[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www gnu/po/why-programs-should-be-shared.transl...
From: |
GNUN |
Subject: |
www gnu/po/why-programs-should-be-shared.transl... |
Date: |
Sat, 11 Nov 2017 01:31:41 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 17/11/11 01:31:41
Modified files:
gnu/po : why-programs-should-be-shared.translist
yes-give-it-away.translist
graphics/po : gnu-linux-logos.translist
philosophy : surveillance-vs-democracy.ru.html
proprietary : proprietary-insecurity.de.html
proprietary-insecurity.it.html
proprietary-jails.de.html
proprietary-surveillance.de.html
proprietary-tethers.de.html
proprietary/po : malware-adobe.translist malware-cars.translist
malware-games.translist
potential-malware.translist
proprietary-insecurity.de-en.html
proprietary-insecurity.de.po
proprietary-jails.de-en.html
proprietary-surveillance.de-en.html
proprietary-surveillance.de.po
thankgnus : 2017supporters.de.html
thankgnus/po : 2017supporters.de-en.html
Added files:
proprietary/po : proprietary-insecurity.it-diff.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/gnu/po/why-programs-should-be-shared.translist?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/gnu/po/yes-give-it-away.translist?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/gnu-linux-logos.translist?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ru.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.de.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.it.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-jails.de.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.de.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.de.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.translist?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.translist?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.translist?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/potential-malware.translist?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de-en.html?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-en.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/2017supporters.de.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/thankgnus/po/2017supporters.de-en.html?cvsroot=www&r1=1.9&r2=1.10
Patches:
Index: gnu/po/why-programs-should-be-shared.translist
===================================================================
RCS file: /web/www/www/gnu/po/why-programs-should-be-shared.translist,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- gnu/po/why-programs-should-be-shared.translist 26 Nov 2016 14:27:58
-0000 1.6
+++ gnu/po/why-programs-should-be-shared.translist 11 Nov 2017 06:31:39
-0000 1.7
@@ -3,6 +3,7 @@
value='<div id="translations">
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/gnu/why-programs-should-be-shared.en.html">English</a> [en]</span>
+<span dir="ltr"><a lang="de" hreflang="de"
href="/gnu/why-programs-should-be-shared.de.html">Deutsch</a> [de]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/gnu/why-programs-should-be-shared.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ja" hreflang="ja"
href="/gnu/why-programs-should-be-shared.ja.html">æ¥æ¬èª</a> [ja]</span>
<span dir="ltr"><a lang="nl" hreflang="nl"
href="/gnu/why-programs-should-be-shared.nl.html">Nederlands</a> [nl]</span>
@@ -12,6 +13,7 @@
</div>' -->
<link rel="alternate" type="text/html"
href="/gnu/why-programs-should-be-shared.html" hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/gnu/why-programs-should-be-shared.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/gnu/why-programs-should-be-shared.de.html" title="Deutsch" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/gnu/why-programs-should-be-shared.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ja" hreflang="ja"
href="/gnu/why-programs-should-be-shared.ja.html" title="æ¥æ¬èª" />
<link rel="alternate" type="text/html" lang="nl" hreflang="nl"
href="/gnu/why-programs-should-be-shared.nl.html" title="Nederlands" />
Index: gnu/po/yes-give-it-away.translist
===================================================================
RCS file: /web/www/www/gnu/po/yes-give-it-away.translist,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- gnu/po/yes-give-it-away.translist 26 Nov 2016 14:57:47 -0000 1.6
+++ gnu/po/yes-give-it-away.translist 11 Nov 2017 06:31:39 -0000 1.7
@@ -3,6 +3,7 @@
value='<div id="translations">
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/gnu/yes-give-it-away.en.html">English</a> [en]</span>
+<span dir="ltr"><a lang="de" hreflang="de"
href="/gnu/yes-give-it-away.de.html">Deutsch</a> [de]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/gnu/yes-give-it-away.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ja" hreflang="ja"
href="/gnu/yes-give-it-away.ja.html">æ¥æ¬èª</a> [ja]</span>
<span dir="ltr"><a lang="nl" hreflang="nl"
href="/gnu/yes-give-it-away.nl.html">Nederlands</a> [nl]</span>
@@ -12,6 +13,7 @@
</div>' -->
<link rel="alternate" type="text/html" href="/gnu/yes-give-it-away.html"
hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/gnu/yes-give-it-away.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/gnu/yes-give-it-away.de.html" title="Deutsch" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/gnu/yes-give-it-away.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ja" hreflang="ja"
href="/gnu/yes-give-it-away.ja.html" title="æ¥æ¬èª" />
<link rel="alternate" type="text/html" lang="nl" hreflang="nl"
href="/gnu/yes-give-it-away.nl.html" title="Nederlands" />
Index: graphics/po/gnu-linux-logos.translist
===================================================================
RCS file: /web/www/www/graphics/po/gnu-linux-logos.translist,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- graphics/po/gnu-linux-logos.translist 1 Jul 2017 06:00:14 -0000
1.1
+++ graphics/po/gnu-linux-logos.translist 11 Nov 2017 06:31:40 -0000
1.2
@@ -3,8 +3,10 @@
value='<div id="translations">
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/graphics/gnu-linux-logos.en.html">English</a> [en]</span>
