being
-# | [-fought today.-] {+fought.+}  Although it may take 50 years for our
-# | [-present way of life-] {+past freedoms+} to fade into obscurity, most of
-# | the specific {+repressive+} laws and practices described above have
-# | already been proposed; [-many-] {+some+} have been enacted into law in the
-# | US and elsewhere.  In the US, the 1998 Digital Millennium Copyright Act
-# | (DMCA) [-established the legal basis-] {+gave explicit government
-# | backing+} to [-restrict-] the [-reading and lending of computerized books
-# | (and other works-] {+computer-enforced restrictions known+} as [-well).-]
-# | {+DRM, by making the distribution of programs that can break DRM a
-# | crime.+}  The European Union imposed similar restrictions in a 2001
-# | copyright [-directive.  In France, under the DADVSI law adopted-]
-# | {+directive,+} in [-2006, mere possession of-] a [-copy of DeCSS, the free
-# | program to decrypt video on a DVD, is a crime.-] {+form not quite as
-# | strong.+}
-#. type: Content of: <div><ul><li><p>
-#| msgid ""
-#| "The right to read is a battle being fought today.  Although it may take "
-#| "50 years for our present way of life to fade into obscurity, most of the "
-#| "specific laws and practices described above have already been proposed; "
-#| "many have been enacted into law in the US and elsewhere.  In the US, the "
-#| "1998 Digital Millennium Copyright Act (DMCA) established the legal basis "
-#| "to restrict the reading and lending of computerized books (and other "
-#| "works as well).  The European Union imposed similar restrictions in a "
-#| "2001 copyright directive.  In France, under the DADVSI law adopted in "
-#| "2006, mere possession of a copy of DeCSS, the free program to decrypt "
-#| "video on a DVD, is a crime."
+#. type: Content of: <div><ul><li><p>
 msgid ""
 "The battle for the right to read is already being fought.  Although it may "
 "take 50 years for our past freedoms to fade into obscurity, most of the "
@@ -535,15 +471,7 @@
 "programma non libero</a>.  Dobbiamo respingere i programmi non liberi."
 
 # type: Content of: <p>
-# | One of the ideas in the story was not proposed in reality until 2002.
-# | This is the idea that the [-<abbr>FBI</abbr>-] {+FBI+} and Microsoft will
-# | keep the root passwords for your personal computers, and not let you have
-# | them.
-#. type: Content of: <div><ul><li><p>
-#| msgid ""
-#| "One of the ideas in the story was not proposed in reality until 2002.  "
-#| "This is the idea that the <abbr>FBI</abbr> and Microsoft will keep the "
-#| "root passwords for your personal computers, and not let you have them."
+#. type: Content of: <div><ul><li><p>
 msgid ""
 "One of the ideas in the story was not proposed in reality until 2002.  This "
 "is the idea that the FBI and Microsoft will keep the root passwords for your "
@@ -564,23 +492,7 @@
 "come &ldquo;secure boot&rdquo;."
 
 # type: Content of: <p>
-# | What Microsoft keeps is not exactly a password in the traditional sense;
-# | no person ever types it on a terminal.  Rather, it is a signature and
-# | encryption key that corresponds to a second key stored in your computer.
-# | This enables Microsoft, and potentially any web sites that cooperate with
-# | Microsoft, the ultimate control over what the user can do on [-his-]
-# | {+per+} own computer.  {+Microsoft is likely to use that control on behalf
-# | of the FBI when asked: it already <a
-# | href=\"/proprietary/malware-microsoft.html\">shows the NSA security bugs
-# | in Windows</a> to exploit.+}
-#. type: Content of: <div><ul><li><p>
-#| msgid ""
-#| "What Microsoft keeps is not exactly a password in the traditional sense; "
-#| "no person ever types it on a terminal.  Rather, it is a signature and "
-#| "encryption key that corresponds to a second key stored in your computer.  "
-#| "This enables Microsoft, and potentially any web sites that cooperate with "
-#| "Microsoft, the ultimate control over what the user can do on his own "
-#| "computer."
+#. type: Content of: <div><ul><li><p>
 msgid ""
 "What Microsoft keeps is not exactly a password in the traditional sense; no "
 "person ever types it on a terminal.  Rather, it is a signature and "
@@ -615,23 +527,7 @@
 "controllo di Microsoft. Noi lo chiamiamo <em>restricted boot</em>."
 
 # type: Content of: <p>
-# | [-When-]{+In 1997, when+} this story was first [-written,-] {+published,+}
-# | the SPA was threatening small Internet service providers, demanding they
-# | permit the SPA to monitor all users.  Most ISPs surrendered when
-# | threatened, because they [-cannot-] {+could not+} afford to fight back in
-# | court.  One ISP, Community ConneXion in Oakland, California, refused the
-# | demand and was actually sued.  The SPA later dropped the suit, but
-# | [-obtained-] the [-DMCA, which-] {+DMCA+} gave [-them-] {+it+} the power
-# | [-they-] {+it+} sought.
-#. type: Content of: <div><ul><li><p>
-#| msgid ""
-#| "When this story was first written, the SPA was threatening small Internet "
-#| "service providers, demanding they permit the SPA to monitor all users.  "
-#| "Most ISPs surrendered when threatened, because they cannot afford to "
-#| "fight back in court.  One ISP, Community ConneXion in Oakland, "
-#| "California, refused the demand and was actually sued.  The SPA later "
-#| "dropped the suit, but obtained the DMCA, which gave them the power they "
-#| "sought."
+#. type: Content of: <div><ul><li><p>
 msgid ""
 "In 1997, when this story was first published, the SPA was threatening small "
 "Internet service providers, demanding they permit the SPA to monitor all "
@@ -649,22 +545,7 @@
 "loro il potere che cercavano."
 
 # type: Content of: <p>
-# | The SPA, which actually stands for Software Publishers Association, has
-# | been replaced in its police-like role by the Business Software Alliance.
-# | The BSA is not, today, an official police force; unofficially, it acts
-# | like one.  Using methods reminiscent of the erstwhile Soviet Union, it
-# | invites people to inform on their coworkers and friends.  A BSA terror
-# | campaign in Argentina in 2001 made slightly veiled threats that people
-# | sharing software would be [-raped.-] {+raped in prison.+}
-#. type: Content of: <div><ul><li><p>
-#| msgid ""
-#| "The SPA, which actually stands for Software Publishers Association, has "
-#| "been replaced in its police-like role by the Business Software Alliance.  "
-#| "The BSA is not, today, an official police force; unofficially, it acts "
-#| "like one.  Using methods reminiscent of the erstwhile Soviet Union, it "
-#| "invites people to inform on their coworkers and friends.  A BSA terror "
-#| "campaign in Argentina in 2001 made slightly veiled threats that people "
-#| "sharing software would be raped."
+#. type: Content of: <div><ul><li><p>
 msgid ""
 "The SPA, which actually stands for Software Publishers Association, has been "
 "replaced in its police-like role by the Business Software Alliance.  The BSA "
@@ -733,16 +614,7 @@
 msgid "Bad News"
 msgstr "Cattive notizie"
 
-# | The battle for the right to read is already in progress, The enemy is
-# | organized, while we are not, so it is going against us.  [-Here are
-# | articles about bad things that have happened since the original
-# | publication of this article.-]
-#. type: Content of: <p>
-#| msgid ""
-#| "The battle for the right to read is already in progress, The enemy is "
-#| "organized, while we are not, so it is going against us.  Here are "
-#| "articles about bad things that have happened since the original "
-#| "publication of this article."
+#. type: Content of: <p>
 msgid ""
 "The battle for the right to read is already in progress, The enemy is "
 "organized, while we are not, so it is going against us."

Index: philosophy/po/surveillance-vs-democracy.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/po/surveillance-vs-democracy.it-en.html  22 May 2016 19:30:05 
-0000      1.19
+++ philosophy/po/surveillance-vs-democracy.it-en.html  30 Jul 2016 17:29:53 
-0000      1.20
@@ -246,14 +246,15 @@
 who they talk with.</p>
 
 <p>Internet-connected cameras often have lousy digital security
-themselves, so <a
-href="http://www.networkworld.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html";>anyone
-could watch what the camera sees</a>.  To restore privacy, we should
-ban the use of Internet-connected cameras aimed where and when the
-public is admitted, except when carried by people.  Everyone must be
-free to post photos and video recordings occasionally, but the
-systematic accumulation of such data on the Internet must be
-limited.</p>
+themselves, which
+means <a 
href="http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances";>anyone
+can watch what those cameras see</a>.  This makes internet-connected
+cameras a major threat to security as well as privacy.  For privacy's
+sake, we should ban the use of Internet-connected cameras aimed where
+and when the public is admitted, except when carried by people.
+Everyone must be free to post photos and video recordings
+occasionally, but the systematic accumulation of such data on the
+Internet must be limited.</p>
 
 <p><a name="privatespace"><b>*</b></a>I assume here that the security
 camera points at the inside of a store, or at the street.  Any camera
@@ -528,7 +529,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:05 $
+$Date: 2016/07/30 17:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/surveillance-vs-democracy.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/surveillance-vs-democracy.it.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- philosophy/po/surveillance-vs-democracy.it.po       30 Jul 2016 16:22:35 
-0000      1.69
+++ philosophy/po/surveillance-vs-democracy.it.po       30 Jul 2016 17:29:53 
-0000      1.70
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-07 05:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -535,28 +534,7 @@
 "sospetti vengano seguiti per le strade costantemente per scoprire con chi "
 "parlano."
 
-# | Internet-connected cameras often have lousy digital security themselves,
-# | [-so-] {+which means+} <a
-# | 
[-href=\"http://www.networkworld.com/article/2221934/microsoft-subnet/cia-wants-to-spy-on-you-through-your-appliances.html\";>anyone
-# | could-]
-# | 
{+href=\"http://www.networkworld.com/community/blog/cia-wants-spy-you-through-your-appliances\";>anyone
-# | can+} watch what [-the camera sees</a>.  To restore privacy,-] {+those
-# | cameras see</a>.  This makes internet-connected cameras a major threat to
-# | security as well as privacy.  For privacy's sake,+} we should ban the use
-# | of Internet-connected cameras aimed where and when the public is admitted,
-# | except when carried by people.  Everyone must be free to post photos and
-# | video recordings occasionally, but the systematic accumulation of such
-# | data on the Internet must be limited.
-#. type: Content of: <p>
-#| msgid ""
-#| "Internet-connected cameras often have lousy digital security themselves, "
-#| "so <a href=\"http://www.networkworld.com/article/2221934/microsoft-subnet/";
-#| "cia-wants-to-spy-on-you-through-your-appliances.html\">anyone could watch "
-#| "what the camera sees</a>.  To restore privacy, we should ban the use of "
-#| "Internet-connected cameras aimed where and when the public is admitted, "
-#| "except when carried by people.  Everyone must be free to post photos and "
-#| "video recordings occasionally, but the systematic accumulation of such "
-#| "data on the Internet must be limited."
+#. type: Content of: <p>
 msgid ""
 "Internet-connected cameras often have lousy digital security themselves, "
 "which means <a href=\"http://www.networkworld.com/community/blog/cia-wants-";

