www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-games.ru.html proprieta...


From: GNUN
Subject: www/proprietary malware-games.ru.html proprieta...
Date: Sat, 6 Oct 2018 02:59:41 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/06 02:59:40

Modified files:
        proprietary    : malware-games.ru.html 
                         proprietary-back-doors.ru.html 
                         proprietary-drm.ru.html 
                         proprietary-insecurity.fr.html 
                         proprietary-insecurity.ru.html 
                         proprietary-tyrants.ru.html 
        proprietary/po : malware-games.ru-en.html malware-games.ru.po 
                         proprietary-back-doors.ru-en.html 
                         proprietary-back-doors.ru.po 
                         proprietary-drm.ru-en.html 
                         proprietary-drm.ru.po 
                         proprietary-insecurity.de.po 
                         proprietary-insecurity.fr-en.html 
                         proprietary-insecurity.fr.po 
                         proprietary-insecurity.it-diff.html 
                         proprietary-insecurity.it.po 
                         proprietary-insecurity.ja-diff.html 
                         proprietary-insecurity.ja.po 
                         proprietary-insecurity.pot 
                         proprietary-insecurity.ru-en.html 
                         proprietary-insecurity.ru.po 
                         proprietary-tyrants.ru-en.html 
                         proprietary-tyrants.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-games.ru.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.ru.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tyrants.ru.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru-en.html?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru-en.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tyrants.ru.po?cvsroot=www&r1=1.48&r2=1.49

Patches:
Index: malware-games.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-games.ru.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- malware-games.ru.html       27 Sep 2018 11:28:44 -0000      1.11
+++ malware-games.ru.html       6 Oct 2018 06:59:40 -0000       1.12
@@ -46,7 +46,9 @@
 <p>Вот примеры вредоносных программ в играх
.</p>
 
 <ul class="blurbs">
-  <li id="M201806250">
+
+  <!-- INSERT games -->
+<li id="M201806250">
     <p>Игра Metal Gear Rising для MacOS привязана к 
серверу. Компания <a
 
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
 выключила сервер, и все копии перестали 
работать</a>.</p>
@@ -60,7 +62,7 @@
 сторонам</a>.</p>
   </li>
 
-  <li id="M201804141">
+  <li id="M201804144">
     <p>ArenaNet тайком устанавливала 
программу-шпион вместе с обновлением 
массовой
 многопользовательской игрой Guild War&nbsp;2. 
Программа-шпион позволяла
 ArpaNet <a
@@ -139,6 +141,17 @@
 в платных играх.</p>
   </li>
 
+  <li id="M201410130">
+    <p><a
+href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms";>Nintendo
+саботировал по сети все Wiis, прекращая их 
работу до тех пор, пока
+пользователь не согласится с новыми 
условиями лицензии</a>.</p>
+
+    <p>Мы можем быть вполне уверены, что 
условия этой лицензии несправедливы,
+потому что ничто, кроме несправедливости, 
не может быть побудительной
+причиной навязывания лицензии.</p>
+  </li>
+
   <li id="M201401280">
     <p>Angry Birds <a
 
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
@@ -158,6 +171,28 @@
 игры соблазняют детей тратить 
родительские деньги</a>.</p>
   </li>
 
+  <li id="M201105070">
+    <p><a href="https://www.defectivebydesign.org/sony";>Playstation 
3&nbsp;&mdash;
+тиран</a>.</p>
+  </li>
+
+  <li id="M201003300">
+    <p>Компания Sony <a
+href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>
+саботировала Playstation 3</a> ухудшенной версией 
программ для устройства, в
+которой была удалена особенность, 
позволявшая пользователям запускать на нем
+GNU/Linux.</p>
+
+    <p>Впоследствии Sony послала полицию за 
Геохотом, когда тот взломал программу,
+которая не позволяла пользователям 
изменять программы в устройстве, а мы
+ответили на это призывом <a 
href="http://boycottsony.org";> бойкотировать
+Sony</a>.</p>
+
+    <p>По решению суда Sony <a
+href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
+производит выплаты за саботаж</a>.</p>
+  </li>
+
   <li id="M200510200">
     <p>Blizzard Warden&nbsp;&mdash; скрытая программа 
&ldquo;предотвращения
 обмана&rdquo;, которая <a
@@ -245,7 +280,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/09/27 11:28:44 $
+$Date: 2018/10/06 06:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary-back-doors.ru.html      5 Oct 2018 17:29:54 -0000       1.47
+++ proprietary-back-doors.ru.html      6 Oct 2018 06:59:40 -0000       1.48
@@ -329,8 +329,8 @@
 href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
 сообщили в 2007 году</a> в отношении XP и Vista, и 
кажется, Microsoft
 применила тот же метод для проталкивания <a
-href="/proprietary/proprietary-sabotage.html#windows10-forcing"> ух
удшения
-до Windows 10</a> на компьютерах под Windows 7 и 8.</p>
+href="/proprietary/malware-microsoft.html#windows10-forcing"> ух
удшения до
+Windows 10</a> на компьютерах под Windows 7 и 8.</p>
 
