[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-games.ru.html proprieta...
From: |
GNUN |
Subject: |
www/proprietary malware-games.ru.html proprieta... |
Date: |
Sat, 6 Oct 2018 02:59:41 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/06 02:59:40
Modified files:
proprietary : malware-games.ru.html
proprietary-back-doors.ru.html
proprietary-drm.ru.html
proprietary-insecurity.fr.html
proprietary-insecurity.ru.html
proprietary-tyrants.ru.html
proprietary/po : malware-games.ru-en.html malware-games.ru.po
proprietary-back-doors.ru-en.html
proprietary-back-doors.ru.po
proprietary-drm.ru-en.html
proprietary-drm.ru.po
proprietary-insecurity.de.po
proprietary-insecurity.fr-en.html
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru-en.html
proprietary-insecurity.ru.po
proprietary-tyrants.ru-en.html
proprietary-tyrants.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.ru.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.ru.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.ru.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru.po?cvsroot=www&r1=1.48&r2=1.49
Patches:
Index: malware-games.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.ru.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-games.ru.html 27 Sep 2018 11:28:44 -0000 1.11
+++ malware-games.ru.html 6 Oct 2018 06:59:40 -0000 1.12
@@ -46,7 +46,9 @@
<p>ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в игÑаÑ
.</p>
<ul class="blurbs">
- <li id="M201806250">
+
+ <!-- INSERT games -->
+<li id="M201806250">
<p>ÐгÑа Metal Gear Rising Ð´Ð»Ñ MacOS пÑивÑзана к
ÑеÑвеÑÑ. ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
вÑклÑÑила ÑеÑвеÑ, и вÑе копии пеÑеÑÑали
ÑабоÑаÑÑ</a>.</p>
@@ -60,7 +62,7 @@
ÑÑоÑонам</a>.</p>
</li>
- <li id="M201804141">
+ <li id="M201804144">
<p>ArenaNet Ñайком ÑÑÑанавливала
пÑогÑаммÑ-Ñпион вмеÑÑе Ñ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸ÐµÐ¼
маÑÑовой
многополÑзоваÑелÑÑкой игÑой Guild War 2.
ÐÑогÑамма-Ñпион позволÑла
ArpaNet <a
@@ -139,6 +141,17 @@
в плаÑнÑÑ
игÑаÑ
.</p>
</li>
+ <li id="M201410130">
+ <p><a
+href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms">Nintendo
+ÑабоÑиÑовал по ÑеÑи вÑе Wiis, пÑекÑаÑÐ°Ñ Ð¸Ñ
ÑабоÑÑ Ð´Ð¾ ÑеÑ
поÑ, пока
+полÑзоваÑÐµÐ»Ñ Ð½Ðµ ÑоглаÑиÑÑÑ Ñ Ð½Ð¾Ð²Ñми
ÑÑловиÑми лиÑензии</a>.</p>
+
+ <p>ÐÑ Ð¼Ð¾Ð¶ÐµÐ¼ бÑÑÑ Ð²Ð¿Ð¾Ð»Ð½Ðµ ÑвеÑенÑ, ÑÑо
ÑÑÐ»Ð¾Ð²Ð¸Ñ ÑÑой лиÑензии неÑпÑаведливÑ,
+поÑÐ¾Ð¼Ñ ÑÑо ниÑÑо, кÑоме неÑпÑаведливоÑÑи,
не Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ Ð¿Ð¾Ð±ÑдиÑелÑной
+пÑиÑиной навÑзÑÐ²Ð°Ð½Ð¸Ñ Ð»Ð¸Ñензии.</p>
+ </li>
+
<li id="M201401280">
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
@@ -158,6 +171,28 @@
игÑÑ ÑоблазнÑÑÑ Ð´ÐµÑей ÑÑаÑиÑÑ
ÑодиÑелÑÑкие денÑги</a>.</p>
</li>
+ <li id="M201105070">
+ <p><a href="https://www.defectivebydesign.org/sony">Playstation
3 —
+ÑиÑан</a>.</p>
+ </li>
+
+ <li id="M201003300">
+ <p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Sony <a
+href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3">
+ÑабоÑиÑовала Playstation 3</a> ÑÑ
ÑдÑенной веÑÑией
пÑогÑамм Ð´Ð»Ñ ÑÑÑÑойÑÑва, в
+коÑоÑой бÑла Ñдалена оÑобенноÑÑÑ,
позволÑвÑÐ°Ñ Ð¿Ð¾Ð»ÑзоваÑелÑм запÑÑкаÑÑ Ð½Ð° нем
+GNU/Linux.</p>
+
+ <p>ÐпоÑледÑÑвии Sony поÑлала полиÑÐ¸Ñ Ð·Ð°
ÐеоÑ
оÑом, когда ÑÐ¾Ñ Ð²Ð·Ð»Ð¾Ð¼Ð°Ð» пÑогÑаммÑ,
+коÑоÑÐ°Ñ Ð½Ðµ позволÑла полÑзоваÑелÑм
изменÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ Ð² ÑÑÑÑойÑÑве, а мÑ
