[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po proprietary-insecurity.ru.po
From: |
Ineiev |
Subject: |
www/proprietary/po proprietary-insecurity.ru.po |
Date: |
Wed, 26 Sep 2018 13:51:56 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: Ineiev <ineiev> 18/09/26 13:51:56
Modified files:
proprietary/po : proprietary-insecurity.ru.po
Log message:
Update.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.185&r2=1.186
Patches:
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary-insecurity.ru.po 26 Sep 2018 17:28:11 -0000 1.185
+++ proprietary-insecurity.ru.po 26 Sep 2018 17:51:56 -0000 1.186
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-09-26 17:26+0000\n"
+"POT-Creation-Date: 2018-09-18 17:25+0000\n"
"PO-Revision-Date: 2018-09-26 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -108,49 +108,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Researchers have discovered how to <a href=\"http://news.rub.de/english/"
-"press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> hide "
-"voice commands in other audio</a>, so that people cannot hear them, but "
-"Alexa and Siri can."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Crackers found a way to break the security of an Amazon device, and <a href="
-"\"https://boingboing.net/2018/08/12/alexa-bob-carol.html\"> turn it into a "
-"listening device</a> for them."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"It was very difficult for them to do this. The job would be much easier for "
-"Amazon. And if some government such as China or the US told Amazon to do "
-"this, or cease to sell the product in that country, do you think Amazon "
-"would have the moral fiber to say no?"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"These crackers are probably hackers too, but please <a href=\"https://"
-"stallman.org/articles/on-hacking.html\"> don't use “hacking” to "
-"mean “breaking security”</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Siri, Alexa, and all the other voice-control systems can be <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
-"commands in ultrasound that humans can't hear</a>."
-msgstr ""
-"Siri, Alexa и вÑе дÑÑгие ÑиÑÑÐµÐ¼Ñ Ð³Ð¾Ð»Ð¾Ñового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ <a href="
-"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
-"astoundingly-easy-to-hack-siri-and-alexa\">взÑÑÑ Ð¿Ð¾Ð´ конÑÑолÑ
пÑогÑаммами, "
-"коÑоÑÑе воÑпÑоизводÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð²
неÑлÑÑимом лÑдÑми ÑлÑÑÑазвÑковом
диапазоне</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Some Samsung phones randomly <a href=\"https://www.theverge.com/"
"circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"
"\">send photos to people in the owner's contact list</a>."
@@ -181,16 +138,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Intel's intentional “management engine” back door has <a href="
-"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
-"unintended back doors</a> too."
-msgstr ""
-"РпÑеднамеÑенном ÑеÑном Ñ
оде в “маÑине
ÑпÑавлениє Intel еÑÑÑ "
-"Ñакже <a href=\"https://www.theregister.co.uk/2017/11/20/"
-"intel_flags_firmware_flaws/\"> непÑеднамеÑеннÑй ÑеÑнÑй
Ñ
од</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Amazon recently invited consumers to be suckers and <a href=\"https://www."
"techdirt.com/articles/20171120/10533238651/vulnerability-fo\"> allow "
"delivery staff to open their front doors</a>. Wouldn't you know it, the "
@@ -203,6 +150,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Intel's intentional “management engine” back door has <a href="
+"\"https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/\"> "
+"unintended back doors</a> too."
+msgstr ""
+"РпÑеднамеÑенном ÑеÑном Ñ
оде в “маÑине
ÑпÑавлениє Intel еÑÑÑ "
+"Ñакже <a href=\"https://www.theregister.co.uk/2017/11/20/"
+"intel_flags_firmware_flaws/\"> непÑеднамеÑеннÑй ÑеÑнÑй
Ñ
од</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Bad security in some cars makes it possible to <a href=\"https://cve.mitre."
"org/cgi-bin/cvename.cgi?name=CVE-2017-14937\"> remotely activate the "
"airbags</a>."
@@ -249,22 +206,42 @@
msgstr "Ðе бÑÐ´Ñ Ð¿ÑоÑÑоÑилей — оÑкажиÑÑ
Ð¾Ñ Ð²ÑеÑ
клеÑей."
#. type: Content of: <ul><li><p>
-# | It is unfortunate that the article uses the term <a
-# | href=\"/philosophy/words-to-avoid.html#Monetize\">[-
-# | -]“monetize”</a>.
-#, fuzzy
-#| msgid ""
-#| "It is unfortunate that the article uses the term <a href=\"/philosophy/"
-#| "words-to-avoid.html#Monetize\"> “monetize”</a>."
msgid ""
"It is unfortunate that the article uses the term <a href=\"/philosophy/words-"
-"to-avoid.html#Monetize\">“monetize”</a>."
+"to-avoid.html#Monetize\"> “monetize”</a>."
msgstr ""
"ÐÑÐµÐ½Ñ Ð¶Ð°Ð»Ñ, ÑÑо в ÑÑаÑÑе ÑпоÑÑеблÑеÑÑÑ
Ñлово <a href=\"/philosophy/words-to-"
"avoid.html#Monetize\"> “монеÑизиÑоваÑÑ”</a>."
#. type: Content of: <ul><li><p>
msgid ""
+"Siri, Alexa, and all the other voice-control systems can be <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
+"commands in ultrasound that humans can't hear</a>."
+msgstr ""
+"Siri, Alexa и вÑе дÑÑгие ÑиÑÑÐµÐ¼Ñ Ð³Ð¾Ð»Ð¾Ñового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð³ÑÑ Ð±ÑÑÑ <a href="
+"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
+"astoundingly-easy-to-hack-siri-and-alexa\">взÑÑÑ Ð¿Ð¾Ð´ конÑÑолÑ
пÑогÑаммами, "
+"коÑоÑÑе воÑпÑоизводÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð²
неÑлÑÑимом лÑдÑми ÑлÑÑÑазвÑковом
диапазоне</"
+"a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> Crackers found a way to break security on a "
+"“smart” TV</a> and use its camera to watch the people who are "
+"watching TV."
+msgstr ""
+"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
+"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
+"microphone-cameras.html\"> ÐзломÑики наÑли ÑпоÑоб
вÑкÑÑÑÑ Ð·Ð°ÑиÑÑ Ð² “"
+"инÑеллекÑÑалÑном” ÑелевизоÑе</a> и
воÑполÑзоваÑÑÑÑ ÐµÐ³Ð¾ видеокамеÑой, "
+"ÑÑÐ¾Ð±Ñ ÑмоÑÑеÑÑ Ð½Ð° лÑдей, коÑоÑÑе ÑмоÑÑÑÑ
ÑелевизоÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many models of Internet-connected cameras <a href=\"/proprietary/proprietary-"
"back-doors.html#InternetCameraBackDoor\"> have backdoors</a>."
msgstr ""
@@ -288,6 +265,52 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
+"installed on 28 models of HP laptops logged the user's keystroke to a file "
+"in the filesystem. Any process with access to the filesystem or the "
+"MapViewOfFile API could gain access to the log. Furthermore, <a href="
+"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
+"\">according to modzero</a> the “information-leak via Covert Storage "
+"Channel enables malware authors to capture keystrokes without taking the "
+"risk of being classified as malicious task by AV heuristics”."
+msgstr ""
+"ÐÐ°ÐºÐµÑ Ð°ÑдиодÑайвеÑов Conexant HD (веÑÑии 1.0.0.46 и
более ÑанниÑ
), "
+"пÑедÑÑÑановленнÑй на 28 моделей
поÑÑаÑивнÑÑ
компÑÑÑеÑов Hewlett-"
+"Packard, запиÑÑвали в Ñайл нажаÑиÑ
полÑзоваÑÐµÐ»Ñ Ð½Ð° клавиÑи. ÐÑбой пÑоÑеÑÑ, Ñ "
+"коÑоÑого бÑл доÑÑÑп к MapViewOfFile, мог ÑиÑаÑÑ
ÑÑÐ¾Ñ Ð¶ÑÑнал. Ðолее Ñого, "
+"ÑоглаÑно modzero, “<a href=\"https://www.modzero.ch/advisories/"
+"MZ-17-01-Conexant-Keylogger.txt\">ÑÑеÑка инÑоÑмаÑии
ÑеÑез ÑкÑÑÑÑй канал "
+"накопиÑÐµÐ»Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð°Ð²ÑоÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм пеÑеÑ
ваÑÑваÑÑ Ð½Ð°Ð¶Ð°ÑÐ¸Ñ Ð½Ð° "
+"клавиÑи без ÑиÑка бÑÑÑ
клаÑÑиÑиÑиÑованнÑм алгоÑиÑмами
анÑивиÑÑÑов как "
+"вÑедоноÑÐ½Ð°Ñ Ð·Ð°Ð´Ð°Ñа</a>”."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The proprietary code that runs pacemakers, insulin pumps, and other medical "
+"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
+"of gross security faults</a>."
+msgstr ""
+"РнеÑвободнÑÑ
пÑогÑаммаÑ
, под ÑпÑавлением
коÑоÑÑÑ
ÑабоÑаÑÑ <a href=\"http://"
+"www.bbc.co.uk/news/technology-40042584\">каÑдиоÑÑимÑлÑÑоÑÑ,
ÑпÑиÑÑ Ñ "
+"инÑÑлином и дÑÑгие медиÑинÑкие пÑибоÑÑ</a>,
полнÑм-полно гÑÑбÑÑ
пÑоÑÑеÑов по "
+"ÑаÑÑи безопаÑноÑÑи."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
+"by the Shadowbrokers group, are now being used to <a href=\"https://"
+"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
+"computers-around-the-world/\">attack a great number of Windows computers "
+"with ransomware</a>."
+msgstr ""
+"ÐÑиÑиÑеÑкие оÑибки в Windows, коÑоÑÑе
накапливалиÑÑ Ð² ÐÐРа заÑем бÑли "
+"ÑазглаÑÐµÐ½Ñ Ð³ÑÑппой Shadowbrokers, ÑепеÑÑ
пÑименÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ <a href="
+"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
+"helping-hijack-computers-around-the-world/\">заÑажаÑÑ
компÑÑÑеÑÑ Ð¿Ð¾Ð´ Windows "
+"Ñ ÑелÑÑ Ð¿Ð¾Ð»ÑÑÐµÐ½Ð¸Ñ Ð²ÑкÑпа.</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Intel's CPU backdoor—the Intel Management Engine—had a <a href="
"\"https://arstechnica.com/security/2017/05/intel-patches-remote-code-"
"execution-bug-that-lurked-in-cpus-for-10-years/\">major security "
@@ -327,52 +350,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The proprietary code that runs pacemakers, insulin pumps, and other medical "
-"devices is <a href=\"http://www.bbc.co.uk/news/technology-40042584\"> full "
-"of gross security faults</a>."
