[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-mobiles.ru.html po/malw...
From: |
GNUN |
Subject: |
www/proprietary malware-mobiles.ru.html po/malw... |
Date: |
Sun, 11 Jun 2017 04:32:26 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/06/11 04:32:26
Modified files:
proprietary : malware-mobiles.ru.html
proprietary/po : malware-mobiles.ru-en.html
malware-mobiles.ru.po
proprietary-insecurity.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.127&r2=1.128
Patches:
Index: malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-mobiles.ru.html 29 May 2017 06:33:37 -0000 1.27
+++ malware-mobiles.ru.html 11 Jun 2017 08:32:25 -0000 1.28
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
<!--#include virtual="/server/header.ru.html" -->
-<!-- Parent-Version: 1.79 -->
+<!-- Parent-Version: 1.83 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
- ÐÑÐ¾ÐµÐºÑ GNU - Фонд Ñвободного
@@ -160,6 +160,48 @@
<ul>
<li>
+ <p>Ð ÑÑаÑÑе Ñ Ð¸ÑÑледованием пÑиваÑноÑÑи и
заÑиÑенноÑÑи 283 пÑиложений Android
+Ð´Ð»Ñ VPN Ñделан вÑвод, ÑÑо “неÑмоÑÑÑ Ð½Ð°
обеÑÐ°Ð½Ð¸Ñ Ð¿ÑиваÑноÑÑи,
+заÑиÑенноÑÑи и анонимноÑÑи, коÑоÑое даÑÑ
болÑÑинÑÑво пÑиложений Ð´Ð»Ñ VPN, <a
+href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+Ð¼Ð¸Ð»Ð»Ð¸Ð¾Ð½Ñ Ð¿Ð¾Ð»ÑзоваÑелей ÑиÑкÑÑÑ ÑÑаÑÑ
жеÑÑвами беÑпоÑвеннÑÑ
гаÑанÑий
+безопаÑноÑÑи, а Ñакже злоÑпоÑÑеблений Ñо
ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений длÑ
+VPN</a>”.</p>
+
+ <p>Ðалее ÑледÑÐµÑ Ð½ÐµÐ¸ÑÑеÑпÑваÑÑий ÑпиÑок
неÑвободнÑÑ
пÑиложений Ð´Ð»Ñ VPN, коÑоÑÑе
+ÑледÑÑ Ð·Ð° полÑзоваÑелÑми и вÑоÑгаÑÑÑÑ Ð² иÑ
лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>ÐÑполÑзÑÐµÑ Ð±Ð¸Ð±Ð»Ð¸Ð¾Ñеки Ñлежки, Ñакие
как NativeX и Appflood, пÑедназнаÑеннÑе
+Ð´Ð»Ñ Ð¾ÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей и показа
им напÑавленной ÑекламÑ.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>ÐапÑаÑÐ¸Ð²Ð°ÐµÑ Ð¿Ñи ÑÑÑановке ÑазÑеÑениÑ
на ÑÑение и оÑпÑÐ°Ð²ÐºÑ SMS, ÑÑо ознаÑаеÑ
+полнÑй доÑÑÑп к ÑекÑÑовÑм ÑообÑениÑм
полÑзоваÑелей.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>ÐапÑаÑиваÑÑ ÑазÑеÑение на ÑÑение
жÑÑналов дÑÑгиÑ
пÑиложений, а Ñакже
+ÑиÑÑемнÑÑ
жÑÑналов. РазÑабоÑÑики TigerVPN ÑÑо
подÑвеÑдили.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>ÐоÑÑÐ»Ð°ÐµÑ Ð´Ð°Ð½Ð½Ñе в LinkedIn. ÐÑоме Ñого, ÑоÑ
ÑанÑÐµÑ Ð¿Ð¾Ð´ÑобнÑй жÑÑнал и можеÑ
+по ÑÑÐµÐ±Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿ÐµÑедаваÑÑ ÐµÐ³Ð¾
гоÑÑдаÑÑÑвеннÑм оÑганам ÐеликобÑиÑании.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в
ÑÑÑаниÑÑ HTML, пеÑедаваемÑе
+полÑзоваÑелÑм. ÐаÑвленное назнаÑение ÑÑой
вÑÑавки — показ
+ÑекламÑ. ÐÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ 5 библиоÑек
Ñлежки. ÐÑоме Ñого, пÑопÑÑÐºÐ°ÐµÑ Ð¿Ð¾Ñок
+даннÑÑ
полÑзоваÑÐµÐ»Ñ ÑеÑез valueclick.com (ÑайÑ
ÑекламÑ).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в
ÑÑÑаниÑÑ HTML, а Ñакже иÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾
+5 библиоÑек Ñлежки. РазÑабоÑÑики
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑдили, ÑÑо деÑевÑе веÑÑии
+пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´ÐµÐ¹ÑÑвиÑелÑно вÑÑавлÑÑÑ JavaScript
Ð´Ð»Ñ Ñлежки и показа ÑекламÑ.</dd>
+ </dl>
+</li>
+
+<li>
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">ÐÑÑледование
2015 года</a> показало, ÑÑо 90% ÑамÑÑ
попÑлÑÑнÑÑ
беÑплаÑнÑÑ
неÑвободнÑÑ
@@ -470,7 +512,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/05/29 06:33:37 $