+оÑвеÑили на ÑÑо пÑизÑвом <a
href="http://boycottsony.org"> бойкоÑиÑоваÑÑ
+Sony</a>.</p>
+
+ <p>Ðо ÑеÑÐµÐ½Ð¸Ñ ÑÑда Sony <a
+href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/">
+пÑÐ¾Ð¸Ð·Ð²Ð¾Ð´Ð¸Ñ Ð²ÑплаÑÑ Ð·Ð° ÑабоÑаж</a>.</p>
+ </li>
+
<li id="M200510200">
<p>Blizzard Warden — ÑкÑÑÑÐ°Ñ Ð¿ÑогÑамма
“пÑедоÑвÑаÑениÑ
обмана”, коÑоÑÐ°Ñ <a
@@ -245,7 +280,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/09/27 11:28:44 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
Index: proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary-back-doors.ru.html 5 Oct 2018 17:29:54 -0000 1.47
+++ proprietary-back-doors.ru.html 6 Oct 2018 06:59:40 -0000 1.48
@@ -329,8 +329,8 @@
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
ÑообÑили в 2007 годÑ</a> в оÑноÑении XP и Vista, и
кажеÑÑÑ, Microsoft
пÑименила ÑÐ¾Ñ Ð¶Ðµ меÑод Ð´Ð»Ñ Ð¿ÑоÑÐ°Ð»ÐºÐ¸Ð²Ð°Ð½Ð¸Ñ <a
-href="/proprietary/proprietary-sabotage.html#windows10-forcing"> ÑÑ
ÑдÑениÑ
-до Windows 10</a> на компÑÑÑеÑаÑ
под Windows 7 и 8.</p>
+href="/proprietary/malware-microsoft.html#windows10-forcing"> ÑÑ
ÑдÑÐµÐ½Ð¸Ñ Ð´Ð¾
+Windows 10</a> на компÑÑÑеÑаÑ
под Windows 7 и 8.</p>
<p>Ð Windows 10 ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од
болÑÑе не ÑкÑÑваÑÑ; вÑе
“обновлениє бÑдÑÑ <a
@@ -542,7 +542,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/05 17:29:54 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
Index: proprietary-drm.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.ru.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-drm.ru.html 27 Sep 2018 15:57:42 -0000 1.21
+++ proprietary-drm.ru.html 6 Oct 2018 06:59:40 -0000 1.22
@@ -43,7 +43,9 @@
</p>
<ul class="blurbs">
- <li id="M201806250">
+
+ <!-- INSERT drm -->
+<li id="M201806250">
<p>ÐгÑа Metal Gear Rising Ð´Ð»Ñ MacOS пÑивÑзана к
ÑеÑвеÑÑ. ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
вÑклÑÑила ÑеÑвеÑ, и вÑе копии пеÑеÑÑали
ÑабоÑаÑÑ</a>.</p>
@@ -375,7 +377,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/09/27 15:57:42 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-insecurity.fr.html 5 Oct 2018 17:00:13 -0000 1.70
+++ proprietary-insecurity.fr.html 6 Oct 2018 06:59:40 -0000 1.71
@@ -48,13 +48,6 @@
failles clairement établies qui ont des conséquences graves ou méritent
d'être mentionnées pour d'autres raisons. </p>
-<p>Par leur conception-même, les <a
-href="/proprietary/proprietary-tethers.html">appareils et applications qui
-dépendent d'un serveur</a> ne sont pas sûres puisqu'ils risquent en
-permanence d'être mis hors service par une panne du serveur. Nous ne citons
-sur cette page que ceux qui ont des vulnérabilités reconnues en plus de leur
-dépendance à un serveur.</p>
-
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
mais n'y figure pas, n'hésitez pas à écrire à <a
href="mailto:address@hidden"><address@hidden></a> pour nous en
@@ -675,7 +668,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2018/10/05 17:00:13 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-insecurity.ru.html 5 Oct 2018 17:29:55 -0000 1.59
+++ proprietary-insecurity.ru.html 6 Oct 2018 06:59:40 -0000 1.60
@@ -49,12 +49,6 @@
неÑвободнÑÑ
пÑогÑамм, коÑоÑÐ°Ñ Ð¸Ð¼ÐµÐµÑ
ÑÑжкие поÑледÑÑÐ²Ð¸Ñ Ð¸Ð»Ð¸ коÑоÑÑÑ ÑледÑеÑ
оÑмеÑиÑÑ Ð¿Ð¾ дÑÑгим пÑиÑинам.</p>
-<p><a href="/proprietary/proprietary-tethers.html">ÐÑивÑзаннÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸
-ÑÑÑÑойÑÑва</a> пÑинÑипиалÑно небезопаÑнÑ,
поÑÐ¾Ð¼Ñ ÑÑо ÑеÑÐ²ÐµÑ Ð²Ñегда можеÑ
-ÑлÑÑайно оÑклÑÑиÑÑÑÑ Ð¾Ñ ÑеÑи, и они
пеÑеÑÑанÑÑ ÑабоÑаÑÑ. ÐÑ Ð½Ðµ пеÑеÑиÑлÑем
-иÑ
здеÑÑ, еÑли в ниÑ
Ð½ÐµÑ Ð´Ð¾ÐºÑменÑиÑованнÑÑ
ÑÑзвимоÑÑей в дополнение к ÑомÑ
-ÑакÑÑ, ÑÑо они пÑивÑзанÑ.</p>
-
<p>ÐÑли вам извеÑÑен пÑимеÑ, коÑоÑÑй должен
бÑÑÑ Ð½Ð° ÑÑой ÑÑÑаниÑе, но его здеÑÑ
неÑ, ÑообÑиÑе нам по адÑеÑÑ <a
href="mailto:address@hidden"><address@hidden></a>. УпомÑниÑе
@@ -658,7 +652,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/10/05 17:29:55 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
Index: proprietary-tyrants.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.ru.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-tyrants.ru.html 29 Sep 2018 07:28:07 -0000 1.16
+++ proprietary-tyrants.ru.html 6 Oct 2018 06:59:40 -0000 1.17
@@ -39,7 +39,9 @@
один-два заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, ÑÑобÑ
пÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи.</p>
<ul class="blurbs">
- <li id="M201607150">
+
+ <!-- INSERT tyrants -->
+<li id="M201607150">
<p>Microsoft ÑлÑÑайно оÑÑавила полÑзоваÑелÑм
ÑпоÑоб ÑÑÑановиÑÑ GNU/Linux на
планÑеÑаÑ
RT Ñ Windows, но ÑепеÑÑ Ð¾Ð½Ð¸ <a
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/">“иÑпÑавили”
@@ -61,10 +63,10 @@
</li>
<li id="M201304080">
- <p><a
+ <p>Motorola, когда она пÑинадлежала Google,
вÑпÑÑÑила <a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
-ÐекоÑоÑÑе ÑелеÑÐ¾Ð½Ñ Ñ Android — ÑиÑанÑ</a>
(Ñ
оÑÑ ÐºÑо-Ñо наÑел
-ÑпоÑоб взломаÑÑ Ð¾Ð³ÑаниÑение). Ð ÑÑаÑÑÑÑ,
болÑÑинÑÑво ÑÑÑÑойÑÑв Ñ
+ÑелеÑÐ¾Ð½Ñ Ñ Android, коÑоÑÑе
ÑвлÑÑÑÑÑÑиÑанами</a> (Ñ
оÑÑ ÐºÑо-Ñо наÑел
ÑпоÑоб
+взломаÑÑ Ð¾Ð³ÑаниÑение). Ð ÑÑаÑÑÑÑ,
болÑÑинÑÑво ÑÑÑÑойÑÑв Ñ
Android — не ÑиÑанÑ.</p>
</li>
@@ -177,7 +179,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2018/09/29 07:28:07 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
Index: po/malware-games.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-games.ru-en.html 27 Sep 2018 11:28:44 -0000 1.11
+++ po/malware-games.ru-en.html 6 Oct 2018 06:59:40 -0000 1.12
@@ -41,6 +41,7 @@
<p>Here are examples of malware in games.</p>
<ul class="blurbs">
+<!-- INSERT games -->
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
@@ -55,7 +56,7 @@
tracks data on users' computers and sends it to third parties</a>.</p>
</li>
- <li id="M201804141">
+ <li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
program along with an update to the massive
multiplayer game Guild War 2. The spyware allowed ArenaNet <a
@@ -130,6 +131,16 @@
can use the same tactics.</p>
</li>
+ <li id="M201410130">
+ <p><a
+
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms">Nintendo
+ remotely sabotaged all Wiis, making them refuse to work unless the
+ user agrees to a new EULA</a>.</p>
+
+ <p>We can be quite sure this EULA is unjust because injustice is the
+ only motive for imposing an EULA.</p>
+ </li>
+
<li id="M201401280">
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
@@ -149,6 +160,26 @@
games lure children to spend their parents' money</a>.</p>
</li>
+ <li id="M201105070">
+ <p><a href="https://www.defectivebydesign.org/sony">The Playstation
+ 3 is a tyrant</a>.</p>
+ </li>
+
+ <li id="M201003300">
+ <p>Sony <a
+
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3">sabotaged
