[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www home.it.html planetfeeds.it.html philosophy...
From: |
GNUN |
Subject: |
www home.it.html planetfeeds.it.html philosophy... |
Date: |
Sat, 8 Oct 2016 21:29:05 +0000 (UTC) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/10/08 21:29:04
Modified files:
. : home.it.html planetfeeds.it.html
philosophy : words-to-avoid.it.html
philosophy/po : words-to-avoid.it-en.html words-to-avoid.it.po
po : home.it-en.html home.it.po planetfeeds.it.po
proprietary : malware-apple.it.html malware-microsoft.it.html
malware-mobiles.it.html
proprietary-back-doors.it.html
proprietary-censorship.it.html
proprietary-drm.it.html
proprietary-insecurity.it.html
proprietary-jails.it.html
proprietary-sabotage.it.html
proprietary-surveillance.it.html
proprietary-tyrants.it.html proprietary.it.html
proprietary/po : malware-apple.it-en.html malware-apple.it.po
malware-microsoft.it-en.html
malware-microsoft.it.po
malware-mobiles.it-en.html
malware-mobiles.it.po
proprietary-back-doors.it-en.html
proprietary-back-doors.it.po
proprietary-censorship.it-en.html
proprietary-censorship.it.po
proprietary-drm.it-en.html
proprietary-drm.it.po
proprietary-insecurity.it-en.html
proprietary-insecurity.it.po
proprietary-jails.it-en.html
proprietary-jails.it.po
proprietary-sabotage.it-en.html
proprietary-sabotage.it.po
proprietary-surveillance.it-en.html
proprietary-surveillance.it.po
proprietary-tyrants.it-en.html
proprietary-tyrants.it.po
proprietary.it-en.html proprietary.it.po
server : body-include-2.it.html
server/gnun/compendia: compendium.it.po
server/po : body-include-2.it.po sitemap.it-en.html
sitemap.it.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.it.html?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.it.html?cvsroot=www&r1=1.534&r2=1.535
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.it.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it-en.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it-en.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it.po?cvsroot=www&r1=1.589&r2=1.590
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.it.po?cvsroot=www&r1=1.734&r2=1.735
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.it.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.it.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.it.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.it.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.it.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-en.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/server/body-include-2.it.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/server/gnun/compendia/compendium.it.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/body-include-2.it.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it-en.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it.po?cvsroot=www&r1=1.113&r2=1.114
Patches:
Index: home.it.html
===================================================================
RCS file: /web/www/www/home.it.html,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- home.it.html 3 Oct 2016 08:58:52 -0000 1.307
+++ home.it.html 8 Oct 2016 21:29:02 -0000 1.308
@@ -311,7 +311,7 @@
</div>
<div id="blurb" class="emph-box white">
-<p>Today's random package…</p>
+<p>Il pacchetto GNU di oggi</p>
<!--#include virtual="/server/home-pkgselect.html" -->
<!--#include virtual="/server/home-pkgblurbs.it.html" -->
@@ -409,7 +409,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultima modifica:
-$Date: 2016/10/03 08:58:52 $
+$Date: 2016/10/08 21:29:02 $
<!-- timestamp end -->
</p>
Index: planetfeeds.it.html
===================================================================
RCS file: /web/www/www/planetfeeds.it.html,v
retrieving revision 1.534
retrieving revision 1.535
diff -u -b -r1.534 -r1.535
--- planetfeeds.it.html 6 Oct 2016 04:59:17 -0000 1.534
+++ planetfeeds.it.html 8 Oct 2016 21:29:02 -0000 1.535
@@ -1,20 +1,15 @@
<!-- Autogenerated by planetrss.pl 1.13 -->
<p><a href='http://mediagoblin.org/news/tpac-2016-and-review-activitypub.html'>
-ActivityPub and MediaGoblin at TPAC 2016 (or: ActivityPub needs
-your review!)</a>: Hello everyone! We have a lot of news to cover, but Iâm
going to jump
-right into the thick of it: weâve been wor...
+ActivityPub e MediaGoblin a TPAC 2016</a>
<a
href='http://mediagoblin.org/news/tpac-2016-and-review-activitypub.html'> <em>leggi
tutto...</em></a></p>
<p><a
href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-recap-for-september-30th-2016'>
-Free Software Directory meeting recap for September 30th, 2016</a>: Every week
free software activists from around the world come together in
-#fsf on irc.freenode.org to help improve the Free Soft...
+Ultimo aggiornamento dell'elenco di software libero</a>
<a
href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-recap-for-september-30th-2016'> <em>leggi
tutto...</em></a></p>
<p><a
href='http://www.fsf.org/blogs/community/twenty-two-22-new-gnu-releases-in-september'>
-Twenty-two new GNU releases in September</a>: * apl-1.6a *
autoconf-archive-2016.09.16 * autogen-5.18.12 * bash-4.4 *
-denemo-2.0.12 * drgeo-16.10a * emacs-25.1 * gawk-4.1.4 * global-6.5.5 *
-gnuca...
+22 nuove versioni di programmi GNU in settembre</a>
<a
href='http://www.fsf.org/blogs/community/twenty-two-22-new-gnu-releases-in-september'> <em>leggi
tutto...</em></a></p>
Index: philosophy/words-to-avoid.it.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.it.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- philosophy/words-to-avoid.it.html 1 Oct 2016 17:30:42 -0000 1.87
+++ philosophy/words-to-avoid.it.html 8 Oct 2016 21:29:02 -0000 1.88
@@ -29,6 +29,7 @@
“<a href="#Alternative">Alternativa</a>” | <!--
GNUN-SORT-NEXT-ITEM -->
“<a href="#Open">Aperto</a>” | <!-- GNUN-SORT-NEXT-ITEM -->
“<a href="#DigitalGoods">Beni digitali (Digital Goods)</a>” | <!--
GNUN-SORT-NEXT-ITEM -->
+“<a href="#Assets">Beni (digitali)</a>” | <!-- GNUN-SORT-NEXT-ITEM
-->
“<a href="#Closed">Chiuso</a>” | <!-- GNUN-SORT-NEXT-ITEM -->
“<a href="#CloudComputing">Cloud Computing</a>” | <!--
GNUN-SORT-NEXT-ITEM -->
“<a href="#Commercial">Commerciale</a>” | <!-- GNUN-SORT-NEXT-ITEM
-->
@@ -110,9 +111,9 @@
<em>diritto</em> di pretendere una copia.</p>
<p>
In particolare, se qualcuno scrive un programma autonomamente e non ne cede
-mai copie ad alcuno, quel programma è software libero (in modo banale)
-perché il suo autore, che ne è il solo utente, ha le quattro libertÃ
-essenziali.</p>
+mai copie ad alcuno, quel programma è software libero (anche se in modo
+banale) perché tutti gli utenti che ne possiedono una copia, e cioè il solo
+autore, hanno le quattro libertà essenziali.</p>
<p>
In pratica, quando molti utenti hanno copie di un programma libero, qualcuno
sicuramente lo pubblicherà su Internet, dando accesso a chiunque. Pensiamo
@@ -194,6 +195,17 @@
<!-- GNUN-SORT-NEXT-ITEM -->
<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="Assets">“Beni (digitali)”</h3>
+
+<!-- GNUN-SORT-END-KEY -->
+<p>
+Chiamare le opere pubblicare col nome di "beni" o "beni digitali" è ancora
+peggio che chiamarli <a href="#Content">“contenuti”</a> perché
+presuppone che non abbiano alcun valore per la società tranne quello
+commerciale.</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
<h3 id="Closed">“Chiuso”</h3>
<!-- GNUN-SORT-END-KEY -->
@@ -639,10 +651,12 @@
venisse considerata una verità oggettiva.</p>
<p>
Il sistema giuridico - almeno negli USA - non considera l'infrazione al
-diritto d'autore un "furto". Le leggi sui furti non si applicano alle
-infrazioni al diritto d'autore. I sostenitori di una forma oppressiva di
-copyright si appellano a un'autorità ... e presentano in maniera sbagliata
-quanto sostiene tale autorità .</p>
+diritto d'autore un "furto". <a
+href="http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&vol=473&invol=207">Le
+leggi sui furti non si applicano alle infrazioni al diritto d'autore.</a> I
+sostenitori di una forma oppressiva di copyright si appellano a
+un'autorità ... e presentano in maniera sbagliata quanto sostiene tale
+autorità .</p>
<p>
Come argomentazione, potete fare riferimento a questo <a
href="http://www.guardian.co.uk/books/2013/may/04/harper-lee-kill-mockingbird-copyright">
@@ -1264,7 +1278,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/10/01 17:30:42 $
+$Date: 2016/10/08 21:29:02 $
<!-- timestamp end -->
</p>
Index: philosophy/po/words-to-avoid.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it-en.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- philosophy/po/words-to-avoid.it-en.html 1 Oct 2016 17:30:42 -0000
1.78
+++ philosophy/po/words-to-avoid.it-en.html 8 Oct 2016 21:29:02 -0000
1.79
@@ -26,6 +26,8 @@
|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> “<a
href="#Alternative">Alternative</a>”
|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> “<a
+ href="#Assets">Assets</a>”
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> “<a
href="#BSD-style">BSD-style</a>”
|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> “<a
href="#Closed">Closed</a>”
@@ -147,19 +149,19 @@
The <a href="/philosophy/free-sw.html">criterion for free software</a>
is not about who has “access” to the program; the four
essential freedoms concern what a user that has a copy of the program
-can do with it. For instance, freedom 2 says that that user is free
-to make another copy and give or sell it to you. But no user
+is allowed to do with it. For instance, freedom 2 says that that user
+is free to make another copy and give or sell it to you. But no user
is <em>obligated</em> to do that for you; you do not have
a <em>right</em> to demand a copy of that program from any user.</p>
<p>
In particular, if you write a program yourself and never offer a copy
-to anyone else, that program is free software (in a trivial way)
-because you (the sole user that has it) have the four essential
-freedoms.</p>
+to anyone else, that program is free software albeit in a trivial way,
+because every user that has a copy has the four essential freedoms
+(since the only such user is you).</p>
<p>
In practice, when many users have copies of a program, someone is sure
to post it on the internet, giving everyone access to it. We think
-people ought to do that, if the program is useful. But this isn't a
+people ought to do that, if the program is useful. But that isn't a
requirement of free software.</p>
<p>
There is one specific point in which a question of having access is
@@ -192,6 +194,16 @@
<!-- GNUN-SORT-NEXT-ITEM -->
<!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="Assets">“Assets”</h3>
+<!-- GNUN-SORT-END-KEY -->
+<p>
+To refer to published works as “assets”, or “digital
+assets”, is even worse than calling
+them <a href="#Content">“content”</a> — it presumes
+they have no value to society except commercial value.</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
<h3 id="BSD-style">“BSD-style”</h3>
<!-- GNUN-SORT-END-KEY -->
<p>
@@ -1132,9 +1144,11 @@
copyright infringement. This is spin, but they would like you to take
it for objective truth.</p>
<p>
-Under the US legal system, copyright infringement is not theft. Laws
-about theft are not applicable to copyright infringement. The
-supporters of repressive copyright are making an appeal to
+Under the US legal system, copyright infringement is not theft.