+<span dir="ltr"><a lang="de" hreflang="de"
href="/graphics/gnu-linux-logos.de.html">Deutsch</a> [de]</span>
</p>
</div>' -->
<link rel="alternate" type="text/html" href="/graphics/gnu-linux-logos.html"
hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/graphics/gnu-linux-logos.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/graphics/gnu-linux-logos.de.html" title="Deutsch" />
<!-- end translist file -->
Index: philosophy/surveillance-vs-democracy.ru.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ru.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/surveillance-vs-democracy.ru.html 11 Nov 2017 05:59:03
-0000 1.29
+++ philosophy/surveillance-vs-democracy.ru.html 11 Nov 2017 06:31:40
-0000 1.30
@@ -17,7 +17,7 @@
-->
</style>
-<!-- GNUN: localize URL /graphics/dog.small.jpg -->
+<!-- GNUN: localize URL /graphics/dog.small.ru.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.ru.html" -->
<h2 class="center">СколÑко Ñлежки Ð¼Ð¾Ð¶ÐµÑ Ð²ÑдеÑжаÑÑ
демокÑаÑиÑ?</h2>
@@ -34,7 +34,7 @@
<div id="intro">
<div class="pict wide">
<a href="/graphics/dog.html">
-<img src="/graphics/dog.small.jpg" alt="ÐаÑикаÑÑÑа: Ñобака Ñ
Ñдивлением ÑмоÑÑÐ¸Ñ Ð½Ð° ÑекламÑ, вÑÑкоÑивÑÑÑ
на ÑкÑане ее
+<img src="/graphics/dog.small.ru.jpg" alt="ÐаÑикаÑÑÑа: Ñобака
Ñ Ñдивлением ÑмоÑÑÐ¸Ñ Ð½Ð° ÑекламÑ,
вÑÑкоÑивÑÑÑ Ð½Ð° ÑкÑане ее
компÑÑÑеÑа" /></a>
<p>“Ðак они Ñзнали, ÑÑо Ñ —
Ñобака?”</p>
</div>
@@ -620,7 +620,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/11/11 05:59:03 $
+$Date: 2017/11/11 06:31:40 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.de.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/proprietary-insecurity.de.html 25 Oct 2017 12:31:02 -0000
1.21
+++ proprietary/proprietary-insecurity.de.html 11 Nov 2017 06:31:40 -0000
1.22
@@ -44,6 +44,17 @@
<ul>
<li>
+ <p><ins><a
+href="https://www.spiegel.de/auto/aktuell/computerexperten-hacken-auto-software-a-914783.html">âDer
+Schutz, den die Hersteller eingebaut haben, lasse sich bei Autos praktisch
+aller Massenhersteller binnen Sekunden knackenâ</a></ins> und ermöglicht <a
+href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937"
+title="CVE-2017-14937, unter:
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937 The MITRE
+Corporation 2017.">den Airbag<ins> ‑ während der
+Fahrt ‑ </ins>aus der Ferne auszulösen</a>.</p>
+</li>
+<li>
<p>Eine âklugeâ für Krankenhäuser entworfene intravenöse Pumpe ist
mit dem
Internet verbunden. Selbstredend ist deren <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"
@@ -717,7 +728,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/10/25 12:31:02 $
+$Date: 2017/11/11 06:31:40 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.it.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.it.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/proprietary-insecurity.it.html 11 Sep 2017 08:07:52 -0000
1.27
+++ proprietary/proprietary-insecurity.it.html 11 Nov 2017 06:31:40 -0000
1.28
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-insecurity.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary-insecurity.it.po">
+ https://www.gnu.org/proprietary/po/proprietary-insecurity.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE"
value="/proprietary/proprietary-insecurity.html"
+ --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-insecurity.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2017-09-12" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-insecurity.en.html" -->
<!--#include virtual="/server/header.it.html" -->
<!-- Parent-Version: 1.84 -->
@@ -8,6 +13,7 @@
<!--#include virtual="/proprietary/po/proprietary-insecurity.translist" -->
<!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
<h2>Scarsa sicurezza proprietaria</h2>
<a href="/proprietary/proprietary.html">Altri esempi di malware
@@ -571,7 +577,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2017/09/11 08:07:52 $
+$Date: 2017/11/11 06:31:40 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-jails.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-jails.de.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/proprietary-jails.de.html 29 Sep 2017 05:59:41 -0000
1.15
+++ proprietary/proprietary-jails.de.html 11 Nov 2017 06:31:40 -0000
1.16
@@ -1,19 +1,13 @@
-<!--#set var="PO_FILE"
- value='<a href="/proprietary/po/proprietary-jails.de.po">
- https://www.gnu.org/proprietary/po/proprietary-jails.de.po</a>'
- --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary-jails.html"
- --><!--#set var="DIFF_FILE"
value="/proprietary/po/proprietary-jails.de-diff.html"
- --><!--#set var="OUTDATED_SINCE" value="2017-07-31" --><!--#set
var="ENGLISH_PAGE" value="/proprietary/proprietary-jails.en.html" -->
+<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary-jails.en.html" -->
<!--#include virtual="/server/header.de.html" -->
-<!-- Parent-Version: 1.79 -->
+<!-- Parent-Version: 1.84 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Proprietäre Gefängnisse - GNU-Projekt - Free Software
Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-jails.translist" -->
<!--#include virtual="/server/banner.de.html" -->
-<!--#include virtual="/server/outdated.de.html" -->
<h2>Proprietäre Gefängnisse</h2>
<p><a href="/proprietary/">Weitere Beispiele proprietärer
Schadsoftware</a></p>
@@ -41,20 +35,49 @@
<ul>
+<li>
+<p>Apple <a
+href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html"
+title=", unter:
+https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html,
+The New York Times Company 2017.">löschte etliche VPNs aus seinem App Store
+für China</a>, indem es seine eigene Zensurmacht nutzte, um hierdurch das
+der chinesischen Regierung zu unterstreichen.
+</p>
+</li>
+
+<li>
+<p>Apple <a
+href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet"
+title="Iranian Hardliners Want An Isolated Internet â US Politicians and
+Companies Shouldn't Help, unter:
+https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet
+2017.">zensiert Apps auch für die US-Regierung</a>. Besonders werden Apps
+<ins>Iranischer Entwickler</ins> gelöscht.