-msgstr ""
-"РнеÑвободнÑÑ
пÑогÑаммаÑ
, под ÑпÑавлением
коÑоÑÑÑ
ÑабоÑаÑÑ <a href=\"http://"
-"www.bbc.co.uk/news/technology-40042584\">каÑдиоÑÑимÑлÑÑоÑÑ,
ÑпÑиÑÑ Ñ "
-"инÑÑлином и дÑÑгие медиÑинÑкие пÑибоÑÑ</a>,
полнÑм-полно гÑÑбÑÑ
пÑоÑÑеÑов по "
-"ÑаÑÑи безопаÑноÑÑи."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Conexant HD Audio Driver Package (version 1.0.0.46 and earlier) pre-"
-"installed on 28 models of HP laptops logged the user's keystroke to a file "
-"in the filesystem. Any process with access to the filesystem or the "
-"MapViewOfFile API could gain access to the log. Furthermore, <a href="
-"\"https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"
-"\">according to modzero</a> the “information-leak via Covert Storage "
-"Channel enables malware authors to capture keystrokes without taking the "
-"risk of being classified as malicious task by AV heuristics”."
-msgstr ""
-"ÐÐ°ÐºÐµÑ Ð°ÑдиодÑайвеÑов Conexant HD (веÑÑии 1.0.0.46 и
более ÑанниÑ
), "
-"пÑедÑÑÑановленнÑй на 28 моделей
поÑÑаÑивнÑÑ
компÑÑÑеÑов Hewlett-"
-"Packard, запиÑÑвали в Ñайл нажаÑиÑ
полÑзоваÑÐµÐ»Ñ Ð½Ð° клавиÑи. ÐÑбой пÑоÑеÑÑ, Ñ "
-"коÑоÑого бÑл доÑÑÑп к MapViewOfFile, мог ÑиÑаÑÑ
ÑÑÐ¾Ñ Ð¶ÑÑнал. Ðолее Ñого, "
-"ÑоглаÑно modzero, “<a href=\"https://www.modzero.ch/advisories/"
-"MZ-17-01-Conexant-Keylogger.txt\">ÑÑеÑка инÑоÑмаÑии
ÑеÑез ÑкÑÑÑÑй канал "
-"накопиÑÐµÐ»Ñ Ð¿Ð¾Ð·Ð²Ð¾Ð»ÑÐµÑ Ð°Ð²ÑоÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм пеÑеÑ
ваÑÑваÑÑ Ð½Ð°Ð¶Ð°ÑÐ¸Ñ Ð½Ð° "
-"клавиÑи без ÑиÑка бÑÑÑ
клаÑÑиÑиÑиÑованнÑм алгоÑиÑмами
анÑивиÑÑÑов как "
-"вÑедоноÑÐ½Ð°Ñ Ð·Ð°Ð´Ð°Ñа</a>”."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Exploits of bugs in Windows, which were developed by the NSA and then leaked "
-"by the Shadowbrokers group, are now being used to <a href=\"https://"
-"theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-"
-"computers-around-the-world/\">attack a great number of Windows computers "
-"with ransomware</a>."
-msgstr ""
-"ÐÑиÑиÑеÑкие оÑибки в Windows, коÑоÑÑе
накапливалиÑÑ Ð² ÐÐРа заÑем бÑли "
-"ÑазглаÑÐµÐ½Ñ Ð³ÑÑппой Shadowbrokers, ÑепеÑÑ
пÑименÑÑÑÑÑ, ÑÑÐ¾Ð±Ñ <a href="
-"\"https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-"
-"helping-hijack-computers-around-the-world/\">заÑажаÑÑ
компÑÑÑеÑÑ Ð¿Ð¾Ð´ Windows "
-"Ñ ÑелÑÑ Ð¿Ð¾Ð»ÑÑÐµÐ½Ð¸Ñ Ð²ÑкÑпа.</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Many Android devices <a href=\"https://arstechnica.com/security/2017/04/wide-"
"range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/\"> can be "
"hijacked through their Wi-Fi chips</a> because of a bug in Broadcom's non-"
@@ -410,49 +387,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"If you buy a used “smart” car, house, TV, refrigerator, etc., "
-"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
-"used.html\">the previous owners can still remotely control it</a>."
-msgstr ""
-"ÐÑли Ð²Ñ Ð¿Ð¾ÐºÑпаеÑе “ÑмнÑй”
авÑомобилÑ, дом, ÑелевизоÑ, "
-"Ñ
олодилÑник и Ñ.д., обÑÑно <a
href=\"http://boingboing.net/2017/02/20/the-"
-"previous-owners-of-used.html\">пÑедÑдÑÑие владелÑÑÑ
могÑÑ Ð¿Ð¾-пÑÐµÐ¶Ð½ÐµÐ¼Ñ "
-"ÑпÑавлÑÑÑ Ð¸Ð¼ на ÑаÑÑÑоÑнии</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">with a smart but foolish car have very bad security</a>."
-msgstr ""
-"ÐобилÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑвÑзи <a
href=\"https://www.bleepingcomputer.com/"
-"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
-"\">ÑмнÑми, но дÑÑаÑкими авÑомобилÑми
оÑлиÑаÑÑÑÑ Ð¾ÑÐµÐ½Ñ Ñлабой безопаÑноÑÑÑÑ</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This is in addition to the fact that the car contains a cellular modem that "
-"tells big brother all the time where it is. If you own such a car, it would "
-"be wise to disconnect the modem so as to turn off the tracking."
-msgstr ""
-"ÐÑо дополнÑÐµÑ ÑÐ¾Ñ ÑакÑ, ÑÑо авÑомобилÑ
ÑодеÑÐ¶Ð¸Ñ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи, коÑоÑÑй "
-"вÑе вÑÐµÐ¼Ñ ÑаÑÑказÑваеÑ, где он наÑ
одиÑÑÑ,
СÑаÑÑÐµÐ¼Ñ ÐÑаÑÑ. ÐÑли Ð²Ñ Ð²Ð»Ð°Ð´ÐµÐµÑе "
-"Ñаким авÑомобилем, бÑло Ð±Ñ Ð¼ÑдÑÑм
оÑÑоединиÑÑ Ð¼Ð¾Ð´ÐµÐ¼, ÑÑÐ¾Ð±Ñ Ð²ÑклÑÑиÑÑ ÑлежкÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
-"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
-"\">have a security hole that allows an SMS message to install ransomware</a>."
-msgstr ""
-"Ð ÑелеÑонаÑ
Samsung еÑÑÑ <a
href=\"https://www.bleepingcomputer.com/news/"
-"security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
-"ransomware-attacks/\">пÑокол в заÑиÑе, позволÑÑÑий
ÑÑÑанавливаÑÑ Ð¿Ð¾ SMS "
-"пÑогÑаммÑ, ÑÑебÑÑÑие вÑкÑпа</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"WhatsApp has a feature that <a href=\"https://techcrunch.com/2017/01/13/"
"encrypted-messaging-platform-whatsapp-denies-backdoor-claim/\"> has been "
"described as a “back door”</a> because it would enable "
@@ -496,54 +430,87 @@
"пока не Ð²Ð¸Ð´Ð¸Ñ Ð¼Ð°Ð¼Ð°."
#. type: Content of: <ul><li><p>
-# | 4G LTE phone networks are drastically insecure. They can be <a
-# |
[-href=\"https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">-]
-# |
{+href=\"https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\">+}
-# | taken over by third parties and used for man-in-the-middle attacks</a>.
-#, fuzzy
-#| msgid ""
-#| "4G LTE phone networks are drastically insecure. They can be <a href="
-#| "\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-#| "uk/2016/10/23/"
-#| "every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
-#| "over by third parties and used for man-in-the-middle attacks</a>."
msgid ""
-"4G LTE phone networks are drastically insecure. They can be <a href="
-"\"https://www.theregister.co.uk/2016/10/23/"
-"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
-"over by third parties and used for man-in-the-middle attacks</a>."
+"The mobile apps for communicating <a href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">with a smart but foolish car have very bad security</a>."
msgstr ""
-"ТелеÑоннÑе ÑеÑи 4G LTE кÑайне Ñлабо
заÑиÑенÑ. СвÑÐ·Ñ Ð¿Ð¾ ним могÑÑ <a href="
-"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
-"uk/2016/10/23/"
-"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> "
-"пеÑеÑ
ваÑÑваÑÑ ÑÑеÑÑи ÑÑоÑÐ¾Ð½Ñ Ð´Ð»Ñ Ð°Ñак
“Ñеловек поÑеÑедине”</a>."
+"ÐобилÑнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑвÑзи <a
href=\"https://www.bleepingcomputer.com/"
+"news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/"
+"\">ÑмнÑми, но дÑÑаÑкими авÑомобилÑми
оÑлиÑаÑÑÑÑ Ð¾ÑÐµÐ½Ñ Ñлабой безопаÑноÑÑÑÑ</"
+"a>."
#. type: Content of: <ul><li><p>
msgid ""
-"Due to weak security, <a href=\"http://jalopnik.com/almost-every-volkswagen-"
-"built-since-1995-is-vulnerable-1785159844\">it is easy to open the doors of "
-"100 million cars built by Volkswagen</a>."
+"This is in addition to the fact that the car contains a cellular modem that "
+"tells big brother all the time where it is. If you own such a car, it would "
+"be wise to disconnect the modem so as to turn off the tracking."
msgstr ""
-"СлабоÑÑÑ Ð·Ð°ÑиÑÑ <a
href=\"http://jalopnik.com/almost-every-volkswagen-built-"
-"since-1995-is-vulnerable-1785159844\">позволÑÐµÑ Ð»ÐµÐ³ÐºÐ¾
оÑкÑÑваÑÑ Ð´Ð²ÐµÑи "
-"100 миллионов авÑомобилей, ÑобÑаннÑÑ
компанией “ФолÑкÑваген”"
-"</a>."
