[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po proprietary-insecurity.ru.po
From: |
Ineiev |
Subject: |
www/proprietary/po proprietary-insecurity.ru.po |
Date: |
Wed, 26 Sep 2018 14:07:36 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Ineiev <ineiev> 18/09/26 14:07:36
Modified files:
proprietary/po : proprietary-insecurity.ru.po
Log message:
Update.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.187&r2=1.188
Patches:
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary-insecurity.ru.po 26 Sep 2018 17:57:34 -0000 1.187
+++ proprietary-insecurity.ru.po 26 Sep 2018 18:07:35 -0000 1.188
@@ -113,6 +113,10 @@
"voice commands in other audio</a>, so that people cannot hear them, but "
"Alexa and Siri can."
msgstr ""
+"ÐÑÑледоваÑели оÑкÑÑли ÑпоÑоб <a
href=\"http://news.rub.de/english/press-"
+"releases/2018-09-24-it-security-secret-messages-alexa-and-co\">
ÑкÑÑваÑÑ "
+"голоÑовÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² дÑÑгиÑ
звÑкозапиÑÑÑ
</a>, Ñак ÑÑо лÑди ÑÑи ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð½Ðµ "
+"ÑлÑÑаÑ, но иÑ
ÑлÑÑÐ°Ñ Alexa и Siri."
#. type: Content of: <ul><li><p>
msgid ""
@@ -120,6 +124,9 @@
"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
"listening device</a> for them."
msgstr ""
+"ÐзломÑики наÑли ÑпоÑоб пÑобиÑÑ Ð·Ð°ÑиÑÑ
ÑÑÑÑойÑÑва Amazon и <a href=\"https://"
+"boingboing.net/2018/08/12/alexa-bob-carol.html\"> пÑевÑаÑиÑÑ ÐµÐ³Ð¾
в "
+"ÑÑÑÑойÑÑво, подÑлÑÑиваÑÑее</a> Ð´Ð»Ñ Ð½Ð¸Ñ
."
#. type: Content of: <ul><li><p>
msgid ""
@@ -128,6 +135,10 @@
"this, or cease to sell the product in that country, do you think Amazon "
"would have the moral fiber to say no?"
msgstr ""
+"ÐÑо бÑло Ð´Ð»Ñ Ð½Ð¸Ñ
нелегко. ÐÐ»Ñ Amazon ÑÑо бÑло
Ð±Ñ Ð³Ð¾Ñаздо пÑоÑе. ÐÑли какой-"
+"Ñо пÑавÑÑий Ñежим, Ñкажем, ÐиÑай или СШÐ,
велел Amazon ÑделаÑÑ ÑÑо под "
+"ÑгÑозой запÑеÑа пÑодаваÑÑ Ð¿ÑодÑÐºÑ Ð² ÑÑой
ÑÑÑане, как Ð²Ñ Ð´ÑмаеÑе, наÑла Ð±Ñ "
+"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Amazon в Ñебе моÑалÑнÑÑ ÑилÑ
ÑказаÑÑ “неє?"
#. type: Content of: <ul><li><p>
msgid ""
@@ -135,6 +146,9 @@
"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
"mean “breaking security”</a>."
msgstr ""
+"ÐÑи взломÑики, возможно, ÑвлÑÑÑÑÑ
одновÑеменно Ñ
акеÑами, но, пожалÑйÑÑа, <a "
+"href=\"https://stallman.org/articles/on-hacking.html\"> не
ÑпоÑÑеблÑйÑе "
+"Ñлово “Ñ
акеÑÑÑво” в знаÑении
“взлом заÑиÑÑ”</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -249,13 +263,6 @@
msgstr "Ðе бÑÐ´Ñ Ð¿ÑоÑÑоÑилей — оÑкажиÑÑ
Ð¾Ñ Ð²ÑеÑ
клеÑей."
#. type: Content of: <ul><li><p>
-# | It is unfortunate that the article uses the term <a
-# | href=\"/philosophy/words-to-avoid.html#Monetize\">[-
-# | -]“monetize”</a>.
-#, fuzzy
-#| msgid ""
-#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#| "words-to-avoid.html#Monetize\"> “monetize”</a>."
msgid ""
"It is unfortunate that the article uses the term <a href=\"/philosophy/words-"
"to-avoid.html#Monetize\">“monetize”</a>."
@@ -496,15 +503,10 @@
"пока не Ð²Ð¸Ð´Ð¸Ñ Ð¼Ð°Ð¼Ð°."
#. type: Content of: <ul><li><p>
-# | 4G LTE phone networks are drastically insecure. They can be <a
-# |
[-href=\"https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">-]
-# |
{+href=\"https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">+}
-# | taken over by third parties and used for man-in-the-middle attacks</a>.
