www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www licenses/license-list.fr.html licenses/po/l...


From: GNUN
Subject: www licenses/license-list.fr.html licenses/po/l...
Date: Wed, 10 Oct 2018 06:57:52 -0400 (EDT)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/10/10 06:57:51

Modified files:
        licenses       : license-list.fr.html 
        licenses/po    : license-list.fr-en.html 
        proprietary    : malware-microsoft.fr.html 
                         proprietary-sabotage.fr.html 
                         proprietary.fr.html 
        proprietary/po : malware-microsoft.fr-en.html 
                         proprietary-sabotage.fr-en.html 
                         proprietary.fr-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/license-list.fr.html?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/licenses/po/license-list.fr-en.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.26&r2=1.27

Patches:
Index: licenses/license-list.fr.html
===================================================================
RCS file: /web/www/www/licenses/license-list.fr.html,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- licenses/license-list.fr.html       15 Sep 2018 12:28:01 -0000      1.246
+++ licenses/license-list.fr.html       10 Oct 2018 10:57:51 -0000      1.247
@@ -1322,6 +1322,22 @@
 sous cette licence, puis l'ajouter au programme. Cette addition justifie
 d'émettre une nouvelle licence en GPLv3+.</p></dd>
 
+<dt><a id="fdk" href="http://directory.fsf.org/wiki/License:fdk";>Licence du kit
+de développement Fraunhofer</a> <span class="anchor-reference-id">(<a
+href="#fdk">#fdk</a>)</span></dt>
+<dd><p>C'est une licence de logiciel libre, sans plus. Elle est incompatible 
avec
+toutes les versions de la GNU GPL.</p>
+
+<p>Elle comporte un risque particulier sous forme d'une clause déclarant
+expressément qu'elle ne vous octroie aucune licence de brevet, tout en vous
+incitant à en acheter une. De ce fait, et aussi parce que l'auteur de la
+licence est connu pour se servir des brevets de manière agressive, nous vous
+invitons à beaucoup de prudence dans l'utilisation et la redistribution de
+tout logiciel régi par cette licence. Vous devez d'abord vous demander si le
+donneur de licence pourrait vouloir vous attaquer en justice pour violation
+de brevet. Si votre conclusion est que le programme est un appât pour vous
+piéger, il serait judicieux de l'éviter.</p></dd>
+
 <dt><a id="gnuplot" 
href="http://directory.fsf.org/wiki/License:Gnuplot";>Licence
 de Gnuplot</a> <span class="anchor-reference-id">(<a
 href="#gnuplot">#gnuplot</a>)</span></dt>
@@ -2805,7 +2821,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/09/15 12:28:01 $
+$Date: 2018/10/10 10:57:51 $
 
 <!-- timestamp end -->
 </p>

Index: licenses/po/license-list.fr-en.html
===================================================================
RCS file: /web/www/www/licenses/po/license-list.fr-en.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- licenses/po/license-list.fr-en.html 15 Sep 2018 12:28:02 -0000      1.124
+++ licenses/po/license-list.fr-en.html 10 Oct 2018 10:57:51 -0000      1.125
@@ -1323,6 +1323,22 @@
 and add it to the program. Adding that code to the CeCILL-covered
 program provides grounds to relicense it to GPLv3+.</p></dd>
 
