[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-appliances.de-diff.h...
From: |
GNUN |
Subject: |
www/proprietary/po malware-appliances.de-diff.h... |
Date: |
Sun, 7 Oct 2018 16:58:35 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/07 16:58:34
Modified files:
proprietary/po : malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po
malware-cars.de-diff.html malware-cars.de.po
malware-cars.fr.po malware-cars.pot
malware-cars.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.14&r2=1.15
Patches:
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- malware-appliances.de-diff.html 5 Oct 2018 21:01:56 -0000 1.9
+++ malware-appliances.de-diff.html 7 Oct 2018 20:58:30 -0000 1.10
@@ -26,7 +26,7 @@
<p><a href="/proprietary/proprietary.html">Other examples of
proprietary
malware</a></p>
-<div class="highlight-para">
+<div <span
class="removed"><del><strong>class="highlight-para"></strong></del></span>
<span class="inserted"><ins><em>class="comment"></em></ins></span>
<p>
<em>Malware</em> means software designed to function in ways that
mistreat or harm the user. (This does not include accidental errors.)
@@ -43,185 +43,197 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
-<span class="inserted"><ins><em><p>If you know of an example that ought
to be in this page but isn't
-here, please write
-to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of a trustworthy reference or two
-to present the specifics.</p></em></ins></span>
-</div>
+<span class="removed"><del><strong></div>
-<p>Here are examples of malware in appliances.</p>
+<p>Here are</strong></del></span>
-<span class="removed"><del><strong><ul></strong></del></span>
+<span class="inserted"><ins><em><p>Some</em></ins></span> examples of
malware in <span class="removed"><del><strong>appliances.</p>
-<span class="inserted"><ins><em><ul class="blurbs">
-<!-- INSERT appliances --></em></ins></span>
- <li <span class="removed"><del><strong>id="nest-thermometers">
+<ul>
+ <li id="nest-thermometers">
<p>Nest thermometers
- send</strong></del></span> <span
class="inserted"><ins><em>id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
- lot</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger</em></ins></span> of <span
class="removed"><del><strong>data about</strong></del></span> <span
class="inserted"><ins><em>sabotage</a> (of a specific user, or of
- all users at once), as well as</em></ins></span> the <span
class="removed"><del><strong>user</a>.</p></strong></del></span>
<span class="inserted"><ins><em>risk of an outage (which is what
- just happened).</p>
+ send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
+ lot</strong></del></span> <span class="inserted"><ins><em>appliances are
listed below.</p>
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p></em></ins></span>
+<div class="important">
+<p>If you know</em></ins></span> of <span
class="removed"><del><strong>data about the user</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A remote-control sex toy was found</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201809240">
- <p>Researchers have discovered how</em></ins></span> to <span
class="removed"><del><strong>make</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two
users</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p></em></ins></span>
+ <li>
+ <p>A remote-control sex toy was found</strong></del></span> <span
class="inserted"><ins><em>an example that ought to be in this page but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>make</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>conversation between</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span>
two <span class="removed"><del><strong>users</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,
- is</strong></del></span>
+ <li>
+ <p>Every “home security” camera, if its manufacturer
can</strong></del></span>
+<span class="inserted"><ins><em>to present the specifics.</p>
+</div>
+</div>
+<div class="column-limit"></div>
- <span class="inserted"><ins><em><li id="M201807050">
- <p>The Jawbone fitness tracker was tethered to</em></ins></span> a
<span class="removed"><del><strong>surveillance device.</strong></del></span>
<span class="inserted"><ins><em>proprietary phone
- app. In 2017, the company shut down and made the app stop
working.</em></ins></span> <a
+<ul class="blurbs">
+<!-- INSERT appliances -->
+ <li id="M201809260">
+ <p>Honeywell's “smart” thermostats</em></ins></span>
communicate <span class="removed"><del><strong>with it,
+ is a surveillance device.</strong></del></span>
+ <span class="inserted"><ins><em>only through the company's server. They
have
+ all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
- the existing trackers stopped working
forever</a>.</p></em></ins></span>
-
- <p>The article <span class="removed"><del><strong>describes
wrongdoing by the manufacturer, based</strong></del></span> <span
class="inserted"><ins><em>focuses</em></ins></span> on <span
class="removed"><del><strong>the fact</strong></del></span> <span
class="inserted"><ins><em>a further nasty fillip,</em></ins></span> that <span
class="inserted"><ins><em>sales of</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span>
- <span class="inserted"><ins><em>broken devices continued. But I think
that</em></ins></span> is <span class="removed"><del><strong>tethered
to</strong></del></span> a <span class="removed"><del><strong>server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span> <span
class="inserted"><ins><em>secondary issue;</em></ins></span>
- it <span class="removed"><del><strong>also demonstrates
that</strong></del></span> <span
class="inserted"><ins><em>made</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>nasty consequences extend to some additional people.
- The fundamental wrong was to design</em></ins></span> the <span
class="removed"><del><strong>company
- surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>devices to depend on something
- else that didn't respect users' freedom.</p></em></ins></span>
+ Canary camera is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
+ surveillance, and danger of sabotage</a> (of a specific user, or of
+ all users at once), as well as the risk of</em></ins></span> an <span
class="removed"><del><strong>example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>outage (which is what
+ just happened).</p>
+
+ <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can do it
+ using controls right</em></ins></span> on the <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>thermostat.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+ <li id="M201809240">
+ <p>Researchers have discovered how to <a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so</em></ins></span> that
<span class="removed"><del><strong>the device is</strong></del></span> <span
class="inserted"><ins><em>people cannot hear
+ them, but Alexa and Siri can.</p>
+ </li>
+
+ <li id="M201807050">
+ <p>The Jawbone fitness tracker was</em></ins></span> tethered to a
<span class="removed"><del><strong>server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More
about</strong></del></span> proprietary <span
class="removed"><del><strong>tethering</a>.</p>
+ <p>But it also demonstrates that the device
gives</strong></del></span> <span class="inserted"><ins><em>phone
+ app. In 2017,</em></ins></span> the company
+ <span class="removed"><del><strong>surveillance capability.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201804140"></em></ins></span>
- <p>A <span class="removed"><del><strong>“smart”
intravenous pump designed for
- hospitals is connected to the internet. Naturally</strong></del></span>
<span class="inserted"><ins><em>medical insurance company</em></ins></span>
<a
+<li>
+ <p>A “smart” intravenous pump designed for
+ hospitals is connected to</strong></del></span> <span
class="inserted"><ins><em>shut down and made</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally</strong></del></span> <span
class="inserted"><ins><em>app stop working.</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p>Note</strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span> <span
class="inserted"><ins><em>snoops on its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>term <a
+ <p>Note that this article misuses</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All</em></ins></span>
+ the <span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p></strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
+ referring to crackers.</p>
+</li>
+
+<li></strong></del></span> <span class="inserted"><ins><em>existing
trackers stopped working forever</a>.</p></em></ins></span>
+
+ <p>The <span class="removed"><del><strong>bad security in many
Internet of Stings devices
+ allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop</strong></del></span> <span class="inserted"><ins><em>article
focuses</em></ins></span> on <span class="removed"><del><strong>the people that
use them</a>.</p>
+ <p>Don't be</strong></del></span> a <span
class="removed"><del><strong>sucker—reject all</strong></del></span>
<span class="inserted"><ins><em>further nasty fillip, that sales
of</em></ins></span> the <span class="removed"><del><strong>stings.</p>
+ <p>It is unfortunate</strong></del></span>
+ <span class="inserted"><ins><em>broken devices continued. But I
think</em></ins></span> that <span class="inserted"><ins><em>is a secondary
issue;
+ it made</em></ins></span> the <span class="removed"><del><strong>article
uses</strong></del></span> <span class="inserted"><ins><em>nasty consequences
extend to some additional people.