     <p>В Windows 10 универсальный черный ход 
больше не скрывают; все
 &ldquo;обновления&rdquo; будут <a
@@ -542,7 +542,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/05 17:29:54 $
+$Date: 2018/10/06 06:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-drm.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.ru.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary-drm.ru.html     27 Sep 2018 15:57:42 -0000      1.21
+++ proprietary-drm.ru.html     6 Oct 2018 06:59:40 -0000       1.22
@@ -43,7 +43,9 @@
 </p>
 
 <ul class="blurbs">
-  <li id="M201806250">
+
+  <!-- INSERT drm -->
+<li id="M201806250">
     <p>Игра Metal Gear Rising для MacOS привязана к 
серверу. Компания <a
 
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm";>
 выключила сервер, и все копии перестали 
работать</a>.</p>
@@ -375,7 +377,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/09/27 15:57:42 $
+$Date: 2018/10/06 06:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-insecurity.fr.html      5 Oct 2018 17:00:13 -0000       1.70
+++ proprietary-insecurity.fr.html      6 Oct 2018 06:59:40 -0000       1.71
@@ -48,13 +48,6 @@
 failles clairement établies qui ont des conséquences graves ou méritent
 d'être mentionnées pour d'autres raisons. </p>
 
-<p>Par leur conception-même, les <a
-href="/proprietary/proprietary-tethers.html">appareils et applications qui
-dépendent d'un serveur</a> ne sont pas sûres puisqu'ils risquent en
-permanence d'être mis hors service par une panne du serveur. Nous ne citons
-sur cette page que ceux qui ont des vulnérabilités reconnues en plus de leur
-dépendance à un serveur.</p>
-
 <p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
 mais n'y figure pas, n'hésitez pas à écrire à <a
 href="mailto:address@hidden";>&lt;address@hidden&gt;</a> pour nous en
@@ -675,7 +668,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/05 17:00:13 $
+$Date: 2018/10/06 06:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-insecurity.ru.html      5 Oct 2018 17:29:55 -0000       1.59
+++ proprietary-insecurity.ru.html      6 Oct 2018 06:59:40 -0000       1.60
@@ -49,12 +49,6 @@
 несвободных программ, которая имеет 
тяжкие последствия или которую следует
 отметить по другим причинам.</p>
 
-<p><a href="/proprietary/proprietary-tethers.html">Привязанные 
приложения и
-устройства</a> принципиально небезопасны, 
потому что сервер всегда может
-случайно отключиться от сети, и они 
перестанут работать. Мы не перечисляем
-их здесь, если в них нет документированных 
уязвимостей в дополнение к тому
-факту, что они привязаны.</p>
-
 <p>Если вам известен пример, который должен 
быть на этой странице, но его здесь
 нет, сообщите нам по адресу <a
 href="mailto:address@hidden";>&lt;address@hidden&gt;</a>. Упомяните
@@ -658,7 +652,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/05 17:29:55 $
+$Date: 2018/10/06 06:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-tyrants.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tyrants.ru.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-tyrants.ru.html 29 Sep 2018 07:28:07 -0000      1.16
+++ proprietary-tyrants.ru.html 6 Oct 2018 06:59:40 -0000       1.17
@@ -39,7 +39,9 @@
 один-два заслуживающих доверия URL, чтобы 
проиллюстрировать подробности.</p>
 
 <ul class="blurbs">
-  <li id="M201607150">
+
+  <!-- INSERT tyrants -->
+<li id="M201607150">
     <p>Microsoft случайно оставила пользователям 
способ установить GNU/Linux на
 планшетах RT с Windows, но теперь они <a
 
href="http://www.securitynewspaper.com/2016/07/15/microsoft-silently-kills-dev-backdoor-boots-linux-locked-windows-rt-slabs/";>&ldquo;исправили&rdquo;
@@ -61,10 +63,10 @@
   </li>
 
   <li id="M201304080">
-    <p><a
+    <p>Motorola, когда она принадлежала Google, 
выпустила <a
 
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
-Некоторые телефоны с Android&nbsp;&mdash; тираны</a> 
(хотя кто-то нашел
-способ взломать ограничение). К счастью, 
большинство устройств с
+телефоны с Android, которые 
являютсятиранами</a> (хотя кто-то нашел 
способ
+взломать ограничение). К счастью, 
большинство устройств с
 Android&nbsp;&mdash; не тираны.</p>
   </li>
 
@@ -177,7 +179,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/09/29 07:28:07 $
+$Date: 2018/10/06 06:59:40 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-games.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru-en.html,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- po/malware-games.ru-en.html 27 Sep 2018 11:28:44 -0000      1.11
+++ po/malware-games.ru-en.html 6 Oct 2018 06:59:40 -0000       1.12
@@ -41,6 +41,7 @@
 <p>Here are examples of malware in games.</p>
 
 <ul class="blurbs">
+<!-- INSERT games -->
   <li id="M201806250">
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
@@ -55,7 +56,7 @@
     tracks data on users' computers and sends it to third parties</a>.</p>
   </li>
 