-#, fuzzy
+# || No change detected. The change might only be in amounts of spaces.
#| msgid ""
#| "4G LTE phone networks are drastically insecure. They can be <a href="
-#| "\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-#| "uk/2016/10/23/"
+#| "\"https://www.theregister.co.uk/2016/10/23/"
#| "every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
#| "over by third parties and used for man-in-the-middle attacks</a>."
msgid ""
@@ -604,15 +606,6 @@
msgstr "GNU/Linux в анÑивиÑÑÑаÑ
не нÑждаеÑÑÑ."
#. type: Content of: <ul><li><p>
-# | Samsung's “Smart Home” has a big security hole; <a
-# |
href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/\">{+
-# | +}unauthorized people can remotely control it</a>.
-#, fuzzy
-#| msgid ""
-#| "Samsung's “Smart Home” has a big security hole; <a href="
-#| "\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-"
-#| "hackers-make-keys-to-front-door/\">unauthorized people can remotely "
-#| "control it</a>."
msgid ""
"Samsung's “Smart Home” has a big security hole; <a href=\"http://"
"arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-"
@@ -651,15 +644,6 @@
"позволила вÑедоноÑÐ½Ð¾Ð¼Ñ ÑайÑÑ Ð¸Ð·Ð²Ð»ÐµÑÑ Ð²ÑÑ
иÑÑоÑÐ¸Ñ ÑообÑений полÑзоваÑелÑ</a>."
#. type: Content of: <ul><li><p>
-# | Malware {+was+} found on <a
-# |
href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">{+
-# | +}security cameras available through Amazon</a>.
-#, fuzzy
-#| msgid ""
-#| "Malware found on <a href=\"http://www.slate.com/blogs/"
-#| "future_tense/2016/04/11/"
-#| "security_cameras_sold_through_amazon_have_malware_according_to_security."
-#| "html\">security cameras available through Amazon</a>."
msgid ""
"Malware was found on <a href=\"http://www.slate.com/blogs/"
"future_tense/2016/04/11/"
@@ -683,38 +667,16 @@
"оÑноÑении Ñоже не пÑедÑÑавлÑÑÑ ÑгÑозÑ."
#. type: Content of: <ul><li><p>
-# | Over 70 brands of network-connected surveillance cameras {+have+} <a
-# |
[-href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">have-]
-# |
{+href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">+}
-# | security bugs that allow anyone to watch through them</a>.
-#, fuzzy
-#| msgid ""
-#| "Over 70 brands of network-connected surveillance cameras <a href=\"http://"
-#| "www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
-#| "\">have security bugs that allow anyone to watch through them</a>."
msgid ""
"Over 70 brands of network-connected surveillance cameras have <a href="
"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
"html\"> security bugs that allow anyone to watch through them</a>."
msgstr ""
-"РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок <a
href=\"http://www.kerneronsec."
-"com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">обнаÑÑженÑ
недоÑеÑÑ "
-"безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>."
+"РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок
обнаÑÑÐ¶ÐµÐ½Ñ <a href=\"http://www."
+"kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
+"\">недоÑеÑÑ Ð±ÐµÐ·Ð¾Ð¿Ð°ÑноÑÑи, позволÑÑÑие комÑ
Ñгодно подглÑдÑваÑÑ ÑеÑез ниÑ
</a>."
#. type: Content of: <ul><li><p>
-# | Many proprietary payment apps <a
-# |
href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">[-
-# | -]transmit personal data in an insecure way</a>. However, the worse aspect
-# | of these apps is that <a
-# | href=\"/philosophy/surveillance-vs-democracy.html\">payment is not
-# | anonymous</a>.
-#, fuzzy
-#| msgid ""
-#| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
-#| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
-#| "securing-user-data\"> transmit personal data in an insecure way</a>. "
-#| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
-#| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
msgid ""
"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
@@ -755,14 +717,6 @@
"\">ÑÑо знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>."
#. type: Content of: <ul><li><p>
-# | Even if no one connects to the car remotely, the cell phone modem enables
-# | the phone company to track the car's movements all the time; it is
-# | possible to physically remove the cell phone modem{+,+} though.
-#, fuzzy
-#| msgid ""
-#| "Even if no one connects to the car remotely, the cell phone modem enables "
-#| "the phone company to track the car's movements all the time; it is "
-#| "possible to physically remove the cell phone modem though."
msgid ""
"Even if no one connects to the car remotely, the cell phone modem enables "
"the phone company to track the car's movements all the time; it is possible "
@@ -773,20 +727,6 @@
"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
#. type: Content of: <ul><li><p>
-# | FitBit fitness trackers [-<a
-# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">-]
-# | have a {+<a
-# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">+}
-# | Bluetooth vulnerability</a> that allows attackers to send malware to the
-# | devices, which can subsequently spread to computers and other FitBit
-# | trackers that interact with them.