+</p>
+
+<p>Die Wurzel dieses Unrechts liegt bei Apple. Hätte Apple die iMonster nicht
+entworfen um Anwendungen zensieren zu können, würde Apple nicht die Macht
+besitzen Nutzer davon abzuhalten welche App auch immer zu installieren.</p>
+</li>
+
<li>
- <p><b>Windows 10 S</b> sollte <b>Windows 10 J</b> für âdas
Gefängnisâ genannt
-werden: <a
+ <p><b>Windows 10 S</b> sollte besser <b>Windows 10
+G</b> ‑ <em>G</em> für
+<em>Gefängnis</em> ‑ genannt werden: <a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison"
title="What is Windows 10 S and how is it different from regular Windows
-10?, unter: theguardian.com 2017.">AusschlieÃlich Programme aus dem
-<i>Windows Store</i> können heruntergeladen und ausgeführt werden</a>.</p>
+10?, unter:
+https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison
+2017.">ausschlieÃlich Programme aus dem <i>Windows Store</i> können
+heruntergeladen und ausgeführt werden</a>.</p>
<p>Wenn die Geschichte von iOS als Gefängnis irgendein Hinweis ist,
wird
-Windows 10 J nicht besser sein.</p>
+âWindows 10 Gâ nicht besser sein.</p>
</li>
- <li><p><b>Google Chrome</b> unter Windows, <a
+ <li><p><b>Google Chrome</b> unter Windows <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/"
title="Google Chrome Listening In To Your Room Shows The Importance Of
Privacy Defense In Depth, unter: PrivateInternetAccess.com 2015.">entspricht
@@ -80,22 +103,23 @@
Apple-Zensur-System: <a
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china"
title="Apple removes New York Times app in China, unter: TheGuardian.com
-2017.">New York Times-Apps aus chinesischen App-Store
-gelöscht</a> ‑ um Chinas Zensur durchzusetzen.</p></li>
+2017.">New York Times-Apps aus chinesischen App-Store gelöscht</a>: um
+Chinas Zensur durchzusetzen.</p></li>
<li><p>
Apple zensiert Spiele. <a
-href="https://web.archive.org/web/20160602092236///arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/"
+href="https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/"
title="Apple says game about Palestinian child isnât a game, Ars Technica,
-unter: web.archive.org 2016.">Einige werden aufgrund deren politischen
-Ansichten im App Store verboten</a>, einige werden offenbar als akzeptabel
-betrachtet.</p>
+unter:
+https://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game/
+2016.">Einige werden aufgrund deren politischen Ansichten im App Store
+verboten</a>, einige werden offenbar als akzeptabel betrachtet.</p>
</li>
<li><p>
<a href="//ifixit.org/blog/7401/ifixit-app-pulled/" title="iFixit App Pulled
from Appleâs Store, unter: ifixit.org 2015.">Ein Programm wurde aus dem App
-Store verbannt</a>, weil Entwickler die Ungeheuerlichkeit begingen, einige
+Store verbannt</a>, weil Entwickler die Ungeheuerlichkeit begingen einige
iDinger zu disassemblieren.
</p></li>
@@ -110,28 +134,31 @@
</p></li>
<li><p>
-(2015) Apple <a
-href="//www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"
+Seit 2015 <a
+href="https://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights"
title="Jess Zimmerman, Apple, your anti-choice tendencies are showing in
-your app store, unter: //www.theguardian.com 2015.">blockiert systematisch
-Apps, die das Recht auf Schwangerschaftsabbrüche befürworten oder jegliche
-Suche danach unterstützen würden</a>.</p>
+your app store, unter: //www.theguardian.com 2015.">blockiert Apple
+systematisch Apps die das Recht auf Schwangerschaftsabbrüche befürworten
+oder jegliche Suche danach unterstützen würden</a>.</p>
<p>
Diese besondere politische Schräge <a
-href="//www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"
+href="https://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions"
title=" Siri's abortion bias embarrasses Apple as it rues 'unintentional
-omissions', unter: //www.theguardian.com 2011.">beeinflusst auch andere
-Apple-Dienste</a>.
+omissions', unter:
+https://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions
+2011.">beeinflusst auch andere Apple-Dienste</a>.
</p></li>
<li><p>
<a
-href="//www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"
+href="https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones"
title="Jasper Jackson, Google pulls adblocking app for Samsung phones, The
-Guardian 2016.">Google zensiert Installation von Samsungs Werbeblocker</a>
-mit der Begründung, dass das Blockieren von Werbung eine âInterferenzâ mit
-den werbenden (und Benutzer mittels Werbeanzeigen überwachenden)
+Guardian, unter:
+https://www.theguardian.com/media/2016/feb/03/google-pulls-ad-blocking-app-for-samsung-phones
+2016.">Google zensiert Installation von Samsungs Werbeblocker</a> mit der
+Begründung, dass das Blockieren von Werbung eine âInterferenzâ mit den
+werbenden (und Benutzer mittels Werbeanzeigen überwachenden)
Internetpräsenzen verursacht.</p>
<p>Der Werbeblocker ist proprietäre Software, ebenso wie das Programm (Google
@@ -300,7 +327,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/09/29 05:59:41 $
+$Date: 2017/11/11 06:31:40 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.de.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/proprietary-surveillance.de.html 25 Oct 2017 12:31:02
-0000 1.30
+++ proprietary/proprietary-surveillance.de.html 11 Nov 2017 06:31:40
-0000 1.31
@@ -175,6 +175,15 @@
</div>
<ul>
+ <li><p>Windows 10 Telemetrie-Dienst sendet Informationen an Microsoft über
Rechner
+des Nutzers und deren Nutzung des Rechners.</p>
+
+<p>Für Benutzer, die das 4. stabile Build von Windows 10 installierten,
+âCreators Updateâ, maximierte Windows die Ãberwachung darüber hinaus <a
+href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">durch
+zwangsweises einstellen des Telemetrie-Verfahrens auf <em>vollständig</em>
+[â<em>Full</em> Creators Updateâ, A. d. Ã.]</a>.</p></li>
+
<li><p>Windows-DRM-Dateien <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">können
genutzt werden, um Personen, die mit Tor surfen, zu identifizieren</a>. Die
@@ -1863,7 +1872,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/10/25 12:31:02 $
+$Date: 2017/11/11 06:31:40 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tethers.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.de.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-tethers.de.html 25 Oct 2017 12:31:02 -0000
1.4
+++ proprietary/proprietary-tethers.de.html 11 Nov 2017 06:31:40 -0000
1.5
@@ -85,7 +85,7 @@
<p>Eine halbblinde Sicherheitsrezension einer Verfolger-App stellte fest: <a
href="//www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">eklatante
Fehler erlaubten jedermann in den persönlichen Benutzerdaten
-herumzuschnüffeln.</a>. Die Rezension versäumt jedoch die Besorgnis zum
+herumzuschnüffeln</a>. Die Rezension versäumt jedoch die Besorgnis zum
Ausdruck bringen, dass die App die personenbezogenen Daten selbst an einen
Server sendet, wo der <em>Entwickler</em> sämtliche Daten abgreift. Dieser
âDienstâ ist für Dumme!</p>
@@ -184,7 +184,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/10/25 12:31:02 $
+$Date: 2017/11/11 06:31:40 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-adobe.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.translist,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-adobe.translist 30 Aug 2016 06:30:15 -0000
1.4
+++ proprietary/po/malware-adobe.translist 11 Nov 2017 06:31:40 -0000
1.5
@@ -3,6 +3,7 @@