+ the Playstation 3</a> with a firmware downgrade that removed the
+ feature that allowed users to run GNU/Linux on it.</p>
+
+ <p>Sony subsequently sent police after Geohot, after he cracked the
+ code that blocked users from changing the firmware, and we responded by
+ calling for a <a href="http://boycottsony.org">boycott of Sony</a>.</p>
+
+ <p>In a court settlement Sony is <a
+
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/">
+ now paying for the sabotage</a>.</p>
+ </li>
+
<li id="M200510200">
<p>Blizzard Warden is a hidden
“cheating-prevention” program that <a
@@ -217,7 +248,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/27 11:28:44 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/malware-games.ru.po 6 Oct 2018 06:49:59 -0000 1.29
+++ po/malware-games.ru.po 6 Oct 2018 06:59:40 -0000 1.30
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-05 20:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Games - GNU Project - Free Software Foundation"
Index: po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/proprietary-back-doors.ru-en.html 5 Oct 2018 17:29:56 -0000
1.48
+++ po/proprietary-back-doors.ru-en.html 6 Oct 2018 06:59:40 -0000
1.49
@@ -326,7 +326,7 @@
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
reported in 2007</a> for XP and Vista, and it seems
that Microsoft used the same method to push the <a
- href="/proprietary/proprietary-sabotage.html#windows10-forcing">
+ href="/proprietary/malware-microsoft.html#windows10-forcing">
Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
<p>In Windows 10, the universal back door
@@ -515,7 +515,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 17:29:56 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- po/proprietary-back-doors.ru.po 6 Oct 2018 06:49:59 -0000 1.146
+++ po/proprietary-back-doors.ru.po 6 Oct 2018 06:59:40 -0000 1.147
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-05 20:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -586,19 +585,6 @@
"Ñгодно изменениÑ</a>."
#. type: Content of: <ul><li><p>
-# | This was <a
-# | href=\"http://slated.org/windows_by_stealth_the_updates_you_dont_want\">
-# | reported in 2007</a> for XP and Vista, and it seems that Microsoft used
-# | the same method to push the <a
-# | [-href=\"/proprietary/proprietary-sabotage.html#windows10-forcing\">-]
-# | {+href=\"/proprietary/malware-microsoft.html#windows10-forcing\">+}
-# | Windows 10 downgrade</a> to computers running Windows 7 and 8.
-#| msgid ""
-#| "This was <a href=\"http://slated.org/"
-#| "windows_by_stealth_the_updates_you_dont_want\"> reported in 2007</a> for "
-#| "XP and Vista, and it seems that Microsoft used the same method to push "
-#| "the <a href=\"/proprietary/proprietary-sabotage.html#windows10-forcing\"> "
-#| "Windows 10 downgrade</a> to computers running Windows 7 and 8."
msgid ""
"This was <a href=\"http://slated.org/"
"windows_by_stealth_the_updates_you_dont_want\"> reported in 2007</a> for XP "
@@ -609,8 +595,8 @@
"Ðб ÑÑом <a href=\"http://slated.org/"
"windows_by_stealth_the_updates_you_dont_want\"> ÑообÑили в 2007
годÑ</a> в "
"оÑноÑении XP и Vista, и кажеÑÑÑ, Microsoft
пÑименила ÑÐ¾Ñ Ð¶Ðµ меÑод Ð´Ð»Ñ "
-"пÑоÑÐ°Ð»ÐºÐ¸Ð²Ð°Ð½Ð¸Ñ <a
href=\"/proprietary/malware-microsoft.html#windows10-"
-"forcing\"> ÑÑ
ÑдÑÐµÐ½Ð¸Ñ Ð´Ð¾ Windows 10</a> на компÑÑÑеÑаÑ
под Windows 7 и 8."