+"ÐÑо дополнÑÐµÑ ÑÐ¾Ñ ÑакÑ, ÑÑо авÑомобилÑ
ÑодеÑÐ¶Ð¸Ñ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи, коÑоÑÑй "
+"вÑе вÑÐµÐ¼Ñ ÑаÑÑказÑваеÑ, где он наÑ
одиÑÑÑ,
СÑаÑÑÐµÐ¼Ñ ÐÑаÑÑ. ÐÑли Ð²Ñ Ð²Ð»Ð°Ð´ÐµÐµÑе "
+"Ñаким авÑомобилем, бÑло Ð±Ñ Ð¼ÑдÑÑм
оÑÑоединиÑÑ Ð¼Ð¾Ð´ÐµÐ¼, ÑÑÐ¾Ð±Ñ Ð²ÑклÑÑиÑÑ ÑлежкÑ."
#. type: Content of: <ul><li><p>
msgid ""
-"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
-"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
-"thermostat that uses proprietary software</a>."
+"If you buy a used “smart” car, house, TV, refrigerator, etc., "
+"usually <a href=\"http://boingboing.net/2017/02/20/the-previous-owners-of-"
+"used.html\">the previous owners can still remotely control it</a>."
msgstr ""
-"<a href=\"https://www.pentestpartners.com/security-blog/thermostat-"
-"ransomware-a-lesson-in-iot-security/\">ÐÐ»Ñ ÑеÑмоÑÑаÑа Ñ
неÑвободнÑми "
-"пÑогÑаммами</a> бÑли ÑазÑабоÑанÑ
вÑмогаÑелÑÑкие пÑогÑаммÑ."
+"ÐÑли Ð²Ñ Ð¿Ð¾ÐºÑпаеÑе “ÑмнÑй”
авÑомобилÑ, дом, ÑелевизоÑ, "
+"Ñ
олодилÑник и Ñ.д., обÑÑно <a
href=\"http://boingboing.net/2017/02/20/the-"
+"previous-owners-of-used.html\">пÑедÑдÑÑие владелÑÑÑ
могÑÑ Ð¿Ð¾-пÑÐµÐ¶Ð½ÐµÐ¼Ñ "
+"ÑпÑавлÑÑÑ Ð¸Ð¼ на ÑаÑÑÑоÑнии</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-"
-"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
+"Samsung phones <a href=\"https://www.bleepingcomputer.com/news/security/sms-"
+"exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/"
+"\">have a security hole that allows an SMS message to install ransomware</a>."
+msgstr ""
+"Ð ÑелеÑонаÑ
Samsung еÑÑÑ <a
href=\"https://www.bleepingcomputer.com/news/"
+"security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-"
+"ransomware-attacks/\">пÑокол в заÑиÑе, позволÑÑÑий
ÑÑÑанавливаÑÑ Ð¿Ð¾ SMS "
+"пÑогÑаммÑ, ÑÑебÑÑÑие вÑкÑпа</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"4G LTE phone networks are drastically insecure. They can be <a href="
+"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
+"uk/2016/10/23/"
+"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> taken "
+"over by third parties and used for man-in-the-middle attacks</a>."
+msgstr ""
+"ТелеÑоннÑе ÑеÑи 4G LTE кÑайне Ñлабо
заÑиÑенÑ. СвÑÐ·Ñ Ð¿Ð¾ ним могÑÑ <a href="
+"\"https://web.archive.org/web/20161027223907/http://www.theregister.co."
+"uk/2016/10/23/"
+"every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/\"> "
+"пеÑеÑ
ваÑÑваÑÑ ÑÑеÑÑи ÑÑоÑÐ¾Ð½Ñ Ð´Ð»Ñ Ð°Ñак
“Ñеловек поÑеÑедине”</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Due to weak security, <a href=\"http://jalopnik.com/almost-every-volkswagen-"
+"built-since-1995-is-vulnerable-1785159844\">it is easy to open the doors of "
+"100 million cars built by Volkswagen</a>."
+msgstr ""
+"СлабоÑÑÑ Ð·Ð°ÑиÑÑ <a
href=\"http://jalopnik.com/almost-every-volkswagen-built-"
+"since-1995-is-vulnerable-1785159844\">позволÑÐµÑ Ð»ÐµÐ³ÐºÐ¾
оÑкÑÑваÑÑ Ð´Ð²ÐµÑи "
+"100 миллионов авÑомобилей, ÑобÑаннÑÑ
компанией “ФолÑкÑваген”"
+"</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
+"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
+"thermostat that uses proprietary software</a>."
+msgstr ""
+"<a href=\"https://www.pentestpartners.com/security-blog/thermostat-"
+"ransomware-a-lesson-in-iot-security/\">ÐÐ»Ñ ÑеÑмоÑÑаÑа Ñ
неÑвободнÑми "
+"пÑогÑаммами</a> бÑли ÑазÑабоÑанÑ
вÑмогаÑелÑÑкие пÑогÑаммÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A <a href=\"http://www.zdnet.com/article/windows-attack-can-steal-your-"
+"username-password-and-other-logins/\">flaw in Internet Explorer and Edge</a> "
"allows an attacker to retrieve Microsoft account credentials, if the user is "
"tricked into visiting a malicious link."
msgstr ""
@@ -604,19 +571,20 @@
msgstr "GNU/Linux в анÑивиÑÑÑаÑ
не нÑждаеÑÑÑ."
#. type: Content of: <ul><li><p>
-# | Samsung's “Smart Home” has a big security hole; <a
-# |
href=\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/\">{+
-# | +}unauthorized people can remotely control it</a>.
-#, fuzzy
-#| msgid ""
-#| "Samsung's “Smart Home” has a big security hole; <a href="
-#| "\"http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-"
-#| "hackers-make-keys-to-front-door/\">unauthorized people can remotely "
-#| "control it</a>."
+msgid ""
+"Over 70 brands of network-connected surveillance cameras <a href=\"http://"
+"www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
+"\">have security bugs that allow anyone to watch through them</a>."
+msgstr ""
+"РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок <a
href=\"http://www.kerneronsec."
+"com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">обнаÑÑженÑ
недоÑеÑÑ "
+"безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>."
+
+#. type: Content of: <ul><li><p>
msgid ""
"Samsung's “Smart Home” has a big security hole; <a href=\"http://"
"arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-"
-"keys-to-front-door/\"> unauthorized people can remotely control it</a>."
+"keys-to-front-door/\">unauthorized people can remotely control it</a>."
msgstr ""
"Ð “инÑеллекÑÑалÑном доме” компании
Samsung еÑÑÑ Ð±Ð¾Ð»ÑÑÐ°Ñ Ð¿ÑоÑеÑ
а "
"безопаÑноÑÑи; <a
href=\"http://arstechnica.com/security/2016/05/samsung-"
@@ -642,29 +610,46 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A bug in the iThings Messages app <a href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
-"a malicious web site to extract all the user's messaging history</a>."
+"The Nissan Leaf has a built-in cell phone modem which allows effectively "
+"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">to access its computers remotely and make changes in various "
+"settings</a>."
msgstr ""
-"ÐÑибка в Messages, пÑиложении Ð´Ð»Ñ Ð°Ð¹-ÑÑÑÑек, <a
href=\"https://theintercept."
-"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\"> "
-"позволила вÑедоноÑÐ½Ð¾Ð¼Ñ ÑайÑÑ Ð¸Ð·Ð²Ð»ÐµÑÑ Ð²ÑÑ
иÑÑоÑÐ¸Ñ ÑообÑений полÑзоваÑелÑ</a>."
+"Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй ÑелеÑоннÑй модем,
позволÑÑÑий ÑакÑиÑеÑки ÐºÐ¾Ð¼Ñ "
+"Ñгодно <a
href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
+"nissan/\">полÑÑаÑÑ ÑдаленнÑй доÑÑÑп к
компÑÑÑеÑам и вноÑиÑÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² "
+"ÑазлиÑнÑе наÑÑÑойки</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"That's easy to do because the system has no authentication when accessed "
+"through the modem. However, even if it asked for authentication, you "
+"couldn't be confident that Nissan has no access. The software in the car is "
+"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
+"\">which means it demands blind faith from its users</a>."
+msgstr ""
+"ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи "
+"доÑÑÑпе по модемÑ. Ðднако даже еÑли бÑ
модем пÑоводил пÑовеÑкÑ, нелÑÐ·Ñ Ð±Ñло "
+"Ð±Ñ Ð±ÑÑÑ ÑвеÑеннÑми, ÑÑо Ñ Nissan Ð½ÐµÑ Ð´Ð¾ÑÑÑпа.
ÐÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобиле "
+"неÑвободнÑ, <a
href=\"/philosophy/free-software-even-more-important.html"
+"\">ÑÑо знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Even if no one connects to the car remotely, the cell phone modem enables "
+"the phone company to track the car's movements all the time; it is possible "
+"to physically remove the cell phone modem though."
+msgstr ""
+"Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
+"ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
+"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
#. type: Content of: <ul><li><p>
-# | Malware {+was+} found on <a
-# |
href=\"http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html\">{+
-# | +}security cameras available through Amazon</a>.
-#, fuzzy
-#| msgid ""
-#| "Malware found on <a href=\"http://www.slate.com/blogs/"
-#| "future_tense/2016/04/11/"
-#| "security_cameras_sold_through_amazon_have_malware_according_to_security."
-#| "html\">security cameras available through Amazon</a>."
msgid ""
-"Malware was found on <a href=\"http://www.slate.com/blogs/"
+"Malware found on <a href=\"http://www.slate.com/blogs/"
"future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
-"\"> security cameras available through Amazon</a>."
+"\">security cameras available through Amazon</a>."
msgstr ""
"<a href=\"http://www.slate.com/blogs/future_tense/2016/04/11/"
"security_cameras_sold_through_amazon_have_malware_according_to_security.html"
@@ -683,42 +668,20 @@
"оÑноÑении Ñоже не пÑедÑÑавлÑÑÑ ÑгÑозÑ."
