www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www home.it.html planetfeeds.it.html philosophy...


From: GNUN
Subject: www home.it.html planetfeeds.it.html philosophy...
Date: Sat, 8 Oct 2016 21:29:05 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/10/08 21:29:04

Modified files:
        .              : home.it.html planetfeeds.it.html 
        philosophy     : words-to-avoid.it.html 
        philosophy/po  : words-to-avoid.it-en.html words-to-avoid.it.po 
        po             : home.it-en.html home.it.po planetfeeds.it.po 
        proprietary    : malware-apple.it.html malware-microsoft.it.html 
                         malware-mobiles.it.html 
                         proprietary-back-doors.it.html 
                         proprietary-censorship.it.html 
                         proprietary-drm.it.html 
                         proprietary-insecurity.it.html 
                         proprietary-jails.it.html 
                         proprietary-sabotage.it.html 
                         proprietary-surveillance.it.html 
                         proprietary-tyrants.it.html proprietary.it.html 
        proprietary/po : malware-apple.it-en.html malware-apple.it.po 
                         malware-microsoft.it-en.html 
                         malware-microsoft.it.po 
                         malware-mobiles.it-en.html 
                         malware-mobiles.it.po 
                         proprietary-back-doors.it-en.html 
                         proprietary-back-doors.it.po 
                         proprietary-censorship.it-en.html 
                         proprietary-censorship.it.po 
                         proprietary-drm.it-en.html 
                         proprietary-drm.it.po 
                         proprietary-insecurity.it-en.html 
                         proprietary-insecurity.it.po 
                         proprietary-jails.it-en.html 
                         proprietary-jails.it.po 
                         proprietary-sabotage.it-en.html 
                         proprietary-sabotage.it.po 
                         proprietary-surveillance.it-en.html 
                         proprietary-surveillance.it.po 
                         proprietary-tyrants.it-en.html 
                         proprietary-tyrants.it.po 
                         proprietary.it-en.html proprietary.it.po 
        server         : body-include-2.it.html 
        server/gnun/compendia: compendium.it.po 
        server/po      : body-include-2.it.po sitemap.it-en.html 
                         sitemap.it.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.it.html?cvsroot=www&r1=1.307&r2=1.308
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.it.html?cvsroot=www&r1=1.534&r2=1.535
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/words-to-avoid.it.html?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it-en.html?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/words-to-avoid.it.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it-en.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.it.po?cvsroot=www&r1=1.589&r2=1.590
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.it.po?cvsroot=www&r1=1.734&r2=1.735
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.it.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.it.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.it.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.it.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-censorship.it.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.it.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.it.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.it.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.it.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it-en.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-censorship.it.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-en.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.it.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/server/body-include-2.it.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/server/gnun/compendia/compendium.it.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/body-include-2.it.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it-en.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.it.po?cvsroot=www&r1=1.113&r2=1.114

Patches:
Index: home.it.html
===================================================================
RCS file: /web/www/www/home.it.html,v
retrieving revision 1.307
retrieving revision 1.308
diff -u -b -r1.307 -r1.308
--- home.it.html        3 Oct 2016 08:58:52 -0000       1.307
+++ home.it.html        8 Oct 2016 21:29:02 -0000       1.308
@@ -311,7 +311,7 @@
 </div>
 
 <div id="blurb" class="emph-box white">
-<p>Today's random package&hellip;</p>
+<p>Il pacchetto GNU di oggi</p>
 
 <!--#include virtual="/server/home-pkgselect.html" -->
 <!--#include virtual="/server/home-pkgblurbs.it.html" -->
@@ -409,7 +409,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultima modifica:
 
-$Date: 2016/10/03 08:58:52 $
+$Date: 2016/10/08 21:29:02 $
 
 <!-- timestamp end -->
 </p>

Index: planetfeeds.it.html
===================================================================
RCS file: /web/www/www/planetfeeds.it.html,v
retrieving revision 1.534
retrieving revision 1.535
diff -u -b -r1.534 -r1.535
--- planetfeeds.it.html 6 Oct 2016 04:59:17 -0000       1.534
+++ planetfeeds.it.html 8 Oct 2016 21:29:02 -0000       1.535
@@ -1,20 +1,15 @@
 
 <!-- Autogenerated by planetrss.pl 1.13 -->
 <p><a href='http://mediagoblin.org/news/tpac-2016-and-review-activitypub.html'>
-ActivityPub and MediaGoblin at TPAC 2016 (or: ActivityPub needs
-your review!)</a>: Hello everyone! We have a lot of news to cover, but I’m 
going to jump
-right into the thick of it: we’ve been wor...
+ActivityPub e MediaGoblin a TPAC 2016</a> 
 <a 
href='http://mediagoblin.org/news/tpac-2016-and-review-activitypub.html'>&nbsp;<em>leggi
 tutto...</em></a></p>
 <p><a
 
href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-recap-for-september-30th-2016'>
-Free Software Directory meeting recap for September 30th, 2016</a>: Every week 
free software activists from around the world come together in
-#fsf on irc.freenode.org to help improve the Free Soft...
+Ultimo aggiornamento dell'elenco di software libero</a> 
 <a
 
href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-recap-for-september-30th-2016'>&nbsp;<em>leggi
 tutto...</em></a></p>
 <p><a
 
href='http://www.fsf.org/blogs/community/twenty-two-22-new-gnu-releases-in-september'>
-Twenty-two new GNU releases in September</a>: * apl-1.6a * 
autoconf-archive-2016.09.16 * autogen-5.18.12 * bash-4.4 *
-denemo-2.0.12 * drgeo-16.10a * emacs-25.1 * gawk-4.1.4 * global-6.5.5 *
-gnuca...
+22 nuove versioni di programmi GNU in settembre</a> 
 <a
 
href='http://www.fsf.org/blogs/community/twenty-two-22-new-gnu-releases-in-september'>&nbsp;<em>leggi
 tutto...</em></a></p>

Index: philosophy/words-to-avoid.it.html
===================================================================
RCS file: /web/www/www/philosophy/words-to-avoid.it.html,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- philosophy/words-to-avoid.it.html   1 Oct 2016 17:30:42 -0000       1.87
+++ philosophy/words-to-avoid.it.html   8 Oct 2016 21:29:02 -0000       1.88
@@ -29,6 +29,7 @@
 &ldquo;<a href="#Alternative">Alternativa</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
 &ldquo;<a href="#Open">Aperto</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
 &ldquo;<a href="#DigitalGoods">Beni digitali (Digital Goods)</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
+&ldquo;<a href="#Assets">Beni (digitali)</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
 &ldquo;<a href="#Closed">Chiuso</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM -->
 &ldquo;<a href="#CloudComputing">Cloud Computing</a>&rdquo; | <!-- 
GNUN-SORT-NEXT-ITEM -->
 &ldquo;<a href="#Commercial">Commerciale</a>&rdquo; | <!-- GNUN-SORT-NEXT-ITEM 
-->
@@ -110,9 +111,9 @@
 <em>diritto</em> di pretendere una copia.</p>
 <p>
 In particolare, se qualcuno scrive un programma autonomamente e non ne cede
-mai copie ad alcuno, quel programma è software libero (in modo banale)
-perché il suo autore, che ne è il solo utente, ha le quattro libertà
-essenziali.</p>
+mai copie ad alcuno, quel programma è software libero (anche se in modo
+banale) perché tutti gli utenti che ne possiedono una copia, e cioè il solo
+autore, hanno le quattro libertà essenziali.</p>
 <p>
 In pratica, quando molti utenti hanno copie di un programma libero, qualcuno
 sicuramente lo pubblicherà su Internet, dando accesso a chiunque. Pensiamo
@@ -194,6 +195,17 @@
 
 <!-- GNUN-SORT-NEXT-ITEM -->
 <!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="Assets">&ldquo;Beni (digitali)&rdquo;</h3>
+
+<!-- GNUN-SORT-END-KEY -->
+<p>
+Chiamare le opere pubblicare col nome di "beni" o "beni digitali" è ancora
+peggio che chiamarli <a href="#Content">&ldquo;contenuti&rdquo;</a> perché
+presuppone che non abbiano alcun valore per la società tranne quello
+commerciale.</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="Closed">&ldquo;Chiuso&rdquo;</h3>
 
 <!-- GNUN-SORT-END-KEY -->
@@ -639,10 +651,12 @@
 venisse considerata una verità oggettiva.</p>
 <p>
 Il sistema giuridico - almeno negli USA - non considera l'infrazione al
-diritto d'autore un "furto". Le leggi sui furti non si applicano alle
-infrazioni al diritto d'autore. I sostenitori di una forma oppressiva di
-copyright si  appellano a un'autorità... e presentano in maniera sbagliata
-quanto sostiene tale autorità.</p>
+diritto d'autore un "furto". <a
+href="http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&amp;vol=473&amp;invol=207";>Le
+leggi sui furti non si applicano alle infrazioni al diritto d'autore.</a> I
+sostenitori di una forma oppressiva di copyright si  appellano a
+un'autorità... e presentano in maniera sbagliata  quanto sostiene tale
+autorità.</p>
 <p>
 Come argomentazione, potete fare riferimento a questo <a
 
href="http://www.guardian.co.uk/books/2013/may/04/harper-lee-kill-mockingbird-copyright";>
@@ -1264,7 +1278,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/10/01 17:30:42 $
+$Date: 2016/10/08 21:29:02 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/words-to-avoid.it-en.html
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it-en.html,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- philosophy/po/words-to-avoid.it-en.html     1 Oct 2016 17:30:42 -0000       
1.78
+++ philosophy/po/words-to-avoid.it-en.html     8 Oct 2016 21:29:02 -0000       
1.79
@@ -26,6 +26,8 @@
 |<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Alternative">Alternative</a>&rdquo;
 |<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
+       href="#Assets">Assets</a>&rdquo;
+|<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#BSD-style">BSD-style</a>&rdquo;
 |<span class="gnun-split"></span><!-- GNUN-SORT-NEXT-ITEM --> &ldquo;<a
        href="#Closed">Closed</a>&rdquo;
@@ -147,19 +149,19 @@
 The <a href="/philosophy/free-sw.html">criterion for free software</a>
 is not about who has &ldquo;access&rdquo; to the program; the four
 essential freedoms concern what a user that has a copy of the program
-can do with it.  For instance, freedom 2 says that that user is free
-to make another copy and give or sell it to you.  But no user
+is allowed to do with it.  For instance, freedom 2 says that that user
+is free to make another copy and give or sell it to you.  But no user
 is <em>obligated</em> to do that for you; you do not have
 a <em>right</em> to demand a copy of that program from any user.</p>
 <p>
 In particular, if you write a program yourself and never offer a copy
-to anyone else, that program is free software (in a trivial way)
-because you (the sole user that has it) have the four essential
-freedoms.</p>
+to anyone else, that program is free software albeit in a trivial way,
+because every user that has a copy has the four essential freedoms
+(since the only such user is you).</p>
 <p>
 In practice, when many users have copies of a program, someone is sure
 to post it on the internet, giving everyone access to it.  We think
-people ought to do that, if the program is useful.  But this isn't a
+people ought to do that, if the program is useful.  But that isn't a
 requirement of free software.</p>
 <p>
 There is one specific point in which a question of having access is
@@ -192,6 +194,16 @@
 
 <!-- GNUN-SORT-NEXT-ITEM -->
 <!-- GNUN-SORT-BEGIN-KEY -->
+<h3 id="Assets">&ldquo;Assets&rdquo;</h3>
+<!-- GNUN-SORT-END-KEY -->
+<p>
+To refer to published works as &ldquo;assets&rdquo;, or &ldquo;digital
+assets&rdquo;, is even worse than calling
+them <a href="#Content">&ldquo;content&rdquo;</a> &mdash; it presumes
+they have no value to society except commercial value.</p>
+
+<!-- GNUN-SORT-NEXT-ITEM -->
+<!-- GNUN-SORT-BEGIN-KEY -->
 <h3 id="BSD-style">&ldquo;BSD-style&rdquo;</h3>
 <!-- GNUN-SORT-END-KEY -->
 <p>
@@ -1132,9 +1144,11 @@
 copyright infringement.  This is spin, but they would like you to take
 it for objective truth.</p>
 <p>
-Under the US legal system, copyright infringement is not theft.  Laws
-about theft are not applicable to copyright infringement.  The
-supporters of repressive copyright are making an appeal to
+Under the US legal system, copyright infringement is not theft.  
+<a
+href="http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&amp;vol=473&amp;invol=207";>
+Laws about theft are not applicable to copyright infringement.</a>
+The supporters of repressive copyright are making an appeal to
 authority&mdash;and misrepresenting what authority says.</p>
 <p>
 To refute them, you can point to this
@@ -1247,7 +1261,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/10/01 17:30:42 $
+$Date: 2016/10/08 21:29:02 $
 <!-- timestamp end -->
 </p>
 </div>