value='<div id="translations">
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/proprietary/malware-adobe.en.html">English</a> [en]</span>
+<span dir="ltr"><a lang="de" hreflang="de"
href="/proprietary/malware-adobe.de.html">Deutsch</a> [de]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/proprietary/malware-adobe.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ja" hreflang="ja"
href="/proprietary/malware-adobe.ja.html">æ¥æ¬èª</a> [ja]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/proprietary/malware-adobe.ru.html">ÑÑÑÑкий</a> [ru]</span>
@@ -10,6 +11,7 @@
</div>' -->
<link rel="alternate" type="text/html" href="/proprietary/malware-adobe.html"
hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/malware-adobe.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/proprietary/malware-adobe.de.html" title="Deutsch" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/proprietary/malware-adobe.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ja" hreflang="ja"
href="/proprietary/malware-adobe.ja.html" title="æ¥æ¬èª" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/proprietary/malware-adobe.ru.html" title="ÑÑÑÑкий" />
Index: proprietary/po/malware-cars.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.translist,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/malware-cars.translist 7 Nov 2017 09:33:14 -0000
1.3
+++ proprietary/po/malware-cars.translist 11 Nov 2017 06:31:40 -0000
1.4
@@ -3,12 +3,14 @@
value='<div id="translations">
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/proprietary/malware-cars.en.html">English</a> [en]</span>
+<span dir="ltr"><a lang="de" hreflang="de"
href="/proprietary/malware-cars.de.html">Deutsch</a> [de]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/proprietary/malware-cars.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/proprietary/malware-cars.ru.html">ÑÑÑÑкий</a> [ru]</span>
</p>
</div>' -->
<link rel="alternate" type="text/html" href="/proprietary/malware-cars.html"
hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/malware-cars.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/proprietary/malware-cars.de.html" title="Deutsch" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/proprietary/malware-cars.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/proprietary/malware-cars.ru.html" title="ÑÑÑÑкий" />
<!-- end translist file -->
Index: proprietary/po/malware-games.translist
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.translist,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/malware-games.translist 31 Oct 2016 06:30:15 -0000
1.4
+++ proprietary/po/malware-games.translist 11 Nov 2017 06:31:40 -0000
1.5
@@ -3,6 +3,7 @@
value='<div id="translations">
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/proprietary/malware-games.en.html">English</a> [en]</span>
+<span dir="ltr"><a lang="de" hreflang="de"
href="/proprietary/malware-games.de.html">Deutsch</a> [de]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/proprietary/malware-games.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ja" hreflang="ja"
href="/proprietary/malware-games.ja.html">æ¥æ¬èª</a> [ja]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/proprietary/malware-games.ru.html">ÑÑÑÑкий</a> [ru]</span>
@@ -10,6 +11,7 @@
</div>' -->
<link rel="alternate" type="text/html" href="/proprietary/malware-games.html"
hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/malware-games.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/proprietary/malware-games.de.html" title="Deutsch" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/proprietary/malware-games.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ja" hreflang="ja"
href="/proprietary/malware-games.ja.html" title="æ¥æ¬èª" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/proprietary/malware-games.ru.html" title="ÑÑÑÑкий" />
Index: proprietary/po/potential-malware.translist
===================================================================
RCS file: /web/www/www/proprietary/po/potential-malware.translist,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary/po/potential-malware.translist 12 Sep 2017 10:05:40 -0000
1.3
+++ proprietary/po/potential-malware.translist 11 Nov 2017 06:31:40 -0000
1.4
@@ -3,12 +3,14 @@
value='<div id="translations">
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/proprietary/potential-malware.en.html">English</a> [en]</span>
+<span dir="ltr"><a lang="de" hreflang="de"
href="/proprietary/potential-malware.de.html">Deutsch</a> [de]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/proprietary/potential-malware.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ru" hreflang="ru"
href="/proprietary/potential-malware.ru.html">ÑÑÑÑкий</a> [ru]</span>
</p>
</div>' -->
<link rel="alternate" type="text/html"
href="/proprietary/potential-malware.html" hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/proprietary/potential-malware.en.html" title="English" />
+<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/proprietary/potential-malware.de.html" title="Deutsch" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/proprietary/potential-malware.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ru" hreflang="ru"
href="/proprietary/potential-malware.ru.html" title="ÑÑÑÑкий" />
<!-- end translist file -->
Index: proprietary/po/proprietary-insecurity.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-insecurity.de-en.html 25 Oct 2017 12:31:03
-0000 1.15
+++ proprietary/po/proprietary-insecurity.de-en.html 11 Nov 2017 06:31:40
-0000 1.16
@@ -36,6 +36,11 @@
<ul>
<li>
+ <p>Bad security in some cars makes it possible
+ to <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ remotely activate the airbags</a>.</p>
+</li>
+<li>
<p>A “smart” intravenous pump designed for
hospitals is connected to the internet. Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
@@ -546,7 +551,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/10/25 12:31:03 $
+$Date: 2017/11/11 06:31:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary/po/proprietary-insecurity.de.po 11 Nov 2017 06:06:47 -0000
1.97
+++ proprietary/po/proprietary-insecurity.de.po 11 Nov 2017 06:31:40 -0000
1.98
@@ -98,14 +98,14 @@
"org/cgi-bin/cvename.cgi?name=CVE-2017-14937\"> remotely activate the "
"airbags</a>."
msgstr ""
-"<ins><a href=\"https://www.spiegel.de/auto/aktuell/computerexperten-"
-"hacken-auto-software-a-914783.html\">âDer Schutz, den die Hersteller "
-"eingebaut haben, lasse sich bei Autos praktisch aller Massenhersteller "
-"binnen Sekunden knackenâ</a></ins> und ermöglicht <a href=\"https://cve."
-"mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937\" title=\"CVE-2017-14937, "
-"unter: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937 The "
-"MITRE Corporation 2017.\">den Airbag<ins> ‑ während der "
-"Fahrt ‑ </ins>aus der Ferne auszulösen</a>."
+"<ins><a href=\"https://www.spiegel.de/auto/aktuell/computerexperten-hacken-"
+"auto-software-a-914783.html\">âDer Schutz, den die Hersteller eingebaut "
+"haben, lasse sich bei Autos praktisch aller Massenhersteller binnen Sekunden "
+"knackenâ</a></ins> und ermöglicht <a href=\"https://cve.mitre.org/cgi-bin/"
+"cvename.cgi?name=CVE-2017-14937\" title=\"CVE-2017-14937, unter: https://cve."
+"mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937 The MITRE Corporation 2017."