Index: philosophy/po/when-free-software-isnt-practically-superior.it-en.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/when-free-software-isnt-practically-superior.it-en.html,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/when-free-software-isnt-practically-superior.it-en.html       
7 Dec 2015 00:28:33 -0000       1.2
+++ philosophy/po/when-free-software-isnt-practically-superior.it-en.html       
30 Jul 2016 17:29:53 -0000      1.3
@@ -5,6 +5,9 @@
 <!--#include virtual="/server/banner.html" -->
 <h2> When Free Software Isn't (Practically) Superior</h2>
 
+<p>
+by <a href="https://mako.cc/writing/";><strong>Benjamin Mako 
Hill</strong></a></p>
+
 <p>The Open Source Initiative's mission statement reads, &ldquo;Open source
 is a development method for software that harnesses the power of
 distributed peer review and transparency of process. The promise of
@@ -177,7 +180,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/12/07 00:28:33 $
+$Date: 2016/07/30 17:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/when-free-software-isnt-practically-superior.it.po
===================================================================
RCS file: 
/web/www/www/philosophy/po/when-free-software-isnt-practically-superior.it.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- philosophy/po/when-free-software-isnt-practically-superior.it.po    30 Jul 
2016 16:22:35 -0000      1.12
+++ philosophy/po/when-free-software-isnt-practically-superior.it.po    30 Jul 
2016 17:29:53 -0000      1.13
@@ -16,7 +16,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-07-23 05:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -31,14 +30,7 @@
 msgid "When Free Software Isn't (Practically) Superior"
 msgstr "A volte il software libero non è (nei fatti) superiore"
 
-# | by <a [-href=\"http://www.stallman.org/\";><strong>Richard
-# | Stallman</strong></a>-]
-# | {+href=\"https://mako.cc/writing/\";><strong>Benjamin Mako
-# | Hill</strong></a>+}
-#. type: Content of: <p>
-#| msgid ""
-#| "by <a href=\"http://www.stallman.org/\";><strong>Richard Stallman</"
-#| "strong></a>"
+#. type: Content of: <p>
 msgid ""
 "by <a href=\"https://mako.cc/writing/\";><strong>Benjamin Mako Hill</strong></"
 "a>"

Index: philosophy/po/who-does-that-server-really-serve.it-en.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/who-does-that-server-really-serve.it-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- philosophy/po/who-does-that-server-really-serve.it-en.html  8 Feb 2016 
21:05:14 -0000       1.6
+++ philosophy/po/who-does-that-server-really-serve.it-en.html  30 Jul 2016 
17:29:53 -0000      1.7
@@ -18,14 +18,20 @@
 lose your freedom.  Service as a Software Substitute, or SaaSS, is
 another way to give someone else power over your computing.</strong></p>
 
-SaaSS means using a service implemented by someone else as a
+<p>The basic point is, you can have control over a program someone else
+wrote (if it's free), but you can never have control over a service
+someone else runs, so never use a service where in principle a program
+would do.</p>
+
+
+<p>SaaSS means using a service implemented by someone else as a
 substitute for running your copy of a program.  The term is ours;
 articles and ads won't use it, and they won't tell you whether a
 service is SaaSS.  Instead they will probably use the vague and
 distracting term &ldquo;cloud&rdquo;, which lumps SaaSS together with
 various other practices, some abusive and some ok.  With the
 explanation and examples in this page, you can tell whether a service
-is SaaSS.
+is SaaSS.</p>
 
 <h3>Background: How Proprietary Software Takes Away Your Freedom</h3>
 
@@ -454,7 +460,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/02/08 21:05:14 $
+$Date: 2016/07/30 17:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/who-does-that-server-really-serve.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/who-does-that-server-really-serve.it.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- philosophy/po/who-does-that-server-really-serve.it.po       30 Jul 2016 
16:22:35 -0000      1.25
+++ philosophy/po/who-does-that-server-really-serve.it.po       30 Jul 2016 
17:29:53 -0000      1.26
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-07 05:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -111,11 +110,11 @@
 msgid ""
 "Our solution to this problem is developing <em>free software</em> and "
 "rejecting proprietary software.  Free software means that you, as a user, "
-"have four essential freedoms: (0)&nbsp;to run the program as you wish, "
-"(1)&nbsp;to study and change the source code so it does what you wish, "
-"(2)&nbsp;to redistribute exact copies, and (3)&nbsp;to redistribute copies "
-"of your modified versions.  (See the <a href=\"/philosophy/free-sw.html"
-"\">free software definition</a>.)"
+"have four essential freedoms: (0)&nbsp;to run the program as you wish, (1)"
+"&nbsp;to study and change the source code so it does what you wish, (2)&nbsp;"
+"to redistribute exact copies, and (3)&nbsp;to redistribute copies of your "
+"modified versions.  (See the <a href=\"/philosophy/free-sw.html\">free "
+"software definition</a>.)"
 msgstr ""
 "La nostra soluzione a questo problema è di sviluppare <em>software libero</"
 "em> e di rifiutare il software proprietario. Software libero significa che "

Index: philosophy/po/words-to-avoid.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it-en.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- philosophy/po/words-to-avoid.it-en.html     27 Mar 2016 21:28:35 -0000      
1.76
+++ philosophy/po/words-to-avoid.it-en.html     30 Jul 2016 17:29:53 -0000      
1.77
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 <title>Words to Avoid (or Use with Care) Because They Are Loaded or Confusing
 - GNU Project - Free Software Foundation</title>
 <!--#include virtual="/philosophy/po/words-to-avoid.translist" -->
@@ -14,116 +14,119 @@
 
 <div class="announcement">
 <blockquote><p>Also note <a href="/philosophy/categories.html">Categories of 
Free
-Software</a>
-and <a href="/philosophy/why-call-it-the-swindle.html">Why Call It The
+Software</a>,
+<a href="/philosophy/why-call-it-the-swindle.html">Why Call It The
 Swindle?</a></p></blockquote>
 </div>
 
-<p>
-  <a href="/philosophy/philosophy.html">Other Texts to Read</a>
-|<span class="gnun-split"></span> &ldquo;<a
+<p><span class="gnun-split"></span><!-- GNUN-SORT-START --> &ldquo;<a
        href="#Ad-blocker">Ad-blocker</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Access">Access</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Alternative">Alternative</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#BSD-style">BSD-style</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Closed">Closed</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#CloudComputing">Cloud Computing</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Commercial">Commercial</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Compensation">Compensation</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Consume">Consume</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Consumer">Consumer</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Content">Content</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#CreativeCommonsLicensed">Creative Commons licensed</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Creator">Creator</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#DigitalGoods">Digital Goods</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#DigitalLocks">Digital Locks</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#DigitalRightsManagement">Digital Rights Management</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Ecosystem">Ecosystem</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#FLOSS">FLOSS</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#ForFree">For free</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#FOSS">FOSS</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#FreelyAvailable">Freely available</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Freeware">Freeware</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#GiveAwaySoftware">Give away software</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Google">Google</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Hacker">Hacker</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#IntellectualProperty">Intellectual property</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#LAMP">LAMP system</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Linux">Linux system</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Market">Market</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Monetize">Monetize</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#MP3Player">MP3 player</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Open">Open</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#PC">PC</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Photoshop">Photoshop</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Piracy">Piracy</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#PowerPoint">PowerPoint</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Protection">Protection</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#RAND">RAND</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#SaaS">SaaS</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#SellSoftware">Sell software</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#SharingEconomy">Sharing economy</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Skype">Skype</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#SoftwareIndustry">Software Industry</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#SourceModel">Source model</a>&rdquo;
-|<span class="gnun-split"></span><!--#if expr="$LANGUAGE_SUFFIX        = 
/^.(es)$/" -->
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM -->
+<!--#if expr="$LANGUAGE_SUFFIX = /^.(es)$/" -->
 <!-- TRANSLATORS: translate if this word is used often in your
      language to refer to mobile computers; otherwise,
      fill the translation with a space. -->
-&ldquo;<a
+<!-- GNUN-SORT-BEGIN-KEY -->&ldquo;<a
        href="#Terminal">Terminal</a>&rdquo;
-|<span class="gnun-split"></span><!--#endif --> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-END-KEY --><!--#endif
+ --><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Theft">Theft</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#TrustedComputing">Trusted Computing</a>&rdquo;
-|<span class="gnun-split"></span> &ldquo;<a
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Vendor">Vendor</a>&rdquo;
-</p>
+<span class="gnun-split"></span><!-- GNUN-SORT-STOP --></p>
 
+<!-- GNUN-SORT-START -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Ad-blocker">&ldquo;Ad-blocker&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 When the purpose of some program is to block advertisements,
 &ldquo;ad-blocker&rdquo; is a good term for it.  However, the GNU
@@ -132,7 +135,10 @@
 This is not an &ldquo;ad-blocker,&rdquo; this is
 <em>surveillance protection</em>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Access">&ldquo;Access&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 It is a common misunderstanding to think free software means that the
 public has &ldquo;access&rdquo; to a program.  That is not what free
@@ -163,7 +169,10 @@
 applies to the special case in which the user already has a copy of
 the program in non-source form.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Alternative">&ldquo;Alternative&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 We don't describe free software as an &ldquo;alternative&rdquo; to
 proprietary, because that word presumes all the &ldquo;alternatives&rdquo; are
@@ -181,7 +190,10 @@
 software.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="BSD-style">&ldquo;BSD-style&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The expression &ldquo;BSD-style license&rdquo; leads to confusion because it
 <a href="/licenses/bsd.html">lumps together licenses that have
@@ -194,8 +206,10 @@
 name <a href="/licenses/license-list.html"> the specific license in
 question</a> and avoid the vague term &ldquo;BSD-style.&rdquo;</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Closed">&ldquo;Closed&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Describing nonfree software as &ldquo;closed&rdquo; clearly refers to
 the term &ldquo;open source.&rdquo;  In the free software movement,
@@ -207,8 +221,10 @@
 <a href="/philosophy/categories.html#ProprietarySoftware">
 &ldquo;proprietary&rdquo;</a>.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="CloudComputing">&ldquo;Cloud Computing&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The term &ldquo;cloud computing&rdquo; (or
 just <a name="Cloud">&ldquo;cloud&rdquo;</a>, in the context of
@@ -280,7 +296,10 @@
 developer, he isn't motivated by the same ideals as we are.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Commercial">&ldquo;Commercial&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Please don't use &ldquo;commercial&rdquo; as a synonym for
 &ldquo;nonfree.&rdquo; That confuses two entirely different
@@ -307,7 +326,10 @@
 to use the word &ldquo;commercial&rdquo; in that way.</p>
 
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Compensation">&ldquo;Compensation&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 To speak of &ldquo;compensation for authors&rdquo; in connection with
 copyright carries the assumptions that (1) copyright exists for the
@@ -324,7 +346,10 @@
 same publishing companies that are pushing unjust laws on us.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Consume">&ldquo;Consume&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 &ldquo;Consume&rdquo; refers to what we do with food: we ingest it,
 after which the food as such no longer exists.  By analogy, we employ
@@ -378,7 +403,10 @@
 