#. type: Content of: <ul><li><p>
-# | Over 70 brands of network-connected surveillance cameras {+have+} <a
-# |
[-href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">have-]
-# |
{+href=\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">+}
-# | security bugs that allow anyone to watch through them</a>.
-#, fuzzy
-#| msgid ""
-#| "Over 70 brands of network-connected surveillance cameras <a href=\"http://"
-#| "www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"
-#| "\">have security bugs that allow anyone to watch through them</a>."
-msgid ""
-"Over 70 brands of network-connected surveillance cameras have <a href="
-"\"http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of."
-"html\"> security bugs that allow anyone to watch through them</a>."
+msgid ""
+"A bug in the iThings Messages app <a href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\">allowed "
+"a malicious web site to extract all the user's messaging history</a>."
msgstr ""
-"РкамеÑаÑ
наблÑÐ´ÐµÐ½Ð¸Ñ Ð±Ð¾Ð»ÐµÐµ 70 маÑок <a
href=\"http://www.kerneronsec."
-"com/2016/02/remote-code-execution-in-cctv-dvrs-of.html\">обнаÑÑженÑ
недоÑеÑÑ "
-"безопаÑноÑÑи, позволÑÑÑие ÐºÐ¾Ð¼Ñ Ñгодно
подглÑдÑваÑÑ ÑеÑез ниÑ
</a>."
+"ÐÑибка в Messages, пÑиложении Ð´Ð»Ñ Ð°Ð¹-ÑÑÑÑек, <a
href=\"https://theintercept."
+"com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/\"> "
+"позволила вÑедоноÑÐ½Ð¾Ð¼Ñ ÑайÑÑ Ð¸Ð·Ð²Ð»ÐµÑÑ Ð²ÑÑ
иÑÑоÑÐ¸Ñ ÑообÑений полÑзоваÑелÑ</a>."
#. type: Content of: <ul><li><p>
-# | Many proprietary payment apps <a
-# |
href=\"http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data\">[-
-# | -]transmit personal data in an insecure way</a>. However, the worse aspect
-# | of these apps is that <a
-# | href=\"/philosophy/surveillance-vs-democracy.html\">payment is not
-# | anonymous</a>.
-#, fuzzy
-#| msgid ""
-#| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
-#| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
-#| "securing-user-data\"> transmit personal data in an insecure way</a>. "
-#| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
-#| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
msgid ""
"Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
"articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-"
-"user-data\">transmit personal data in an insecure way</a>. However, the "
+"user-data\"> transmit personal data in an insecure way</a>. However, the "
"worse aspect of these apps is that <a href=\"/philosophy/surveillance-vs-"
"democracy.html\">payment is not anonymous</a>."
msgstr ""
@@ -730,67 +693,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Nissan Leaf has a built-in cell phone modem which allows effectively "
-"anyone <a href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">to access its computers remotely and make changes in various "
-"settings</a>."
-msgstr ""
-"Ð Nissan Leaf еÑÑÑ Ð²ÑÑÑоеннÑй ÑелеÑоннÑй модем,
позволÑÑÑий ÑакÑиÑеÑки ÐºÐ¾Ð¼Ñ "
-"Ñгодно <a
href=\"https://www.troyhunt.com/controlling-vehicle-features-of-"
-"nissan/\">полÑÑаÑÑ ÑдаленнÑй доÑÑÑп к
компÑÑÑеÑам и вноÑиÑÑ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð² "
-"ÑазлиÑнÑе наÑÑÑойки</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"That's easy to do because the system has no authentication when accessed "
-"through the modem. However, even if it asked for authentication, you "
-"couldn't be confident that Nissan has no access. The software in the car is "
-"proprietary, <a href=\"/philosophy/free-software-even-more-important.html"
-"\">which means it demands blind faith from its users</a>."
-msgstr ""
-"ÐÑо неÑÑÑдно поÑомÑ, ÑÑо в ÑиÑÑеме неÑ
пÑовеÑки подлинноÑÑи полÑзоваÑÐµÐ»Ñ Ð¿Ñи "
-"доÑÑÑпе по модемÑ. Ðднако даже еÑли бÑ
модем пÑоводил пÑовеÑкÑ, нелÑÐ·Ñ Ð±Ñло "
-"Ð±Ñ Ð±ÑÑÑ ÑвеÑеннÑми, ÑÑо Ñ Nissan Ð½ÐµÑ Ð´Ð¾ÑÑÑпа.
ÐÑогÑÐ°Ð¼Ð¼Ñ Ð² авÑомобиле "
-"неÑвободнÑ, <a
href=\"/philosophy/free-software-even-more-important.html"
-"\">ÑÑо знаÑиÑ, они ÑÑебÑÑÑ Ð¾Ñ Ð¿Ð¾Ð»ÑзоваÑелей
Ñлепой веÑÑ</a>."
-
-#. type: Content of: <ul><li><p>
-# | Even if no one connects to the car remotely, the cell phone modem enables
-# | the phone company to track the car's movements all the time; it is
-# | possible to physically remove the cell phone modem{+,+} though.
-#, fuzzy
-#| msgid ""
-#| "Even if no one connects to the car remotely, the cell phone modem enables "
-#| "the phone company to track the car's movements all the time; it is "
-#| "possible to physically remove the cell phone modem though."
-msgid ""
-"Even if no one connects to the car remotely, the cell phone modem enables "
-"the phone company to track the car's movements all the time; it is possible "
-"to physically remove the cell phone modem, though."
-msgstr ""
-"Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
-"ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
-"авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки ÑдалиÑÑ
модем ÑоÑовой ÑвÑзи."
-
-#. type: Content of: <ul><li><p>
-# | FitBit fitness trackers [-<a
-# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">-]
-# | have a {+<a
-# |
href=\"http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/\">+}
-# | Bluetooth vulnerability</a> that allows attackers to send malware to the
-# | devices, which can subsequently spread to computers and other FitBit
-# | trackers that interact with them.
-#, fuzzy
-#| msgid ""
-#| "FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-"
-#| "security/latest-security-news/10-second-hack-delivers-first-ever-malware-"
-#| "to-fitness-trackers/\"> have a Bluetooth vulnerability</a> that allows "
-#| "attackers to send malware to the devices, which can subsequently spread "
-#| "to computers and other FitBit trackers that interact with them."
-msgid ""
-"FitBit fitness trackers have a <a href=\"http://www.tripwire.com/state-of-"
-"security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-"
-"fitness-trackers/\"> Bluetooth vulnerability</a> that allows attackers to "
+"FitBit fitness trackers <a href=\"http://www.tripwire.com/state-of-security/"
+"latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-"
+"trackers/\"> have a Bluetooth vulnerability</a> that allows attackers to "
"send malware to the devices, which can subsequently spread to computers and "
"other FitBit trackers that interact with them."
msgstr ""
@@ -801,24 +706,12 @@
"компÑÑÑеÑам и дÑÑгим ÑÑÑÑойÑÑвам FitBit, Ñ
коÑоÑÑми они взаимодейÑÑвÑÑÑ."
#. type: Content of: <ul><li><p>
-# | “Self-encrypting” disk drives do the encryption with
-# | proprietary firmware so you can't trust it. Western Digital's “My
-# | Passport” drives <a
-# |
href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption\">{+
-# | +}have a back door</a>.
-#, fuzzy
-#| msgid ""
-#| "“Self-encrypting” disk drives do the encryption with "
-#| "proprietary firmware so you can't trust it. Western Digital's “My "
-#| "Passport” drives <a href=\"https://motherboard.vice.com/en_us/"
-#| "article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-"
-#| "encryption\">have a back door</a>."
msgid ""
"“Self-encrypting” disk drives do the encryption with proprietary "
"firmware so you can't trust it. Western Digital's “My Passport” "
"drives <a href=\"https://motherboard.vice.com/en_us/article/mgbmma/some-"
-"popular-self-encrypting-hard-drives-have-really-bad-encryption\"> have a "
-"back door</a>."
+"popular-self-encrypting-hard-drives-have-really-bad-encryption\">have a back "
+"door</a>."
msgstr ""
"“СамоÑиÑÑÑÑÑиеÑÑ” жеÑÑкие диÑки
ÑиÑÑÑÑÑ Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð½ÐµÑвободнÑÑ
"
"внÑÑÑенниÑ
пÑогÑамм, Ñак ÑÑо Ð²Ñ Ð½Ðµ можеÑе
им довеÑÑÑÑ. У диÑков “My "
@@ -828,6 +721,18 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
+"door for 4 years</a>, which could be exploited by attackers to gain root "
+"privileges."
+msgstr ""
+"Ð Mac OS X <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
+"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ "
+"пÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>,
коÑоÑÑм взломÑики могли "
+"воÑполÑзоваÑÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿Ñава
админиÑÑÑаÑоÑа."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
@@ -840,28 +745,24 @@
"авÑомобилÑми поÑÑедÑÑвом SMS."
#. type: Content of: <ul><li><p>
-# | Crackers were able to <a
-# |
href=\"http://arstechnica.com/security/2015/07/fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">{+
-# | +}take remote control of the Jeep</a> “connected car”. {+They
-# | could track the car, start or stop the engine, and activate or deactivate
-# | the brakes, and more.+}
-#, fuzzy
-#| msgid ""
-#| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
-#| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
-#| "\">take remote control of the Jeep</a> “connected car”."
msgid ""
"Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/fiat-"
-"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> take "
-"remote control of the Jeep</a> “connected car”. They could track "
-"the car, start or stop the engine, and activate or deactivate the brakes, "
-"and more."
+"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">take "
+"remote control of the Jeep</a> “connected car”."
msgstr ""
"ÐзломÑикам ÑдалоÑÑ <a
href=\"http://arstechnica.com/security/2015/07/fiat-"
"chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\">
полÑÑиÑÑ "
"ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ джипом</a> “Ñ
Ñоединением”."
#. type: Content of: <ul><li><p>
+msgid ""
+"They could track the car, start or stop the engine, and activate or "
+"deactivate the brakes, and more."
+msgstr ""
+"Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, "
+"вклÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑоÑмоз, а Ñакже
многое дÑÑгое."
+
+#. type: Content of: <ul><li><p>
msgid "I expect that Chrysler and the NSA can do this too."
msgstr "Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ."
@@ -874,56 +775,6 @@
"вÑклÑÑÑ."
