[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/categories.es.html philosophy/su...
From: |
GNUN |
Subject: |
www philosophy/categories.es.html philosophy/su... |
Date: |
Wed, 17 Jan 2018 12:02:55 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/01/17 12:02:54
Modified files:
philosophy : categories.es.html
surveillance-vs-democracy.ru.html
proprietary : malware-mobiles.ru.html
proprietary-back-doors.fr.html
proprietary-back-doors.ru.html
proprietary-subscriptions.fr.html
proprietary-subscriptions.ru.html
proprietary-surveillance.fr.html
proprietary-surveillance.ru.html
proprietary.es.html proprietary.fr.html
proprietary.ru.html
proprietary/po : malware-mobiles.ru-en.html
proprietary-back-doors.fr-en.html
proprietary-back-doors.ru-en.html
proprietary-back-doors.ru.po
proprietary-subscriptions.fr-en.html
proprietary-subscriptions.ru-en.html
proprietary-subscriptions.ru.po
proprietary-surveillance.fr-en.html
proprietary-surveillance.it-diff.html
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ru-en.html
proprietary-surveillance.ru.po
proprietary.es-en.html proprietary.es.po
proprietary.fr-en.html proprietary.ja-diff.html
proprietary.pl-diff.html proprietary.ru-en.html
proprietary.ru.po
server : sitemap.ar.html sitemap.de.html sitemap.es.html
sitemap.fr.html sitemap.it.html sitemap.ja.html
sitemap.nl.html sitemap.ro.html sitemap.ru.html
sitemap.sq.html sitemap.uk.html
server/po : sitemap.fr-en.html sitemap.ja.po
sitemap.ru-en.html sitemap.sq.po sitemap.uk.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/categories.es.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/surveillance-vs-democracy.ru.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.fr.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.ru.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr-en.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru-en.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.98&r2=1.99
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.332&r2=1.333
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ar.html?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.de.html?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.es.html?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.fr.html?cvsroot=www&r1=1.373&r2=1.374
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.it.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ja.html?cvsroot=www&r1=1.323&r2=1.324
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.nl.html?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ro.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.ru.html?cvsroot=www&r1=1.318&r2=1.319
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.sq.html?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.uk.html?cvsroot=www&r1=1.277&r2=1.278
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.fr-en.html?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.ja.po?cvsroot=www&r1=1.334&r2=1.335
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.ru-en.html?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.sq.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.uk.po?cvsroot=www&r1=1.317&r2=1.318
Patches:
Index: philosophy/categories.es.html
===================================================================
RCS file: /web/www/www/philosophy/categories.es.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- philosophy/categories.es.html 14 Jan 2018 10:01:22 -0000 1.53
+++ philosophy/categories.es.html 17 Jan 2018 17:02:50 -0000 1.54
@@ -21,9 +21,9 @@
<p>Véase también el artÃculo <a
href="/philosophy/words-to-avoid.html">Palabras
y frases confusas que vale la pena evitar</a>.</p>
-<!-- GNUN: localize URL /philosophy/category.png -->
+<!-- GNUN: localize URL /philosophy/category.es.png -->
<p id="diagram" class="c">
-<img src="/philosophy/category.png" alt="[CategorÃas de software]" />
+<img src="/philosophy/category.es.png" alt="[CategorÃas de software]" />
</p>
<p>Este diagrama, diseñado originalmente por Chao-Kuei y actualizado
desde
@@ -456,7 +456,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2018/01/14 10:01:22 $
+$Date: 2018/01/17 17:02:50 $
<!-- timestamp end -->
</p>
Index: philosophy/surveillance-vs-democracy.ru.html
===================================================================
RCS file: /web/www/www/philosophy/surveillance-vs-democracy.ru.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- philosophy/surveillance-vs-democracy.ru.html 13 Jan 2018 17:00:33
-0000 1.34
+++ philosophy/surveillance-vs-democracy.ru.html 17 Jan 2018 17:02:52
-0000 1.35
@@ -17,7 +17,7 @@
-->
</style>
-<!-- GNUN: localize URL /graphics/dog.small.jpg -->
+<!-- GNUN: localize URL /graphics/dog.small.ru.jpg -->
<!--#include virtual="/philosophy/po/surveillance-vs-democracy.translist" -->
<!--#include virtual="/server/banner.ru.html" -->
<h2 class="center">СколÑко Ñлежки Ð¼Ð¾Ð¶ÐµÑ Ð²ÑдеÑжаÑÑ
демокÑаÑиÑ?</h2>
@@ -34,7 +34,7 @@
<div id="intro">
<div class="pict wide">
<a href="/graphics/dog.html">
-<img src="/graphics/dog.small.jpg" alt="ÐаÑикаÑÑÑа: Ñобака Ñ
Ñдивлением ÑмоÑÑÐ¸Ñ Ð½Ð° ÑекламÑ, вÑÑкоÑивÑÑÑ
на ÑкÑане ее
+<img src="/graphics/dog.small.ru.jpg" alt="ÐаÑикаÑÑÑа: Ñобака
Ñ Ñдивлением ÑмоÑÑÐ¸Ñ Ð½Ð° ÑекламÑ,
вÑÑкоÑивÑÑÑ Ð½Ð° ÑкÑане ее
компÑÑÑеÑа" /></a>
<p>“Ðак они Ñзнали, ÑÑо Ñ —
Ñобака?”</p>
</div>
@@ -628,7 +628,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/01/13 17:00:33 $
+$Date: 2018/01/17 17:02:52 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/malware-mobiles.ru.html 12 Sep 2017 09:04:57 -0000 1.35
+++ proprietary/malware-mobiles.ru.html 17 Jan 2018 17:02:52 -0000 1.36
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE" value="/proprietary/malware-mobiles.en.html" -->
<!--#include virtual="/server/header.ru.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
- ÐÑÐ¾ÐµÐºÑ GNU - Фонд Ñвободного
@@ -40,6 +40,47 @@
</p>
</div>
+<div class="highlight-para">
+<p>ÐоÑÑи вÑе мобилÑнÑе ÑелеÑÐ¾Ð½Ñ Ð¿ÑиÑинÑÑÑ
две ÑеÑÑезнÑÑ
неÑпÑаведливоÑÑи Ñвоим
+полÑзоваÑелÑм: оÑÑлеживаÑÑ Ð¸Ñ
пеÑемеÑениÑ
и пÑоÑлÑÑиваÑÑ Ð¸Ñ
пеÑеговоÑÑ. ÐоÑ
+поÑÐµÐ¼Ñ Ð¼Ñ Ð½Ð°Ð·Ñваем иÑ
“меÑÑой
СÑалина”.</p>
+</div>
+
+<ul>
+ <li><p>ТелеÑÐ¾Ð½Ð½Ð°Ñ ÑеÑÑ <a
+href="https://ssd.eff.org/en/module/problem-mobile-phones">
оÑÑлеживаеÑ
+пеÑемеÑÐµÐ½Ð¸Ñ ÐºÐ°Ð¶Ð´Ð¾Ð³Ð¾ ÑелеÑона</a>.</p>
+ <p>ÐÑо заложено в ÑÑ
еме ÑелеÑонной ÑеÑи:
пока ÑелеÑон ÑвÑзÑваеÑÑÑ Ñ ÑеÑÑÑ,
+помеÑаÑÑ ÑеÑи запиÑÑваÑÑ ÐµÐ³Ð¾
меÑÑоположение невозможно. Ðногие ÑÑÑанÑ
(в Ñом
+ÑиÑле СШРи ÐвÑоÑоÑз) ÑÑебÑÑÑ, ÑÑÐ¾Ð±Ñ ÑеÑÑ Ñ
Ñанила ÑÑи даннÑе о
+меÑÑоположении в ÑеÑение меÑÑÑев или
леÑ.</p>
+ </li>
+ <li><p id="universal-back-door">РкоммÑникаÑионном
пÑоÑеÑÑоÑе поÑÑи лÑбого ÑелеÑона еÑÑÑ
ÑнивеÑÑалÑнÑй
+ÑеÑнÑй Ñ
од, коÑоÑÑй <a
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ÑаÑÑо пÑименÑеÑÑÑ, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑÑавиÑÑ
ÑелеÑон пеÑедаваÑÑ Ð²Ñе ÑазговоÑÑ, коÑоÑÑе
+он ÑлÑÑиÑ</a>.</p>
+ <p>Ðазейка <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">можеÑ
+пÑинимаÑÑ ÑоÑÐ¼Ñ Ð¾Ñибок, коÑоÑÑе оÑÑаÑÑÑÑ
неиÑпÑавленнÑми по 20
+леÑ</a>. РеÑение оÑÑавиÑÑ Ð¿ÑоÑеÑ
и в заÑиÑе
незаделаннÑми нÑавÑÑвенно
+ÑквиваленÑно напиÑÐ°Ð½Ð¸Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ¸.</p>
+ <p>Ðазейка наÑ
одиÑÑÑ Ð² “модемном
пÑоÑеÑÑоÑе”, коÑоÑÑй оÑвеÑÐ°ÐµÑ Ð·Ð°
+ÑвÑÐ·Ñ Ñ ÑадиоÑеÑÑÑ. РболÑÑинÑÑве
ÑелеÑонов модемнÑй пÑоÑеÑÑÐ¾Ñ ÐºÐ¾Ð½ÑÑолиÑÑеÑ
+ÑабоÑÑ Ð¼Ð¸ÐºÑоÑона. РболÑÑинÑÑве ÑелеÑонов
он Ð¼Ð¾Ð¶ÐµÑ Ð¿ÐµÑепиÑÑваÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¸
+в главном пÑоÑеÑÑоÑе.</p>
+ <p>ÐÑÑÑ Ð¼Ð¾Ð´ÐµÐ»Ð¸ ÑелеÑонов, ÑпеÑиалÑно
ÑпÑоекÑиÑованнÑе, ÑÑÐ¾Ð±Ñ Ð¼Ð¸ÐºÑоÑон не
+конÑÑолиÑовалÑÑ Ð¼Ð¾Ð´ÐµÐ¼Ð½Ñм пÑоÑеÑÑоÑом и
ÑÑÐ¾Ð±Ñ Ð¾Ð½ не мог изменÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð²
+главном пÑоÑеÑÑоÑе. Ðазейка в ниÑ
еÑÑÑ, но
по кÑайней меÑе Ñ ÐµÐµ помоÑÑÑ
+невозможно пÑевÑаÑиÑÑ ÑелеÑон в
подÑлÑÑиваÑÑее ÑÑÑÑойÑÑво.</p>
+ <p>УнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, оÑевидно,
пÑименÑеÑÑÑ Ñакже, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑÑавлÑÑÑ
+ÑелеÑÐ¾Ð½Ñ <a
+href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+пеÑедаваÑÑ, даже когда они вÑклÑÑенÑ</a>.
ÐÑо знаÑиÑ, ÑÑо иÑ
пеÑемеÑениÑ
+оÑÑлеживаÑÑÑÑ, а возможно, вклÑÑаеÑÑÑ Ð¸
пÑоÑлÑÑивание.</p>
+ </li>
+</ul>
+
<p>ÐдеÑÑ Ð¿ÑиводÑÑÑÑ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм на мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
. См. Ñакже опиÑание
вÑедоноÑнÑÑ
ÑÑнкÑий, Ñ
аÑакÑеÑнÑÑ
длÑ
ай-ÑÑÑÑек, на <a
href="/proprietary/malware-apple.html">ÑÑÑаниÑе о
@@ -72,16 +113,9 @@
<h3 id="back-doors">Ðазейки</h3>
<ul>
<li>
- <p>УнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од в мобилÑнÑÑ
ÑелеÑонаÑ
<a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
-задейÑÑвÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑоÑлÑÑÐ¸Ð²Ð°Ð½Ð¸Ñ ÑеÑез иÑ
микÑоÑонÑ</a>.</p>
- <p><a
-href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-РболÑÑинÑÑве мобилÑнÑÑ
ÑелеÑонов еÑÑÑ
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>, коÑоÑÑй
-пÑименÑли Ð´Ð»Ñ Ð¿ÑевÑаÑÐµÐ½Ð¸Ñ Ð¸Ñ
во
вÑедоноÑнÑе ÑÑÑÑойÑÑва.</p>
- <p>ÐодÑобноÑÑи <a
-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">о
-пÑиÑоде ÑÑой лазейки</a>.</p>
+ <p>ÐÑÑе опиÑана <a
href="#universal-back-door">ÑнивеÑÑалÑÐ½Ð°Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°</a>,
+коÑоÑÐ°Ñ ÐµÑÑÑ Ð¿Ð¾ ÑÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
и коÑоÑÐ°Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑеÑ
+пÑевÑаÑаÑÑ Ð¸Ñ
в ÑÑаÑнÑе подÑлÑÑиваÑÑие
ÑÑÑÑойÑÑва.</p>
</li>
<li><p><a
@@ -98,15 +132,17 @@
<li>
<p>Ð Android <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
-Ñ Google еÑÑÑ ÑеÑнÑй Ñ
од Ð´Ð»Ñ ÑдалениÑ
пÑогÑамм по ÑеÑи</a> (в пÑогÑамме под
-названием GTalkService).
+Ñ Google еÑÑÑ ÑеÑнÑй Ñ
од Ð´Ð»Ñ ÑдалениÑ
пÑогÑамм по ÑеÑи</a>. (ÐÑогÑамма
+назÑвалаÑÑ GTalkService, но кажеÑÑÑ, ее
обÑединили Ñ Google Play.)