+ The fundamental wrong was to design</em></ins></span> the
+ <span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></strong></del></span>
<span class="inserted"><ins><em>devices to depend on something
+ else that didn't respect users' freedom.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>The bad security in many Internet of Stings devices
- allows</strong></del></span>
+ <p>Many models of Internet-connected cameras are tremendously insecure.
+ They have login accounts with hard-coded passwords, which can't be
+ changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way to
+ delete these accounts either</a>.</p>
+</li>
+
+<li>
+<p>The proprietary code that runs pacemakers, insulin pumps, and
other</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804140">
+ <p>A</em></ins></span> medical <span
class="removed"><del><strong>devices is</strong></del></span> <span
class="inserted"><ins><em>insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross security faults</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over the
Internet</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li><p>Users are suing Bose
for</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>use them</a>.</p>
- <p>Don't be</strong></del></span> <span
class="inserted"><ins><em>install</em></ins></span> a <span
class="removed"><del><strong>sucker—reject all</strong></del></span>
<span class="inserted"><ins><em>surveillance app</a>.</p>
+ load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>spyware app</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>stings.</p>
- <p>It</strong></del></span> <span class="inserted"><ins><em>article
for the facts it presents. It</em></ins></span>
- is <span class="removed"><del><strong>unfortunate</strong></del></span>
<span class="inserted"><ins><em>too bad</em></ins></span> that the article
<span class="removed"><del><strong>uses</strong></del></span> <span
class="inserted"><ins><em>finishes by advocating</em></ins></span> the
- <span class="removed"><del><strong>term</strong></del></span>
- <span class="inserted"><ins><em>moral weakness of surrendering to Netflix.
The Netflix app</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ <p>We link to the article</em></ins></span> for <span
class="removed"><del><strong>its headphones</a>.
+Specifically,</strong></del></span> the <span class="removed"><del><strong>app
would record</strong></del></span> <span class="inserted"><ins><em>facts it
presents. It
+ is too bad that</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating</em></ins></span> the
<span class="removed"><del><strong>audio files</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness of surrendering to Netflix.
The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Many models</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201802120">
- <p>Apple devices lock users in <a
+ <li id="M201802120">
+ <p>Apple devices lock</em></ins></span> users <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>in <a
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely to Apple services</a> by being designed to be incompatible
- with all other options, ethical or unethical.</p>
+ solely</em></ins></span> to <span
class="removed"><del><strong>along</strong></del></span> <span
class="inserted"><ins><em>Apple services</a> by being designed to be
incompatible</em></ins></span>
+ with <span class="inserted"><ins><em>all other options, ethical or
unethical.</p>
</li>
<li id="M201712240">
- <p>One</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras are tremendously
insecure.
- They have login accounts</strong></del></span> <span
class="inserted"><ins><em>the dangers of the “internet of stings”
+ <p>One of</em></ins></span> the <span
class="removed"><del><strong>headphone's unique serial number.
+</p>
+
+<p>The suit accuses that this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>dangers
of</em></ins></span> the <span class="removed"><del><strong>fine
print</strong></del></span> <span class="inserted"><ins><em>“internet of
stings”
is that, if you lose your internet service, you also <a
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house and appliances</a>.</p>
+ lose control</em></ins></span> of <span class="inserted"><ins><em>your
house and appliances</a>.</p>
- <p>For your safety, don't use any appliance</em></ins></span> with
<span class="removed"><del><strong>hard-coded passwords, which
can't</strong></del></span> <span class="inserted"><ins><em>a connection to the
- real internet.</p>
+ <p>For your safety, don't use any appliance with a connection
to</em></ins></span> the <span class="removed"><del><strong>app said that users
gave consent for this,
+would that make it acceptable? No way! It should</strong></del></span>
+ <span class="inserted"><ins><em>real internet.</p>
</li>
<li id="M201711200">
- <p>Amazon recently invited consumers to</em></ins></span> be
- <span class="removed"><del><strong>changed,</strong></del></span> <span
class="inserted"><ins><em>suckers</em></ins></span> and <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way</strong></del></span>
+ <p>Amazon recently invited consumers to</em></ins></span> be <span
class="removed"><del><strong>flat out</strong></del></span> <span
class="inserted"><ins><em>suckers and</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff</em></ins></span> to
- <span class="removed"><del><strong>delete these accounts
either</a>.</p></strong></del></span> <span
class="inserted"><ins><em>open their front doors</a>. Wouldn't you know
- it, the system has a grave security flaw.</p></em></ins></span>
+ allow delivery staff</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>open their front doors</a>. Wouldn't you know
+ it,</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>system has a grave security flaw.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
-full</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings</em></ins></span> of <span class="removed"><del><strong>gross
security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the conversation between two
users</a>.</p></em></ins></span>
+ <li id="M201711100">
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of the conversation between two
users</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li><p>Users are suing Bose
for</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711080">
+ <li <span class="removed"><del><strong>id="anova">
+ <p>Anova sabotaged users' cooking</strong></del></span> <span
class="inserted"><ins><em>id="M201711080">
<p>Logitech will sabotage
- all Harmony Link household control devices by</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing a spyware app for its headphones</a>.
-Specifically, the app would record</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off</em></ins></span> the <span class="removed"><del><strong>names
of</strong></del></span> <span class="inserted"><ins><em>server through
which</em></ins></span> the <span class="removed"><del><strong>audio files
-users listen to along</strong></del></span> <span
class="inserted"><ins><em>products' supposed owners
- communicate</em></ins></span> with <span class="removed"><del><strong>the
headphone's unique serial number.