#. type: Content of: <ul><li><p>
-# | Due to bad security in a drug pump, crackers could use it to <a
-# |
href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/\">{+
-# | +}kill patients</a>.
-#, fuzzy
-#| msgid ""
-#| "Due to bad security in a drug pump, crackers could use it to <a href="
-#| "\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-#| "pumps/\">kill patients</a>."
-msgid ""
-"Due to bad security in a drug pump, crackers could use it to <a href="
-"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
-"pumps/\"> kill patients</a>."
-msgstr ""
-"Ðз-за плоÑ
ой заÑиÑÑ Ð² инÑÑзионном наÑоÑе
взломÑики могÑÑ Ð¸ÑполÑзоваÑÑ ÐµÐ³Ð¾ "
-"Ð´Ð»Ñ <a href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-"
-"hospital-drug-pumps/\">ÑбийÑÑва паÑиенÑов</a>."
-
-#. type: Content of: <ul><li><p>
-# | <a
-# |
href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html\">
-# | Many smartphone apps use insecure authentication methods when storing your
-# | personal data on remote [-servers.</a>-] {+servers</a>.+} This leaves
-# | personal information like email addresses, passwords, and health
-# | information vulnerable. Because many of these apps are proprietary it
-# | makes it hard to impossible to know which apps are at risk.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-"
-#| "millions-users.html\"> Many smartphone apps use insecure authentication "
-#| "methods when storing your personal data on remote servers.</a> This "
-#| "leaves personal information like email addresses, passwords, and health "
-#| "information vulnerable. Because many of these apps are proprietary it "
-#| "makes it hard to impossible to know which apps are at risk."
-msgid ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Many smartphone apps use insecure authentication methods when "
-"storing your personal data on remote servers</a>. This leaves personal "
-"information like email addresses, passwords, and health information "
-"vulnerable. Because many of these apps are proprietary it makes it hard to "
-"impossible to know which apps are at risk."
-msgstr ""
-"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
-"users.html\"> Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑмаÑÑÑонов
пÑименÑÑÑ Ð½ÐµÐ±ÐµÐ·Ð¾Ð¿Ð°ÑнÑе меÑÐ¾Ð´Ñ "
-"аÑÑенÑиÑикаÑии пÑи Ñ
Ñанении ваÑиÑ
лиÑнÑÑ
даннÑÑ
на ÑдаленнÑÑ
ÑеÑвеÑаÑ
.</a> "
-"ÐÑо подвеÑÐ³Ð°ÐµÑ Ð¾Ð¿Ð°ÑноÑÑи ÑакÑÑ Ð»Ð¸ÑнÑÑ
инÑоÑмаÑиÑ, как адÑеÑа ÑлекÑÑонной "
-"поÑÑÑ, паÑоли, а Ñакже медиÑинÑкие даннÑе.
ÐоÑколÑÐºÑ Ð¼Ð½Ð¾Ð³Ð¸Ðµ из ÑÑиÑ
"
-"пÑиложений неÑвободнÑ, ÑÑÑдно, еÑли
вообÑе возможно, ÑзнаÑÑ, какие "
-"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´Ð²ÐµÑÐ¶ÐµÐ½Ñ ÑÑомÑ."
-
-#. type: Content of: <ul><li><p>
msgid ""
"Hospira infusion pumps, which are used to administer drugs to a patient, "
"were rated “<a href=\"https://securityledger.com/2015/05/researcher-"
@@ -946,66 +797,44 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Mac OS X had an <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> intentional local back "
-"door for 4 years</a>, which could be exploited by attackers to gain root "
-"privileges."
-msgstr ""
-"Ð Mac OS X <a href=\"https://truesecdev.wordpress.com/2015/04/09/hidden-"
-"backdoor-api-to-root-privileges-in-apple-os-x/\"> в ÑеÑение
4 Ð»ÐµÑ "
-"пÑеднамеÑенно ÑоÑ
ÑанÑлÑÑ ÑеÑнÑй Ñ
од</a>,
коÑоÑÑм взломÑики могли "
-"воÑполÑзоваÑÑÑÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ Ð¿Ñава
админиÑÑÑаÑоÑа."
-
-#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
-#, fuzzy
-#| msgid ""
-#| "An app to prevent “identity theft” (access to personal data) "
-#| "by storing users' data on a special server <a href=\"http://arstechnica."
-#| "com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-"
-#| "over-concerns-that-app-isnt-safe/\">was deactivated by its developer</a> "
-#| "which had discovered a security flaw."
-msgid ""
-"An app to prevent “identity theft” (access to personal data) by "
-"storing users' data on a special server <a href=\"http://arstechnica.com/"
-"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
-"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
-"had discovered a security flaw."
+"Due to bad security in a drug pump, crackers could use it to <a href="
+"\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-"
+"pumps/\">kill patients</a>."
msgstr ""
-"ÐÑиложение Ð´Ð»Ñ Ð¿ÑедоÑвÑаÑÐµÐ½Ð¸Ñ “кÑажи
лиÑноÑÑи” (доÑÑÑпа к лиÑнÑм "
-"даннÑм), Ñ
ÑанивÑее даннÑе полÑзоваÑÐµÐ»Ñ Ð½Ð°
оÑобом ÑеÑвеÑе, <a href=\"http://"
-"arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-"
-"data-over-concerns-that-app-isnt-safe/\">бÑло вÑклÑÑено
ÑазÑабоÑÑиком ÑÑого "
-"пÑиложениÑ</a>, коÑоÑÑй обнаÑÑжил бÑеÑÑ Ð²
заÑиÑе."
+"Ðз-за плоÑ
ой заÑиÑÑ Ð² инÑÑзионном наÑоÑе
взломÑики могÑÑ Ð¸ÑполÑзоваÑÑ ÐµÐ³Ð¾ "
+"Ð´Ð»Ñ <a href=\"http://www.wired.com/2015/06/hackers-can-send-fatal-doses-"
+"hospital-drug-pumps/\">ÑбийÑÑва паÑиенÑов</a>."
#. type: Content of: <ul><li><p>
msgid ""
-"That developer seems to be conscientious about protecting personal data from "
-"third parties in general, but it can't protect that data from the state. "
-"Quite the contrary: confiding your data to someone else's server, if not "
-"first encrypted by you with free software, undermines your rights."
+"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
+"spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in smart "
+"phones, including iPhones, Android, and BlackBerry</a>. While there is not "
+"much detail here, it seems that this does not operate via the universal back "
+"door that we know nearly all portable phones have. It may involve "
+"exploiting various bugs. There are <a href=\"http://www.osnews.com/"
+"story/27416/The_second_operating_system_hiding_in_every_mobile_phone\"> lots "
+"of bugs in the phones' radio software</a>."
msgstr ""
-"ÐажеÑÑÑ, ÑÑÐ¾Ñ ÑазÑабоÑÑик добÑоÑовеÑÑно
заÑиÑÐ°ÐµÑ Ð»Ð¸ÑнÑе даннÑе Ð¾Ñ ÑÑеÑÑиÑ
"
-"ÑÑоÑон вообÑе, но он не Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°ÑиÑиÑÑ ÑÑи
даннÑе Ð¾Ñ Ð³Ð¾ÑÑдаÑÑÑва. СовÑем "
-"наобоÑоÑ: пеÑедаÑа ваÑиÑ
даннÑÑ
ÑÑжомÑ
ÑеÑвеÑÑ, еÑли Ð²Ñ Ð½Ðµ ÑиÑÑÑеÑе иÑ
"
-"пÑедваÑиÑелÑно Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑвободнÑÑ
пÑогÑамм, подÑÑÐ²Ð°ÐµÑ Ð²Ð°Ñи пÑава."
+"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
+"spy-on-smart-phone-data-a-920971.html\"> ÐÐРможеÑ
заглÑдÑваÑÑ Ð² даннÑе на "
+"ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android и
BlackBerry</a>. ХоÑÑ "
+"подÑобноÑÑи здеÑÑ Ð½Ðµ пÑиводÑÑÑÑ, поÑ
оже,
ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ как ÑнивеÑÑалÑнÑй "
+"ÑеÑнÑй Ñ
од, коÑоÑÑй, как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ
поÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. "
+"ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией
ÑазлиÑнÑÑ
оÑибок. <a href=\"http://"
+"www.osnews.com/story/27416/"
+"The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
+"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
#. type: Content of: <ul><li><p>
-# | Lots of <a
-# | href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/\">{+
-# | +}hospital equipment has lousy security</a>, and it can be fatal.
-#, fuzzy
-#| msgid ""
-#| "Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-"
-#| "vulnerable/\">hospital equipment has lousy security</a>, and it can be "
-#| "fatal."
msgid ""
-"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\"> hospital equipment has lousy security</a>, and it can be fatal."
+"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
+"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
+"intrusion."
msgstr ""
-"Ðного <a
href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
-"\">болÑниÑного обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð°ÑиÑено
паÑÑиво</a>, и ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ "
-"ÑмеÑÑелÑно."
+"Ð ÑиÑÑÐµÐ¼Ñ <a
href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-"
+"homes-hack/\"> “инÑеллекÑÑалÑнÑÑ
домов”</a>,
оказÑваеÑÑÑ, до "
+"идиоÑизма легко пÑоникнÑÑÑ."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1019,144 +848,136 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
-"have modifiable software</a>, which makes them vulnerable to viruses."
+"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
+"put-users-lives-on-display.html\"> The FTC punished a company for making "
+"webcams with bad security so that it was easy for anyone to watch them</a>."
msgstr ""
-"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> РнекоÑоÑÑÑ
видаÑ
"
-"поÑÑаÑивной памÑÑи еÑÑÑ Ð¿ÑогÑаммÑ,
коÑоÑÑе можно изменÑÑÑ</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð¸Ñ
"
-"ÑÑзвимÑми Ð´Ð»Ñ Ð²Ð¸ÑÑÑов."
+"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
+"put-users-lives-on-display.html\"> ФедеÑалÑÐ½Ð°Ñ ÑоÑговаÑ
комиÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð° "
+"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
камеÑ,
безопаÑноÑÑÑ ÐºÐ¾ÑоÑÑÑ
бÑла наÑÑолÑко "
+"плоÑ
а, ÑÑо каждÑй легко мог глÑдеÑÑ ÑеÑез
ниÑ
</a>."