+$Date: 2017/06/11 08:32:25 $
<!-- timestamp end -->
</p>
Index: po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- po/malware-mobiles.ru-en.html 29 May 2017 06:33:37 -0000 1.25
+++ po/malware-mobiles.ru-en.html 11 Jun 2017 08:32:25 -0000 1.26
@@ -1,5 +1,5 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.79 -->
+<!-- Parent-Version: 1.83 -->
<title>Malware in Mobile Devices
- GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/malware-mobiles.translist" -->
@@ -147,6 +147,55 @@
<ul>
<li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security
+ of 283 Android VPN apps concluded that “in spite of the
+ promises for privacy, security, and anonymity given by the
+ majority of VPN apps—millions of users may be unawarely subject
+ to poor security guarantees and abusive practices inflicted by
+ VPN apps.”</p>
+
+ <p>Following is a non-exhaustive list of proprietary VPN apps from
+ the research paper that tracks and infringes the privacy of
+ users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant to track users and show them targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests the <code>READ_SMS</code> and <code>SEND_SMS</code>
+ permissions upon installation, meaning it has full access to
+ users' text messages.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests the <code>READ_LOGS</code> permission to read logs
+ for other apps and also core system logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
+ and may turn them over to the UK government if
+ requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages returned to the
+ users. The stated purpose of the JS injection is to display
+ ads. Uses roughly 5 tracking libraries. Also, it redirects the
+ user's traffic through valueclick.com (an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed that the non-premium version of the app does
+ JavaScript injection for tracking and display ads.</dd>
+ </dl>
+</li>
+
+<li>
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
proprietary Android apps contained recognizable tracking libraries. For
the paid proprietary apps, it was only 60%.</p>
@@ -415,7 +464,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/29 06:33:37 $
+$Date: 2017/06/11 08:32:25 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- po/malware-mobiles.ru.po 11 Jun 2017 07:40:50 -0000 1.78
+++ po/malware-mobiles.ru.po 11 Jun 2017 08:32:25 -0000 1.79
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2017-06-10 23:25+0000\n"
+"POT-Creation-Date: 2017-06-11 07:26+0000\n"
"PO-Revision-Date: 2017-06-11 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-06-10 23:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -294,21 +293,21 @@
"of VPN apps—millions of users may be unawarely subject to poor "
"security guarantees and abusive practices inflicted by VPN apps.”"
msgstr ""
-"Ð ÑÑаÑÑе Ñ Ð¸ÑÑледованием пÑиваÑноÑÑи и
заÑиÑенноÑÑи 283 пÑиложений "
-"Android Ð´Ð»Ñ VPN Ñделан вÑвод, ÑÑо “неÑмоÑÑÑ
на обеÑÐ°Ð½Ð¸Ñ Ð¿ÑиваÑноÑÑи, "
-"заÑиÑенноÑÑи и анонимноÑÑи, коÑоÑое даÑÑ
болÑÑинÑÑво пÑиложений Ð´Ð»Ñ VPN, "
-"<a href=\"https://research.csiro.au/ng/wp-content/uploads/"
-"sites/106/2016/08/paper-1.pdf\"> "
-"Ð¼Ð¸Ð»Ð»Ð¸Ð¾Ð½Ñ Ð¿Ð¾Ð»ÑзоваÑелей ÑиÑкÑÑÑ ÑÑаÑÑ
жеÑÑвами беÑпоÑвеннÑÑ
гаÑанÑий "
-"безопаÑноÑÑи, а Ñакже злоÑпоÑÑеблений Ñо
ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений Ð´Ð»Ñ VPN</a>”."