+<a
+href="http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&vol=473&invol=207">
+Laws about theft are not applicable to copyright infringement.</a>
+The supporters of repressive copyright are making an appeal to
authority—and misrepresenting what authority says.</p>
<p>
To refute them, you can point to this
@@ -1247,7 +1261,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/10/01 17:30:42 $
+$Date: 2016/10/08 21:29:02 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/words-to-avoid.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- philosophy/po/words-to-avoid.it.po 8 Oct 2016 21:04:13 -0000 1.212
+++ philosophy/po/words-to-avoid.it.po 8 Oct 2016 21:29:02 -0000 1.213
@@ -18,7 +18,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-10-04 05:56+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -69,11 +68,8 @@
msgid "“<a href=\"#Alternative\">Alternative</a>” |"
msgstr "“<a href=\"#Alternative\">Alternativa</a>” |"
-# | “<a [-href=\"#Access\">Access</a>”-]
-# | {+href=\"#Assets\">Assets</a>”+} |
#. GNUN-SORT-NEXT-ITEM
#. type: Content of: <p>
-#| msgid "“<a href=\"#Access\">Access</a>” |"
msgid "“<a href=\"#Assets\">Assets</a>” |"
msgstr "“<a href=\"#Assets\">Beni (digitali)</a>” |"
@@ -280,8 +276,8 @@
#. type: Content of: <p>
msgid "“<a href=\"#SharingEconomy\">Sharing economy</a>” |"
msgstr ""
-"“<a href=\"#SharingEconomy\">Economia di condivisione (Sharing "
-"economy)</a>” |"
+"“<a href=\"#SharingEconomy\">Economia di condivisione (Sharing economy)"
+"</a>” |"
#. GNUN-SORT-NEXT-ITEM
#. type: Content of: <p>
@@ -363,22 +359,7 @@
"libero coincida con l'avere \"accesso\" pubblico a un programma, ma questo "
"non è il significato di software libero."
-# | The <a href=\"/philosophy/free-sw.html\">criterion for free software</a>
-# | is not about who has “access” to the program; the four
-# | essential freedoms concern what a user that has a copy of the program
-# | [-can-] {+is allowed to+} do with it. For instance, freedom 2 says that
-# | that user is free to make another copy and give or sell it to you. But no
-# | user is <em>obligated</em> to do that for you; you do not have a
-# | <em>right</em> to demand a copy of that program from any user.
-#. type: Content of: <p>
-#| msgid ""
-#| "The <a href=\"/philosophy/free-sw.html\">criterion for free software</a> "
-#| "is not about who has “access” to the program; the four "
-#| "essential freedoms concern what a user that has a copy of the program can "
-#| "do with it. For instance, freedom 2 says that that user is free to make "
-#| "another copy and give or sell it to you. But no user is <em>obligated</"
-#| "em> to do that for you; you do not have a <em>right</em> to demand a copy "
-#| "of that program from any user."
+#. type: Content of: <p>
msgid ""
"The <a href=\"/philosophy/free-sw.html\">criterion for free software</a> is "
"not about who has “access” to the program; the four essential "
@@ -396,16 +377,7 @@
"em> di fare o distribuire copie, e nessuno ha il <em>diritto</em> di "
"pretendere una copia."
-# | In particular, if you write a program yourself and never offer a copy to
-# | anyone else, that program is free software [-(in-] {+albeit in+} a trivial
-# | way[-)-]{+,+} because [-you (the sole-] {+every+} user that has [-it)
-# | have-] {+a copy has+} the four essential [-freedoms.-] {+freedoms (since
-# | the only such user is you).+}
-#. type: Content of: <p>
-#| msgid ""
-#| "In particular, if you write a program yourself and never offer a copy to "
-#| "anyone else, that program is free software (in a trivial way) because "
-#| "you (the sole user that has it) have the four essential freedoms."
+#. type: Content of: <p>
msgid ""
"In particular, if you write a program yourself and never offer a copy to "
"anyone else, that program is free software albeit in a trivial way, because "
@@ -417,16 +389,7 @@
"banale) perché tutti gli utenti che ne possiedono una copia, e cioè il solo
"
"autore, hanno le quattro libertà essenziali."
-# | In practice, when many users have copies of a program, someone is sure to
-# | post it on the internet, giving everyone access to it. We think people
-# | ought to do that, if the program is useful. But [-this-] {+that+} isn't a
-# | requirement of free software.
-#. type: Content of: <p>
-#| msgid ""
-#| "In practice, when many users have copies of a program, someone is sure to "
-#| "post it on the internet, giving everyone access to it. We think people "
-#| "ought to do that, if the program is useful. But this isn't a requirement "
-#| "of free software."
+#. type: Content of: <p>
msgid ""
"In practice, when many users have copies of a program, someone is sure to "
"post it on the internet, giving everyone access to it. We think people "
@@ -486,9 +449,7 @@
"del software</a> non danno libertà agli utenti. Pensiamo che non si debbano "
"offrire agli utenti queste \"alternative\" al software libero."
-# | [-“Access”-]{+“Assets”+}
#. type: Content of: <h3>
-#| msgid "“Access”"
msgid "“Assets”"
msgstr "“Beni (digitali)”"
@@ -2070,9 +2031,9 @@
"your privacy, try one of the <a href=\"https://libreplanet.org/wiki/Group:"
"Skype_Replacement\"> numerous free Skype replacements</a>."
msgstr ""
-"Non usate il neologismo “skypare” per indicare una "
-"(video)chiamata via Internet. Skype è solo uno dei tanti programmi per "
-"questo scopo, e per di più è software proprietario e <a href=\"/philosophy/"
+"Non usate il neologismo “skypare” per indicare una (video)"
+"chiamata via Internet. Skype è solo uno dei tanti programmi per questo "
+"scopo, e per di più è software proprietario e <a href=\"/philosophy/"
"proprietary/proprietary-surveillance.html#SpywareInSkype\"> spia i propri "
"utenti</a>. Per effettuare (video)chiamate via Internet in un modo che "
"rispetti la vostra libertà e la vostra privacy, usate uno dei tanti <a href="
@@ -2176,17 +2137,7 @@
"copyright. Questa è un'esagerazione, ma costoro vorrebbero che questa "
"venisse considerata una verità oggettiva."
-# | Under the US legal system, copyright infringement is not theft. {+<a
-# |
href=\"http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&vol=473&invol=207\">+}
-# | Laws about theft are not applicable to copyright [-infringement.-]
-# | {+infringement.</a>+} The supporters of repressive copyright are making an
-# | appeal to authority—and misrepresenting what authority says.
-#. type: Content of: <p>
-#| msgid ""
-#| "Under the US legal system, copyright infringement is not theft. Laws "
-#| "about theft are not applicable to copyright infringement. The supporters "
-#| "of repressive copyright are making an appeal to authority—and "
-#| "misrepresenting what authority says."
+#. type: Content of: <p>
msgid ""
"Under the US legal system, copyright infringement is not theft. <a href="
"\"http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&vol=473&"
Index: po/home.it-en.html
===================================================================
RCS file: /web/www/www/po/home.it-en.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- po/home.it-en.html 5 Sep 2016 08:29:29 -0000 1.130
+++ po/home.it-en.html 8 Oct 2016 21:29:02 -0000 1.131
@@ -9,92 +9,131 @@
<style type="text/css" media="print,screen">
<!--
-#home .button {
+/* === Banner === */
+#gnuhealth { display: none; }
address@hidden (min-width: 57em) {
+ #gnuhealth {
+ display: block;
+ width: 100%;
+ margin-top: 2.3em;
+ }
+}
+/* ======================= */
+
+#content {
+ margin: 0;
+}
+.first-column, .second-column {
+ width: 40em; max-width: 100%;
+ margin: auto;
+}
+
+h2 {
+ color: #333;
+ margin: 1.2em 0 .9em;
+}
+h2.first {
+ margin-top: 1em;
+}
+#gnu-linux {
+ width: 30em; max-width: 100%;
text-align: center;
- font-weight: bold;
- margin-top: .7em; margin-bottom: .8em;
+ margin: 0 auto 1em;
+}
+#gnu-linux img {
+ width: 100%;
+}
+.button {
+ font-size: 1.8em;
+ margin: 1.7em 0;
}
.button a, .button a:visited {
- color: #971611;
- text-decoration: none;
+ padding: .4em .6em;
+ color: #a42e2b;
+ background: #eee;
+ border: .1em solid #ccc;
}
.button a:hover {
color: #777;
}
-.large {
- width: auto: max-width: 100%;
- font-size: 2em;
- padding: .1em;
- background-color: #e7e9eb;
- border: .4em solid #c9cccf;
-}
-#home .button {
- box-shadow: 0 .15em #171d33;
- -moz-box-shadow: 0 .15em #171d33;
- -webkit-box-shadow: 0 .15em #171d33;
- -icab-box-shadow: 0 .15em #171d33;
- -o-box-shadow: 0 .15em #171d33;
- border-radius: 1em;
- -moz-border-radius: 1em;
- -khtml-border-radius: 1em;
- -webkit-border-radius: 1em;
- -opera-border-radius: 1em;
+.first-column p.back {
+ margin-bottom: 0;
}
-.emph-box p { font-size: .9em }
-.emph-box h4 {
- text-align: center;
+.second-column .emph-box {
+ padding: 0 1.2em 1.2em;
+ margin-top: 1.5em;
+}
+.second-column .emph-box.white {
+ background: white;
+}
+.second-column .emph-box .back {
+ margin-top: 1em;
+}
+h3 {
+ margin-top: .7em;
+}
+h3 img {
+ height: .8em;
+ margin-left: .5em;
+}
+#blurb h4 {
+ text-align: left;
font-size: 1.5em;
+ margin-top: .4em;
}
-
-.first-column {
- width: 60%;
+#blurb h4 img {
float: left;
+ margin-right: .5em;
}
-.second-column {
- width: 38%;
- float: right;
+#Flashes p, #unmaint li, #blurb p, #blurb p small {
+ font-size: .9em;
}
address@hidden (max-width: 40em) {
- .first-column, .second-column {
- float: none;
- width: 100%;
- }
+#unmaint li, #blurb p {
+ color: #404040;
}
-.first-column, .second-column {
- margin-bottom: 2em; margin-top: 0;
-}
-.first-column {
- margin-bottom: .5em;
+#unmaint strong {
+ display: block;
+ font-size: 1.1em;
+ color: black;
}
-h2 {
- text-shadow: none;
- margin-bottom: .6em;
+.clear {
+ clear: both;
+ height: 2em;
}
-.first-column img { width: 80%; margin: .5em 0 1em 0; }
-
-.second-column h4 img { height: .8em; }
-h4#Flashes { margin-top: .5em; }
-#Action {
- padding: 0 1em;
- border-left: .4em solid #b9bcbf; border-right: .4em solid #b9bcbf;
+.translators-notes {
+ width: 44.4em; max-width: 100%;
+ margin: 0 auto;
}
-#Action h2 {
- text-align: center;
- padding-top: 0;
- color: #171d33;
+#mission-statement {
+ margin-bottom: 0;
+}
+#sisters {
+ font-size: .9em;
+ margin: 0 3% 2em;
}
-#Action li { margin-bottom: .7em; }
-#mission-statement { margin-bottom: 0; }
-#sisters { font-size: .9em; margin: 0 3% 2em; }
address@hidden (min-width: 57em) {
+ .first-column {
+ width: 61%;
+ float: left;
+ margin: 0;
+ }