 <p>See also the following entry.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Consumer">&ldquo;Consumer&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The term &ldquo;consumer,&rdquo; when used to refer to the users of
 computing, is loaded with assumptions we should reject.  Some come
@@ -403,7 +431,10 @@
 been <a 
href="http://www.theguardian.com/commentisfree/2013/aug/11/capitalism-language-raymond-williams";>noted
 before</a>.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Content">&ldquo;Content&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 If you want to describe a feeling of comfort and satisfaction, by all
 means say you are &ldquo;content,&rdquo; but using the word as a
@@ -441,8 +472,10 @@
 on a web site.  For that, we recommend the term &ldquo;web site revision
 system&rdquo; (WRS).</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="CreativeCommonsLicensed">&ldquo;Creative Commons licensed&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The most important licensing characteristic of a work is whether it is
 free.  Creative Commons publishes seven licenses; three are free
@@ -461,7 +494,10 @@
 statement.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Creator">&ldquo;Creator&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The term &ldquo;creator&rdquo; as applied to authors implicitly
 compares them to a deity (&ldquo;the creator&rdquo;).  The term is
@@ -473,8 +509,10 @@
 terms are not equivalent: often the copyright holder is not the
 author.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="DigitalGoods">&ldquo;Digital Goods&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The term &ldquo;digital goods,&rdquo; as applied to copies of works of
 authorship, identifies them with physical goods&mdash;which cannot be
@@ -484,8 +522,10 @@
 physical goods.  It also frames issues in terms of economics, whose
 shallow and limited values don't include freedom and community.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="DigitalLocks">&ldquo;Digital Locks&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 &ldquo;Digital locks&rdquo; is used to refer to Digital Restrictions
 Management by some who criticize it.  The problem with this term is
@@ -512,8 +552,10 @@
 substance; however, when we state our support, we conspicuously
 replace the term with &ldquo;digital handcuffs&rdquo; and say why.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="DigitalRightsManagement">&ldquo;Digital Rights Management&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 &ldquo;Digital Rights Management&rdquo; (abbreviated
 &ldquo;DRM&rdquo;) refers to technical mechanisms designed to impose
@@ -529,7 +571,10 @@
 Please sign up to support our <a href="http://DefectiveByDesign.org/";>
 campaign to abolish DRM</a>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Ecosystem">&ldquo;Ecosystem&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 It is inadvisable to describe the free software community, or any human
 community, as an &ldquo;ecosystem,&rdquo; because that word implies
@@ -555,7 +600,10 @@
 freedom.
 </p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="FLOSS">&ldquo;FLOSS&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The term &ldquo;FLOSS,&rdquo; meaning &ldquo;Free/Libre and Open
 Source Software,&rdquo; was coined as a way
@@ -564,7 +612,10 @@
 &ldquo;FLOSS&rdquo; is the best way to be neutral.  But if you want to
 show you stand for freedom, don't use a neutral term.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="ForFree">&ldquo;For free&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 If you want to say that a program is free software, please don't say
 that it is available &ldquo;for free.&rdquo; That term specifically
@@ -580,7 +631,10 @@
 To avoid confusion, you can say that the program is available
 &ldquo;as free software.&rdquo;</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="FOSS">&ldquo;FOSS&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The term &ldquo;FOSS,&rdquo; meaning &ldquo;Free and Open Source
 Software,&rdquo; was coined as a way
@@ -589,7 +643,10 @@
 neutrality is your goal, &ldquo;FLOSS&rdquo; is better.  But if you
 want to show you stand for freedom, don't use a neutral term.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="FreelyAvailable">&ldquo;Freely available&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Don't use &ldquo;freely available software&rdquo; as a synonym for &ldquo;free
 software.&rdquo; The terms are not equivalent.  Software is &ldquo;freely
@@ -598,8 +655,10 @@
 a copy of it.  These are answers to different questions.
 </p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Freeware">&ldquo;Freeware&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Please don't use the term &ldquo;freeware&rdquo; as a synonym for
 &ldquo;free software.&rdquo; The term &ldquo;freeware&rdquo; was used
@@ -622,8 +681,10 @@
 it says, they will really understand what the issue is.
 </p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="GiveAwaySoftware">&ldquo;Give away software&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 It's misleading to use the term &ldquo;give away&rdquo; to mean
 &ldquo;distribute a program as free software.&rdquo;
@@ -632,8 +693,10 @@
 freedom.  One way to avoid the confusion is to say &ldquo;release as
 free software.&rdquo;</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Google">&ldquo;Google&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Please avoid using the term &ldquo;google&rdquo; as a verb, meaning to
 search for something on the internet. &ldquo;Google&rdquo; is just the
@@ -643,8 +706,10 @@
 privacy; <a href="https://duckduckgo.com/";>DuckDuckGo</a> claims not
 to track its users, although we cannot confirm.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Hacker">&ldquo;Hacker&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 A hacker is someone
 who <a href="http://stallman.org/articles/on-hacking.html";> enjoys
@@ -659,8 +724,10 @@
 Please don't spread this mistake.
 People who break security are &ldquo;crackers.&rdquo;</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="IntellectualProperty">&ldquo;Intellectual property&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Publishers and lawyers like to describe copyright as
 &ldquo;intellectual property&rdquo;&mdash;a term also applied to
@@ -689,8 +756,10 @@
 starting to make the World &ldquo;Intellectual Property&rdquo;
 Organization embarrassed</a>.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="LAMP">&ldquo;LAMP system&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 &ldquo;LAMP&rdquo; stands for &ldquo;Linux, Apache, MySQL and
 PHP&rdquo;&mdash;a common combination of software to use on a web
@@ -700,8 +769,10 @@
 PHP.&rdquo;
 </p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Linux">&ldquo;Linux system&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Linux is the name of the kernel that Linus Torvalds developed starting
 in 1991.  The operating system in which Linux is used is basically GNU
@@ -712,8 +783,10 @@
 kernel alone.
 </p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Market">&ldquo;Market&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 It is misleading to describe the users of free software, or the
 software users in general, as a &ldquo;market.&rdquo;</p>
@@ -731,8 +804,10 @@
 efforts for mere success is to deny the importance of freedom
 and legitimize proprietary software.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Monetize">&ldquo;Monetize&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The proper definition of &ldquo;monetize&rdquo; is &ldquo;to use
 something as currency.&rdquo; For instance, human societies have
@@ -751,8 +826,10 @@
 subordinates all else to profit, it is not likely to remain
 ethical.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="MP3Player">&ldquo;MP3 Player&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 In the late 1990s it became feasible to make portable, solid-state
 digital audio players. Most support the patented MP3 codec, but not
@@ -763,8 +840,10 @@
 We suggest the terms &ldquo;digital audio player,&rdquo;
 or simply &ldquo;audio player&rdquo; if context permits.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Open">&ldquo;Open&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Please avoid using the term &ldquo;open&rdquo; or &ldquo;open
 source&rdquo; as a substitute for &ldquo;free software.&rdquo;  Those terms
@@ -779,7 +858,10 @@
 software, or our views&mdash;that leads people to suppose our views
 are similar to theirs.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="PC">&ldquo;PC&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 It's OK to use the abbreviation &ldquo;PC&rdquo; to refer to a certain
 kind of computer hardware, but please don't use it with the
@@ -790,7 +872,10 @@
 The term &ldquo;WC&rdquo; has been suggested for a computer running
 Windows.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Photoshop">&ldquo;Photoshop&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Please avoid using the term &ldquo;photoshop&rdquo; as a verb, meaning
 any kind of photo manipulation or image editing in general.  Photoshop
@@ -798,7 +883,10 @@
 be avoided since it is proprietary.  There are plenty of free programs
 for editing images, such as the <a href="/software/gimp">GIMP</a>.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Piracy">&ldquo;Piracy&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Publishers often refer to copying they don't approve of as
 &ldquo;piracy.&rdquo; In this way, they imply that it is ethically
@@ -823,7 +911,10 @@
 <a 
href="http://torrentfreak.com/mpaa-banned-from-using-piracy-and-theft-terms-in-hotfile-trial-131129/";>&ldquo;piracy&rdquo;
 and &ldquo;theft&rdquo; are smear words.</a></p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="PowerPoint">&ldquo;PowerPoint&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Please avoid using the term &ldquo;PowerPoint&rdquo; to mean any kind
 of slide presentation.  &ldquo;PowerPoint&rdquo; is just the name of
@@ -832,8 +923,10 @@
 presentations.  Recommended options include TeX's <tt>beamer</tt>
 class and LibreOffice.org's Impress.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Protection">&ldquo;Protection&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Publishers' lawyers love to use the term &ldquo;protection&rdquo; to
 describe copyright.  This word carries the implication of preventing
@@ -864,7 +957,10 @@
 <a href="http://DefectiveByDesign.org";> Defective by Design</a>
 campaign.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="RAND">&ldquo;RAND (Reasonable and Non-Discriminatory)&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Standards bodies that promulgate patent-restricted standards that
 prohibit free software typically have a policy of obtaining patent
@@ -891,8 +987,10 @@
 &ldquo;UFO&rdquo; for short, as a replacement.  It is accurate because
 the only condition in these licenses is a uniform royalty fee.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="SaaS">&ldquo;SaaS&rdquo; or &ldquo;Software as a Service&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 We used to say that SaaS (short for &ldquo;Software as a
 Service&rdquo;) is an injustice, but then we found that there was a
@@ -911,8 +1009,10 @@
 vicio&rdquo; (&ldquo;software, as being pernicious&rdquo;) is too good
 to give up.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="SellSoftware">&ldquo;Sell software&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The term &ldquo;sell software&rdquo; is ambiguous.  Strictly speaking,
 exchanging a copy of a free program for a sum of money
@@ -927,8 +1027,10 @@
 See <a href="/philosophy/selling.html">Selling Free Software</a> for
 further discussion of this issue.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="SharingEconomy">&ldquo;Sharing economy&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The term &ldquo;sharing economy&rdquo; is not a good way to refer to
 services such as Uber and Airbnb that arrange business transactions
@@ -941,8 +1043,10 @@
 A more suitable term for businesses like Uber is the
 &ldquo;piecework service economy.&rdquo;</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Skype">&ldquo;Skype&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Please avoid using the term &ldquo;skype&rdquo; as a verb, meaning any
 kind of video communication or telephony over the Internet in general.
@@ -954,8 +1058,10 @@
 one of the <a href="https://libreplanet.org/wiki/Group:Skype_Replacement";>
 numerous free Skype replacements</a>.</p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="SoftwareIndustry">&ldquo;Software Industry&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The term &ldquo;software industry&rdquo; encourages people to imagine
 that software is always developed by a sort of factory and then
@@ -974,7 +1080,10 @@
 define &ldquo;industry&rdquo; as &ldquo;automated production of
 material goods.&rdquo;</a></p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="SourceModel">&ldquo;Source model&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Wikipedia uses the term &ldquo;source model&rdquo; in a confused and
 ambiguous way.  Ostensibly it refers to how a program's source is
@@ -987,12 +1096,15 @@
 opportunity to say &ldquo;open source&rdquo; in pages describing free
 software programs.</p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
 <!--#if expr="$LANGUAGE_SUFFIX = /^.(es)$/" -->
 <!-- TRANSLATORS: translate if this word is used often in your
      language to refer to mobile computers; otherwise,
      fill the translation with a space. -->
 
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Terminal">&ldquo;Terminal&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 
 <p>Mobile phones and tablets are computers, and people should be
 able to do their computing on them using free software.
@@ -1000,7 +1112,10 @@
 is to connect to servers, which is a bad way to do your own computing.</p>
 <!--#endif -->
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Theft">&ldquo;Theft&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 The supporters of a too-strict, repressive form of copyright often use
 words like &ldquo;stolen&rdquo; and &ldquo;theft&rdquo; to refer to
@@ -1030,7 +1145,10 @@
 <a 
href="http://torrentfreak.com/mpaa-banned-from-using-piracy-and-theft-terms-in-hotfile-trial-131129/";>&ldquo;piracy&rdquo;
 and &ldquo;theft&rdquo; are smear-words.</a></p>
 