</p>
-<p>Google Ð¼Ð¾Ð¶ÐµÑ Ñакже Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ GTalkService (коÑоÑаÑ
Ñо вÑемени напиÑаниÑ
-ÑÑаÑÑи, кажеÑÑÑ, бÑла обÑединена Ñ Google Play) <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-пÑинÑдиÑелÑно ÑÑÑанавливаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾
ÑеÑи</a>. ÐÑо Ð²Ð²Ð¾Ð´Ð¸Ñ Ð¿ÑакÑиÑеÑки
-ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од. </p>
+ <p>
+ Google Ð¼Ð¾Ð¶ÐµÑ Ñакже <a
+href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+пÑинÑдиÑелÑно ÑÑÑанавливаÑÑ Ð¿ÑиложениÑ
по ÑеÑи</a> ÑеÑез Google Play. ÐÑо не
+ÑквиваленÑно ÑнивеÑÑалÑной лазейке, но
позволÑÐµÑ Ð¿ÑоделÑваÑÑ ÑазлиÑнÑе
+гÑÑзнÑе ÑÑÑки.
+ </p>
<p>
ХоÑÑ <em>оÑÑÑеÑÑвление</em> ÑÑой влаÑÑи
компанией Google до ÑиÑ
Ð¿Ð¾Ñ Ð½Ðµ бÑло
@@ -527,7 +563,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation,
Inc.</p>
<p>ÐÑо пÑоизведение доÑÑÑпно по <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.ru">лиÑензии
@@ -547,7 +583,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/09/12 09:04:57 $
+$Date: 2018/01/17 17:02:52 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/proprietary-back-doors.fr.html 25 Dec 2017 20:29:12 -0000
1.40
+++ proprietary/proprietary-back-doors.fr.html 17 Jan 2018 17:02:52 -0000
1.41
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-back-doors.en.html" -->
<!--#include virtual="/server/header.fr.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Portes dérobées du logiciel privateur - Projet GNU - Free Software
@@ -31,7 +31,7 @@
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">porte
dérobée universelle</a>. Même si ce produit, tel qu'il est livré, n'est pas
utilisable comme appareil d'écoute, il pourrait sûrement le devenir après
-une modification du code.</p>
+une modification à distance du code.</p>
</li>
<li>
@@ -125,17 +125,30 @@
le contrôle total de la machine en réclamant sans arrêt un mot de passe
administrateur</a>.</p>
</li>
- <li>
- <p>La porte dérobée universelle des téléphones portables <a
-href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">est
-utilisée pour écouter à travers leur micro</a>.</p>
- <p>La plupart des téléphones possèdent cette porte dérobée
universelle, qui a
-été utilisée pour <a
-href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">les
-rendre malfaisants</a>.</p>
- <p>Plus d'info sur <a
-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">la
-nature de ce problème</a>.</p>
+ <li><p id="universal-back-door">Chacun, ou presque, des processeurs de
communication utilisés en téléphonie
+a une porte dérobée universelle qui est <a
+href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">souvent
+employée pour forcer le téléphone à transmettre toutes les conversations
+qu'il entend</a>.</p>
+ <p>Cette porte dérobée <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">peut
+prendre la forme de bogues qui sont restées non corrigées pendant 20
+ans</a>. Le choix de laisser ces failles de sécurité en place est
+l'équivalent moral de la création d'une porte dérobée.</p>
+ <p>La porte dérobée est dans le « processeur du modem », dont le
rôle est de
+communiquer avec le réseau hertzien. Dans la plupart des téléphones, le
+processeur du modem a le contrôle du micro et en général il a aussi la
+capacité de réécrire le logiciel du processeur principal.</p>
+ <p>Quelques modèles de téléphone sont spécialement conçus pour que le
+processeur du modem ne contrôle pas le micro et par conséquent ne puisse pas
+changer le logiciel du processeur principal. Ils ont tout de même une porte
+dérobée, mais au moins elle est incapable de transformer le téléphone en
+appareil d'écoute.</p>
+ <p>Il semble que la porte dérobée universelle soit également utilisée
pour
+forcer les téléphones à <a
+href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">transmettre
+même quand ils sont éteints</a>. Cela signifie que leurs mouvements sont
+suivis et que la fonction d'écoute peut être rendue opérante.</p>
</li>
<li><p><a
@@ -285,26 +298,21 @@
vous devez avoir le droit de décider si vous voulez faire confiance Ã
quelqu'un pour cela, et à qui.
</p>
-
-<p>
-Comme le montrent ces pages, si vous voulez débarrasser votre ordinateur des
-logiciels malveillants, le premier à éliminer est Windows ou iOS.
-</p>
</li>
<li>
<p>Dans Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">Google
a une porte dérobée qui lui permet de supprimer des applications Ã
-distance</a> (elle est dans un programme appelé GTalkService).
+distance</a> (elle est dans un programme appelé GTalkService qui semble,
+depuis la parution de cet article, avoir été intégré à Google Play).
</p>
<p>
-Via GTalkService, Google peut aussi <a
+Google peut aussi <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">installer
-des applis, de force et à distance</a> (ce service semble avoir fusionné
-avec Google Play depuis la parution de cet article). Ce n'est pas
-l'équivalent d'une porte dérobée universelle, mais cela rend possibles
+des applis, de force et à distance</a> au moyen de GTalkService. Ce n'est
+pas l'équivalent d'une porte dérobée universelle, mais cela rend possibles
divers mauvais coups.
</p>
@@ -465,7 +473,7 @@
href="/server/standards/README.translations.html">guide de traduction</a>.</p>
</div>
-<p>Copyright © 2014-2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2018 Free Software Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -483,7 +491,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/12/25 20:29:12 $
+$Date: 2018/01/17 17:02:52 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/proprietary-back-doors.ru.html 25 Dec 2017 16:28:46 -0000
1.39
+++ proprietary/proprietary-back-doors.ru.html 17 Jan 2018 17:02:52 -0000
1.40
@@ -1,7 +1,7 @@
<!--#set var="ENGLISH_PAGE"
value="/proprietary/proprietary-back-doors.en.html" -->
<!--#include virtual="/server/header.ru.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
<!-- This file is automatically generated by GNUnited Nations! -->
<title>Ðазейки в неÑвободнÑÑ
пÑогÑаммаÑ
-
ÐÑÐ¾ÐµÐºÑ GNU - Фонд Ñвободного пÑогÑаммного
@@ -30,7 +30,7 @@
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>. ÐÑли пÑодÑÐºÑ Ð²
Ñом виде, в каком он
поÑÑавлÑеÑÑÑ, не дейÑÑвÑÐµÑ ÐºÐ°Ðº
подÑлÑÑиваÑÑее ÑÑÑÑойÑÑво, Ñо изменение
-пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°Ð²ÐµÑнÑка Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑевÑаÑиÑÑ ÐµÐ³Ð¾
в Ñакое ÑÑÑÑойÑÑво.</p>
+пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾ ÑеÑи навеÑнÑка можеÑ
пÑевÑаÑиÑÑ ÐµÐ³Ð¾ в Ñакое ÑÑÑÑойÑÑво.</p>
</li>
<li>
@@ -119,17 +119,29 @@
беÑÐµÑ Ð¼Ð°ÑÐ¸Ð½Ñ Ð¿Ð¾Ð´ Ñвой полнÑй конÑÑолÑ,
поÑÑоÑнно запÑаÑÐ¸Ð²Ð°Ñ Ñ Ð¿Ð¾Ð»ÑзоваÑелÑ
паÑÐ¾Ð»Ñ ÑиÑÑемного админиÑÑÑаÑоÑа</a>.</p>
</li>
- <li>
- <p>УнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од в мобилÑнÑÑ
ÑелеÑонаÑ
<a
+ <li><p id="universal-back-door">РкоммÑникаÑионном
пÑоÑеÑÑоÑе поÑÑи лÑбого ÑелеÑона еÑÑÑ
ÑнивеÑÑалÑнÑй
+ÑеÑнÑй Ñ
од, коÑоÑÑй <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
-задейÑÑвÑеÑÑÑ Ð´Ð»Ñ Ð¿ÑоÑлÑÑÐ¸Ð²Ð°Ð½Ð¸Ñ ÑеÑез иÑ
микÑоÑонÑ</a>.</p>
- <p><a
+ÑаÑÑо пÑименÑеÑÑÑ, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑÑавиÑÑ
ÑелеÑон пеÑедаваÑÑ Ð²Ñе ÑазговоÑÑ, коÑоÑÑе
+он ÑлÑÑиÑ</a>.</p>
+ <p>Ðазейка <a
+href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">можеÑ
+пÑинимаÑÑ ÑоÑÐ¼Ñ Ð¾Ñибок, коÑоÑÑе оÑÑаÑÑÑÑ
неиÑпÑавленнÑми по 20
+леÑ</a>. РеÑение оÑÑавиÑÑ Ð¿ÑоÑеÑ
и в заÑиÑе
незаделаннÑми нÑавÑÑвенно
+ÑквиваленÑно напиÑÐ°Ð½Ð¸Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ¸.</p>
+ <p>Ðазейка наÑ
одиÑÑÑ Ð² “модемном
пÑоÑеÑÑоÑе”, коÑоÑÑй оÑвеÑÐ°ÐµÑ Ð·Ð°
+ÑвÑÐ·Ñ Ñ ÑадиоÑеÑÑÑ. РболÑÑинÑÑве
ÑелеÑонов модемнÑй пÑоÑеÑÑÐ¾Ñ ÐºÐ¾Ð½ÑÑолиÑÑеÑ
+ÑабоÑÑ Ð¼Ð¸ÐºÑоÑона. РболÑÑинÑÑве ÑелеÑонов
но Ð¼Ð¾Ð¶ÐµÑ Ð¿ÐµÑепиÑÑваÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¸
+в главном пÑоÑеÑÑоÑе.</p>
+ <p>ÐÑÑÑ Ð¼Ð¾Ð´ÐµÐ»Ð¸ ÑелеÑонов, ÑпеÑиалÑно
ÑпÑоекÑиÑованнÑе, ÑÑÐ¾Ð±Ñ Ð¼Ð¸ÐºÑоÑон не
+конÑÑолиÑовалÑÑ Ð¼Ð¾Ð´ÐµÐ¼Ð½Ñм пÑоÑеÑÑоÑом и
ÑÑÐ¾Ð±Ñ Ð¾Ð½ не мог изменÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð²
+главном пÑоÑеÑÑоÑе. Ðазейка в ниÑ
еÑÑÑ, но
по кÑайней меÑе Ñ ÐµÐµ помоÑÑÑ
+невозможно пÑевÑаÑиÑÑ ÑелеÑон в
подÑлÑÑиваÑÑее ÑÑÑÑойÑÑво.</p>
+ <p>УнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, оÑевидно,
пÑименÑеÑÑÑ Ñакже, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑÑавлÑÑÑ
+ÑелеÑÐ¾Ð½Ñ <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-РболÑÑинÑÑве мобилÑнÑÑ
ÑелеÑонов еÑÑÑ
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>, коÑоÑÑй
-пÑименÑли Ð´Ð»Ñ Ð¿ÑевÑаÑÐµÐ½Ð¸Ñ Ð¸Ñ
во
вÑедоноÑнÑе ÑÑÑÑойÑÑва.</p>
- <p>ÐодÑобнее <a
-href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">о
-пÑиÑоде ÑÑой пÑоблемÑ</a>.</p>
+пеÑедаваÑÑ, даже когда они вÑклÑÑенÑ</a>.
ÐÑо знаÑиÑ, ÑÑо иÑ
пеÑемеÑениÑ
+оÑÑлеживаÑÑÑÑ, а возможно, вклÑÑаеÑÑÑ Ð¸
пÑоÑлÑÑивание.</p>
</li>
<li><p><a
@@ -275,26 +287,21 @@
бÑÑÑ Ð¿Ñаво ÑеÑаÑÑ, ÐºÐ¾Ð¼Ñ Ð´Ð¾Ð²ÐµÑÑÑÑ Ñаким
обÑазом (и довеÑÑÑÑ Ð»Ð¸ комÑ-нибÑдÑ
вообÑе).
</p>
-
-<p>
-Ðак показано на ÑÑиÑ
ÑÑÑаниÑаÑ
, еÑли Ð²Ñ Ñ
оÑиÑе оÑиÑÑиÑÑ Ñвой компÑÑÑÐµÑ Ð¾Ñ
-вÑедоноÑнÑÑ
пÑогÑамм, пÑежде вÑего вам
нÑжно ÑдалиÑÑ Windows или iOS.
-</p>
</li>
<li>
<p>Ð Android <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
-Ñ Google еÑÑÑ ÑеÑнÑй Ñ
од Ð´Ð»Ñ ÑдалениÑ
пÑогÑамм по ÑеÑи</a> (в пÑогÑамме под
-названием GTalkService).
+Ñ Google еÑÑÑ ÑеÑнÑй Ñ
од Ð´Ð»Ñ ÑдалениÑ
пÑогÑамм по ÑеÑи</a>. (ÐÑогÑамма
+назÑвалаÑÑ GTalkService, но кажеÑÑÑ, ее
обÑединили Ñ Google Play.)