+# | {+<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">+}
+# | It is possible to [-<a
+# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">-]
+# | take control of some car computers through malware in music files</a>.
+# | Also <a
+# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by
+# | radio</a>. [-More information in-] {+Here is+} <a
+# | [-href=\"http://www.autosec.org/faq.html\"> Automotive Security And
+# | Privacy Center</a>.-] {+href=\"http://www.autosec.org/faq.html\">more
+# | information</a>.+}
#. type: Content of: <ul><li><p>
-# | We don't call this a “back door” because it is normal that you
-# | can install a new system in a computer{+,+} given physical access to it.
-# | However, memory sticks and cards should not be modifiable in this way.
-#, fuzzy
-#| msgid ""
-#| "We don't call this a “back door” because it is normal that "
-#| "you can install a new system in a computer given physical access to it. "
-#| "However, memory sticks and cards should not be modifiable in this way."
msgid ""
-"We don't call this a “back door” because it is normal that you "
-"can install a new system in a computer, given physical access to it. "
-"However, memory sticks and cards should not be modifiable in this way."
+"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> It is possible to take control "
+"of some car computers through malware in music files</a>. Also <a href="
+"\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">by radio</"
+"a>. Here is <a href=\"http://www.autosec.org/faq.html\">more information</"
+"a>."
msgstr ""
-"ÐÑ Ð½Ðµ назÑваем ÑÑо “ÑеÑнÑм Ñ
одом”,
поÑÐ¾Ð¼Ñ ÑÑо когда Ð²Ñ Ð¿Ð¾Ð»ÑÑаеÑе "
-"ÑизиÑеÑкий доÑÑÑп к компÑÑÑеÑÑ, вÑ, как
пÑавило, можеÑе ÑÑÑановиÑÑ Ð½Ð° нем "
-"новÑÑ ÑиÑÑемÑ. Ðднако Ñ ÐºÐ°ÑÑ Ð¿Ð°Ð¼ÑÑи и
дÑÑгиÑ
ноÑиÑелей не должно бÑÑÑ "
-"возможноÑÑи ÑакиÑ
изменений."
+"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+"hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
+"компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в ÑайлаÑ
"
+"Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
+"business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
+"href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
+"безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <ul><li><p>
+msgid ""
+"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
+"dies-days-before-scheduled-black-hat-appearance/\"> It is possible to kill "
+"people by taking control of medical implants by radio</a>. Here is <a href="
+"\"http://www.bbc.co.uk/news/technology-17631838\">more information</a>. And "
+"<a href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive."
+"com/2013/02/broken-hearts-how-plausible-was.html\">here</a>."
+msgstr ""
+"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
+"dies-days-before-scheduled-black-hat-appearance/\"> ÐолÑÑив
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ "
+"вживленнÑми медиÑинÑкими ÑÑÑÑойÑÑвами по
Ñадио, можно ÑбиваÑÑ Ð»Ñдей</a>. "
+"ÐодÑобноÑÑи Ñм. <a
href=\"http://www.bbc.co.uk/news/technology-17631838\"> "
+"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://web.archive.org/web/20180203130244/"
+"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\"> в "
+"блоге IOActive</a>."
+
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <ul><li><p>
+msgid ""
+"Lots of <a href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\">hospital equipment has lousy security</a>, and it can be fatal."
+msgstr ""
+"Ðного <a
href=\"http://www.wired.com/2014/04/hospital-equipment-vulnerable/"
+"\">болÑниÑного обоÑÑÐ´Ð¾Ð²Ð°Ð½Ð¸Ñ Ð·Ð°ÑиÑено
паÑÑиво</a>, и ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ "
+"ÑмеÑÑелÑно."
#. type: Content of: <ul><li><p>
-# | <a
-# |
href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/\">
-# | Point-of-sale terminals running Windows were taken [-over-] {+over</a>+}
-# | and turned into a botnet for the purpose of collecting customers' credit
-# | card [-numbers</a>.-] {+numbers.+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
-#| "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-#| "running Windows were taken over and turned into a botnet for the purpose "
-#| "of collecting customers' credit card numbers</a>."
msgid ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-"running Windows were taken over</a> and turned into a botnet for the purpose "
-"of collecting customers' credit card numbers."
+"running Windows were taken over and turned into a botnet for the purpose of "
+"collecting customers' credit card numbers</a>."
msgstr ""
"<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-"
"age-with-first-known-point-of-sale-botnet/\"> ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð²
меÑÑаÑ
пÑодаж, "
"ÑабоÑаÑÑие под ÑпÑавлением Windows, бÑли
обÑаÑÐµÐ½Ñ Ð·Ð»Ð¾ÑмÑÑленниками в ÑеÑÑ "
"ÑбоÑа номеÑов кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов</a>."
+# || No change detected. The change might only be in amounts of spaces.
#. type: Content of: <ul><li><p>
-# | <a
-# |
[-href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">-]
-# |
{+href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html\">+}
-# | The NSA can tap data in smart phones, including iPhones, Android, and
-# | BlackBerry</a>. While there is not much detail here, it seems that this
-# | does not operate via the universal back door that we know nearly all
-# | portable phones have. It may involve exploiting various bugs. There are
-# | <a
-# |
href=\"http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone\">
-# | lots of bugs in the phones' radio software</a>.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
-#| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
-#| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
-#| "there is not much detail here, it seems that this does not operate via "
-#| "the universal back door that we know nearly all portable phones have. It "
-#| "may involve exploiting various bugs. There are <a href=\"http://www."
-#| "osnews.com/story/27416/"
-#| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
-#| "in the phones' radio software</a>."
-msgid ""
-"<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel.de/"
-"international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971."
-"html\"> The NSA can tap data in smart phones, including iPhones, Android, "
-"and BlackBerry</a>. While there is not much detail here, it seems that this "
-"does not operate via the universal back door that we know nearly all "
-"portable phones have. It may involve exploiting various bugs. There are <a "
-"href=\"http://www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs in "
-"the phones' radio software</a>."
+msgid ""
+"An app to prevent “identity theft” (access to personal data) by "
+"storing users' data on a special server <a href=\"http://arstechnica.com/"
+"tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-"
+"concerns-that-app-isnt-safe/\">was deactivated by its developer</a> which "
+"had discovered a security flaw."
msgstr ""
-"<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-can-"
-"spy-on-smart-phone-data-a-920971.html\"> ÐÐРможеÑ
заглÑдÑваÑÑ Ð² даннÑе на "
-"ÑмаÑÑÑонаÑ
, в Ñом ÑиÑле на iPhone, Android и
BlackBerry</a>. ХоÑÑ "
-"подÑобноÑÑи здеÑÑ Ð½Ðµ пÑиводÑÑÑÑ, поÑ
оже,
ÑÑо ÑабоÑÐ°ÐµÑ Ð½Ðµ как ÑнивеÑÑалÑнÑй "
-"ÑеÑнÑй Ñ
од, коÑоÑÑй, как Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, еÑÑÑ
поÑÑи во вÑеÑ
мобилÑнÑÑ
ÑелеÑонаÑ
. "
-"ÐÑо Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ ÑвÑзано Ñ ÑкÑплÑаÑаÑией
ÑазлиÑнÑÑ
оÑибок. <a href=\"http://"
-"www.osnews.com/story/27416/"
-"The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
-"ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ Ð¼Ð½Ð¾Ð¶ÐµÑÑво
оÑибок</a>."
+"ÐÑиложение Ð´Ð»Ñ Ð¿ÑедоÑвÑаÑÐµÐ½Ð¸Ñ “кÑажи
лиÑноÑÑи” (доÑÑÑпа к лиÑнÑм "
+"даннÑм), Ñ
ÑанивÑее даннÑе полÑзоваÑÐµÐ»Ñ Ð½Ð°
оÑобом ÑеÑвеÑе, <a href=\"http://"
+"arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-"
+"data-over-concerns-that-app-isnt-safe/\">бÑло вÑклÑÑено
ÑазÑабоÑÑиком ÑÑого "
+"пÑиложениÑ</a>, коÑоÑÑй обнаÑÑжил бÑеÑÑ Ð²
заÑиÑе."
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-"
-"codes-security\">The NSA has put back doors into nonfree encryption "
-"software</a>. We don't know which ones they are, but we can be sure they "
-"include some widely used systems. This reinforces the point that you can "
-"never trust the security of nonfree software."
+"That developer seems to be conscientious about protecting personal data from "
+"third parties in general, but it can't protect that data from the state. "
+"Quite the contrary: confiding your data to someone else's server, if not "
+"first encrypted by you with free software, undermines your rights."
msgstr ""
+"ÐажеÑÑÑ, ÑÑÐ¾Ñ ÑазÑабоÑÑик добÑоÑовеÑÑно
заÑиÑÐ°ÐµÑ Ð»Ð¸ÑнÑе даннÑе Ð¾Ñ ÑÑеÑÑиÑ
"
+"ÑÑоÑон вообÑе, но он не Ð¼Ð¾Ð¶ÐµÑ Ð·Ð°ÑиÑиÑÑ ÑÑи
даннÑе Ð¾Ñ Ð³Ð¾ÑÑдаÑÑÑва. СовÑем "
+"наобоÑоÑ: пеÑедаÑа ваÑиÑ
даннÑÑ
ÑÑжомÑ
ÑеÑвеÑÑ, еÑли Ð²Ñ Ð½Ðµ ÑиÑÑÑеÑе иÑ
"
+"пÑедваÑиÑелÑно Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ ÑвободнÑÑ
пÑогÑамм, подÑÑÐ²Ð°ÐµÑ Ð²Ð°Ñи пÑава."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">-]The
-# | FTC punished a company for making webcams with {+<a
-# |
href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html\">+}
-# | bad security so that it was easy for anyone to watch {+through+} them</a>.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-"
-#| "flaw-put-users-lives-on-display.html\"> The FTC punished a company for "
-#| "making webcams with bad security so that it was easy for anyone to watch "
-#| "them</a>."
-msgid ""
-"The FTC punished a company for making webcams with <a href=\"http://www."
-"nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-"
-"display.html\"> bad security so that it was easy for anyone to watch through "
-"them</a>."