+ .second-column {
+ width: 33%;
+ float: right;
+ margin: 0;
+ }
+ .translators-notes {
+ width: 100%;
+ }
+}
-->
</style>
<!--#include virtual="/server/fs-gang-definitions.html" -->
<!--#include virtual="/po/home.translist" -->
<!--#include virtual="/server/banner.html" -->
-
<p class="no-display">GNU is the only operating system developed
specifically to give its users freedom. What is GNU, and what freedom
is at stake?</p>
@@ -102,7 +141,7 @@
<div id="home">
<div class="first-column">
-<h2>What is GNU?</h2>
+<h2 class="first">What is GNU?</h2>
<p>GNU is an operating system that
is <a href="/philosophy/free-sw.html">free software</a>—that is,
@@ -114,9 +153,14 @@
are entirely free software. <a href="#More-GNU">More about GNU
below</a>.</p>
-<p class="c"><a href="/distros/screenshot.html"><img
- src="/distros/screenshots/trisquel-medium.jpg" alt="Screenshot of GNU"
- /></a></p>
+<div id="gnu-linux">
+<p class="button"><a
+ href="/distros/free-distros.html">Try GNU/Linux!</a></p>
+
+<a href="/distros/screenshot-gnewsense.html"><img
+ src="/distros/screenshots/gnewsense2-medium.jpg"
+ alt="Screenshot of GNU"/></a>
+</div>
<h2>What is the Free Software Movement?</h2>
@@ -190,37 +234,25 @@
project.</p>
<p class="back"><a href="/gnu/gnu.html">More information</a></p>
-
</div><!-- /first-column -->
<div class="second-column">
-<p class="button c large"><a
- href="/distros/free-distros.html">Try GNU/Linux!</a></p>
-
-<div class="emph-box">
+<a href="http://www.gnuhealthcon.org/2016-las_palmas/"><img id="gnuhealth"
+src="/server/staging/gnuhealth/gnuhealthcon2016_small.jpg" alt="GNUHealth
Conference 2016" /></a>
-<h4 id="Flashes"><a href="http://planet.gnu.org/">Planet GNU</a>
-<a href="http://planet.gnu.org/rss20.xml"><img src="/feed-icon-10x10.png"
alt="RSS Feed" /></a></h4>
+<div id="Flashes" class="emph-box white">
+<h3><a href="http://planet.gnu.org/">Planet GNU</a>
+<a href="http://planet.gnu.org/rss20.xml"><img src="/feed-icon-10x10.png"
alt="RSS Feed" /></a></h3>
<!--#include virtual="/planetfeeds.html" -->
-
<p>For more news, see <a href="http://planet.gnu.org/">Planet GNU</a>
and the list of <a href="/software/recent-releases.html">recent GNU
releases</a>.</p>
+</div>
-<!--#include virtual="/server/home-pkgselect.html" -->
-<!--#include virtual="/server/home-pkgblurbs.html" -->
-
-<p class="back"><small><a href="/manual/blurbs.html">Short descriptions for
all GNU
-packages</a></small></p>
-
-</div><!-- class="emph-box" -->
-
-<div id="Action">
-
-<!-- BEGIN TakeAction -->
-<h2>Take Action</h2>
+<div id="Action" class="emph-box">
+<h3>Take Action</h3>
<ul>
<li><strong><a href="http://www.fsf.org/campaigns">Support current FSF
@@ -241,55 +273,50 @@
<li><strong>Fight against software patents:</strong>
<a href="http://www.endsoftpatents.org">worldwide</a>,
<a href="/server/takeaction.html#swpat">and Europe</a>.</li>
-
-<li><strong>Watch and share this movie:</strong> <a
-href="http://patentabsurdity.com">Patent Absurdity</a>—made
-possible by <a href="http://www.fsf.org/associate/">FSF associate
-members</a> like <a href="http://fsf.org/jfb">you</a>.</li>
-
-<li><strong><a href="/server/takeaction.html#wipochange">Call
-on WIPO</a></strong> to change its name and mission.</li>
-
-<li>Students! <a href="http://www.aful.org/communiques/univ-offers-me-windows">
-Claim a refund on your unused Microsoft Windows licences</a>.</li>
-
-<li><a href="/server/takeaction.html#directory">Add to the Free Software
-Directory</a>.</li>
</ul>
<p class="back"><a href="/server/takeaction.html">More action items</a></p>
-<!-- END TakeAction -->
-</div><!-- /Action -->
-</div><!-- /second-column -->
-</div><!-- /home -->
-
-<div class="highlight-para" style="clear: both">
+</div>
-<p><strong>Can you contribute to any of
+<div id="unmaint" class="emph-box">
+<ul>
+<li><strong>Can you contribute to any of
these <a href="http://www.fsf.org/campaigns/priority-projects/">High
Priority Projects</a>?</strong> Gnash, coreboot, free distributions of
GNU/Linux, GNU Octave, drivers for network routers, reversible
debugging in GDB, automatic transcription, PowerVR drivers, and also
free software replacements for Skype, OpenDWG libraries, and Oracle
-Forms.</p>
+Forms.</li>
-<p id="unmaint"><strong>Can you take over an <a
+<li><strong>Can you take over an <a
href="/server/takeaction.html#unmaint">unmaintained GNU
package</a>?</strong>
<span class="gnun-split"></span>
<a href="/software/halifax/">halifax</a>,
- <a href="/software/metahtml/">metahtml</a>,
<a href="/software/orgadoc/">orgadoc</a><span class="gnun-split"></span>,
are all <a href="/server/takeaction.html#unmaint">looking for
maintainers</a>. Also, these packages are looking for co-maintainers:
<span class="gnun-split"></span>
<a href="/software/aspell/">aspell</a>,
<a href="/software/gnuae/">gnuae</a>,
+ <a href="/software/gnubik/">gnubik</a>,
<a href="/software/metaexchange/">metaexchange</a>,
<a href="/software/powerguru/">powerguru</a><span class="gnun-split"></span>.
-See the package web pages for more information.</p>
+See the package web pages for more information.</li>
+</ul>
+</div>
-</div><!-- /highlight-para -->
+<div id="blurb" class="emph-box white">
+<p>Today's random package…</p>
+<!--#include virtual="/server/home-pkgselect.html" -->
+<!--#include virtual="/server/home-pkgblurbs.html" -->
+<p class="back"><small><a href="/manual/blurbs.html">Short descriptions for
all GNU
+packages</a></small></p>
+</div>
+
+</div><!-- /second-column -->
+</div><!-- /home -->
+<div class="clear"></div>
</div><!-- for id="content", starts in the include above -->
<!--#include virtual="/server/footer.html" -->
@@ -358,7 +385,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/09/05 08:29:29 $
+$Date: 2016/10/08 21:29:02 $
<!-- timestamp end -->
</p>
</div>
Index: po/home.it.po
===================================================================
RCS file: /web/www/www/po/home.it.po,v
retrieving revision 1.589
retrieving revision 1.590
diff -u -b -r1.589 -r1.590
--- po/home.it.po 8 Oct 2016 21:04:15 -0000 1.589
+++ po/home.it.po 8 Oct 2016 21:29:02 -0000 1.590
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-05 09:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
# type: Content of: <title>
@@ -89,10 +88,7 @@
msgstr "<a href=\"/distros/free-distros.html\">Provate GNU/Linux!</a>"
# type: Content of: <table><tr><td><ul><li>
-# | <a [-href=\"/distros/screenshot.html\">-]
-# | {+href=\"/distros/screenshot-gnewsense.html\">+}
#. type: Content of: <div><div><div><a>
-#| msgid "<a href=\"/distros/screenshot.html\">"
msgid "<a href=\"/distros/screenshot-gnewsense.html\">"
msgstr "<a href=\"/distros/screenshot-gnewsense.html\">"
@@ -286,10 +282,7 @@
msgstr "<a href=\"/gnu/gnu.html\">Ulteriori informazioni</a>"
# type: Content of: <p>
-# | [-by-]<a [-href=\"http://www.stallman.org/\">Richard Stallman</a>-]
-# | {+href=\"http://www.gnuhealthcon.org/2016-las_palmas/\">+}
#. type: Content of: <div><div><a>
-#| msgid "by <a href=\"http://www.stallman.org/\">Richard Stallman</a>"
msgid "<a href=\"http://www.gnuhealthcon.org/2016-las_palmas/\">"
msgstr "<a href=\"http://www.gnuhealthcon.org/2016-las_palmas/\">"
@@ -398,13 +391,7 @@
"<strong>Potete aiutare a ripristinare un <a href=\"/server/takeaction."
"html#unmaint\">pacchetto GNU abbandonato</a>?</strong>"
-# | <a href=\"/software/halifax/\">halifax</a>, <a
-# | [-href=\"/software/metahtml/\">metahtml</a>, <a-]
-# | href=\"/software/orgadoc/\">orgadoc</a>
#. type: Content of: <div><div><div><ul><li>
-#| msgid ""
-#| "<a href=\"/software/halifax/\">halifax</a>, <a href=\"/software/metahtml/"
-#| "\">metahtml</a>, <a href=\"/software/orgadoc/\">orgadoc</a>"
msgid ""
"<a href=\"/software/halifax/\">halifax</a>, <a href=\"/software/orgadoc/"
"\">orgadoc</a>"
@@ -421,16 +408,7 @@
", hanno bisogno di <a href=\"/server/takeaction.html#unmaint\">responsabili</"
"a>. E questi altri cercano aiuto:"
-# | <a href=\"/software/aspell/\">aspell</a>, <a
-# | href=\"/software/gnuae/\">gnuae</a>, <a
-# | {+href=\"/software/gnubik/\">gnubik</a>, <a+}
-# | href=\"/software/metaexchange/\">metaexchange</a>, <a
-# | href=\"/software/powerguru/\">powerguru</a>
#. type: Content of: <div><div><div><ul><li>
-#| msgid ""
-#| "<a href=\"/software/aspell/\">aspell</a>, <a href=\"/software/gnuae/"
-#| "\">gnuae</a>, <a href=\"/software/metaexchange/\">metaexchange</a>, <a "
-#| "href=\"/software/powerguru/\">powerguru</a>"
msgid ""
"<a href=\"/software/aspell/\">aspell</a>, <a href=\"/software/gnuae/"
"\">gnuae</a>, <a href=\"/software/gnubik/\">gnubik</a>, <a href=\"/software/"
Index: po/planetfeeds.it.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.it.po,v
retrieving revision 1.734
retrieving revision 1.735
diff -u -b -r1.734 -r1.735
--- po/planetfeeds.it.po 8 Oct 2016 21:04:15 -0000 1.734
+++ po/planetfeeds.it.po 8 Oct 2016 21:29:02 -0000 1.735
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-01 04:57+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <p><a>
@@ -44,14 +43,7 @@
msgid "more"
msgstr " <em>leggi tutto...</em>"
-# | <a
-# |
[-href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-recap-for-august-12th-2016'>-]
-# | {+href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-
-# | recap-for-september-30th-2016'>+}
-#. type: Content of: <p><a>
-#| msgid ""
-#| "<a href='http://www.fsf.org/blogs/directory/free-software-directory-"
-#| "meeting-recap-for-august-12th-2016'>"
+#. type: Content of: <p><a>
msgid ""
"<a href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-"
"recap-for-september-30th-2016'>"
@@ -59,33 +51,17 @@
"<a href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-"
"recap-for-september-30th-2016'>"
-# | Free Software Directory meeting recap for [-August 12th,-] {+September
-# | 30th,+} 2016
#. type: Content of: <p><a>
-#| msgid "Free Software Directory meeting recap for August 12th, 2016"
msgid "Free Software Directory meeting recap for September 30th, 2016"
msgstr "Ultimo aggiornamento dell'elenco di software libero"
-# | : Every week free software activists from around the world come together
-# | in #fsf on irc.freenode.org to help improve the Free [-Softwar...-]
-# | {+Soft...+}
#. type: Content of: <p>
-#| msgid ""
-#| ": Every week free software activists from around the world come together "
-#| "in #fsf on irc.freenode.org to help improve the Free Softwar..."