+"\">den Airbag<ins> ‑ während der Fahrt ‑ </"
+"ins>aus der Ferne auszulösen</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary/po/proprietary-jails.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de-en.html,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary/po/proprietary-jails.de-en.html 8 May 2017 03:04:35 -0000
1.6
+++ proprietary/po/proprietary-jails.de-en.html 11 Nov 2017 06:31:40 -0000
1.7
@@ -1,11 +1,11 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.79 -->
+<!-- Parent-Version: 1.84 -->
<title>Proprietary Jails - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-jails.translist" -->
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Jails</h2>
-<p><a href="/philosophy/proprietary.html">Other examples of proprietary
malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a></p>
<p>Nonfree (proprietary) software is very often malware (designed to
mistreat the user). Nonfree software is controlled by its developers,
@@ -28,6 +28,29 @@
<ul>
+<li>
+<p>Apple <a
+href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
+deleted several VPNs from its app store for China</a>,
+thus using its own censorship power to strengthen that of the Chinese
+government.
+</p>
+</li>
+
+<li>
+<p>Apple is <a
+href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
+censoring apps for the US government too</a>. Specifically, it is deleting
+apps developed by Iranians.
+</p>
+
+<p>The root of these wrongs are in Apple.
+If Apple had not designed the iMonsters to let Apple censor
+applications,
+Apple would not have had the power to stop users from installing
+whatever kind of apps.</p>
+</li>
+
<li>
<p>Windows 10 S ought to be called Windows 10 J, for “Jail”:
<a
href="https://www.theguardian.com/technology/2017/may/03/windows-10-s-microsoft-faster-pc-comparison">only
programs from the Windows Store can be
@@ -232,7 +255,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/05/08 03:04:35 $
+$Date: 2017/11/11 06:31:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-en.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-surveillance.de-en.html 25 Oct 2017 12:31:03
-0000 1.25
+++ proprietary/po/proprietary-surveillance.de-en.html 11 Nov 2017 06:31:40
-0000 1.26
@@ -173,6 +173,15 @@
</div>
<ul>
+ <li><p>Windows 10 telemetry program sends information to Microsoft about the
+ user's computer and their use of the computer.</p>
+
+<p>Furthermore, for users who installed the fourth stable build of
+Windows 10, called the “Creators Update,” Windows maximized the
+surveillance <a
+href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
+by force setting the telemetry mode to “Full”</a>.</p></li>
+
<li><p>Windows DRM
files <a
href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can
be used to identify people browsing through Tor</a>. The
@@ -1490,7 +1499,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/10/25 12:31:03 $
+$Date: 2017/11/11 06:31:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary/po/proprietary-surveillance.de.po 11 Nov 2017 01:47:51
-0000 1.182
+++ proprietary/po/proprietary-surveillance.de.po 11 Nov 2017 06:31:40
-0000 1.183
@@ -1165,10 +1165,10 @@
"Quelle: <a href=\"https://www.apple.com/de/icloud/photos/\">Apple â iCloud
â "
"Fotos:</a>, unter: https://www.apple.com/de/icloud/photos. (abgerufen: "
"2015-09-24)<br />Das iCloud-Feature wird <a href=\"https://support.apple.com/"
-"en-us/HT202033\">beim Startvorgang von iOS aktiviert</a>. Der Begriff "
-"<em>âCloudâ</em> bzw. <em>âDatenwolkeâ</em> bedeutet soviel wie
<em>âBitte "
-"stellâ keine Fragen wo <ins>(meine Daten gespeichert und verarbeitet "
-"werden)</ins>â</em>."
+"en-us/HT202033\">beim Startvorgang von iOS aktiviert</a>. Der Begriff <em>"
+"âCloudâ</em> bzw. <em>âDatenwolkeâ</em> bedeutet soviel wie
<em>âBitte "
+"stellâ keine Fragen wo <ins>(meine Daten gespeichert und verarbeitet
werden)"
+"</ins>â</em>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -2375,8 +2375,8 @@
msgstr ""
"Mehr oder weniger alle <a href=\"//www.myce.com/news/reseachers-all-smart-"
"tvs-spy-on-you-sony-monitors-all-channel-switches-72851/\" title=\"Willem "
-"Aldershoff, Researchers: All Smart TVs spy on you, unter: myce.com 2014."
-"\">âSmartâ-TVs spionieren</a> Nutzer aus."
+"Aldershoff, Researchers: All Smart TVs spy on you, unter: myce.com 2014.\">"
+"âSmartâ-TVs spionieren</a> Nutzer aus."
#. type: Content of: <ul><li><p>
msgid "The report was as of 2014, but we don't expect this has got better."
@@ -2892,8 +2892,8 @@
"data-fbi-and-nsa/\" title=\"Microsoft openly offered cloud data to support "
"NSA PRISM programme, unter: itproportal.com 2014.\"><b>Microsoft SkyDrive</"
"b> ermöglicht der NSA die direkte Auswertung von Nutzerdaten</a>.<a href="
-"\"#tn08\" class=\"transnote\">[8]</a><a href=\"#tn09\" class=\"transnote"
-"\">[9]</a>"
+"\"#tn08\" class=\"transnote\">[8]</a><a href=\"#tn09\" class=\"transnote\">"
+"[9]</a>"
#. type: Content of: <div><h4>
msgid "Spyware in Chrome"
Index: thankgnus/2017supporters.de.html
===================================================================
RCS file: /web/www/www/thankgnus/2017supporters.de.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- thankgnus/2017supporters.de.html 31 Oct 2017 18:58:57 -0000 1.10
+++ thankgnus/2017supporters.de.html 11 Nov 2017 06:31:41 -0000 1.11
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE" value="/thankgnus/2017supporters.en.html" -->
<!--#include virtual="/server/header.de.html" -->
-<!-- Parent-Version: 1.83 -->
+<!-- Parent-Version: 1.84 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Danke, GNUs (2017) - GNU-Projekt - Free Software Foundation</title>
@@ -52,6 +52,13 @@
</h4>
<!-- Let's keep all lists in alphabetical order. Thanks. -->
+<ul>
+ <li>Bytemark</li>
+ <li>Markley Group</li>
+ <li>TowardEX</li>
+</ul>
+
+
<h4>