+<dt><a id="fdk"
+       href="http://directory.fsf.org/wiki/License:fdk";>
+    Fraunhofer development kit license</a>
+    <span class="anchor-reference-id">(<a href="#fdk">#fdk</a>)</span></dt>
+<dd><p>This is a free software license as far as it goes. It is
+incompatible with any version of the GNU GPL.</p>
+
+<p>It has a special danger in the form of a term expressly stating it
+does not grant you any patent licenses, with an enticement to buy
+some.  Because of this, and because the license author is a known
+patent aggressor, we encourage you to be careful about using or
+redistributing any software under this license: you should first
+consider whether the licensor might want to sue you for patent
+infringement.  If you conclude that the program is bait for a patent
+trap, it would be wise to avoid the program.</p></dd>
+
 <dt><a id="gnuplot"
        href="http://directory.fsf.org/wiki/License:Gnuplot";>
     Gnuplot license</a>
@@ -2767,7 +2783,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/15 12:28:02 $
+$Date: 2018/10/10 10:57:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/malware-microsoft.fr.html       9 Oct 2018 12:28:17 -0000       
1.63
+++ proprietary/malware-microsoft.fr.html       10 Oct 2018 10:57:51 -0000      
1.64
@@ -303,10 +303,10 @@
 href="/proprietary/proprietary-back-doors.html#windows-update">porte dérobée
 universelle</a> ait été utilisée à cette occasion. Non seulement ces
 téléchargements non désirés ont <a
-href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>dangereusement
-puisé dans des ressources indispensables par ailleurs</a>, mais nombre des
-personnes qui ont laissé cette « mise à niveau » se faire ont constaté 
que
-c'était en fait une <a
+href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>compromis
+des opérations importantes dans des régions du monde mal connectées à
+Internet</a>, mais nombre des personnes qui ont laissé cette « mise à
+niveau » se faire ont constaté que c'était en fait une <a
 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>régression</a>.</p>
   </li>
 
@@ -656,7 +656,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 10:57:51 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/proprietary-sabotage.fr.html    9 Oct 2018 12:28:17 -0000       
1.54
+++ proprietary/proprietary-sabotage.fr.html    10 Oct 2018 10:57:51 -0000      
1.55
@@ -207,10 +207,10 @@
 href="/proprietary/proprietary-back-doors.html#windows-update">porte dérobée
 universelle</a> ait été utilisée à cette occasion. Non seulement ces
 téléchargements non désirés ont <a
-href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>dangereusement
-puisé dans des ressources indispensables par ailleurs</a>, mais nombre des
-personnes qui ont laissé cette « mise à niveau » se faire ont constaté 
que
-c'était en fait une <a
+href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>compromis
+des opérations importantes dans des régions du monde mal connectées à
+Internet</a>, mais nombre des personnes qui ont laissé cette « mise à
+niveau » se faire ont constaté que c'était en fait une <a
 
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>régression</a>.</p>
   </li>
 
@@ -556,7 +556,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 10:57:51 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/proprietary.fr.html     18 Sep 2018 20:27:42 -0000      1.34
+++ proprietary/proprietary.fr.html     10 Oct 2018 10:57:51 -0000      1.35
@@ -1,7 +1,13 @@
 <!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
 
-<!--#include virtual="/server/header.fr.html" -->
-<!-- Parent-Version: 1.85 -->
+<!--#include virtual="/server/html5-header.fr.html" -->
+<!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+     Please do not edit lists with items such as <li id="Mnnnnnnnn">
+!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 
 <!-- This file is automatically generated by GNUnited Nations! -->
 <title>Logiciel privateur - Projet GNU - Free Software Foundation </title>
@@ -9,22 +15,35 @@
 <!--#include virtual="/proprietary/po/proprietary.translist" -->
 <style type="text/css" media="print,screen">
 <!--
-div.toc h3 {
-   text-align: left;
-   font-size: 1.2em;
-   padding: 0 .83em;
-   margin: .5em 1.5% 1em;
+.button { float: left; margin: .5em; }
+.button a { display: inline-block; }
+table#TOC {
+   display: block;
+   max-width: 100%;
+   overflow: auto;
+   margin: 2.5em auto;
+   background: #f5f5f5;
 }
-div.toc li { list-style: none; margin-bottom: 1em; }
-div.toc { margin-top: 1em; }
+#TOC th { font-size: 1.1em; }
+#TOC th, #TOC td { padding: .7em; text-align: center; }
+#TOC ul { padding-bottom: .5em; }
+#TOC ul li { margin: .5em 0; list-style: none; }
+#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
 -->
-div.companies { float: right; margin-bottom: .5em; }
-div.malfunctions { max-width: 27em; }
+
+</style>
+<style type="text/css" media="print,screen">
+#TOC { width: 40em; }
 </style>
 
 <!--#include virtual="/server/banner.fr.html" -->
 <h2>Le logiciel privateur est souvent malveillant</h2>
 