-</p></strong></del></span> <span
class="inserted"><ins><em>them</a>.</p></em></ins></span>
-
- <p>The <span class="removed"><del><strong>suit accuses
that</strong></del></span> <span class="inserted"><ins><em>owners
suspect</em></ins></span> this <span class="removed"><del><strong>was done
without the users' consent.</strong></del></span> <span
class="inserted"><ins><em>is to pressure them to buy a newer
model.</em></ins></span> If <span class="removed"><del><strong>the fine print
of the app said</strong></del></span>
- <span class="inserted"><ins><em>they are wise, they will learn, rather, to
distrust any product</em></ins></span> that
- <span class="inserted"><ins><em>requires</em></ins></span> users <span
class="removed"><del><strong>gave consent for this,
-would that make it acceptable? No way! It should be flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal to design the app</strong></del></span> to <span
class="removed"><del><strong>snoop at all</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>talk with
them through some specialized service.</p></em></ins></span>
+ all Harmony Link household control</em></ins></span> devices <span
class="inserted"><ins><em>by <a
+
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off the server through which the products' supposed owners
+ communicate</em></ins></span> with <span class="removed"><del><strong>a
downgrade that
+ tethered</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
+
+ <p>The owners suspect this is to pressure</em></ins></span> them to
<span class="inserted"><ins><em>buy</em></ins></span> a <span
class="removed"><del><strong>remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless</strong></del></span>
<span class="inserted"><ins><em>newer model. If
+ they are wise, they will learn, rather, to distrust any product that
+ requires</em></ins></span> users <span class="removed"><del><strong>create
an account on Anova's servers, their
+ cookers won't function.</a></p></strong></del></span> <span
class="inserted"><ins><em>to talk with them through some specialized
service.</p></em></ins></span>
</li>
- <li <span class="removed"><del><strong>id="anova">
- <p>Anova sabotaged users' cooking devices</strong></del></span> <span
class="inserted"><ins><em>id="M201710040">
+<span class="removed"><del><strong><li>
+<p>When Miele's Internet of Stings hospital disinfectant
dishwasher</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201710040">
<p>Every “home security” camera, if its
- manufacturer can communicate</em></ins></span> with <span
class="inserted"><ins><em>it, is</em></ins></span> a <span
class="removed"><del><strong>downgrade that
- tethered them to a remote server.</strong></del></span> <span
class="inserted"><ins><em>surveillance device.</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create</strong></del></span>
+ manufacturer can communicate with it,</em></ins></span> is <span
class="inserted"><ins><em>a surveillance device.</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is</em></ins></span> an <span
class="removed"><del><strong>account</strong></del></span> <span
class="inserted"><ins><em>example</a>.</p>
+ Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer,
based</em></ins></span> on <span class="removed"><del><strong>Anova's servers,
their
- cookers won't function.</a></p>
-</li>
-
-<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span>
- the <span class="removed"><del><strong>Internet,
-its security</strong></del></span> <span class="inserted"><ins><em>fact that
the device</em></ins></span> is <span
class="removed"><del><strong>crap</a>.</p>
+ <p>The article describes wrongdoing by</em></ins></span> the <span
class="removed"><del><strong>Internet,
+its security</strong></del></span> <span
class="inserted"><ins><em>manufacturer, based on
+ the fact that the device</em></ins></span> is <span
class="removed"><del><strong>crap</a>.</p>
<p>For example, a cracker can gain access</strong></del></span> <span
class="inserted"><ins><em>tethered</em></ins></span> to <span
class="removed"><del><strong>the dishwasher's filesystem,
infect</strong></del></span> <span class="inserted"><ins><em>a
server.</p>
@@ -258,24 +270,25 @@
report everything that is viewed</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
to snoop</em></ins></span> on <span class="removed"><del><strong>them, and
not just broadcasts
- and cable</a>. Even if the image is coming from the user's own
- computer,</strong></del></span> the <span class="removed"><del><strong>TV
reports what it is. The existence of</strong></del></span> <span
class="inserted"><ins><em>people that use them</a>.</p>
+ and cable</a>. Even if</strong></del></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>people that use them</a>.</p>
- <p>Don't be</em></ins></span> a <span
class="removed"><del><strong>way to
- disable</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
- <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>coming
from</strong></del></span> <span class="inserted"><ins><em>unfortunate
that</em></ins></span> the <span class="removed"><del><strong>user's own
+ computer,</strong></del></span> <span class="inserted"><ins><em>article
uses</em></ins></span> the <span class="removed"><del><strong>TV reports what
it is. The existence of a way</strong></del></span> <span
class="inserted"><ins><em>term <a
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>More or less</strong></del></span>
- <span class="inserted"><ins><em><li id="M201708230">
+ <li id="M201708230">
<p>Sonos <a
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
- told</em></ins></span> all <span
class="removed"><del><strong>“smart” TVs</strong></del></span>
<span class="inserted"><ins><em>its customers, “Agree”
- to snooping or the product will stop working</a>.</em></ins></span>
<a
+ told all its customers, “Agree”</em></ins></span>
+ to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>snooping or</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
+ these TVs, does not legitimize the surveillance.</p>
+</li>
+<li>
+<p>More or less all “smart” TVs</strong></del></span> <span
class="inserted"><ins><em>product will stop
working</a>.</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
@@ -408,54 +421,54 @@
“Cube” 3D printer was designed with DRM</a>:
it</strong></del></span>
<span
class="inserted"><ins><em>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
cookers</em></ins></span> won't <span class="removed"><del><strong>accept
-third-party printing materials. It is the Keurig</strong></del></span>
+third-party printing materials. It</strong></del></span>
<span class="inserted"><ins><em>function</a>.</p>
</li>
<li id="M201703270">
- <p>When Miele's Internet</em></ins></span> of <span
class="removed"><del><strong>printers. Now it</strong></del></span>
- <span class="inserted"><ins><em>Stings hospital disinfectant
dishwasher</em></ins></span> is
+ <p>When Miele's Internet of
+ Stings hospital disinfectant dishwasher</em></ins></span> is <span
class="inserted"><ins><em><a
+
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to</em></ins></span> the <span
class="removed"><del><strong>Keurig of printers. Now it</strong></del></span>
<span class="inserted"><ins><em>Internet, its security</em></ins></span> is
<span class="removed"><del><strong>being discontinued, which means that
eventually authorized materials won't
-be available and the printers may become unusable.</p>
+be available</strong></del></span> <span
class="inserted"><ins><em>crap</a>.</p>
-<p>With a</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to</em></ins></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
-even be</strong></del></span> <span class="inserted"><ins><em>Internet, its
security is crap</a>.</p>
-
- <p>For example,</em></ins></span> a <span
class="removed"><del><strong>remote possibility.</p>
-
-<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>cracker can gain access to</em></ins></span> the
<span class="removed"><del><strong>author of that article says that there was
-“nothing wrong”</strong></del></span> <span
class="inserted"><ins><em>dishwasher's
- filesystem, infect it</em></ins></span> with <span
class="removed"><del><strong>designing</strong></del></span> <span
class="inserted"><ins><em>malware, and force</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>dishwasher</em></ins></span> to <span
class="removed"><del><strong>restrict users</strong></del></span> <span
class="inserted"><ins><em>launch
- attacks on other devices</em></ins></span> in the <span
class="removed"><del><strong>first place. This is like putting a “cheat
me and mistreat me”
-sign</strong></del></span> <span class="inserted"><ins><em>network. Since
these dishwashers are
+ <p>For example, a cracker can gain access to the dishwasher's
+ filesystem, infect it with malware,</em></ins></span> and <span
class="inserted"><ins><em>force</em></ins></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
+
+<p>With a</strong></del></span> <span
class="inserted"><ins><em>dishwasher to launch
+ attacks on other devices in the network. Since these dishwashers are
used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
</li>
<li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</em></ins></span> on <span class="removed"><del><strong>your
chest. We should know better: we should condemn all companies
-that take advantage</strong></del></span> <span class="inserted"><ins><em>its
users through the proprietary control app</a>.</p>
-
- <p>The app was reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>people like him. Indeed,</strong></del></span>
<span class="inserted"><ins><em>the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was surrounded by a person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>acceptance of</strong></del></span> <span
class="inserted"><ins><em>vibration frequency.</p>
-
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements
about</em></ins></span> their <span class="removed"><del><strong>unjust
practice</strong></del></span>
- <span class="inserted"><ins><em>products, rather than free software which
users could have checked
- and changed.</p>
+ <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer that gets</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through</em></ins></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
+even be a remote possibility.</p>
+
+<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>proprietary control app</a>.</p>
+
+ <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>author</strong></del></span> <span
class="inserted"><ins><em>temperature</em></ins></span> of <span
class="removed"><del><strong>that article says that there</strong></del></span>
<span class="inserted"><ins><em>the vibrator minute by
+ minute (thus, indirectly, whether it</em></ins></span> was
+<span class="removed"><del><strong>“nothing wrong” with
designing</strong></del></span> <span class="inserted"><ins><em>surrounded by a
person's
+ body), as well as</em></ins></span> the <span
class="removed"><del><strong>device to restrict users in</strong></del></span>
<span class="inserted"><ins><em>vibration frequency.</p>
+
+ <p>Note</em></ins></span> the <span
class="removed"><del><strong>first place. This is like
putting</strong></del></span> <span class="inserted"><ins><em>totally
inadequate proposed response:</em></ins></span> a <span
class="removed"><del><strong>“cheat me</strong></del></span> <span
class="inserted"><ins><em>labeling
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have
checked</em></ins></span>
+ and <span class="removed"><del><strong>mistreat me”
+sign on your chest. We should know better: we should condemn all
companies</strong></del></span> <span
class="inserted"><ins><em>changed.</p>
- <p>The company</em></ins></span> that <span
class="removed"><del><strong>teaches</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+ <p>The company</em></ins></span> that <span
class="removed"><del><strong>take advantage</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about
how</em></ins></span> people <span
class="removed"><del><strong>to</strong></del></span>
+ was sued for collecting lots</em></ins></span> of <span
class="inserted"><ins><em>personal information about how</em></ins></span>
people <span class="removed"><del><strong>like him.