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="TrustedComputing">&ldquo;Trusted Computing&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 <a href="/philosophy/can-you-trust.html">&ldquo;Trusted computing&rdquo;</a> is
 the proponents' name for a scheme to redesign computers so that
@@ -1039,8 +1157,10 @@
 point of view, it is &ldquo;treacherous.&rdquo;
 </p>
 
-
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Vendor">&ldquo;Vendor&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
 <p>
 Please don't use the term &ldquo;vendor&rdquo; to refer generally to
 anyone that develops or packages software.  Many programs
@@ -1051,13 +1171,7 @@
 Likewise, only some of the packagers of GNU/Linux distributions are
 vendors.  We recommend the general term &ldquo;supplier&rdquo; instead.
 </p>
-
-<div class="announcement">
-<blockquote><p>Also note <a href="/philosophy/categories.html">Categories of 
Free
-Software</a>
-and <a href="/philosophy/why-call-it-the-swindle.html">Why Call It The
-Swindle?</a></p></blockquote>
-</div>
+<!-- GNUN-SORT-STOP -->
 
 <hr />
 <blockquote id="fsfs"><p class="big">This essay is published
@@ -1123,7 +1237,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/03/27 21:28:35 $
+$Date: 2016/07/30 17:29:53 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/words-to-avoid.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- philosophy/po/words-to-avoid.it.po  30 Jul 2016 16:22:35 -0000      1.206
+++ philosophy/po/words-to-avoid.it.po  30 Jul 2016 17:29:53 -0000      1.207
@@ -18,7 +18,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-07-16 17:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -44,15 +43,7 @@
 "situazioni, di evitare perché risultano ambigui  oppure implicano "
 "un'opinione che non condividiamo e che speriamo non condividiate nemmeno voi."
 
-# | Also note <a href=\"/philosophy/categories.html\">Categories of Free
-# | [-Software</a> and-] {+Software</a>,+} <a
-# | href=\"/philosophy/why-call-it-the-swindle.html\">Why Call It The
-# | Swindle?</a>
 #. type: Content of: <div><blockquote><p>
-#| msgid ""
-#| "Also note <a href=\"/philosophy/categories.html\">Categories of Free "
-#| "Software</a> and <a href=\"/philosophy/why-call-it-the-swindle.html\">Why "
-#| "Call It The Swindle?</a>"
 msgid ""
 "Also note <a href=\"/philosophy/categories.html\">Categories of Free "
 "Software</a>, <a href=\"/philosophy/why-call-it-the-swindle.html\">Why Call "
@@ -280,8 +271,8 @@
 #. type: Content of: <p>
 msgid "&ldquo;<a href=\"#SharingEconomy\">Sharing economy</a>&rdquo; |"
 msgstr ""
-"&ldquo;<a href=\"#SharingEconomy\">Economia di condivisione (Sharing "
-"economy)</a>&rdquo; |"
+"&ldquo;<a href=\"#SharingEconomy\">Economia di condivisione (Sharing economy)"
+"</a>&rdquo; |"
 
 #. GNUN-SORT-NEXT-ITEM
 #. type: Content of: <p>
@@ -1997,9 +1988,9 @@
 "your privacy, try one of the <a href=\"https://libreplanet.org/wiki/Group:";
 "Skype_Replacement\"> numerous free Skype replacements</a>."
 msgstr ""
-"Non usate il neologismo &ldquo;skypare&rdquo; per indicare una "
-"(video)chiamata via Internet. Skype è solo uno dei tanti programmi per "
-"questo scopo, e per di più è software proprietario e <a href=\"/philosophy/"
+"Non usate il neologismo &ldquo;skypare&rdquo; per indicare una (video)"
+"chiamata via Internet. Skype è solo uno dei tanti programmi per questo "
+"scopo, e per di più è software proprietario e <a href=\"/philosophy/"
 "proprietary/proprietary-surveillance.html#SpywareInSkype\"> spia i propri "
 "utenti</a>. Per effettuare (video)chiamate via Internet in un modo che "
 "rispetti la vostra libertà e la vostra privacy, usate uno dei tanti <a href="

Index: proprietary/malware-apple.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.it.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/malware-apple.it.html   22 May 2016 19:30:06 -0000      1.15
+++ proprietary/malware-apple.it.html   30 Jul 2016 17:29:53 -0000      1.16
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/malware-apple.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>I sistemi operativi di Apple sono malware - Progetto GNU - Free Software
@@ -63,6 +63,7 @@
 applicazioni.</li>
 <li><a href="#tyrants">Tiranni</a>&mdash;sistemi che vietano l'installazione di
 sistemi operativi non “autorizzati” dal produttore.</li>
+<li><a href="#deception">Inganni</a></li>
 </ul>
 </div>
 </div>
@@ -93,6 +94,13 @@
 <h3 id="censorship">Censura di Apple</h3>
 <ul>
 <li><p>
+Apple censura i giochi, <a
+href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>eliminando
+giochi dal suo App Store</a> a causa della visione politica che
+suggeriscono; altre visioni sono evidentemente considerate accettabili.</p>
+</li>
+
+<li><p>
 Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";> ha eliminato
 un programma dal suo App Store</a> perché i suoi sviluppatori hanno osato
 disassemblare alcuni degli iGadget.
@@ -182,7 +190,7 @@
   <li>
     <p>Apple si rifiuta di sistemare problemi di sicurezza in Quicktime per 
Windows
 e <a
-href="http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>impedisce
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>impedisce
 agli utenti di farlo</a>.</p>
   </li>
 
@@ -384,6 +392,19 @@
 sistema operativo diverso.</p>
   </li>
 </ul>
+
+<h3 id="deception">Inganni di Apple</h3>
+<ul>
+  <li><p>&ldquo;Dark patterns&rdquo; sono <a
+href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>interfacce
+che ingannano gli utenti</a> o rendono più difficile trovare le
+impostazioni.</p>
+
+    <p>Questo permette a un'azienda come Apple di dire che permette agli 
utenti di
+disattivare una certa funzione assicurandosi al contempo che pochi capiranno
+come farlo.</p>
+  </li>
+</ul>
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -460,7 +481,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/malware-microsoft.it.html       27 Mar 2016 21:28:35 -0000      
1.15
+++ proprietary/malware-microsoft.it.html       30 Jul 2016 17:29:53 -0000      
1.16
@@ -109,6 +109,14 @@
 programmi Microsoft.</p>
 
 <ul>
+  <li><p>Quando un utente è convinto da Microsoft ad accettare 
l'installazione di
+Windows 10, <a
+href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>sopre
+che non può annullare o rinviare la data di installazione</a>.
+   </p>
+   <p>Ciò dimostra quello che andiamo dicendo da anni: chi usa software
+proprietario dà a terzi il potere su di sé, e se ne pentirà prima o 
poi.</p></li>
+
   <li><p>Microsoft ha deciso di <a
 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>non
 supportare le future CPU di Intel su Windows 7 e 8</a>. Su queste macchine
@@ -128,6 +136,19 @@
 con altri utenti) uno sviluppatore per farlo.
   </p></li>
 
+  <li><p>Microsoft sta <a
+href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+costringendo</a> gli utenti ad <a
+href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>aggiornare
+a Windows 10</a>, ignorando la scelta di non aggiornare disponibile in
+Windows 7 o 8.  Ciò conferma la presenza di una <a
+href="/proprietary/proprietary-back-doors.html">backdoor universale in
+Windows</a> 7 e 8.</p></li>
+
+  <li><p>Gli "aggiornamenti" a Windows 10 <a
+href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
+cancellano applicazioni</a> senza avvisare l'utente.</p></li>
+
   <li><p>
   Microsoft sta ripetutamente <a
 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
@@ -163,9 +184,15 @@
 
 <ul>
 
+<li><p>Microsoft sta ripetutamente <a
+href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>
+sollecitando molti utenti ad installare Windows 10</a>.</p></li>
+
   <li><p>Microsoft sta <a
 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml";>ingannando
-gli utenti per farli passare da Windows 7 a Windows 10</a>.</p></li>
+gli utenti</a> <a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity";>per
+farli passare da Windows 7 a Windows 10</a>.</p></li>
 
   <li><p>Microsoft ha fatto in modo che PC aziendali gestiti da amministratori 
di
 sistema interni all'azienda suggerissero agli utenti di <a
@@ -230,7 +257,7 @@
 da loro pronunciato.</p></li>
 
   <li>Spyware in Windows: <a
-href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>Windows
+href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>Windows
 Update spia l'utente</a>. <a
 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>Windows
 8.1 curiosa nelle ricerche locali</a>. E c'è una <a
@@ -263,6 +290,16 @@
 
 <h3 id="tyrants">Tiranni di Microsoft</h3>
 <ul>
+<li>
+<p>Microsoft ha lasciato un modo, per errore, per installare GNU/Linux sui
+tablet Windows RT, ma ora ha <a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+&ldquo;sistemato&rdquo; quell'&ldquo;errore&rdquo;</a>. La loro prosa
+arrogante parla di &ldquo;protezione&rdquo; degli utenti.  L'articolo usa
+&ldquo;Linux&rdquo; per riferirsi a <a
+href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
+</p>
+</li>
   <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>I
 dispositivi mobili che hanno Windows 8 preinstallato sono tiranni</a>: non
 permettono agli utenti di installare sistemi operativi diversi o 
modificati.</p></li>
@@ -348,7 +385,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/03/27 21:28:35 $
+$Date: 2016/07/30 17:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-censorship.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.it.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-censorship.it.html  22 May 2016 19:30:06 -0000      
1.8
+++ proprietary/proprietary-censorship.it.html  30 Jul 2016 17:29:53 -0000      
1.9
@@ -20,6 +20,13 @@
 censurare dovrebbe essere illegale, ma non lo è.</p>
 
 <ul>
+  <li><p>
+Apple censura i giochi, <a
+href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>eliminando
+giochi dal suo App Store</a> a causa della visione politica che
+suggeriscono; altre visioni sono evidentemente considerate accettabili.</p>
+</li>
+
 <li><p>
 Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";> ha eliminato
 un programma dal suo App Store</a> perché i suoi sviluppatori hanno osato
@@ -149,7 +156,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-drm.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.it.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-drm.it.html 22 May 2016 19:30:06 -0000      1.4
+++ proprietary/proprietary-drm.it.html 30 Jul 2016 17:29:53 -0000      1.5
@@ -30,6 +30,12 @@
 
 <ul>
 <li>
+<p>Ora i giochi per Oculus Rift hanno una protezione DRM che <a
+href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform";>impedisce
+di eseguirli su altri sistemi</a>.</p>
+</li>
+
+<li>
 <p>La stampante 3D &ldquo;Cube&rdquo; <a
 href="http://michaelweinberg.org/post/137045828005/free-the-cube";>  è stata
 progettata con DRM</a>: non accetta materiali per la stampa di terze parti,
@@ -223,7 +229,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/proprietary-insecurity.it.html  22 May 2016 19:30:06 -0000      
1.13
+++ proprietary/proprietary-insecurity.it.html  30 Jul 2016 17:29:53 -0000      
1.14
@@ -27,6 +27,20 @@
 