+"пÑоÑÐ°Ð»ÐºÐ¸Ð²Ð°Ð½Ð¸Ñ <a
href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+"\"> ÑÑ
ÑдÑÐµÐ½Ð¸Ñ Ð´Ð¾ Windows 10</a> на компÑÑÑеÑаÑ
под
Windows 7 и 8."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary-drm.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/proprietary-drm.ru-en.html 27 Sep 2018 15:57:42 -0000 1.22
+++ po/proprietary-drm.ru-en.html 6 Oct 2018 06:59:40 -0000 1.23
@@ -34,6 +34,7 @@
</p>
<ul class="blurbs">
+<!-- INSERT drm -->
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
@@ -180,7 +181,7 @@
<li id="M201311130">
<p><a
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy">
- DRM in Cars Will Drive Consumers Crazy</a>.</p>
+ DRM in cars will drive consumers crazy</a>.</p>
</li>
<li id="M201310070">
@@ -336,7 +337,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/27 15:57:42 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/proprietary-drm.ru.po 6 Oct 2018 06:49:59 -0000 1.64
+++ po/proprietary-drm.ru.po 6 Oct 2018 06:59:40 -0000 1.65
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-05 20:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -338,13 +337,6 @@
"Ñпионила за полÑзоваÑелем в ÑелÑÑ
ÑиÑÑового ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми</a>."
#. type: Content of: <ul><li><p>
-# | <a
-# |
href=\"https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy\">
-# | DRM in [-Cars Will Drive Consumers Crazy</a>.-] {+cars will drive
-# | consumers crazy</a>.+}
-#| msgid ""
-#| "<a href=\"https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-"
-#| "consumers-crazy\"> DRM in Cars Will Drive Consumers Crazy</a>."
msgid ""
"<a href=\"https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-"
"consumers-crazy\"> DRM in cars will drive consumers crazy</a>."
Index: po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- po/proprietary-insecurity.de.po 5 Oct 2018 12:59:26 -0000 1.119
+++ po/proprietary-insecurity.de.po 6 Oct 2018 06:59:40 -0000 1.120
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -115,15 +115,6 @@
#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- po/proprietary-insecurity.fr-en.html 5 Oct 2018 17:00:15 -0000
1.61
+++ po/proprietary-insecurity.fr-en.html 6 Oct 2018 06:59:40 -0000
1.62
@@ -41,12 +41,6 @@
proprietary software that has grave consequences or is otherwise
noteworthy.</p>
-<p><a href="/proprietary/proprietary-tethers.html">Tethered appliances
-and applications</a> are intrinsically insecure because there is always
-a chance that the server will go offline accidentally, making them
-useless. We don't list them here unless they have documented
-vulnerabilities in addition to the fact that they are tethered.</p>
-
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
@@ -633,7 +627,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 17:00:15 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- po/proprietary-insecurity.fr.po 5 Oct 2018 16:45:26 -0000 1.146
+++ po/proprietary-insecurity.fr.po 6 Oct 2018 06:59:40 -0000 1.147
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
"PO-Revision-Date: 2018-10-05 18:44+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -97,20 +97,6 @@
#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-"Par leur conception-même, les <a
href=\"/proprietary/proprietary-tethers.html"
-"\">appareils et applications qui dépendent d'un serveur</a> ne sont pas "
-"sûres puisqu'ils risquent en permanence d'être mis hors service par une "
-"panne du serveur. Nous ne citons sur cette page que ceux qui ont des "
-"vulnérabilités reconnues en plus de leur dépendance à un serveur."
-
-#. type: Content of: <p>
-msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
@@ -1145,3 +1131,16 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+#~ "applications</a> are intrinsically insecure because there is always a "
+#~ "chance that the server will go offline accidentally, making them useless. "
+#~ "We don't list them here unless they have documented vulnerabilities in "
+#~ "addition to the fact that they are tethered."
+#~ msgstr ""
+#~ "Par leur conception-même, les <a href=\"/proprietary/proprietary-tethers."
+#~ "html\">appareils et applications qui dépendent d'un serveur</a> ne sont "
+#~ "pas sûres puisqu'ils risquent en permanence d'être mis hors service par "
+#~ "une panne du serveur. Nous ne citons sur cette page que ceux qui ont des "
+#~ "vulnérabilités reconnues en plus de leur dépendance à un serveur."
Index: po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-insecurity.it-diff.html 5 Oct 2018 12:59:26 -0000
1.16
+++ po/proprietary-insecurity.it-diff.html 6 Oct 2018 06:59:40 -0000
1.17
@@ -52,41 +52,37 @@
<em>helpless to fix any security problems that arise</em>.