</p>
<p>
-Google Ð¼Ð¾Ð¶ÐµÑ Ñакже Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ GTalkService (коÑоÑаÑ
Ñо вÑемени напиÑаниÑ
-ÑÑаÑÑи, кажеÑÑÑ, бÑла обÑединена Ñ Google Play) <a
+Google Ð¼Ð¾Ð¶ÐµÑ Ñакже <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-пÑинÑдиÑелÑно ÑÑÑанавливаÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾
ÑеÑи</a>. ÐÑо не ÑквиваленÑно
-ÑнивеÑÑалÑÐ½Ð¾Ð¼Ñ ÑеÑÐ½Ð¾Ð¼Ñ Ñ
одÑ, но допÑÑкаеÑ
ÑазлиÑнÑе гÑÑзнÑе ÑÑÑки.
+пÑинÑдиÑелÑно ÑÑÑанавливаÑÑ Ð¿ÑиложениÑ
по ÑеÑи</a> ÑеÑез Google Play. ÐÑо не
+ÑквиваленÑно ÑнивеÑÑалÑной лазейке, но
позволÑÐµÑ Ð¿ÑоделÑваÑÑ ÑазлиÑнÑе
+гÑÑзнÑе ÑÑÑки.
</p>
<p>
@@ -449,7 +456,7 @@
пеÑеводам”</a>.</p>
</div>
-<p>Copyright © 2014-2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2018 Free Software Foundation, Inc.</p>
<p>ÐÑо пÑоизведение доÑÑÑпно по <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.ru">лиÑензии
@@ -469,7 +476,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/12/25 16:28:46 $
+$Date: 2018/01/17 17:02:52 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-subscriptions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.fr.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary-subscriptions.fr.html 1 Jan 2018 17:34:55
-0000 1.5
+++ proprietary/proprietary-subscriptions.fr.html 17 Jan 2018 17:02:52
-0000 1.6
@@ -28,7 +28,12 @@
malveillantes.</p>
<ul>
+<li><p>Microsoft Office force ses utilisateurs <a
+href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">Ã
+s'abonner à Office 360 pour pouvoir créer ou éditer des documents</a>.</p>
+</li>
<li>
+
<p>Sony a ressorti son robot de compagnie Aibo, cette fois-ci <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">avec
une porte dérobée universelle, ainsi qu'une dépendance à un serveur avec
@@ -128,7 +133,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/01/01 17:34:55 $
+$Date: 2018/01/17 17:02:52 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-subscriptions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.ru.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/proprietary-subscriptions.ru.html 1 Jan 2018 10:42:50
-0000 1.4
+++ proprietary/proprietary-subscriptions.ru.html 17 Jan 2018 17:02:52
-0000 1.5
@@ -28,7 +28,12 @@
ÑеÑÐ²ÐµÑ Ð¿ÑовеÑÑÐµÑ Ð´Ð°ÑÑ. Ð Ñо, и дÑÑгое
ÑвлÑеÑÑÑ Ð²ÑедоноÑной ÑÑнкÑией.</p>
<ul>
+<li><p>Microsoft Office пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
+href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">подпиÑÑваÑÑÑÑ
+на Office 360, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ
ÑедакÑиÑоваÑÑ Ð´Ð¾ÐºÑменÑÑ</a>.</p>
+</li>
<li>
+
<p>Sony Ñнова вÑпÑÑÑила ÑÐ²Ð¾Ñ ÑобаÑкÑ-ÑобоÑа
Aibo, на ÑÑÐ¾Ñ Ñаз <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
Ñ ÑнивеÑÑалÑнÑм ÑеÑнÑм Ñ
одом, и пÑивÑзала
к ÑеÑвеÑÑ, коÑоÑÑй ÑÑебÑеÑ
@@ -130,7 +135,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/01/01 10:42:50 $
+$Date: 2018/01/17 17:02:52 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary/proprietary-surveillance.fr.html 3 Jan 2018 19:01:23
-0000 1.106
+++ proprietary/proprietary-surveillance.fr.html 17 Jan 2018 17:02:52
-0000 1.107
@@ -358,6 +358,40 @@
<ul>
<li>
+ <p>Une vingtaine d'applis Android malhonnêtes ont enregistré <a
+href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">des
+appels téléphoniques et les ont envoyées à des fouineurs, ainsi que des
+textos et des emails</a>.</p>
+
+ <p>Google n'a pas forcé ces applis à espionner ; au contraire, elle a
essayé
+d'empêcher ça de diverses manières et a supprimé ces applis après avoir
+découvert ce qu'elles faisaient. Donc nous ne pouvons pas mettre sur le dos
+de Google ce comportement fouineur particulier.</p>
+
+ <p>Cependant, Google redistribue des applis Android non libres et donc
partage
+la responsabilité de l'injustice qu'entraîne leur caractère privateur. De
+plus, cette société redistribue ses propres applis non libres (par exemple
+Google Play), <a
+href="/philosophy/free-software-even-more-important.html">qui sont
+malveillantes</a>.</p>
+
+ <p>Est-ce que Google aurait pu faire plus pour empêcher ces applis de
tricher ?
+Il n'y a aucun moyen systématique pour Google, ni pour les utilisateurs
+d'Android, d'inspecter les applis privatrices exécutables pour voir ce
+qu'elles font.</p>
+
+ <p>Google pourrait demander le code source de ces applis et l'étudier pour
+déterminer si elles font du tort aux utilisateurs d'une façon ou d'une
+autre. Si ce contrôle était fait correctement, l'espionnage pourrait être
+plus ou moins évité, sauf si les développeurs d'applis étaient assez
+astucieux pour le déjouer.</p>
+
+ <p>Mais puisque Google développe ses propres applis malveillantes, nous ne
+pouvons pas lui faire confiance pour nous protéger. Nous devons exiger la
+publication du code source, pour que nous puissions compter les uns sur les
+autres.</p>
+</li>
+<li>
<p>Un <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">article
de recherche</a> a étudié 283 applis VPN pour Android du point de vue de la
@@ -1689,7 +1723,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/01/03 19:01:23 $
+$Date: 2018/01/17 17:02:52 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/proprietary-surveillance.ru.html 3 Jan 2018 19:01:23
-0000 1.110
+++ proprietary/proprietary-surveillance.ru.html 17 Jan 2018 17:02:52
-0000 1.111
@@ -356,6 +356,39 @@
<ul>
<li>
+ <p>20 неÑеÑÑнÑÑ
пÑиложений Android <a
+href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">запиÑÑвали
+ÑелеÑоннÑе звонки и оÑпÑавлÑли иÑ
в виде
ÑекÑÑовÑÑ
ÑообÑений и ÑлекÑÑонной
+поÑÑÑ Ñем, кÑо ÑÐ»ÐµÐ´Ð¸Ñ Ð·Ð°
полÑзоваÑелÑми</a>.</p>
+
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google не наÑоÑно Ñделала, ÑÑобÑ
ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили; напÑоÑив,
+она пÑинимала ÑазлиÑнÑе меÑÑ, ÑÑобÑ
пÑедоÑвÑаÑиÑÑ ÑÑо, и Ñдалила ÑÑи
+пÑиложениÑ, когда вÑÑÑнилоÑÑ, ÑÑо они
делаÑÑ. Так ÑÑо Ð¼Ñ Ð½Ðµ можем обвинÑÑÑ
+Google в Ñом, ÑÑо ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили.</p>
+
+ <p>С дÑÑгой ÑÑоÑонÑ, Google
пеÑеÑаÑпÑоÑÑÑанÑÐµÑ Ð½ÐµÑвободнÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android,
+а ÑÑало бÑÑÑ, ÑазделÑÐµÑ Ð¾ÑвеÑÑÑвенноÑÑÑ Ð·Ð°
неÑпÑаведливоÑÑÑ, ÑоÑÑоÑÑÑÑ Ð²
+Ñом, ÑÑо они неÑвободнÑ. ÐомпаниÑ
ÑаÑпÑоÑÑÑанÑÐµÑ Ñакже Ñвои ÑобÑÑвеннÑе
+неÑвободнÑе пÑиложениÑ, Ñакие как Google Play, <a
+href="/philosophy/free-software-even-more-important.html">коÑоÑÑе
+злонамеÑеннÑ</a>.</p>
+
+ <p>Ðогла ли ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google пÑедоÑвÑаÑаÑÑ
жÑлÑниÑеÑÑво Ñо ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений
+более ÑÑаÑелÑно? Ðи Ð´Ð»Ñ Google, ни длÑ
полÑзоваÑелей Android не ÑÑÑеÑÑвÑеÑ
+ÑиÑÑемаÑиÑеÑкого ÑпоÑоба инÑпекÑиÑоваÑÑ
иÑполнÑемÑе ÑÐ°Ð¹Ð»Ñ Ð½ÐµÑвободнÑÑ
+пÑиложений, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð½ÑÑÑ, ÑÑо они делаÑÑ.</p>
+
+ <p>Ð Google могли Ð±Ñ ÑÑебоваÑÑ Ð¸ÑÑ
однÑй ÑекÑÑ
ÑÑиÑ
пÑиложений и изÑÑаÑÑ
+каким-Ñо обÑазом иÑÑ
однÑй ÑекÑÑ, ÑÑобÑ
опÑеделÑÑÑ, не делаÑÑ Ð»Ð¸ они
+полÑзоваÑелÑм ÑÑо-Ñо плоÑ
ое. ÐÑли бÑ
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð´ÐµÐ»Ð°Ð»Ð° ÑÑо Ñ
оÑоÑо, она могла
+Ð±Ñ Ð±Ð¾Ð»ÐµÐµ или менее пÑедоÑвÑаÑаÑÑ Ñакое
подглÑдÑвание, кÑоме ÑлÑÑаев, когда
+ÑазÑабоÑÑики пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑаÑоÑно ÑмнÑ,
ÑÑÐ¾Ð±Ñ Ð¿ÐµÑеÑ
иÑÑиÑÑ Ð¿ÑовеÑкÑ.</p>
+
+ <p>Ðо поÑколÑÐºÑ Google Ñама ÑазÑабаÑÑваеÑ
злонамеÑеннÑе пÑиложениÑ, Ð¼Ñ Ð½Ðµ можем
+довеÑÑÑÑ Google наÑÑ Ð·Ð°ÑиÑÑ. ÐÑ Ð´Ð¾Ð»Ð¶Ð½Ñ
ÑÑебоваÑÑ Ð²ÑпÑÑка иÑÑ
одного ÑекÑÑа
+Ð´Ð»Ñ Ð¿Ñблики, ÑÑÐ¾Ð±Ñ Ð¼Ñ Ð¼Ð¾Ð³Ð»Ð¸ заÑиÑаÑÑ Ð´ÑÑг
дÑÑга.</p>
+</li>
+<li>
<p>Ð ÑÑаÑÑе Ñ Ð¸ÑÑледованием пÑиваÑноÑÑи и
заÑиÑенноÑÑи 283 пÑиложений Android
Ð´Ð»Ñ VPN Ñделан вÑвод, ÑÑо “неÑмоÑÑÑ Ð½Ð°
обеÑÐ°Ð½Ð¸Ñ Ð¿ÑиваÑноÑÑи,
заÑиÑенноÑÑи и анонимноÑÑи, коÑоÑое даÑÑ
болÑÑинÑÑво пÑиложений Ð´Ð»Ñ VPN, <a
@@ -1658,7 +1691,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/01/03 19:01:23 $
+$Date: 2018/01/17 17:02:52 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/proprietary.es.html 5 Nov 2017 11:59:12 -0000 1.22
+++ proprietary/proprietary.es.html 17 Jan 2018 17:02:52 -0000 1.23
@@ -66,8 +66,6 @@
Amazon</a></li>
<li><a href="/proprietary/malware-webpages.html"><cite>Malware</cite> en
páginas
web</a></li>
- <li><a href="/proprietary/malware-phones.html"><cite>Malware</cite> en
-teléfonos</a></li>
<li><a href="/proprietary/malware-mobiles.html"><cite>Malware</cite> en los
dispositivos móviles</a></li>
<li><a href="/proprietary/malware-games.html"><cite>Malware</cite> en los
@@ -174,7 +172,8 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software
+Foundation, Inc.</p>
<p>Esta página está bajo licencia <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.es_ES">Creative
@@ -190,7 +189,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2017/11/05 11:59:12 $
+$Date: 2018/01/17 17:02:52 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/proprietary.fr.html 5 Nov 2017 10:59:16 -0000 1.31
+++ proprietary/proprietary.fr.html 17 Jan 2018 17:02:53 -0000 1.32
@@ -61,7 +61,6 @@
<li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
<li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
<li><a href="/proprietary/malware-webpages.html">Pages web</a></li>
- <li><a href="/proprietary/malware-phones.html">Téléphones</a></li>
<li><a href="/proprietary/malware-mobiles.html">PériphériquesÂ
mobiles</a></li>
<li><a href="/proprietary/malware-games.html">Jeux</a></li>
<li><a href="/proprietary/malware-appliances.html">Appareils divers</a></li>
@@ -160,7 +159,8 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software
+Foundation, Inc.</p>
<p>Cette page peut être utilisée suivant les conditions de la licence <a
rel="license"
@@ -178,7 +178,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2017/11/05 10:59:16 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/proprietary.ru.html 7 Nov 2017 09:33:14 -0000 1.25
+++ proprietary/proprietary.ru.html 17 Jan 2018 17:02:53 -0000 1.26
@@ -65,8 +65,6 @@
<li><a href="/proprietary/malware-amazon.html"> ÐÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Amazon</a></li>
<li><a href="/proprietary/malware-webpages.html">ÐÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°
ÑÑÑаниÑаÑ
ÑайÑов</a></li>
- <li><a href="/proprietary/malware-phones.html">ÐÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð²
-ÑелеÑонаÑ
</a></li>
<li><a href="/proprietary/malware-mobiles.html">ÐÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð²
мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
</a></li>
<li><a href="/proprietary/malware-games.html">ÐÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð² игÑаÑ
</a></li>
@@ -170,7 +168,8 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software
+Foundation, Inc.</p>
<p>ÐÑо пÑоизведение доÑÑÑпно по <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/deed.ru">лиÑензии
@@ -190,7 +189,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2017/11/07 09:33:14 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/malware-mobiles.ru-en.html 12 Sep 2017 09:04:57 -0000
1.33
+++ proprietary/po/malware-mobiles.ru-en.html 17 Jan 2018 17:02:53 -0000
1.34
@@ -1,5 +1,5 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
<title>Malware in Mobile Devices
- GNU Project - Free Software Foundation</title>
<style type="text/css" media="print,screen"><!--
@@ -33,6 +33,49 @@
</p>
</div>
+<div class="highlight-para">
+<p>Nearly all mobile phones do two grievous wrongs to their users:
+tracking their movements, and listening to their conversations. This
+is why we call them “Stalin's dream”.</p>
+</div>
+
+<ul>
+ <li><p>The phone network
+ <a href="https://ssd.eff.org/en/module/problem-mobile-phones">
+ tracks the movements of each phone</a>.</p>
+ <p>This is inherent in the design of the phone network: as long as
+ the phone is in communication with the network, there is no way
+ to stop the network from recording its location. Many countries
+ (including the US and the EU) require the network to store all
+ these location data for months or years.</p>
+ </li>
+ <li><p id="universal-back-door">Almost every phone's communication processor
has
+ a universal back door which
+ is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it
+ hears</a>.</p>
+ <p>The back
+ door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ may take the form of bugs that have gone 20 years unfixed</a>.