 <ul>
 <li>
+<p>Un bug in una libreria proprietaria ASN.1, usata nelle torri di
+comunicazione per cellulari, nei cellulari stessi e nei router, <a
+href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover";>permette
+di prendere il controllo di tali sistemi</a>.</p>
+</li>
+
+<li>
+<p>Gli antivirus hanno così tanti errori che <a
+href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374";>possono
+peggiorare la sicurezza di un sistema</a>.</p>
+<p>GNU/Linux non ha bisogno di antivirus.</p>
+</li>
+
+<li>
 <p>Videocamere di sorveglianza connesse in rete prodotte da oltre 70 marche <a
 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>hanno
 problemi di sicurezza che permettono a tutti di vedere le immagini</a>.</p>
@@ -371,7 +385,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.it.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/proprietary-sabotage.it.html    22 May 2016 19:30:06 -0000      
1.14
+++ proprietary/proprietary-sabotage.it.html    30 Jul 2016 17:29:53 -0000      
1.15
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-sabotage.en.html" 
-->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Sabotaggio proprietario - Progetto GNU - Free Software 
Foundation</title>
@@ -18,6 +18,16 @@
 
 <ul>
   <li>
+    <p>Quando un utente è convinto da Microsoft ad accettare l'installazione 
di
+Windows 10, <a
+href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>scopre
+che non può annullare o rinviare la data di installazione</a>.</p>
+
+      <p>Ciò dimostra quello che andiamo dicendo da anni: chi usa software
+proprietario dà a terzi il potere su di sé, e se ne pentirà prima o poi.</p>
+  </li>
+
+  <li>
     <p>Il programma Apple Music <a
 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/";>cerca
 file musicali sul disco dell'utente, li copia sui server di Apple e li
@@ -27,7 +37,7 @@
   <li>
     <p>Apple si rifiuta di sistemare problemi di sicurezza in Quicktime per 
Windows
 e <a
-href="http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>impedisce
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>impedisce
 agli utenti di farlo</a>.</p>
   </li>
 
@@ -52,13 +62,16 @@
   </li>
 
   <li>
-    <p>Che vi piaccia o no, Microsoft sta <a
-href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>costringendo
-gli utenti ad aggiornare a Windows 10</a>, ignorando la preferenza in
-Windows 7 e 8 che si poteva usare per non aggiornare. Questa è un'ulteriore
-conferma della <a href="/proprietary/proprietary-back-doors.html">presenza
-di una backdoor in Windows</a> 7 e 8.</p>
+    <p>Microsoft sta <a
+href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+costringendo</a> gli utenti ad <a
+href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>aggiornare
+a Windows 10</a>, ignorando la scelta di non aggiornare disponibile in
+Windows 7 o 8.  Ciò conferma la presenza di una <a
+href="/proprietary/proprietary-back-doors.html">backdoor universale in
+Windows</a> 7 e 8.</p>
   </li>
+
   <li><p>Gli "aggiornamenti" di Windows 10 <a
 
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
 cancellano applicazioni</a> senza chiedere il permesso.</p>
@@ -200,7 +213,11 @@
 violato il codice che impedisce agli utenti di cambiare il firmware, ed in
 risposta noi abbiamo organizzato un <a
 href="http://boycottsony.org";>boicottaggio di Sony</a>.
-</p></li>
+</p>
+
+<p>Sony ora è stata obbligata da un tribunale a <a
+href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
+pagare il sabotaggio</a>.</p></li>
 
 <li><p>
 LG <a
@@ -308,7 +325,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/proprietary-surveillance.it.html        22 May 2016 19:30:06 
-0000      1.20
+++ proprietary/proprietary-surveillance.it.html        30 Jul 2016 17:29:53 
-0000      1.21
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-surveillance.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Sorveglianza proprietaria - Progetto GNU - Free Software 
Foundation</title>
@@ -130,7 +130,7 @@
 applicazioni che rilevavano la sorveglianza. Un ulteriore "aggiornamento" ha
 inserito un programma di spionaggio. Gli utenti lo hanno notato e si sono
 lamentati, quindi Microsoft ne ha <a
-href="http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>cambiato
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>cambiato
 il nome</a> affinché gli utenti credessero che era stato eliminato.</p>
 
       <p>Chi usa software proprietario si espone ad essere trattato in questo 
modo.</p>
@@ -359,9 +359,7 @@
 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>iBeacon</a>
 permette ai negozi di determinare la posizione precisa di uno dei vari
 iGadget e di ottenere altre informazioni.</p>
-  
-  <!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
-</li>
+  </li>
 
   <li><p>Esiste anche una funzionalità che permette ai siti web di tracciare 
gli
 utenti, che è <a
@@ -370,7 +368,7 @@
   </li>
 
   <li><p>Ciascuno dei vari iGadget, come impostazione predefinita, <a
-href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>comunica
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>comunica
 ad Apple anche la sua posizione geografica</a>, anche se questo può essere
 disabilitato.</p>
   </li>
@@ -465,7 +463,7 @@
   </li>
 
   <li><p>La nuova applicazione di Facebook, Magic Photo, <a
-href="http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>cerca
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>cerca
 volti ad essa noti nelle raccolte di foto del vostro telefono</a>, e vi
 suggerisce di condividere la foto secondo la persona che trova
 nell'inquadratura.</p>
@@ -486,7 +484,7 @@
 che questo non va bene.</p>
 
       <p>Questo articolo mostra come lo spionaggio sia presentato come <a
-href="http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/";>
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/";>
 un "miglioramento" dell'esperienza degli utenti</a>, anche se gli utenti non
 l'hanno mai chiesto. Questo è un tipico esempio dell'atteggiamento che
 l'industria del software proprietario ha nei confronti delle persone che ha
@@ -605,6 +603,14 @@
 <div style="clear: left;"></div>
 
 <ul>
+  <li><p>Le investigazioni mostrano che <a
+href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>GCHQ
+usa aziende statunitensi e la NSA per aggirare le restrizioni sulla
+sorveglianza domestica</a>.</p>
+
+      <p>Nello specifico può raccogliere i messaggi di posta elettronica dei 
membri
+del Parlamento, dato che passano attraverso Microsoft.</p></li>
+
   <li><p>Spyware nei telefoni VoIP di Cisco: <a
 href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
 http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
@@ -686,6 +692,11 @@
 </div>
 
 <ul>
+<li><p>La auto computerizzate con software non libero <a
+href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data";>
+spiano gli utenti</a>.</p>
+  </li>
+
   <li><p>La Nissan Leaf ha un modem che permette a chiunque di <a
 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>accedere
 da remoto al computer di bordo e modificare alcune impostazioni</a>.</p>
@@ -1049,7 +1060,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:53 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tyrants.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.it.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-tyrants.it.html     22 May 2016 19:30:06 -0000      
1.5
+++ proprietary/proprietary-tyrants.it.html     30 Jul 2016 17:29:54 -0000      
1.6
@@ -61,6 +61,17 @@
 </p>
 </li>
 
+<li>
+<p>Microsoft ha lasciato un modo, per errore, per installare GNU/Linux sui
+tablet Windows RT, ma ora ha <a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+&ldquo;sistemato&rdquo; quell'&ldquo;errore&rdquo;</a>. La loro prosa
+arrogante parla di &ldquo;protezione&rdquo; degli utenti.  L'articolo usa
+&ldquo;Linux&rdquo; per riferirsi a <a
+href="/gnu/linux-and-gnu.html">GNU/Linux</a>.
+</p>
+</li>
+
 </ul>
 
 <div class="translators-notes">
@@ -139,7 +150,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:54 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.it.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary.it.html     1 Jan 2016 15:15:46 -0000       1.5
+++ proprietary/proprietary.it.html     30 Jul 2016 17:29:54 -0000      1.6
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Software Proprietario - Progetto GNU - Free Software Foundation</title>
@@ -52,8 +52,9 @@
 mobili</a></li>
   <li><a href="/proprietary/malware-kindle-swindle.html">Malware nel
 Kindle/&ldquo;Swindle&rdquo; di Amazon</a></li>
-  <li><a href="/proprietary/proprietary-deception.html">Aziende ingannevoli</a>
-che mascherano i loro intenti.</li>
+  <li><a href="/proprietary/malware-games.html">Malware nei giochi</a></li>
+  <li><a href="/proprietary/malware-appliances.html">Malware negli
+elettrodomestici</a></li>
 </ul>
 </div>
 
@@ -62,6 +63,7 @@
 <li><strong>Tipi di malware</strong></li>
 <li><a href="/proprietary/proprietary-back-doors.html">Backdoor</a></li>
 <li><a href="/proprietary/proprietary-censorship.html">Censura</a></li>
+<li><a href="/proprietary/proprietary-deception.html">Inganni</a></li>
 <li><a href="/proprietary/proprietary-insecurity.html">Scarsa 
Sicurezza</a></li>
 <li><a href="/proprietary/proprietary-sabotage.html">Sabotaggio</a></li>
 <li><a href="/proprietary/proprietary-interference.html">Interferenze</a></li>
@@ -146,7 +148,7 @@
 
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>Questa pagina è distribuita secondo i termini della licenza <a 
rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative Commons
@@ -162,7 +164,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/01/01 15:15:46 $
+$Date: 2016/07/30 17:29:54 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-apple.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-en.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/malware-apple.it-en.html     22 May 2016 19:30:06 -0000      
1.14
+++ proprietary/po/malware-apple.it-en.html     30 Jul 2016 17:29:54 -0000      
1.15
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 <title>Apple's Operating Systems are Malware
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/malware-apple.translist" -->
@@ -56,6 +56,7 @@
 <li><a href="#tyrants">Tyrants</a>&mdash;systems
     that reject any operating system not &ldquo;authorized&rdquo; by the
     manufacturer.</li>
+<li><a href="#deception">Deception</a></li>
 </ul>
 </div>
 </div>
@@ -86,6 +87,14 @@
 <h3 id="censorship">Apple Censorship</h3>
 <ul>
 <li><p>
+Apple censors
+games, <a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>banning
+some games from the cr&hellip;app store</a> because of which political
+points they suggest. Some political points are apparently considered
+acceptable.</p>
+</li>
+
+<li><p>
 Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
 banned a program from the App Store</a> because its developers
 committed the enormity of disassembling some iThings.
@@ -160,8 +169,9 @@
   </li>
 
   <li>
-    <p>Apple <a 
href="http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>stops
-      users from fixing the security bugs in Quicktime for
+    <p>Apple <a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
+stops users from fixing the security bugs in Quicktime for
       Windows</a>, while refusing to fix them itself.</p>
   </li>
 
@@ -350,6 +360,19 @@
   install a different system.</p>
   </li>
 </ul>
+
+<h3 id="deception">Apple Deception</h3>
+<ul>
+  <li><p>&ldquo;Dark patterns&rdquo;
+      are <a 
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you";>user
+      interfaces designed to mislead users, or make option settings
+      hard to find</a>.</p>
+
+    <p>This allows a company such as Apple to say, &ldquo;We allow
+    users to turn this off&rdquo; while ensuring that few will
+    understand how to actually turn it off.</p>
+  </li>
+</ul>
 </div><!-- for id="content", starts in the include above -->
 
 <!--#include virtual="/server/footer.html" -->
@@ -408,7 +431,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/malware-apple.it.po  30 Jul 2016 16:22:36 -0000      1.54
+++ proprietary/po/malware-apple.it.po  30 Jul 2016 17:29:54 -0000      1.55
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-03 17:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -132,10 +131,7 @@
 "<a href=\"#tyrants\">Tiranni</a>&mdash;sistemi che vietano l'installazione "
 "di sistemi operativi non “autorizzati” dal produttore."
 