+<p class="button"><a href="#TOC">Table des matières</a></p>
+<p class="button"><a href="#latest">Ajouts récents</a></p>
+<div style="clear: both"></div>
+
 <p>On appelle logiciel privateur, ou logiciel non libre, un logiciel qui ne
 respecte pas <a href="/philosophy/free-sw.html">la liberté des utilisateurs
 et leur communauté</a>. Un programme privateur met son développeur ou son
@@ -47,53 +66,79 @@
 pratique courante de nos jours. Le logiciel privateur moderne est
 typiquement un moyen de mal se conduire.</p>
 
-<p>En septembre 2018, les fichiers de ce répertoire dénombrent environ 400 
cas
-de fonctionnalités malveillante, mais il y en a sûrement des milliers
-d'autres dont nous ne savons rien.</p>
-
-<div class="toc">
-<div class="companies">
-<h3>Société ou type de produit</h3>
-<ul>
-  <li><a href="/proprietary/malware-apple.html">Apple</a></li>
-  <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
-  <li><a href="/proprietary/malware-google.html">Google</a></li>
-  <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
-  <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
-  <li><a href="/proprietary/malware-webpages.html">Pages web</a></li>
-  <li><a href="/proprietary/malware-mobiles.html">Périphériques 
mobiles</a></li>
-  <li><a href="/proprietary/malware-games.html">Jeux</a></li>
+<p>En septembre 2018, les pages de ce répertoire dénombraient environ 350 cas
+de fonctionnalités malveillante (appuyés par près de 400 références), mais
+il y en a sûrement des milliers d'autres dont nous ne savons rien.</p>
+
+<table id="TOC">
+ <tr>
+  <th>Injustices ou techniques</th>
+  <th>Produits ou sociétés</th>
+ </tr>
+ <tr>
+  <td>
+   <ul>
+    <li><a href="/proprietary/proprietary-back-doors.html">Portes 
dérobées</a> (<a
+href="#f1">1</a>)</li>
+    <li><a href="/proprietary/proprietary-censorship.html">Censure</a></li>
+    <li><a href="/proprietary/proprietary-coverups.html">Dissimulation</a></li>
+    <li><a href="/proprietary/proprietary-deception.html">Tromperie</a></li>
+    <li><a href="/proprietary/proprietary-drm.html">DRM</a> (<a 
href="#f2">2</a>)</li>
+    <li><a 
href="/proprietary/proprietary-incompatibility.html">Incompatibilité</a></li>
+    <li><a 
href="/proprietary/proprietary-insecurity.html">Insécurité</a></li>
+    <li><a 
href="/proprietary/proprietary-interference.html">Ingérence</a></li>
+    <li><a href="/proprietary/proprietary-jails.html">Prisons</a> (<a
+href="#f3">3</a>)</li>
+    <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+    <li><a 
href="/proprietary/proprietary-subscriptions.html">Abonnements</a></li>
+    <li><a 
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+    <li><a href="/proprietary/proprietary-tethers.html">Ancrage à un 
serveur</a> (<a
+href="#f4">4</a>)</li>
+    <li><a href="/proprietary/proprietary-tyrants.html">Tyrannie</a> (<a
+href="#f5">5</a>)</li>
+    <li><a href="/proprietary/potential-malware.html">Dans les tuyaux</a></li>
+   </ul>
+  </td>
+  <td>
+   <ul>
   <li><a href="/proprietary/malware-appliances.html">Appareils divers</a></li>