<a href="#TOCpatrons" id="patrons">Förderer (Gold)</a> (5.000 $ oder
mehr)</h4>
@@ -71,6 +78,7 @@
<li>Alain Brenzikofer</li>
<li>Alexey Eromenko</li>
<li>CÄtÄlin Frâncu</li>
+ <li>Colin Carr</li>
<li>CSATS Inc</li>
<li>Daniel Riek</li>
<li>Donald and Jill Knuth</li>
@@ -79,6 +87,7 @@
<li>Jeffrey Cliff</li>
<li>Marinos Yannikos</li>
<li>Puduvankunnil Udayakumar</li>
+ <li>René Genz</li>
<li>Robert Dionne</li>
<li>Seungwon Park</li>
<li>Sreeram Ramachandran</li>
@@ -94,6 +103,7 @@
<!-- Let's keep all lists in alphabetical order. Thanks. -->
<ul>
<li>Adam Klotblixt</li>
+ <li>Adam Ymeren</li>
<li>Alison Chaiken</li>
<li>Allen Curtis</li>
<li>Andrew Fox</li>
@@ -104,7 +114,9 @@
<li>Ben Simmonds</li>
<li>Bijan Soleymani</li>
<li>Brett Holleman</li>
+ <li>Charles Birk</li>
<li>Chase Kelley</li>
+ <li>Christopher Samuel</li>
<li>Conan Chiles</li>
<li>Colin Klingman</li>
<li>Daniel Hoodin</li>
@@ -136,8 +148,10 @@
<li>Pablo Adrian Nieto</li>
<li>Paul Eggert</li>
<li>Peter Kunze</li>
+ <li>Peter Rock</li>
<li>Philipp Weis</li>
<li>René Genz</li>
+ <li>Rich Haase</li>
<li>Richard Harlow</li>
<li>Salim Badakhchani</li>
<li>Sam Halliday</li>
@@ -146,8 +160,10 @@
<li>Shawn C (alias Citypw)</li>
<li>Stephanie Ogden</li>
<li>Steve Sprang</li>
- <li>Tyler Romeo</li>
+ <li>Tiago Vieira</li>
+ <li>Tom Gedra</li>
<li>Trevor Spiteri</li>
+ <li>Tyler Romeo</li>
<li>Valerio Poggi</li>
<li>Wade Brainerd</li>
<li>Xavier ALT</li>
@@ -259,7 +275,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2017/10/31 18:58:57 $
+$Date: 2017/11/11 06:31:41 $
<!-- timestamp end -->
</p>
Index: thankgnus/po/2017supporters.de-en.html
===================================================================
RCS file: /web/www/www/thankgnus/po/2017supporters.de-en.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- thankgnus/po/2017supporters.de-en.html 31 Oct 2017 18:58:58 -0000
1.9
+++ thankgnus/po/2017supporters.de-en.html 11 Nov 2017 06:31:41 -0000
1.10
@@ -1,5 +1,5 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.83 -->
+<!-- Parent-Version: 1.84 -->
<title>Thank GNUs, 2017
- GNU Project - Free Software Foundation</title>
@@ -47,6 +47,11 @@
</h4>
<!-- Let's keep all lists in alphabetical order. Thanks. -->
+<ul>
+ <li>Bytemark</li>
+ <li>Markley Group</li>
+ <li>TowardEX</li>
+</ul>
<h4>
@@ -71,6 +76,7 @@
<li>Alain Brenzikofer</li>
<li>Alexey Eromenko</li>
<li>CÄtÄlin Frâncu</li>
+ <li>Colin Carr</li>
<li>CSATS Inc</li>
<li>Daniel Riek</li>
<li>Donald and Jill Knuth</li>
@@ -79,6 +85,7 @@
<li>Jeffrey Cliff</li>
<li>Marinos Yannikos</li>
<li>Puduvankunnil Udayakumar</li>
+ <li>René Genz</li>
<li>Robert Dionne</li>
<li>Seungwon Park</li>
<li>Sreeram Ramachandran</li>
@@ -95,6 +102,7 @@
<!-- Let's keep all lists in alphabetical order. Thanks. -->
<ul>
<li>Adam Klotblixt</li>
+ <li>Adam Ymeren</li>
<li>Alison Chaiken</li>
<li>Allen Curtis</li>
<li>Andrew Fox</li>
@@ -105,7 +113,9 @@
<li>Ben Simmonds</li>
<li>Bijan Soleymani</li>
<li>Brett Holleman</li>
+ <li>Charles Birk</li>
<li>Chase Kelley</li>
+ <li>Christopher Samuel</li>
<li>Conan Chiles</li>
<li>Colin Klingman</li>
<li>Daniel Hoodin</li>
@@ -137,8 +147,10 @@
<li>Pablo Adrian Nieto</li>
<li>Paul Eggert</li>
<li>Peter Kunze</li>
+ <li>Peter Rock</li>
<li>Philipp Weis</li>
<li>René Genz</li>
+ <li>Rich Haase</li>
<li>Richard Harlow</li>
<li>Salim Badakhchani</li>
<li>Sam Halliday</li>
@@ -147,8 +159,10 @@
<li>Shawn C [ a.k.a “citypw”]</li>
<li>Stephanie Ogden</li>
<li>Steve Sprang</li>
- <li>Tyler Romeo</li>
+ <li>Tiago Vieira</li>
+ <li>Tom Gedra</li>
<li>Trevor Spiteri</li>
+ <li>Tyler Romeo</li>
<li>Valerio Poggi</li>
<li>Wade Brainerd</li>
<li>Xavier ALT</li>
@@ -221,7 +235,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/10/31 18:58:58 $
+$Date: 2017/11/11 06:31:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: proprietary/po/proprietary-insecurity.it-diff.html
diff -N proprietary/po/proprietary-insecurity.it-diff.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ proprietary/po/proprietary-insecurity.it-diff.html 11 Nov 2017 06:31:40
-0000 1.1
@@ -0,0 +1,573 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/proprietary/proprietary-insecurity.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.84 -->
+<title>Proprietary Insecurity
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/proprietary/po/proprietary-insecurity.translist"
-->
+<!--#include virtual="/server/banner.html" -->
+<h2>Proprietary Insecurity</h2>
+
+<a href="/proprietary/proprietary.html">Other examples of proprietary
malware</a>
+
+<p>Nonfree (proprietary) software is very often malware (designed to
+mistreat the user). Nonfree software is controlled by its developers,
+which puts them in a position of power over the users; <a
+href="/philosophy/free-software-even-more-important.html">that is the
+basic injustice</a>. The developers often exercise that power to the
+detriment of the users they ought to serve.</p>
+
+<p>This page lists clearly established cases of insecurity in
+proprietary software that has grave consequences or is otherwise
+noteworthy.</p>
+
+<p>It is incorrect to compare free software with a fictitious idea of
+proprietary software as perfect, but the press often implicitly does
+that whenever a security hole in a free program is discovered. The
+examples below show that proprietary software isn't perfect, and
+is often quite sloppy.</p>
+
+<p>It would be equally incorrect to compare proprietary software with
+a fictitious idea of free software as perfect. Every nontrivial
+program has bugs, and any system, free or proprietary, may have
+security errors. To err is human, and not culpable. But proprietary
+software developers frequently disregard gaping holes, or even
+introduce them deliberately. In any case, they keep users
+<em>helpless to fix any security problems that arise</em>.