Keeping the
users helpless is what's culpable about proprietary software.</p>
-<span class="removed"><del><strong><ul>
-<li id="break-security-smarttv"></strong></del></span>
+<span class="removed"><del><strong><ul></strong></del></span>
<span class="inserted"><ins><em></div>
<p>This page lists clearly established cases of insecurity in
proprietary software that has grave consequences or is otherwise
-noteworthy.</p></em></ins></span>
-
-<p><a
- <span
class="removed"><del><strong>href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethered
appliances
-and applications</a> are intrinsically insecure because there is
always</em></ins></span>
-a <span class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>chance that the server will go offline accidentally,
making them
-useless. We don't list them here unless they have documented
-vulnerabilities in addition</em></ins></span> to <span
class="removed"><del><strong>break security on</strong></del></span> <span
class="inserted"><ins><em>the fact that they are tethered.</p>
+noteworthy.</p>
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>“smart” TV</a> and use its
camera</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two</em></ins></span>
-to <span class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em>present</em></ins></span> the <span
class="inserted"><ins><em>specifics.</p>
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.</p>
<ul class="blurbs">
-<!-- INSERT insecurity -->
- <li id="M201809240">
+<!-- INSERT insecurity --></em></ins></span>
+ <li <span class="removed"><del><strong>id="break-security-smarttv">
+ <p><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers</strong></del></span> <span
class="inserted"><ins><em>id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that</em></ins></span>
people <span class="removed"><del><strong>who are watching
TV.</p></strong></del></span> <span class="inserted"><ins><em>cannot hear
- them, but Alexa and Siri can.</p></em></ins></span>
+ hide voice commands in other audio</a>, so that people cannot hear
+ them, but Alexa and Siri can.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Many models</strong></del></span>
- <span class="inserted"><ins><em><li id="M201808120">
- <p>Crackers found a way to break the security</em></ins></span> of
<span class="removed"><del><strong>Internet-connected
cameras</strong></del></span> <span class="inserted"><ins><em>an Amazon device,
+ <li id="M201808120">
+ <p>Crackers</em></ins></span> found a way to break <span
class="removed"><del><strong>security on a “smart” TV</a> and
use its camera
+ to watch</strong></del></span> the <span
class="removed"><del><strong>people who are watching TV.</p>
+</li>
+<li>
+ <p>Many models</strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras</strong></del></span>
<span class="inserted"><ins><em>an Amazon device,
and</em></ins></span> <a
<span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
@@ -233,12 +229,16 @@
can be hijacked through their Wi-Fi chips</a>
because</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full</em></ins></span> of <span class="removed"><del><strong>a bug in
Broadcom's non-free firmware.</p></strong></del></span> <span
class="inserted"><ins><em>gross
- security faults</a>.</p>
+ security faults</a>.</p></em></ins></span>
</li>
- <li id="M201705160">
+<span class="removed"><del><strong><li>
+<p>When Miele's Internet</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705160">
<p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models of HP laptops logged the user's keystroke
+ pre-installed on 28 models</em></ins></span> of <span
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
+<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> <span class="inserted"><ins><em>HP laptops logged the
user's keystroke
to a file in the filesystem. Any process with access to the filesystem
or the MapViewOfFile API could gain access to the log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
@@ -258,16 +258,14 @@
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
- Broadcom's non-free firmware.</p></em></ins></span>
+ Broadcom's non-free firmware.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703270"></em></ins></span>
+ <li id="M201703270">
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected</em></ins></span> to the Internet, its security is
crap</a>.</p>
+ Stings hospital disinfectant dishwasher is <a
+
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to</em></ins></span> the Internet, its security is
crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
filesystem, infect it with malware, and force the dishwasher to launch
@@ -511,7 +509,10 @@
<span class="removed"><del><strong><li>
<p>
Malware found
-on <a
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
+on</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510210">
+ <p>FitBit fitness trackers have a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
cameras available through Amazon</a>.
</p>
@@ -539,13 +540,10 @@
<li>
<p>
-FitBit fitness trackers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510210">
- <p>FitBit fitness trackers have a</em></ins></span> <a
-
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-<span class="removed"><del><strong>have a</strong></del></span>
- Bluetooth vulnerability</a> that allows attackers to send malware
+FitBit fitness trackers <a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+have a Bluetooth vulnerability</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+ Bluetooth vulnerability</a></em></ins></span> that allows attackers
to send malware
to the devices, which can subsequently spread to computers and other
FitBit trackers that interact with <span class="removed"><del><strong>them.