   <li><a href="/proprietary/malware-cars.html">Voitures</a></li>
-</ul>
-</div>
-
-<div class="malfunctions">
-<h3>Type de malveillance</h3>
-<ul>
-<li><a href="/proprietary/proprietary-back-doors.html">Portes 
dérobées</a></li>
-<li><a href="/proprietary/proprietary-censorship.html">Censure</a></li>
-<li><a href="/proprietary/proprietary-coverups.html">Dissimulation</a></li>
-<li><a href="/proprietary/proprietary-deception.html">Tromperie</a></li>
-<li><a 
href="/proprietary/proprietary-incompatibility.html">Incompatibilité</a></li>
-<li><a href="/proprietary/proprietary-insecurity.html">Insécurité</a></li>
-<li><a href="/proprietary/proprietary-interference.html">Ingérence</a></li>
-<li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
-<li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
-<li><a href="/proprietary/proprietary-subscriptions.html">Abonnements</a></li>
-<li><a href="/proprietary/proprietary-tethers.html">Dépendance à un 
serveur</a></li>
-<li>« <a href="/proprietary/proprietary-drm.html">Gestion numérique des
-restrictions </a> » ou « <abbr title="Digital Restriction
-Management">DRM</abbr> » – fonctionnalités conçues pour limiter ce que 
les
-utilisateurs peuvent faire avec leurs ordinateurs.</li>
-<li><a href="/proprietary/proprietary-jails.html">Prisons</a> – systèmes qui
-imposent une censure aux programmes d'application.</li>
-<li><a href="/proprietary/proprietary-tyrants.html">Tyrans</a> – systèmes 
qui
-rejettent tout système d'exploitation non « autorisé » par le 
fabricant.</li>
-<li><a href="/proprietary/potential-malware.html">Malveillance 
potentielle</a></li>
-</ul>
-</div>
-</div>
+    <li><a href="/proprietary/malware-games.html">Jeux</a></li>
+    <li><a href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+    <li><a href="/proprietary/malware-webpages.html">Pages web</a></li>
+   </ul>
+   <ul>
+    <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
+    <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
+    <li><a href="/proprietary/malware-apple.html">Apple</a></li>
+    <li><a href="/proprietary/malware-google.html">Google</a></li>
+    <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+   </ul>
+  </td>
+ </tr>
+ <tr>
+  <td colspan="2">
+   <ol>
+    <li id="f1"><em>Porte dérobée :</em>  Tout programme en fonctionnement 
sur votre
+ordinateur qui est à l'écoute de commandes provenant d'un tiers, ce dernier
+pouvant lui dire de faire des choses sans vous demander la permission.</li>
+
+    <li id="f2"><em>Gestion numérique des restrictions ou « <abbr 
title="Digital Restriction
+Management">DRM</abbr> » :</em>  fonctionnalités conçues pour limiter ce 
que
+les utilisateurs peuvent faire avec leurs ordinateurs.</li>
+
+    <li id="f3"><em>Prison :</em>  système qui impose une censure aux 
programmes
+d'application.</li>
+
+    <li id="f4"><em>Ancrage à un serveur :</em>  nécessité d'une 
connexion fréquente ou
+permanente à un serveur.</li>
+
+    <li id="f5"><em>Tyrannie :</em>  rejet de tout système d'exploitation 
non « autorisé »
+par le fabricant.</li>
+   </ol>
+  </td>
+ </tr>
+</table>
 