Indeed,</strong></del></span>
<span class="inserted"><ins><em>used it</a>.</p>
- <p>The company's statement that it was anonymizing the data
may</em></ins></span> be <span class="removed"><del><strong>doormats.</p>
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>acceptance of
+their unjust practice that teaches people to</strong></del></span> <span
class="inserted"><ins><em>data may</em></ins></span> be <span
class="removed"><del><strong>doormats.</p>
</li>
<li>
@@ -530,64 +543,63 @@
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything</em></ins></span> that <span
class="removed"><del><strong>this</strong></del></span> is <span
class="removed"><del><strong>an “open” platform
so</strong></del></span> <span class="inserted"><ins><em>viewed on them, and
not just broadcasts and
cable</a>. Even if</em></ins></span> the
-<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>fault</strong></del></span> <span
class="inserted"><ins><em>user's own computer,
- the TV reports what it is. The existence</em></ins></span> of <span
class="removed"><del><strong>app developers. That is clearly
true</strong></del></span> <span class="inserted"><ins><em>a way to disable the
- surveillance, even</em></ins></span> if <span class="inserted"><ins><em>it
were not hidden as it was in these TVs,
- does not legitimize the surveillance.</p>
- </li>
-
- <li id="M201612230">
- <p>VR equipment, measuring every slight motion,
- creates the potential for</em></ins></span> the <span
class="removed"><del><strong>apps are proprietary software.</p>
+<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>fault of app developers. That is clearly true
if</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
+ the <span class="removed"><del><strong>apps are proprietary
software.</p>
-<p>Anything whose name is “Smart” is</strong></del></span>
most <span class="removed"><del><strong>likely going</strong></del></span>
<span class="inserted"><ins><em>intimate
- surveillance ever. All it takes</em></ins></span> to
+<p>Anything whose name is “Smart” is most likely
going</strong></del></span> <span class="inserted"><ins><em>TV reports what it
is. The existence of a way</em></ins></span> to
<span class="removed"><del><strong>screw you.</p>
</li>
<li>
<p>
-Malware found on</strong></del></span> <span class="inserted"><ins><em>make
this potential real</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+Malware found on <a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
security cameras available through Amazon</a>.
</p>
<p>A camera that records locally on physical media, and has no network
connection, does not threaten people with surveillance—neither
-by watching people through the camera, nor through
malware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
- software as malicious as many other programs listed</em></ins></span> in
<span class="inserted"><ins><em>this
- page</a>.</p>
-
- <p>You can bet Facebook will implement</em></ins></span> the
-<span class="removed"><del><strong>camera.</p>
-</li>
-
-<li>
-<p> <a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-FitBit fitness trackers have</strong></del></span> <span
class="inserted"><ins><em>maximum possible
- surveillance on Oculus Rift devices. The moral is, never
trust</em></ins></span> a <span class="removed"><del><strong>Bluetooth
vulnerability</a> that allows
-attackers to send malware to the devices, which can subsequently
-spread to computers and other FitBit trackers that
interact</strong></del></span> <span class="inserted"><ins><em>VR
- system</em></ins></span> with
-<span class="removed"><del><strong>them.</p></strong></del></span> <span
class="inserted"><ins><em>nonfree software in it.</p></em></ins></span>
+by watching people through</strong></del></span> <span
class="inserted"><ins><em>disable</em></ins></span> the <span
class="removed"><del><strong>camera, nor through malware</strong></del></span>
+ <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was</em></ins></span> in <span class="inserted"><ins><em>these TVs,
+ does not legitimize</em></ins></span> the
+<span class="removed"><del><strong>camera.</p></strong></del></span>
<span class="inserted"><ins><em>surveillance.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p> “Self-encrypting” disk drives do the encryption with
-proprietary firmware so you can't trust it. Western
Digital's</strong></del></span>
+<p></strong></del></span>
- <span class="inserted"><ins><em><li id="M201612200">
- <p>The developer of Ham Radio Deluxe</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
-“My Passport” drives have a back door</a>.</p>
+ <span class="inserted"><ins><em><li id="M201612230">
+ <p>VR equipment, measuring every slight motion,
+ creates the potential for the most intimate
+ surveillance ever. All it takes to make this potential
real</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+FitBit fitness trackers have a Bluetooth vulnerability</a> that allows
+attackers to send malware to the devices, which can subsequently
+spread to computers and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software as malicious as many</em></ins></span> other <span
class="removed"><del><strong>FitBit trackers that interact with
+them.</p>
</li>
<li>
+<p> “Self-encrypting” disk drives do</strong></del></span>
<span class="inserted"><ins><em>programs listed in this
+ page</a>.</p>
+
+ <p>You can bet Facebook will implement</em></ins></span> the <span
class="removed"><del><strong>encryption with
+proprietary firmware so you can't</strong></del></span> <span
class="inserted"><ins><em>maximum possible
+ surveillance on Oculus Rift devices. The moral is, never</em></ins></span>
trust <span class="removed"><del><strong>it. Western Digital's <a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+“My Passport” drives have</strong></del></span> a <span
class="removed"><del><strong>back
door</a>.</p></strong></del></span> <span
class="inserted"><ins><em>VR
+ system with nonfree software in it.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
Hospira infusion pumps, which are used to administer drugs
to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged</em></ins></span>
+
+ <span class="inserted"><ins><em><li id="M201612200">
+ <p>The developer of Ham Radio Deluxe <a
+
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged</em></ins></span>
a <span class="removed"><del><strong>patient, were rated “<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
least secure IP device I've ever seen</a>”
by</strong></del></span> <span class="inserted"><ins><em>customer's
installation as punishment for posting</em></ins></span> a <span
class="removed"><del><strong>security
@@ -612,17 +624,23 @@
necessary. This would enable crackers</em></ins></span> to <span
class="removed"><del><strong>bad security</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> in <span
class="inserted"><ins><em>on</em></ins></span> a <span
class="removed"><del><strong>drug pump, crackers</strong></del></span> <span
class="inserted"><ins><em>child's
conversations, and even speak into the toys themselves.</p>
- <p>This means a burglar</em></ins></span> could <span
class="removed"><del><strong>use it to <a
+ <p>This means a burglar</em></ins></span> could <span
class="removed"><del><strong>use it</strong></del></span> <span
class="inserted"><ins><em>speak into the toys and ask the
child</em></ins></span>
+ to <span class="removed"><del><strong><a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
-kill patients</a>.</p>
-</li>
+kill patients</a>.</p></strong></del></span> <span
class="inserted"><ins><em>unlock the front door while Mommy's not
looking.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p><a
href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“Smart homes”</a> turn out to be stupidly
vulnerable</strong></del></span> <span class="inserted"><ins><em>speak into the
toys and ask the child</em></ins></span>
- to
-<span class="removed"><del><strong>intrusion.</p></strong></del></span>
<span class="inserted"><ins><em>unlock the front door while Mommy's not
looking.</p></em></ins></span>
+“Smart homes”</a> turn out to be stupidly
vulnerable</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609200">
+ <p>HP's firmware downgrade <a
+
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">imposed
+ DRM on some printers, which now refuse</em></ins></span> to
+<span class="removed"><del><strong>intrusion.</p></strong></del></span>
<span class="inserted"><ins><em>function with third-party
+ ink cartridges</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -645,100 +663,62 @@
<span
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
kill</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
- unauthorized</em></ins></span> people <span
class="removed"><del><strong>by taking</strong></del></span> <span
class="inserted"><ins><em>can remotely</em></ins></span> control <span