-# | <a [-href=\"#insecurity\">Insecurity</a>-]
-# | {+href=\"#deception\">Deception</a>+}
 #. type: Content of: <div><div><ul><li>
-#| msgid "<a href=\"#insecurity\">Insecurity</a>"
 msgid "<a href=\"#deception\">Deception</a>"
 msgstr "<a href=\"#deception\">Inganni</a>"
 
@@ -341,16 +337,7 @@
 "apple-stole-my-music-no-seriously/\">cerca file musicali sul disco "
 "dell'utente, li copia sui server di Apple e li cancella</a>."
 
-# | Apple <a
-# | 
[-href=\"http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/\";>stops-]
-# | 
{+href=\"https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/\";>
-# | stops+} users from fixing the security bugs in Quicktime for Windows</a>,
-# | while refusing to fix them itself.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Apple <a href=\"http://www.theregister.co.uk/2016/04/14/";
-#| "uninstall_quicktime_for_windows/\">stops users from fixing the security "
-#| "bugs in Quicktime for Windows</a>, while refusing to fix them itself."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Apple <a href=\"https://web.archive.org/web/20160608183145/http://www.";
 "theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/\"> stops users "

Index: proprietary/po/malware-microsoft.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-microsoft.it-en.html 11 Apr 2016 14:27:39 -0000      
1.16
+++ proprietary/po/malware-microsoft.it-en.html 30 Jul 2016 17:29:54 -0000      
1.17
@@ -92,6 +92,16 @@
 actions that harm to the users of specific Microsoft software.</p>
 
 <ul>
+  <li><p>Once Microsoft has tricked a user into accepting installation
+   of Windows
+   10, <a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
+   find that they are denied the option to cancel or even postpone the
+   imposed date of installation</a>.
+   </p>
+   <p>This demonstrates what we've said for years: using proprietary
+   software means letting someone have power over you, and you're
+   going to get screwed sooner or later.</p></li>
+
   <li><p>Microsoft
   has <a 
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake";>desupported
   all future Intel CPUs for Windows 7 and 8</a>. Those machines will
@@ -110,6 +120,19 @@
   the old version on your future platforms.
   </p></li>
 
+  <li><p>Microsoft
+    is <a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+    forcibly
+    pushing</a> <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>Windows
+    update to its version 10</a>, ignoring the flag on Windows 7 or 8
+    that you could set to not upgrade.  This reaffirms the presence of
+    a <a href="/proprietary/proprietary-back-doors.html">universal
+    back door in Windows</a> 7 and 8.</p></li>
+
+  <li><p>Windows 10 &ldquo;upgrades&rdquo; <a
+      
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
+      delete applications</a> without asking permission.</p></li>
+
   <li><p>
   Microsoft is <a 
href="http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1";>
   repeatedly nagging many users to install Windows 10</a>.
@@ -140,11 +163,16 @@
 
 <ul>
 
+<li><p>Microsoft has
+started <a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>nagging
+users obnoxiously and repeatedly to install Windows 10</a>.</p></li>
+
   <li><p>Microsoft
       <a 
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml";>is
         tricking
-        users</a> <a 
href="http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity";>into
-        replacing Windows 7 with Windows 10</a>.</p></li>
+        users</a> <a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/";>
+into replacing Windows 7 with Windows 10</a>.</p></li>
 
   <li><p>Microsoft has made companies' Windows machines managed by the
 company's
@@ -200,7 +228,8 @@
   including their files, their commands, their text input, and their
   voice input.</p></li>
 
-  <li>Spyware in Windows: <a 
href="http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
+  <li>Spyware in Windows: <a
+href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
   Windows Update snoops on the user.</a>
   <a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
   Windows 8.1 snoops on local searches.</a> And there's a
@@ -231,6 +260,17 @@
 
 <h3 id="tyrants">Microsoft Tyrants</h3>
 <ul>
+<li>
+<p>Microsoft accidentally left a way for users to install GNU/Linux
+on Windows RT tablets, but now it has <a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+&ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. Those arrogant
+bastards call this &ldquo;protecting&rdquo; the users.  The article
+talks of installing &ldquo;Linux&rdquo;, but the context shows it is
+really <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users
+install.
+</p>
+</li>
   <li><p><a href="http://fsf.org/campaigns/secure-boot-vs-restricted-boot/";>
   Mobile devices that come with Windows 8 are tyrants</a>: they block
   users from installing other or modified operating systems.</p></li>
@@ -297,7 +337,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/04/11 14:27:39 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary/po/malware-microsoft.it.po      30 Jul 2016 16:22:36 -0000      
1.65
+++ proprietary/po/malware-microsoft.it.po      30 Jul 2016 17:29:54 -0000      
1.66
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-09 20:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -367,16 +366,7 @@
 "per essere definiti tali. Tuttavia, sono fastidiosi e sbagliati. Ecco alcuni "
 "esempi di interferenze da parte di Microsoft."
 
-# | Microsoft [-is-] {+has started+} <a
-# | 
[-href=\"http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\";>
-# | repeatedly nagging many-]
-# | 
{+href=\"https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder\";>nagging+}
-# | users {+obnoxiously and repeatedly+} to install Windows 10</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Microsoft is <a href=\"http://www.theguardian.com/technology/2015/sep/11/";
-#| "microsoft-downloading-windows-1\"> repeatedly nagging many users to "
-#| "install Windows 10</a>."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft has started <a href=\"https://www.theguardian.com/technology/2016/";
 "jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder"
@@ -386,19 +376,7 @@
 "technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-"
 "pop-up-reminder\"> sollecitando molti utenti ad installare Windows 10</a>."
 
-# | Microsoft <a
-# | 
href=\"http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml\";>is
-# | tricking users</a> <a
-# | 
[-href=\"http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity\";>into-]
-# | 
{+href=\"https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\";>
-# | into+} replacing Windows 7 with Windows 10</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Microsoft <a href=\"http://news.softpedia.com/news/windows-10-upgrade-";
-#| "reportedly-starting-automatically-on-windows-7-pcs-501651.shtml\">is "
-#| "tricking users</a> <a href=\"http://www.theregister.co.uk/2016/03/17/";
-#| "microsoft_windows_10_upgrade_gwx_vs_humanity\">into replacing Windows 7 "
-#| "with Windows 10</a>."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft <a href=\"http://news.softpedia.com/news/windows-10-upgrade-";
 "reportedly-starting-automatically-on-windows-7-pcs-501651.shtml\">is "
@@ -538,23 +516,7 @@
 "per lo spionaggio totale</a>, che include i loro file, i loro comandi, il "
 "testo da loro immesso e quello da loro pronunciato."
 
-# | Spyware in Windows: <a
-# | 
[-href=\"http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>-]
-# | 
{+href=\"https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>+}
-# | Windows Update snoops on the user.</a> <a
-# | 
href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>
-# | Windows 8.1 snoops on local searches.</a> And there's a <a
-# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
-# | in Windows</a>, whose functions we don't know.
 #. type: Content of: <ul><li>
-#| msgid ""
-#| "Spyware in Windows: <a href=\"http://www.theregister.co.uk/2003/02/28/";
-#| "windows_update_keeps_tabs/\"> Windows Update snoops on the user.</a> <a "
-#| "href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-";
-#| "underbelly-of-windows-81-blue-222175\"> Windows 8.1 snoops on local "
-#| "searches.</a> And there's a <a href=\"http://www.marketoracle.co.uk/";
-#| "Article40836.html\"> secret NSA key in Windows</a>, whose functions we "
-#| "don't know."
 msgid ""
 "Spyware in Windows: <a href=\"https://web.archive.org/web/20160313105805/";
 "http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";> "

Index: proprietary/po/proprietary-censorship.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-censorship.it-en.html    22 May 2016 19:30:06 
-0000      1.7
+++ proprietary/po/proprietary-censorship.it-en.html    30 Jul 2016 17:29:54 
-0000      1.8
@@ -16,6 +16,14 @@
 isn't.</p>
 
 <ul>
+  <li><p>
+Apple censors
+games, <a 
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game";>banning
+some games from the cr&hellip;app store</a> because of which political
+points they suggest. Some political points are apparently considered
+acceptable.</p>
+</li>
+
 <li><p>
 Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/";>
 banned a program from the App Store</a> because its developers
@@ -123,7 +131,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-censorship.it.po 30 Jul 2016 16:22:36 -0000      
1.25
+++ proprietary/po/proprietary-censorship.it.po 30 Jul 2016 17:29:54 -0000      
1.26
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-03 17:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-drm.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-en.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/proprietary-drm.it-en.html   22 May 2016 19:30:06 -0000      
1.3
+++ proprietary/po/proprietary-drm.it-en.html   30 Jul 2016 17:29:54 -0000      
1.4
@@ -17,13 +17,19 @@
 <p>DRM is reinforced by
 <a 
href="http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management";>
 censorship laws</a> that ban software (and hardware) that can break
-the handcuffs.  Instead of these laws, DRM ought to be illegal.  Please
-support our campaign
+the handcuffs.  Instead of these laws, DRM itself ought to be illegal.
+Please support our campaign
 to <a href="http://DefectiveByDesign.org/";>abolish DRM</a>.
 </p>
 
 <ul>
 <li>
+<p>Oculus Rift games
+now <a 
href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform";>have
+DRM meant to prevent running them on other systems</a>.</p>
+</li>
+
+<li>
 <p>The <a href="http://michaelweinberg.org/post/137045828005/free-the-cube";>
 &ldquo;Cube&rdquo; 3D printer was designed with DRM</a>: it won't accept
 third-party printing materials. It is the Keurig of printers. Now it is 
@@ -192,7 +198,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary/po/proprietary-drm.it.po        30 Jul 2016 16:22:35 -0000      
1.11
+++ proprietary/po/proprietary-drm.it.po        30 Jul 2016 17:29:54 -0000      
1.12
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-03 18:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -47,19 +46,7 @@
 "gli utenti. Queste funzionalità vengono anche chiamate <em>manette 
digitali</"
 "em>."
 