-  <li id="M201804141">
+  <li id="M201804144">
     <p>ArenaNet surreptitiously installed a spyware
     program along with an update to the massive
     multiplayer game Guild War 2.  The spyware allowed ArenaNet <a
@@ -130,6 +131,16 @@
     can use the same tactics.</p>
   </li>
 
+  <li id="M201410130">
+    <p><a
+    
href="https://www.eff.org/deeplinks/2014/10/nintendo-updates-take-wii-u-hostage-until-you-agree-new-legal-terms";>Nintendo
+    remotely sabotaged all Wiis, making them refuse to work unless the
+    user agrees to a new EULA</a>.</p>
+
+    <p>We can be quite sure this EULA is unjust because injustice is the
+    only motive for imposing an EULA.</p>
+  </li>
+
   <li id="M201401280">
     <p>Angry Birds <a
     
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html";>
@@ -149,6 +160,26 @@
     games lure children to spend their parents' money</a>.</p>
   </li>
 
+  <li id="M201105070">
+    <p><a href="https://www.defectivebydesign.org/sony";>The Playstation
+    3 is a tyrant</a>.</p>
+  </li>
+
+  <li id="M201003300">
+    <p>Sony <a
+    
href="https://www.eff.org/deeplinks/2010/03/sony-steals-feature-from-your-playstation-3";>sabotaged
+    the Playstation 3</a> with a firmware downgrade that removed the
+    feature that allowed users to run GNU/Linux on it.</p>
+
+    <p>Sony subsequently sent police after Geohot, after he cracked the
+    code that blocked users from changing the firmware, and we responded by
+    calling for a <a href="http://boycottsony.org";>boycott of Sony</a>.</p>
+
+    <p>In a court settlement Sony is <a
+    
href="http://arstechnica.com/tech-policy/2016/06/if-you-used-to-run-linux-on-your-ps3-you-could-get-55-from-sony/";>
+    now paying for the sabotage</a>.</p>
+  </li>
+
   <li id="M200510200">
     <p>Blizzard Warden is a hidden
     &ldquo;cheating-prevention&rdquo; program that <a
@@ -217,7 +248,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/27 11:28:44 $
+$Date: 2018/10/06 06:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/malware-games.ru.po      6 Oct 2018 06:49:59 -0000       1.29
+++ po/malware-games.ru.po      6 Oct 2018 06:59:40 -0000       1.30
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-05 20:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Games - GNU Project - Free Software Foundation"

Index: po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/proprietary-back-doors.ru-en.html        5 Oct 2018 17:29:56 -0000       
1.48
+++ po/proprietary-back-doors.ru-en.html        6 Oct 2018 06:59:40 -0000       
1.49
@@ -326,7 +326,7 @@
     href="http://slated.org/windows_by_stealth_the_updates_you_dont_want";>
     reported in 2007</a> for XP and Vista, and it seems
     that Microsoft used the same method to push the <a
-    href="/proprietary/proprietary-sabotage.html#windows10-forcing">
+    href="/proprietary/malware-microsoft.html#windows10-forcing">
     Windows 10 downgrade</a> to computers running Windows 7 and 8.</p>
 
     <p>In Windows 10, the universal back door
@@ -515,7 +515,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 17:29:56 $
+$Date: 2018/10/06 06:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- po/proprietary-back-doors.ru.po     6 Oct 2018 06:49:59 -0000       1.146
+++ po/proprietary-back-doors.ru.po     6 Oct 2018 06:59:40 -0000       1.147
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-05 20:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -586,19 +585,6 @@
 "угодно изменения</a>."
 
 #. type: Content of: <ul><li><p>
-# | This was <a
-# | href=\"http://slated.org/windows_by_stealth_the_updates_you_dont_want\";>
-# | reported in 2007</a> for XP and Vista, and it seems that Microsoft used
-# | the same method to push the <a
-# | [-href=\"/proprietary/proprietary-sabotage.html#windows10-forcing\">-]
-# | {+href=\"/proprietary/malware-microsoft.html#windows10-forcing\">+}
-# | Windows 10 downgrade</a> to computers running Windows 7 and 8.
-#| msgid ""
-#| "This was <a href=\"http://slated.org/";
-#| "windows_by_stealth_the_updates_you_dont_want\"> reported in 2007</a> for "
-#| "XP and Vista, and it seems that Microsoft used the same method to push "
-#| "the <a href=\"/proprietary/proprietary-sabotage.html#windows10-forcing\"> "
-#| "Windows 10 downgrade</a> to computers running Windows 7 and 8."
 msgid ""
 "This was <a href=\"http://slated.org/";
 "windows_by_stealth_the_updates_you_dont_want\"> reported in 2007</a> for XP "
@@ -609,8 +595,8 @@
 "Об этом <a href=\"http://slated.org/";
 "windows_by_stealth_the_updates_you_dont_want\"> сообщили в 2007 
году</a> в "
 "отношении XP и Vista, и кажется, Microsoft 
применила тот же метод для "
-"проталкивания <a 
href=\"/proprietary/malware-microsoft.html#windows10-"
-"forcing\"> ухудшения до Windows 10</a> на компьютерах 
под Windows 7 и 8."
+"проталкивания <a 
href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+"\"> ухудшения до Windows 10</a> на компьютерах под 
Windows 7 и 8."
 