Index: philosophy/po/words-to-avoid.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/words-to-avoid.it.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- philosophy/po/words-to-avoid.it.po  8 Oct 2016 21:04:13 -0000       1.212
+++ philosophy/po/words-to-avoid.it.po  8 Oct 2016 21:29:02 -0000       1.213
@@ -18,7 +18,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-10-04 05:56+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -69,11 +68,8 @@
 msgid "&ldquo;<a href=\"#Alternative\">Alternative</a>&rdquo; |"
 msgstr "&ldquo;<a href=\"#Alternative\">Alternativa</a>&rdquo; |"
 
-# | &ldquo;<a [-href=\"#Access\">Access</a>&rdquo;-]
-# | {+href=\"#Assets\">Assets</a>&rdquo;+} |
 #. GNUN-SORT-NEXT-ITEM
 #. type: Content of: <p>
-#| msgid "&ldquo;<a href=\"#Access\">Access</a>&rdquo; |"
 msgid "&ldquo;<a href=\"#Assets\">Assets</a>&rdquo; |"
 msgstr "&ldquo;<a href=\"#Assets\">Beni (digitali)</a>&rdquo; |"
 
@@ -280,8 +276,8 @@
 #. type: Content of: <p>
 msgid "&ldquo;<a href=\"#SharingEconomy\">Sharing economy</a>&rdquo; |"
 msgstr ""
-"&ldquo;<a href=\"#SharingEconomy\">Economia di condivisione (Sharing "
-"economy)</a>&rdquo; |"
+"&ldquo;<a href=\"#SharingEconomy\">Economia di condivisione (Sharing economy)"
+"</a>&rdquo; |"
 
 #. GNUN-SORT-NEXT-ITEM
 #. type: Content of: <p>
@@ -363,22 +359,7 @@
 "libero coincida con l'avere \"accesso\" pubblico a un programma, ma questo "
 "non è il significato di software libero."
 
-# | The <a href=\"/philosophy/free-sw.html\">criterion for free software</a>
-# | is not about who has &ldquo;access&rdquo; to the program; the four
-# | essential freedoms concern what a user that has a copy of the program
-# | [-can-] {+is allowed to+} do with it.  For instance, freedom 2 says that
-# | that user is free to make another copy and give or sell it to you.  But no
-# | user is <em>obligated</em> to do that for you; you do not have a
-# | <em>right</em> to demand a copy of that program from any user.
-#. type: Content of: <p>
-#| msgid ""
-#| "The <a href=\"/philosophy/free-sw.html\">criterion for free software</a> "
-#| "is not about who has &ldquo;access&rdquo; to the program; the four "
-#| "essential freedoms concern what a user that has a copy of the program can "
-#| "do with it.  For instance, freedom 2 says that that user is free to make "
-#| "another copy and give or sell it to you.  But no user is <em>obligated</"
-#| "em> to do that for you; you do not have a <em>right</em> to demand a copy "
-#| "of that program from any user."
+#. type: Content of: <p>
 msgid ""
 "The <a href=\"/philosophy/free-sw.html\">criterion for free software</a> is "
 "not about who has &ldquo;access&rdquo; to the program; the four essential "
@@ -396,16 +377,7 @@
 "em> di fare o distribuire copie, e nessuno ha il <em>diritto</em> di "
 "pretendere una copia."
 
-# | In particular, if you write a program yourself and never offer a copy to
-# | anyone else, that program is free software [-(in-] {+albeit in+} a trivial
-# | way[-)-]{+,+} because [-you (the sole-] {+every+} user that has [-it)
-# | have-] {+a copy has+} the four essential [-freedoms.-] {+freedoms (since
-# | the only such user is you).+}
-#. type: Content of: <p>
-#| msgid ""
-#| "In particular, if you write a program yourself and never offer a copy to "
-#| "anyone else, that program is free software (in a trivial way)  because "
-#| "you (the sole user that has it) have the four essential freedoms."
+#. type: Content of: <p>
 msgid ""
 "In particular, if you write a program yourself and never offer a copy to "
 "anyone else, that program is free software albeit in a trivial way, because "
@@ -417,16 +389,7 @@
 "banale) perché tutti gli utenti che ne possiedono una copia, e cioè il solo 
"
 "autore, hanno le quattro libertà essenziali."
 
-# | In practice, when many users have copies of a program, someone is sure to
-# | post it on the internet, giving everyone access to it.  We think people
-# | ought to do that, if the program is useful.  But [-this-] {+that+} isn't a
-# | requirement of free software.
-#. type: Content of: <p>
-#| msgid ""
-#| "In practice, when many users have copies of a program, someone is sure to "
-#| "post it on the internet, giving everyone access to it.  We think people "
-#| "ought to do that, if the program is useful.  But this isn't a requirement "
-#| "of free software."
+#. type: Content of: <p>
 msgid ""
 "In practice, when many users have copies of a program, someone is sure to "
 "post it on the internet, giving everyone access to it.  We think people "
@@ -486,9 +449,7 @@
 "del software</a> non danno libertà agli utenti. Pensiamo che non si debbano "
 "offrire agli utenti queste \"alternative\" al software libero."
 
-# | [-&ldquo;Access&rdquo;-]{+&ldquo;Assets&rdquo;+}
 #. type: Content of: <h3>
-#| msgid "&ldquo;Access&rdquo;"
 msgid "&ldquo;Assets&rdquo;"
 msgstr "&ldquo;Beni (digitali)&rdquo;"
 
@@ -2070,9 +2031,9 @@
 "your privacy, try one of the <a href=\"https://libreplanet.org/wiki/Group:";
 "Skype_Replacement\"> numerous free Skype replacements</a>."
 msgstr ""
-"Non usate il neologismo &ldquo;skypare&rdquo; per indicare una "
-"(video)chiamata via Internet. Skype è solo uno dei tanti programmi per "
-"questo scopo, e per di più è software proprietario e <a href=\"/philosophy/"
+"Non usate il neologismo &ldquo;skypare&rdquo; per indicare una (video)"
+"chiamata via Internet. Skype è solo uno dei tanti programmi per questo "
+"scopo, e per di più è software proprietario e <a href=\"/philosophy/"
 "proprietary/proprietary-surveillance.html#SpywareInSkype\"> spia i propri "
 "utenti</a>. Per effettuare (video)chiamate via Internet in un modo che "
 "rispetti la vostra libertà e la vostra privacy, usate uno dei tanti <a href="
@@ -2176,17 +2137,7 @@
 "copyright.  Questa è un'esagerazione, ma costoro vorrebbero che questa "
 "venisse considerata una verità oggettiva."
 
-# | Under the US legal system, copyright infringement is not theft.  {+<a
-# | 
href=\"http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&amp;vol=473&amp;invol=207\";>+}
-# | Laws about theft are not applicable to copyright [-infringement.-]
-# | {+infringement.</a>+} The supporters of repressive copyright are making an
-# | appeal to authority&mdash;and misrepresenting what authority says.
-#. type: Content of: <p>
-#| msgid ""
-#| "Under the US legal system, copyright infringement is not theft.  Laws "
-#| "about theft are not applicable to copyright infringement.  The supporters "
-#| "of repressive copyright are making an appeal to authority&mdash;and "
-#| "misrepresenting what authority says."
+#. type: Content of: <p>
 msgid ""
 "Under the US legal system, copyright infringement is not theft.  <a href="
 "\"http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&amp;vol=473&amp;";

Index: po/home.it-en.html
===================================================================
RCS file: /web/www/www/po/home.it-en.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- po/home.it-en.html  5 Sep 2016 08:29:29 -0000       1.130
+++ po/home.it-en.html  8 Oct 2016 21:29:02 -0000       1.131
@@ -9,92 +9,131 @@
 
 <style type="text/css" media="print,screen">
 <!--
-#home .button {
+/* === Banner === */
+#gnuhealth { display: none; }
address@hidden (min-width: 57em) {
+   #gnuhealth {
+      display: block;
+      width: 100%;
+      margin-top: 2.3em;
+   }
+}
+/* ======================= */
+
+#content {
+   margin: 0;
+}
+.first-column, .second-column {
+   width: 40em; max-width: 100%;
+   margin: auto;
+}
+
+h2 {
+   color: #333;
+   margin: 1.2em 0 .9em;
+}
+h2.first {
+   margin-top: 1em;
+}
+#gnu-linux {
+   width: 30em; max-width: 100%;
    text-align: center;
-   font-weight: bold;
-   margin-top: .7em; margin-bottom: .8em;
+   margin: 0 auto 1em;
+}
+#gnu-linux img {
+   width: 100%;
+}
+.button {
+   font-size: 1.8em;
+   margin: 1.7em 0;
 }
 .button a, .button a:visited {
-   color: #971611;
-   text-decoration: none;
+   padding: .4em .6em;
+   color: #a42e2b;
+   background: #eee;
+   border: .1em solid #ccc;
 }
 .button a:hover {
    color: #777;
 }
-.large {
-   width: auto: max-width: 100%;
-   font-size: 2em;
-   padding: .1em;
-   background-color: #e7e9eb;
-   border: .4em solid #c9cccf;
-}
-#home .button {
-   box-shadow: 0 .15em #171d33;
-   -moz-box-shadow: 0 .15em #171d33;
-   -webkit-box-shadow: 0 .15em #171d33;
-   -icab-box-shadow: 0 .15em #171d33;
-   -o-box-shadow: 0 .15em #171d33;
-   border-radius: 1em;
-   -moz-border-radius: 1em;
-   -khtml-border-radius: 1em;
-   -webkit-border-radius: 1em;
-   -opera-border-radius: 1em;
+.first-column p.back {
+   margin-bottom: 0;
 }
 
-.emph-box p { font-size: .9em }
-.emph-box h4 {
-   text-align: center;
+.second-column .emph-box {
+   padding: 0 1.2em 1.2em;
+   margin-top: 1.5em;
+}
+.second-column .emph-box.white {
+   background: white;
+}
+.second-column .emph-box .back {
+   margin-top: 1em;
+}
+h3 {
+   margin-top: .7em;
+}
+h3 img {
+   height: .8em;
+   margin-left: .5em;
+}
+#blurb h4 {
+   text-align: left;
    font-size: 1.5em;
+   margin-top: .4em;
 }
-
-.first-column {
-   width: 60%;
+#blurb h4 img {
    float: left;
+   margin-right: .5em;
 }
-.second-column {
-   width: 38%;
-   float: right;
+#Flashes p, #unmaint li, #blurb p, #blurb p small {
+   font-size: .9em;
 }
address@hidden (max-width: 40em) {
-   .first-column, .second-column {
-      float: none;
-      width: 100%;
-   }
+#unmaint li, #blurb p {
+   color: #404040;
 }
-.first-column, .second-column {
-   margin-bottom: 2em; margin-top: 0;
-}
-.first-column {
-   margin-bottom: .5em;
+#unmaint strong {
+   display: block;
+   font-size: 1.1em;
+   color: black;
 }
 
-h2 {
-   text-shadow: none;
-   margin-bottom: .6em;
+.clear {
+   clear: both;
+   height: 2em;
 }
-.first-column img { width: 80%; margin: .5em 0 1em 0; }
-
-.second-column h4 img { height: .8em; }
-h4#Flashes { margin-top: .5em; }
-#Action {
-   padding: 0 1em;
-   border-left: .4em solid #b9bcbf; border-right: .4em solid #b9bcbf;
+.translators-notes {
+   width: 44.4em; max-width: 100%;
+   margin: 0 auto;
 }
-#Action h2 {
-   text-align: center;
-   padding-top: 0;
-   color: #171d33;
+#mission-statement {
+   margin-bottom: 0;
+}
+#sisters {
+   font-size: .9em;
+   margin: 0 3% 2em;
 }
-#Action li { margin-bottom: .7em; }
 