-# | DRM is reinforced by <a
-# | 
href=\"http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management\";>
-# | censorship laws</a> that ban software (and hardware) that can break the
-# | handcuffs.  Instead of these laws, DRM {+itself+} ought to be illegal.
-# | Please support our campaign to <a
-# | href=\"http://DefectiveByDesign.org/\";>abolish DRM</a>.
 #. type: Content of: <p>
-#| msgid ""
-#| "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
-#| "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that "
-#| "ban software (and hardware) that can break the handcuffs.  Instead of "
-#| "these laws, DRM ought to be illegal.  Please support our campaign to <a "
-#| "href=\"http://DefectiveByDesign.org/\";>abolish DRM</a>."
 msgid ""
 "DRM is reinforced by <a href=\"http://www.theguardian.com/technology/";
 "blog/2014/feb/05/digital-rights-management\"> censorship laws</a> that ban "

Index: proprietary/po/proprietary-insecurity.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/proprietary-insecurity.it-en.html    22 May 2016 19:30:07 
-0000      1.12
+++ proprietary/po/proprietary-insecurity.it-en.html    30 Jul 2016 17:29:54 
-0000      1.13
@@ -21,6 +21,20 @@
 
 <ul>
 <li>
+<p>A bug in a proprietary ASN.1 library, used in cell phone towers as
+well as cell phones and
+routers, <a 
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover";>allows
+taking control of those systems</a>.</p>
+</li>
+
+<li>
+<p>Antivirus programs have so many errors
+  that <a 
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374";>they
+  may make security worse</a>.</p>
+<p>GNU/Linux does not need antivirus software.</p>
+</li>
+
+<li>
 <p>Over 70 brands of network-connected surveillance
 cameras <a 
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html";>have
 security bugs that allow anyone to watch through them</a>.</p>
@@ -329,7 +343,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:07 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary-insecurity.it.po 30 Jul 2016 16:22:36 -0000      
1.59
+++ proprietary/po/proprietary-insecurity.it.po 30 Jul 2016 17:29:54 -0000      
1.60
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-07-08 22:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-sabotage.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-sabotage.it-en.html      22 May 2016 19:30:07 
-0000      1.13
+++ proprietary/po/proprietary-sabotage.it-en.html      30 Jul 2016 17:29:54 
-0000      1.14
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <title>Proprietary Sabotage - GNU Project - Free Software Foundation</title>
 <!--#include virtual="/proprietary/po/proprietary-sabotage.translist" -->
@@ -13,6 +13,18 @@
 
 <ul>
   <li>
+    <p>Once Microsoft has tricked a user into accepting installation
+      of Windows
+      10, <a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
+      find that they are denied the option to cancel or even postpone
+      the imposed date of installation</a>.</p>
+
+      <p>This demonstrates what we've said for years: using
+      proprietary software means letting someone have power over you,
+      and you're going to get screwed sooner or later.</p>
+  </li>
+
+  <li>
     <p>The Apple Music client
       program <a 
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/";>scans
       the user's file system for music files, copies them to an Apple
@@ -20,8 +32,9 @@
   </li>
 
   <li>
-    <p>Apple <a 
href="http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>stops
-      users from fixing the security bugs in Quicktime for
+    <p>Apple <a
+href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/";>
+stops users from fixing the security bugs in Quicktime for
       Windows</a>, while refusing to fix them itself.</p>
   </li>
 
@@ -45,14 +58,16 @@
   </li>
 
   <li>
-    <p>Whether you like it or not, Microsoft
-    is <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>forcibly
-    pushing Windows update to its version 10</a>, ignoring the flag on
-    Windows 7 or 8 that you could set to not upgrade.  This reaffirms
-    the presence of
+    <p>Microsoft
+    is <a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
+    forcibly
+    pushing</a> <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>Windows
+    update to its version 10</a>, ignoring the flag on Windows 7 or 8
+    that you could set to not upgrade.  This reaffirms the presence of
     a <a href="/proprietary/proprietary-back-doors.html">universal
     back door in Windows</a> 7 and 8.</p>
   </li>
+
   <li><p>Windows 10 &ldquo;upgrades&rdquo; <a
       
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
       delete applications</a> without asking permission.</p>
@@ -175,7 +190,10 @@
 code that blocked users from changing the firmware, and we responded by
 calling for a <a href="http://boycottsony.org";>boycott of
 Sony </a>.
-</p></li>
+</p>
+
+<p>In a court settlement Sony is <a 
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
+now paying for the sabotage</a>.</p></li>
 
 <li><p>
 LG <a 
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml";>disabled
@@ -258,7 +276,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:07 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/proprietary-sabotage.it.po   30 Jul 2016 16:22:36 -0000      
1.55
+++ proprietary/po/proprietary-sabotage.it.po   30 Jul 2016 17:29:54 -0000      
1.56
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-09 20:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -73,16 +72,7 @@
 "apple-stole-my-music-no-seriously/\">cerca file musicali sul disco "
 "dell'utente, li copia sui server di Apple e li cancella</a>."
 
-# | Apple <a
-# | 
[-href=\"http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/\";>stops-]
-# | 
{+href=\"https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/\";>
-# | stops+} users from fixing the security bugs in Quicktime for Windows</a>,
-# | while refusing to fix them itself.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Apple <a href=\"http://www.theregister.co.uk/2016/04/14/";
-#| "uninstall_quicktime_for_windows/\">stops users from fixing the security "
-#| "bugs in Quicktime for Windows</a>, while refusing to fix them itself."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Apple <a href=\"https://web.archive.org/web/20160608183145/http://www.";
 "theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/\"> stops users "
@@ -132,25 +122,7 @@
 "sta furbescamente facendo gli interessi del suo produttore <em>contro di "
 "voi</em>."
 
-# | [-Whether you like it or not,-]Microsoft is <a
-# | 
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>forcibly
-# | pushing Windows-]
-# | 
{+href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\";>
-# | forcibly pushing</a> <a
-# | 
href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>Windows+}
-# | update to its version 10</a>, ignoring the flag on Windows 7 or 8 that you
-# | could set to not upgrade.  This reaffirms the presence of a <a
-# | href=\"/proprietary/proprietary-back-doors.html\">universal back door in
-# | Windows</a> 7 and 8.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Whether you like it or not, Microsoft is <a href=\"http://www.";
-#| "computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-"
-#| "for-massive-windows-10-upgrade-strategy.html\">forcibly pushing Windows "
-#| "update to its version 10</a>, ignoring the flag on Windows 7 or 8 that "
-#| "you could set to not upgrade.  This reaffirms the presence of a <a href="
-#| "\"/proprietary/proprietary-back-doors.html\">universal back door in "
-#| "Windows</a> 7 and 8."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft is <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-";
 "after-unwanted-window-1782666146\"> forcibly pushing</a> <a href=\"http://";

Index: proprietary/po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/proprietary-surveillance.it-en.html  22 May 2016 19:30:07 
-0000      1.19
+++ proprietary/po/proprietary-surveillance.it-en.html  30 Jul 2016 17:29:54 
-0000      1.20
@@ -1,6 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
+<!-- Parent-Version: 1.79 -->
 <title>Proprietary Surveillance - GNU Project - Free Software 
Foundation</title>
 <!--#include virtual="/proprietary/po/proprietary-surveillance.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -86,7 +85,7 @@
 
 <p class="highlight-para">This document attempts to
 track <strong>clearly established cases of proprietary software that
-spies on or track users</strong>.</p>
+spies on or tracks users</strong>.</p>
 
 
 <h3 id="LatestAdditions">Latest additions</h3>
@@ -124,7 +123,9 @@
       applications.  Then another downgrade inserted a general spying
       program.  Users noticed this and complained, so Microsoft
       renamed it
-      <a 
href="http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>to
 give users the impression it was gone</a>.</p>
+      <a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
+to give users the impression it was gone</a>.</p>
 
       <p>To use proprietary software is to invite such treatment.</p>
   </li>
@@ -336,7 +337,6 @@
       the <a 
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html";>
       iBeacon</a> lets stores determine exactly where the iThing is,
       and get other info too.</p>
-  <!-- http://www.wassom.com/walking-in-snow-ibeacon-ble-and-privacy.html -->
   </li>
 
   <li><p>There is also a feature for web sites to track users, which is
@@ -346,7 +346,8 @@
   </li>
 
   <li><p>The iThing also
-      <a 
href="http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
+      <a
+href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/";>
       tells Apple its geolocation</a> by default, though that can be
       turned off.</p>
   </li>
@@ -438,7 +439,9 @@
   </li>
 
   <li><p>Facebook's new Magic Photo app
-      <a 
href="http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>scans
 your mobile phone's photo collections for known faces</a>,
+      <a
+href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/";>
+scans your mobile phone's photo collections for known faces</a>,
       and suggests you to share the picture you take according to who
       is in the frame.</p>
 
@@ -459,7 +462,7 @@
       are starting to realize that it is nasty.</p>
 
       <p>This article shows the <a
-href="http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/";>
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/";>
       twisted ways that they present snooping as a way
       to &ldquo;serve&rdquo; users better</a>&mdash;never mind
       whether they want that. This is a typical example of
@@ -570,6 +573,14 @@
 <div style="clear: left;"></div>
 
 <ul>
+  <li><p>Investigation
+        Shows <a 
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml";>GCHQ
+        Using US Companies, NSA To Route Around Domestic Surveillance
+        Restrictions</a>.</p>
+
+      <p>Specifically, it can collect the emails of members of Parliament
+  this way, because they pass it through Microsoft.</p></li>
+
   <li><p>Spyware in Cisco TNP IP phones:
       <a 
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html";>
       
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
@@ -648,6 +659,11 @@
 </div>
 
 <ul>
+<li><p>Computerized cars with nonfree software are
+  <a 
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data";>
+  snooping devices</a>.</p>
+  </li>
+
   <li><p>The Nissan Leaf has a built-in cell phone modem which allows
   effectively
   anyone <a 
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/";>to
@@ -972,7 +988,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:07 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary/po/proprietary-surveillance.it.po       30 Jul 2016 16:22:36 
-0000      1.96
+++ proprietary/po/proprietary-surveillance.it.po       30 Jul 2016 17:29:54 
-0000      1.97
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-06-09 19:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -167,12 +166,7 @@
 "diffusa ben oltre le tastiere, nell'industria dei dispositivi mobili, negli "
 "uffici, nelle case, nei sistemi di trasporti, nelle scuole."
 
-# | This document attempts to track <strong>clearly established cases of
-# | proprietary software that spies on or track{+s+} users</strong>.
 #. type: Content of: <p>
-#| msgid ""
-#| "This document attempts to track <strong>clearly established cases of "
-#| "proprietary software that spies on or track users</strong>."
 msgid ""
 "This document attempts to track <strong>clearly established cases of "
 "proprietary software that spies on or tracks users</strong>."
@@ -245,20 +239,7 @@
 "may-be-collecting-more-data-than-initially-thought/\"> invii dati a "
 "Microsoft su quali applicazioni sono in esecuzione</a>."
 
-# | A downgrade to Windows 10 deleted surveillance-detection applications.
-# | Then another downgrade inserted a general spying program.  Users noticed
-# | this and complained, so Microsoft renamed it <a
-# | 
[-href=\"http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/\";>to-]
-# | 
{+href=\"https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/\";>
-# | to+} give users the impression it was gone</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "A downgrade to Windows 10 deleted surveillance-detection applications.  "
-#| "Then another downgrade inserted a general spying program.  Users noticed "
-#| "this and complained, so Microsoft renamed it <a href=\"http://www.";
-#| "theregister.co.uk/2015/11/26/"
-#| "microsoft_renamed_data_slurper_reinserted_windows_10/\">to give users the "
-#| "impression it was gone</a>."
+#. type: Content of: <ul><li><p>
 msgid ""
 "A downgrade to Windows 10 deleted surveillance-detection applications.  Then "
 "another downgrade inserted a general spying program.  Users noticed this and "
@@ -726,15 +707,7 @@
 "disable-apple-ios-user-tracking-ios-6/\">abilitata di default</a>. "
 "(Quell'articolo parla di iOS 6 ma vale anche per iOS 7.)"
 
-# | The iThing also <a
-# | 
[-href=\"http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/\";>-]
-# | 
{+href=\"https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/\";>+}
-# | tells Apple its geolocation</a> by default, though that can be turned off.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "The iThing also <a href=\"http://www.theregister.co.uk/2013/08/08/";
-#| "ios7_tracking_now_its_a_favourite_feature/\"> tells Apple its "
-#| "geolocation</a> by default, though that can be turned off."
+#. type: Content of: <ul><li><p>
 msgid ""
 "The iThing also <a href=\"https://web.archive.org/web/20160313215042/http://";
 "www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/"
@@ -908,18 +881,7 @@
 "trasmissioni TV e radio nell'ambiente circostante</a> e spiano anche quello "
 "che gli utenti scrivono su siti come Facebook, Google+ e Twitter."
 