-#, fuzzy
-#| msgid ""
-#| "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-"
-#| "security/latest-security-news/10-second-hack-delivers-first-ever-malware-"
-#| "to-fitness-trackers/\"> have a Bluetooth vulnerability</a> that allows "
-#| "attackers to send malware to the devices, which can subsequently spread "
-#| "to computers and other FitBit trackers that interact with them."
msgid ""
"FitBit fitness trackers have a <a href=\"http://www.tripwire.com/state-of-"
"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
@@ -794,25 +734,13 @@
"send malware to the devices, which can subsequently spread to computers and "
"other FitBit trackers that interact with them."
msgstr ""
-"Ð ÑизкÑлÑÑÑÑнÑÑ
ÑÑÑÑойÑÑваÑ
FitBit <a
href=\"http://www.tripwire.com/state-"
-"of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-"
-"to-fitness-trackers/\"> еÑÑÑ ÑÑзвимоÑÑÑ Bluetooth</a>,
позволÑÑÑÐ°Ñ Ð¿Ð¾ÑÑлаÑÑ "
-"в ÑÑÑÑойÑÑва вÑедоноÑнÑе пÑогÑаммÑ,
коÑоÑÑе заÑем могÑÑ ÑаÑпÑоÑÑÑанÑÑÑÑÑ Ð¿Ð¾ "
-"компÑÑÑеÑам и дÑÑгим ÑÑÑÑойÑÑвам FitBit, Ñ
коÑоÑÑми они взаимодейÑÑвÑÑÑ."
+"<a href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-"
+"second-hack-delivers-first-ever-malware-to-fitness-trackers/\">ÑÑзвимоÑÑÑ
"
+"Bluetooth</a>, позволÑÑÑÐ°Ñ Ð¿Ð¾ÑÑлаÑÑ Ð²
ÑÑÑÑойÑÑва вÑедоноÑнÑе пÑогÑаммÑ, "
+"коÑоÑÑе заÑем могÑÑ ÑаÑпÑоÑÑÑанÑÑÑÑÑ Ð¿Ð¾
компÑÑÑеÑам и дÑÑгим ÑÑÑÑойÑÑвам "
+"FitBit, Ñ ÐºÐ¾ÑоÑÑми они взаимодейÑÑвÑÑÑ."
#. type: Content of: <ul><li><p>
-# | “Self-encrypting” disk drives do the encryption with
-# | proprietary firmware so you can't trust it. Western Digital's “My
-# | Passport” drives <a
-# |
href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">{+
-# | +}have a back door</a>.
-#, fuzzy
-#| msgid ""
-#| "“Self-encrypting” disk drives do the encryption with "
-#| "proprietary firmware so you can't trust it. Western Digital's “My "
-#| "Passport” drives <a href=\"https://motherboard.vice.com/en_us/"
-#| "article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-"
-#| "encryption\">have a back door</a>."
msgid ""
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
@@ -821,10 +749,10 @@
"back door</a>."
msgstr ""
"“СамоÑиÑÑÑÑÑиеÑÑ” жеÑÑкие диÑки
ÑиÑÑÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
"
-"внÑÑÑенниÑ
пÑогÑамм, Ñак ÑÑо Ð²Ñ Ð½Ðµ можеÑе
им довеÑÑÑÑ. У диÑков “My "
-"Passport” компании Western Digital <a
href=\"https://motherboard.vice."
-"com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-"
-"really-bad-encryption\">еÑÑÑ ÑеÑнÑй Ñ
од</a>."
+"внÑÑÑенниÑ
пÑогÑамм, Ñак ÑÑо Ð²Ñ Ð½Ðµ можеÑе
им довеÑÑÑÑ. <a href=\"https://"
+"motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-"
+"drives-have-really-bad-encryption\">У диÑков “My Passport”
"
+"компании Western Digital еÑÑÑ ÑеÑнÑй Ñ
од</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -840,16 +768,6 @@
"авÑомобилÑми поÑÑедÑÑвом SMS."
#. type: Content of: <ul><li><p>
-# | Crackers were able to <a
-# |
href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">{+
-# | +}take remote control of the Jeep</a> “connected car”. {+They
-# | could track the car, start or stop the engine, and activate or deactivate
-# | the brakes, and more.+}
-#, fuzzy
-#| msgid ""
-#| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
-#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
-#| "\">take remote control of the Jeep</a> “connected car”."
msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> take "
@@ -874,14 +792,6 @@
"вÑклÑÑÑ."