+"Ð ÑÑаÑÑе Ñ Ð¸ÑÑледованием пÑиваÑноÑÑи и
заÑиÑенноÑÑи 283 пÑиложений Android "
+"Ð´Ð»Ñ VPN Ñделан вÑвод, ÑÑо “неÑмоÑÑÑ Ð½Ð°
обеÑÐ°Ð½Ð¸Ñ Ð¿ÑиваÑноÑÑи, "
+"заÑиÑенноÑÑи и анонимноÑÑи, коÑоÑое даÑÑ
болÑÑинÑÑво пÑиложений Ð´Ð»Ñ VPN, <a "
+"href=\"https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/"
+"paper-1.pdf\"> Ð¼Ð¸Ð»Ð»Ð¸Ð¾Ð½Ñ Ð¿Ð¾Ð»ÑзоваÑелей ÑиÑкÑÑÑ
ÑÑаÑÑ Ð¶ÐµÑÑвами беÑпоÑвеннÑÑ
"
+"гаÑанÑий безопаÑноÑÑи, а Ñакже
злоÑпоÑÑеблений Ñо ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений Ð´Ð»Ñ "
+"VPN</a>”."
#. type: Content of: <ul><li><p>
msgid ""
"Following is a non-exhaustive list of proprietary VPN apps from the research "
"paper that tracks and infringes the privacy of users:"
msgstr ""
-"Ðалее ÑледÑÐµÑ Ð½ÐµÐ¸ÑÑеÑпÑваÑÑий ÑпиÑок
неÑвободнÑÑ
пÑиложений Ð´Ð»Ñ VPN, "
-"коÑоÑÑе ÑледÑÑ Ð·Ð° полÑзоваÑелÑми и
вÑоÑгаÑÑÑÑ Ð² иÑ
лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ:"
+"Ðалее ÑледÑÐµÑ Ð½ÐµÐ¸ÑÑеÑпÑваÑÑий ÑпиÑок
неÑвободнÑÑ
пÑиложений Ð´Ð»Ñ VPN, коÑоÑÑе "
+"ÑледÑÑ Ð·Ð° полÑзоваÑелÑми и вÑоÑгаÑÑÑÑ Ð² иÑ
лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ:"
#. type: Content of: <ul><li><dl><dt>
msgid "SurfEasy"
@@ -369,10 +368,10 @@
"tracking libraries. Also, it redirects the user's traffic through valueclick."
"com (an advertising website)."
msgstr ""
-"ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в ÑÑÑаниÑÑ
HTML, пеÑедаваемÑе полÑзоваÑелÑм. "
-"ÐаÑвленное назнаÑение ÑÑой
вÑÑавки — показ ÑекламÑ. ÐÑполÑзÑÐµÑ "
-"около 5 библиоÑек Ñлежки. ÐÑоме Ñого,
пÑопÑÑÐºÐ°ÐµÑ Ð¿Ð¾Ñок даннÑÑ
полÑзоваÑÐµÐ»Ñ "
-"ÑеÑез valueclick.com (ÑÐ°Ð¹Ñ ÑекламÑ)."
+"ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в ÑÑÑаниÑÑ
HTML, пеÑедаваемÑе "
+"полÑзоваÑелÑм. ÐаÑвленное назнаÑение
ÑÑой вÑÑавки — показ "
+"ÑекламÑ. ÐÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ 5 библиоÑек
Ñлежки. ÐÑоме Ñого, пÑопÑÑÐºÐ°ÐµÑ Ð¿Ð¾Ñок "
+"даннÑÑ
полÑзоваÑÐµÐ»Ñ ÑеÑез valueclick.com (ÑайÑ
ÑекламÑ)."