class="inserted"><ins><em>it</a>.</p>
+ unauthorized</em></ins></span> people <span
class="removed"><del><strong>by taking</strong></del></span> <span
class="inserted"><ins><em>can remotely</em></ins></span> control <span
class="removed"><del><strong>of medical implants by radio</a>. More
+information in <a
+href="http://www.bbc.co.uk/news/technology-17631838">BBC
News</a></strong></del></span> <span
class="inserted"><ins><em>it</a>.</p>
<p>Samsung claims that this is an “open” platform so the
- problem is partly the fault</em></ins></span> of <span
class="removed"><del><strong>medical implants by radio</a>. More
-information in <a
-href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
-<a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app developers. That is clearly true
+ problem is partly the fault of app developers. That is clearly true
if the apps are proprietary software.</p>
<p>Anything whose name is “Smart” is most likely going
- to screw you.</p></em></ins></span>
+ to screw you.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Lots of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201604110">
- <p>Malware was found on</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
-hospital equipment has lousy security</a>, and it can be fatal.</p>
-</li>
-
-<li>
-<p><a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken
over</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+ <li id="M201604110">
+ <p>Malware was found on <a
+
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
security cameras available through Amazon</a>.</p>
- <p>A camera that records locally on physical
media,</em></ins></span> and <span class="removed"><del><strong>turned
-into a botnet for</strong></del></span> <span class="inserted"><ins><em>has no
network
+ <p>A camera that records locally on physical
media,</em></ins></span> and <span class="inserted"><ins><em>has no network
connection, does not threaten people with surveillance—neither
- by watching people through</em></ins></span> the <span
class="removed"><del><strong>purpose of collecting customers' credit card
-numbers.</p></strong></del></span> <span
class="inserted"><ins><em>camera, nor through malware in the
- camera.</p></em></ins></span>
+ by watching people through the camera, nor through malware in the
+ camera.</p>
</li>
- <li <span class="removed"><del><strong>id="vizio-snoop">
-<p>Vizio</strong></del></span> <span
class="inserted"><ins><em>id="M201604050">
- <p>Google/Alphabet</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
-used</strong></del></span>
+ <li id="M201604050">
+ <p>Google/Alphabet</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+IOActive Labs Research blog</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
intentionally broke Revolv home automatic control products that
- depended on</em></ins></span> a <span
class="removed"><del><strong>firmware
“upgrade”</strong></del></span> <span
class="inserted"><ins><em>server</a></em></ins></span> to <span
class="removed"><del><strong>make its TVs snoop on what
-users watch</a>.</strong></del></span> <span
class="inserted"><ins><em>function, by shutting down the
server.</em></ins></span>
- The <span class="removed"><del><strong>TVs did not
do</strong></del></span> <span class="inserted"><ins><em>lesson is, reject all
such products. Insist on self-contained
- computers</em></ins></span> that <span class="removed"><del><strong>when
first sold.</p></strong></del></span> <span class="inserted"><ins><em>run
free software!</p></em></ins></span>
+ depended on a server</a> to function, by shutting down the server.
+ The lesson is, reject all such products. Insist on self-contained
+ computers that run free software!</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>LG</strong></del></span>
+<p>Lots</strong></del></span>
<span class="inserted"><ins><em><li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
-disabled network features</a> on <em>previously
purchased</em>
-“smart” TVs, unless the purchasers agreed to let LG
-begin to snoop on them and distribute their personal data.</p>
-</li>
-
-<li>
-<p><a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
-Barbie is going</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone</em></ins></span> to <span
class="removed"><del><strong>spy</a> on children and adults.</p>
-</li>
-
-<li>
-<p><a
-href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-Cisco TNP IP phones are spying
devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch through
them</a>.</p></em></ins></span>
+ <p>Over 70 brands of network-connected surveillance cameras have
<a
+
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone to watch through them</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201601100"></em></ins></span>
+ <li id="M201601100">
<p>The <a
-<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">Nest
Cam
-“smart” camera</strong></del></span>
- <span
class="inserted"><ins><em>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+ href="http://michaelweinberg.org/post/137045828005/free-the-cube">
“Cube” 3D printer was designed with DRM</a>: it
- won't accept third-party printing materials. It</em></ins></span> is
<span class="removed"><del><strong>always watching</a>, even
when</strong></del></span> the
-<span class="removed"><del><strong>“owner”
switches</strong></del></span> <span class="inserted"><ins><em>Keurig of
- printers. Now</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
-
-<p>A “smart” device</strong></del></span> <span
class="inserted"><ins><em>is being discontinued, which</em></ins></span> means
<span class="inserted"><ins><em>that eventually
- authorized materials won't be available and</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to
outsmart</strong></del></span> <span class="inserted"><ins><em>printers may
become
+ won't accept third-party printing materials. It is the
Keurig</em></ins></span> of
+ <span class="inserted"><ins><em>printers. Now it is being discontinued,
which means that eventually
+ authorized materials won't be available and the printers may become
unusable.</p>
- <p>With a <a
- href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ <p>With a</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+hospital equipment has lousy security</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
printer that gets the Respects Your Freedom</a>, this problem would
not even be a remote possibility.</p>
@@ -781,12 +761,10 @@
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
- to outsmart</em></ins></span> you.</p>
+ to outsmart you.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511198">
+ <li id="M201511198">
<p>ARRIS cable modem has a <a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
back door in the back door</a>.</p>
@@ -856,29 +834,38 @@
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
- record</a>.</p>
+ snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>it can be fatal.</p></strong></del></span>
<span class="inserted"><ins><em>even what they wanted to
+ record</a>.</p></em></ins></span>
</li>
- <li id="M201505050">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505050">
<p>Hospira infusion pumps, which are used
- to administer drugs to a patient, were rated “<a
+ to administer drugs to a patient,</em></ins></span> were <span
class="removed"><del><strong>taken over</a> and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated “<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
- secure IP device I've ever seen</a>” by a security
+ secure IP device I've ever seen</a>” by</em></ins></span> a
<span class="removed"><del><strong>botnet for</strong></del></span> <span
class="inserted"><ins><em>security
researcher.</p>
- <p>Depending on what drug is being infused, the insecurity could open
- the door to murder.</p>
+ <p>Depending on what drug is being infused,</em></ins></span> the
<span class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.</p></strong></del></span> <span
class="inserted"><ins><em>insecurity could open
+ the door to murder.</p></em></ins></span>
</li>
- <li id="M201504300"></em></ins></span>
- <p>Vizio <span
class="removed"><del><strong>goes</strong></del></span> <span
class="inserted"><ins><em><a
+ <li <span
class="removed"><del><strong>id="vizio-snoop"></strong></del></span> <span
class="inserted"><ins><em>id="M201504300"></em></ins></span>
+ <p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used</em></ins></span> a <span class="removed"><del><strong>step further
than</strong></del></span> <span class="inserted"><ins><em>firmware
“upgrade” to make its TVs snoop on what
+ used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
- <li id="M201502180">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
@@ -888,8 +875,8 @@
<p>The Samsung “Smart” TV <a
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
transmits users' voice on the internet to another company,
Nuance</a>.