+msgid ""
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> Some flash memories "
+"have modifiable software</a>, which makes them vulnerable to viruses."
msgstr ""
-"<a href=\"http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-"
-"put-users-lives-on-display.html\"> ФедеÑалÑÐ½Ð°Ñ ÑоÑговаÑ
комиÑÑÐ¸Ñ Ð½Ð°ÐºÐ°Ð·Ð°Ð»Ð° "
-"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð·Ð° пÑоизводÑÑво ÑеÑевÑÑ
камеÑ,
безопаÑноÑÑÑ ÐºÐ¾ÑоÑÑÑ
бÑла наÑÑолÑко "
-"плоÑ
а, ÑÑо каждÑй легко мог глÑдеÑÑ ÑеÑез
ниÑ
</a>."
+"<a href=\"http://www.bunniestudios.com/blog/?p=3554\"> РнекоÑоÑÑÑ
видаÑ
"
+"поÑÑаÑивной памÑÑи еÑÑÑ Ð¿ÑогÑаммÑ,
коÑоÑÑе можно изменÑÑÑ</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ Ð¸Ñ
"
+"ÑÑзвимÑми Ð´Ð»Ñ Ð²Ð¸ÑÑÑов."
+# || No change detected. The change might only be in amounts of spaces.
+#. type: Content of: <ul><li><p>
+msgid ""
+"We don't call this a “back door” because it is normal that you "
+"can install a new system in a computer given physical access to it. "
+"However, memory sticks and cards should not be modifiable in this way."
+msgstr ""
+"ÐÑ Ð½Ðµ назÑваем ÑÑо “ÑеÑнÑм Ñ
одом”,
поÑÐ¾Ð¼Ñ ÑÑо когда Ð²Ñ Ð¿Ð¾Ð»ÑÑаеÑе "
+"ÑизиÑеÑкий доÑÑÑп к компÑÑÑеÑÑ, вÑ, как
пÑавило, можеÑе ÑÑÑановиÑÑ Ð½Ð° нем "
+"новÑÑ ÑиÑÑемÑ. Ðднако Ñ ÐºÐ°ÑÑ Ð¿Ð°Ð¼ÑÑи и
дÑÑгиÑ
ноÑиÑелей не должно бÑÑÑ "
+"возможноÑÑи ÑакиÑ
изменений."
+
+# || No change detected. The change might only be in amounts of spaces.
#. type: Content of: <ul><li><p>
-# | <a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable
-# | nonfree software in disk drives can be written by a nonfree
-# | [-program.</a>-] {+program</a>.+} This makes any system vulnerable to
-# | persistent attacks that normal forensics won't detect.
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-#| "nonfree software in disk drives can be written by a nonfree program.</a> "
-#| "This makes any system vulnerable to persistent attacks that normal "
-#| "forensics won't detect."
msgid ""
"<a href=\"http://spritesmods.com/?art=hddhack&page=6\"> Replaceable "
-"nonfree software in disk drives can be written by a nonfree program</a>. "
+"nonfree software in disk drives can be written by a nonfree program.</a> "
"This makes any system vulnerable to persistent attacks that normal forensics "
"won't detect."
msgstr ""
@@ -1165,104 +986,23 @@
"пÑогÑаммой</a>. ÐÑо Ð´ÐµÐ»Ð°ÐµÑ ÑиÑÑÐµÐ¼Ñ ÑÑзвимой
Ð´Ð»Ñ Ð¿Ð¾ÑÑÑннÑÑ
аÑак, "
"необнаÑÑжимÑÑ
обÑÑнÑми ÑÑедÑÑвами."
-#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">-]It
-# | is possible to {+<a
-# |
href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\">+}
-# | kill people by taking control of medical implants by radio</a>. [-Here
-# | is-] {+More information in+} <a
-# | [-href=\"http://www.bbc.co.uk/news/technology-17631838\">more
-# | information</a>. And-]
-# | {+href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a>
-# | and+} <a
-# |
[-href=\"https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">here</a>.-]
-# |
{+href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\">
-# | IOActive Labs Research blog</a>.+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-"
-#| "jack-dies-days-before-scheduled-black-hat-appearance/\"> It is possible "
-#| "to kill people by taking control of medical implants by radio</a>. Here "
-#| "is <a href=\"http://www.bbc.co.uk/news/technology-17631838\">more "
-#| "information</a>. And <a href=\"https://web.archive.org/"
-#| "web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-"
-#| "plausible-was.html\">here</a>."
-msgid ""
-"It is possible to <a href=\"http://siliconangle.com/blog/2013/07/27/famed-"
-"hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/\"> kill "
-"people by taking control of medical implants by radio</a>. More information "
-"in <a href=\"http://www.bbc.co.uk/news/technology-17631838\">BBC News</a> "
-"and <a href=\"https://blog.ioactive.com/2013/02/broken-hearts-how-plausible-"
-"was.html\"> IOActive Labs Research blog</a>."
-msgstr ""
-"<a href=\"http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-"
-"dies-days-before-scheduled-black-hat-appearance/\"> ÐолÑÑив
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ "
-"вживленнÑми медиÑинÑкими ÑÑÑÑойÑÑвами по
Ñадио, можно ÑбиваÑÑ Ð»Ñдей</a>. "
-"ÐодÑобноÑÑи Ñм. <a
href=\"http://www.bbc.co.uk/news/technology-17631838\"> "
-"на ÑайÑе Ðи-Ðи-Си</a> и <a
href=\"https://web.archive.org/web/20180203130244/"
-"http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html\"> в "
-"блоге IOActive</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-"
-"hack/\"> “Smart homes”</a> turn out to be stupidly vulnerable to "
-"intrusion."
-msgstr ""
-"Ð ÑиÑÑÐµÐ¼Ñ <a
href=\"http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-"
-"homes-hack/\"> “инÑеллекÑÑалÑнÑÑ
домов”</a>,
оказÑваеÑÑÑ, до "
-"идиоÑизма легко пÑоникнÑÑÑ."
-
+# || No change detected. The change might only be in amounts of spaces.
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> Crackers found a way to break security on a "
-"“smart” TV</a> and use its camera to watch the people who are "
-"watching TV."
-msgstr ""
-"<a href=\"http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-"
-"penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-"
-"microphone-cameras.html\"> ÐзломÑики наÑли ÑпоÑоб
вÑкÑÑÑÑ Ð·Ð°ÑиÑÑ Ð² “"
-"инÑеллекÑÑалÑном” ÑелевизоÑе</a> и
воÑполÑзоваÑÑÑÑ ÐµÐ³Ð¾ видеокамеÑой, "
-"ÑÑÐ¾Ð±Ñ ÑмоÑÑеÑÑ Ð½Ð° лÑдей, коÑоÑÑе ÑмоÑÑÑÑ
ÑелевизоÑ."
-
-#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">-]It
-# | is possible to {+<a
-# |
href=\"http://www.pcworld.idg.com.au/article/379477/hacking_music_can_take_control_your_car/\">+}
-# | take control of some car computers through malware in music files</a>.
-# | Also <a
-# | href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?_r=0\">{+
-# | +}by radio</a>. [-Here is-] {+More information in+} <a
-# | [-href=\"http://www.autosec.org/faq.html\">more information</a>.-]
-# | {+href=\"http://www.autosec.org/faq.html\"> Automotive Security And
-# | Privacy Center</a>.+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#| "hacking_music_can_take_control_your_car/\"> It is possible to take "
-#| "control of some car computers through malware in music files</a>. Also "
-#| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
-#| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
-#| "\">more information</a>."
-msgid ""
-"It is possible to <a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> take control of some car "
-"computers through malware in music files</a>. Also <a href=\"http://www."
-"nytimes.com/2011/03/10/business/10hack.html?_r=0\"> by radio</a>. More "
-"information in <a href=\"http://www.autosec.org/faq.html\"> Automotive "
-"Security And Privacy Center</a>."
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Many smartphone apps use insecure authentication methods when "
+"storing your personal data on remote servers.</a> This leaves personal "
+"information like email addresses, passwords, and health information "
+"vulnerable. Because many of these apps are proprietary it makes it hard to "
+"impossible to know which apps are at risk."
msgstr ""
-"<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-"hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
-"компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в ÑайлаÑ
"
-"Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
-"business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
-"href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
-"безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
+"<a href=\"http://phys.org/news/2015-05-app-vulnerability-threatens-millions-"
+"users.html\"> Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ ÑмаÑÑÑонов
пÑименÑÑÑ Ð½ÐµÐ±ÐµÐ·Ð¾Ð¿Ð°ÑнÑе меÑÐ¾Ð´Ñ "
+"аÑÑенÑиÑикаÑии пÑи Ñ
Ñанении ваÑиÑ
лиÑнÑÑ
даннÑÑ
на ÑдаленнÑÑ
ÑеÑвеÑаÑ
.</a> "
+"ÐÑо подвеÑÐ³Ð°ÐµÑ Ð¾Ð¿Ð°ÑноÑÑи ÑакÑÑ Ð»Ð¸ÑнÑÑ
инÑоÑмаÑиÑ, как адÑеÑа ÑлекÑÑонной "
+"поÑÑÑ, паÑоли, а Ñакже медиÑинÑкие даннÑе.
ÐоÑколÑÐºÑ Ð¼Ð½Ð¾Ð³Ð¸Ðµ из ÑÑиÑ
"
+"пÑиложений неÑвободнÑ, ÑÑÑдно, еÑли
вообÑе возможно, ÑзнаÑÑ, какие "
+"пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´Ð²ÐµÑÐ¶ÐµÐ½Ñ ÑÑомÑ."
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
@@ -1342,41 +1082,15 @@
#, fuzzy
#~| msgid ""
-#~| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#~| "hacking_music_can_take_control_your_car/\"> It is possible to take "
-#~| "control of some car computers through malware in music files</a>. Also "
-#~| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
-#~| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
-#~| "\">more information</a>."
-#~ msgid ""
-#~ "It is possible to take control of some car computers through <a href="
-#~ "\"http://www.pcworld.idg.com.au/article/379477/"
-#~ "hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
-#~ "Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
-#~ "_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
-#~ "\">more information</a>."