-#mission-statement { margin-bottom: 0; }
-#sisters { font-size: .9em; margin: 0 3% 2em; }
address@hidden (min-width: 57em) {
+   .first-column {
+      width: 61%;
+      float: left;
+      margin: 0;
+   }
+   .second-column {
+      width: 33%;
+      float: right;
+      margin: 0;
+   }
+   .translators-notes {
+      width: 100%;
+   }
+}
 -->
 </style>
 <!--#include virtual="/server/fs-gang-definitions.html" -->
 <!--#include virtual="/po/home.translist" -->
 <!--#include virtual="/server/banner.html" -->
-
 <p class="no-display">GNU is the only operating system developed
 specifically to give its users freedom.  What is GNU, and what freedom
 is at stake?</p>
@@ -102,7 +141,7 @@
 <div id="home">
 <div class="first-column">
 
-<h2>What is GNU?</h2>
+<h2 class="first">What is GNU?</h2>
 
 <p>GNU is an operating system that
 is <a href="/philosophy/free-sw.html">free software</a>&mdash;that is,
@@ -114,9 +153,14 @@
 are entirely free software.  <a href="#More-GNU">More about GNU
 below</a>.</p>
 
-<p class="c"><a href="/distros/screenshot.html"><img
-   src="/distros/screenshots/trisquel-medium.jpg" alt="Screenshot of GNU"
-   /></a></p>
+<div id="gnu-linux">
+<p class="button"><a
+   href="/distros/free-distros.html">Try GNU/Linux!</a></p>
+
+<a href="/distros/screenshot-gnewsense.html"><img
+   src="/distros/screenshots/gnewsense2-medium.jpg"
+   alt="Screenshot of GNU"/></a>
+</div>
 
 <h2>What is the Free Software Movement?</h2>
 
@@ -190,37 +234,25 @@
 project.</p>
 
 <p class="back"><a href="/gnu/gnu.html">More information</a></p>
-
 </div><!-- /first-column -->
 
 <div class="second-column">
 
-<p class="button c large"><a
-      href="/distros/free-distros.html">Try GNU/Linux!</a></p>
-
-<div class="emph-box">
+<a href="http://www.gnuhealthcon.org/2016-las_palmas/";><img id="gnuhealth"
+src="/server/staging/gnuhealth/gnuhealthcon2016_small.jpg" alt="GNUHealth 
Conference 2016" /></a>
 
-<h4 id="Flashes"><a href="http://planet.gnu.org/";>Planet GNU</a>
-<a href="http://planet.gnu.org/rss20.xml";><img src="/feed-icon-10x10.png" 
alt="RSS Feed" /></a></h4>
+<div id="Flashes" class="emph-box white">
+<h3><a href="http://planet.gnu.org/";>Planet GNU</a>
+<a href="http://planet.gnu.org/rss20.xml";><img src="/feed-icon-10x10.png" 
alt="RSS Feed" /></a></h3>
 
 <!--#include virtual="/planetfeeds.html" -->
-
 <p>For more news, see <a href="http://planet.gnu.org/";>Planet GNU</a>
 and the list of <a href="/software/recent-releases.html">recent GNU
 releases</a>.</p>
+</div>
 
-<!--#include virtual="/server/home-pkgselect.html" -->
-<!--#include virtual="/server/home-pkgblurbs.html" -->
-
-<p class="back"><small><a href="/manual/blurbs.html">Short descriptions for 
all GNU
-packages</a></small></p>
-
-</div><!-- class="emph-box" -->
-
-<div id="Action">
-
-<!-- BEGIN TakeAction -->
-<h2>Take Action</h2>
+<div id="Action" class="emph-box">
+<h3>Take Action</h3>
 
 <ul>
 <li><strong><a href="http://www.fsf.org/campaigns";>Support current FSF
@@ -241,55 +273,50 @@
 <li><strong>Fight against software patents:</strong>
 <a href="http://www.endsoftpatents.org";>worldwide</a>,
 <a href="/server/takeaction.html#swpat">and Europe</a>.</li>
-
-<li><strong>Watch and share this movie:</strong> <a
-href="http://patentabsurdity.com";>Patent Absurdity</a>&mdash;made
-possible by <a href="http://www.fsf.org/associate/";>FSF associate
-members</a> like <a href="http://fsf.org/jfb";>you</a>.</li>
-
-<li><strong><a href="/server/takeaction.html#wipochange">Call
-on WIPO</a></strong> to change its name and mission.</li>
-
-<li>Students! <a href="http://www.aful.org/communiques/univ-offers-me-windows";>
-Claim a refund on your unused Microsoft Windows licences</a>.</li>
-
-<li><a href="/server/takeaction.html#directory">Add to the Free Software
-Directory</a>.</li>
 </ul>
 
 <p class="back"><a href="/server/takeaction.html">More action items</a></p>
-<!-- END TakeAction -->
-</div><!-- /Action -->
-</div><!-- /second-column -->
-</div><!-- /home -->
-
-<div class="highlight-para" style="clear: both">
+</div>
 
-<p><strong>Can you contribute to any of
+<div id="unmaint" class="emph-box">
+<ul>
+<li><strong>Can you contribute to any of
 these <a href="http://www.fsf.org/campaigns/priority-projects/";>High
 Priority Projects</a>?</strong> Gnash, coreboot, free distributions of
 GNU/Linux, GNU Octave, drivers for network routers, reversible
 debugging in GDB, automatic transcription, PowerVR drivers, and also
 free software replacements for Skype, OpenDWG libraries, and Oracle
-Forms.</p>
+Forms.</li>
 
-<p id="unmaint"><strong>Can you take over an <a
+<li><strong>Can you take over an <a
 href="/server/takeaction.html#unmaint">unmaintained GNU
 package</a>?</strong>
 <span class="gnun-split"></span>
   <a href="/software/halifax/">halifax</a>,
-  <a href="/software/metahtml/">metahtml</a>,
   <a href="/software/orgadoc/">orgadoc</a><span class="gnun-split"></span>,
 are all <a href="/server/takeaction.html#unmaint">looking for
 maintainers</a>.  Also, these packages are looking for co-maintainers:
 <span class="gnun-split"></span>
   <a href="/software/aspell/">aspell</a>,
   <a href="/software/gnuae/">gnuae</a>,
+  <a href="/software/gnubik/">gnubik</a>,
   <a href="/software/metaexchange/">metaexchange</a>,
   <a href="/software/powerguru/">powerguru</a><span class="gnun-split"></span>.
-See the package web pages for more information.</p>
+See the package web pages for more information.</li>
+</ul>
+</div>
 
-</div><!-- /highlight-para -->
+<div id="blurb" class="emph-box white">
+<p>Today's random package&hellip;</p>
+<!--#include virtual="/server/home-pkgselect.html" -->
+<!--#include virtual="/server/home-pkgblurbs.html" -->
+<p class="back"><small><a href="/manual/blurbs.html">Short descriptions for 
all GNU
+packages</a></small></p>
+</div>
+
+</div><!-- /second-column -->
+</div><!-- /home -->
+<div class="clear"></div>
 
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
@@ -358,7 +385,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/09/05 08:29:29 $
+$Date: 2016/10/08 21:29:02 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/home.it.po
===================================================================
RCS file: /web/www/www/po/home.it.po,v
retrieving revision 1.589
retrieving revision 1.590
diff -u -b -r1.589 -r1.590
--- po/home.it.po       8 Oct 2016 21:04:15 -0000       1.589
+++ po/home.it.po       8 Oct 2016 21:29:02 -0000       1.590
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-05 09:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 # type: Content of: <title>
@@ -89,10 +88,7 @@
 msgstr "<a href=\"/distros/free-distros.html\">Provate GNU/Linux!</a>"
 
 # type: Content of: <table><tr><td><ul><li>
-# | <a [-href=\"/distros/screenshot.html\">-]
-# | {+href=\"/distros/screenshot-gnewsense.html\">+}
 #. type: Content of: <div><div><div><a>
-#| msgid "<a href=\"/distros/screenshot.html\">"
 msgid "<a href=\"/distros/screenshot-gnewsense.html\">"
 msgstr "<a href=\"/distros/screenshot-gnewsense.html\">"
 
@@ -286,10 +282,7 @@
 msgstr "<a href=\"/gnu/gnu.html\">Ulteriori informazioni</a>"
 
 # type: Content of: <p>
-# | [-by-]<a [-href=\"http://www.stallman.org/\";>Richard Stallman</a>-]
-# | {+href=\"http://www.gnuhealthcon.org/2016-las_palmas/\";>+}
 #. type: Content of: <div><div><a>
-#| msgid "by <a href=\"http://www.stallman.org/\";>Richard Stallman</a>"
 msgid "<a href=\"http://www.gnuhealthcon.org/2016-las_palmas/\";>"
 msgstr "<a href=\"http://www.gnuhealthcon.org/2016-las_palmas/\";>"
 
@@ -398,13 +391,7 @@
 "<strong>Potete aiutare a ripristinare un <a href=\"/server/takeaction."
 "html#unmaint\">pacchetto GNU abbandonato</a>?</strong>"
 
-# | <a href=\"/software/halifax/\">halifax</a>, <a
-# | [-href=\"/software/metahtml/\">metahtml</a>, <a-]
-# | href=\"/software/orgadoc/\">orgadoc</a>
 #. type: Content of: <div><div><div><ul><li>
-#| msgid ""
-#| "<a href=\"/software/halifax/\">halifax</a>, <a href=\"/software/metahtml/"
-#| "\">metahtml</a>, <a href=\"/software/orgadoc/\">orgadoc</a>"
 msgid ""
 "<a href=\"/software/halifax/\">halifax</a>, <a href=\"/software/orgadoc/"
 "\">orgadoc</a>"
@@ -421,16 +408,7 @@
 ", hanno bisogno di <a href=\"/server/takeaction.html#unmaint\">responsabili</"
 "a>. E questi altri cercano aiuto:"
 
-# | <a href=\"/software/aspell/\">aspell</a>, <a
-# | href=\"/software/gnuae/\">gnuae</a>, <a
-# | {+href=\"/software/gnubik/\">gnubik</a>, <a+}
-# | href=\"/software/metaexchange/\">metaexchange</a>, <a
-# | href=\"/software/powerguru/\">powerguru</a>
 #. type: Content of: <div><div><div><ul><li>
-#| msgid ""
-#| "<a href=\"/software/aspell/\">aspell</a>, <a href=\"/software/gnuae/"
-#| "\">gnuae</a>, <a href=\"/software/metaexchange/\">metaexchange</a>, <a "
-#| "href=\"/software/powerguru/\">powerguru</a>"
 msgid ""
 "<a href=\"/software/aspell/\">aspell</a>, <a href=\"/software/gnuae/"
 "\">gnuae</a>, <a href=\"/software/gnubik/\">gnubik</a>, <a href=\"/software/"

Index: po/planetfeeds.it.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.it.po,v
retrieving revision 1.734
retrieving revision 1.735
diff -u -b -r1.734 -r1.735
--- po/planetfeeds.it.po        8 Oct 2016 21:04:15 -0000       1.734
+++ po/planetfeeds.it.po        8 Oct 2016 21:29:02 -0000       1.735
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-01 04:57+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <p><a>
@@ -44,14 +43,7 @@
 msgid "more"
 msgstr "&nbsp;<em>leggi tutto...</em>"
 
-# | <a
-# | 
[-href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-recap-for-august-12th-2016'>-]
-# | {+href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-
-# | recap-for-september-30th-2016'>+}
-#. type: Content of: <p><a>
-#| msgid ""
-#| "<a href='http://www.fsf.org/blogs/directory/free-software-directory-";
-#| "meeting-recap-for-august-12th-2016'>"
+#. type: Content of: <p><a>
 msgid ""
 "<a href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-";
 "recap-for-september-30th-2016'>"
@@ -59,33 +51,17 @@
 "<a href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-";
 "recap-for-september-30th-2016'>"
 