msgid ""
": Every week free software activists from around the world come together in "
"#fsf on irc.freenode.org to help improve the Free Soft..."
msgstr " "
-# | <a
-# |
[-href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-recap-for-august-12th-2016'>-]
-# | {+href='http://www.fsf.org/blogs/community/twenty-two-22-new-gnu-releases-i
-# | n-september'>+}
-#. type: Content of: <p><a>
-#| msgid ""
-#| "<a href='http://www.fsf.org/blogs/directory/free-software-directory-"
-#| "meeting-recap-for-august-12th-2016'>"
+#. type: Content of: <p><a>
msgid ""
"<a href='http://www.fsf.org/blogs/community/twenty-two-22-new-gnu-releases-"
"in-september'>"
Index: proprietary/malware-apple.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.it.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/malware-apple.it.html 4 Aug 2016 21:28:30 -0000 1.17
+++ proprietary/malware-apple.it.html 8 Oct 2016 21:29:03 -0000 1.18
@@ -229,6 +229,12 @@
<h3 id="surveillance">Sorveglianza di Apple</h3>
<ul>
+ <li><p>L'applicazione iMessage dei vari iGadget <a
+href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">comunica
+a un server ogni numero di telefono digitato dall'utente</a>; il server
+tiene memorizzati i numeri per almeno 30 giorni.</p>
+ </li>
+
<li><p>Gli utenti non possono creare una ID di Apple (che serve <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">anche
se si usano solo applicazioni gratuite</a>) senza dare un indirizzo e-mail
@@ -488,7 +494,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/08/04 21:28:30 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/malware-microsoft.it.html 25 Aug 2016 22:28:17 -0000
1.17
+++ proprietary/malware-microsoft.it.html 8 Oct 2016 21:29:03 -0000
1.18
@@ -95,8 +95,27 @@
sia qualcuno) riporre questa fiducia.</p></li>
<li><p>Le backdoor di Windows 8 sono larghe al punto da <a
-href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">far
+href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">far
concludere al governo tedesco che non ci si possa fidare di
questo</a>.</p></li>
+
+<li><p>Gli utenti segnalano che <a
+href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+Microsoft li costringe a sostituire Windows 7 e 8 con lo "spione" Windows
+10</a>.</p>
+
+ <p>Microsoft effettivamente ha <a
+href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+attaccato i computer con Windows 7 e 8</a>, riattivando l'opzione che diceva
+se “aggiornare” a Windows 10 anche quando gli utenti l'avevano
+disattivata.</p>
+
+ <p>In seguito, Microsoft ha pubblicato istruzioni su <a
+href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+come rifiutare il cosiddetto "aggiornamento" a Windows 10</a>.</p>
+
+ <p>Sembra che questo comporti l'utilizzo di una backdoor in Windows 7 e
8.</p>
+</li>
+
</ul>
<h3 id="insecurity">Insicurezza di Microsoft</h3>
@@ -108,6 +127,14 @@
le credenziali dell'account Microsoft dell'utente, se riesce a fargli
visitare un link opportunamente costruito.</p>
</li>
+<li>
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+I POS Bancomat con Windows sono stati attaccati e trasformati in una rete di
+bot allo scopo di raccogliere i numeri di carta di credito dei clienti</a>.
+</p>
+</li>
+
</ul>
@@ -149,12 +176,10 @@
<li><p>Microsoft sta <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
-costringendo</a> gli utenti ad <a
-href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">aggiornare
-a Windows 10</a>, ignorando la scelta di non aggiornare disponibile in
-Windows 7 o 8. Ciò conferma la presenza di una <a
-href="/proprietary/proprietary-back-doors.html">backdoor universale in
-Windows</a> 7 e 8.</p></li>
+costringendo gli utenti ad "aggiornare" a Windows 10</a>, ignorando la
+scelta di non aggiornare disponibile in Windows 7 o 8. Ciò conferma la
+presenza di una <a href="/proprietary/proprietary-back-doors.html">backdoor
+universale in Windows</a> 7 e 8.</p></li>
<li><p>Gli "aggiornamenti" a Windows 10 <a
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
@@ -166,8 +191,15 @@
sollecitando molti utenti ad installare Windows 10</a>.
</p></li>
+<li><p>
+Microsoft per mesi ha <a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update">
+sollecitato molti utenti ad installare Windows 10</a> in modo ingannevole,
+se non se ne accorgevano e dicevano espressamente di no.
+</p></li>
+
<li><p><a
-href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">Microsoft
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">>Microsoft
informa l'NSA sui bug di Windows prima di sistemarli</a>.</p></li>
<li><p><a
@@ -195,6 +227,11 @@
<ul>
+<li>Per aumentare il numero di installazioni di Windows 10, Microsoft <a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+non rispetta la scelta e la privacy degli utenti</a>.
+</li>
+
<li><p>Microsoft sta ripetutamente <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">
sollecitando molti utenti ad installare Windows 10</a>.</p></li>
@@ -213,7 +250,22 @@
</ul>
<h3 id="surveillance">Sorveglianza di Microsoft</h3>
+
<ul>
+
+<li>Sembra che Windows 10 invii a Microsoft <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+dati sulle applicazioni in esecuzione</a>.</li>
+
+<li><p>Un cosiddetto "aggiornamento" a Windows 10 cancellava applicazioni per
il
+controllo della sorveglianza; un passaggio ulteriore inseriva un programma
+spia. Gli utenti se ne sono accorti e si sono lamentati, quindi Microsoft ha
+cambiato nome al programma <a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+per fare credere agli utenti di averlo tolto</a>.</p>
+
+<p>Chi usa software proprietario si espone ad essere trattato in questo
modo.</p></li>
+
<li><p>
<a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
@@ -229,7 +281,12 @@
utenti, il testo inserito, le parole dettate, le informazioni sulal
posizione, i contatti, le voci di calendario e le pagine web visitate, e
persino di connettere automaticamente il computer a reti wireless sprotette
-e di mostrare pubblicità personalizzata.</p></li>
+e di mostrare pubblicità personalizzata.</p>
+
+ <p>Possiamo immaginare che Microsoft spii i file degli utenti solo su
richiesta
+del governo statunitense, ma le “condizioni sulla privacy” non
+lo dicono esplicitamente. E cosa succederebbe se fosse il governo cinese a
+presentare richiesta?</p></li>
<li><p>
<a
@@ -238,6 +295,32 @@
l'utente anche se si disattivano le funzioni di ricerca di Bing e Cortana e
si attiva la protezione della privacy.</p></li>
+ <li><p>Grazie all'“identificatore unico” per la pubblicità ,
diverso per
+ciascun utente, altre aziende possono controllare l'attività di navigazione
+di ogni specifico utente.</p></li>
+
+ <li>Spyware in Windows 8: <a
+href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">Windows
+Update spia l'utente</a>. <a
+href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">Windows
+8.1 curiosa nelle ricerche locali</a>. E c'è una <a
+href="http://www.marketoracle.co.uk/Article40836.html">chiave segreta
+dell'NSA in Windows</a>, le cui funzioni sono a noi ignote.</li>
+
+ <li><p>
+ <a
+href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">Microsoft
+SkyDrive permette all'NSA di esaminare direttamente i dati degli
utenti</a>.</p>
+ </li>
+
+ <li><p>Spyware in Skype: <a
+href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+Microsoft ha modificato Skype <a
+href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+espressamente per spiare</a>.</p>
+ </li>
+
<li><p>
Microsoft usa le “condizioni sulla privacy” di Windows 10 per
arrogarsi il “diritto” di spiare i file degli utenti in
@@ -261,25 +344,6 @@
tutti gli aspetti, e di soggiogare completamente chiunque non abbandoni
subito Windows.</p></li>
- <li><p><a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">Windows
-10 richiede agli utenti di dare il permesso per lo spionaggio totale</a>,
-che include i loro file, i loro comandi, il testo da loro immesso e quello
-da loro pronunciato.</p></li>
-
- <li>Spyware in Windows: <a
-href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">Windows
-Update spia l'utente</a>. <a
-href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">Windows
-8.1 curiosa nelle ricerche locali</a>. E c'è una <a
-href="http://www.marketoracle.co.uk/Article40836.html">chiave segreta
-dell'NSA in Windows</a>, le cui funzioni sono a noi ignote.</li>
-
- <li><p>
- <a
-href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">Microsoft
-SkyDrive permette all'NSA di esaminare direttamente i dati degli
utenti</a>.</p>
- </li>
</ul>
<h3 id="drm">DRM di Microsoft</h3>
@@ -396,7 +460,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/08/25 22:28:17 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/malware-mobiles.it.html 22 May 2016 19:30:06 -0000 1.8
+++ proprietary/malware-mobiles.it.html 8 Oct 2016 21:29:03 -0000 1.9
@@ -148,6 +148,19 @@
<h3 id="surveillance">Sorveglianza in dispositivi mobili</h3>
<ul>
+<li>
+<p>Una revisione di sicurezza di una applicazione usata per il tracciamento ha
+trovato che alcuni bug <a
+href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+permettevano a tutti di spiare dati personali di un utente</a>. Il revisore
+non si mostra preoccupato del fatto che l'applicazione invii dati personali
+a un server dove lo <em>sviluppatore</em> li vede comunque tutti. Questo
+“servizio” è per perdenti!</p>
+
+<p>Il server sicuramente ha un "regolamento sulla privacy" che sicuramente non
+ha valore (come quasi tutti i regolamenti sulla privacy).</p>
+</li>
+
<li><p>Le applicazioni che includono <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
il sistema di sorveglianza Symphony spiano le trasmissioni TV e radio
@@ -323,7 +336,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.it.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/proprietary-back-doors.it.html 22 May 2016 19:30:06 -0000
1.13
+++ proprietary/proprietary-back-doors.it.html 8 Oct 2016 21:29:03 -0000
1.14
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-back-doors.en.html" -->
<!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Backdoor proprietarie - Progetto GNU - Free Software Foundation</title>
@@ -10,14 +10,33 @@
<!--#include virtual="/server/banner.it.html" -->
<h2>Backdoor proprietarie</h2>
-<a href="/proprietary/proprietary.html">Altri esempi di malware
-proprietario</a>
+<p><a href="/proprietary/proprietary.html">Altri esempi di malware
+proprietario</a></p>
+
+<p>Il software non libero (proprietario) è molto spesso malware, progettato
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
<p>Ecco alcuni esempi provati di backdoor (canali di ingresso nascosti) nel
software proprietario.</p>
<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<ul>
+ <li><p>L'aggiornamento di Capcom per Street Fighter V <a
+href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installava
+un driver che può essere usato come backdoor</a> da qualsiasi applicazione
+installata su un computer Windows.</p>
+ </li>
+
+ <li><p>L'applicazione Dropbox per Macintosh <a
+href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">prende
+controllo totale della macchina chiedendo ripetutamente all'utente la
+password di amministratore</a>.</p>
+ </li>
<li><p>La backdoor universale nei telefoni cellulari è effettivamente <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/">usata
per ascoltare attraverso i loro microfoni</a>.</p>
@@ -128,9 +147,8 @@
<li>
<p>Le backdoor di Windows 8 sono larghe al punto da <a
-href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">far
-concludere al governo tedesco che non ci si possa fidare di questo sistema
-operativo</a>.