Keeping the
+users helpless is what's culpable about proprietary software.</p>
+
+<ul>
+<span class="inserted"><ins><em><li>
+ <p>Bad security in some cars makes it possible
+ to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ remotely activate the airbags</a>.</p>
+</li>
+<li>
+ <p>A “smart” intravenous pump designed for
+ hospitals is connected to the internet. Naturally <a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its security has been cracked</a>.</p>
+ <p>Note that this article misuses the term <a
+href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ referring to crackers.</p>
+</li>
+<li>
+ <p>The bad security in many Internet of Stings devices
+ allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people that use them</a>.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
+ <p>It is unfortunate that the article uses the term <a
+ href="/philosophy/words-to-avoid.html#Monetize">
+ “monetize”</a>.</p>
+</li>
+<li>
+ <p>Siri, Alexa, and all the other voice-control systems can be
+ <a
+href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
+ hijacked by programs that play commands in ultrasound that humans can't
+ hear</a>.</p>
+</li></em></ins></span>
+
+<li id="break-security-smarttv">
+ <p><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart”
TV</a> and use its camera
+ to watch the people who are watching TV.</p>
+</li>
+<li>
+ <p>Many models of Internet-connected cameras <a
+ href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
+ have backdoors</a>.</p>
+
+ <p>That is a malicious functionality, but in addition it is a gross
+ insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into
+ users' cameras</a>.</p>
+
+</li>
+
+<li>
+ <p>
+ Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+ pre-installed on 28 models of HP laptops logged the user's
+ keystroke to a file in the filesystem. Any process with access to
+ the filesystem or the MapViewOfFile API could gain access to the
+ log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
+ to modzero</a> the “information-leak via Covert Storage
+ Channel enables malware authors to capture keystrokes without
+ taking the risk of being classified as malicious task by AV
+ heuristics”.
+ </p>
+</li>
+<li>
+<p>The proprietary code that runs pacemakers, insulin pumps, and other
+medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross security faults</a>.</p>
+</li>
+
+
+<li>
+ <p>Exploits of bugs in Windows, which were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to
+ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p>
+</li>
+
+<li id="intel-me-10-year-vulnerability">
+ <p>Intel's CPU backdoor—the Intel Management Engine—had a
+ <a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
+ vulnerability for 10 years</a>.</p>
+
+ <p>The vulnerability allowed a cracker to access the computer's Intel
Active
+ Management Technology
+ (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
+ web interface with an empty password and gave administrative
+ access</a> to access the computer's keyboard, mouse, monitor
+ among other privileges.</p>
+
+ <p>It does not help that in newer Intel processors, it is
impossible
+ to turn off the Intel Management Engine. Thus, even users who are
+ proactive about their security can do nothing to protect themselves
+ besides using machines that don't come with the backdoor.</p>
+
+</li>
+
+<li>
+ <p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+ can be hijacked through their Wi-Fi chips</a> because of a bug in
+ Broadcom's non-free firmware.</p>
+</li>
+
+<li>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
+<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to the Internet,
+its security is crap</a>.</p>
+
+<p>For example, a cracker can gain access to the dishwasher's
filesystem,
+infect it with malware, and force the dishwasher to launch attacks on other
+devices in the network. Since these dishwashers are used in hospitals, such
+attacks could potentially put hundreds of lives at risk.</p>
+
+</li>
+<li><p>WhatsApp has a feature that
+ <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
+ has been described as a “back door”</a>
+ because it would enable governments to nullify its encryption.</p>
+ <p>The developers say that it wasn't intended as a back door, and that
+ may well be true. But that leaves the crucial question of whether it
+ functions as one. Because the program is nonfree, we cannot check by
+ studying it.</p></li>
+
+<li>
+<p>The “smart” toys My Friend Cayla and i-Que can be
+<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access
+is not necessary. This would enable crackers to listen in on a child's
+conversations, and even speak into the toys themselves.</p>
+
+<p>This means a burglar could speak into the toys and ask the child to
+unlock the front door while Mommy's not looking.</p>
+</li>
+
+<li>
+<p>The mobile apps for
+communicating <a
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+a smart but foolish car have very bad security</a>.</p>
+
+<p>This is in addition to the fact that the car contains a cellular
+modem that tells big brother all the time where it is. If you own
+such a car, it would be wise to disconnect the modem so as to turn off
+the tracking.</p>
+</li>
+
+<li>
+<p>If you buy a used “smart” car, house, TV, refrigerator,
+etc.,
+usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+previous owners can still remotely control it</a>.</p>
+</li>
+
+<li>
+<p>Samsung
+phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
+a security hole that allows an SMS message to install
+ransomeware</a>.</p>
+</li>
+
+<li>
+<p>4G LTE phone networks are drastically insecure. They can be
+<a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
+taken
+over by third parties and used for man-in-the-middle
attacks</a>.</p>
+</li>
+
+<li>
+<p>Due to weak security, <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+is easy to open the doors of 100 million cars built by
Volkswagen</a>.</p>
+</li>
+
+<li>
+<p>Ransomware <a
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
+been developed for a thermostat that uses proprietary
software</a>.</p>
+</li>
+
+<li>
+<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
+Internet Explorer and Edge</a> allows an attacker to retrieve
+Microsoft account credentials, if the user is tricked into visiting a
+malicious link.</p>
+</li>
+
+<li>
+<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
+WhatsApp messages are not entirely deleted</a>. They can be recovered
+in various ways.