+ The choice to leave the security holes in place is morally
+ equivalent to writing a back door.</p>
+ <p>The back door is in the “modem processor”, whose
+ job is to communicate with the radio network. In most phones,
+ the modem processor controls the microphone. In most phones it
+ has the power to rewrite the software for the main processor
+ too.</p>
+ <p>A few phone models are specially designed so that the modem
+ processor does not control the microphone, and so that it can't
+ change the software in the main processor. They still have the
+ back door, but at least it is unable to turn the phone unto a
+ listening device.</p>
+ <p>The universal back door is apparently also used to make phones
+ <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ transmit even when they are turned off</a>. This means their movements
+ are tracked, and may also make the listening feature work.</p>
+ </li>
+</ul>
+
<p>Here are examples of malware in mobile devices. See also
the <a href="/proprietary/malware-apple.html">the Apple malware
page</a> for malicious functionalities specific to the Apple iThings.</p>
@@ -60,14 +103,9 @@
<h3 id="back-doors">Mobile Back Doors</h3>
<ul>
<li>
- <p>The universal back door in portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is employed to listen through their microphones</a>.</p>
- <p>Most mobile phones have this universal back door, which has been
- used to
- <a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p>
+ <p>See above for the <a href="#universal-back-door">general universal back
+ door</a> in essentially all mobile phones, which permits converting
+ them into full-time listening devices.</p>
</li>
<li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
@@ -81,17 +119,20 @@
</li>
<li>
- <p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete apps</a> (it is in a program
- called GTalkService).
+ <p>In Android,
+ <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google has a back door to remotely delete apps.</a> (It was in a
+ program called GTalkService, which seems since then to have been
+ merged into Google Play.)
</p>
-<p>Google can also <a
-href="https://web.archive.org/web/20150520235257/https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"
-title="at the Wayback Machine (archived May 20, 2015)">forcibly and remotely
-install apps</a> through GTalkService (which seems, since that article, to have
-been merged into Google Play). This adds up to a universal back door. </p>
+ <p>
+ Google can also
+ <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through Google Play.
+ This is not equivalent to a universal back door, but permits various
+ dirty tricks.
+ </p>
<p>
Although Google's <em>exercise</em> of this power has not been
@@ -481,7 +522,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -491,7 +532,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/09/12 09:04:57 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary-back-doors.fr-en.html 25 Dec 2017 20:29:15
-0000 1.38
+++ proprietary/po/proprietary-back-doors.fr-en.html 17 Jan 2018 17:02:53
-0000 1.39
@@ -1,5 +1,5 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
<title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
<!--#include virtual="/server/banner.html" -->
@@ -22,7 +22,7 @@
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, changing the code could surely convert it into one.</p>
+ listening device, remote changes to the code could surely convert it into
one.</p>
</li>
<li>
@@ -108,15 +108,30 @@
total control of the machine by repeatedly nagging the user
for an admini password</a>.</p>
</li>
- <li>
- <p>The universal back door in portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is employed to listen through their microphones</a>.</p>
- <p>Most mobile phones have this universal back door, which has been
- used to
+ <li><p id="universal-back-door">Almost every phone's communication processor
has
+ a universal back door which
+ is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it
+ hears</a>.</p>
+ <p>The back
+ door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ may take the form of bugs that have gone 20 years unfixed</a>.
+ The choice to leave the security holes in place is morally
+ equivalent to writing a back door.</p>
+ <p>The back door is in the “modem processor”, whose
+ job is to communicate with the radio network. In most phones,
+ the modem processor controls the microphone. In most phones it
+ has the power to rewrite the software for the main processor
+ too.</p>
+ <p>A few phone models are specially designed so that the modem
+ processor does not control the microphone, and so that it can't
+ change the software in the main processor. They still have the
+ back door, but at least it is unable to turn the phone unto a
+ listening device.</p>
+ <p>The universal back door is apparently also used to make phones
<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p>
+ transmit even when they are turned off</a>. This means their movements
+ are tracked, and may also make the listening feature work.</p>
</li>
<li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
@@ -255,25 +270,20 @@
But there is no excuse for <em>deleting</em> the programs, and you
should have the right to decide who (if anyone) to trust in this way.
</p>
-
-<p>
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p>
</li>
<li>
<p>In Android,
<a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
-Google has a back door to remotely delete apps.</a> (It is in a program
-called GTalkService).
+Google has a back door to remotely delete apps.</a> (It was in a
+program called GTalkService, which seems since then to have been
+merged into Google Play.)
</p>
<p>
Google can also
<a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-forcibly and remotely install apps</a> through GTalkService (which
-seems, since that article, to have been merged into Google Play).
+forcibly and remotely install apps</a> through GTalkService.
This is not equivalent to a universal back door, but permits various
dirty tricks.
</p>
@@ -414,7 +424,7 @@
of this article.</p>
</div>
-<p>Copyright © 2014-2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2018 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -424,7 +434,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/12/25 20:29:15 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-back-doors.ru-en.html 25 Dec 2017 16:28:46
-0000 1.39
+++ proprietary/po/proprietary-back-doors.ru-en.html 17 Jan 2018 17:02:53
-0000 1.40
@@ -1,5 +1,5 @@
<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.84 -->
+<!-- Parent-Version: 1.85 -->
<title>Proprietary Back Doors - GNU Project - Free Software Foundation</title>
<!--#include virtual="/proprietary/po/proprietary-back-doors.translist" -->
<!--#include virtual="/server/banner.html" -->
@@ -22,7 +22,7 @@
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, changing the code could surely convert it into one.</p>
+ listening device, remote changes to the code could surely convert it into
one.</p>
</li>
<li>
@@ -108,15 +108,30 @@
total control of the machine by repeatedly nagging the user
for an admini password</a>.</p>
</li>
- <li>
- <p>The universal back door in portable phones
- <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- is employed to listen through their microphones</a>.</p>
- <p>Most mobile phones have this universal back door, which has been
- used to
+ <li><p id="universal-back-door">Almost every phone's communication processor
has
+ a universal back door which
+ is <a
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used to make a phone transmit all conversations it
+ hears</a>.</p>
+ <p>The back
+ door <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ may take the form of bugs that have gone 20 years unfixed</a>.
+ The choice to leave the security holes in place is morally
+ equivalent to writing a back door.</p>
+ <p>The back door is in the “modem processor”, whose
+ job is to communicate with the radio network. In most phones,
+ the modem processor controls the microphone. In most phones it
+ has the power to rewrite the software for the main processor
+ too.</p>
+ <p>A few phone models are specially designed so that the modem
+ processor does not control the microphone, and so that it can't
+ change the software in the main processor. They still have the
+ back door, but at least it is unable to turn the phone unto a
+ listening device.</p>
+ <p>The universal back door is apparently also used to make phones
<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
- turn them malicious</a>.</p>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p>
+ transmit even when they are turned off</a>. This means their movements
+ are tracked, and may also make the listening feature work.</p>
</li>
<li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
@@ -255,25 +270,20 @@
But there is no excuse for <em>deleting</em> the programs, and you
should have the right to decide who (if anyone) to trust in this way.
</p>
-
-<p>
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p>
</li>
<li>
<p>In Android,
<a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
-Google has a back door to remotely delete apps.</a> (It is in a program
-called GTalkService).
+Google has a back door to remotely delete apps.</a> (It was in a
+program called GTalkService, which seems since then to have been
+merged into Google Play.)
</p>
<p>
Google can also
<a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-forcibly and remotely install apps</a> through GTalkService (which
-seems, since that article, to have been merged into Google Play).
+forcibly and remotely install apps</a> through GTalkService.
This is not equivalent to a universal back door, but permits various
dirty tricks.
</p>
@@ -414,7 +424,7 @@
of this article.</p>
</div>
-<p>Copyright © 2014-2017 Free Software Foundation, Inc.</p>
+<p>Copyright © 2014-2018 Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -424,7 +434,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/12/25 16:28:46 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/proprietary-back-doors.ru.po 17 Jan 2018 15:08:57 -0000
1.121
+++ proprietary/po/proprietary-back-doors.ru.po 17 Jan 2018 17:02:53 -0000
1.122
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-12 02:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -55,16 +54,6 @@
msgstr "ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð¿Ð¾Ð´ÑвеÑжденнÑÑ
лазеек в
неÑвободнÑÑ
пÑогÑаммаÑ
."
#. type: Content of: <ul><li><p>
-# | The Furby Connect has a <a
-# |
href=\"https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect\">
-# | universal back door</a>. If the product as shipped doesn't act as a
-# | listening device, [-changing-] {+remote changes to+} the code could surely
-# | convert it into one.
-#| msgid ""
-#| "The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-"
-#| "feed-them-after-midnight-reverse-engineering-the-furby-connect\"> "
-#| "universal back door</a>. If the product as shipped doesn't act as a "
-#| "listening device, changing the code could surely convert it into one."
msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
@@ -74,8 +63,8 @@
"Ð Furby Connect еÑÑÑ <a
href=\"https://www.contextis.com/blog/dont-feed-them-"
"after-midnight-reverse-engineering-the-furby-connect\">
ÑнивеÑÑалÑнÑй ÑеÑнÑй "
"Ñ
од</a>. ÐÑли пÑодÑÐºÑ Ð² Ñом виде, в каком он
поÑÑавлÑеÑÑÑ, не дейÑÑвÑÐµÑ ÐºÐ°Ðº "
-"подÑлÑÑиваÑÑее ÑÑÑÑойÑÑво, Ñо изменение
пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾ ÑеÑи навеÑнÑка можеÑ
пÑевÑаÑиÑÑ "
-"его в Ñакое ÑÑÑÑойÑÑво."
+"подÑлÑÑиваÑÑее ÑÑÑÑойÑÑво, Ñо изменение
пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð¾ ÑеÑи навеÑнÑка Ð¼Ð¾Ð¶ÐµÑ "
+"пÑевÑаÑиÑÑ ÐµÐ³Ð¾ в Ñакое ÑÑÑÑойÑÑво."
#. type: Content of: <ul><li><p>
msgid ""
@@ -252,38 +241,18 @@
"ÑиÑÑемного админиÑÑÑаÑоÑа</a>."
#. type: Content of: <ul><li><p>
-# | [-The-]{+Almost every phone's communication processor has a+} universal
-# | back door [-in portable phones-] {+which is+} <a
-# |
href=\"https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html\">
-# | [-is employed-] {+often used+} to [-listen through their
-# | microphones</a>.-] {+make a phone transmit all conversations it
-# | hears</a>.+}
-#| msgid ""
-#| "The universal back door in portable phones <a href=\"https://www.schneier."
-#| "com/blog/archives/2006/12/remotely_eavesd_1.html\"> is employed to listen "
-#| "through their microphones</a>."
msgid ""
"Almost every phone's communication processor has a universal back door which "
"is <a href=\"https://www.schneier.com/blog/archives/2006/12/"
"remotely_eavesd_1.html\"> often used to make a phone transmit all "
"conversations it hears</a>."
msgstr ""
-"РкоммÑникаÑионном пÑоÑеÑÑоÑе поÑÑи
лÑбого ÑелеÑона еÑÑÑ ÑнивеÑÑалÑнÑй ÑеÑнÑй
Ñ
од, коÑоÑÑй <a href=\"https://www."