+href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">far
+concludere al governo tedesco che non ci si possa fidare di questo</a>.
</p>
</li>
@@ -361,7 +379,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-censorship.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.it.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/proprietary-censorship.it.html 30 Jul 2016 17:29:53 -0000
1.9
+++ proprietary/proprietary-censorship.it.html 8 Oct 2016 21:29:03 -0000
1.10
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-censorship.en.html" -->
<!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Censura Proprietaria - Progetto GNU - Free Software Foundation</title>
@@ -10,6 +10,14 @@
<!--#include virtual="/server/banner.it.html" -->
<h2>Censura Proprietaria</h2>
+<p>Il software non libero (proprietario) è molto spesso malware, progettato
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
<p>Ecco alcuni esempi di sistemi proprietari che censurano il contenuto
richiesto dai propri utenti. Rendiamo disponibile, separatamente, anche un
<a href="/proprietary/proprietary-jails.html">elenco di sistemi proprietari
@@ -156,7 +164,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/07/30 17:29:53 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-drm.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.it.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-drm.it.html 30 Jul 2016 17:29:53 -0000 1.5
+++ proprietary/proprietary-drm.it.html 8 Oct 2016 21:29:03 -0000 1.6
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-drm.en.html" -->
<!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>DRM Proprietario - Progetto GNU - Free Software Foundation</title>
@@ -13,6 +13,14 @@
<a href="/proprietary/proprietary.html">Altri esempi di malware
proprietario</a>
+<p>Il software non libero (proprietario) è molto spesso malware, progettato
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
<p>Ecco alcuni esempi di programmi e sistemi proprietari che implementano
<em>digital restrictions management</em> (DRM, ovvero gestione delle
restrizioni digitali): funzionalità progettate appositamente per limitare
@@ -29,6 +37,12 @@
</p>
<ul>
+<li><p>Il cosiddetto "aggiornamento" del firmware HP <a
+href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">ha
+imposto il DRM su alcune stampanti</a>, che ora si rifiutano di funzionare
+con cartucce d'inchiostro di terze parti.</p>
+</li>
+
<li>
<p>Ora i giochi per Oculus Rift hanno una protezione DRM che <a
href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform">impedisce
@@ -229,7 +243,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/07/30 17:29:53 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/proprietary-insecurity.it.html 25 Aug 2016 22:28:17 -0000
1.17
+++ proprietary/proprietary-insecurity.it.html 8 Oct 2016 21:29:03 -0000
1.18
@@ -13,6 +13,14 @@
<a href="/proprietary/proprietary.html">Altri esempi di malware
proprietario</a>
+<p>Il software non libero (proprietario) è molto spesso malware, progettato
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
<p>Questa pagina elenca casi chiaramente dimostrati di scarsa sicurezza in
software proprietario che ha gravi conseguenze o che è altrimenti degna di
nota.</p>
@@ -419,7 +427,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/08/25 22:28:17 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-jails.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-jails.it.html 22 May 2016 19:30:06 -0000
1.6
+++ proprietary/proprietary-jails.it.html 8 Oct 2016 21:29:03 -0000
1.7
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-jails.en.html" -->
<!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Prigioni proprietarie - Progetto GNU - Free Software Foundation</title>
@@ -10,8 +10,16 @@
<!--#include virtual="/server/banner.it.html" -->
<h2>Prigioni proprietarie</h2>
-<a href="/philosophy/proprietary.html">Altri esempi di malware
-proprietario</a>
+<p><a href="/philosophy/proprietary.html">Altri esempi di malware
+proprietario</a></p>
+
+<p>Il software non libero (proprietario) è molto spesso malware, progettato
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
<p>Ecco alcuni esempi di sistemi proprietari che sono <em>prigioni</em>: non
permettono all'utente di installare applicazioni liberamente. L'<a
@@ -172,7 +180,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.it.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/proprietary-sabotage.it.html 30 Jul 2016 17:29:53 -0000
1.15
+++ proprietary/proprietary-sabotage.it.html 8 Oct 2016 21:29:03 -0000
1.16
@@ -13,11 +13,27 @@
<a href="/proprietary/proprietary.html">Altri esempi di malware
proprietario</a>
+<p>Il software non libero (proprietario) è molto spesso malware, progettato
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
<p>Ecco alcuni esempi di software proprietario che contiene qualcosa peggiore
di una backdoor.</p>
<ul>
<li>
+ <p>Il cosiddetto "aggiornamento" del firmware HP <a
+href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">ha
+imposto il DRM su alcune stampanti</a>, che ora si rifiutano di funzionare
+con cartucce d'inchiostro di terze parti.</p>
+ </li>
+
+ <li>
+
<p>Quando un utente è convinto da Microsoft ad accettare l'installazione
di
Windows 10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">scopre
@@ -120,9 +136,8 @@
fanno concorrenza a iTunes</a>.
</p></li>
-<li><p>
-<a
-href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">Microsoft
+<li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">>Microsoft
informa l'NSA sui bug di Windows prima di sistemarli</a>.
</p></li>
@@ -325,7 +340,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/07/30 17:29:53 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/proprietary-surveillance.it.html 5 Sep 2016 10:28:55
-0000 1.24
+++ proprietary/proprietary-surveillance.it.html 8 Oct 2016 21:29:03
-0000 1.25
@@ -6,21 +6,20 @@
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Sorveglianza proprietaria - Progetto GNU - Free Software
Foundation</title>
<style type="text/css" media="print,screen"><!--
-#surveillance {
- width: 63em; max-width: 100%;
- margin: 2.5em auto 1em;
+.announcement {
+ background: none;
}
#surveillance div.toc {
- width: 24.5em; max-width: 82%;
+ width: 24.5em; max-width: 94%;
margin-bottom: 1em;
}
address@hidden (min-width: 55em) {
address@hidden (min-width: 48em) {
#surveillance div.toc {
float: left;
width: auto; max-width: 48%;
margin: .2em 0 1em;
}
- #surveillance .pict.wide {
+ #surveillance .medium {
width: 43%;
margin: 7em 0 1em 1.5em;
}
@@ -33,6 +32,14 @@
<!--#include virtual="/server/banner.it.html" -->
<h2>Sorveglianza proprietaria</h2>
+<p>Il software non libero (proprietario) è molto spesso malware, progettato
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
<div class="announcement">
<p>Questo documento prova a tenere traccia di <strong>casi chiaramente
dimostrati di software proprietario che spia o traccia i propri
@@ -44,7 +51,7 @@
<div id="surveillance">
-<div class="pict wide">
+<div class="pict medium">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Vignetta: un cane che si sorprende a
vedere comparire tre annunci
pubblicitari sul suo monitor..." /></a>
@@ -147,6 +154,11 @@
</div>
<ul>
+<li>Per aumentare il numero di installazioni di Windows 10, Microsoft <a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+non rispetta la scelta e la privacy degli utenti</a>.
