www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary/po malware-mobiles.de.po malwar...


From: GNUN
Subject: www/proprietary/po malware-mobiles.de.po malwar...
Date: Thu, 13 Apr 2017 19:29:48 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     17/04/13 19:29:48

Modified files:
        proprietary/po : malware-mobiles.de.po malware-mobiles.es.po 
                         malware-mobiles.fr.po malware-mobiles.it.po 
                         malware-mobiles.ja-diff.html 
                         malware-mobiles.ja.po malware-mobiles.pot 
                         malware-mobiles.ru.po 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru.po 
                         proprietary-sabotage.de.po 
                         proprietary-sabotage.fr.po 
                         proprietary-sabotage.it.po 
                         proprietary-sabotage.ja.po 
                         proprietary-sabotage.pot 
                         proprietary-sabotage.ru.po 
                         proprietary-tethers.de.po 
                         proprietary-tethers.fr.po 
                         proprietary-tethers.ja.po 
                         proprietary-tethers.pot 
                         proprietary-tethers.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.11&r2=1.12

Patches:
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-mobiles.de.po       10 Apr 2017 06:00:59 -0000      1.44
+++ malware-mobiles.de.po       13 Apr 2017 23:29:47 -0000      1.45
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-01-10 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -223,6 +223,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
 "\">have a security hole that allows an SMS message to install ransomeware</"
@@ -279,6 +287,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Pairs of Android apps can collude to transmit users' personal data to "
+"servers. <a href=\"https://www.theatlantic.com/technology/archive/2017/04/";
+"when-apps-collude-to-steal-your-data/522177/\">A study found tens of "
+"thousands of pairs that collude.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Play intentionally sends app developers <a href=\"http://gadgets.ndtv.";
 "com/apps/news/google-play-store-policy-raises-privacy-concerns-331116\"> the "
 "personal details of users that install the app</a>."

Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-mobiles.es.po       10 Apr 2017 06:00:59 -0000      1.34
+++ malware-mobiles.es.po       13 Apr 2017 23:29:47 -0000      1.35
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-03-23 10:13+0100\n"
 "Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
 "Language-Team: Spanish <address@hidden>\n"
@@ -219,6 +219,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
 "\">have a security hole that allows an SMS message to install ransomeware</"
@@ -271,6 +279,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Pairs of Android apps can collude to transmit users' personal data to "
+"servers. <a href=\"https://www.theatlantic.com/technology/archive/2017/04/";
+"when-apps-collude-to-steal-your-data/522177/\">A study found tens of "
+"thousands of pairs that collude.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Play intentionally sends app developers <a href=\"http://gadgets.ndtv.";
 "com/apps/news/google-play-store-policy-raises-privacy-concerns-331116\"> the "
 "personal details of users that install the app</a>."

Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- malware-mobiles.fr.po       11 Apr 2017 09:18:10 -0000      1.39
+++ malware-mobiles.fr.po       13 Apr 2017 23:29:47 -0000      1.40
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-04-11 11:12+0200\n"
 "Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 "X-Generator: Gtranslator 2.91.5\n"
 "Plural-Forms: \n"
 
@@ -217,6 +218,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
 "\">have a security hole that allows an SMS message to install ransomeware</"
@@ -268,6 +277,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Pairs of Android apps can collude to transmit users' personal data to "
+"servers. <a href=\"https://www.theatlantic.com/technology/archive/2017/04/";
+"when-apps-collude-to-steal-your-data/522177/\">A study found tens of "
+"thousands of pairs that collude.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Play intentionally sends app developers <a href=\"http://gadgets.ndtv.";
 "com/apps/news/google-play-store-policy-raises-privacy-concerns-331116\"> the "
 "personal details of users that install the app</a>."

Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- malware-mobiles.it.po       10 Apr 2017 06:00:59 -0000      1.41
+++ malware-mobiles.it.po       13 Apr 2017 23:29:47 -0000      1.42
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-04-02 11:40+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -212,6 +212,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
 "\">have a security hole that allows an SMS message to install ransomeware</"
@@ -263,6 +271,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Pairs of Android apps can collude to transmit users' personal data to "
+"servers. <a href=\"https://www.theatlantic.com/technology/archive/2017/04/";
+"when-apps-collude-to-steal-your-data/522177/\">A study found tens of "
+"thousands of pairs that collude.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Play intentionally sends app developers <a href=\"http://gadgets.ndtv.";
 "com/apps/news/google-play-store-policy-raises-privacy-concerns-331116\"> the "
 "personal details of users that install the app</a>."

Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-mobiles.ja-diff.html        10 Apr 2017 06:00:59 -0000      1.4
+++ malware-mobiles.ja-diff.html        13 Apr 2017 23:29:47 -0000      1.5
@@ -123,15 +123,22 @@
 
 &lt;h3 id="insecurity"&gt;Mobile Insecurity&lt;/h3&gt;
 &lt;ul&gt;
+
 &lt;li&gt;
-<span class="inserted"><ins><em>&lt;p&gt;Samsung
+  &lt;p&gt;Many <span class="inserted"><ins><em>Android devices &lt;a 
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
+       can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
+       Broadcom's non-free firmware.&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Samsung
 phones &lt;a 
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"&gt;have
 a security hole that allows an SMS message to install
 ransomeware&lt;/a&gt;.&lt;/p&gt;
 &lt;/li&gt;
 
-&lt;li&gt;</em></ins></span>
-&lt;p&gt;Many proprietary payment apps &lt;a
+&lt;li&gt;
+&lt;p&gt;Many</em></ins></span> proprietary payment apps &lt;a
 
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data"&gt;
 transmit personal data in an insecure way&lt;/a&gt;.
 However, the worse aspect of these apps is that
@@ -152,7 +159,13 @@
 &lt;h3 id="surveillance"&gt;Mobile Surveillance&lt;/h3&gt;
 &lt;ul&gt;
 &lt;li&gt;
-<span class="inserted"><ins><em>&lt;p&gt;Google Play intentionally sends app 
developers &lt;a
+  <span class="inserted"><ins><em>&lt;p&gt;Pairs of Android apps can collude 
to transmit users' personal data
+       to servers. &lt;a 
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/"&gt;A
 study found
+       tens of thousands of pairs that collude.&lt;/a&gt;&lt;/p&gt;
+&lt;/li&gt;
+
+&lt;li&gt;
+&lt;p&gt;Google Play intentionally sends app developers &lt;a
 
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"&gt;
 the personal details of users that install the app&lt;/a&gt;.&lt;/p&gt;
 
@@ -376,7 +389,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/04/10 06:00:59 $
+$Date: 2017/04/13 23:29:47 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-mobiles.ja.po       10 Apr 2017 06:00:59 -0000      1.45
+++ malware-mobiles.ja.po       13 Apr 2017 23:29:47 -0000      1.46
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2016-12-20 14:59+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -211,6 +211,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
 "\">have a security hole that allows an SMS message to install ransomeware</"
@@ -257,6 +265,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Pairs of Android apps can collude to transmit users' personal data to "
+"servers. <a href=\"https://www.theatlantic.com/technology/archive/2017/04/";
+"when-apps-collude-to-steal-your-data/522177/\">A study found tens of "
+"thousands of pairs that collude.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Play intentionally sends app developers <a href=\"http://gadgets.ndtv.";
 "com/apps/news/google-play-store-policy-raises-privacy-concerns-331116\"> the "
 "personal details of users that install the app</a>."

Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- malware-mobiles.pot 10 Apr 2017 06:00:59 -0000      1.23
+++ malware-mobiles.pot 13 Apr 2017 23:29:47 -0000      1.24
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -157,6 +157,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a "
+"href=\"https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\";>
 "
+"can be hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's "
+"non-free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones <a "
 
"href=\"https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/\";>have
 "
 "a security hole that allows an SMS message to install ransomeware</a>."
@@ -190,6 +198,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Pairs of Android apps can collude to transmit users' personal data to "
+"servers. <a "
+"href=\"https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/\";>A
 "
+"study found tens of thousands of pairs that collude.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Play intentionally sends app developers <a "
 
"href=\"http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116\";>
 "
 "the personal details of users that install the app</a>."

Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-mobiles.ru.po       10 Apr 2017 07:03:31 -0000      1.54
+++ malware-mobiles.ru.po       13 Apr 2017 23:29:47 -0000      1.55
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-04-07 08:54+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -212,6 +213,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-";
 "exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
 "\">have a security hole that allows an SMS message to install ransomeware</"
@@ -263,6 +272,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Pairs of Android apps can collude to transmit users' personal data to "
+"servers. <a href=\"https://www.theatlantic.com/technology/archive/2017/04/";
+"when-apps-collude-to-steal-your-data/522177/\">A study found tens of "
+"thousands of pairs that collude.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "Google Play intentionally sends app developers <a href=\"http://gadgets.ndtv.";
 "com/apps/news/google-play-store-policy-raises-privacy-concerns-331116\"> the "
 "personal details of users that install the app</a>."

Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary-insecurity.de.po        7 Apr 2017 12:00:21 -0000       1.69
+++ proprietary-insecurity.de.po        13 Apr 2017 23:29:47 -0000      1.70
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-04-01 07:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2016-10-29 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -77,6 +77,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "When Miele's Internet of Stings hospital disinfectant dishwasher is <a href="
 "\"https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-";
 "connecting-hospitals-to-the-internet-of-shit\">connected to the Internet, "

Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary-insecurity.fr.po        5 Apr 2017 08:05:02 -0000       1.85
+++ proprietary-insecurity.fr.po        13 Apr 2017 23:29:47 -0000      1.86
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-04-01 07:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-04-05 09:43+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -79,6 +80,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "When Miele's Internet of Stings hospital disinfectant dishwasher is <a href="
 "\"https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-";
 "connecting-hospitals-to-the-internet-of-shit\">connected to the Internet, "

Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary-insecurity.it.po        2 Apr 2017 10:30:43 -0000       1.91
+++ proprietary-insecurity.it.po        13 Apr 2017 23:29:47 -0000      1.92
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-04-01 07:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-04-02 11:59+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 "X-Generator: Poedit 1.5.4\n"
 
 #. type: Content of: <title>
@@ -77,6 +78,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "When Miele's Internet of Stings hospital disinfectant dishwasher is <a href="
 "\"https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-";
 "connecting-hospitals-to-the-internet-of-shit\">connected to the Internet, "

Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary-insecurity.ja.po        1 Apr 2017 08:01:38 -0000       1.74
+++ proprietary-insecurity.ja.po        13 Apr 2017 23:29:47 -0000      1.75
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-04-01 07:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -76,6 +76,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "When Miele's Internet of Stings hospital disinfectant dishwasher is <a href="
 "\"https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-";
 "connecting-hospitals-to-the-internet-of-shit\">connected to the Internet, "

Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-insecurity.pot  1 Apr 2017 08:01:38 -0000       1.44
+++ proprietary-insecurity.pot  13 Apr 2017 23:29:47 -0000      1.45
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-04-01 07:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -58,6 +58,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a "
+"href=\"https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\";>
 "
+"can be hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's "
+"non-free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "When Miele's Internet of Stings hospital disinfectant dishwasher is <a "
 
"href=\"https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit\";>connected
 "
 "to the Internet, its security is crap</a>."

Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary-insecurity.ru.po        1 Apr 2017 16:29:26 -0000       1.106
+++ proprietary-insecurity.ru.po        13 Apr 2017 23:29:47 -0000      1.107
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2017-04-01 07:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-04-01 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -76,6 +77,14 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-";
+"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
+"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
+"free firmware."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "When Miele's Internet of Stings hospital disinfectant dishwasher is <a href="
 "\"https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-";
 "connecting-hospitals-to-the-internet-of-shit\">connected to the Internet, "

Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary-sabotage.de.po  10 Apr 2017 06:00:59 -0000      1.71
+++ proprietary-sabotage.de.po  13 Apr 2017 23:29:47 -0000      1.72
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-03-29 22:00+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -59,6 +59,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-";
+"off-customers-by-requiring-mandatory-accounts-to-cook-food/"
+"#more-10275062\">Unless users create an account on Anova's servers, their "
+"cookers won't function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The iPhone 7 contains DRM specifically designed to <a href=\"https://";
 "motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-"
 "software-lock\"> brick it if an &ldquo;unauthorized&rdquo; repair shop fixes "

Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary-sabotage.fr.po  11 Apr 2017 09:18:10 -0000      1.73
+++ proprietary-sabotage.fr.po  13 Apr 2017 23:29:47 -0000      1.74
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-04-11 11:12+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 "Plural-Forms: \n"
 "X-Generator: Gtranslator 2.91.5\n"
 
@@ -59,6 +60,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-";
+"off-customers-by-requiring-mandatory-accounts-to-cook-food/"
+"#more-10275062\">Unless users create an account on Anova's servers, their "
+"cookers won't function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The iPhone 7 contains DRM specifically designed to <a href=\"https://";
 "motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-"
 "software-lock\"> brick it if an &ldquo;unauthorized&rdquo; repair shop fixes "

Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary-sabotage.it.po  10 Apr 2017 06:00:59 -0000      1.72
+++ proprietary-sabotage.it.po  13 Apr 2017 23:29:47 -0000      1.73
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-04-02 12:01+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -60,6 +60,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-";
+"off-customers-by-requiring-mandatory-accounts-to-cook-food/"
+"#more-10275062\">Unless users create an account on Anova's servers, their "
+"cookers won't function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The iPhone 7 contains DRM specifically designed to <a href=\"https://";
 "motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-"
 "software-lock\"> brick it if an &ldquo;unauthorized&rdquo; repair shop fixes "

Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-sabotage.ja.po  10 Apr 2017 06:00:59 -0000      1.70
+++ proprietary-sabotage.ja.po  13 Apr 2017 23:29:47 -0000      1.71
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-01-04 10:15+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -59,6 +59,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-";
+"off-customers-by-requiring-mandatory-accounts-to-cook-food/"
+"#more-10275062\">Unless users create an account on Anova's servers, their "
+"cookers won't function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The iPhone 7 contains DRM specifically designed to <a href=\"https://";
 "motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-"
 "software-lock\"> brick it if an &ldquo;unauthorized&rdquo; repair shop fixes "

Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-sabotage.pot    10 Apr 2017 06:00:59 -0000      1.38
+++ proprietary-sabotage.pot    13 Apr 2017 23:29:47 -0000      1.39
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -48,6 +48,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a "
+"href=\"https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062\";>Unless
 "
+"users create an account on Anova's servers, their cookers won't "
+"function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The iPhone 7 contains DRM specifically designed to <a "
 
"href=\"https://motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-software-lock\";>
 "
 "brick it if an &ldquo;unauthorized&rdquo; repair shop fixes it</a>.  "

Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary-sabotage.ru.po  10 Apr 2017 07:03:31 -0000      1.96
+++ proprietary-sabotage.ru.po  13 Apr 2017 23:29:47 -0000      1.97
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2017-04-10 05:56+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2017-04-10 17:51+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -58,6 +59,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-";
+"off-customers-by-requiring-mandatory-accounts-to-cook-food/"
+"#more-10275062\">Unless users create an account on Anova's servers, their "
+"cookers won't function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "The iPhone 7 contains DRM specifically designed to <a href=\"https://";
 "motherboard.vice.com/en_us/article/iphone-7-home-button-unreplaceable-repair-"
 "software-lock\"> brick it if an &ldquo;unauthorized&rdquo; repair shop fixes "

Index: proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-tethers.de.po   1 Feb 2017 03:10:38 -0000       1.1
+++ proprietary-tethers.de.po   13 Apr 2017 23:29:47 -0000      1.2
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2016-11-17 03:25+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2016-11-17 22:00+0100\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -55,6 +56,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-";
+"off-customers-by-requiring-mandatory-accounts-to-cook-food/"
+"#more-10275062\">Unless users create an account on Anova's servers, their "
+"cookers won't function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/";
 "industry/2672-geforce-experience-data-transfer-analysis\">makes users "
 "identify themselves and then sends personal data about them to nVidia "
@@ -179,8 +189,12 @@
 "standards/README.translations\">LIESMICH für Übersetzungen</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
+# | Copyright &copy; [-2015, 2016-] {+2016, 2017+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -203,3 +217,6 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Letzte Änderung:"
+
+#~ msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."