 <p>Les utilisateurs de logiciel privateur sont sans défense contre ces formes
 d'abus. La seule manière de les éviter est d'exiger du <a
@@ -102,6 +147,63 @@
 se défendre contre les fonctionnalités malveillantes puisque ce sont eux qui
 le contrôlent.</p>
 
+
+<h3 id="latest">Ajouts récents</h3>
+
+<ul class="blurbs">
+
+  <!-- INSERT latest -->
+<li id="M201809260">
+    <p>Les thermostats « intelligents » d'Honeywell communiquent par
+l'intermédiaire du serveur de la société. Ils ont toutes les
+caractéristiques de ce genre d'appareil : <a
+href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9";>surveillance
+et risque de sabotage</a> (d'un utilisateur particulier ou de tous les
+utilisateurs en même temps), sans compter le risque de panne du serveur
+(c'est ce qui vient d'arriver).</p>
+
+    <p>De plus, le réglage de la température se fait au moyen d'un logiciel 
non
+libre. Avec un thermostat traditionnel, on peut le faire directement sur le
+thermostat.</p>
+  </li>
+
+  <li id="M201809240">
+    <p>Des chercheurs ont découvert un moyen de <a
+href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>cacher
+des commandes vocales dans d'autres flux audio</a>. Elles sont inaudibles
+pour les humains, mais Alexa et Siri peuvent les entendre.</p>
+  </li>
+
+  <li id="M201809140">
+    <p>Android a une <a
+href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>porte
+dérobée permettant de modifier à distance la configuration
+« utilisateur »</a>.</p>
+
+    <p>L'article suggère qu'il pourrait s'agir d'une porte dérobée 
universelle,
+mais ce n'est pas clair.</p>
+  </li>
+
+  <li id="M201809120">
+    <p>Une des versions de Windows 10 <a
+href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>sermonne
+les utilisateurs s'ils essaient d'installer Firefox (ou Chrome)</a>.</p>
+  </li>
+
+  <li id="M201712060">
+    <p>Apprenez comment <a
+href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html";>les
+jeux-gratuits-qui-rapportent-peu pratiquent la manipulation psychologique
+sur leurs « utilisés »</a>.</p>
+
+    <p>Ces comportements manipulateurs sont des fonctionnalités
+malveillantes. Elles sont possibles parce que le jeu est privateur. S'il
+était libre, les gens pourraient publier une version non manipulatrice et
+s'en servir de préférence à la version d'origine.</p>
+  </li>
+</ul>
+
+
 <div class="translators-notes">
 
 <!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
@@ -179,7 +281,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/09/18 20:27:42 $
+$Date: 2018/10/10 10:57:51 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/malware-microsoft.fr-en.html 9 Oct 2018 12:28:17 -0000       
1.59
+++ proprietary/po/malware-microsoft.fr-en.html 10 Oct 2018 10:57:51 -0000      
1.60
@@ -290,8 +290,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update">
     universal back door</a>. Not only did the unwanted downloads <a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
-    use up much needed resources</a>, but many of the people who let
-    installation proceed found out that this &ldquo;upgrade&rdquo; was in fact 
a <a
+    jeopardize important operations in regions of the world with poor
+    connectivity</a>, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a <a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
     downgrade</a>.</p>
   </li>
@@ -616,7 +617,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 10:57:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/proprietary-sabotage.fr-en.html      9 Oct 2018 12:28:17 
-0000       1.48
+++ proprietary/po/proprietary-sabotage.fr-en.html      10 Oct 2018 10:57:51 
-0000      1.49
@@ -201,8 +201,9 @@
     href="/proprietary/proprietary-back-doors.html#windows-update">
     universal back door</a>. Not only did the unwanted downloads <a
     
href="https://www.theregister.co.uk/2016/06/03/windows_10_upgrade_satellite_link/";>
-    use up much needed resources</a>, but many of the people who let
-    installation proceed found out that this &ldquo;upgrade&rdquo; was in fact 
a <a
+    jeopardize important operations in regions of the world with poor
+    connectivity</a>, but many of the people who let installation proceed
+    found out that this &ldquo;upgrade&rdquo; was in fact a <a
     
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146";>
     downgrade</a>.</p>
   </li>
@@ -519,7 +520,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/09 12:28:17 $
+$Date: 2018/10/10 10:57:51 $
 <!-- timestamp end -->
 </p>
 </div>

Index: proprietary/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary.fr-en.html       18 Sep 2018 20:27:43 -0000      
1.26
+++ proprietary/po/proprietary.fr-en.html       10 Oct 2018 10:57:51 -0000      
1.27
@@ -1,24 +1,42 @@
-<!--#include virtual="/server/header.html" -->
-<!-- Parent-Version: 1.85 -->
+<!--#include virtual="/server/html5-header.html" -->
+<!-- Parent-Version: 1.84 -->
+<!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+     Please do not edit lists with items such as <li id="Mnnnnnnnn">!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+-->
 <title>Proprietary Software
 - GNU Project - Free Software Foundation</title>
  <!--#include virtual="/proprietary/po/proprietary.translist" -->
 <style type="text/css" media="print,screen">
-div.companies { float: right; margin-bottom: .5em; }
-div.malfunctions { max-width: 27em; }
 <!--
-div.toc h3 {
-   text-align: left;
-   font-size: 1.2em;
-   padding: 0 .83em;
-   margin: .5em 1.5% 1em;
+.button { float: left; margin: .5em; }
+.button a { display: inline-block; }
+table#TOC {
+   display: block;
+   max-width: 100%;
+   overflow: auto;
+   margin: 2.5em auto;
+   background: #f5f5f5;
 }
-div.toc li { list-style: none; margin-bottom: 1em; }
-div.toc { margin-top: 1em; }
---></style>
+#TOC th { font-size: 1.1em; }
+#TOC th, #TOC td { padding: .7em; text-align: center; }
+#TOC ul { padding-bottom: .5em; }
+#TOC ul li { margin: .5em 0; list-style: none; }
+#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+-->
+</style>
+<style type="text/css" media="print,screen">
+#TOC { width: 40em; }
+</style>
 <!--#include virtual="/server/banner.html" -->
 <h2>Proprietary Software Is Often Malware</h2>
 