 #. type: Content of: <ul><li><p>
 msgid ""

Index: po/proprietary-drm.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru-en.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- po/proprietary-drm.ru-en.html       27 Sep 2018 15:57:42 -0000      1.22
+++ po/proprietary-drm.ru-en.html       6 Oct 2018 06:59:40 -0000       1.23
@@ -34,6 +34,7 @@
 </p>
 
 <ul class="blurbs">
+<!-- INSERT drm -->
   <li id="M201806250">
     <p>The game Metal Gear Rising for
     MacOS was tethered to a server.  The company <a
@@ -180,7 +181,7 @@
   <li id="M201311130">
     <p><a
     
href="https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy";>
-    DRM in Cars Will Drive Consumers Crazy</a>.</p>
+    DRM in cars will drive consumers crazy</a>.</p>
   </li>
 
   <li id="M201310070">
@@ -336,7 +337,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/27 15:57:42 $
+$Date: 2018/10/06 06:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- po/proprietary-drm.ru.po    6 Oct 2018 06:49:59 -0000       1.64
+++ po/proprietary-drm.ru.po    6 Oct 2018 06:59:40 -0000       1.65
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-05 20:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -338,13 +337,6 @@
 "шпионила за пользователем в целях 
цифрового управления ограничениями</a>."
 
 #. type: Content of: <ul><li><p>
-# | <a
-# | 
href=\"https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-consumers-crazy\";>
-# | DRM in [-Cars Will Drive Consumers Crazy</a>.-] {+cars will drive
-# | consumers crazy</a>.+}
-#| msgid ""
-#| "<a href=\"https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-";
-#| "consumers-crazy\"> DRM in Cars Will Drive Consumers Crazy</a>."
 msgid ""
 "<a href=\"https://www.eff.org/deeplinks/2013/11/drm-cars-will-drive-";
 "consumers-crazy\"> DRM in cars will drive consumers crazy</a>."

Index: po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- po/proprietary-insecurity.de.po     5 Oct 2018 12:59:26 -0000       1.119
+++ po/proprietary-insecurity.de.po     6 Oct 2018 06:59:40 -0000       1.120
@@ -7,7 +7,7 @@
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
 "Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
 "PO-Revision-Date: 2018-08-29 02:41+0200\n"
 "Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
 "Language-Team: German <address@hidden>\n"
@@ -115,15 +115,6 @@
 
 #. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "

Index: po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- po/proprietary-insecurity.fr-en.html        5 Oct 2018 17:00:15 -0000       
1.61
+++ po/proprietary-insecurity.fr-en.html        6 Oct 2018 06:59:40 -0000       
1.62
@@ -41,12 +41,6 @@
 proprietary software that has grave consequences or is otherwise
 noteworthy.</p>
 
-<p><a href="/proprietary/proprietary-tethers.html">Tethered appliances
-and applications</a> are intrinsically insecure because there is always
-a chance that the server will go offline accidentally, making them
-useless. We don't list them here unless they have documented
-vulnerabilities in addition to the fact that they are tethered.</p>
-
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
@@ -633,7 +627,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 17:00:15 $
+$Date: 2018/10/06 06:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- po/proprietary-insecurity.fr.po     5 Oct 2018 16:45:26 -0000       1.146
+++ po/proprietary-insecurity.fr.po     6 Oct 2018 06:59:40 -0000       1.147
@@ -8,7 +8,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
 "PO-Revision-Date: 2018-10-05 18:44+0200\n"
 "Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
 "Language-Team: French <address@hidden>\n"
@@ -97,20 +97,6 @@
 
 #. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-"Par leur conception-même, les <a 
href=\"/proprietary/proprietary-tethers.html"
-"\">appareils et applications qui dépendent d'un serveur</a> ne sont pas "
-"sûres puisqu'ils risquent en permanence d'être mis hors service par une "
-"panne du serveur. Nous ne citons sur cette page que ceux qui ont des "
-"vulnérabilités reconnues en plus de leur dépendance à un serveur."
-
-#. type: Content of: <p>
-msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
@@ -1145,3 +1131,16 @@
 #. type: Content of: <div><p>
 msgid "Updated:"
 msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+#~ "applications</a> are intrinsically insecure because there is always a "
+#~ "chance that the server will go offline accidentally, making them useless. "
+#~ "We don't list them here unless they have documented vulnerabilities in "
+#~ "addition to the fact that they are tethered."
+#~ msgstr ""
+#~ "Par leur conception-même, les <a href=\"/proprietary/proprietary-tethers."
+#~ "html\">appareils et applications qui dépendent d'un serveur</a> ne sont "
+#~ "pas sûres puisqu'ils risquent en permanence d'être mis hors service par "
+#~ "une panne du serveur. Nous ne citons sur cette page que ceux qui ont des "
+#~ "vulnérabilités reconnues en plus de leur dépendance à un serveur."