- Nuance can save it and would then have to give it to the US or
some</em></ins></span>
- other <span class="inserted"><ins><em>government.</p>
+ Nuance can save it and would then have to give it to the US or some
+ other government.</p>
<p>Speech recognition is not to be trusted unless it is done by free
software in your own computer.</p>
@@ -917,7 +904,7 @@
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the</em></ins></span> TV
<span class="removed"><del><strong>manufacturers in
spying</strong></del></span> <span class="inserted"><ins><em>will not
+ say, “Without your consent to tracking, the TV will not
work.”</p>
<p>Proper laws would say that TVs are not allowed to report what the
@@ -930,29 +917,54 @@
data about the user</a>.</p>
</li>
- <li id="M201405201">
+ <li id="M201405201"></em></ins></span>
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- disabled network features</a></em></ins></span> on <span
class="inserted"><ins><em><em>previously purchased</em>
+ disabled network features</a> on <em>previously
purchased</em>
“smart” TVs, unless the purchasers agreed to let LG begin
- to snoop on them and distribute</em></ins></span> their <span
class="removed"><del><strong>users: their</strong></del></span> <span
class="inserted"><ins><em>personal data.</p>
+ to snoop on them and distribute their personal data.</p>
</li>
- <li id="M201404250">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
+Barbie is going to spy</a> on children and adults.</p>
+</li>
+
+<li>
+<p><a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+Cisco TNP IP phones are spying devices</a>.</p>
+</li>
+
+<li>
+<p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201404250">
<p>Lots of</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
-“smart” TVs analyze your viewing habits in
detail</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>,</em></ins></span> and
-<span class="removed"><del><strong>link them your IP address</a> so that
advertisers</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> can <span
class="removed"><del><strong>track you
-across devices.</p>
+<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">Nest
Cam
+“smart” camera is always watching</a>, even when the
+“owner” switches it “off.”</p>
-<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>be fatal.</p>
+<p>A “smart” device means the manufacturer is
using</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ hospital equipment has lousy security</a>, and</em></ins></span> it
<span class="removed"><del><strong>to outsmart
+you.</p></strong></del></span> <span class="inserted"><ins><em>can be
fatal.</p></em></ins></span>
</li>
- <li id="M201312290">
+<span class="removed"><del><strong><li>
+<p>Vizio goes a step further than other TV manufacturers in spying on
+their users: their <a
+href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+“smart” TVs analyze your viewing habits in detail and
+link</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312290">
<p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
- memories have modifiable software</a>, which makes them
vulnerable</em></ins></span>
+ memories have modifiable software</a>, which makes</em></ins></span>
them <span class="removed"><del><strong>your IP address</a> so that
advertisers can track you
+across devices.</p>
+
+<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>vulnerable</em></ins></span>
to <span class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>viruses.</p>
<p>We don't call</em></ins></span> this <span
class="removed"><del><strong>off, but having</strong></del></span> <span
class="inserted"><ins><em>a “back door” because</em></ins></span>
it <span class="removed"><del><strong>enabled by default</strong></del></span>
is <span class="removed"><del><strong>an injustice already.</p>
@@ -1197,7 +1209,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 21:01:56 $
+$Date: 2018/10/07 20:58:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-appliances.de.po 1 Oct 2018 09:59:21 -0000 1.57
+++ malware-appliances.de.po 7 Oct 2018 20:58:30 -0000 1.58
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -73,7 +73,16 @@
"sein würden bösartige Funktionen zu beheben, dazu verführt einige "
"aufzuerlegen."
+# Beispiele für _Programme_mit_Schadwirkung_ in Geräten:
#. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-appliances.-] {+appliances
+# | are listed below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in appliances."
+msgid "Some examples of malware in appliances are listed below."
+msgstr "Beispiele für Schadsoftware in Geräten:"
+
+#. type: Content of: <div><div><p>
# || No change detected. The change might only be in amounts of spaces.
#, fuzzy
#| msgid ""
@@ -93,11 +102,6 @@
"die URL einer vertrauenswürdigen Referenz (oder zwei) an, um die "
"Einzelheiten aufzuzeigen."
-# Beispiele für _Programme_mit_Schadwirkung_ in Geräten:
-#. type: Content of: <p>
-msgid "Here are examples of malware in appliances."
-msgstr "Beispiele für Schadsoftware in Geräten:"
-
#. type: Content of: <ul><li><p>
msgid ""
"Honeywell's “smart” thermostats communicate only through the "
@@ -626,6 +630,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"HP's firmware downgrade <a href=\"https://www.theguardian.com/"
+"technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-"
+"update\">imposed DRM on some printers, which now refuse to function with "
+"third-party ink cartridges</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
"thermostat that uses proprietary software</a>."
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- malware-appliances.fr.po 1 Oct 2018 11:16:18 -0000 1.86
+++ malware-appliances.fr.po 7 Oct 2018 20:58:30 -0000 1.87
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
"PO-Revision-Date: 2018-10-01 13:15+0200\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-07 20:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -63,6 +64,15 @@
"fonctionnalité malveillante, est tenté de leur en imposer quelques-unes."
#. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-appliances.-] {+appliances
+# | are listed below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in appliances."
+msgid "Some examples of malware in appliances are listed below."
+msgstr ""
+"Voici quelques exemples de malveillance dans divers appareils et
équipements."
+
+#. type: Content of: <div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
@@ -75,11 +85,6 @@
"Merci de fournir les URL d'une ou deux références fiables décrivant le "
"problème."
-#. type: Content of: <p>
-msgid "Here are examples of malware in appliances."
-msgstr ""
-"Voici quelques exemples de malveillance dans divers appareils et
équipements."
-
#. type: Content of: <ul><li><p>
msgid ""
"Honeywell's “smart” thermostats communicate only through the "
@@ -661,6 +666,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"HP's firmware downgrade <a href=\"https://www.theguardian.com/"
+"technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-"
+"update\">imposed DRM on some printers, which now refuse to function with "
+"third-party ink cartridges</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
"thermostat that uses proprietary software</a>."
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-appliances.pot 1 Oct 2018 09:59:21 -0000 1.43
+++ malware-appliances.pot 7 Oct 2018 20:58:30 -0000 1.44
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -50,6 +50,10 @@
msgstr ""
#. type: Content of: <div><p>
+msgid "Some examples of malware in appliances are listed below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a "
@@ -58,10 +62,6 @@
"specifics."
msgstr ""
-#. type: Content of: <p>
-msgid "Here are examples of malware in appliances."
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"Honeywell's “smart” thermostats communicate only through the "
@@ -447,6 +447,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"HP's firmware downgrade <a "
+"href=\"https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update\">imposed
"
+"DRM on some printers, which now refuse to function with third-party ink "
+"cartridges</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ransomware <a "
"href=\"https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/\">
"
"has been developed for a thermostat that uses proprietary software</a>."