-# | Free Software Directory meeting recap for [-August 12th,-] {+September
-# | 30th,+} 2016
 #. type: Content of: <p><a>
-#| msgid "Free Software Directory meeting recap for August 12th, 2016"
 msgid "Free Software Directory meeting recap for September 30th, 2016"
 msgstr "Ultimo aggiornamento dell'elenco di software libero"
 
-# | : Every week free software activists from around the world come together
-# | in #fsf on irc.freenode.org to help improve the Free [-Softwar...-]
-# | {+Soft...+}
 #. type: Content of: <p>
-#| msgid ""
-#| ": Every week free software activists from around the world come together "
-#| "in #fsf on irc.freenode.org to help improve the Free Softwar..."
 msgid ""
 ": Every week free software activists from around the world come together in "
 "#fsf on irc.freenode.org to help improve the Free Soft..."
 msgstr " "
 
-# | <a
-# | 
[-href='http://www.fsf.org/blogs/directory/free-software-directory-meeting-recap-for-august-12th-2016'>-]
-# | {+href='http://www.fsf.org/blogs/community/twenty-two-22-new-gnu-releases-i
-# | n-september'>+}
-#. type: Content of: <p><a>
-#| msgid ""
-#| "<a href='http://www.fsf.org/blogs/directory/free-software-directory-";
-#| "meeting-recap-for-august-12th-2016'>"
+#. type: Content of: <p><a>
 msgid ""
 "<a href='http://www.fsf.org/blogs/community/twenty-two-22-new-gnu-releases-";
 "in-september'>"

Index: proprietary/malware-apple.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.it.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/malware-apple.it.html   4 Aug 2016 21:28:30 -0000       1.17
+++ proprietary/malware-apple.it.html   8 Oct 2016 21:29:03 -0000       1.18
@@ -229,6 +229,12 @@
 <h3 id="surveillance">Sorveglianza di Apple</h3>
 <ul>
 
+  <li><p>L'applicazione iMessage dei vari iGadget <a
+href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/";>comunica
+a un server ogni numero di telefono digitato dall'utente</a>; il server
+tiene memorizzati i numeri per almeno 30 giorni.</p>
+  </li>
+
   <li><p>Gli utenti non possono creare una ID di Apple (che serve <a
 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool";>anche
 se si usano solo applicazioni gratuite</a>) senza dare un indirizzo e-mail
@@ -488,7 +494,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/08/04 21:28:30 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-microsoft.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.it.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/malware-microsoft.it.html       25 Aug 2016 22:28:17 -0000      
1.17
+++ proprietary/malware-microsoft.it.html       8 Oct 2016 21:29:03 -0000       
1.18
@@ -95,8 +95,27 @@
 sia qualcuno) riporre questa fiducia.</p></li>
 
   <li><p>Le backdoor di Windows 8 sono larghe al punto da <a
-href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>far
+href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>far
 concludere al governo tedesco che non ci si possa fidare di 
questo</a>.</p></li>
+
+<li><p>Gli utenti segnalano che <a
+href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+Microsoft li costringe a sostituire Windows 7 e 8 con lo "spione" Windows
+10</a>.</p>
+
+    <p>Microsoft effettivamente ha <a
+href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+attaccato i computer con Windows 7 e 8</a>, riattivando l'opzione che diceva
+se &ldquo;aggiornare&rdquo; a Windows 10 anche quando gli utenti l'avevano
+disattivata.</p>
+
+    <p>In seguito, Microsoft ha pubblicato istruzioni su <a
+href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/";>
+come rifiutare il cosiddetto "aggiornamento" a Windows 10</a>.</p>
+
+    <p>Sembra che questo comporti l'utilizzo di una backdoor in Windows 7 e 
8.</p>
+</li>
+
 </ul>
 
 <h3 id="insecurity">Insicurezza di Microsoft</h3>
@@ -108,6 +127,14 @@
 le credenziali dell'account Microsoft dell'utente, se riesce a fargli
 visitare un link opportunamente costruito.</p>
     </li>
+<li>
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+I POS Bancomat con Windows sono stati attaccati e trasformati in una rete di
+bot allo scopo di raccogliere i numeri di carta di credito dei clienti</a>.
+</p>
+</li>
+
 </ul>
 
 
@@ -149,12 +176,10 @@
 
   <li><p>Microsoft sta <a
 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
-costringendo</a> gli utenti ad <a
-href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>aggiornare
-a Windows 10</a>, ignorando la scelta di non aggiornare disponibile in
-Windows 7 o 8.  Ciò conferma la presenza di una <a
-href="/proprietary/proprietary-back-doors.html">backdoor universale in
-Windows</a> 7 e 8.</p></li>
+costringendo gli utenti ad "aggiornare" a Windows 10</a>, ignorando la
+scelta di non aggiornare disponibile in Windows 7 o 8.  Ciò conferma la
+presenza di una <a href="/proprietary/proprietary-back-doors.html">backdoor
+universale in Windows</a> 7 e 8.</p></li>
 
   <li><p>Gli "aggiornamenti" a Windows 10 <a
 
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/";>
@@ -166,8 +191,15 @@
 sollecitando molti utenti ad installare Windows 10</a>.
   </p></li>
 
+<li><p>
+Microsoft per mesi ha <a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update";>
+sollecitato molti utenti ad installare Windows 10</a> in modo ingannevole,
+se non se ne accorgevano e dicevano espressamente di no.
+</p></li>
+
   <li><p><a
-href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>Microsoft
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>>Microsoft
 informa l'NSA sui bug di Windows prima di sistemarli</a>.</p></li>
 
   <li><p><a
@@ -195,6 +227,11 @@
 
 <ul>
 
+<li>Per aumentare il numero di installazioni di Windows 10, Microsoft <a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+non rispetta la scelta e la privacy degli utenti</a>.
+</li>
+
 <li><p>Microsoft sta ripetutamente <a
 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>
 sollecitando molti utenti ad installare Windows 10</a>.</p></li>
@@ -213,7 +250,22 @@
 </ul>
 
 <h3 id="surveillance">Sorveglianza di Microsoft</h3>
+
 <ul>
+
+<li>Sembra che Windows 10 invii a Microsoft <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
+dati sulle applicazioni in esecuzione</a>.</li>
+
+<li><p>Un cosiddetto "aggiornamento" a Windows 10 cancellava applicazioni per 
il
+controllo della sorveglianza; un passaggio ulteriore inseriva un programma
+spia. Gli utenti se ne sono accorti e si sono lamentati, quindi Microsoft ha
+cambiato nome al programma <a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
+per fare credere agli utenti di averlo tolto</a>.</p>
+
+<p>Chi usa software proprietario si espone ad essere trattato in questo 
modo.</p></li>
+
   <li><p>
   <a
 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
@@ -229,7 +281,12 @@
 utenti, il testo inserito, le parole dettate, le informazioni sulal
 posizione, i contatti, le voci di calendario e le pagine web visitate, e
 persino di connettere automaticamente il computer a reti wireless sprotette
-e di mostrare pubblicità personalizzata.</p></li>
+e di mostrare pubblicità personalizzata.</p>
+
+  <p>Possiamo immaginare che Microsoft spii i file degli utenti solo su 
richiesta
+del governo statunitense, ma le &ldquo;condizioni sulla privacy&rdquo; non
+lo dicono esplicitamente. E cosa succederebbe se fosse il governo cinese a
+presentare richiesta?</p></li>
 
   <li><p>
   <a
@@ -238,6 +295,32 @@
 l'utente anche se si disattivano le funzioni di ricerca di Bing e Cortana e
 si attiva la protezione della privacy.</p></li>
 
+  <li><p>Grazie all'&ldquo;identificatore unico&rdquo; per la pubblicità, 
diverso per
+ciascun utente, altre aziende possono controllare l'attività di navigazione
+di ogni specifico utente.</p></li>
+
+  <li>Spyware in Windows 8: <a
+href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>Windows
+Update spia l'utente</a>. <a
+href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>Windows
+8.1 curiosa nelle ricerche locali</a>. E c'è una <a
+href="http://www.marketoracle.co.uk/Article40836.html";>chiave segreta
+dell'NSA in Windows</a>, le cui funzioni sono a noi ignote.</li>
+
+  <li><p>
+  <a
+href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>Microsoft
+SkyDrive permette all'NSA di esaminare direttamente i dati degli 
utenti</a>.</p>
+  </li>
+
+  <li><p>Spyware in Skype: <a
+href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>
+http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+Microsoft ha modificato Skype <a
+href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
+espressamente per spiare</a>.</p>
+  </li>
+
   <li><p>
   Microsoft usa le &ldquo;condizioni sulla privacy&rdquo; di Windows 10 per
 arrogarsi il &ldquo;diritto&rdquo; di spiare i file degli utenti in
@@ -261,25 +344,6 @@
 tutti gli aspetti, e di soggiogare completamente chiunque non abbandoni
 subito Windows.</p></li>
 
-  <li><p><a
-href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>Windows
-10 richiede agli utenti di dare il permesso per lo spionaggio totale</a>,
-che include i loro file, i loro comandi, il testo da loro immesso e quello
-da loro pronunciato.</p></li>
-
-  <li>Spyware in Windows: <a
-href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>Windows
-Update spia l'utente</a>. <a
-href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>Windows
-8.1 curiosa nelle ricerche locali</a>. E c'è una <a
-href="http://www.marketoracle.co.uk/Article40836.html";>chiave segreta
-dell'NSA in Windows</a>, le cui funzioni sono a noi ignote.</li>
-
-  <li><p>
-  <a
-href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>Microsoft
-SkyDrive permette all'NSA di esaminare direttamente i dati degli 
utenti</a>.</p>
-  </li>
 </ul>
 
 <h3 id="drm">DRM di Microsoft</h3>
@@ -396,7 +460,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/08/25 22:28:17 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/malware-mobiles.it.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.it.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/malware-mobiles.it.html 22 May 2016 19:30:06 -0000      1.8
+++ proprietary/malware-mobiles.it.html 8 Oct 2016 21:29:03 -0000       1.9
@@ -148,6 +148,19 @@
 
 <h3 id="surveillance">Sorveglianza in dispositivi mobili</h3>
 <ul>
+<li>
+<p>Una revisione di sicurezza di una applicazione usata per il tracciamento ha
+trovato che alcuni bug <a
+href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/";>
+permettevano a tutti di spiare dati personali di un utente</a>.  Il revisore
+non si mostra preoccupato del fatto che l'applicazione invii dati personali
+a un server dove lo <em>sviluppatore</em> li vede comunque tutti. Questo
+&ldquo;servizio&rdquo; è per perdenti!</p>
+
+<p>Il server sicuramente ha un "regolamento sulla privacy" che sicuramente non
+ha valore (come quasi tutti i regolamenti sulla privacy).</p>
+</li>
+
   <li><p>Le applicazioni che includono <a
 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/";>
 il sistema di sorveglianza Symphony  spiano le trasmissioni TV e radio
@@ -323,7 +336,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-back-doors.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.it.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/proprietary-back-doors.it.html  22 May 2016 19:30:06 -0000      
1.13
+++ proprietary/proprietary-back-doors.it.html  8 Oct 2016 21:29:03 -0000       
1.14
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-back-doors.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Backdoor proprietarie - Progetto GNU - Free Software Foundation</title>
@@ -10,14 +10,33 @@
 <!--#include virtual="/server/banner.it.html" -->
 <h2>Backdoor proprietarie</h2>
 
-<a href="/proprietary/proprietary.html">Altri esempi di malware
-proprietario</a>
+<p><a href="/proprietary/proprietary.html">Altri esempi di malware
+proprietario</a></p>
+
+<p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
 
 <p>Ecco alcuni esempi provati di backdoor (canali di ingresso nascosti) nel
 software proprietario.</p>
 
 <!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <ul>  
+    <li><p>L'aggiornamento di Capcom per Street Fighter V <a
+href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/";>installava
+un driver che può essere usato come backdoor</a> da qualsiasi applicazione
+installata su un computer Windows.</p>
+    </li>
+
+    <li><p>L'applicazione Dropbox per Macintosh <a
+href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>prende
+controllo totale della macchina chiedendo ripetutamente all'utente la
+password di amministratore</a>.</p>
+    </li>
   <li><p>La backdoor universale nei telefoni cellulari è effettivamente <a
 
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html/";>usata
 per ascoltare attraverso i loro microfoni</a>.</p>
@@ -128,9 +147,8 @@
 