</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
@@ -918,7 +916,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 12:59:26 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- po/proprietary-insecurity.it.po 5 Oct 2018 12:59:26 -0000 1.135
+++ po/proprietary-insecurity.it.po 6 Oct 2018 06:59:40 -0000 1.136
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -113,15 +113,6 @@
#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
Index: po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/proprietary-insecurity.ja-diff.html 5 Oct 2018 12:59:27 -0000
1.35
+++ po/proprietary-insecurity.ja-diff.html 6 Oct 2018 06:59:40 -0000
1.36
@@ -54,7 +54,7 @@
<ul>
<li>
-<p>4G LTE phone networks</strong></del></span> <span
class="inserted"><ins><em>any security problems that arise</em>. Keeping
the
+<p>4G LTE phone networks are drastically insecure. They
can</strong></del></span> <span class="inserted"><ins><em>any security problems
that arise</em>. Keeping the
users helpless is what's culpable about proprietary software.</p>
</div>
@@ -62,12 +62,6 @@
proprietary software that has grave consequences or is otherwise
noteworthy.</p>
-<p><a href="/proprietary/proprietary-tethers.html">Tethered
appliances
-and applications</a></em></ins></span> are <span
class="removed"><del><strong>drastically insecure. They
can</strong></del></span> <span class="inserted"><ins><em>intrinsically
insecure because there is always
-a chance that the server will go offline accidentally, making them
-useless. We don't list them here unless they have documented
-vulnerabilities in addition to the fact that they are tethered.</p>
-
<p>If you know of an example that ought to</em></ins></span> be
<span class="removed"><del><strong><a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
taken
@@ -111,30 +105,30 @@
<li>
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
-WhatsApp messages are not entirely deleted</a>. They
can</strong></del></span> <span class="inserted"><ins><em>listening
device</a> for them.</p>
+WhatsApp messages</strong></del></span> <span
class="inserted"><ins><em>listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job
would</em></ins></span> be <span
class="removed"><del><strong>recovered</strong></del></span> <span
class="inserted"><ins><em>much
+ <p>It was very difficult for them to do this. The job would be much
easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product</em></ins></span> in
<span class="removed"><del><strong>various ways.
-</p>
-</li>
-
-<li></strong></del></span> <span class="inserted"><ins><em>that country,
+ told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers are probably hackers too, but please <a
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not entirely deleted</a>.
They</strong></del></span> <span class="inserted"><ins><em>probably hackers
too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
“hacking” to mean “breaking
security”</a>.</p>
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all the other voice-control systems can be <a
+ <p>Siri, Alexa, and all the other voice-control
systems</em></ins></span> can be <span
class="removed"><del><strong>recovered</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
- hijacked by programs that play commands in ultrasound that humans
- can't hear</a>.</p>
+ hijacked by programs that play commands</em></ins></span> in <span
class="removed"><del><strong>various ways.
+</p></strong></del></span> <span class="inserted"><ins><em>ultrasound
that humans
+ can't hear</a>.</p></em></ins></span>
</li>
- <li id="M201807020">
+<span class="removed"><del><strong><li>
+<p>A vulnerability in</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
photos to people in the owner's contact list</a>.</p>
@@ -350,8 +344,8 @@
in various ways.</p>
</li>
- <li id="M201607220"></em></ins></span>
- <p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
+ <li id="M201607220">
+ <p>A vulnerability in</em></ins></span> Apple's Image I/O API
allowed an attacker to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
<span class="removed"><del><strong>malacious</strong></del></span>
<span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
@@ -872,7 +866,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 12:59:27 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- po/proprietary-insecurity.ja.po 5 Oct 2018 12:59:27 -0000 1.106
+++ po/proprietary-insecurity.ja.po 6 Oct 2018 06:59:40 -0000 1.107