-#~ msgstr ""
-#~ "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
-#~ "hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
-#~ "компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в "
-#~ "ÑайлаÑ
Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
-#~ "business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
-#~ "href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
-#~ "безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
-
-#~ msgid ""
-#~ "Even if no one connects to the car remotely, the cell phone modem enables "
-#~ "the phone company to track the car's movements all the time; it is "
-#~ "possible to physically remove the cell phone modem though."
-#~ msgstr ""
-#~ "Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
-#~ "ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
-#~ "авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки
ÑдалиÑÑ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи."
-
+#~| "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
+#~| "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
+#~| "securing-user-data\"> transmit personal data in an insecure way</a>. "
+#~| "However, the worse aspect of these apps is that <a href=\"/philosophy/"
+#~| "surveillance-vs-democracy.html\">payment is not anonymous</a>."
#~ msgid ""
#~ "Many proprietary payment apps <a href=\"http://www.bloomberg.com/news/"
#~ "articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-"
-#~ "securing-user-data\"> transmit personal data in an insecure way</a>. "
+#~ "securing-user-data\">transmit personal data in an insecure way</a>. "
#~ "However, the worse aspect of these apps is that <a href=\"/philosophy/"
#~ "surveillance-vs-democracy.html\">payment is not anonymous</a>."
#~ msgstr ""
@@ -1386,34 +1100,72 @@
#~ "еÑе Ñ
Ñже Ñо, ÑÑо в ÑÑиÑ
пÑиложениÑÑ
<a
href=\"/philosophy/surveillance-vs-"
#~ "democracy.html\">плаÑежи не анонимнÑ</a>."
+#, fuzzy
+#~| msgid ""
+#~| "Even if no one connects to the car remotely, the cell phone modem "
+#~| "enables the phone company to track the car's movements all the time; it "
+#~| "is possible to physically remove the cell phone modem though."
+#~ msgid ""
+#~ "Even if no one connects to the car remotely, the cell phone modem enables "
+#~ "the phone company to track the car's movements all the time; it is "
+#~ "possible to physically remove the cell phone modem, though."
+#~ msgstr ""
+#~ "Ðаже еÑли никÑо не подклÑÑаеÑÑÑ Ðº
авÑÐ¾Ð¼Ð¾Ð±Ð¸Ð»Ñ Ð½Ð° ÑаÑÑÑоÑнии, модем ÑоÑовой "
+#~ "ÑвÑзи позволÑÐµÑ ÑелеÑонной компании
поÑÑоÑнно оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ "
+#~ "авÑомобилÑ; Ñ
оÑÑ Ð¼Ð¾Ð¶Ð½Ð¾ ÑизиÑеÑки
ÑдалиÑÑ Ð¼Ð¾Ð´ÐµÐ¼ ÑоÑовой ÑвÑзи."
+
+#, fuzzy
#~| msgid ""
#~| "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
-#~| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> "
-#~| "take remote control of the Jeep</a> “connected car”."
+#~| "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
+#~| "\">take remote control of the Jeep</a> “connected car”."
#~ msgid ""
#~ "Crackers were able to <a href=\"http://arstechnica.com/security/2015/07/"
-#~ "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/"
-#~ "\">take remote control of the Jeep</a> “connected car”."
+#~ "fiat-chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> "
+#~ "take remote control of the Jeep</a> “connected car”. They "
+#~ "could track the car, start or stop the engine, and activate or deactivate "
+#~ "the brakes, and more."
#~ msgstr ""
#~ "ÐзломÑикам ÑдалоÑÑ <a
href=\"http://arstechnica.com/security/2015/07/fiat-"
#~ "chrysler-connected-car-bug-lets-hackers-take-over-jeep-remotely/\"> "
#~ "полÑÑиÑÑ ÑдаленнÑй конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´
джипом</a> “Ñ Ñоединением”."
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-"
+#~| "comes-of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale "
+#~| "terminals running Windows were taken over and turned into a botnet for "
+#~| "the purpose of collecting customers' credit card numbers</a>."
#~ msgid ""
-#~ "They could track the car, start or stop the engine, and activate or "
-#~ "deactivate the brakes, and more."
+#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#~ "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
+#~ "running Windows were taken over</a> and turned into a botnet for the "
+#~ "purpose of collecting customers' credit card numbers."
#~ msgstr ""
-#~ "Ðни могли ÑледиÑÑ Ð·Ð° авÑомобилем,
запÑÑкаÑÑ Ð¸ оÑÑанавливаÑÑ Ð´Ð²Ð¸Ð³Ð°ÑелÑ, "
-#~ "вклÑÑаÑÑ Ð¸ вÑклÑÑаÑÑ ÑоÑмоз, а Ñакже
многое дÑÑгое."
+#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
+#~ "of-age-with-first-known-point-of-sale-botnet/\"> ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð²
меÑÑаÑ
"
+#~ "пÑодаж, ÑабоÑаÑÑие под ÑпÑавлением Windows,
бÑли обÑаÑÐµÐ½Ñ "
+#~ "злоÑмÑÑленниками в ÑеÑÑ ÑбоÑа номеÑов
кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов</a>."
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
+#~| "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
+#~| "smart phones, including iPhones, Android, and BlackBerry</a>. While "
+#~| "there is not much detail here, it seems that this does not operate via "
+#~| "the universal back door that we know nearly all portable phones have. "
+#~| "It may involve exploiting various bugs. There are <a href=\"http://www."
+#~| "osnews.com/story/27416/"
+#~| "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
+#~| "in the phones' radio software</a>."
#~ msgid ""
-#~ "<a href=\"http://www.spiegel.de/international/world/privacy-scandal-nsa-"
-#~ "can-spy-on-smart-phone-data-a-920971.html\"> The NSA can tap data in "
-#~ "smart phones, including iPhones, Android, and BlackBerry</a>. While "
-#~ "there is not much detail here, it seems that this does not operate via "
-#~ "the universal back door that we know nearly all portable phones have. It "
-#~ "may involve exploiting various bugs. There are <a href=\"http://www."
-#~ "osnews.com/story/27416/"
+#~ "<a href=\"https://web.archive.org/web/20180816030205/http://www.spiegel."
+#~ "de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-"
+#~ "a-920971.html\"> The NSA can tap data in smart phones, including iPhones, "
+#~ "Android, and BlackBerry</a>. While there is not much detail here, it "
+#~ "seems that this does not operate via the universal back door that we know "
+#~ "nearly all portable phones have. It may involve exploiting various bugs. "
+#~ "There are <a href=\"http://www.osnews.com/story/27416/"
#~ "The_second_operating_system_hiding_in_every_mobile_phone\"> lots of bugs "
#~ "in the phones' radio software</a>."
#~ msgstr ""
@@ -1427,16 +1179,53 @@
#~ "The_second_operating_system_hiding_in_every_mobile_phone\"> Ð
пÑогÑаммаÑ
"
#~ "ÑадиоаппаÑаÑÑÑÑ ÑелеÑонов еÑÑÑ
множеÑÑво оÑибок</a>."
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#~| "hacking_music_can_take_control_your_car/\"> It is possible to take "
+#~| "control of some car computers through malware in music files</a>. Also "
+#~| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#~| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#~| "\">more information</a>."
#~ msgid ""
-#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
-#~ "of-age-with-first-known-point-of-sale-botnet/\"> Point-of-sale terminals "
-#~ "running Windows were taken over and turned into a botnet for the purpose "
-#~ "of collecting customers' credit card numbers</a>."
+#~ "It is possible to <a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#~ "hacking_music_can_take_control_your_car/\"> take control of some car "
+#~ "computers through malware in music files</a>. Also <a href=\"http://www."
+#~ "nytimes.com/2011/03/10/business/10hack.html?_r=0\"> by radio</a>. More "
+#~ "information in <a href=\"http://www.autosec.org/faq.html\"> Automotive "
+#~ "Security And Privacy Center</a>."
#~ msgstr ""
-#~ "<a href=\"http://arstechnica.com/security/2013/12/credit-card-fraud-comes-"
-#~ "of-age-with-first-known-point-of-sale-botnet/\"> ТеÑÐ¼Ð¸Ð½Ð°Ð»Ñ Ð²
меÑÑаÑ
"
-#~ "пÑодаж, ÑабоÑаÑÑие под ÑпÑавлением Windows,
бÑли обÑаÑÐµÐ½Ñ "
-#~ "злоÑмÑÑленниками в ÑеÑÑ ÑбоÑа номеÑов
кÑедиÑнÑÑ
каÑÑ ÐºÐ»Ð¸ÐµÐ½Ñов</a>."
+#~ "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#~ "hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
+#~ "компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в "
+#~ "ÑайлаÑ
Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
+#~ "business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
+#~ "href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
+#~ "безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#~| "hacking_music_can_take_control_your_car/\"> It is possible to take "
+#~| "control of some car computers through malware in music files</a>. Also "
+#~| "<a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#~| "_r=0\">by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#~| "\">more information</a>."
+#~ msgid ""
+#~ "It is possible to take control of some car computers through <a href="
+#~ "\"http://www.pcworld.idg.com.au/article/379477/"
+#~ "hacking_music_can_take_control_your_car/\"> malware in music files</a>. "
+#~ "Also <a href=\"http://www.nytimes.com/2011/03/10/business/10hack.html?"
+#~ "_r=0\"> by radio</a>. Here is <a href=\"http://www.autosec.org/faq.html"
+#~ "\">more information</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.pcworld.idg.com.au/article/379477/"
+#~ "hacking_music_can_take_control_your_car/\"> Ðад некоÑоÑÑми
авÑомобилÑнÑми "
+#~ "компÑÑÑеÑÑми можно полÑÑиÑÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ñ
помоÑÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в "
+#~ "ÑайлаÑ
Ñ Ð¼ÑзÑкой</a>. Ð Ñакже <a
href=\"http://www.nytimes.com/2011/03/10/"
+#~ "business/10hack.html?_r=0\">по Ñадио</a>. ÐÑÑгие
ÑÐ²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¼Ð¾Ð¶Ð½Ð¾ найÑи <a "
+#~ "href=\"http://www.autosec.org/faq.html\">на ÑайÑе ЦенÑÑа
авÑомобилÑной "
+#~ "безопаÑноÑÑи и конÑиденÑиалÑноÑÑи</a>."
# type: Content of: <div><p>
#~ msgid ""