 <li>
 <p>Le backdoor di Windows 8 sono larghe al punto da <a
-href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>far
-concludere al governo tedesco che non ci si possa fidare di questo sistema
-operativo</a>.
+href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>far
+concludere al governo tedesco che non ci si possa fidare di questo</a>.
 </p>
 </li>
 
@@ -361,7 +379,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-censorship.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-censorship.it.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- proprietary/proprietary-censorship.it.html  30 Jul 2016 17:29:53 -0000      
1.9
+++ proprietary/proprietary-censorship.it.html  8 Oct 2016 21:29:03 -0000       
1.10
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" 
value="/proprietary/proprietary-censorship.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Censura Proprietaria - Progetto GNU - Free Software Foundation</title>
@@ -10,6 +10,14 @@
 <!--#include virtual="/server/banner.it.html" -->
 <h2>Censura Proprietaria</h2>
 
+<p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
 <p>Ecco alcuni esempi di sistemi proprietari che censurano il contenuto
 richiesto dai propri utenti. Rendiamo disponibile, separatamente, anche un
 <a href="/proprietary/proprietary-jails.html">elenco di sistemi proprietari
@@ -156,7 +164,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/07/30 17:29:53 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-drm.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.it.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-drm.it.html 30 Jul 2016 17:29:53 -0000      1.5
+++ proprietary/proprietary-drm.it.html 8 Oct 2016 21:29:03 -0000       1.6
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-drm.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>DRM Proprietario - Progetto GNU - Free Software Foundation</title>
@@ -13,6 +13,14 @@
 <a href="/proprietary/proprietary.html">Altri esempi di malware
 proprietario</a>
 
+<p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
 <p>Ecco alcuni esempi di programmi e sistemi proprietari che implementano
 <em>digital restrictions management</em> (DRM, ovvero gestione delle
 restrizioni digitali): funzionalità progettate appositamente per limitare
@@ -29,6 +37,12 @@
 </p>
 
 <ul>
+<li><p>Il cosiddetto "aggiornamento" del firmware HP <a
+href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>ha
+imposto il DRM su alcune stampanti</a>, che ora si rifiutano di funzionare
+con cartucce d'inchiostro di terze parti.</p>
+</li>
+
 <li>
 <p>Ora i giochi per Oculus Rift hanno una protezione DRM che <a
 href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform";>impedisce
@@ -229,7 +243,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/07/30 17:29:53 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/proprietary-insecurity.it.html  25 Aug 2016 22:28:17 -0000      
1.17
+++ proprietary/proprietary-insecurity.it.html  8 Oct 2016 21:29:03 -0000       
1.18
@@ -13,6 +13,14 @@
 <a href="/proprietary/proprietary.html">Altri esempi di malware
 proprietario</a>
 
+<p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
 <p>Questa pagina elenca casi chiaramente dimostrati di scarsa sicurezza in
 software proprietario che ha gravi conseguenze o che è altrimenti degna di
 nota.</p>
@@ -419,7 +427,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/08/25 22:28:17 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-jails.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-jails.it.html       22 May 2016 19:30:06 -0000      
1.6
+++ proprietary/proprietary-jails.it.html       8 Oct 2016 21:29:03 -0000       
1.7
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-jails.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Prigioni proprietarie - Progetto GNU - Free Software Foundation</title>
@@ -10,8 +10,16 @@
 <!--#include virtual="/server/banner.it.html" -->
 <h2>Prigioni proprietarie</h2>
 
-<a href="/philosophy/proprietary.html">Altri esempi di malware
-proprietario</a>
+<p><a href="/philosophy/proprietary.html">Altri esempi di malware
+proprietario</a></p>
+
+<p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
 
 <p>Ecco alcuni esempi di sistemi proprietari che sono <em>prigioni</em>: non
 permettono all'utente di installare applicazioni liberamente. L'<a
@@ -172,7 +180,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.it.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/proprietary-sabotage.it.html    30 Jul 2016 17:29:53 -0000      
1.15
+++ proprietary/proprietary-sabotage.it.html    8 Oct 2016 21:29:03 -0000       
1.16
@@ -13,11 +13,27 @@
 <a href="/proprietary/proprietary.html">Altri esempi di malware
 proprietario</a>
 
+<p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
 <p>Ecco alcuni esempi di software proprietario che contiene qualcosa peggiore
 di una backdoor.</p>
 
 <ul>
   <li>
+    <p>Il cosiddetto "aggiornamento" del firmware HP <a
+href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>ha
+imposto il DRM su alcune stampanti</a>, che ora si rifiutano di funzionare
+con cartucce d'inchiostro di terze parti.</p>
+  </li>
+
+  <li>
+
     <p>Quando un utente è convinto da Microsoft ad accettare l'installazione 
di
 Windows 10, <a
 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>scopre
@@ -120,9 +136,8 @@
 fanno concorrenza a iTunes</a>.
 </p></li>
 
-<li><p>
-<a
-href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>Microsoft
+<li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>>Microsoft
 informa l'NSA sui bug di Windows prima di sistemarli</a>.
 </p></li>
 
@@ -325,7 +340,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/07/30 17:29:53 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-surveillance.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.it.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/proprietary-surveillance.it.html        5 Sep 2016 10:28:55 
-0000       1.24
+++ proprietary/proprietary-surveillance.it.html        8 Oct 2016 21:29:03 
-0000       1.25
@@ -6,21 +6,20 @@
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Sorveglianza proprietaria - Progetto GNU - Free Software 
Foundation</title>
 <style type="text/css" media="print,screen"><!--
-#surveillance {
-   width: 63em; max-width: 100%;
-   margin: 2.5em auto 1em;
+.announcement { 
+   background: none;
 }
 #surveillance div.toc {
-   width: 24.5em; max-width: 82%;
+   width: 24.5em; max-width: 94%;
    margin-bottom: 1em;
 }
address@hidden (min-width: 55em) {
address@hidden (min-width: 48em) {
    #surveillance div.toc {
       float: left;
       width: auto; max-width: 48%;
       margin: .2em 0 1em;
    }
-   #surveillance .pict.wide {
+   #surveillance .medium {
       width: 43%;
       margin: 7em 0 1em 1.5em;
    }
@@ -33,6 +32,14 @@
 <!--#include virtual="/server/banner.it.html" -->
 <h2>Sorveglianza proprietaria</h2>
 
+<p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
 <div  class="announcement">
 <p>Questo documento prova a tenere traccia di <strong>casi chiaramente
 dimostrati di software proprietario che spia o traccia i propri
@@ -44,7 +51,7 @@
 
 <div id="surveillance">
 
-<div class="pict wide">
+<div class="pict medium">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Vignetta: un cane che si sorprende a 
vedere comparire tre annunci
 pubblicitari sul suo monitor..." /></a>
@@ -147,6 +154,11 @@
 </div>
 
 <ul>
+<li>Per aumentare il numero di installazioni di Windows 10, Microsoft <a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+non rispetta la scelta e la privacy degli utenti</a>.
+</li>
+
   <li><p><a
 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>Windows
 10 ha 13 schermate di opzioni sulla sorveglianza</a>, tutte attive come
@@ -351,6 +363,12 @@
 </div>
 
 <ul>
+  <li><p>L'applicazione iMessage dei vari iGadget <a
+href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/";>comunica
+a un server ogni numero di telefono digitato dall'utente</a>; il server
+tiene memorizzati i numeri per almeno 30 giorni.</p>
+  </li>
+
   <li><p>Gli utenti non possono creare una ID di Apple (che serve <a
 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool";>anche
 se si usano solo applicazioni gratuite</a>) senza dare un indirizzo e-mail
@@ -490,6 +508,12 @@
 </div>
 
 <ul>
+
+  <li><p>La nuova applicazione per conversazioni vocali di Google <a
+href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>tiene
+traccia di tutte le  conversazioni</a>.</p>
+  </li>
+
   <li><p>Le applicazioni che includono <a
 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/";>
 il sistema di sorveglianza Symphony  spiano le trasmissioni TV e radio
@@ -593,6 +617,17 @@
 </div>
 
 <ul>
+
+   <li><p>Un'azienda che produce vibratori controllati via Internet <a
+href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit";>è
+stata portata in tribunale per la raccolta di molte informazioni personali
+su come gli utenti usano il prodotto</a>.</p>
+
+       <p>La dichiarazione dell'azienda che i dati sono raccolti in forma 
anonima può
+essere vera, ma questo non importa: se vende i dati a uno specialista, lo
+specialista può capire chi è l'utente.</p>
+  </li>
+
   <li><p>Un vibratore computerizzato <a
 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack";>spia
 gli utenti attraverso l'applicazione che lo controlla</a>.</p>
@@ -1107,7 +1142,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/09/05 10:28:55 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-tyrants.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary-tyrants.it.html     30 Jul 2016 17:29:54 -0000      
1.6
+++ proprietary/proprietary-tyrants.it.html     8 Oct 2016 21:29:03 -0000       
1.7
@@ -1,7 +1,7 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-tyrants.en.html" 
-->
 
 <!--#include virtual="/server/header.it.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Tiranni Proprietari - Progetto GNU - Free Software Foundation</title>
@@ -13,6 +13,14 @@
 <a href="/proprietary/proprietary.html">Altri esempi di malware
 proprietario</a>
 
+<p>Il software non libero (proprietario) è molto spesso malware, progettato 
per
+danneggiare gli utenti. Il software non libero è controllato dai suoi
+sviluppatori, e questo fatto mette gli sviluppatori in una posizione di
+potere nei confronti degli utenti; quest è <a
+href="/philosophy/free-software-even-more-important.html">l'ingiustizia di
+fondo</a>. Spesso gli sviluppatori esercitano questo potere a danno degli
+utenti che invece dovrebbero servire.</p>
+
 <p>Un dispositivo <em>tiranno</em> si rifiuta di permettere agli utenti di
 installare un sistema operativo diverso o modificato. Questi dispositivi
 hanno misure per bloccare l'esecuzione di versioni del sistema non
@@ -150,7 +158,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.it.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/proprietary.it.html     30 Jul 2016 17:29:54 -0000      1.6
+++ proprietary/proprietary.it.html     8 Oct 2016 21:29:03 -0000       1.7
@@ -48,6 +48,7 @@
   <li><strong>Azienda o tipo di prodotto</strong></li>
   <li><a href="/proprietary/malware-apple.html">Malware di Apple</a></li>
   <li><a href="/proprietary/malware-microsoft.html">Malware di 
Microsoft</a></li>
+  <li><a href="/proprietary/malware-adobe.html">Malware di Adobe</a></li>
   <li><a href="/proprietary/malware-mobiles.html">Malware nei dispositivi
 mobili</a></li>
   <li><a href="/proprietary/malware-kindle-swindle.html">Malware nel
@@ -68,6 +69,8 @@
 <li><a href="/proprietary/proprietary-sabotage.html">Sabotaggio</a></li>
 <li><a href="/proprietary/proprietary-interference.html">Interferenze</a></li>
 <li><a href="/proprietary/proprietary-surveillance.html">Sorveglianza</a></li>
+<li><a href="/proprietary/proprietary-subscriptions.html">Abbonamenti</a></li>
+<li><a href="/proprietary/proprietary-tethers.html">Vincoli</a> ai server</li>
 <li><a href="/proprietary/proprietary-drm.html">DRM</a> (che chiamiamo
 &ldquo;Digital restrictions management&rdquo;, in italiano, &ldquo;gestione
 digitale delle restrizioni&rdquo;) significa funzionalità volte a limitare
@@ -164,7 +167,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-apple.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-apple.it-en.html     4 Aug 2016 21:28:30 -0000       
1.16
+++ proprietary/po/malware-apple.it-en.html     8 Oct 2016 21:29:03 -0000       
1.17
@@ -208,6 +208,11 @@
 <h3 id="surveillance">Apple Surveillance</h3>
 <ul>
 