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- malware-appliances.ru.po 1 Oct 2018 15:58:20 -0000 1.116
+++ malware-appliances.ru.po 7 Oct 2018 20:58:30 -0000 1.117
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-01 09:56+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
"PO-Revision-Date: 2018-10-01 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-07 20:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -65,6 +66,14 @@
"вноÑиÑÑ Ñакие ÑÑнкÑии."
#. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-appliances.-] {+appliances
+# | are listed below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in appliances."
+msgid "Some examples of malware in appliances are listed below."
+msgstr "ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в
бÑÑовой ÑеÑ
нике."
+
+#. type: Content of: <div><div><p>
msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
@@ -76,10 +85,6 @@
"address@hidden></a>. УпомÑниÑе один-два
заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, "
"ÑÑÐ¾Ð±Ñ Ð¿ÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи."
-#. type: Content of: <p>
-msgid "Here are examples of malware in appliances."
-msgstr "ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в
бÑÑовой ÑеÑ
нике."
-
#. type: Content of: <ul><li><p>
msgid ""
"Honeywell's “smart” thermostats communicate only through the "
@@ -656,6 +661,14 @@
#. type: Content of: <ul><li><p>
msgid ""
+"HP's firmware downgrade <a href=\"https://www.theguardian.com/"
+"technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-"
+"update\">imposed DRM on some printers, which now refuse to function with "
+"third-party ink cartridges</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Ransomware <a href=\"https://www.pentestpartners.com/security-blog/"
"thermostat-ransomware-a-lesson-in-iot-security/\"> has been developed for a "
"thermostat that uses proprietary software</a>."
Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- malware-cars.de-diff.html 5 Oct 2018 21:01:56 -0000 1.4
+++ malware-cars.de-diff.html 7 Oct 2018 20:58:32 -0000 1.5
@@ -23,22 +23,46 @@
<!--#include virtual="/server/banner.html" -->
<h2>Malware In Cars</h2>
-<p><a href="/proprietary/proprietary.html">Other examples of
proprietary malware</a></p>
+<p><a href="/proprietary/proprietary.html">Other examples of
proprietary
+malware</a></p>
-<span class="inserted"><ins><em><div class="highlight-para">
+<span class="removed"><del><strong><p>Here</strong></del></span>
+
+<span class="inserted"><ins><em><div class="comment">
+<p>
+<em>Malware</em> means software designed to function in ways that
+mistreat or harm the user. (This does not include accidental errors.)
+</p>
+
+<p>
+Malware and nonfree software</em></ins></span> are <span
class="inserted"><ins><em>two different issues. The difference
+between <a href="/philosophy/free-sw.html">free software</a> and
+nonfree software is in <a
+href="/philosophy/free-software-even-more-important.html">
+whether the users have control of the program or vice versa</a>. It's
+not directly a question of what the program <em>does</em> when it
+runs. However, in practice nonfree software is often malware, because
+the developer's awareness that the users would be powerless to fix any
+malicious functionalities tempts the developer to impose some.
+</p>
+
+<p>Some</em></ins></span> examples of malware in <span
class="removed"><del><strong>cars.</p>
+
+<ul>
+<li>
+<p>Tesla used</strong></del></span> <span class="inserted"><ins><em>cars
are listed below.</p>
+
+<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>universal backdoor</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
to present the specifics.</p>
-</div></em></ins></span>
-
-<p>Here are examples of malware in cars.</p>
-
-<span class="removed"><del><strong><ul>
-<li></strong></del></span>
+</div>
+</div>
+<div class="column-limit"></div>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<!-- INSERT cars -->
<li id="M201711230">
<p>AI-powered driving apps can <a
@@ -47,13 +71,13 @@
</li>
<li id="M201709290">
- <p>Bad security in some cars makes it possible to <a
+ <p>Bad security</em></ins></span> in <span
class="removed"><del><strong>its</strong></del></span> <span
class="inserted"><ins><em>some cars makes it possible to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
remotely activate the airbags</a>.</p>
</li>
- <li id="M201709091"></em></ins></span>
- <p>Tesla used <span class="removed"><del><strong>a universal
backdoor in its</strong></del></span> software to limit <span
class="removed"><del><strong>customers to
+ <li id="M201709091">
+ <p>Tesla used</em></ins></span> software to limit <span
class="removed"><del><strong>customers to
using just <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/"></strong></del></span>
<span class="inserted"><ins><em>the</em></ins></span> part of the battery
<span class="removed"><del><strong>of</strong></del></span>
<span class="inserted"><ins><em>that was available to customers
in</em></ins></span> some <span
class="removed"><del><strong>cars</a>.</p></strong></del></span>
<span class="inserted"><ins><em>cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -317,7 +341,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/05 21:01:56 $
+$Date: 2018/10/07 20:58:32 $
<!-- timestamp end -->
</p>
</div>
Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- malware-cars.de.po 30 Sep 2018 20:27:53 -0000 1.9
+++ malware-cars.de.po 7 Oct 2018 20:58:32 -0000 1.10
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-cars.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-09-30 20:25+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -33,6 +33,32 @@
"<a href=\"/proprietary/\">Weitere Beispiele proprietrer Schadsoftware</a>"
#. type: Content of: <div><p>
+msgid ""
+"<em>Malware</em> means software designed to function in ways that mistreat "
+"or harm the user. (This does not include accidental errors.)"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Malware and nonfree software are two different issues. The difference "
+"between <a href=\"/philosophy/free-sw.html\">free software</a> and nonfree "
+"software is in <a href=\"/philosophy/free-software-even-more-important.html"
+"\"> whether the users have control of the program or vice versa</a>. It's "
+"not directly a question of what the program <em>does</em> when it runs. "
+"However, in practice nonfree software is often malware, because the "
+"developer's awareness that the users would be powerless to fix any malicious "
+"functionalities tempts the developer to impose some."
+msgstr ""
+
+#. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-cars.-] {+cars are listed
+# | below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in cars."
+msgid "Some examples of malware in cars are listed below."
+msgstr "Beispiele für Schadsoftware in Pkws:"
+
+#. type: Content of: <div><div><p>
# || No change detected. The change might only be in amounts of spaces.
#, fuzzy
#| msgid ""
@@ -52,10 +78,6 @@
"die URL einer vertrauenswürdigen Referenz (oder zwei) an, um die "
"Einzelheiten aufzuzeigen."
-#. type: Content of: <p>
-msgid "Here are examples of malware in cars."
-msgstr "Beispiele für Schadsoftware in Pkws:"
-
#. type: Content of: <ul><li><p>
msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-cars.fr.po 30 Sep 2018 21:07:38 -0000 1.12
+++ malware-cars.fr.po 7 Oct 2018 20:58:32 -0000 1.13
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-09-30 20:25+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
"PO-Revision-Date: 2018-09-30 23:07+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-07 20:56+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -33,6 +34,44 @@
#. type: Content of: <div><p>
msgid ""
+"<em>Malware</em> means software designed to function in ways that mistreat "
+"or harm the user. (This does not include accidental errors.)"
+msgstr ""
+"Un logiciel est dit « malveillant » lorsque son fonctionnement a été
conçu "
+"pour traiter l'utilisateur de manière inéquitable ou lui faire du tort "
+"(erreurs accidentelles mises à part)."