+</li>
+
<li><p><a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">Windows
10 ha 13 schermate di opzioni sulla sorveglianza</a>, tutte attive come
@@ -351,6 +363,12 @@
</div>
<ul>
+ <li><p>L'applicazione iMessage dei vari iGadget <a
+href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">comunica
+a un server ogni numero di telefono digitato dall'utente</a>; il server
+tiene memorizzati i numeri per almeno 30 giorni.</p>
+ </li>
+
<li><p>Gli utenti non possono creare una ID di Apple (che serve <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">anche
se si usano solo applicazioni gratuite</a>) senza dare un indirizzo e-mail
@@ -490,6 +508,12 @@
</div>
<ul>
+
+ <li><p>La nuova applicazione per conversazioni vocali di Google <a
+href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">tiene
+traccia di tutte le conversazioni</a>.</p>
+ </li>
+
<li><p>Le applicazioni che includono <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
il sistema di sorveglianza Symphony spiano le trasmissioni TV e radio
@@ -593,6 +617,17 @@
</div>
<ul>
+
+ <li><p>Un'azienda che produce vibratori controllati via Internet <a
+href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">è
+stata portata in tribunale per la raccolta di molte informazioni personali
+su come gli utenti usano il prodotto</a>.</p>
+
+ <p>La dichiarazione dell'azienda che i dati sono raccolti in forma
anonima può
+essere vera, ma questo non importa: se vende i dati a uno specialista, lo
+specialista può capire chi è l'utente.</p>
+ </li>
+
<li><p>Un vibratore computerizzato <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">spia
gli utenti attraverso l'applicazione che lo controlla</a>.</p>
@@ -1107,7 +1142,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/09/05 10:28:55 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tyrants.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-tyrants.it.html 30 Jul 2016 17:29:54 -0000
1.6
+++ proprietary/proprietary-tyrants.it.html 8 Oct 2016 21:29:03 -0000
1.7
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-tyrants.en.html"
-->
<!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Tiranni Proprietari - Progetto GNU - Free Software Foundation</title>
@@ -13,6 +13,14 @@
<a href="/proprietary/proprietary.html">Altri esempi di malware
proprietario</a>
+<p>Il software non libero (proprietario) è molto spesso malware, progettato
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
<p>Un dispositivo <em>tiranno</em> si rifiuta di permettere agli utenti di
installare un sistema operativo diverso o modificato. Questi dispositivi
hanno misure per bloccare l'esecuzione di versioni del sistema non
@@ -150,7 +158,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary.it.html 30 Jul 2016 17:29:54 -0000 1.6
+++ proprietary/proprietary.it.html 8 Oct 2016 21:29:03 -0000 1.7
@@ -48,6 +48,7 @@
<li><strong>Azienda o tipo di prodotto</strong></li>
<li><a href="/proprietary/malware-apple.html">Malware di Apple</a></li>
<li><a href="/proprietary/malware-microsoft.html">Malware di
Microsoft</a></li>
+ <li><a href="/proprietary/malware-adobe.html">Malware di Adobe</a></li>
<li><a href="/proprietary/malware-mobiles.html">Malware nei dispositivi
mobili</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html">Malware nel
@@ -68,6 +69,8 @@
<li><a href="/proprietary/proprietary-sabotage.html">Sabotaggio</a></li>
<li><a href="/proprietary/proprietary-interference.html">Interferenze</a></li>
<li><a href="/proprietary/proprietary-surveillance.html">Sorveglianza</a></li>
+<li><a href="/proprietary/proprietary-subscriptions.html">Abbonamenti</a></li>
+<li><a href="/proprietary/proprietary-tethers.html">Vincoli</a> ai server</li>
<li><a href="/proprietary/proprietary-drm.html">DRM</a> (che chiamiamo
“Digital restrictions management”, in italiano, “gestione
digitale delle restrizioni”) significa funzionalità volte a limitare
@@ -164,7 +167,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-apple.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-apple.it-en.html 4 Aug 2016 21:28:30 -0000
1.16
+++ proprietary/po/malware-apple.it-en.html 8 Oct 2016 21:29:03 -0000
1.17
@@ -208,6 +208,11 @@
<h3 id="surveillance">Apple Surveillance</h3>
<ul>
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
+ days.</p>
+ </li>
+
<li><p>Users cannot make an Apple ID (<a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary
to install even gratis apps</a>) without giving a valid email address and
receiving the verification code Apple
sends to it.</p>
</li>
@@ -438,7 +443,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/08/04 21:28:30 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/malware-apple.it.po 8 Oct 2016 21:04:17 -0000 1.60
+++ proprietary/po/malware-apple.it.po 8 Oct 2016 21:29:03 -0000 1.61
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-29 22:55+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/malware-microsoft.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/malware-microsoft.it-en.html 25 Aug 2016 22:28:17 -0000
1.18
+++ proprietary/po/malware-microsoft.it-en.html 8 Oct 2016 21:29:03 -0000
1.19
@@ -80,8 +80,28 @@
But there is no excuse for <em>deleting</em> the programs, and you
should have the right to decide who (if anyone) to trust in this
way.</p></li>
- <li><p>Windows 8's back doors are so gaping that <a
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
+ <li><p>Windows 8's back doors are so gaping that <a
+
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
the German government has decided it can't be trusted</a>.</p></li>
+
+<li><p>Users reported that <a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7 and 8</a>, switching on a flag
+ that said whether to “upgrade” to Windows 10 when users
+ had turned it off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject the downgrade to Windows 10</a>.</p>
+
+ <p>This seems to involve use of a back door in Windows 7 and 8.</p>
+</li>
+
</ul>
<h3 id="insecurity">Microsoft Insecurity</h3>
@@ -91,6 +111,14 @@
allows an attacker to retrieve Microsoft account credentials, if
the user is tricked into visiting a malicious link.</p>
</li>
+<li>
+<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers</a>.
+</p>
+</li>
+
</ul>
@@ -132,8 +160,7 @@
<li><p>Microsoft
is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
- forcibly
- pushing</a> <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">Windows
+ forcibly pushing Windows
update to its version 10</a>, ignoring the flag on Windows 7 or 8
that you could set to not upgrade. This reaffirms the presence of
a <a href="/proprietary/proprietary-back-doors.html">universal
@@ -148,7 +175,15 @@
repeatedly nagging many users to install Windows 10</a>.
</p></li>
- <li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">
+<li><p>
+Microsoft was for months <a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update">
+tricking users into “upgrading” to Windows 10</a>, if they
+failed to notice and say no.
+</p></li>
+
+ <li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">
Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
<li><p><a
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/">
@@ -173,6 +208,12 @@
<ul>
+<li>In order to increase Windows 10's install base, Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice and privacy</a>.
+</li>
+
<li><p>Microsoft has
started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
users obnoxiously and repeatedly to install Windows 10</a>.</p></li>
@@ -192,7 +233,23 @@
</ul>
<h3 id="surveillance">Microsoft Surveillance</h3>
+
<ul>
+
+<li>It appears <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/">
+Windows 10 sends data to Microsoft about what applications are
+running</a>.</li>
+
+<li><p>A downgrade to Windows 10 deleted surveillance-detection
+applications. Then another downgrade inserted a general spying
+program. Users noticed this and complained, so Microsoft
+renamed it <a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/">
+to give users the impression it was gone</a>.</p>
+
+<p>To use proprietary software is to invite such treatment.</p></li>
+
<li><p>
<a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
Windows 10 comes with 13 screens of snooping options</a>, all enabled by
default,
@@ -205,7 +262,11 @@
to snoop on the users' files, text input, voice input,
location info, contacts, calendar records and web browsing
history, as well as automatically connecting the machines to open
- hotspots and showing targeted ads.</p></li>
+ hotspots and showing targeted ads.</p>
+
+ <p>We can suppose Microsoft look at users' files for the US government on
+ demand, though the “privacy policy” does not explicit say so.
Will it
+ look at users' files for the Chinese government on demand?</p></li>
<li><p>
<a
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
@@ -213,6 +274,29 @@
turns off its Bing search and Cortana features, and activates the
privacy-protection settings.</p></li>
+ <li><p>The unique “advertising ID” for each user enables other
companies to
+ track the browsing of each specific user.</p></li>
+
+ <li>Spyware in Windows 8: <a
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
+ Windows Update snoops on the user.</a>
+ <a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
+ Windows 8.1 snoops on local searches.</a> And there's a
+ <a href="http://www.marketoracle.co.uk/Article40836.html">
+ secret NSA key in Windows</a>, whose functions we don't know.</li>
+
+ <li><p>
+ <a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
+ Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
+ </li>
+
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype
+ <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p>
+ </li>
+
<li><p>
Microsoft uses Windows 10's “privacy policy” to overtly impose a
“right” to look at users' files at any time. Windows 10 full disk
@@ -233,23 +317,6 @@
maximally evil on every dimension; to make a grab for total power
over anyone that doesn't drop Windows now.</p></li>
- <li><p><a
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html">
- Windows 10 requires users to give permission for total snooping</a>,
- including their files, their commands, their text input, and their
- voice input.</p></li>
-
- <li>Spyware in Windows: <a
-href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
- Windows Update snoops on the user.</a>
- <a
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175">
- Windows 8.1 snoops on local searches.</a> And there's a
- <a href="http://www.marketoracle.co.uk/Article40836.html">
- secret NSA key in Windows</a>, whose functions we don't know.</li>
-
- <li><p>
- <a
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/">
- Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
- </li>
</ul>
<h3 id="drm">Microsoft DRM</h3>
@@ -347,7 +414,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/08/25 22:28:17 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary/po/malware-microsoft.it.po 8 Oct 2016 21:04:17 -0000
1.77
+++ proprietary/po/malware-microsoft.it.po 8 Oct 2016 21:29:03 -0000
1.78
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-28 16:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -185,16 +184,7 @@
"programmi, e si dovrebbe avere il diritto di decidere in chi (ammesso che ci "
"sia qualcuno) riporre questa fiducia."
-# | Windows 8's back doors are so gaping that <a
-# |
[-href=\"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">-]
-# |
{+href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">+}
-# | the German government has decided it can't be trusted</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"http://"
-#| "drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-"
-#| "entities-not-to-use-windows-8-linked-to-nsa/\"> the German government has "
-#| "decided it can't be trusted</a>."
+#. type: Content of: <ul><li><p>
msgid ""
"Windows 8's back doors are so gaping that <a href=\"https://web.archive.org/"
"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
@@ -356,25 +346,7 @@
"sulle piattaforme che useranno in futuro, magari pagando (anche in gruppo "
"con altri utenti) uno sviluppatore per farlo."
-# | Microsoft is <a
-# |
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\">
-# | forcibly [-pushing</a> <a
-# |
href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">Windows-]
-# | {+pushing Windows+} update to its version 10</a>, ignoring the flag on
-# | Windows 7 or 8 that you could set to not upgrade. This reaffirms the
-# | presence of a <a
-# | href=\"/proprietary/proprietary-back-doors.html\">universal back door in
-# | Windows</a> 7 and 8.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Microsoft is <a href=\"http://gizmodo.com/woman-wins-10-000-from-"
-#| "microsoft-after-unwanted-window-1782666146\"> forcibly pushing</a> <a "
-#| "href=\"http://www.computerworld.com/article/3012278/microsoft-windows/"
-#| "microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"
-#| "\">Windows update to its version 10</a>, ignoring the flag on Windows 7 "
-#| "or 8 that you could set to not upgrade. This reaffirms the presence of a "
-#| "<a href=\"/proprietary/proprietary-back-doors.html\">universal back door "
-#| "in Windows</a> 7 and 8."
+#. type: Content of: <ul><li><p>
msgid ""
"Microsoft is <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-"
"after-unwanted-window-1782666146\"> forcibly pushing Windows update to its "
@@ -408,17 +380,7 @@
"technology/2015/sep/11/microsoft-downloading-windows-1\"> sollecitando molti "
"utenti ad installare Windows 10</a>."
-# | Microsoft [-is-] {+was for months+} <a
-# |
[-href=\"http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\">
-# | repeatedly nagging many-]
-# |
{+href=\"http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update\">
-# | tricking+} users {+into “upgrading”+} to [-install-] Windows
-# | [-10</a>.-] {+10</a>, if they failed to notice and say no.+}
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Microsoft is <a href=\"http://www.theguardian.com/technology/2015/sep/11/"
-#| "microsoft-downloading-windows-1\"> repeatedly nagging many users to "
-#| "install Windows 10</a>."
+#. type: Content of: <ul><li><p>
msgid ""
"Microsoft was for months <a href=\"http://www.theguardian.com/"
"technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update\"> "
@@ -430,15 +392,7 @@
"molti utenti ad installare Windows 10</a> in modo ingannevole, se non se ne "
"accorgevano e dicevano espressamente di no."
-# | <a
-# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\">-]
-# |
{+href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">+}
-# | Microsoft informs the NSA of bugs in Windows before fixing them.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-"
-#| "any-company-ever-trust-microsoft-again-3569376/\"> Microsoft informs the "
-#| "NSA of bugs in Windows before fixing them.</a>"
+#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"https://web.archive.org/web/20130622044225/http://blogs."
"computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-"
@@ -651,22 +605,7 @@
"ciascun utente, altre aziende possono controllare l'attività di navigazione "
"di ogni specifico utente."
-# | Spyware in [-Windows:-] {+Windows 8:+} <a
-# |
href=\"https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
-# | Windows Update snoops on the user.</a> <a
-# |
href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\">
-# | Windows 8.1 snoops on local searches.</a> And there's a <a
-# | href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key
-# | in Windows</a>, whose functions we don't know.