+  <li><p>The iMessage app on iThings <a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/";>tells
+        a server every phone number that the user types into it</a>; the 
server records these numbers for at least 30
+        days.</p>
+  </li>
+
   <li><p>Users cannot make an Apple ID (<a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool";>necessary
 to install even gratis apps</a>) without giving a valid email address and 
receiving the verification code Apple 
       sends to it.</p>
   </li>
@@ -438,7 +443,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/08/04 21:28:30 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/malware-apple.it.po  8 Oct 2016 21:04:17 -0000       1.60
+++ proprietary/po/malware-apple.it.po  8 Oct 2016 21:29:03 -0000       1.61
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-29 22:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/malware-microsoft.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/malware-microsoft.it-en.html 25 Aug 2016 22:28:17 -0000      
1.18
+++ proprietary/po/malware-microsoft.it-en.html 8 Oct 2016 21:29:03 -0000       
1.19
@@ -80,8 +80,28 @@
   But there is no excuse for <em>deleting</em> the programs, and you
   should have the right to decide who (if anyone) to trust in this 
way.</p></li>
 
-  <li><p>Windows 8's back doors are so gaping that <a 
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
+  <li><p>Windows 8's back doors are so gaping that <a
+    
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
   the German government has decided it can't be trusted</a>.</p></li>
+
+<li><p>Users reported that <a 
+    
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all";>
+    Microsoft was forcing them to replace Windows 7 and 8 with all-spying 
+    Windows 10</a>.</p>
+
+    <p>Microsoft was in fact <a 
+    
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>
+    attacking computers that run Windows 7 and 8</a>, switching on a flag 
+    that said whether to &ldquo;upgrade&rdquo; to Windows 10 when users 
+    had turned it off.</p>
+
+    <p>Later on, Microsoft published instructions on <a 
+    
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/";>
+    how to permanently reject the downgrade to Windows 10</a>.</p>
+
+    <p>This seems to involve use of a back door in Windows 7 and 8.</p>
+</li>
+
 </ul>
 
 <h3 id="insecurity">Microsoft Insecurity</h3>
@@ -91,6 +111,14 @@
     allows an attacker to retrieve Microsoft account credentials, if
     the user is tricked into visiting a malicious link.</p>
     </li>
+<li>
+<p><a 
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/";>
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers</a>.
+</p>
+</li>
+
 </ul>
 
 
@@ -132,8 +160,7 @@
 
   <li><p>Microsoft
     is <a 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
-    forcibly
-    pushing</a> <a 
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html";>Windows
+    forcibly pushing Windows
     update to its version 10</a>, ignoring the flag on Windows 7 or 8
     that you could set to not upgrade.  This reaffirms the presence of
     a <a href="/proprietary/proprietary-back-doors.html">universal
@@ -148,7 +175,15 @@
   repeatedly nagging many users to install Windows 10</a>.
   </p></li>
 
-  <li><p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>
+<li><p>
+Microsoft was for months <a
+href="http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update";>
+tricking users into &ldquo;upgrading&rdquo; to Windows 10</a>, if they
+failed to notice and say no.
+</p></li>
+
+  <li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>
   Microsoft informs the NSA of bugs in Windows before fixing them.</a></p></li>
 
   <li><p><a 
href="http://www.computerworlduk.com/blogs/open-enterprise/windows-xp-end-of-an-era-end-of-an-error-3569489/";>
@@ -173,6 +208,12 @@
 
 <ul>
 
+<li>In order to increase Windows 10's install base, Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+blatantly disregards user choice and privacy</a>.
+</li>
+
 <li><p>Microsoft has
 started <a 
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder";>nagging
 users obnoxiously and repeatedly to install Windows 10</a>.</p></li>
@@ -192,7 +233,23 @@
 </ul>
 
 <h3 id="surveillance">Microsoft Surveillance</h3>
+
 <ul>
+
+<li>It appears <a
+href="http://www.ghacks.net/2016/01/05/microsoft-may-be-collecting-more-data-than-initially-thought/";>
+Windows 10 sends data to Microsoft about what applications are 
+running</a>.</li>
+
+<li><p>A downgrade to Windows 10 deleted surveillance-detection
+applications.  Then another downgrade inserted a general spying
+program.  Users noticed this and complained, so Microsoft
+renamed it <a
+href="https://web.archive.org/web/20160407082751/http://www.theregister.co.uk/2015/11/26/microsoft_renamed_data_slurper_reinserted_windows_10/";>
+to give users the impression it was gone</a>.</p>
+
+<p>To use proprietary software is to invite such treatment.</p></li>
+
   <li><p>
   <a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
   Windows 10 comes with 13 screens of snooping options</a>, all enabled by 
default,
@@ -205,7 +262,11 @@
   to snoop on the users' files, text input, voice input,
   location info, contacts, calendar records and web browsing
   history, as well as automatically connecting the machines to open
-  hotspots and showing targeted ads.</p></li>
+  hotspots and showing targeted ads.</p>
+
+  <p>We can suppose Microsoft look at users' files for the US government on
+  demand, though the &ldquo;privacy policy&rdquo; does not explicit say so. 
Will it
+  look at users' files for the Chinese government on demand?</p></li>
 
   <li><p>
   <a 
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/";>
@@ -213,6 +274,29 @@
   turns off its Bing search and Cortana features, and activates the
   privacy-protection settings.</p></li>
 
+  <li><p>The unique &ldquo;advertising ID&rdquo; for each user enables other 
companies to
+  track the browsing of each specific user.</p></li>
+
+  <li>Spyware in Windows 8: <a 
href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
+  Windows Update snoops on the user.</a>
+  <a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
+  Windows 8.1 snoops on local searches.</a> And there's a
+  <a href="http://www.marketoracle.co.uk/Article40836.html";>
+  secret NSA key in Windows</a>, whose functions we don't know.</li>
+
+  <li><p>
+  <a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
+  Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
+  </li>
+
+  <li><p>Spyware in Skype:
+      <a 
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/";>
+      
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+      Microsoft changed Skype
+      <a 
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data";>
+      specifically for spying</a>.</p>
+  </li>
+
   <li><p>
   Microsoft uses Windows 10's &ldquo;privacy policy&rdquo; to overtly impose a
   &ldquo;right&rdquo; to look at users' files at any time. Windows 10 full disk
@@ -233,23 +317,6 @@
   maximally evil on every dimension; to make a grab for total power
   over anyone that doesn't drop Windows now.</p></li>
 
-  <li><p><a 
href="http://www.techworm.net/2014/10/microsofts-windows-10-permission-watch-every-move.html";>
-  Windows 10 requires users to give permission for total snooping</a>,
-  including their files, their commands, their text input, and their
-  voice input.</p></li>
-
-  <li>Spyware in Windows: <a
-href="https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/";>
-  Windows Update snoops on the user.</a>
-  <a 
href="http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175";>
-  Windows 8.1 snoops on local searches.</a> And there's a
-  <a href="http://www.marketoracle.co.uk/Article40836.html";>
-  secret NSA key in Windows</a>, whose functions we don't know.</li>
-
-  <li><p>
-  <a 
href="http://www.itproportal.com/2014/05/14/microsoft-openly-offered-cloud-data-fbi-and-nsa/";>
-  Microsoft SkyDrive allows the NSA to directly examine users' data.</a></p>
-  </li>
 </ul>
 
 <h3 id="drm">Microsoft DRM</h3>
@@ -347,7 +414,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/08/25 22:28:17 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary/po/malware-microsoft.it.po      8 Oct 2016 21:04:17 -0000       
1.77
+++ proprietary/po/malware-microsoft.it.po      8 Oct 2016 21:29:03 -0000       
1.78
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-28 16:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -185,16 +184,7 @@
 "programmi, e si dovrebbe avere il diritto di decidere in chi (ammesso che ci "
 "sia qualcuno) riporre questa fiducia."
 
-# | Windows 8's back doors are so gaping that <a
-# | 
[-href=\"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>-]
-# | 
{+href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>+}
-# | the German government has decided it can't be trusted</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"http://";
-#| "drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-"
-#| "entities-not-to-use-windows-8-linked-to-nsa/\"> the German government has "
-#| "decided it can't be trusted</a>."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Windows 8's back doors are so gaping that <a href=\"https://web.archive.org/";
 "web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";
@@ -356,25 +346,7 @@
 "sulle piattaforme che useranno in futuro, magari pagando (anche in gruppo "
 "con altri utenti) uno sviluppatore per farlo."
 
-# | Microsoft is <a
-# | 
href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146\";>
-# | forcibly [-pushing</a> <a
-# | 
href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\";>Windows-]
-# | {+pushing Windows+} update to its version 10</a>, ignoring the flag on
-# | Windows 7 or 8 that you could set to not upgrade.  This reaffirms the
-# | presence of a <a
-# | href=\"/proprietary/proprietary-back-doors.html\">universal back door in
-# | Windows</a> 7 and 8.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Microsoft is <a href=\"http://gizmodo.com/woman-wins-10-000-from-";
-#| "microsoft-after-unwanted-window-1782666146\"> forcibly pushing</a> <a "
-#| "href=\"http://www.computerworld.com/article/3012278/microsoft-windows/";
-#| "microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"
-#| "\">Windows update to its version 10</a>, ignoring the flag on Windows 7 "
-#| "or 8 that you could set to not upgrade.  This reaffirms the presence of a "
-#| "<a href=\"/proprietary/proprietary-back-doors.html\">universal back door "
-#| "in Windows</a> 7 and 8."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft is <a href=\"http://gizmodo.com/woman-wins-10-000-from-microsoft-";
 "after-unwanted-window-1782666146\"> forcibly pushing Windows update to its "
@@ -408,17 +380,7 @@
 "technology/2015/sep/11/microsoft-downloading-windows-1\"> sollecitando molti "
 "utenti ad installare Windows 10</a>."
 
-# | Microsoft [-is-] {+was for months+} <a
-# | 
[-href=\"http://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1\";>
-# | repeatedly nagging many-]
-# | 
{+href=\"http://www.theguardian.com/technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update\";>
-# | tricking+} users {+into &ldquo;upgrading&rdquo;+} to [-install-] Windows
-# | [-10</a>.-] {+10</a>, if they failed to notice and say no.+}
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Microsoft is <a href=\"http://www.theguardian.com/technology/2015/sep/11/";
-#| "microsoft-downloading-windows-1\"> repeatedly nagging many users to "
-#| "install Windows 10</a>."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Microsoft was for months <a href=\"http://www.theguardian.com/";
 "technology/2016/feb/02/microsoft-downloading-windows-10-automatic-update\"> "
@@ -430,15 +392,7 @@
 "molti utenti ad installare Windows 10</a> in modo ingannevole, se non se ne "
 "accorgevano e dicevano espressamente di no."
 
-# | <a
-# | 
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\";>-]
-# | 
{+href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>+}
-# | Microsoft informs the NSA of bugs in Windows before fixing them.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-";
-#| "any-company-ever-trust-microsoft-again-3569376/\"> Microsoft informs the "
-#| "NSA of bugs in Windows before fixing them.</a>"
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"https://web.archive.org/web/20130622044225/http://blogs.";
 "computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-"
@@ -651,22 +605,7 @@
 "ciascun utente, altre aziende possono controllare l'attività di navigazione "
 "di ogni specifico utente."
 