#. type: Content of: <ul><li><p>
-# | Due to bad security in a drug pump, crackers could use it to <a
-# |
href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">{+
-# | +}kill patients</a>.
-#, fuzzy
-#| msgid ""
-#| "Due to bad security in a drug pump, crackers could use it to <a href="
-#| "\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-#| "pumps/\">kill patients</a>."
msgid ""
"Due to bad security in a drug pump, crackers could use it to <a href="
"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
@@ -892,18 +802,11 @@
"hospital-drug-pumps/\">ÑбийÑÑва паÑиенÑов</a>."
#. type: Content of: <ul><li><p>
-# | <a
-# |
href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\">
-# | Many smartphone apps use insecure authentication methods when storing your
-# | personal data on remote [-servers.</a>-] {+servers</a>.+} This leaves
-# | personal information like email addresses, passwords, and health
-# | information vulnerable. Because many of these apps are proprietary it
-# | makes it hard to impossible to know which apps are at risk.
-#, fuzzy
+# || No change detected. The change might only be in amounts of spaces.
#| msgid ""
#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-"
#| "millions-users.html\"> Many smartphone apps use insecure authentication "
-#| "methods when storing your personal data on remote servers.</a> This "
+#| "methods when storing your personal data on remote servers</a>. This "
#| "leaves personal information like email addresses, passwords, and health "
#| "information vulnerable. Because many of these apps are proprietary it "
#| "makes it hard to impossible to know which apps are at risk."
@@ -917,7 +820,7 @@
msgstr ""
"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
"users.html\"> Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑмаÑÑÑонов
пÑименÑÑÑ Ð½ÐµÐ±ÐµÐ·Ð¾Ð¿Ð°ÑнÑе меÑÐ¾Ð´Ñ "
-"аÑÑенÑиÑикаÑии пÑи Ñ
Ñанении ваÑиÑ
лиÑнÑÑ
даннÑÑ
на ÑдаленнÑÑ
ÑеÑвеÑаÑ
.</a> "
+"аÑÑенÑиÑикаÑии пÑи Ñ
Ñанении ваÑиÑ
лиÑнÑÑ
даннÑÑ
на ÑдаленнÑÑ
ÑеÑвеÑаÑ
</a>. "
"ÐÑо подвеÑÐ³Ð°ÐµÑ Ð¾Ð¿Ð°ÑноÑÑи ÑакÑÑ Ð»Ð¸ÑнÑÑ
инÑоÑмаÑиÑ, как адÑеÑа ÑлекÑÑонной "
"поÑÑÑ, паÑоли, а Ñакже медиÑинÑкие даннÑе.
ÐоÑколÑÐºÑ Ð¼Ð½Ð¾Ð³Ð¸Ðµ из ÑÑиÑ
"
"пÑиложений неÑвободнÑ, ÑÑÑдно, еÑли
вообÑе возможно, ÑзнаÑÑ, какие "
@@ -958,7 +861,6 @@
#. type: Content of: <ul><li><p>
# || No change detected. The change might only be in amounts of spaces.
-#, fuzzy
#| msgid ""
#| "An app to prevent “identity theft” (access to personal data) "
#| "by storing users' data on a special server <a href=\"http://arstechnica."
@@ -991,14 +893,6 @@
"пÑедваÑиÑелÑно Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑвободнÑÑ
пÑогÑамм, подÑÑÐ²Ð°ÐµÑ Ð²Ð°Ñи пÑава."
#. type: Content of: <ul><li><p>
-# | Lots of <a
-# | href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">{+
-# | +}hospital equipment has lousy security</a>, and it can be fatal.
-#, fuzzy
-#| msgid ""
-#| "Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
-#| "vulnerable/\">hospital equipment has lousy security</a>, and it can be "
-#| "fatal."
msgid ""
"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
"\"> hospital equipment has lousy security</a>, and it can be fatal."
@@ -1027,36 +921,17 @@
"ÑÑзвимÑми Ð´Ð»Ñ Ð²Ð¸ÑÑÑов."
#. type: Content of: <ul><li><p>
-# | We don't call this a “back door” because it is normal that you
-# | can install a new system in a computer{+,+} given physical access to it.
-# | However, memory sticks and cards should not be modifiable in this way.