Index: po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-insecurity.it-diff.html      5 Oct 2018 12:59:26 -0000       
1.16
+++ po/proprietary-insecurity.it-diff.html      6 Oct 2018 06:59:40 -0000       
1.17
@@ -52,41 +52,37 @@
 &lt;em&gt;helpless to fix any security problems that arise&lt;/em&gt;.  
Keeping the
 users helpless is what's culpable about proprietary software.&lt;/p&gt;
 
-<span class="removed"><del><strong>&lt;ul&gt;
-&lt;li id="break-security-smarttv"&gt;</strong></del></span>
+<span class="removed"><del><strong>&lt;ul&gt;</strong></del></span>
 <span class="inserted"><ins><em>&lt;/div&gt;
 
 &lt;p&gt;This page lists clearly established cases of insecurity in
 proprietary software that has grave consequences or is otherwise
-noteworthy.&lt;/p&gt;</em></ins></span>
-
-&lt;p&gt;&lt;a
-       <span 
class="removed"><del><strong>href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
-      Crackers found</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html"&gt;Tethered
 appliances
-and applications&lt;/a&gt; are intrinsically insecure because there is 
always</em></ins></span>
-a <span class="removed"><del><strong>way</strong></del></span> <span 
class="inserted"><ins><em>chance that the server will go offline accidentally, 
making them
-useless. We don't list them here unless they have documented
-vulnerabilities in addition</em></ins></span> to <span 
class="removed"><del><strong>break security on</strong></del></span> <span 
class="inserted"><ins><em>the fact that they are tethered.&lt;/p&gt;
+noteworthy.&lt;/p&gt;
 
 &lt;p&gt;If you know of an example that ought to be in this page but isn't
 here, please write
 to &lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;
-to inform us. Please include the URL of</em></ins></span> a <span 
class="removed"><del><strong>&ldquo;smart&rdquo; TV&lt;/a&gt; and use its 
camera</strong></del></span> <span class="inserted"><ins><em>trustworthy 
reference or two</em></ins></span>
-to <span class="removed"><del><strong>watch</strong></del></span> <span 
class="inserted"><ins><em>present</em></ins></span> the <span 
class="inserted"><ins><em>specifics.&lt;/p&gt;
+to inform us. Please include the URL of a trustworthy reference or two
+to present the specifics.&lt;/p&gt;
 
 &lt;ul class="blurbs"&gt;
-&lt;!-- INSERT insecurity --&gt;
-  &lt;li id="M201809240"&gt;
+&lt;!-- INSERT insecurity --&gt;</em></ins></span>
+  &lt;li <span class="removed"><del><strong>id="break-security-smarttv"&gt;
+  &lt;p&gt;&lt;a
+       
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html"&gt;
+      Crackers</strong></del></span> <span 
class="inserted"><ins><em>id="M201809240"&gt;
     &lt;p&gt;Researchers have discovered how to &lt;a
     
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co"&gt;
-    hide voice commands in other audio&lt;/a&gt;, so that</em></ins></span> 
people <span class="removed"><del><strong>who are watching 
TV.&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>cannot hear
-    them, but Alexa and Siri can.&lt;/p&gt;</em></ins></span>
+    hide voice commands in other audio&lt;/a&gt;, so that people cannot hear
+    them, but Alexa and Siri can.&lt;/p&gt;
   &lt;/li&gt;
-<span class="removed"><del><strong>&lt;li&gt;
-  &lt;p&gt;Many models</strong></del></span>
 
-  <span class="inserted"><ins><em>&lt;li id="M201808120"&gt;
-    &lt;p&gt;Crackers found a way to break the security</em></ins></span> of 
<span class="removed"><del><strong>Internet-connected 
cameras</strong></del></span> <span class="inserted"><ins><em>an Amazon device,
+  &lt;li id="M201808120"&gt;
+    &lt;p&gt;Crackers</em></ins></span> found a way to break <span 
class="removed"><del><strong>security on a &ldquo;smart&rdquo; TV&lt;/a&gt; and 
use its camera
+      to watch</strong></del></span> the <span 
class="removed"><del><strong>people who are watching TV.&lt;/p&gt;
+&lt;/li&gt;
+&lt;li&gt;
+  &lt;p&gt;Many models</strong></del></span> <span 
class="inserted"><ins><em>security</em></ins></span> of <span 
class="removed"><del><strong>Internet-connected cameras</strong></del></span> 
<span class="inserted"><ins><em>an Amazon device,
     and</em></ins></span> &lt;a
   <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor"&gt;
   have backdoors&lt;/a&gt;.&lt;/p&gt;
@@ -233,12 +229,16 @@
        can be hijacked through their Wi-Fi chips&lt;/a&gt; 
because</strong></del></span>
     <span 
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584"&gt;
 full</em></ins></span> of <span class="removed"><del><strong>a bug in
        Broadcom's non-free firmware.&lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>gross
-    security faults&lt;/a&gt;.&lt;/p&gt;
+    security faults&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201705160"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;When Miele's Internet</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201705160"&gt;
     &lt;p&gt;Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
-    pre-installed on 28 models of HP laptops logged the user's keystroke
+    pre-installed on 28 models</em></ins></span> of <span 
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
+&lt;a 
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected
 to</strong></del></span> <span class="inserted"><ins><em>HP laptops logged the 
user's keystroke
     to a file in the filesystem. Any process with access to the filesystem
     or the MapViewOfFile API could gain access to the log. Furthermore, &lt;a
     