-# | Spyware in [-Windows:-] {+Windows 8:+} <a
-# | 
href=\"https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";>
-# | Windows Update snoops on the user.</a> <a
-# | 
href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\";>
-# | Windows 8.1 snoops on local searches.</a> And there's a <a
-# | href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key
-# | in Windows</a>, whose functions we don't know.
 #. type: Content of: <ul><li>
-#| msgid ""
-#| "Spyware in Windows: <a href=\"https://web.archive.org/web/20160313105805/";
-#| "http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";> "
-#| "Windows Update snoops on the user.</a> <a href=\"http://www.infoworld.com/";
-#| "t/microsoft-windows/look-the-black-underbelly-of-windows-81-"
-#| "blue-222175\"> Windows 8.1 snoops on local searches.</a> And there's a <a "
-#| "href=\"http://www.marketoracle.co.uk/Article40836.html\";> secret NSA key "
-#| "in Windows</a>, whose functions we don't know."
 msgid ""
 "Spyware in Windows 8: <a href=\"https://web.archive.org/web/20160313105805/";
 "http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\";> "

Index: proprietary/po/malware-mobiles.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/malware-mobiles.it-en.html   22 May 2016 19:30:06 -0000      
1.7
+++ proprietary/po/malware-mobiles.it-en.html   8 Oct 2016 21:29:03 -0000       
1.8
@@ -131,6 +131,18 @@
 
 <h3 id="surveillance">Mobile Surveillance</h3>
 <ul>
+<li>
+<p>A half-blind security critique of a tracking app: it found that <a
+href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/";>
+blatant flaws allowed anyone to snoop on a user's personal data</a>.
+The critique fails entirely to express concern that the app sends the
+personal data to a server, where the <em>developer</em> gets it all.
+This &ldquo;service&rdquo; is for suckers!</p>
+
+<p>The server surely has a &ldquo;privacy policy,&rdquo; and surely it
+is worthless since nearly all of them are.</p>
+</li>
+
   <li><p>Apps that include 
   <a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/";>
   Symphony surveillance software snoop on what radio and TV programs are 
@@ -279,7 +291,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/malware-mobiles.it.po        8 Oct 2016 21:04:17 -0000       
1.22
+++ proprietary/po/malware-mobiles.it.po        8 Oct 2016 21:29:03 -0000       
1.23
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-08 15:55+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-back-doors.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/proprietary-back-doors.it-en.html    22 May 2016 19:30:06 
-0000      1.12
+++ proprietary/po/proprietary-back-doors.it-en.html    8 Oct 2016 21:29:03 
-0000       1.13
@@ -1,16 +1,32 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 <title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Back Doors</h2>
 
-<a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a></p>
+
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
 
 <p>Here are examples of demonstrated back doors in proprietary software.</p>
 
 <!-- WEBMASTERS: make sure to place new items on top under each subsection -->
 <ul>  
+    <li><p>Capcom's Street Fighter V update <a 
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/";>installed
+        a driver that can be used as a backdoor by any application
+        installed on a Windows computer</a>.</p>
+    </li>
+
+    <li><p>The Dropbox app for Macintosh <a 
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/";>takes
+        total control of the machine by repeatedly nagging the user
+        for an admini password</a>.</p>
+    </li>
   <li><p>The universal back door in portable phones <a
     
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html";>is
     employed to listen through their microphones</a>.</p>
@@ -116,7 +132,7 @@
 
 <li>
 <p>Windows 8's back doors are so gaping that
-<a 
href="http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
+<a 
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/";>
 the German government has decided it can't be trusted</a>.
 </p>
 </li>
@@ -318,7 +334,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:06 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-back-doors.it.po 8 Oct 2016 21:04:17 -0000       
1.54
+++ proprietary/po/proprietary-back-doors.it.po 8 Oct 2016 21:29:03 -0000       
1.55
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -304,16 +303,7 @@
 "technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-"
 "users\">forzati e immediati</a>."
 
-# | Windows 8's back doors are so gaping that <a
-# | 
[-href=\"http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>-]
-# | 
{+href=\"https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/\";>+}
-# | the German government has decided it can't be trusted</a>.
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "Windows 8's back doors are so gaping that <a href=\"http://";
-#| "drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-"
-#| "entities-not-to-use-windows-8-linked-to-nsa/\"> the German government has "
-#| "decided it can't be trusted</a>."
+#. type: Content of: <ul><li><p>
 msgid ""
 "Windows 8's back doors are so gaping that <a href=\"https://web.archive.org/";
 "web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-";

Index: proprietary/po/proprietary-censorship.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it-en.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary-censorship.it-en.html    30 Jul 2016 17:29:54 
-0000      1.8
+++ proprietary/po/proprietary-censorship.it-en.html    8 Oct 2016 21:29:03 
-0000       1.9
@@ -1,10 +1,17 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
+<!-- Parent-Version: 1.79 -->
 <title>Proprietary Censorship - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-censorship.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Censorship</h2>
 
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
 <p>Here are examples of proprietary systems that impose censorship on
 what their users can access. We have a <a
 href="/proprietary/proprietary-jails.html">separate
@@ -131,7 +138,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-censorship.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-censorship.it.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary-censorship.it.po 8 Oct 2016 21:04:17 -0000       
1.28
+++ proprietary/po/proprietary-censorship.it.po 8 Oct 2016 21:29:03 -0000       
1.29
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-drm.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-drm.it-en.html   30 Jul 2016 17:29:54 -0000      
1.4
+++ proprietary/po/proprietary-drm.it-en.html   8 Oct 2016 21:29:03 -0000       
1.5
@@ -1,6 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
+<!-- Parent-Version: 1.79 -->
 <title>Proprietary DRM - GNU Project - Free Software Foundation</title>
 <!--#include virtual="/proprietary/po/proprietary-drm.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -8,6 +7,13 @@
 
 <a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
 <p>Here are examples of proprietary programs and systems that
 implement <em>digital restrictions management</em> (DRM):
 functionalities designed intentionally to restrict what users can do.
@@ -23,6 +29,11 @@
 </p>
 
 <ul>
+<li><p>HP's firmware downgrade <a 
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>imposed
+DRM on some printers, which now refuse to function with third-party
+ink cartridges</a>.</p>
+</li>
+
 <li>
 <p>Oculus Rift games
 now <a 
href="http://motherboard.vice.com/read/new-oculus-drm-cross-platform";>have
@@ -198,7 +209,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-drm.it.po        8 Oct 2016 21:04:17 -0000       
1.15
+++ proprietary/po/proprietary-drm.it.po        8 Oct 2016 21:29:03 -0000       
1.16
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-insecurity.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/proprietary-insecurity.it-en.html    25 Aug 2016 22:28:17 
-0000      1.16
+++ proprietary/po/proprietary-insecurity.it-en.html    8 Oct 2016 21:29:03 
-0000       1.17
@@ -8,6 +8,13 @@
 
 <a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
 <p>This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
 noteworthy.</p>
@@ -373,7 +380,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/08/25 22:28:17 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-insecurity.it.po 8 Oct 2016 21:04:17 -0000       
1.73
+++ proprietary/po/proprietary-insecurity.it.po 8 Oct 2016 21:29:03 -0000       
1.74
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-jails.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-jails.it-en.html 22 May 2016 19:30:07 -0000      
1.5
+++ proprietary/po/proprietary-jails.it-en.html 8 Oct 2016 21:29:03 -0000       
1.6
@@ -1,12 +1,18 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
+<!-- Parent-Version: 1.79 -->
 <title>Proprietary Jails - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-jails.translist" -->
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Jails</h2>
 
-<a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a>
+<p><a href="/philosophy/proprietary.html">Other examples of proprietary 
malware</a></p>
+
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
 
 <p>Here are examples of proprietary systems that are
 <em>jails</em>: they do not allow the user to freely install
@@ -144,7 +150,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/05/22 19:30:07 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-jails.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-jails.it.po      8 Oct 2016 21:04:17 -0000       
1.17
+++ proprietary/po/proprietary-jails.it.po      8 Oct 2016 21:29:03 -0000       
1.18
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-sabotage.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-en.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-sabotage.it-en.html      30 Jul 2016 17:29:54 
-0000      1.14
+++ proprietary/po/proprietary-sabotage.it-en.html      8 Oct 2016 21:29:03 
-0000       1.15
@@ -1,6 +1,5 @@
 <!--#include virtual="/server/header.html" -->
 <!-- Parent-Version: 1.79 -->
-
 <title>Proprietary Sabotage - GNU Project - Free Software Foundation</title>
 <!--#include virtual="/proprietary/po/proprietary-sabotage.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -8,11 +7,25 @@
 
 <a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
 <p>Here are examples of proprietary software that has something
 worse than a back door.</p>
 
 <ul>
   <li>
+    <p>HP's firmware downgrade <a 
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update";>imposed
+        DRM on some printers, which now refuse to function with
+        third-party ink cartridges</a>.</p>
+  </li>
+
+  <li>
+
     <p>Once Microsoft has tricked a user into accepting installation
       of Windows
       10, <a 
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/";>they
@@ -111,8 +124,8 @@
 that competed with iTunes</a>.
 </p></li>
 
-<li><p>
-<a 
href="http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/";>Microsoft
+<li><p><a
+href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm";>Microsoft
 informs the NSA of bugs in Windows before fixing them.</a>
 </p></li>
 
@@ -276,7 +289,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/proprietary-sabotage.it.po   8 Oct 2016 21:04:17 -0000       
1.62
+++ proprietary/po/proprietary-sabotage.it.po   8 Oct 2016 21:29:03 -0000       
1.63
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -260,15 +259,7 @@
 "deleted-music-ipods-rivals-steve-jobs\">ha cancellato dagli iPod la musica "
 "scaricata da negozi di musica digitale che fanno concorrenza a iTunes</a>."
 
-# | <a
-# | 
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-any-company-ever-trust-microsoft-again-3569376/\";>Microsoft-]
-# | 
{+href=\"https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm\";>Microsoft+}
-# | informs the NSA of bugs in Windows before fixing them.</a>
-#. type: Content of: <ul><li><p>
-#| msgid ""
-#| "<a href=\"http://www.computerworlduk.com/blogs/open-enterprise/how-can-";
-#| "any-company-ever-trust-microsoft-again-3569376/\">Microsoft informs the "
-#| "NSA of bugs in Windows before fixing them.</a>"
+#. type: Content of: <ul><li><p>
 msgid ""
 "<a href=\"https://web.archive.org/web/20130622044225/http://blogs.";
 "computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-"

Index: proprietary/po/proprietary-surveillance.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-surveillance.it-en.html  5 Sep 2016 10:28:55 
-0000       1.23
+++ proprietary/po/proprietary-surveillance.it-en.html  8 Oct 2016 21:29:03 
-0000       1.24
@@ -2,21 +2,20 @@
 <!-- Parent-Version: 1.79 -->
 <title>Proprietary Surveillance - GNU Project - Free Software 
Foundation</title>
 <style type="text/css" media="print,screen"><!--
-#surveillance {
-   width: 63em; max-width: 100%;
-   margin: 2.5em auto 1em;
+.announcement { 
+   background: none;
 }
 #surveillance div.toc {
-   width: 24.5em; max-width: 82%;
+   width: 24.5em; max-width: 94%;
    margin-bottom: 1em;
 }
address@hidden (min-width: 55em) {
address@hidden (min-width: 48em) {
    #surveillance div.toc {
       float: left;
       width: auto; max-width: 48%;
       margin: .2em 0 1em;
    }
-   #surveillance .pict.wide {
+   #surveillance .medium {
       width: 43%;
       margin: 7em 0 1em 1.5em;
    }
@@ -28,6 +27,13 @@
 
 <h2>Proprietary Surveillance</h2>
 
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
 <div  class="announcement">
 <p>This document attempts to
 track <strong>clearly established cases of proprietary software that
@@ -39,7 +45,7 @@
 
 <div id="surveillance">
 
-<div class="pict wide">
+<div class="pict medium">
 <a href="/graphics/dog.html">
 <img src="/graphics/dog.small.jpg" alt="Cartoon of a dog, wondering at the 
three ads that popped up on his computer screen..." /></a>
 <p>&ldquo;How did they find out I'm a dog?&rdquo;</p>
@@ -143,6 +149,12 @@
 </div>
 
 <ul>
+<li>In order to increase Windows 10's install base, Microsoft
+<a
+href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive";>
+blatantly disregards user choice and privacy</a>.
+</li>
+
   <li><p><a 
href="https://duo.com/blog/bring-your-own-dilemma-oem-laptops-and-windows-10-security";>
       Windows 10 comes with 13 screens of snooping options</a>, all enabled by 
default,
       and turning them off would be daunting to most users.</p></li>
@@ -332,6 +344,11 @@
 </div>
 
 <ul>
+  <li><p>The iMessage app on iThings <a 
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/";>tells
+        a server every phone number that the user types into it</a>; the 
server records these numbers for at least 30
+        days.</p>
+  </li>
+
   <li><p>Users cannot make an Apple ID <a 
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool";>(necessary
 to install even gratis apps)</a>
       without giving a valid email address and receiving the code Apple
       sends to it.</p>
@@ -466,6 +483,11 @@
 </div>
 
 <ul>
+
+  <li><p>Google's new voice messaging app <a 
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google";>logs
+      all conversations</a>.</p>
+  </li>
+
   <li><p>Apps that include 
       <a 
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/";>
       Symphony surveillance software snoop on what radio and TV programs 
@@ -566,6 +588,16 @@
 </div>
 