#. type: Content of: <ul><li>
-#| msgid ""
-#| "Spyware in Windows: <a href=\"https://web.archive.org/web/20160313105805/"
-#| "http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"> "
-#| "Windows Update snoops on the user.</a> <a href=\"http://www.infoworld.com/"
-#| "t/microsoft-windows/look-the-black-underbelly-of-windows-81-"
-#| "blue-222175\"> Windows 8.1 snoops on local searches.</a> And there's a <a "
-#| "href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key "
-#| "in Windows</a>, whose functions we don't know."
msgid ""
"Spyware in Windows 8: <a href=\"https://web.archive.org/web/20160313105805/"
"http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"> "
Index: proprietary/po/malware-mobiles.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/malware-mobiles.it-en.html 22 May 2016 19:30:06 -0000
1.7
+++ proprietary/po/malware-mobiles.it-en.html 8 Oct 2016 21:29:03 -0000
1.8
@@ -131,6 +131,18 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul>
+<li>
+<p>A half-blind security critique of a tracking app: it found that <a
+href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+blatant flaws allowed anyone to snoop on a user's personal data</a>.
+The critique fails entirely to express concern that the app sends the
+personal data to a server, where the <em>developer</em> gets it all.
+This “service” is for suckers!</p>
+
+<p>The server surely has a “privacy policy,” and surely it
+is worthless since nearly all of them are.</p>
+</li>
+
<li><p>Apps that include
<a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs are
@@ -279,7 +291,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/malware-mobiles.it.po 8 Oct 2016 21:04:17 -0000
1.22
+++ proprietary/po/malware-mobiles.it.po 8 Oct 2016 21:29:03 -0000
1.23
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-08 15:55+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-back-doors.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/proprietary-back-doors.it-en.html 22 May 2016 19:30:06
-0000 1.12
+++ proprietary/po/proprietary-back-doors.it-en.html 8 Oct 2016 21:29:03
-0000 1.13
@@ -1,16 +1,32 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
<title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Back Doors</h2>
-<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
+
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
<p>Here are examples of demonstrated back doors in proprietary software.</p>
<!-- WEBMASTERS: make sure to place new items on top under each subsection -->
<ul>
+ <li><p>Capcom's Street Fighter V update <a
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed
+ a driver that can be used as a backdoor by any application
+ installed on a Windows computer</a>.</p>
+ </li>
+
+ <li><p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
+ total control of the machine by repeatedly nagging the user
+ for an admini password</a>.</p>
+ </li>
<li><p>The universal back door in portable phones <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
employed to listen through their microphones</a>.</p>
@@ -116,7 +132,7 @@
<li>
<p>Windows 8's back doors are so gaping that
-<a
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
+<a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
the German government has decided it can't be trusted</a>.
</p>
</li>
@@ -318,7 +334,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-back-doors.it.po 8 Oct 2016 21:04:17 -0000
1.54
+++ proprietary/po/proprietary-back-doors.it.po 8 Oct 2016 21:29:03 -0000
1.55
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -304,16 +303,7 @@
"technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-"
"users\">forzati e immediati</a>."
-# | Windows 8's back doors are so gaping that <a
-# |
[-href=\"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">-]
-# |
{+href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\">+}
-# | the German government has decided it can't be trusted</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"http://"
-#| "drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-"
-#| "entities-not-to-use-windows-8-linked-to-nsa/\"> the German government has "
-#| "decided it can't be trusted</a>."
+#. type: Content of: <ul><li><p>
msgid ""
"Windows 8's back doors are so gaping that <a href=\"https://web.archive.org/"
"web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-"
Index: proprietary/po/proprietary-censorship.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-censorship.it-en.html 30 Jul 2016 17:29:54
-0000 1.8
+++ proprietary/po/proprietary-censorship.it-en.html 8 Oct 2016 21:29:03
-0000 1.9
@@ -1,10 +1,17 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
<title>Proprietary Censorship - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Censorship</h2>
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
<p>Here are examples of proprietary systems that impose censorship on
what their users can access. We have a <a
href="/proprietary/proprietary-jails.html">separate
@@ -131,7 +138,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-censorship.it.po 8 Oct 2016 21:04:17 -0000
1.28
+++ proprietary/po/proprietary-censorship.it.po 8 Oct 2016 21:29:03 -0000
1.29
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-drm.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-drm.it-en.html 30 Jul 2016 17:29:54 -0000
1.4
+++ proprietary/po/proprietary-drm.it-en.html 8 Oct 2016 21:29:03 -0000
1.5
@@ -1,6 +1,5 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
+<!-- Parent-Version: 1.79 -->
<title>Proprietary DRM - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-drm.translist" -->
<!--#include virtual="/server/banner.html" -->
@@ -8,6 +7,13 @@
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
<p>Here are examples of proprietary programs and systems that
implement <em>digital restrictions management</em> (DRM):
functionalities designed intentionally to restrict what users can do.
@@ -23,6 +29,11 @@
</p>
<ul>
+<li><p>HP's firmware downgrade <a
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">imposed
+DRM on some printers, which now refuse to function with third-party
+ink cartridges</a>.</p>
+</li>
+
<li>
<p>Oculus Rift games
now <a
href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform">have
@@ -198,7 +209,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-drm.it.po 8 Oct 2016 21:04:17 -0000
1.15
+++ proprietary/po/proprietary-drm.it.po 8 Oct 2016 21:29:03 -0000
1.16
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-insecurity.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/proprietary-insecurity.it-en.html 25 Aug 2016 22:28:17
-0000 1.16
+++ proprietary/po/proprietary-insecurity.it-en.html 8 Oct 2016 21:29:03
-0000 1.17
@@ -8,6 +8,13 @@
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
<p>This page lists clearly established cases of insecurity in
proprietary software that has grave consequences or is otherwise
noteworthy.</p>
@@ -373,7 +380,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/08/25 22:28:17 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-insecurity.it.po 8 Oct 2016 21:04:17 -0000
1.73
+++ proprietary/po/proprietary-insecurity.it.po 8 Oct 2016 21:29:03 -0000
1.74
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-jails.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-jails.it-en.html 22 May 2016 19:30:07 -0000
1.5
+++ proprietary/po/proprietary-jails.it-en.html 8 Oct 2016 21:29:03 -0000
1.6
@@ -1,12 +1,18 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
+<!-- Parent-Version: 1.79 -->
<title>Proprietary Jails - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-jails.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Jails</h2>
-<a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a>
+<p><a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a></p>
+
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
<p>Here are examples of proprietary systems that are
<em>jails</em>: they do not allow the user to freely install
@@ -144,7 +150,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/05/22 19:30:07 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-jails.it.po 8 Oct 2016 21:04:17 -0000
1.17
+++ proprietary/po/proprietary-jails.it.po 8 Oct 2016 21:29:03 -0000
1.18
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-sabotage.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-en.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-sabotage.it-en.html 30 Jul 2016 17:29:54
-0000 1.14
+++ proprietary/po/proprietary-sabotage.it-en.html 8 Oct 2016 21:29:03
-0000 1.15
@@ -1,6 +1,5 @@
<!--#include virtual="/server/header.html" -->
<!-- Parent-Version: 1.79 -->
-
<title>Proprietary Sabotage - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-sabotage.translist" -->
<!--#include virtual="/server/banner.html" -->
@@ -8,11 +7,25 @@
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
<p>Here are examples of proprietary software that has something
worse than a back door.</p>
<ul>
<li>
+ <p>HP's firmware downgrade <a
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">imposed
+ DRM on some printers, which now refuse to function with
+ third-party ink cartridges</a>.</p>
+ </li>
+
+ <li>
+
<p>Once Microsoft has tricked a user into accepting installation
of Windows
10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
@@ -111,8 +124,8 @@
that competed with iTunes</a>.
</p></li>
-<li><p>
-<a
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/">Microsoft
+<li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
informs the NSA of bugs in Windows before fixing them.</a>
</p></li>
@@ -276,7 +289,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/proprietary-sabotage.it.po 8 Oct 2016 21:04:17 -0000
1.62
+++ proprietary/po/proprietary-sabotage.it.po 8 Oct 2016 21:29:03 -0000
1.63
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -260,15 +259,7 @@
"deleted-music-ipods-rivals-steve-jobs\">ha cancellato dagli iPod la musica "
"scaricata da negozi di musica digitale che fanno concorrenza a iTunes</a>."
-# | <a
-# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\">Microsoft-]
-# |
{+href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\">Microsoft+}
-# | informs the NSA of bugs in Windows before fixing them.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-"
-#| "any-company-ever-trust-microsoft-again-3569376/\">Microsoft informs the "
-#| "NSA of bugs in Windows before fixing them.</a>"
+#. type: Content of: <ul><li><p>
msgid ""
"<a href=\"https://web.archive.org/web/20130622044225/http://blogs."
"computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-"
Index: proprietary/po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-surveillance.it-en.html 5 Sep 2016 10:28:55
-0000 1.23
+++ proprietary/po/proprietary-surveillance.it-en.html 8 Oct 2016 21:29:03
-0000 1.24
@@ -2,21 +2,20 @@
<!-- Parent-Version: 1.79 -->
<title>Proprietary Surveillance - GNU Project - Free Software
Foundation</title>
<style type="text/css" media="print,screen"><!--
-#surveillance {
- width: 63em; max-width: 100%;
- margin: 2.5em auto 1em;
+.announcement {
+ background: none;
}
#surveillance div.toc {
- width: 24.5em; max-width: 82%;
+ width: 24.5em; max-width: 94%;
margin-bottom: 1em;
}
address@hidden (min-width: 55em) {
address@hidden (min-width: 48em) {
#surveillance div.toc {
float: left;
width: auto; max-width: 48%;
margin: .2em 0 1em;
}
- #surveillance .pict.wide {
+ #surveillance .medium {
width: 43%;
margin: 7em 0 1em 1.5em;
}
@@ -28,6 +27,13 @@
<h2>Proprietary Surveillance</h2>
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
<div class="announcement">
<p>This document attempts to
track <strong>clearly established cases of proprietary software that
@@ -39,7 +45,7 @@
<div id="surveillance">
-<div class="pict wide">
+<div class="pict medium">
<a href="/graphics/dog.html">
<img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the
three ads that popped up on his computer screen..." /></a>
<p>“How did they find out I'm a dog?”</p>
@@ -143,6 +149,12 @@
</div>
<ul>
+<li>In order to increase Windows 10's install base, Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
+blatantly disregards user choice and privacy</a>.