+
+#. type: Content of: <div><p>
+msgid ""
+"Malware and nonfree software are two different issues. The difference "
+"between <a href=\"/philosophy/free-sw.html\">free software</a> and nonfree "
+"software is in <a href=\"/philosophy/free-software-even-more-important.html"
+"\"> whether the users have control of the program or vice versa</a>. It's "
+"not directly a question of what the program <em>does</em> when it runs. "
+"However, in practice nonfree software is often malware, because the "
+"developer's awareness that the users would be powerless to fix any malicious "
+"functionalities tempts the developer to impose some."
+msgstr ""
+"Logiciel malveillant et logiciel non libre sont deux notions différentes. La
"
+"différence entre <a href=\"/philosophy/free-sw.html\">logiciel libre</a> et "
+"logiciel non libre réside dans le fait que <a href=\"/philosophy/free-"
+"software-even-more-important.html\">les utilisateurs ont, ou non, le "
+"contrôle du programme</a>. Cela n'a rien à voir avec ce que <em>fait</em>
le "
+"programme en cours de fonctionnement. Cependant, en pratique, un logiciel "
+"non libre est souvent malveillant parce que le développeur, conscient que "
+"les utilisateurs seraient incapables de corriger une éventuelle "
+"fonctionnalité malveillante, est tenté de leur en imposer quelques-unes."
+
+#. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-cars.-] {+cars are listed
+# | below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in cars."
+msgid "Some examples of malware in cars are listed below."
+msgstr "Voici des exemples de voitures malveillantes."
+
+#. type: Content of: <div><div><p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
@@ -44,10 +83,6 @@
"Merci de fournir les URL d'une ou deux références fiables décrivant le "
"problème."
-#. type: Content of: <p>
-msgid "Here are examples of malware in cars."
-msgstr "Voici des exemples de voitures malveillantes."
-
#. type: Content of: <ul><li><p>
msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"
@@ -422,33 +457,3 @@
#~ msgstr ""
#~ "Ils ont pu suivre les déplacements de la voiture, démarrer et arrêter
le "
#~ "moteur, activer et désactiver les freins, et plus encore."
-
-#~ msgid ""
-#~ "<em>Malware</em> means software designed to function in ways that "
-#~ "mistreat or harm the user. (This does not include accidental errors.)"
-#~ msgstr ""
-#~ "Un logiciel est dit « malveillant » lorsque son fonctionnement a été
"
-#~ "conçu pour traiter l'utilisateur de manière inéquitable ou lui faire du
"
-#~ "tort (erreurs accidentelles mises à part)."
-
-#~ msgid ""
-#~ "Malware and nonfree software are two different issues. The difference "
-#~ "between <a href=\"/philosophy/free-sw.html\">free software</a> and "
-#~ "nonfree software is in <a href=\"/philosophy/free-software-even-more-"
-#~ "important.html\"> whether the users have control of the program or vice "
-#~ "versa</a>. It's not directly a question of what the program <em>does</"
-#~ "em> when it runs. However, in practice nonfree software is often "
-#~ "malware, because the developer's awareness that the users would be "
-#~ "powerless to fix any malicious functionalities tempts the developer to "
-#~ "impose some."
-#~ msgstr ""
-#~ "Logiciel malveillant et logiciel non libre sont deux notions différentes.
"
-#~ "La différence entre <a href=\"/philosophy/free-sw.html\">logiciel libre</"
-#~ "a> et logiciel non libre réside dans le fait que <a href=\"/philosophy/"
-#~ "free-software-even-more-important.html\">les utilisateurs ont, ou non, le "
-#~ "contrôle du programme</a>. Cela n'a rien à voir avec ce que
<em>fait</em> "
-#~ "le programme en cours de fonctionnement. Cependant, en pratique, un "
-#~ "logiciel non libre est souvent malveillant parce que le développeur, "
-#~ "conscient que les utilisateurs seraient incapables de corriger une "
-#~ "éventuelle fonctionnalité malveillante, est tenté de leur en imposer "
-#~ "quelques-unes."
Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- malware-cars.pot 30 Sep 2018 20:27:53 -0000 1.5
+++ malware-cars.pot 7 Oct 2018 20:58:32 -0000 1.6
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-09-30 20:25+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -32,6 +32,29 @@
#. type: Content of: <div><p>
msgid ""
+"<em>Malware</em> means software designed to function in ways that mistreat "
+"or harm the user. (This does not include accidental errors.)"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Malware and nonfree software are two different issues. The difference "
+"between <a href=\"/philosophy/free-sw.html\">free software</a> and nonfree "
+"software is in <a "
+"href=\"/philosophy/free-software-even-more-important.html\"> whether the "
+"users have control of the program or vice versa</a>. It's not directly a "
+"question of what the program <em>does</em> when it runs. However, in "
+"practice nonfree software is often malware, because the developer's "
+"awareness that the users would be powerless to fix any malicious "
+"functionalities tempts the developer to impose some."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid "Some examples of malware in cars are listed below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a "
"href=\"mailto:address@hidden"><address@hidden></a> to inform "
@@ -39,10 +62,6 @@
"specifics."
msgstr ""
-#. type: Content of: <p>
-msgid "Here are examples of malware in cars."
-msgstr ""
-
#. type: Content of: <ul><li><p>
msgid ""
"AI-powered driving apps can <a "
Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-cars.ru.po 1 Oct 2018 06:58:12 -0000 1.14
+++ malware-cars.ru.po 7 Oct 2018 20:58:32 -0000 1.15
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2018-09-30 20:25+0000\n"
+"POT-Creation-Date: 2018-10-07 20:56+0000\n"
"PO-Revision-Date: 2018-09-20 04:21-0500\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-07 20:56+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -36,6 +37,32 @@
#. type: Content of: <div><p>
msgid ""
+"<em>Malware</em> means software designed to function in ways that mistreat "
+"or harm the user. (This does not include accidental errors.)"
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
+"Malware and nonfree software are two different issues. The difference "
+"between <a href=\"/philosophy/free-sw.html\">free software</a> and nonfree "
+"software is in <a href=\"/philosophy/free-software-even-more-important.html"
+"\"> whether the users have control of the program or vice versa</a>. It's "
+"not directly a question of what the program <em>does</em> when it runs. "
+"However, in practice nonfree software is often malware, because the "
+"developer's awareness that the users would be powerless to fix any malicious "
+"functionalities tempts the developer to impose some."
+msgstr ""
+
+#. type: Content of: <div><p>
+# | [-Here are-]{+Some+} examples of malware in [-cars.-] {+cars are listed
+# | below.+}
+#, fuzzy
+#| msgid "Here are examples of malware in cars."
+msgid "Some examples of malware in cars are listed below."
+msgstr "ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в
авÑомобилÑÑ
."
+
+#. type: Content of: <div><div><p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden"><address@hidden"
"org></a> to inform us. Please include the URL of a trustworthy reference "
@@ -46,10 +73,6 @@
"address@hidden></a>. УпомÑниÑе один-два
заÑлÑживаÑÑиÑ
довеÑÐ¸Ñ URL, "
"ÑÑÐ¾Ð±Ñ Ð¿ÑоиллÑÑÑÑиÑоваÑÑ Ð¿Ð¾Ð´ÑобноÑÑи."
-#. type: Content of: <p>
-msgid "Here are examples of malware in cars."
-msgstr "ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм в
авÑомобилÑÑ
."
-
#. type: Content of: <ul><li><p>
msgid ""
"AI-powered driving apps can <a href=\"https://motherboard.vice.com/en_us/"