 <ul>
+
+   <li><p>A company that makes internet-controlled vibrators <a 
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit";>is
+    being sued for collecting lots of personal information about how
+    people use it</a>.</p>
+
+       <p>The company's statement that it anonymizes the data may be
+        true, but it doesn't really matter. If it sells the data to a
+        data broker, the data broker can figure out who the user is.</p>
+  </li>
+
   <li><p>A computerized
         vibrator <a 
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack";>snoops
         on its users through the proprietary control app</a>.</p>
@@ -1036,7 +1068,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/09/05 10:28:55 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary/po/proprietary-surveillance.it.po       8 Oct 2016 21:04:17 
-0000       1.108
+++ proprietary/po/proprietary-surveillance.it.po       8 Oct 2016 21:29:03 
-0000       1.109
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-06 08:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary-tyrants.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-tyrants.it-en.html       30 Jul 2016 17:29:54 
-0000      1.5
+++ proprietary/po/proprietary-tyrants.it-en.html       8 Oct 2016 21:29:03 
-0000       1.6
@@ -1,6 +1,5 @@
 <!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.77 -->
-
+<!-- Parent-Version: 1.79 -->
 <title>Proprietary Tyrants - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary-tyrants.translist" -->
 <!--#include virtual="/server/banner.html" -->
@@ -8,6 +7,13 @@
 
 <a href="/proprietary/proprietary.html">Other examples of proprietary 
malware</a>
 
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
 <p>A <em>tyrant</em> device is one that refuses to allow users to
 install a different operating system or a modified operating
 system.  These devices have measures to block execution of anything
@@ -126,7 +132,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-tyrants.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.it.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-tyrants.it.po    8 Oct 2016 21:04:17 -0000       
1.17
+++ proprietary/po/proprietary-tyrants.it.po    8 Oct 2016 21:29:03 -0000       
1.18
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-09-07 15:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>

Index: proprietary/po/proprietary.it-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary.it-en.html       30 Jul 2016 17:29:54 -0000      
1.5
+++ proprietary/po/proprietary.it-en.html       8 Oct 2016 21:29:03 -0000       
1.6
@@ -43,6 +43,7 @@
   <li><strong>Company or type of product</strong></li>
   <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
   <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
+  <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
   <li><a href="/proprietary/malware-mobiles.html">Malware in mobile 
devices</a></li>
   <li><a href="/proprietary/malware-kindle-swindle.html">Malware in the Amazon
       Swindle</a></li>
@@ -61,6 +62,9 @@
 <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
 <li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
 <li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+<li><a 
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+<li><a href="/proprietary/proprietary-tethers.html">Tethers</a> to
+servers</li>
 <li><a href="/proprietary/proprietary-drm.html">Digital restrictions
     management</a> or &ldquo;DRM&rdquo; means functionalities designed
     to restrict what users can do with the data in their computers.</li>
@@ -137,7 +141,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/07/30 17:29:54 $
+$Date: 2016/10/08 21:29:03 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary.it.po    8 Oct 2016 21:04:17 -0000       1.26
+++ proprietary/po/proprietary.it.po    8 Oct 2016 21:29:03 -0000       1.27
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-29 16:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -103,10 +102,7 @@
 msgstr ""
 "<a href=\"/proprietary/malware-microsoft.html\">Malware di Microsoft</a>"
 
-# | <a [-href=\"/proprietary/malware-apple.html\">Apple-]
-# | {+href=\"/proprietary/malware-adobe.html\">Adobe+} Malware</a>
 #. type: Content of: <div><div><ul><li>
-#| msgid "<a href=\"/proprietary/malware-apple.html\">Apple Malware</a>"
 msgid "<a href=\"/proprietary/malware-adobe.html\">Adobe Malware</a>"
 msgstr "<a href=\"/proprietary/malware-adobe.html\">Malware di Adobe</a>"
 
@@ -171,19 +167,13 @@
 msgstr ""
 "<a href=\"/proprietary/proprietary-surveillance.html\">Sorveglianza</a>"
 
-# | <a [-href=\"/proprietary/proprietary-deception.html\">Deception</a>-]
-# | {+href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>+}
 #. type: Content of: <div><div><ul><li>
-#| msgid "<a href=\"/proprietary/proprietary-deception.html\">Deception</a>"
 msgid ""
 "<a href=\"/proprietary/proprietary-subscriptions.html\">Subscriptions</a>"
 msgstr ""
 "<a href=\"/proprietary/proprietary-subscriptions.html\">Abbonamenti</a>"
 
-# | <a [-href=\"/proprietary/proprietary-censorship.html\">Censorship</a>-]
-# | {+href=\"/proprietary/proprietary-tethers.html\">Tethers</a> to servers+}
 #. type: Content of: <div><div><ul><li>
-#| msgid "<a href=\"/proprietary/proprietary-censorship.html\">Censorship</a>"
 msgid ""
 "<a href=\"/proprietary/proprietary-tethers.html\">Tethers</a> to servers"
 msgstr ""

Index: server/body-include-2.it.html
===================================================================
RCS file: /web/www/www/server/body-include-2.it.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- server/body-include-2.it.html       29 Sep 2016 07:58:43 -0000      1.106
+++ server/body-include-2.it.html       8 Oct 2016 21:29:04 -0000       1.107
@@ -5,8 +5,7 @@
 padding: .2em; margin: 0; background: #ddeced;
 border-top: .2em solid #0088a0; border-bottom: .2em solid #0088a0;">
 <strong><a href="http://www.gnuhealthcon.org/2016-las_palmas/";>GNU Health
-Conference</a></strong>&nbsp; Nov&nbsp;18-20, Las&nbsp;Palmas, Spain
-#GNUHealthCon2016
+Conference</a></strong> 18-20 Nov, Las&nbsp;Palmas, Spagna #GNUHealthCon2016
 </p>
 <div id="header">
 <div id="fsf-frame">

Index: server/gnun/compendia/compendium.it.po
===================================================================
RCS file: /web/www/www/server/gnun/compendia/compendium.it.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- server/gnun/compendia/compendium.it.po      8 Oct 2016 21:04:15 -0000       
1.94
+++ server/gnun/compendia/compendium.it.po      8 Oct 2016 21:29:04 -0000       
1.95
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: compendium.it.po\n"
-"POT-Creation-Date: 2016-05-04 09:58+0000\n"
+"POT-Creation-Date: 2016-09-13 09:25+0000\n"
 "PO-Revision-Date: 2016-10-08 22:36+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian\n"

Index: server/po/body-include-2.it.po
===================================================================
RCS file: /web/www/www/server/po/body-include-2.it.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- server/po/body-include-2.it.po      8 Oct 2016 21:04:16 -0000       1.124
+++ server/po/body-include-2.it.po      8 Oct 2016 21:29:04 -0000       1.125
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=utf-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-30 12:25+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <p>

Index: server/po/sitemap.it-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.it-en.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- server/po/sitemap.it-en.html        25 Aug 2016 22:28:18 -0000      1.35
+++ server/po/sitemap.it-en.html        8 Oct 2016 21:29:04 -0000       1.36
@@ -240,6 +240,8 @@
   <dd>Free System Distribution Guidelines (GNU FSDG)</dd>
   <dt><a 
href="/distros/optionally-free-not-enough.html">optionally-free-not-enough.html</a></dt>
   <dd>Optionally Free Is Not Enough</dd>
+  <dt><a 
href="/distros/screenshot-gnewsense.html">screenshot-gnewsense.html</a></dt>
+  <dd>Screenshot of gNewSense</dd>
   <dt><a href="/distros/screenshot.html">screenshot.html</a></dt>
   <dd>Screenshot of a Free Distro</dd>
 </dl>
@@ -651,6 +653,8 @@
   <dd>Dog Cartoon</dd>
   <dt><a href="/graphics/emacs-ref.html">emacs-ref.html</a></dt>
   <dd>GNU Emacs Reference Card</dd>
+  <dt><a href="/graphics/free-your-soul.html">free-your-soul.html</a></dt>
+  <dd>Free Your Soul Wallpaper</dd>
   <dt><a href="/graphics/freedom.html">freedom.html</a></dt>
   <dd>What Freedom Means</dd>
   <dt><a href="/graphics/french-motto.html">french-motto.html</a></dt>
@@ -1603,6 +1607,8 @@
 Proprietary Software Is Often Malware<span class="gnun-split"></span>
 </span>
 <dl>
+  <dt><a href="/proprietary/malware-adobe.html">malware-adobe.html</a></dt>
+  <dd>Adobe's Software is Malware</dd>
   <dt><a href="/proprietary/malware-apple.html">malware-apple.html</a></dt>
   <dd>Apple's Operating Systems Are Malware</dd>
   <dt><a 
href="/proprietary/malware-appliances.html">malware-appliances.html</a></dt>
@@ -1631,8 +1637,12 @@
   <dd>Proprietary Jails</dd>
   <dt><a 
href="/proprietary/proprietary-sabotage.html">proprietary-sabotage.html</a></dt>
   <dd>Proprietary Sabotage</dd>
+  <dt><a 
href="/proprietary/proprietary-subscriptions.html">proprietary-subscriptions.html</a></dt>
+  <dd>Proprietary Subscriptions</dd>
   <dt><a 
href="/proprietary/proprietary-surveillance.html">proprietary-surveillance.html</a></dt>
   <dd>Proprietary Surveillance</dd>
+  <dt><a 
href="/proprietary/proprietary-tethers.html">proprietary-tethers.html</a></dt>
+  <dd>Proprietary Tethers</dd>
   <dt><a 
href="/proprietary/proprietary-tyrants.html">proprietary-tyrants.html</a></dt>
   <dd>Proprietary Tyrants</dd>
 </dl>
@@ -1926,7 +1936,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/08/25 22:28:18 $
+$Date: 2016/10/08 21:29:04 $
 <!-- timestamp end -->
 </p>
 </div>

Index: server/po/sitemap.it.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.it.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- server/po/sitemap.it.po     8 Oct 2016 21:04:16 -0000       1.113
+++ server/po/sitemap.it.po     8 Oct 2016 21:29:04 -0000       1.114
@@ -14,7 +14,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2016-08-29 17:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -509,9 +508,7 @@
 msgstr ""
 "<a href=\"/distros/screenshot-gnewsense.html\">screenshot-gnewsense.html</a>"
 
-# | Screenshot of [-a Free Distro-] {+gNewSense+}
 #. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Screenshot of a Free Distro"
 msgid "Screenshot of gNewSense"
 msgstr "Screenshot of gNewSense"
 
@@ -1904,9 +1901,7 @@
 msgid "<a href=\"/graphics/free-your-soul.html\">free-your-soul.html</a>"
 msgstr "<a href=\"/graphics/free-your-soul.html\">free-your-soul.html</a>"
 
-# | [-This is Freedom-]{+Free Your Soul+} Wallpaper
 #. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "This is Freedom Wallpaper"
 msgid "Free Your Soul Wallpaper"
 msgstr "Free Your Soul Wallpaper"
 
@@ -5573,9 +5568,7 @@
 msgid "<a href=\"/proprietary/malware-adobe.html\">malware-adobe.html</a>"
 msgstr "<a href=\"/proprietary/malware-adobe.html\">malware-adobe.html</a>"
 
-# | [-Microsoft's-]{+Adobe's+} Software is Malware
 #. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Microsoft's Software is Malware"
 msgid "Adobe's Software is Malware"
 msgstr "Adobe's Software is Malware"
 
@@ -5733,9 +5726,7 @@
 "<a href=\"/proprietary/proprietary-subscriptions.html\">proprietary-"
 "subscriptions.html</a>"
 
-# | Proprietary [-Deception-] {+Subscriptions+}
 #. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Proprietary Deception"
 msgid "Proprietary Subscriptions"
 msgstr "Proprietary Subscriptions"
 
@@ -5759,9 +5750,7 @@
 "<a href=\"/proprietary/proprietary-tethers.html\">proprietary-tethers.html</"
 "a>"
 
-# | Proprietary [-Tyrants-] {+Tethers+}
 #. type: Content of: <div><dl><dd><dl><dd>
-#| msgid "Proprietary Tyrants"
 msgid "Proprietary Tethers"
 msgstr "Proprietary Tethers"
 



reply via email to

[Prev in Thread] Current Thread [Next in Thread]