+</li>
+
<li><p><a
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security">
Windows 10 comes with 13 screens of snooping options</a>, all enabled by
default,
and turning them off would be daunting to most users.</p></li>
@@ -332,6 +344,11 @@
</div>
<ul>
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
server records these numbers for at least 30
+ days.</p>
+ </li>
+
<li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
without giving a valid email address and receiving the code Apple
sends to it.</p>
@@ -466,6 +483,11 @@
</div>
<ul>
+
+ <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
<li><p>Apps that include
<a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
@@ -566,6 +588,16 @@
</div>
<ul>
+
+ <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting lots of personal information about how
+ people use it</a>.</p>
+
+ <p>The company's statement that it anonymizes the data may be
+ true, but it doesn't really matter. If it sells the data to a
+ data broker, the data broker can figure out who the user is.</p>
+ </li>
+
<li><p>A computerized
vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
on its users through the proprietary control app</a>.</p>
@@ -1036,7 +1068,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/09/05 10:28:55 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary/po/proprietary-surveillance.it.po 8 Oct 2016 21:04:17
-0000 1.108
+++ proprietary/po/proprietary-surveillance.it.po 8 Oct 2016 21:29:03
-0000 1.109
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-06 08:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary-tyrants.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-tyrants.it-en.html 30 Jul 2016 17:29:54
-0000 1.5
+++ proprietary/po/proprietary-tyrants.it-en.html 8 Oct 2016 21:29:03
-0000 1.6
@@ -1,6 +1,5 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
+<!-- Parent-Version: 1.79 -->
<title>Proprietary Tyrants - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-tyrants.translist" -->
<!--#include virtual="/server/banner.html" -->
@@ -8,6 +7,13 @@
<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
<p>A <em>tyrant</em> device is one that refuses to allow users to
install a different operating system or a modified operating
system. These devices have measures to block execution of anything
@@ -126,7 +132,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tyrants.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-tyrants.it.po 8 Oct 2016 21:04:17 -0000
1.17
+++ proprietary/po/proprietary-tyrants.it.po 8 Oct 2016 21:29:03 -0000
1.18
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
Index: proprietary/po/proprietary.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary.it-en.html 30 Jul 2016 17:29:54 -0000
1.5
+++ proprietary/po/proprietary.it-en.html 8 Oct 2016 21:29:03 -0000
1.6
@@ -43,6 +43,7 @@
<li><strong>Company or type of product</strong></li>
<li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
<li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
+ <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
<li><a href="/proprietary/malware-mobiles.html">Malware in mobile
devices</a></li>
<li><a href="/proprietary/malware-kindle-swindle.html">Malware in the Amazon
Swindle</a></li>
@@ -61,6 +62,9 @@
<li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
<li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+<li><a href="/proprietary/proprietary-tethers.html">Tethers</a> to
+servers</li>
<li><a href="/proprietary/proprietary-drm.html">Digital restrictions
management</a> or “DRM” means functionalities designed
to restrict what users can do with the data in their computers.</li>
@@ -137,7 +141,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary.it.po 8 Oct 2016 21:04:17 -0000 1.26
+++ proprietary/po/proprietary.it.po 8 Oct 2016 21:29:03 -0000 1.27
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-29 16:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -103,10 +102,7 @@
msgstr ""
"<a href=\"/proprietary/malware-microsoft.html\">Malware di Microsoft</a>"
-# | <a [-href=\"/proprietary/malware-apple.html\">Apple-]
-# | {+href=\"/proprietary/malware-adobe.html\">Adobe+} Malware</a>
#. type: Content of: <div><div><ul><li>
-#| msgid "<a href=\"/proprietary/malware-apple.html\">Apple Malware</a>"
msgid "<a href=\"/proprietary/malware-adobe.html\">Adobe Malware</a>"
msgstr "<a href=\"/proprietary/malware-adobe.html\">Malware di Adobe</a>"
@@ -171,19 +167,13 @@
msgstr ""
"<a href=\"/proprietary/proprietary-surveillance.html\">Sorveglianza</a>"
-# | <a [-href=\"/proprietary/proprietary-deception.html\">Deception</a>-]
-# | {+href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>+}
#. type: Content of: <div><div><ul><li>
-#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
msgid ""
"<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
msgstr ""
"<a href=\"/proprietary/proprietary-subscriptions.html\">Abbonamenti</a>"
-# | <a [-href=\"/proprietary/proprietary-censorship.html\">Censorship</a>-]
-# | {+href=\"/proprietary/proprietary-tethers.html\">Tethers</a> to servers+}
#. type: Content of: <div><div><ul><li>
-#| msgid "<a href=\"/proprietary/proprietary-censorship.html\">Censorship</a>"
msgid ""
"<a href=\"/proprietary/proprietary-tethers.html\">Tethers</a> to servers"
msgstr ""
Index: server/body-include-2.it.html
===================================================================
RCS file: /web/www/www/server/body-include-2.it.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- server/body-include-2.it.html 29 Sep 2016 07:58:43 -0000 1.106
+++ server/body-include-2.it.html 8 Oct 2016 21:29:04 -0000 1.107
@@ -5,8 +5,7 @@
padding: .2em; margin: 0; background: #ddeced;
border-top: .2em solid #0088a0; border-bottom: .2em solid #0088a0;">
<strong><a href="http://www.gnuhealthcon.org/2016-las_palmas/">GNU Health
-Conference</a></strong> Nov 18-20, Las Palmas, Spain
-#GNUHealthCon2016
+Conference</a></strong> 18-20 Nov, Las Palmas, Spagna #GNUHealthCon2016
</p>
<div id="header">
<div id="fsf-frame">
Index: server/gnun/compendia/compendium.it.po
===================================================================
RCS file: /web/www/www/server/gnun/compendia/compendium.it.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- server/gnun/compendia/compendium.it.po 8 Oct 2016 21:04:15 -0000
1.94
+++ server/gnun/compendia/compendium.it.po 8 Oct 2016 21:29:04 -0000
1.95
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: compendium.it.po\n"
-"POT-Creation-Date: 2016-05-04 09:58+0000\n"
+"POT-Creation-Date: 2016-09-13 09:25+0000\n"
"PO-Revision-Date: 2016-10-08 22:36+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian\n"
Index: server/po/body-include-2.it.po
===================================================================
RCS file: /web/www/www/server/po/body-include-2.it.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- server/po/body-include-2.it.po 8 Oct 2016 21:04:16 -0000 1.124
+++ server/po/body-include-2.it.po 8 Oct 2016 21:29:04 -0000 1.125
@@ -14,7 +14,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-30 12:25+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <p>
Index: server/po/sitemap.it-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.it-en.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- server/po/sitemap.it-en.html 25 Aug 2016 22:28:18 -0000 1.35
+++ server/po/sitemap.it-en.html 8 Oct 2016 21:29:04 -0000 1.36
@@ -240,6 +240,8 @@
<dd>Free System Distribution Guidelines (GNU FSDG)</dd>
<dt><a
href="/distros/optionally-free-not-enough.html">optionally-free-not-enough.html</a></dt>
<dd>Optionally Free Is Not Enough</dd>
+ <dt><a
href="/distros/screenshot-gnewsense.html">screenshot-gnewsense.html</a></dt>
+ <dd>Screenshot of gNewSense</dd>
<dt><a href="/distros/screenshot.html">screenshot.html</a></dt>
<dd>Screenshot of a Free Distro</dd>
</dl>
@@ -651,6 +653,8 @@
<dd>Dog Cartoon</dd>
<dt><a href="/graphics/emacs-ref.html">emacs-ref.html</a></dt>
<dd>GNU Emacs Reference Card</dd>
+ <dt><a href="/graphics/free-your-soul.html">free-your-soul.html</a></dt>
+ <dd>Free Your Soul Wallpaper</dd>
<dt><a href="/graphics/freedom.html">freedom.html</a></dt>
<dd>What Freedom Means</dd>
<dt><a href="/graphics/french-motto.html">french-motto.html</a></dt>
@@ -1603,6 +1607,8 @@
Proprietary Software Is Often Malware<span class="gnun-split"></span>
</span>
<dl>
+ <dt><a href="/proprietary/malware-adobe.html">malware-adobe.html</a></dt>
+ <dd>Adobe's Software is Malware</dd>
<dt><a href="/proprietary/malware-apple.html">malware-apple.html</a></dt>
<dd>Apple's Operating Systems Are Malware</dd>
<dt><a
href="/proprietary/malware-appliances.html">malware-appliances.html</a></dt>
@@ -1631,8 +1637,12 @@
<dd>Proprietary Jails</dd>
<dt><a
href="/proprietary/proprietary-sabotage.html">proprietary-sabotage.html</a></dt>
<dd>Proprietary Sabotage</dd>
+ <dt><a
href="/proprietary/proprietary-subscriptions.html">proprietary-subscriptions.html</a></dt>
+ <dd>Proprietary Subscriptions</dd>
<dt><a
href="/proprietary/proprietary-surveillance.html">proprietary-surveillance.html</a></dt>
<dd>Proprietary Surveillance</dd>
+ <dt><a
href="/proprietary/proprietary-tethers.html">proprietary-tethers.html</a></dt>
+ <dd>Proprietary Tethers</dd>
<dt><a
href="/proprietary/proprietary-tyrants.html">proprietary-tyrants.html</a></dt>
<dd>Proprietary Tyrants</dd>
</dl>
@@ -1926,7 +1936,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/08/25 22:28:18 $
+$Date: 2016/10/08 21:29:04 $
<!-- timestamp end -->
</p>
</div>
Index: server/po/sitemap.it.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- server/po/sitemap.it.po 8 Oct 2016 21:04:16 -0000 1.113
+++ server/po/sitemap.it.po 8 Oct 2016 21:29:04 -0000 1.114
@@ -14,7 +14,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-29 17:26+0000\n"
"X-Generator: Poedit 1.5.4\n"
#. type: Content of: <title>
@@ -509,9 +508,7 @@
msgstr ""
"<a href=\"/distros/screenshot-gnewsense.html\">screenshot-gnewsense.html</a>"
-# | Screenshot of [-a Free Distro-] {+gNewSense+}
#. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Screenshot of a Free Distro"
msgid "Screenshot of gNewSense"
msgstr "Screenshot of gNewSense"
@@ -1904,9 +1901,7 @@
msgid "<a href=\"/graphics/free-your-soul.html\">free-your-soul.html</a>"
msgstr "<a href=\"/graphics/free-your-soul.html\">free-your-soul.html</a>"
-# | [-This is Freedom-]{+Free Your Soul+} Wallpaper
#. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "This is Freedom Wallpaper"
msgid "Free Your Soul Wallpaper"
msgstr "Free Your Soul Wallpaper"
@@ -5573,9 +5568,7 @@
msgid "<a href=\"/proprietary/malware-adobe.html\">malware-adobe.html</a>"
msgstr "<a href=\"/proprietary/malware-adobe.html\">malware-adobe.html</a>"
-# | [-Microsoft's-]{+Adobe's+} Software is Malware
#. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Microsoft's Software is Malware"
msgid "Adobe's Software is Malware"
msgstr "Adobe's Software is Malware"
@@ -5733,9 +5726,7 @@
"<a href=\"/proprietary/proprietary-subscriptions.html\">proprietary-"
"subscriptions.html</a>"
-# | Proprietary [-Deception-] {+Subscriptions+}
#. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Proprietary Deception"
msgid "Proprietary Subscriptions"
msgstr "Proprietary Subscriptions"
@@ -5759,9 +5750,7 @@
"<a href=\"/proprietary/proprietary-tethers.html\">proprietary-tethers.html</"
"a>"
-# | Proprietary [-Tyrants-] {+Tethers+}
#. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Proprietary Tyrants"
msgid "Proprietary Tethers"
msgstr "Proprietary Tethers"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www home.it.html planetfeeds.it.html philosophy...,
GNUN <=