-"schneier.com/blog/archives/2006/12/remotely_eavesd_1.html\"> ÑаÑÑо
пÑименÑеÑÑÑ, "
-"ÑÑÐ¾Ð±Ñ Ð·Ð°ÑÑавиÑÑ ÑелеÑон пеÑедаваÑÑ Ð²Ñе
ÑазговоÑÑ, коÑоÑÑе он ÑлÑÑиÑ</a>."
-
-#. type: Content of: <ul><li><p>
-# | [-More about-]{+The back door+} <a
-# |
[-href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">the
-# | nature-]
-# |
{+href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
-# | may take the form+} of [-this problem</a>.-] {+bugs that have gone 20
-# | years unfixed</a>. The choice to leave the security holes in place is
-# | morally equivalent to writing a back door.+}
-#| msgid ""
-#| "More about <a href=\"http://www.osnews.com/story/27416/"
-#| "The_second_operating_system_hiding_in_every_mobile_phone\">the nature of "
-#| "this problem</a>."
+"РкоммÑникаÑионном пÑоÑеÑÑоÑе поÑÑи
лÑбого ÑелеÑона еÑÑÑ ÑнивеÑÑалÑнÑй "
+"ÑеÑнÑй Ñ
од, коÑоÑÑй <a
href=\"https://www.schneier.com/blog/archives/2006/12/"
+"remotely_eavesd_1.html\"> ÑаÑÑо пÑименÑеÑÑÑ, ÑÑобÑ
заÑÑавиÑÑ ÑелеÑон "
+"пеÑедаваÑÑ Ð²Ñе ÑазговоÑÑ, коÑоÑÑе он
ÑлÑÑиÑ</a>."
+
+#. type: Content of: <ul><li><p>
msgid ""
"The back door <a href=\"http://www.osnews.com/story/27416/"
"The_second_operating_system_hiding_in_every_mobile_phone\"> may take the "
@@ -291,9 +260,10 @@
"security holes in place is morally equivalent to writing a back door."
msgstr ""
"Ðазейка <a href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\">можеÑ
пÑинимаÑÑ ÑоÑÐ¼Ñ "
-"оÑибок, коÑоÑÑе оÑÑаÑÑÑÑ Ð½ÐµÐ¸ÑпÑавленнÑми
по 20 леÑ</a>. РеÑение оÑÑавиÑÑ "
-"пÑоÑеÑ
и в заÑиÑе незаделаннÑми
нÑавÑÑвенно ÑквиваленÑно напиÑаниÑ
лазейки."
+"The_second_operating_system_hiding_in_every_mobile_phone\">можеÑ
пÑинимаÑÑ "
+"ÑоÑÐ¼Ñ Ð¾Ñибок, коÑоÑÑе оÑÑаÑÑÑÑ
неиÑпÑавленнÑми по 20 леÑ</a>. РеÑение "
+"оÑÑавиÑÑ Ð¿ÑоÑеÑ
и в заÑиÑе незаделаннÑми
нÑавÑÑвенно ÑквиваленÑно напиÑÐ°Ð½Ð¸Ñ "
+"лазейки."
#. type: Content of: <ul><li><p>
msgid ""
@@ -304,8 +274,8 @@
msgstr ""
"Ðазейка наÑ
одиÑÑÑ Ð² “модемном
пÑоÑеÑÑоÑе”, коÑоÑÑй оÑвеÑÐ°ÐµÑ Ð·Ð° "
"ÑвÑÐ·Ñ Ñ ÑадиоÑеÑÑÑ. РболÑÑинÑÑве
ÑелеÑонов модемнÑй пÑоÑеÑÑÐ¾Ñ ÐºÐ¾Ð½ÑÑолиÑÑеÑ
"
-"ÑабоÑÑ Ð¼Ð¸ÐºÑоÑона. РболÑÑинÑÑве ÑелеÑонов
но Ð¼Ð¾Ð¶ÐµÑ Ð¿ÐµÑепиÑÑваÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ "
-"и в главном пÑоÑеÑÑоÑе."
+"ÑабоÑÑ Ð¼Ð¸ÐºÑоÑона. РболÑÑинÑÑве ÑелеÑонов
но Ð¼Ð¾Ð¶ÐµÑ Ð¿ÐµÑепиÑÑваÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð¸ "
+"в главном пÑоÑеÑÑоÑе."
#. type: Content of: <ul><li><p>
msgid ""
@@ -314,23 +284,12 @@
"main processor. They still have the back door, but at least it is unable to "
"turn the phone unto a listening device."
msgstr ""
-"ÐÑÑÑ Ð¼Ð¾Ð´ÐµÐ»Ð¸ ÑелеÑонов, ÑпеÑиалÑно
ÑпÑоекÑиÑованнÑе, ÑÑÐ¾Ð±Ñ Ð¼Ð¸ÐºÑоÑон не
конÑÑолиÑовалÑÑ "
-"модемнÑм пÑоÑеÑÑоÑом и ÑÑÐ¾Ð±Ñ Ð¾Ð½ не мог
изменÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð² главном "
-"пÑоÑеÑÑоÑе. Ðазейка в ниÑ
еÑÑÑ, но по
кÑайней меÑе Ñ ÐµÐµ помоÑÑÑ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ "
-"пÑевÑаÑиÑÑ ÑелеÑон в подÑлÑÑиваÑÑее
ÑÑÑÑойÑÑво."
-
-#. type: Content of: <ul><li><p>
-# | [-Most mobile phones have this-]{+The+} universal back [-door, which has
-# | been-] {+door is apparently also+} used to {+make phones+} <a
-# |
href=\"http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\">
-# | [-turn them malicious</a>.-] {+transmit even when they are turned off</a>.
-# | This means their movements are tracked, and may also make the listening
-# | feature work.+}
-#| msgid ""
-#| "Most mobile phones have this universal back door, which has been used to "
-#| "<a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/"
-#| "nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-#| "turn them malicious</a>."
+"ÐÑÑÑ Ð¼Ð¾Ð´ÐµÐ»Ð¸ ÑелеÑонов, ÑпеÑиалÑно
ÑпÑоекÑиÑованнÑе, ÑÑÐ¾Ð±Ñ Ð¼Ð¸ÐºÑоÑон не "
+"конÑÑолиÑовалÑÑ Ð¼Ð¾Ð´ÐµÐ¼Ð½Ñм пÑоÑеÑÑоÑом и
ÑÑÐ¾Ð±Ñ Ð¾Ð½ не мог изменÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð² "
+"главном пÑоÑеÑÑоÑе. Ðазейка в ниÑ
еÑÑÑ, но
по кÑайней меÑе Ñ ÐµÐµ помоÑÑÑ "
+"невозможно пÑевÑаÑиÑÑ ÑелеÑон в
подÑлÑÑиваÑÑее ÑÑÑÑойÑÑво."
+
+#. type: Content of: <ul><li><p>
msgid ""
"The universal back door is apparently also used to make phones <a href="
"\"http://www.slate.com/blogs/future_tense/2013/07/22/"
@@ -338,11 +297,11 @@
"transmit even when they are turned off</a>. This means their movements are "
"tracked, and may also make the listening feature work."
msgstr ""
-"УнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, оÑевидно,
пÑименÑеÑÑÑ Ñакже, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑÑавлÑÑÑ
ÑелеÑÐ¾Ð½Ñ "
-"<a href=\"http://www.slate.com/blogs/future_tense/2013/07/22/"
+"УнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, оÑевидно,
пÑименÑеÑÑÑ Ñакже, ÑÑÐ¾Ð±Ñ Ð·Ð°ÑÑавлÑÑÑ "
+"ÑелеÑÐ¾Ð½Ñ <a
href=\"http://www.slate.com/blogs/future_tense/2013/07/22/"
"nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html\"> "
-"пеÑедаваÑÑ, даже когда они вÑклÑÑенÑ</a>.
ÐÑо знаÑиÑ, ÑÑо иÑ
пеÑемеÑениÑ
оÑÑлеживаÑÑÑÑ, "
-"а возможно, вклÑÑаеÑÑÑ Ð¸ пÑоÑлÑÑивание."
+"пеÑедаваÑÑ, даже когда они вÑклÑÑенÑ</a>.
ÐÑо знаÑиÑ, ÑÑо иÑ
пеÑемеÑÐµÐ½Ð¸Ñ "
+"оÑÑлеживаÑÑÑÑ, а возможно, вклÑÑаеÑÑÑ Ð¸
пÑоÑлÑÑивание."
#. type: Content of: <ul><li><p>
msgid ""
@@ -627,16 +586,6 @@
"вообÑе)."
#. type: Content of: <ul><li><p>
-# | In Android, <a
-# |
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
-# | Google has a back door to remotely delete apps.</a> (It [-is-] {+was+} in
-# | a program called [-GTalkService).-] {+GTalkService, which seems since then
-# | to have been merged into Google Play.)+}
-#| msgid ""
-#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
-#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
-#| "has a back door to remotely delete apps.</a> (It is in a program called "
-#| "GTalkService)."
msgid ""
"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
@@ -645,32 +594,20 @@
msgstr ""
"Ð Android <a href=\"http://www.computerworld.com/article/2506557/security0/"
"google-throws--kill-switch--on-android-phones.html\"> Ñ Google еÑÑÑ
ÑеÑнÑй "
-"Ñ
од Ð´Ð»Ñ ÑÐ´Ð°Ð»ÐµÐ½Ð¸Ñ Ð¿ÑогÑамм по ÑеÑи</a>.
(ÐÑогÑамма назÑвалаÑÑ "
-"GTalkService, но кажеÑÑÑ, ее обÑединили Ñ Google Play.)"
+"Ñ
од Ð´Ð»Ñ ÑÐ´Ð°Ð»ÐµÐ½Ð¸Ñ Ð¿ÑогÑамм по ÑеÑи</a>.
(ÐÑогÑамма назÑвалаÑÑ GTalkService, "
+"но кажеÑÑÑ, ее обÑединили Ñ Google Play.)"
#. type: Content of: <ul><li><p>
-# | Google can also <a
-# |
href=\"https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/\">
-# | forcibly and remotely install apps</a> through [-GTalkService (which
-# | seems, since that article, to have been merged into Google Play).-]
-# | {+GTalkService.+} This is not equivalent to a universal back door, but
-# | permits various dirty tricks.
-#| msgid ""
-#| "Google can also <a href=\"https://jon.oberheide.org/blog/2010/06/25/"
-#| "remote-kill-and-install-on-google-android/\"> forcibly and remotely "
-#| "install apps</a> through GTalkService (which seems, since that article, "
-#| "to have been merged into Google Play). This is not equivalent to a "
-#| "universal back door, but permits various dirty tricks."
msgid ""
"Google can also <a href=\"https://jon.oberheide.org/blog/2010/06/25/remote-"
"kill-and-install-on-google-android/\"> forcibly and remotely install apps</"
"a> through GTalkService. This is not equivalent to a universal back door, "
"but permits various dirty tricks."
msgstr ""
-"Google Ð¼Ð¾Ð¶ÐµÑ Ñакже <a
href=\"https://jon.oberheide.org/blog/2010/06/25/remote-"
-"kill-and-install-on-google-android/\"> пÑинÑдиÑелÑно
ÑÑÑанавливаÑÑ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ ÑеÑи</"
-"a> ÑеÑез Google Play. ÐÑо не ÑквиваленÑно
ÑнивеÑÑалÑной лазейке, но позволÑÐµÑ "
-"пÑоделÑваÑÑ ÑазлиÑнÑе гÑÑзнÑе ÑÑÑки."
+"Google Ð¼Ð¾Ð¶ÐµÑ Ñакже <a
href=\"https://jon.oberheide.org/blog/2010/06/25/"
+"remote-kill-and-install-on-google-android/\"> пÑинÑдиÑелÑно
ÑÑÑанавливаÑÑ "
+"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾ ÑеÑи</a> ÑеÑез Google Play. ÐÑо не
ÑквиваленÑно ÑнивеÑÑалÑной "
+"лазейке, но позволÑÐµÑ Ð¿ÑоделÑваÑÑ
ÑазлиÑнÑе гÑÑзнÑе ÑÑÑки."
#. type: Content of: <ul><li><p>
msgid ""
@@ -893,8 +830,6 @@
# type: Content of: <div><p>
#. type: Content of: <div><p>
-# | Copyright © 2014-201[-7-]{+8+} Free Software Foundation, Inc.
-#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
msgid "Copyright © 2014-2018 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2018 Free Software Foundation, Inc."
Index: proprietary/po/proprietary-subscriptions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr-en.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/po/proprietary-subscriptions.fr-en.html 1 Jan 2018 17:34:55
-0000 1.5
+++ proprietary/po/proprietary-subscriptions.fr-en.html 17 Jan 2018 17:02:53
-0000 1.6
@@ -23,7 +23,13 @@
malicious functionality.</p>
<ul>
+<li><p>Microsoft Office forces
+ users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe to Office 360 to be able to create/edit
+ documents</a>.</p>
+</li>
<li>
+
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
with a universal back door, and tethered to a server that requires a
@@ -104,7 +110,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/01 17:34:55 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru-en.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- proprietary/po/proprietary-subscriptions.ru-en.html 1 Jan 2018 10:42:50
-0000 1.4
+++ proprietary/po/proprietary-subscriptions.ru-en.html 17 Jan 2018 17:02:53
-0000 1.5
@@ -23,7 +23,13 @@
malicious functionality.</p>
<ul>
+<li><p>Microsoft Office forces
+ users <a
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ subscribe to Office 360 to be able to create/edit
+ documents</a>.</p>
+</li>
<li>
+
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
with a universal back door, and tethered to a server that requires a
@@ -104,7 +110,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/01 10:42:50 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary/po/proprietary-subscriptions.ru.po 12 Jan 2018 12:24:53
-0000 1.12
+++ proprietary/po/proprietary-subscriptions.ru.po 17 Jan 2018 17:02:53
-0000 1.13
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-12 02:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -71,10 +70,10 @@
"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 360 to be "
"able to create/edit documents</a>."
msgstr ""
-"Microsoft Office пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">подпиÑÑваÑÑÑÑ Ð½Ð°
Office 360, ÑÑÐ¾Ð±Ñ "
-"полÑÑиÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ ÑедакÑиÑоваÑÑ
докÑменÑÑ</a>."