-#, fuzzy
-#| msgid ""
-#| "We don't call this a “back door” because it is normal that "
-#| "you can install a new system in a computer given physical access to it. "
-#| "However, memory sticks and cards should not be modifiable in this way."
msgid ""
"We don't call this a “back door” because it is normal that you "
"can install a new system in a computer, given physical access to it. "
"However, memory sticks and cards should not be modifiable in this way."
msgstr ""
-"ÐÑ Ð½Ðµ назÑваем ÑÑо “ÑеÑнÑм Ñ
одом”,
поÑÐ¾Ð¼Ñ ÑÑо когда Ð²Ñ Ð¿Ð¾Ð»ÑÑаеÑе "
-"ÑизиÑеÑкий доÑÑÑп к компÑÑÑеÑÑ, вÑ, как
пÑавило, можеÑе ÑÑÑановиÑÑ Ð½Ð° нем "
-"новÑÑ ÑиÑÑемÑ. Ðднако Ñ ÐºÐ°ÑÑ Ð¿Ð°Ð¼ÑÑи и
дÑÑгиÑ
ноÑиÑелей не должно бÑÑÑ "
+"ÐÑ Ð½Ðµ назÑваем ÑÑо “ÑеÑнÑм Ñ
одом”,
Ð²ÐµÐ´Ñ Ñо, ÑÑо Ð²Ñ Ð¼Ð¾Ð¶ÐµÑе "
+"ÑÑÑановиÑÑ Ð½Ð¾Ð²ÑÑ ÑиÑÑÐµÐ¼Ñ Ð½Ð° компÑÑÑеÑ, к
коÑоÑÐ¾Ð¼Ñ Ñ Ð²Ð°Ñ ÐµÑÑÑ ÑизиÑеÑкий "
+"доÑÑÑп — ÑÑо ноÑмалÑно. Ðднако Ñ ÐºÐ°ÑÑ
памÑÑи не должно бÑÑÑ "
"возможноÑÑи ÑакиÑ
изменений."
#. type: Content of: <ul><li><p>
-# | <a
-# |
href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/\">
-# | Point-of-sale terminals running Windows were taken [-over-] {+over</a>+}
-# | and turned into a botnet for the purpose of collecting customers' credit
-# | card [-numbers</a>.-] {+numbers.+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
-#| "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-#| "running Windows were taken over and turned into a botnet for the purpose "
-#| "of collecting customers' credit card numbers</a>."
msgid ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
@@ -1065,31 +940,10 @@
msgstr ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð²
меÑÑаÑ
пÑодаж, "
-"ÑабоÑаÑÑие под ÑпÑавлением Windows, бÑли
обÑаÑÐµÐ½Ñ Ð·Ð»Ð¾ÑмÑÑленниками в ÑеÑÑ "
-"ÑбоÑа номеÑов кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов</a>."
+"ÑабоÑаÑÑие под ÑпÑавлением Windows, бÑли
взÑÑÑ Ð¿Ð¾Ð´ конÑÑолÑ</a> и обÑаÑÐµÐ½Ñ "
+"злоÑмÑÑленниками в ÑеÑÑ ÑбоÑа номеÑов
кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов."
#. type: Content of: <ul><li><p>
-# | <a
-# |
[-href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">-]
-# |
{+href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">+}
-# | The NSA can tap data in smart phones, including iPhones, Android, and
-# | BlackBerry</a>. While there is not much detail here, it seems that this
-# | does not operate via the universal back door that we know nearly all
-# | portable phones have. It may involve exploiting various bugs. There are
-# | <a
-# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
-# | lots of bugs in the phones' radio software</a>.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
-#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
-#| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
-#| "there is not much detail here, it seems that this does not operate via "
-#| "the universal back door that we know nearly all portable phones have. It "
-#| "may involve exploiting various bugs. There are <a href=\"http://www."
-#| "osnews.com/story/27416/"
-#| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
-#| "in the phones' radio software</a>."
msgid ""
"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
"international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
@@ -1101,17 +955,29 @@
"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
"the phones' radio software</a>."
msgstr ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> ÐÐРможеÑ
заглÑдÑваÑÑ Ð² даннÑе на "
-"ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android и
BlackBerry</a>. ХоÑÑ "
-"подÑобноÑÑи здеÑÑ Ð½Ðµ пÑиводÑÑÑÑ, поÑ
оже,
ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ как ÑнивеÑÑалÑнÑй "
-"ÑеÑнÑй Ñ
од, коÑоÑÑй, как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ
поÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. "
-"ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией
ÑазлиÑнÑÑ
оÑибок. <a href=\"http://"
-"www.osnews.com/story/27416/"
+"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
+"international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
+"html\"> ÐÐÐ Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°Ð³Ð»ÑдÑваÑÑ Ð² даннÑе на
ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, "
+"Android и BlackBerry</a>. ХоÑÑ Ð¿Ð¾Ð´ÑобноÑÑи здеÑÑ Ð½Ðµ
пÑиводÑÑÑÑ, поÑ
оже, ÑÑо "
+"ÑабоÑÐ°ÐµÑ Ð½Ðµ как ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од,
коÑоÑÑй, как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ Ð¿Ð¾ÑÑи "
+"во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. ÐÑо можеÑ
бÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией "
+"ÑазлиÑнÑÑ
оÑибок. <a href=\"http://www.osnews.com/story/27416/"
"The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
#. type: Content of: <ul><li><p>
+# | <a
+# |
href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security\">The
+# | NSA has put back doors into nonfree encryption [-software.</a>-]
+# | {+software</a>.+} We don't know which ones they are, but we can be sure
+# | they include some widely used systems. This reinforces the point that you
+# | can never trust the security of nonfree software.