Index: proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-tethers.fr.po   18 Nov 2016 23:24:41 -0000      1.11
+++ proprietary-tethers.fr.po   13 Apr 2017 23:29:47 -0000      1.12
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2016-11-17 03:25+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2016-11-19 00:09+0100\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -57,6 +58,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-";
+"off-customers-by-requiring-mandatory-accounts-to-cook-food/"
+"#more-10275062\">Unless users create an account on Anova's servers, their "
+"cookers won't function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/";
 "industry/2672-geforce-experience-data-transfer-analysis\">makes users "
 "identify themselves and then sends personal data about them to nVidia "
@@ -174,8 +184,12 @@
 "README.translations.html\">guide de traduction</a>."
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
+# | Copyright &copy; [-2015, 2016-] {+2016, 2017+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -199,3 +213,6 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."

Index: proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-tethers.ja.po   24 Jan 2017 03:40:31 -0000      1.6
+++ proprietary-tethers.ja.po   13 Apr 2017 23:29:47 -0000      1.7
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2016-11-17 03:25+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2016-11-18 13:34+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -14,6 +14,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -58,6 +59,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-";
+"off-customers-by-requiring-mandatory-accounts-to-cook-food/"
+"#more-10275062\">Unless users create an account on Anova's servers, their "
+"cookers won't function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/";
 "industry/2672-geforce-experience-data-transfer-analysis\">makes users "
 "identify themselves and then sends personal data about them to nVidia "
@@ -170,8 +180,10 @@
 "README.translations.html\">翻訳 README</a>をご覧ください。"
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""

Index: proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-tethers.pot     17 Nov 2016 03:29:01 -0000      1.6
+++ proprietary-tethers.pot     13 Apr 2017 23:29:47 -0000      1.7
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2016-11-17 03:25+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -48,6 +48,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a "
+"href=\"https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062\";>Unless
 "
+"users create an account on Anova's servers, their cookers won't "
+"function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "nVidia's proprietary GeForce Experience <a "
 
"href=\"http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis\";>makes
 "
 "users identify themselves and then sends personal data about them to nVidia "
@@ -130,7 +139,7 @@
 msgstr ""
 
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017 Free Software Foundation, Inc."
 msgstr ""
 
 #. type: Content of: <div><p>

Index: proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-tethers.ru.po   17 Nov 2016 06:58:56 -0000      1.11
+++ proprietary-tethers.ru.po   13 Apr 2017 23:29:47 -0000      1.12
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2016-11-17 03:25+0000\n"
+"POT-Creation-Date: 2017-04-13 23:26+0000\n"
 "PO-Revision-Date: 2016-11-17 09:13+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2017-04-13 23:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -59,6 +60,15 @@
 
 #. type: Content of: <ul><li><p>
 msgid ""
+"Anova sabotaged users' cooking devices with a downgrade that tethered them "
+"to a remote server. <a href=\"https://consumerist.com/2017/04/12/anova-ticks-";
+"off-customers-by-requiring-mandatory-accounts-to-cook-food/"
+"#more-10275062\">Unless users create an account on Anova's servers, their "
+"cookers won't function.</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
 "nVidia's proprietary GeForce Experience <a href=\"http://www.gamersnexus.net/";
 "industry/2672-geforce-experience-data-transfer-analysis\">makes users "
 "identify themselves and then sends personal data about them to nVidia "
@@ -177,8 +187,12 @@
 
 # type: Content of: <div><p>
 #. type: Content of: <div><p>
-msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
-msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."
+# | Copyright &copy; [-2015, 2016-] {+2016, 2017+} Free Software Foundation,
+# | Inc.
+#, fuzzy
+#| msgid "Copyright &copy; 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright &copy; 2016, 2017 Free Software Foundation, Inc."
+msgstr "Copyright &copy; 2014, 2015, 2016 Free Software Foundation, Inc."
 
 #. type: Content of: <div><p>
 msgid ""
@@ -205,3 +219,7 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Обновлено:"
+
+# type: Content of: <div><p>
+#~ msgid "Copyright &copy; 2016 Free Software Foundation, Inc."
+#~ msgstr "Copyright &copy; 2016 Free Software Foundation, Inc."



reply via email to

[Prev in Thread] Current Thread [Next in Thread]