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt"&gt;according
@@ -258,16 +258,14 @@
     &lt;p&gt;Many Android devices &lt;a
     
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/"&gt;
     can be hijacked through their Wi-Fi chips&lt;/a&gt; because of a bug in
-    Broadcom's non-free firmware.&lt;/p&gt;</em></ins></span>
+    Broadcom's non-free firmware.&lt;/p&gt;
   &lt;/li&gt;
 
-<span class="removed"><del><strong>&lt;li&gt;</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201703270"&gt;</em></ins></span>
+  &lt;li id="M201703270"&gt;
     &lt;p&gt;When Miele's Internet of
-    Stings hospital disinfectant dishwasher is &lt;a <span 
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;connected</strong></del></span>
-    <span 
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
-    connected</em></ins></span> to the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
+    Stings hospital disinfectant dishwasher is &lt;a
+    
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit"&gt;
+    connected to</em></ins></span> the Internet, its security is 
crap&lt;/a&gt;.&lt;/p&gt;
 
     &lt;p&gt;For example, a cracker can gain access to the dishwasher's
     filesystem, infect it with malware, and force the dishwasher to launch
@@ -511,7 +509,10 @@
 <span class="removed"><del><strong>&lt;li&gt;
 &lt;p&gt;
 Malware found
-on &lt;a 
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
+on</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
+    &lt;p&gt;FitBit fitness trackers have a</em></ins></span> &lt;a <span 
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html"&gt;security
 cameras available through Amazon&lt;/a&gt;.
 &lt;/p&gt;
 
@@ -539,13 +540,10 @@
 
 &lt;li&gt;
 &lt;p&gt;
-FitBit fitness trackers</strong></del></span>
-
-  <span class="inserted"><ins><em>&lt;li id="M201510210"&gt;
-    &lt;p&gt;FitBit fitness trackers have a</em></ins></span> &lt;a
-    
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
-<span class="removed"><del><strong>have a</strong></del></span>
-    Bluetooth vulnerability&lt;/a&gt; that allows attackers to send malware
+FitBit fitness trackers &lt;a 
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+have a Bluetooth vulnerability&lt;/a&gt;</strong></del></span>
+    <span 
class="inserted"><ins><em>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"&gt;
+    Bluetooth vulnerability&lt;/a&gt;</em></ins></span> that allows attackers 
to send malware
     to the devices, which can subsequently spread to computers and other
     FitBit trackers that interact with <span class="removed"><del><strong>them.
 &lt;/p&gt;</strong></del></span> <span 
class="inserted"><ins><em>them.&lt;/p&gt;</em></ins></span>
@@ -918,7 +916,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/05 12:59:26 $
+$Date: 2018/10/06 06:59:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- po/proprietary-insecurity.it.po     5 Oct 2018 12:59:26 -0000       1.135
+++ po/proprietary-insecurity.it.po     6 Oct 2018 06:59:40 -0000       1.136
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
 "PO-Revision-Date: 2017-12-31 13:13+0100\n"
 "Last-Translator: Andrea Pescetti <address@hidden>\n"
 "Language-Team: Italian <address@hidden>\n"
@@ -113,15 +113,6 @@
 
 #. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "

Index: po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/proprietary-insecurity.ja-diff.html      5 Oct 2018 12:59:27 -0000       
1.35
+++ po/proprietary-insecurity.ja-diff.html      6 Oct 2018 06:59:40 -0000       
1.36
@@ -54,7 +54,7 @@
 
 &lt;ul&gt;
 &lt;li&gt;
-&lt;p&gt;4G LTE phone networks</strong></del></span> <span 
class="inserted"><ins><em>any security problems that arise&lt;/em&gt;.  Keeping 
the
+&lt;p&gt;4G LTE phone networks are drastically insecure. They 
can</strong></del></span> <span class="inserted"><ins><em>any security problems 
that arise&lt;/em&gt;.  Keeping the
 users helpless is what's culpable about proprietary software.&lt;/p&gt;
 &lt;/div&gt;
 
@@ -62,12 +62,6 @@
 proprietary software that has grave consequences or is otherwise
 noteworthy.&lt;/p&gt;
 
-&lt;p&gt;&lt;a href="/proprietary/proprietary-tethers.html"&gt;Tethered 
appliances
-and applications&lt;/a&gt;</em></ins></span> are <span 
class="removed"><del><strong>drastically insecure. They 
can</strong></del></span> <span class="inserted"><ins><em>intrinsically 
insecure because there is always
-a chance that the server will go offline accidentally, making them
-useless. We don't list them here unless they have documented
-vulnerabilities in addition to the fact that they are tethered.&lt;/p&gt;
-
 &lt;p&gt;If you know of an example that ought to</em></ins></span> be
 <span class="removed"><del><strong>&lt;a 
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"&gt;
 taken
@@ -111,30 +105,30 @@
 