+#| msgid ""
+#| "<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-"
+#| "encryption-codes-security\">The NSA has put back doors into nonfree "
+#| "encryption software.</a> We don't know which ones they are, but we can be "
+#| "sure they include some widely used systems. This reinforces the point "
+#| "that you can never trust the security of nonfree software."
msgid ""
"<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
"codes-security\">The NSA has put back doors into nonfree encryption "
@@ -1119,75 +985,37 @@
"include some widely used systems. This reinforces the point that you can "
"never trust the security of nonfree software."
msgstr ""
+"<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
+"codes-security\"> NSA ÑаÑÐ¿Ð¾Ð»Ð°Ð³Ð°ÐµÑ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°Ð¼Ð¸ в
неÑвободнÑÑ
кÑипÑогÑаÑиÑеÑкиÑ
"
+"пÑогÑаммаÑ
</a>. ÐÑ Ð½Ðµ знаем, в какиÑ
именно,
но Ð¼Ñ Ð¼Ð¾Ð¶ÐµÐ¼ бÑÑÑ ÑвеÑенÑ, ÑÑо "
+"ÑÑеди ниÑ
еÑÑÑ ÑиÑоко пÑименÑемÑе
ÑиÑÑемÑ. ÐÑо ÑлÑÐ¶Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑждением ÑÐ¾Ð¼Ñ "
+"ÑакÑÑ, ÑÑо никогда нелÑÐ·Ñ ÑаÑÑÑиÑÑваÑÑ Ð½Ð°
безопаÑноÑÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">-]The
-# | FTC punished a company for making webcams with {+<a
-# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">+}
-# | bad security so that it was easy for anyone to watch {+through+} them</a>.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-"
-#| "flaw-put-users-lives-on-display.html\"> The FTC punished a company for "
-#| "making webcams with bad security so that it was easy for anyone to watch "
-#| "them</a>."
msgid ""
"The FTC punished a company for making webcams with <a href=\"http://www."
"nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-"
"display.html\"> bad security so that it was easy for anyone to watch through "
"them</a>."
msgstr ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> ФедеÑалÑÐ½Ð°Ñ ÑоÑговаÑ
комиÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð° "
-"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
камеÑ,
безопаÑноÑÑÑ ÐºÐ¾ÑоÑÑÑ
бÑла наÑÑолÑко "
-"плоÑ
а, ÑÑо каждÑй легко мог глÑдеÑÑ ÑеÑез
ниÑ
</a>."
+"ФедеÑалÑÐ½Ð°Ñ ÑоÑÐ³Ð¾Ð²Ð°Ñ ÐºÐ¾Ð¼Ð¸ÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð°
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
"
+"ÐºÐ°Ð¼ÐµÑ Ñ Ñакой Ñлабой заÑиÑой, <a
href=\"http://www.nytimes.com/2013/09/05/"
+"technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\"> ÑÑо "
+"каждÑй мог легко глÑдеÑÑ ÑеÑез ниÑ
</a>."
#. type: Content of: <ul><li><p>
-# | <a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable
-# | nonfree software in disk drives can be written by a nonfree
-# | [-program.</a>-] {+program</a>.+} This makes any system vulnerable to
-# | persistent attacks that normal forensics won't detect.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-#| "nonfree software in disk drives can be written by a nonfree program.</a> "
-#| "This makes any system vulnerable to persistent attacks that normal "
-#| "forensics won't detect."
msgid ""
"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
"nonfree software in disk drives can be written by a nonfree program</a>. "
"This makes any system vulnerable to persistent attacks that normal forensics "
"won't detect."
msgstr ""
-"<a href=\"http://spritesmods.com/?art=hddhack&page=6\">
ÐаменÑемÑе "
-"неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° жеÑÑкиÑ
диÑкаÑ
можно запиÑÑваÑÑ Ð½ÐµÑвободной "
-"пÑогÑаммой</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ ÑиÑÑÐµÐ¼Ñ ÑÑзвимой
Ð´Ð»Ñ Ð¿Ð¾ÑÑÑннÑÑ
аÑак, "
-"необнаÑÑжимÑÑ
обÑÑнÑми ÑÑедÑÑвами."