+</p>
+</li>
+
+<li>
+<p>A vulnerability in Apple's Image I/O API allowed an attacker to
+<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this API to render a
+ certain kind of image file</a>.</p>
+</li>
+<li>
+<p>A bug in a proprietary ASN.1 library, used in cell phone towers as
+well as cell phones and
+routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+taking control of those systems</a>.</p>
+</li>
+
+<li>
+<p>Antivirus programs have so many errors
+ that <a
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
+ may make security worse</a>.</p>
+<p>GNU/Linux does not need antivirus software.</p>
+</li>
+
+<li>
+<p>Over 70 brands of network-connected surveillance
+cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
+security bugs that allow anyone to watch through them</a>.</p>
+</li>
+
+<li>
+<p>
+Samsung's “Smart Home” has a big security
+hole; <a
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">unauthorized
+people can remotely control it</a>.</p>
+
+<p>Samsung claims that this is an “open” platform so the
+problem is partly the fault of app developers. That is clearly true if
+the apps are proprietary software.</p>
+
+<p>Anything whose name is “Smart” is most likely going to
+screw you.</p>
+</li>
+
+<li>
+<p>
+The Nissan Leaf has a built-in cell phone modem which allows
+effectively
+anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
+access its computers remotely and make changes in various
+settings</a>.</p>
+
+<p>That's easy to do because the system has no authentication when
+accessed through the modem. However, even if it asked for
+authentication, you couldn't be confident that Nissan has no
+access. The software in the car is
+proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
+means it demands blind faith from its users</a>.</p>
+
+<p>Even if no one connects to the car remotely, the cell phone modem
+enables the phone company to track the car's movements all the time;
+it is possible to physically remove the cell phone modem though.</p>
+</li>
+
+<li>
+<p>
+Malware found
+on <a
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
+cameras available through Amazon</a>.
+</p>
+
+<p>A camera that records locally on physical media, and has no network
+ connection, does not threaten people with surveillance—neither by
+ watching people through the camera, nor through malware in the camera.
+</p>
+</li>
+
+<li>
+<p>A bug in the iThings Messages
+app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
+a malicious web site to extract all the user's messaging history</a>.
+</p>
+</li>
+
+<li>
+<p>Many proprietary payment apps <a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
+transmit personal data in an insecure way</a>.
+However, the worse aspect of these apps is that
+<a href="/philosophy/surveillance-vs-democracy.html">payment is not
anonymous</a>.
+</p>
+</li>
+
+<li>
+<p>
+FitBit fitness trackers <a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+have a Bluetooth vulnerability</a> that allows
+attackers to send malware to the devices, which can subsequently spread
+to computers and other FitBit trackers that interact with them.
+</p>
+</li>
+
+<li>
+<p>
+“Self-encrypting” disk drives do the encryption with proprietary
+firmware so you can't trust it. Western Digital's “My Passport”
+drives
+<a
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
+</p>
+</li>
+
+<li>
+<p>
+Mac OS X had an
+<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local back door for 4 years</a>, which could be
+exploited by attackers to gain root privileges.
+</p>
+</li>
+
+<li>
+<p>Security researchers discovered a
+<a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
+vulnerability in diagnostic dongles used for vehicle tracking and
+insurance</a> that let them take remote control of a car or
+lorry using an SMS.
+</p>
+</li>
+
+<li>
+<p>
+Crackers were able to
+<a
href="http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/">take
remote control of the Jeep</a>
+“connected car”.
+<br/>They could track the car, start or stop the engine, and
+activate or deactivate the brakes, and more.
+</p>
+<p>
+I expect that Chrysler and the NSA can do this too.
+</p>
+<p>
+If I ever own a car, and it contains a portable phone, I will
+deactivate that.
+</p>
+</li>
+
+<li>
+<p>
+Hospira infusion pumps, which are used to administer drugs to
+a patient, were rated
+“<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+secure IP device I've ever seen</a>”
+by a security researcher.
+</p>
+<p>
+Depending on what drug is being infused, the insecurity could
+open the door to murder.
+</p>
+</li>
+
+<li>
+<p>
+Due to bad security in a drug pump, crackers could use it to
+<a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
+</p>
+</li>
+
+<li>
+<p>
+<a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+The NSA can tap data in smart phones, including iPhones, Android, and
+BlackBerry</a>. While there is not much detail here, it seems that
+this does not operate via the universal back door that we know nearly
+all portable phones have. It may involve exploiting various bugs.
+There
+are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+lots of bugs in the phones' radio software</a>.
+</p>
+</li>
+
+<li>
+<p><a
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+“Smart homes”</a> turn out to be stupidly vulnerable to
+intrusion.</p>
+</li>
+
+<li>
+<p>The
+<a
href="http://arstechnica.com/security/2014/02/crypto-weaknesses-in-whatsapp-the-kind-of-stuff-the-nsa-would-love/">insecurity
of WhatsApp</a>
+makes eavesdropping a snap.</p>
+</li>
+
+<li>
+<p><a
href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+The FTC punished a company for making webcams with bad security so
+that it was easy for anyone to watch them</a>.
+</p>
+</li>
+
+<li>
+<p><a
href="http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/">
+It is possible to take control of some car computers through malware
+in music files</a>.
+Also <a
href="http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0">by
+radio</a>. Here is <a href="http://www.autosec.org/faq.html">more
+information</a>.
+</p>
+</li>
+
+<li>
+<p><a
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+It is possible to kill people by taking control of medical implants by
+radio</a>. Here
+is <a href="http://www.bbc.co.uk/news/technology-17631838">more
+information</a>. And <a
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
+</p>
+</li>
+
+<li>
+<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>, and it can be fatal.
+</p>
+</li>
+
+<li>
+<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows were taken over and turned
+into a botnet for the purpose of collecting customers' credit card
+numbers</a>.
+</p>
+</li>
+
+<li>
+<p>An app to prevent “identity theft” (access to personal
data)
+by storing users' data on a special server
+<a
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
+deactivated by its developer</a> which had discovered a security flaw.
+</p>
+
+<p>
+That developer seems to be conscientious about protecting personal
+data from third parties in general, but it can't protect that data
+from the state. Quite the contrary: confiding your data to someone
+else's server, if not first encrypted by you with free software,
+undermines your rights.
+</p>
+</li>
+
+<li>
+<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some flash
+memories have modifiable software</a>, which makes them vulnerable to
+viruses.</p>
+
+<p>We don't call this a “back door” because it is normal
+that you can install a new system in a computer given physical access
+to it. However, memory sticks and cards should not be modifiable in
+this way.</p>
+</li>
+
+<li>
+<p><a href="http://spritesmods.com/?art=hddhack&page=6">
Replaceable
+nonfree software in disk drives can be written by a nonfree
+program.</a> This makes any system vulnerable to persistent attacks
+that normal forensics won't detect.</p>
+</li>
+
+<li>
+<p><a
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+Many smartphone apps use insecure authentication methods when storing
+your personal data on remote servers.</a>
+This leaves personal information like email addresses, passwords, and health
information vulnerable. Because many
+of these apps are proprietary it makes it hard to impossible to know which
apps are at risk.</p>
+</li>
+
+</ul>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a
href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2013, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International
License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2017/11/11 06:31:40 $
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+</body>
+</html>
+</pre></body></html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www gnu/po/why-programs-should-be-shared.transl...,
GNUN <=