 &lt;li&gt;
 &lt;p&gt;&lt;a 
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/"&gt;&ldquo;Deleted&rdquo;
-WhatsApp messages are not entirely deleted&lt;/a&gt;. They 
can</strong></del></span> <span class="inserted"><ins><em>listening 
device&lt;/a&gt; for them.&lt;/p&gt;
+WhatsApp messages</strong></del></span> <span 
class="inserted"><ins><em>listening device&lt;/a&gt; for them.&lt;/p&gt;
 
-    &lt;p&gt;It was very difficult for them to do this. The job 
would</em></ins></span> be <span 
class="removed"><del><strong>recovered</strong></del></span> <span 
class="inserted"><ins><em>much
+    &lt;p&gt;It was very difficult for them to do this. The job would be much
     easier for Amazon. And if some government such as China or the US
-    told Amazon to do this, or cease to sell the product</em></ins></span> in 
<span class="removed"><del><strong>various ways.
-&lt;/p&gt;
-&lt;/li&gt;
-
-&lt;li&gt;</strong></del></span> <span class="inserted"><ins><em>that country,
+    told Amazon to do this, or cease to sell the product in that country,
     do you think Amazon would have the moral fiber to say no?&lt;/p&gt;
 
-    &lt;p&gt;These crackers are probably hackers too, but please &lt;a
+    &lt;p&gt;These crackers</em></ins></span> are <span 
class="removed"><del><strong>not entirely deleted&lt;/a&gt;. 
They</strong></del></span> <span class="inserted"><ins><em>probably hackers 
too, but please &lt;a
     href="https://stallman.org/articles/on-hacking.html"&gt; don't use
     &ldquo;hacking&rdquo; to mean &ldquo;breaking 
security&rdquo;&lt;/a&gt;.&lt;/p&gt;
   &lt;/li&gt;
 
   &lt;li id="M201807100"&gt;
-    &lt;p&gt;Siri, Alexa, and all the other voice-control systems can be &lt;a
+    &lt;p&gt;Siri, Alexa, and all the other voice-control 
systems</em></ins></span> can be <span 
class="removed"><del><strong>recovered</strong></del></span> <span 
class="inserted"><ins><em>&lt;a
     
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa"&gt;
-    hijacked by programs that play commands in ultrasound that humans
-    can't hear&lt;/a&gt;.&lt;/p&gt;
+    hijacked by programs that play commands</em></ins></span> in <span 
class="removed"><del><strong>various ways.
+&lt;/p&gt;</strong></del></span> <span class="inserted"><ins><em>ultrasound 
that humans
+    can't hear&lt;/a&gt;.&lt;/p&gt;</em></ins></span>
   &lt;/li&gt;
 
-  &lt;li id="M201807020"&gt;
+<span class="removed"><del><strong>&lt;li&gt;
+&lt;p&gt;A vulnerability in</strong></del></span>
+
+  <span class="inserted"><ins><em>&lt;li id="M201807020"&gt;
     &lt;p&gt;Some Samsung phones randomly &lt;a
     
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages"&gt;send
     photos to people in the owner's contact list&lt;/a&gt;.&lt;/p&gt;
@@ -350,8 +344,8 @@
     in various ways.&lt;/p&gt;
   &lt;/li&gt;
 
-  &lt;li id="M201607220"&gt;</em></ins></span>
-    &lt;p&gt;A vulnerability in Apple's Image I/O API allowed an attacker to 
&lt;a
+  &lt;li id="M201607220"&gt;
+    &lt;p&gt;A vulnerability in</em></ins></span> Apple's Image I/O API 
allowed an attacker to &lt;a
     
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple"&gt;execute
   <span class="removed"><del><strong>malacious</strong></del></span>
     <span class="inserted"><ins><em>malicious</em></ins></span> code from any 
application which uses this API to render a
@@ -872,7 +866,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/10/05 12:59:27 $
+$Date: 2018/10/06 06:59:40 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- po/proprietary-insecurity.ja.po     5 Oct 2018 12:59:27 -0000       1.106
+++ po/proprietary-insecurity.ja.po     6 Oct 2018 06:59:40 -0000       1.107
@@ -6,7 +6,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
 "PO-Revision-Date: 2016-10-31 12:56+0900\n"
 "Last-Translator: NIIBE Yutaka <address@hidden>\n"
 "Language-Team: Japanese <address@hidden>\n"
@@ -94,15 +94,6 @@
 
 #. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "

Index: po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- po/proprietary-insecurity.pot       5 Oct 2018 12:59:27 -0000       1.76
+++ po/proprietary-insecurity.pot       6 Oct 2018 06:59:40 -0000       1.77
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
 "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
 "Last-Translator: FULL NAME <address@hidden>\n"
 "Language-Team: LANGUAGE <address@hidden>\n"
@@ -68,15 +68,6 @@
 
 #. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a "
 "href=\"mailto:address@hidden";>&lt;address@hidden&gt;</a> to inform "