#. type: Content of: <ul><li><dl><dt>
msgid "WiFi Protector VPN"
@@ -384,11 +383,9 @@
"libraries. Developers of this app have confirmed that the non-premium "
"version of the app does JavaScript injection for tracking and display ads."
msgstr ""
-"ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в ÑÑÑаниÑÑ
HTML, а Ñакже "
-"иÑполÑзÑÐµÑ "
-"около 5 библиоÑек Ñлежки. РазÑабоÑÑики
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑдили, ÑÑо "
-"деÑевÑе веÑÑии пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´ÐµÐ¹ÑÑвиÑелÑно
вÑÑавлÑÑÑ JavaScript Ð´Ð»Ñ Ñлежки "
-"и показа ÑекламÑ."
+"ÐÑÑавлÑÐµÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° JavaScript в ÑÑÑаниÑÑ
HTML, а Ñакже иÑполÑзÑÐµÑ Ð¾ÐºÐ¾Ð»Ð¾ "
+"5 библиоÑек Ñлежки. РазÑабоÑÑики
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑдили, ÑÑо деÑевÑе веÑÑии
"
+"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´ÐµÐ¹ÑÑвиÑелÑно вÑÑавлÑÑÑ JavaScript
Ð´Ð»Ñ Ñлежки и показа ÑекламÑ."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- po/proprietary-insecurity.ru.po 11 Jun 2017 07:40:50 -0000 1.127
+++ po/proprietary-insecurity.ru.po 11 Jun 2017 08:32:25 -0000 1.128
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2017-06-11 00:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -106,14 +105,14 @@
"risk of being classified as malicious task by AV heuristics”."
msgstr ""
"ÐÐ°ÐºÐµÑ Ð°ÑдиодÑайвеÑов Conexant HD (веÑÑии 1.0.0.46 и
более ÑанниÑ
), "
-"пÑедÑÑÑановленнÑй на 28 моделей
поÑÑаÑивнÑÑ
компÑÑÑеÑов Hewlett-Packard, "
-"запиÑÑвали в Ñайл нажаÑÐ¸Ñ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð½Ð°
клавиÑи. ÐÑбой пÑоÑеÑÑ, Ñ ÐºÐ¾ÑоÑого "
-"бÑл доÑÑÑп к MapViewOfFile, мог ÑиÑаÑÑ ÑÑоÑ
жÑÑнал. Ðолее Ñого, ÑоглаÑно "
-"modzero, “<a href="
-"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
-"\">ÑÑеÑка инÑоÑмаÑии ÑеÑез ÑкÑÑÑÑй канал
накопиÑÐµÐ»Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð°Ð²ÑоÑÑ "
-"вÑедоноÑнÑÑ
пÑогÑамм пеÑеÑ
ваÑÑваÑÑ
нажаÑÐ¸Ñ Ð½Ð° клавиÑи без ÑиÑка бÑÑÑ "
-"клаÑÑиÑиÑиÑованнÑм алгоÑиÑмами
анÑивиÑÑÑов как вÑедоноÑÐ½Ð°Ñ Ð·Ð°Ð´Ð°Ñа”."
+"пÑедÑÑÑановленнÑй на 28 моделей
поÑÑаÑивнÑÑ
компÑÑÑеÑов Hewlett-"
+"Packard, запиÑÑвали в Ñайл нажаÑиÑ
полÑзоваÑÐµÐ»Ñ Ð½Ð° клавиÑи. ÐÑбой пÑоÑеÑÑ, Ñ "
+"коÑоÑого бÑл доÑÑÑп к MapViewOfFile, мог ÑиÑаÑÑ
ÑÑÐ¾Ñ Ð¶ÑÑнал. Ðолее Ñого, "
+"ÑоглаÑно modzero, “<a href=\"https://www.modzero.ch/advisories/"
+"MZ-17-01-Conexant-Keylogger.txt\">ÑÑеÑка инÑоÑмаÑии
ÑеÑез ÑкÑÑÑÑй канал "
+"накопиÑÐµÐ»Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð°Ð²ÑоÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм пеÑеÑ
ваÑÑваÑÑ Ð½Ð°Ð¶Ð°ÑÐ¸Ñ Ð½Ð° "
+"клавиÑи без ÑиÑка бÑÑÑ
клаÑÑиÑиÑиÑованнÑм алгоÑиÑмами
анÑивиÑÑÑов как "
+"вÑедоноÑÐ½Ð°Ñ Ð·Ð°Ð´Ð°Ñа”."
#. type: Content of: <ul><li><p>
msgid ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-mobiles.ru.html po/malw...,
GNUN <=