+"Microsoft Office пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href=\"https://www."
+"computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
+"require-office-365-subscription-on-pcs-larger-tablets.html\">подпиÑÑваÑÑÑÑ
"
+"на Office 360, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ
ÑедакÑиÑоваÑÑ Ð´Ð¾ÐºÑменÑÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.98
retrieving revision 1.99
diff -u -b -r1.98 -r1.99
--- proprietary/po/proprietary-surveillance.fr-en.html 3 Jan 2018 19:01:24
-0000 1.98
+++ proprietary/po/proprietary-surveillance.fr-en.html 17 Jan 2018 17:02:53
-0000 1.99
@@ -339,6 +339,39 @@
<ul>
<li>
+ <p>20 dishonest Android apps
+ recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
+ snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their
+ being nonfree. It also distributes its own nonfree apps, such as
+ Google
+ Play, <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android
+ users, to inspect executable proprietary apps to see what they
+ do.</p>
+
+ <p>Google could demand the source code for these apps, and study the
+ source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
+</li>
+<li>
<p>A
<a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security
@@ -1562,7 +1595,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/03 19:01:24 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-surveillance.it-diff.html 3 Jan 2018
18:01:51 -0000 1.43
+++ proprietary/po/proprietary-surveillance.it-diff.html 17 Jan 2018
17:02:53 -0000 1.44
@@ -356,7 +356,55 @@
<ul>
<li>
- <span class="inserted"><ins><em><p>A
+ <span class="removed"><del><strong><p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
+ proprietary</strong></del></span>
+ <span class="inserted"><ins><em><p>20 dishonest</em></ins></span>
Android apps <span class="removed"><del><strong>contained recognizable tracking
libraries. For</strong></del></span>
+ <span class="inserted"><ins><em>recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
+ snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy; on</em></ins></span>
the <span class="removed"><del><strong>paid proprietary
apps,</strong></del></span> <span
class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong>was only 60%.</p>
+
+ <p>The article confusingly describes gratis</strong></del></span>
+ <span class="inserted"><ins><em>worked in various ways to prevent that,
and deleted these</em></ins></span> apps <span class="removed"><del><strong>as
“free”,
+ but most</strong></del></span>
+ <span class="inserted"><ins><em>after discovering what they did. So we
cannot blame Google
+ specifically for the snooping</em></ins></span> of <span
class="removed"><del><strong>them are not</strong></del></span> <span
class="inserted"><ins><em>these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares</em></ins></span> in <span
class="removed"><del><strong>fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement</strong></del></span> <span
class="inserted"><ins><em>responsibility</em></ins></span> for <span
class="removed"><del><strong>that word</strong></del></span> <span
class="inserted"><ins><em>the injustice of their
+ being nonfree. It also distributes its own nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
+ perfectly.</p>
+</li>
+
+<li>
+ <p>Apps</strong></del></span> <span class="inserted"><ins><em>no
systematic way</em></ins></span> for <span class="removed"><del><strong>BART
+ <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With</strong></del></span> <span class="inserted"><ins><em>Google,
or Android
+ users, to inspect executable proprietary apps to see what they
+ do.</p>
+
+ <p>Google could demand the source code for these apps, and study the
+ source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
+</li>
+<li>
+ <p>A
<a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security
of 283 Android VPN apps concluded that “in spite of the
@@ -403,7 +451,7 @@
JavaScript injection for tracking and display ads.</dd>
</dl>
</li>
-<li></em></ins></span>
+<li>
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
proprietary Android apps contained recognizable tracking libraries. For
the paid proprietary apps, it was only 60%.</p>
@@ -420,7 +468,7 @@
<p>Apps for BART
<a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
<p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they don't.</p>
+ <p>With</em></ins></span> proprietary apps, one can only hope that
they don't.</p>
</li>
<li>
@@ -524,11 +572,9 @@
</div>
<ul>
- <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
- <span class="inserted"><ins><em><li><p>The DMCA and the EU
Copyright Directive make it</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way</strong></del></span>
-<span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="removed"><del><strong>use it
without having your fingerprints</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr...apps spy on users</a>,
because this
+ <span class="inserted"><ins><em><li><p>The DMCA and the EU
Copyright Directive make it <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr...apps spy on users</a>, because this
would require circumventing the iOS DRM.</p>
</li>
@@ -538,11 +584,11 @@
doesn't really turn them off</a>.
A more advanced way really does turn them off—only until 5am.
That's Apple for you—“We know you want to be spied
on”.</p>
- </li>
+ </li></em></ins></span>
<li><p>Apple proposes
<a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints</em></ins></span>
+ — which would mean no way to use it without having your
fingerprints
taken. Users would have no way to tell whether the phone is snooping on
them.</p></li>
@@ -841,44 +887,46 @@
weakness of the reject-it-if-you-dislike-snooping
“solution” to surveillance: why should a flashlight
app send any information to anyone? A free software flashlight
- app would not.</p>
+ app would <span class="removed"><del><strong>not.</p>
</li>
</ul>
+
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInGames">Spyware</strong></del></span>
<span
class="inserted"><ins><em>id="SpywareInToys">Spyware</em></ins></span> in
<span class="removed"><del><strong>Games</h4></strong></del></span> <span
class="inserted"><ins><em>Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInGames">#SpywareInGames</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 id="SpywareInGames">Spyware in Games</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <span class="removed"><del><strong><li><p>nVidia's proprietary
GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves and then sends personal data about
them</strong></del></span>
-
- <span class="inserted"><ins><em><li>
- <p>A remote-control sex toy was found</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
+ <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about them to
+ nVidia servers</a>.</p>
</li>
- <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span> <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of</em></ins></span> the <span class="removed"><del><strong>NSA takes
advantage to spy through it too</a>.
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
+ spies for companies, and the NSA takes advantage to spy through it
too</a>.
Here's information on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>not.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
+</ul>
<div class="big-subsection">
<h4 id="SpywareInToys">Spyware in Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<ul></strong></del></span>
+<ul>
<li>
+ <span class="inserted"><ins><em><p>A remote-control sex toy was
found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of the conversation between two users</a>.</p>
+ </li>
+
+ <li></em></ins></span>
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
a speech recognition company based in the U.S.</p>
@@ -934,26 +982,18 @@
</ul>
-<!-- <span
class="removed"><del><strong>#SpywareAtLowLevel</strong></del></span> <span
class="inserted"><ins><em>#SpywareOnSmartWatches</em></ins></span> -->
+<!-- <span class="inserted"><ins><em>#SpywareOnSmartWatches -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtLowLevel">Spyware
at Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareOnSmartWatches">Spyware on
“Smart” Watches</h3></em></ins></span>
- <span <span
class="removed"><del><strong>class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span></em></ins></span>
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
</div>
<div style="clear: left;"></div>
-
-<span class="removed"><del><strong><div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div></strong></del></span>
-
<ul>
-<span class="removed"><del><strong><li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"></strong></del></span>
- <span class="inserted"><ins><em><li>
+ <li>
<p>An LG “smart” watch is designed
<a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
to report its location to someone else and to transmit
@@ -969,7 +1009,7 @@
</li>
</ul>
-<!-- #SpywareAtLowLevel -->
+<!--</em></ins></span> #SpywareAtLowLevel -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
@@ -986,7 +1026,7 @@
<ul>
<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"></em></ins></span>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
Note that the specific sabotage method Lenovo used did not affect
GNU/Linux; also, a “clean” Windows install is not really
@@ -1290,36 +1330,35 @@
<div style="clear: left;"></div>
<ul>
-<span class="removed"><del><strong><li><p>Users are suing
Bose</strong></del></span>
-
- <span class="inserted"><ins><em><li>
- <p>The driver</em></ins></span> for <span
class="removed"><del><strong><a
+<span class="removed"><del><strong><li><p>Users are suing Bose for
<a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing</strong></del></span> a <span
class="removed"><del><strong>spyware app for its headphones</a>.
-Specifically, the app would record the names of the audio
files</strong></del></span> <span class="inserted"><ins><em>certain gaming
keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
+distributing a spyware app for its headphones</a>.
+Specifically, the app would record the names of the audio files
+users listen to along with the headphone's unique serial number.
+</p></strong></del></span>
+
+ <span class="inserted"><ins><em><li></em></ins></span>
+ <p>The <span class="removed"><del><strong>suit accuses that this was
done without the users' consent.
+If the fine print of the app said that users gave
consent</strong></del></span> <span
class="inserted"><ins><em>driver</em></ins></span> for <span
class="removed"><del><strong>this,
+would that make it acceptable? No way! It should be flat
out</strong></del></span> <span class="inserted"><ins><em>a certain gaming
keyboard <a
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
information
to China</a>.</p>
</li>
- <li><p>nVidia's proprietary GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</em></ins></span>
- users <span class="removed"><del><strong>listen</strong></del></span>
<span class="inserted"><ins><em>identify themselves and then sends personal
data about them</em></ins></span> to <span class="removed"><del><strong>along
with</strong></del></span>
+ <li><p>nVidia's proprietary GeForce Experience</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span
class="inserted"><ins><em>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves and then sends personal data about
them</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span>
<span class="inserted"><ins><em>nVidia servers</a>.</p>
</li>
<li><p>Angry Birds
<a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</em></ins></span> the <span
class="removed"><del><strong>headphone's unique serial number.
-</p>
-
-<p>The suit accuses that this was done without the users' consent.
-If the fine print of the app said that users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>NSA
takes advantage to spy through</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat
out</strong></del></span> <span class="inserted"><ins><em>too</a>.
- Here's information on</em></ins></span>
- <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal to design the</strong></del></span> <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ spies for companies, and</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>NSA takes advantage</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>spy through
it too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA</em></ins></span> app <span
class="removed"><del><strong>to snoop at all</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>spying</a>.</p></em></ins></span>
+ More about NSA app spying</a>.</p></em></ins></span>
</li>
<li><p>Many
@@ -1622,7 +1661,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/03 18:01:51 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-surveillance.ja-diff.html 3 Jan 2018
18:01:51 -0000 1.54
+++ proprietary/po/proprietary-surveillance.ja-diff.html 17 Jan 2018
17:02:53 -0000 1.55
@@ -355,38 +355,72 @@
</div>
<ul>
- <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular</strong></del></span>
<span class="inserted"><ins><em><li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>most popular</strong></del></span> <span
class="inserted"><ins><em>privacy and security
- of 283</em></ins></span> Android <span
class="inserted"><ins><em>VPN</em></ins></span> apps
- <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>concluded
that “in spite of the
- promises for privacy, security,</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>anonymity given by the
- majority of VPN apps—millions</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> users <span
class="removed"><del><strong>with third parties.</p>
+ <p>20 dishonest</em></ins></span> Android apps
+ <span class="inserted"><ins><em>recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span> <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls</em></ins></span> and <span class="removed"><del><strong>location
information</a> of their users with third parties.</p>
</li>
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>may be
unawarely subject</em></ins></span>
- to <span class="inserted"><ins><em>poor security guarantees and abusive
practices inflicted by
- VPN apps.”</p>
-
- <p>Following is a non-exhaustive list of proprietary VPN apps
from</em></ins></span>
- the <span class="removed"><del><strong>app's functionality,
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>sent them and
text messages and emails</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span class="inserted"><ins><em>research
paper that tracks and infringes</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should</strong></del></span>
+ <span class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google did</em></ins></span> not <span
class="removed"><del><strong>have described</strong></del></span> <span
class="inserted"><ins><em>intend to make</em></ins></span> these apps <span
class="removed"><del><strong>as
+ “free”—they are not free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>spy; on the contrary,
it
+ worked in various ways</em></ins></span> to <span
class="removed"><del><strong>say
+ “zero price” is “gratis.”</p>
- <p>The article should not have described these
apps</strong></del></span> <span class="inserted"><ins><em>privacy of
+ <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>prevent that, and deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically</em></ins></span> for <span
class="removed"><del><strong>granted that</strong></del></span> the <span
class="removed"><del><strong>usual analytics tools</strong></del></span> <span
class="inserted"><ins><em>snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their
+ being nonfree. It also distributes its own nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which</em></ins></span>
+ are
+ <span class="removed"><del><strong>legitimate, but is that valid? Software
developers</strong></del></span> <span
class="inserted"><ins><em>malicious</a>.</p>
+
+ <p>Could Google</em></ins></span> have <span
class="inserted"><ins><em>done a better job of preventing apps from
+ cheating? There is</em></ins></span> no <span
class="removed"><del><strong>right to
+ analyze what users are doing</strong></del></span> <span
class="inserted"><ins><em>systematic way for Google, or Android
+ users, to inspect executable proprietary apps to see what they
+ do.</p>
+
+ <p>Google could demand the source code for these apps, and study the
+ source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
+</li>
+<li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security
+ of 283 Android VPN apps concluded that “in spite of the
+ promises for privacy, security, and anonymity given by the
+ majority of VPN apps—millions of users may be unawarely subject
+ to poor security guarantees and abusive practices inflicted by
+ VPN apps.”</p>
+
+ <p>Following is a non-exhaustive list of proprietary VPN apps from
+ the research paper that tracks and infringes the privacy of
users:</p>
<dl>
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries such</em></ins></span> as
- <span class="removed"><del><strong>“free”—they are not
free software. The clear way</strong></del></span> <span
class="inserted"><ins><em>NativeX and Appflood,
- meant</em></ins></span> to <span class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
-
- <p>The article takes for granted that</strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
@@ -394,14 +428,12 @@
users' text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
- <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software</strong></del></span> <span
class="inserted"><ins><em><code>READ_LOGS</code> permission to read
logs
- for other apps and also core system logs. TigerVPN</em></ins></span>
developers
- have <span class="removed"><del><strong>no right</strong></del></span>
<span class="inserted"><ins><em>confirmed this.</dd>
+ <dd>Requests the <code>READ_LOGS</code> permission to
read logs
+ for other apps and also core system logs. TigerVPN developers
+ have confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic</em></ins></span> to
- <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that</strong></del></span> <span
class="inserted"><ins><em>LinkedIn. Also, it stores detailed logs
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
and may turn them over to the UK government if
requested.</dd>
@@ -498,7 +530,7 @@
<p>The article takes for granted that the usual analytics tools are
legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
that</em></ins></span> snoop are
+ analyze what users are doing</em></ins></span> or how.