-
-#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">-]It
-# | is possible to {+<a
-# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">+}
-# | kill people by taking control of medical implants by radio</a>. [-Here
-# | is-] {+More information in+} <a
-# | [-href=\"http://www.bbc.co.uk/news/technology-17631838\">more
-# | information</a>. And-]
-# | {+href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a>
-# | and+} <a
-# |
[-href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">here</a>.-]
-# |
{+href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">
-# | IOActive Labs Research blog</a>.+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
-#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
-#| "to kill people by taking control of medical implants by radio</a>. Here "
-#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
-#| "information</a>. And <a href=\"https://web.archive.org/"
-#| "web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
-#| "plausible-was.html\">here</a>."
+"<a href=\"http://spritesmods.com/?art=hddhack&page=6\">
ÐеÑезапиÑÑваемÑе "
+"неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð² конÑÑоллеÑаÑ
диÑков могÑÑ Ð·Ð°Ð¼ÐµÐ½ÑÑÑÑÑ Ð½ÐµÑвободной "
+"пÑогÑаммой</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð»ÑбÑÑ ÑиÑÑемÑ
ÑÑзвимой по оÑноÑÐµÐ½Ð¸Ñ Ðº "
+"неÑÑÑÑанÑемÑм аÑакам, коÑоÑÑе не
обнаÑÑживаÑÑÑÑ Ð¾Ð±ÑÑнÑм анализом."
+
+#. type: Content of: <ul><li><p>
msgid ""
"It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> kill "
@@ -1200,9 +1028,8 @@
"dies-days-before-scheduled-black-hat-appearance/\"> ÐолÑÑив
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ "
"вживленнÑми медиÑинÑкими ÑÑÑÑойÑÑвами по
Ñадио, можно ÑбиваÑÑ Ð»Ñдей</a>. "
"ÐодÑобноÑÑи Ñм. <a
href=\"http://www.bbc.co.uk/news/technology-17631838\"> "
-"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://web.archive.org/web/20180203130244/"
-"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\"> в "
-"блоге IOActive</a>."
+"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://blog.ioactive.com/2013/02/broken-"
+"hearts-how-plausible-was.html\"> в блоге лабоÑаÑоÑии
IOActive</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1229,25 +1056,6 @@
"ÑÑÐ¾Ð±Ñ ÑмоÑÑеÑÑ Ð½Ð° лÑдей, коÑоÑÑе ÑмоÑÑÑÑ
ÑелевизоÑ."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">-]It
-# | is possible to {+<a
-# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">+}
-# | take control of some car computers through malware in music files</a>.
-# | Also <a
-# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">{+
-# | +}by radio</a>. [-Here is-] {+More information in+} <a
-# | [-href=\"http://www.autosec.org/faq.html\">more information</a>.-]
-# | {+href=\"http://www.autosec.org/faq.html\"> Automotive Security And
-# | Privacy Center</a>.+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#| "hacking_music_can_take_control_your_car/\"> It is possible to take "
-#| "control of some car computers through malware in music files</a>. Also "
-#| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
-#| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
-#| "\">more information</a>."
msgid ""
"It is possible to <a href=\"http://www.pcworld.idg.com.au/article/379477/"
"hacking_music_can_take_control_your_car/\"> take control of some car "
@@ -1339,128 +1147,3 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ðбновлено:"
-
-#~ msgid ""
-#~ "Even if no one connects to the car remotely, the cell phone modem enables "
-#~ "the phone company to track the car's movements all the time; it is "
-#~ "possible to physically remove the cell phone modem though."
-#~ msgstr ""
-#~ "Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
-#~ "ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
-#~ "авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки
ÑдалиÑÑ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи."
-
-#~ msgid ""
-#~ "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
-#~ "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
-#~ "securing-user-data\"> transmit personal data in an insecure way</a>. "
-#~ "However, the worse aspect of these apps is that <a href=\"/philosophy/"
-#~ "surveillance-vs-democracy.html\">payment is not anonymous</a>."
-#~ msgstr ""
-#~ "Ðногие неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð¿Ð»Ð°Ñежей <a
href=\"http://www.bloomberg.com/"
-#~ "news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
-#~ "securing-user-data\"> пеÑедаÑÑ Ð´Ð°Ð½Ð½Ñе
незаÑиÑеннÑм обÑазом</a>. Ðднако "
-#~ "еÑе Ñ
Ñже Ñо, ÑÑо в ÑÑиÑ
пÑиложениÑÑ
<a
href=\"/philosophy/surveillance-vs-"
-#~ "democracy.html\">плаÑежи не анонимнÑ</a>."