-# | Facebook's new Magic Photo app <a
-# | 
[-href=\"http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/\";>scans-]
-# | 
{+href=\"https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/\";>
-# | scans+} your mobile phone's photo collections for known faces</a>, and
-# | suggests you to share the picture you take according to who is in the
-# | frame.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Facebook's new Magic Photo app <a href=\"http://www.theregister.co.";
-#| "uk/2015/11/10/facebook_scans_camera_for_your_friends/\">scans your mobile "
-#| "phone's photo collections for known faces</a>, and suggests you to share "
-#| "the picture you take according to who is in the frame."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Facebook's new Magic Photo app <a href=\"https://web.archive.org/";
 "web/20160605165148/http://www.theregister.co.uk/2015/11/10/";
@@ -966,20 +928,7 @@
 "privacy-policy\"> accettare uno spionaggio ancora maggiore</a>, e alcuni "
 "cominciano a capire che questo non va bene."
 
-# | This article shows the <a
-# | 
[-href=\"http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/\";>-]
-# | 
{+href=\"https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/\";>+}
-# | twisted ways that they present snooping as a way to &ldquo;serve&rdquo;
-# | users better</a>&mdash;never mind whether they want that. This is a
-# | typical example of the attitude of the proprietary software industry
-# | towards those they have subjugated.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "This article shows the <a href=\"http://www.theregister.co.uk/2015/08/21/";
-#| "spotify_worse_than_the_nsa/\"> twisted ways that they present snooping as "
-#| "a way to &ldquo;serve&rdquo; users better</a>&mdash;never mind whether "
-#| "they want that. This is a typical example of the attitude of the "
-#| "proprietary software industry towards those they have subjugated."
+#. type: Content of: <ul><li><p>
 msgid ""
 "This article shows the <a href=\"https://web.archive.org/web/20160313214751/";
 "http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/\";> "

Index: proprietary/po/proprietary-tyrants.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-tyrants.it-en.html       22 May 2016 19:30:07 
-0000      1.4
+++ proprietary/po/proprietary-tyrants.it-en.html       30 Jul 2016 17:29:54 
-0000      1.5
@@ -55,6 +55,18 @@
 </p>
 </li>
 
+<li>
+<p>Microsoft accidentally left a way for users to install GNU/Linux
+on Windows RT tablets, but now it has <a
+href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>
+&ldquo;fixed&rdquo; the &ldquo;error&rdquo;</a>. Those arrogant
+bastards call this &ldquo;protecting&rdquo; the users.  The article
+talks of installing &ldquo;Linux&rdquo;, but the context shows it is
+really <a href="/gnu/linux-and-gnu.html">GNU/Linux</a> that users
+install.
+</p>
+</li>
+
 </ul>
 
 </div><!-- for id="content", starts in the include above -->
@@ -114,7 +126,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:07 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tyrants.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-tyrants.it.po    30 Jul 2016 16:22:36 -0000      
1.14
+++ proprietary/po/proprietary-tyrants.it.po    30 Jul 2016 17:29:54 -0000      
1.15
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-07-23 04:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary.it-en.html       10 Oct 2015 14:59:28 -0000      
1.4
+++ proprietary/po/proprietary.it-en.html       30 Jul 2016 17:29:54 -0000      
1.5
@@ -1,5 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 <title>Proprietary Software
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary.translist" -->
@@ -46,7 +46,8 @@
   <li><a href="/proprietary/malware-mobiles.html">Malware in mobile 
devices</a></li>
   <li><a href="/proprietary/malware-kindle-swindle.html">Malware in the Amazon
       Swindle</a></li>
-  <li><a href="/proprietary/proprietary-deception.html">Deceptive 
companies</a> masking their intentions.</li>
+  <li><a href="/proprietary/malware-games.html">Malware in games</a></li>
+  <li><a href="/proprietary/malware-appliances.html">Malware in 
appliances</a></li>
 </ul>
 </div>
 
@@ -55,6 +56,7 @@
 <li><strong>Type&nbsp;of malware</strong></li>
 <li><a href="/proprietary/proprietary-back-doors.html">Back doors</a></li>
 <li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+<li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
 <li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
 <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
 <li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
@@ -125,7 +127,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. -->
 
-<p>Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc.</p>
+<p>Copyright &copy; 2013, 2014, 2015, 2016 Free Software Foundation, Inc.</p>
 
 <p>This page is licensed under a <a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/";>Creative
@@ -135,7 +137,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2015/10/10 14:59:28 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/proprietary.it.po    30 Jul 2016 16:22:36 -0000      1.19
+++ proprietary/po/proprietary.it.po    30 Jul 2016 17:29:54 -0000      1.20
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-07-08 23:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -118,23 +117,11 @@
 "<a href=\"/proprietary/malware-kindle-swindle.html\">Malware nel Kindle/"
 "&ldquo;Swindle&rdquo; di Amazon</a>"
 
-# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware-]
-# | {+href=\"/proprietary/malware-games.html\">Malware+} in [-mobile
-# | devices</a>-] {+games</a>+}
-#. type: Content of: <div><div><ul><li>
-#| msgid ""
-#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
-#| "a>"
+#. type: Content of: <div><div><ul><li>
 msgid "<a href=\"/proprietary/malware-games.html\">Malware in games</a>"
 msgstr "<a href=\"/proprietary/malware-games.html\">Malware nei giochi</a>"
 
-# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware-]
-# | {+href=\"/proprietary/malware-appliances.html\">Malware+} in [-mobile
-# | devices</a>-] {+appliances</a>+}
-#. type: Content of: <div><div><ul><li>
-#| msgid ""
-#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
-#| "a>"
+#. type: Content of: <div><div><ul><li>
 msgid ""
 "<a href=\"/proprietary/malware-appliances.html\">Malware in appliances</a>"
 msgstr ""
@@ -153,10 +140,7 @@
 msgid "<a href=\"/proprietary/proprietary-censorship.html\">Censorship</a>"
 msgstr "<a href=\"/proprietary/proprietary-censorship.html\">Censura</a>"
 
-# | <a [-href=\"/proprietary/proprietary-insecurity.html\">Insecurity</a>-]
-# | {+href=\"/proprietary/proprietary-deception.html\">Deception</a>+}
 #. type: Content of: <div><div><ul><li>
-#| msgid "<a href=\"/proprietary/proprietary-insecurity.html\">Insecurity</a>"
 msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
 msgstr "<a href=\"/proprietary/proprietary-deception.html\">Inganni</a>"
 
@@ -268,10 +252,7 @@
 "<a href=\"/server/standards/README.translations.html\">Guida alle "
 "traduzioni</a>."
 
-# | Copyright &copy; 2013, 2014, [-2015-] {+2015, 2016+} Free Software
-# | Foundation, Inc.
 #. type: Content of: <div><p>
-#| msgid "Copyright &copy; 2013, 2014, 2015 Free Software Foundation, Inc."
 msgid "Copyright &copy; 2013, 2014, 2015, 2016 Free Software Foundation, Inc."
 msgstr "Copyright &copy; 2013, 2014, 2015, 2016 Free Software Foundation, Inc."
 

Index: server/po/sitemap.it-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.it-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- server/po/sitemap.it-en.html        22 May 2016 19:30:07 -0000      1.32
+++ server/po/sitemap.it-en.html        30 Jul 2016 17:29:54 -0000      1.33
@@ -1102,6 +1102,8 @@
   <dd>Avoiding Ruinous Compromises</dd>
   <dt><a 
href="/philosophy/computing-progress.html">computing-progress.html</a></dt>
   <dd>Computing &lsquo;progress&rsquo;: good and bad</dd>
+  <dt><a 
href="/philosophy/contradictory-support.html">contradictory-support.html</a></dt>
+  <dd>Beware of Contradictory &ldquo;Support&rdquo;</dd>
   <dt><a 
href="/philosophy/copyright-and-globalization.html">copyright-and-globalization.html</a></dt>
   <dd>Copyright and Globalization in the Age of Computer Networks</dd>
   <dt><a 
href="/philosophy/copyright-versus-community-2000.html">copyright-versus-community-2000.html</a></dt>
@@ -1330,6 +1332,8 @@
   <dd>Free Software: Freedom and Cooperation</dd>
   <dt><a href="/philosophy/rms-on-radio-nz.html">rms-on-radio-nz.html</a></dt>
   <dd>RMS on Radio NZ - October 2009</dd>
+  <dt><a href="/philosophy/rms-patents.html">rms-patents.html</a></dt>
+  <dd>Solutions to the Software Patent Problem</dd>
   <dt><a href="/philosophy/rtlinux-patent.html">rtlinux-patent.html</a></dt>
   <dd>GPL-compliant version of RTLinux Open Patent License in Works</dd>
   <dt><a href="/philosophy/savingeurope.html">savingeurope.html</a></dt>
@@ -1597,6 +1601,10 @@
 <dl>
   <dt><a href="/proprietary/malware-apple.html">malware-apple.html</a></dt>
   <dd>Apple's Operating Systems Are Malware</dd>
+  <dt><a 
href="/proprietary/malware-appliances.html">malware-appliances.html</a></dt>
+  <dd>Malware in Appliances</dd>
+  <dt><a href="/proprietary/malware-games.html">malware-games.html</a></dt>
+  <dd>Malware in Games</dd>
   <dt><a 
href="/proprietary/malware-kindle-swindle.html">malware-kindle-swindle.html</a></dt>
   <dd>Malware in the Kindle Swindle</dd>
   <dt><a 
href="/proprietary/malware-microsoft.html">malware-microsoft.html</a></dt>
@@ -1914,7 +1922,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:07 $
+$Date: 2016/07/30 17:29:54 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.it.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.it.po,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- server/po/sitemap.it.po     30 Jul 2016 16:22:35 -0000      1.101
+++ server/po/sitemap.it.po     30 Jul 2016 17:29:54 -0000      1.102
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-07-12 16:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -4547,10 +4546,7 @@
 msgid "<a href=\"/philosophy/rms-patents.html\">rms-patents.html</a>"
 msgstr "<a href=\"/philosophy/rms-patents.html\">rms-patents.html</a>"
 
-# | [-List GNU-]{+Solutions to the+} Software [-and Year 2000 Problems-]
-# | {+Patent Problem+}
 #. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "List GNU Software and Year 2000 Problems"
 msgid "Solutions to the Software Patent Problem"
 msgstr "Solutions to the Software Patent Problem"
 
@@ -5552,9 +5548,7 @@
 msgstr ""
 "<a href=\"/proprietary/malware-appliances.html\">malware-appliances.html</a>"
 
-# | Malware in [-Mobile Devices-] {+Appliances+}
 #. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Malware in Mobile Devices"
 msgid "Malware in Appliances"
 msgstr "Malware in Appliances"
 
@@ -5562,9 +5556,7 @@
 msgid "<a href=\"/proprietary/malware-games.html\">malware-games.html</a>"
 msgstr "<a href=\"/proprietary/malware-games.html\">malware-games.html</a>"
 
-# | Malware in [-Mobile Devices-] {+Games+}
 #. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Malware in Mobile Devices"
 msgid "Malware in Games"
 msgstr "Malware in Games"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]