“Analytics” tools that snoop are
just as wrong as any other snooping.</p>
</li>
<li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
@@ -1647,7 +1679,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/03 18:01:51 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary-surveillance.ru-en.html 3 Jan 2018 19:01:24
-0000 1.103
+++ proprietary/po/proprietary-surveillance.ru-en.html 17 Jan 2018 17:02:53
-0000 1.104
@@ -339,6 +339,39 @@
<ul>
<li>
+ <p>20 dishonest Android apps
+ recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
+ snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their
+ being nonfree. It also distributes its own nonfree apps, such as
+ Google
+ Play, <a href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android
+ users, to inspect executable proprietary apps to see what they
+ do.</p>
+
+ <p>Google could demand the source code for these apps, and study the
+ source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
+</li>
+<li>
<p>A
<a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security
@@ -1562,7 +1595,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/03 19:01:24 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.332
retrieving revision 1.333
diff -u -b -r1.332 -r1.333
--- proprietary/po/proprietary-surveillance.ru.po 17 Jan 2018 15:04:14
-0000 1.332
+++ proprietary/po/proprietary-surveillance.ru.po 17 Jan 2018 17:02:53
-0000 1.333
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-17 13:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -691,8 +690,9 @@
msgstr ""
"20 неÑеÑÑнÑÑ
пÑиложений Android <a
href=\"https://arstechnica.com/"
"information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-"
-"stole-e-mails-and-texts\">запиÑÑвали ÑелеÑоннÑе
звонки и оÑпÑавлÑли иÑ
в виде "
-"ÑекÑÑовÑÑ
ÑообÑений и ÑлекÑÑонной поÑÑÑ
Ñем, кÑо ÑÐ»ÐµÐ´Ð¸Ñ Ð·Ð° полÑзоваÑелÑми</a>."
+"stole-e-mails-and-texts\">запиÑÑвали ÑелеÑоннÑе
звонки и оÑпÑавлÑли иÑ
в "
+"виде ÑекÑÑовÑÑ
ÑообÑений и ÑлекÑÑонной
поÑÑÑ Ñем, кÑо ÑÐ»ÐµÐ´Ð¸Ñ Ð·Ð° "
+"полÑзоваÑелÑми</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -702,9 +702,9 @@
"apps."
msgstr ""
"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google не наÑоÑно Ñделала, ÑÑÐ¾Ð±Ñ ÑÑи
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили; напÑоÑив, "
-"она пÑинимала ÑазлиÑнÑе меÑÑ, ÑÑобÑ
пÑедоÑвÑаÑиÑÑ ÑÑо, и Ñдалила ÑÑи
пÑиложениÑ, "
-"когда вÑÑÑнилоÑÑ, ÑÑо они делаÑÑ. Так ÑÑо
Ð¼Ñ Ð½Ðµ можем обвинÑÑÑ Google в Ñом, "
-"ÑÑо ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили."
+"она пÑинимала ÑазлиÑнÑе меÑÑ, ÑÑобÑ
пÑедоÑвÑаÑиÑÑ ÑÑо, и Ñдалила ÑÑи "
+"пÑиложениÑ, когда вÑÑÑнилоÑÑ, ÑÑо они
делаÑÑ. Так ÑÑо Ð¼Ñ Ð½Ðµ можем обвинÑÑÑ "
+"Google в Ñом, ÑÑо ÑÑи пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ñпионили."
#. type: Content of: <ul><li><p>
msgid ""
@@ -714,10 +714,10 @@
"philosophy/free-software-even-more-important.html\">which are malicious</a>."
msgstr ""
"С дÑÑгой ÑÑоÑонÑ, Google пеÑеÑаÑпÑоÑÑÑанÑеÑ
неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android, "
-"а ÑÑало бÑÑÑ, ÑазделÑÐµÑ Ð¾ÑвеÑÑÑвенноÑÑÑ
за неÑпÑаведливоÑÑÑ, ÑоÑÑоÑÑÑÑ Ð² Ñом, "
-"ÑÑо они неÑвободнÑ. ÐомпаниÑ
ÑаÑпÑоÑÑÑанÑÐµÑ Ñакже Ñвои ÑобÑÑвеннÑе
неÑвободнÑе "
-"пÑиложениÑ, Ñакие как Google Play, <a href=\"/"
-"philosophy/free-software-even-more-important.html\">коÑоÑÑе
злонамеÑеннÑ</a>."
+"а ÑÑало бÑÑÑ, ÑазделÑÐµÑ Ð¾ÑвеÑÑÑвенноÑÑÑ
за неÑпÑаведливоÑÑÑ, ÑоÑÑоÑÑÑÑ Ð² "
+"Ñом, ÑÑо они неÑвободнÑ. ÐомпаниÑ
ÑаÑпÑоÑÑÑанÑÐµÑ Ñакже Ñвои ÑобÑÑвеннÑе "
+"неÑвободнÑе пÑиложениÑ, Ñакие как Google Play,
<a href=\"/philosophy/free-"
+"software-even-more-important.html\">коÑоÑÑе
злонамеÑеннÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -725,10 +725,10 @@
"is no systematic way for Google, or Android users, to inspect executable "
"proprietary apps to see what they do."
msgstr ""
-"Ðогла ли ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google пÑедоÑвÑаÑаÑÑ
жÑлÑниÑеÑÑво Ñо ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений более "
-"ÑÑаÑелÑно? Ðи Ð´Ð»Ñ Google, ни длÑ
полÑзоваÑелей Android не ÑÑÑеÑÑвÑÐµÑ "
-"ÑиÑÑемаÑиÑеÑкого ÑпоÑоба инÑпекÑиÑоваÑÑ
иÑполнÑемÑе ÑÐ°Ð¹Ð»Ñ Ð½ÐµÑвободнÑÑ
пÑиложений, "
-"ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð½ÑÑÑ, ÑÑо они делаÑÑ."
+"Ðогла ли ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Google пÑедоÑвÑаÑаÑÑ
жÑлÑниÑеÑÑво Ñо ÑÑоÑÐ¾Ð½Ñ Ð¿Ñиложений "
+"более ÑÑаÑелÑно? Ðи Ð´Ð»Ñ Google, ни длÑ
полÑзоваÑелей Android не ÑÑÑеÑÑвÑÐµÑ "
+"ÑиÑÑемаÑиÑеÑкого ÑпоÑоба инÑпекÑиÑоваÑÑ
иÑполнÑемÑе ÑÐ°Ð¹Ð»Ñ Ð½ÐµÑвободнÑÑ
"
+"пÑиложений, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð½ÑÑÑ, ÑÑо они делаÑÑ."
#. type: Content of: <ul><li><p>
msgid ""
@@ -737,8 +737,8 @@
"did a good job of this, it could more or less prevent such snooping, except "
"when the app developers are clever enough to outsmart the checking."
msgstr ""
-"Ð Google могли Ð±Ñ ÑÑебоваÑÑ Ð¸ÑÑ
однÑй ÑекÑÑ
ÑÑиÑ
пÑиложений и изÑÑаÑÑ "
-"каким-Ñо обÑазом иÑÑ
однÑй ÑекÑÑ, ÑÑобÑ
опÑеделÑÑÑ, не делаÑÑ Ð»Ð¸ они полÑзоваÑелÑм "
+"Ð Google могли Ð±Ñ ÑÑебоваÑÑ Ð¸ÑÑ
однÑй ÑекÑÑ
ÑÑиÑ
пÑиложений и изÑÑаÑÑ ÐºÐ°ÐºÐ¸Ð¼-"
+"Ñо обÑазом иÑÑ
однÑй ÑекÑÑ, ÑÑобÑ
опÑеделÑÑÑ, не делаÑÑ Ð»Ð¸ они полÑзоваÑелÑм "
"ÑÑо-Ñо плоÑ
ое. ÐÑли Ð±Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð´ÐµÐ»Ð°Ð»Ð° ÑÑо
Ñ
оÑоÑо, она могла Ð±Ñ Ð±Ð¾Ð»ÐµÐµ или "
"менее пÑедоÑвÑаÑаÑÑ Ñакое подглÑдÑвание,
кÑоме ÑлÑÑаев, когда ÑазÑабоÑÑики "
"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð¾ÑÑаÑоÑно ÑмнÑ, ÑÑÐ¾Ð±Ñ Ð¿ÐµÑеÑ
иÑÑиÑÑ Ð¿ÑовеÑкÑ."
Index: proprietary/po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary.es-en.html 5 Nov 2017 11:59:12 -0000
1.17
+++ proprietary/po/proprietary.es-en.html 17 Jan 2018 17:02:53 -0000
1.18
@@ -56,7 +56,6 @@
<li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
<li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
<li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
- <li><a href="/proprietary/malware-phones.html">Malware in phones</a></li>
<li><a href="/proprietary/malware-mobiles.html">Malware in mobile
devices</a></li>
<li><a href="/proprietary/malware-games.html">Malware in games</a></li>
<li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
@@ -145,7 +144,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -155,7 +154,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/05 11:59:12 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/proprietary.es.po 14 Jan 2018 10:46:03 -0000 1.46
+++ proprietary/po/proprietary.es.po 17 Jan 2018 17:02:53 -0000 1.47
@@ -16,7 +16,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-13 15:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -316,12 +315,7 @@
"información sobre la coordinación y el envÃo de traducciones de las
páginas "
"de este sitio web."
-# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018+} Free
-# | Software Foundation, Inc.
#. type: Content of: <div><p>
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#| "Inc."
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
Index: proprietary/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary.fr-en.html 5 Nov 2017 10:59:17 -0000
1.23
+++ proprietary/po/proprietary.fr-en.html 17 Jan 2018 17:02:53 -0000
1.24
@@ -56,7 +56,6 @@
<li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
<li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
<li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
- <li><a href="/proprietary/malware-phones.html">Malware in phones</a></li>
<li><a href="/proprietary/malware-mobiles.html">Malware in mobile
devices</a></li>
<li><a href="/proprietary/malware-games.html">Malware in games</a></li>
<li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
@@ -145,7 +144,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -155,7 +154,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/05 10:59:17 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/po/proprietary.ja-diff.html 4 Nov 2017 14:29:13 -0000
1.8
+++ proprietary/po/proprietary.ja-diff.html 17 Jan 2018 17:02:53 -0000
1.9
@@ -74,7 +74,6 @@
<li><a</em></ins></span>
href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
<li><a <span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li>
<li><a href="/proprietary/malware-webpages.html">Malware in
webpages</a></li>
- <li><a href="/proprietary/malware-phones.html">Malware in
phones</a></li>
<li><a</em></ins></span>
href="/proprietary/malware-mobiles.html">Malware in mobile
devices</a></li>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html">Malware
in the Amazon
Swindle</a></li>
@@ -166,7 +165,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017 Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -176,7 +175,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/04 14:29:13 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary.pl-diff.html 4 Nov 2017 14:29:13 -0000
1.24
+++ proprietary/po/proprietary.pl-diff.html 17 Jan 2018 17:02:53 -0000
1.25
@@ -71,13 +71,12 @@
<li><strong>Company</strong></del></span>
<span class="inserted"><ins><em><h3>Company</em></ins></span> or type of
<span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>product</h3>
<ul>
- <li><a href="/proprietary/malware-apple.html">Apple
Malware</a></li>
- <li><a href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/malware-apple.html">Apple</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</em></ins></span>
Malware</a></li>
- <li><a <span
class="removed"><del><strong>href="/philosophy/malware-microsoft.html">Microsoft</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</em></ins></span>
Malware</a></li>
- <li><a <span
class="removed"><del><strong>href="/philosophy/malware-mobiles.html">Malware</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li>
+ <li><a href="/proprietary/malware-apple.html">Apple
Malware</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/malware-apple.html">Apple</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</em></ins></span>
Malware</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/malware-microsoft.html">Microsoft</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</em></ins></span>
Malware</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/malware-mobiles.html">Malware</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li>
+ <li><a href="/proprietary/malware-amazon.html">Amazon
Malware</a></li>
<li><a href="/proprietary/malware-webpages.html">Malware in
webpages</a></li>
- <li><a href="/proprietary/malware-phones.html">Malware in
phones</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Malware</em></ins></span> in mobile
devices</a></li>
<li><a <span
class="removed"><del><strong>href="/philosophy/malware-kindle-swindle.html">Malware</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Malware</em></ins></span>
in <span class="removed"><del><strong>the Amazon
Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>games</a></li>
@@ -168,7 +167,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017, 2018</em></ins></span> Free
Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -178,7 +177,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/04 14:29:13 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary.ru-en.html 7 Nov 2017 09:33:15 -0000
1.22
+++ proprietary/po/proprietary.ru-en.html 17 Jan 2018 17:02:53 -0000
1.23
@@ -56,7 +56,6 @@
<li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
<li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
<li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
- <li><a href="/proprietary/malware-phones.html">Malware in phones</a></li>
<li><a href="/proprietary/malware-mobiles.html">Malware in mobile
devices</a></li>
<li><a href="/proprietary/malware-games.html">Malware in games</a></li>
<li><a href="/proprietary/malware-appliances.html">Malware in
appliances</a></li>
@@ -145,7 +144,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation,
Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -155,7 +154,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2017/11/07 09:33:15 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary.ru.po 13 Jan 2018 16:20:09 -0000 1.63
+++ proprietary/po/proprietary.ru.po 17 Jan 2018 17:02:53 -0000 1.64
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-01-13 15:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -310,16 +309,12 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018+} Free
-# | Software Foundation, Inc.