Index: po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- po/proprietary-insecurity.ru-en.html        5 Oct 2018 17:29:56 -0000       
1.60
+++ po/proprietary-insecurity.ru-en.html        6 Oct 2018 06:59:40 -0000       
1.61
@@ -41,12 +41,6 @@
 proprietary software that has grave consequences or is otherwise
 noteworthy.</p>
 
-<p><a href="/proprietary/proprietary-tethers.html">Tethered appliances
-and applications</a> are intrinsically insecure because there is always
-a chance that the server will go offline accidentally, making them
-useless. We don't list them here unless they have documented
-vulnerabilities in addition to the fact that they are tethered.</p>
-
 <p>If you know of an example that ought to be in this page but isn't
 here, please write
 to <a href="mailto:address@hidden";>&lt;address@hidden&gt;</a>
@@ -633,7 +627,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/05 17:29:56 $
+$Date: 2018/10/06 06:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- po/proprietary-insecurity.ru.po     5 Oct 2018 17:29:56 -0000       1.196
+++ po/proprietary-insecurity.ru.po     6 Oct 2018 06:59:40 -0000       1.197
@@ -7,7 +7,7 @@
 msgid ""
 msgstr ""
 "Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2018-10-05 12:56+0000\n"
+"POT-Creation-Date: 2018-10-06 06:56+0000\n"
 "PO-Revision-Date: 2018-10-01 17:17+0000\n"
 "Last-Translator: Ineiev <address@hidden>\n"
 "Language-Team: Russian <address@hidden>\n"
@@ -95,20 +95,6 @@
 
 #. type: Content of: <p>
 msgid ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
-"applications</a> are intrinsically insecure because there is always a chance "
-"that the server will go offline accidentally, making them useless. We don't "
-"list them here unless they have documented vulnerabilities in addition to "
-"the fact that they are tethered."
-msgstr ""
-"<a href=\"/proprietary/proprietary-tethers.html\">Привязанные 
приложения и "
-"устройства</a> принципиально небезопасны, 
потому что сервер всегда может "
-"случайно отключиться от сети, и они 
перестанут работать. Мы не перечисляем "
-"их здесь, если в них нет документированных 
уязвимостей в дополнение к тому "
-"факту, что они привязаны."
-
-#. type: Content of: <p>
-msgid ""
 "If you know of an example that ought to be in this page but isn't here, "
 "please write to <a href=\"mailto:address@hidden";>&lt;address@hidden"
 "org&gt;</a> to inform us. Please include the URL of a trustworthy reference "
@@ -1129,6 +1115,19 @@
 msgstr "Обновлено:"
 
 #~ msgid ""
+#~ "<a href=\"/proprietary/proprietary-tethers.html\">Tethered appliances and "
+#~ "applications</a> are intrinsically insecure because there is always a "
+#~ "chance that the server will go offline accidentally, making them useless. "
+#~ "We don't list them here unless they have documented vulnerabilities in "
+#~ "addition to the fact that they are tethered."
+#~ msgstr ""
+#~ "<a href=\"/proprietary/proprietary-tethers.html\">Привязанные 
приложения "
+#~ "и устройства</a> принципиально 
небезопасны, потому что сервер всегда "
+#~ "может случайно отключиться от сети, и 
они перестанут работать. Мы не "
+#~ "перечисляем их здесь, если в них нет 
документированных уязвимостей в "
+#~ "дополнение к тому факту, что они 
привязаны."
+
+#~ msgid ""
 #~ "Honeywell's &ldquo;smart&rdquo; thermostats communicate only through the "
 #~ "company's server. They have all the nasty characteristics of such "
 #~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-";

Index: po/proprietary-tyrants.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- po/proprietary-tyrants.ru-en.html   29 Sep 2018 07:28:07 -0000      1.16
+++ po/proprietary-tyrants.ru-en.html   6 Oct 2018 06:59:40 -0000       1.17
@@ -33,6 +33,7 @@
 to present the specifics.</p>
 
 <ul class="blurbs">
+<!-- INSERT tyrants -->
   <li id="M201607150">
     <p>Microsoft accidentally left a way for users
     to install GNU/Linux on Windows RT tablets, but now it has <a
@@ -55,9 +56,9 @@
   </li>
 
   <li id="M201304080">
-    <p><a
+    <p>Motorola, then owned by Google, made <a
     
href="http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html";>
-    Some Android phones are tyrants</a> (though someone found a way to
+    Android phones that are tyrants</a> (though someone found a way to
     crack the restriction).  Fortunately, most Android devices are not
     tyrants.</p>
   </li>
@@ -155,7 +156,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/29 07:28:07 $
+$Date: 2018/10/06 06:59:40 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-tyrants.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tyrants.ru.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- po/proprietary-tyrants.ru.po        6 Oct 2018 06:49:59 -0000       1.48
+++ po/proprietary-tyrants.ru.po        6 Oct 2018 06:59:40 -0000       1.49
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-10-05 20:56+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Tyrants - GNU Project - Free Software Foundation"



reply via email to

[Prev in Thread] Current Thread [Next in Thread]