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -94,15 +94,6 @@
#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
Index: po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- po/proprietary-insecurity.pot 5 Oct 2018 12:59:27 -0000 1.76
+++ po/proprietary-insecurity.pot 6 Oct 2018 06:59:40 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -68,15 +68,6 @@
#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a "
"href=\"mailto:address@hidden"><address@hidden></a> to inform "
Index: po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/proprietary-insecurity.ru-en.html 5 Oct 2018 17:29:56 -0000
1.60
+++ po/proprietary-insecurity.ru-en.html 6 Oct 2018 06:59:40 -0000
1.61
@@ -41,12 +41,6 @@
proprietary software that has grave consequences or is otherwise
noteworthy.</p>
-<p><a href="/proprietary/proprietary-tethers.html">Tethered appliances
-and applications</a> are intrinsically insecure because there is always
-a chance that the server will go offline accidentally, making them
-useless. We don't list them here unless they have documented
-vulnerabilities in addition to the fact that they are tethered.</p>
-
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
@@ -633,7 +627,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 17:29:56 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- po/proprietary-insecurity.ru.po 5 Oct 2018 17:29:56 -0000 1.196
+++ po/proprietary-insecurity.ru.po 6 Oct 2018 06:59:40 -0000 1.197
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
"PO-Revision-Date: 2018-10-01 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -95,20 +95,6 @@
#. type: Content of: <p>
msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-"<a href=\"/proprietary/proprietary-tethers.html\">ÐÑивÑзаннÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¸ "
-"ÑÑÑÑойÑÑва</a> пÑинÑипиалÑно небезопаÑнÑ,
поÑÐ¾Ð¼Ñ ÑÑо ÑеÑÐ²ÐµÑ Ð²Ñегда Ð¼Ð¾Ð¶ÐµÑ "
-"ÑлÑÑайно оÑклÑÑиÑÑÑÑ Ð¾Ñ ÑеÑи, и они
пеÑеÑÑанÑÑ ÑабоÑаÑÑ. ÐÑ Ð½Ðµ пеÑеÑиÑлÑем "
-"иÑ
здеÑÑ, еÑли в ниÑ
Ð½ÐµÑ Ð´Ð¾ÐºÑменÑиÑованнÑÑ
ÑÑзвимоÑÑей в дополнение к ÑÐ¾Ð¼Ñ "
-"ÑакÑÑ, ÑÑо они пÑивÑзанÑ."
-
-#. type: Content of: <p>
-msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
@@ -1129,6 +1115,19 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+#~ "applications</a> are intrinsically insecure because there is always a "
+#~ "chance that the server will go offline accidentally, making them useless. "
+#~ "We don't list them here unless they have documented vulnerabilities in "
+#~ "addition to the fact that they are tethered."
+#~ msgstr ""
+#~ "<a href=\"/proprietary/proprietary-tethers.html\">ÐÑивÑзаннÑе
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ "
+#~ "и ÑÑÑÑойÑÑва</a> пÑинÑипиалÑно
небезопаÑнÑ, поÑÐ¾Ð¼Ñ ÑÑо ÑеÑÐ²ÐµÑ Ð²Ñегда "
+#~ "Ð¼Ð¾Ð¶ÐµÑ ÑлÑÑайно оÑклÑÑиÑÑÑÑ Ð¾Ñ ÑеÑи, и
они пеÑеÑÑанÑÑ ÑабоÑаÑÑ. ÐÑ Ð½Ðµ "
+#~ "пеÑеÑиÑлÑем иÑ
здеÑÑ, еÑли в ниÑ
неÑ
докÑменÑиÑованнÑÑ
ÑÑзвимоÑÑей в "
+#~ "дополнение к ÑÐ¾Ð¼Ñ ÑакÑÑ, ÑÑо они
пÑивÑзанÑ."
+
+#~ msgid ""
#~ "Honeywell's “smart” thermostats communicate only through the "
#~ "company's server. They have all the nasty characteristics of such "
#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-"
Index: po/proprietary-tyrants.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-tyrants.ru-en.html 29 Sep 2018 07:28:07 -0000 1.16
+++ po/proprietary-tyrants.ru-en.html 6 Oct 2018 06:59:40 -0000 1.17
@@ -33,6 +33,7 @@
to present the specifics.</p>
<ul class="blurbs">
+<!-- INSERT tyrants -->
<li id="M201607150">
<p>Microsoft accidentally left a way for users
to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -55,9 +56,9 @@
</li>
<li id="M201304080">
- <p><a
+ <p>Motorola, then owned by Google, made <a
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html">
- Some Android phones are tyrants</a> (though someone found a way to
+ Android phones that are tyrants</a> (though someone found a way to
crack the restriction). Fortunately, most Android devices are not
tyrants.</p>
</li>
@@ -155,7 +156,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/09/29 07:28:07 $
+$Date: 2018/10/06 06:59:40 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-tyrants.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/proprietary-tyrants.ru.po 6 Oct 2018 06:49:59 -0000 1.48
+++ po/proprietary-tyrants.ru.po 6 Oct 2018 06:59:40 -0000 1.49
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-05 20:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-games.ru.html proprieta...,
GNUN <=