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#| "Inc."
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software Foundation,
Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
Index: server/sitemap.ar.html
===================================================================
RCS file: /web/www/www/server/sitemap.ar.html,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- server/sitemap.ar.html 10 Jan 2018 18:02:40 -0000 1.247
+++ server/sitemap.ar.html 17 Jan 2018 17:02:53 -0000 1.248
@@ -1752,8 +1752,6 @@
<dd>Microsoft's Software is Malware</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>Malware in Mobile Devices</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malware in Webpages</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2108,7 +2106,7 @@
<p class="unprintable"><!-- timestamp start -->
ØÙدثت:
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: server/sitemap.de.html
===================================================================
RCS file: /web/www/www/server/sitemap.de.html,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- server/sitemap.de.html 10 Jan 2018 18:02:40 -0000 1.327
+++ server/sitemap.de.html 17 Jan 2018 17:02:53 -0000 1.328
@@ -1768,8 +1768,6 @@
<dd>Microsofts Software ist Schadsoftware</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>Schadprogramme auf mobilen Geräten</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobiltelefone zerstören die Freiheit</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Schadsoftware in Internetpräsenzen</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2124,7 +2122,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: server/sitemap.es.html
===================================================================
RCS file: /web/www/www/server/sitemap.es.html,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- server/sitemap.es.html 10 Jan 2018 18:02:40 -0000 1.190
+++ server/sitemap.es.html 17 Jan 2018 17:02:53 -0000 1.191
@@ -1760,8 +1760,6 @@
<dd>El software de Microsoft es <cite>malware</cite></dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd><cite>Malware</cite> en los dispositivos móbiles</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd><cite>Malware</cite> en las páginas web</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2114,7 +2112,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: server/sitemap.fr.html
===================================================================
RCS file: /web/www/www/server/sitemap.fr.html,v
retrieving revision 1.373
retrieving revision 1.374
diff -u -b -r1.373 -r1.374
--- server/sitemap.fr.html 10 Jan 2018 18:02:40 -0000 1.373
+++ server/sitemap.fr.html 17 Jan 2018 17:02:53 -0000 1.374
@@ -1781,8 +1781,6 @@
<dd>Malveillance des logiciels Microsoft</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>Malveillance des appareils mobiles</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Les téléphones mobiles piétinent les libertés des utilisateurs</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malveillance des pages web</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2140,7 +2138,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: server/sitemap.it.html
===================================================================
RCS file: /web/www/www/server/sitemap.it.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- server/sitemap.it.html 10 Jan 2018 18:02:40 -0000 1.106
+++ server/sitemap.it.html 17 Jan 2018 17:02:53 -0000 1.107
@@ -1758,8 +1758,6 @@
<dd>Microsoft's Software is Malware</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>Malware in Mobile Devices</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malware in Webpages</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2112,7 +2110,7 @@
<p class="unprintable"><!-- timestamp start -->
Ultimo aggiornamento:
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: server/sitemap.ja.html
===================================================================
RCS file: /web/www/www/server/sitemap.ja.html,v
retrieving revision 1.323
retrieving revision 1.324
diff -u -b -r1.323 -r1.324
--- server/sitemap.ja.html 10 Jan 2018 18:02:40 -0000 1.323
+++ server/sitemap.ja.html 17 Jan 2018 17:02:53 -0000 1.324
@@ -1725,8 +1725,6 @@
<dd>ãã¤ã¯ãã½ããã®ã½ããã¦ã§ã¢ã¯ãã«ã¦ã§ã¢ã </dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>ã¢ãã¤ã«ã»ããã¤ã¹ã®ãã«ã¦ã§ã¢</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malware in Webpages</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2071,7 +2069,7 @@
<p class="unprintable"><!-- timestamp start -->
æçµæ´æ°:
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: server/sitemap.nl.html
===================================================================
RCS file: /web/www/www/server/sitemap.nl.html,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- server/sitemap.nl.html 10 Jan 2018 18:02:40 -0000 1.248
+++ server/sitemap.nl.html 17 Jan 2018 17:02:53 -0000 1.249
@@ -1756,8 +1756,6 @@
<dd>Microsoft's Software is Malware</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>Malware in Mobile Devices</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malware in Webpages</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2106,7 +2104,7 @@
<p class="unprintable"><!-- timestamp start -->
Bijgewerkt:
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: server/sitemap.ro.html
===================================================================
RCS file: /web/www/www/server/sitemap.ro.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- server/sitemap.ro.html 10 Jan 2018 18:02:40 -0000 1.229
+++ server/sitemap.ro.html 17 Jan 2018 17:02:53 -0000 1.230
@@ -1756,8 +1756,6 @@
<dd>Microsoft's Software is Malware</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>Malware in Mobile Devices</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malware in Webpages</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2108,7 +2106,7 @@
<p class="unprintable"><!-- timestamp start -->
ActualizatÄ:
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: server/sitemap.ru.html
===================================================================
RCS file: /web/www/www/server/sitemap.ru.html,v
retrieving revision 1.318
retrieving revision 1.319
diff -u -b -r1.318 -r1.319
--- server/sitemap.ru.html 11 Jan 2018 09:33:00 -0000 1.318
+++ server/sitemap.ru.html 17 Jan 2018 17:02:53 -0000 1.319
@@ -1773,8 +1773,6 @@
<dd>ÐÑогÑÐ°Ð¼Ð¼Ñ Microsoft вÑедоноÑнÑ</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>ÐобилÑнÑе ÑелеÑÐ¾Ð½Ñ Ð¿Ð»ÑÑÑ Ð½Ð° ÑвободÑ
полÑзоваÑелелей</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>ÐÑедоноÑнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° ÑÑÑаниÑаÑ
ÑайÑов</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2129,7 +2127,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/01/11 09:33:00 $
+$Date: 2018/01/17 17:02:53 $
<!-- timestamp end -->
</p>
Index: server/sitemap.sq.html
===================================================================
RCS file: /web/www/www/server/sitemap.sq.html,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- server/sitemap.sq.html 10 Jan 2018 18:02:40 -0000 1.237
+++ server/sitemap.sq.html 17 Jan 2018 17:02:54 -0000 1.238
@@ -1768,8 +1768,6 @@
<dd>Software Microsoft është Malware</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>Malware në Pajisje Celulare</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malware in Webpages</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2120,7 +2118,7 @@
<p class="unprintable"><!-- timestamp start -->
U përditësua më:
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:54 $
<!-- timestamp end -->
</p>
Index: server/sitemap.uk.html
===================================================================
RCS file: /web/www/www/server/sitemap.uk.html,v
retrieving revision 1.277
retrieving revision 1.278
diff -u -b -r1.277 -r1.278
--- server/sitemap.uk.html 10 Jan 2018 18:02:40 -0000 1.277
+++ server/sitemap.uk.html 17 Jan 2018 17:02:54 -0000 1.278
@@ -1767,8 +1767,6 @@
<dd>ÐÑогÑами Microsoft ÑкÑдливÑ</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>ШкÑÐ´Ð»Ð¸Ð²Ñ Ð¿ÑогÑами в мобÑлÑниÑ
пÑиÑÑÑоÑÑ
</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malware in Webpages</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -2118,7 +2116,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðновлено:
-$Date: 2018/01/10 18:02:40 $
+$Date: 2018/01/17 17:02:54 $
<!-- timestamp end -->
</p>
Index: server/po/sitemap.fr-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.fr-en.html,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- server/po/sitemap.fr-en.html 11 Jan 2018 11:32:10 -0000 1.229
+++ server/po/sitemap.fr-en.html 17 Jan 2018 17:02:54 -0000 1.230
@@ -1652,8 +1652,6 @@
<dd>Microsoft's Software is Malware</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>Malware in Mobile Devices</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malware in Webpages</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -1979,7 +1977,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/11 11:32:10 $
+$Date: 2018/01/17 17:02:54 $
<!-- timestamp end -->
</p>
</div>
Index: server/po/sitemap.ja.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.ja.po,v
retrieving revision 1.334
retrieving revision 1.335
diff -u -b -r1.334 -r1.335
--- server/po/sitemap.ja.po 13 Jan 2018 18:01:10 -0000 1.334
+++ server/po/sitemap.ja.po 17 Jan 2018 17:02:54 -0000 1.335
@@ -6616,11 +6616,6 @@
#~ msgstr ""
#~ "<a href=\"/proprietary/malware-phones.html\">malware-phones.html</a>"
-#, fuzzy
-#~| msgid "Android and Users' Freedom"
-#~ msgid "Mobile Phones Trash Users' Freedom"
-#~ msgstr "ã¢ã³ããã¤ãã¨å©ç¨è
ã®èªç±"
-
#~ msgid ""
#~ "<a href=\"/graphics/skwid-gnu-flat-design.html\">skwid-gnu-flat-design."
#~ "html</a>"
Index: server/po/sitemap.ru-en.html
===================================================================
RCS file: /web/www/www/server/po/sitemap.ru-en.html,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- server/po/sitemap.ru-en.html 11 Jan 2018 09:33:00 -0000 1.191
+++ server/po/sitemap.ru-en.html 17 Jan 2018 17:02:54 -0000 1.192
@@ -1652,8 +1652,6 @@
<dd>Microsoft's Software is Malware</dd>
<dt><a href="/proprietary/malware-mobiles.html">malware-mobiles.html</a></dt>
<dd>Malware in Mobile Devices</dd>
- <dt><a href="/proprietary/malware-phones.html">malware-phones.html</a></dt>
- <dd>Mobile Phones Trash Users' Freedom</dd>
<dt><a
href="/proprietary/malware-webpages.html">malware-webpages.html</a></dt>
<dd>Malware in Webpages</dd>
<dt><a
href="/proprietary/potential-malware.html">potential-malware.html</a></dt>
@@ -1979,7 +1977,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/01/11 09:33:00 $
+$Date: 2018/01/17 17:02:54 $
<!-- timestamp end -->
</p>
</div>
Index: server/po/sitemap.sq.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.sq.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- server/po/sitemap.sq.po 13 Jan 2018 18:01:10 -0000 1.269
+++ server/po/sitemap.sq.po 17 Jan 2018 17:02:54 -0000 1.270
@@ -6714,12 +6714,6 @@
#~ msgstr ""
#~ "<a href=\"/proprietary/malware-phones.html\">malware-phones.html</a>"
-# type: Content of: <ul><li><ul><li>
-#, fuzzy
-#~| msgid "Android and Users' Freedom"
-#~ msgid "Mobile Phones Trash Users' Freedom"
-#~ msgstr "Android-i dhe Liria e Përdoruesit"
-
#~ msgid ""
#~ "<a href=\"/graphics/skwid-gnu-flat-design.html\">skwid-gnu-flat-design."
#~ "html</a>"
Index: server/po/sitemap.uk.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.uk.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- server/po/sitemap.uk.po 13 Jan 2018 18:01:10 -0000 1.317
+++ server/po/sitemap.uk.po 17 Jan 2018 17:02:54 -0000 1.318
@@ -6699,11 +6699,6 @@
#~ msgstr ""
#~ "<a href=\"/proprietary/malware-phones.html\">malware-phones.html</a>"
-#, fuzzy
-#~| msgid "Android and Users' Freedom"
-#~ msgid "Mobile Phones Trash Users' Freedom"
-#~ msgstr "ÐндÑоÑд Ñ Ñвобода коÑиÑÑÑваÑÑв"
-
#~ msgid ""
#~ "<a href=\"/graphics/skwid-gnu-flat-design.html\">skwid-gnu-flat-design."
#~ "html</a>"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www philosophy/categories.es.html philosophy/su...,
GNUN <=