-
-#~ msgid ""
-#~ "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
-#~ "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
-#~ "\">take remote control of the Jeep</a> “connected car”."
-#~ msgstr ""
-#~ "ÐзломÑикам ÑдалоÑÑ <a
href=\"http://arstechnica.com/security/2015/07/fiat-"
-#~ "chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> "
-#~ "полÑÑиÑÑ ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
джипом</a> “Ñ Ñоединением”."
-
-#~ msgid ""
-#~ "They could track the car, start or stop the engine, and activate or "
-#~ "deactivate the brakes, and more."
-#~ msgstr ""
-#~ "Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, "
-#~ "вклÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑоÑмоз, а Ñакже
многое дÑÑгое."
-
-#~ msgid ""
-#~ "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
-#~ "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
-#~ "smart phones, including iPhones, Android, and BlackBerry</a>. While "
-#~ "there is not much detail here, it seems that this does not operate via "
-#~ "the universal back door that we know nearly all portable phones have. It "
-#~ "may involve exploiting various bugs. There are <a href=\"http://www."
-#~ "osnews.com/story/27416/"
-#~ "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
-#~ "in the phones' radio software</a>."
-#~ msgstr ""
-#~ "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
-#~ "can-spy-on-smart-phone-data-a-920971.html\"> ÐÐРможеÑ
заглÑдÑваÑÑ Ð² "
-#~ "даннÑе на ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone,
Android и BlackBerry</a>. "
-#~ "ХоÑÑ Ð¿Ð¾Ð´ÑобноÑÑи здеÑÑ Ð½Ðµ пÑиводÑÑÑÑ,
поÑ
оже, ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ как "
-#~ "ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, коÑоÑÑй, как
Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ Ð¿Ð¾ÑÑи во вÑеÑ
"
-#~ "мобилÑнÑÑ
ÑелеÑонаÑ
. ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ
ÑвÑзано Ñ ÑкÑплÑаÑаÑией ÑазлиÑнÑÑ
"
-#~ "оÑибок. <a href=\"http://www.osnews.com/story/27416/"
-#~ "The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
-#~ "ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ
множеÑÑво оÑибок</a>."
-
-#~ msgid ""
-#~ "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#~ "hacking_music_can_take_control_your_car/\"> It is possible to take "
-#~ "control of some car computers through malware in music files</a>. Also "
-#~ "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
-#~ "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
-#~ "\">more information</a>."
-#~ msgstr ""
-#~ "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#~ "hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
-#~ "компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в "
-#~ "ÑайлаÑ
Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
-#~ "business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
-#~ "href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
-#~ "безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
-
-#~ msgid ""
-#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
-#~ "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-#~ "running Windows were taken over and turned into a botnet for the purpose "
-#~ "of collecting customers' credit card numbers</a>."
-#~ msgstr ""
-#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
-#~ "of-age-with-first-known-point-of-sale-botnet/\"> ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð²
меÑÑаÑ
"
-#~ "пÑодаж, ÑабоÑаÑÑие под ÑпÑавлением Windows,
бÑли обÑаÑÐµÐ½Ñ "
-#~ "злоÑмÑÑленниками в ÑеÑÑ ÑбоÑа номеÑов
кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов</a>."
-
-#, fuzzy
-#~| msgid ""
-#~| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#~| "hacking_music_can_take_control_your_car/\"> It is possible to take "
-#~| "control of some car computers through malware in music files</a>. Also "
-#~| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
-#~| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
-#~| "\">more information</a>."
-#~ msgid ""
-#~ "It is possible to take control of some car computers through <a href="
-#~ "\"http://www.pcworld.idg.com.au/article/379477/"
-#~ "hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
-#~ "Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
-#~ "_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
-#~ "\">more information</a>."
-#~ msgstr ""
-#~ "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#~ "hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
-#~ "компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в "
-#~ "ÑайлаÑ
Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
-#~ "business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
-#~ "href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
-#~ "безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
-
-# type: Content of: <div><p>
-#~ msgid ""
-#~ "Copyright © 2013, 2015, 2016, 2017 Free Software Foundation, Inc."
-#~ msgstr ""
-#~ "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#~ "Inc."
-
-#~ msgid "Copyright © 2013, 2015, 2016 Free Software Foundation, Inc."
-#~ msgstr ""
-#~ "Copyright © 2013, 2014, 2015, 2016 Free Software Foundation, Inc."
-
-# type: Content of: <div><p>
-#~ msgid "Copyright © 2013, 2015 Free Software Foundation, Inc."
-#~ msgstr "Copyright © 2014, 2015 Free Software Foundation, Inc."