+<p class="button"><a href="#TOC">Table of contents</a></p>
+<p class="button"><a href="#latest">Latest additions</a></p>
+<div style="clear: both"></div>
+
 <p>Proprietary software, also called nonfree software,
 means software that doesn't
 <a href="/philosophy/free-sw.html">respect users' freedom and
@@ -42,62 +60,137 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.</p>
 
-<p>As of September, 2018, the files in this directory list around 400
-instances of malicious functionalities, but there are surely thousands
-more we don't know about.</p>
-
-<div class="toc">
-<div class="companies">
-<h3>Company or type of product</h3>
-<ul>
-  <li><a href="/proprietary/malware-apple.html">Apple Malware</a></li>
-  <li><a href="/proprietary/malware-microsoft.html">Microsoft Malware</a></li>
-  <li><a href="/proprietary/malware-google.html">Google Malware</a></li>
-  <li><a href="/proprietary/malware-adobe.html">Adobe Malware</a></li>
-  <li><a href="/proprietary/malware-amazon.html">Amazon Malware</a></li>
-  <li><a href="/proprietary/malware-webpages.html">Malware in webpages</a></li>
-  <li><a href="/proprietary/malware-mobiles.html">Malware in mobile 
devices</a></li>
-  <li><a href="/proprietary/malware-games.html">Malware in games</a></li>
-  <li><a href="/proprietary/malware-appliances.html">Malware in 
appliances</a></li>
-  <li><a href="/proprietary/malware-cars.html">Malware in cars</a></li>
-</ul>
-</div>
-
-<div class="malfunctions">
-<h3>Type&nbsp;of&nbsp;malware</h3>
-<ul>
-<li><a href="/proprietary/proprietary-back-doors.html">Back doors</a></li>
-<li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a href="/proprietary/proprietary-coverups.html">Coverups</a></li>
-<li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a 
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
-<li><a href="/proprietary/proprietary-interference.html">Interference</a></li>
-<li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
-<li><a href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
-<li><a 
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
-<li><a href="/proprietary/proprietary-tethers.html">Tethers</a> to
-servers</li>
-<li><a href="/proprietary/proprietary-drm.html">Digital restrictions
-    management</a> or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their computers.</li>
-<li><a href="/proprietary/proprietary-jails.html">Jails</a>&mdash;systems
-    that impose censorship on application programs.</li>
-<li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&mdash;systems
-    that reject any operating system not &ldquo;authorized&rdquo; by the
-    manufacturer.</li>
-<li><a href="/proprietary/potential-malware.html">Potential Malware</a></li>
-</ul>
-</div>
-</div>
+<p>As of September, 2018, the pages in this directory list nearly 350
+instances of malicious functionalities (with close to 400 references to
+back them up), but there are surely thousands more we don't know about.</p>
+
+<table id="TOC">
+ <tr>
+  <th>Injustices or techniques</th>
+  <th>Products or companies</th>
+ </tr>
+ <tr>
+  <td>
+   <ul>
+    <li><a href="/proprietary/proprietary-back-doors.html">Back 
doors</a>&nbsp;(<a href="#f1">1</a>)</li>
+    <li><a href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+    <li><a href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+    <li><a href="/proprietary/proprietary-deception.html">Deception</a></li>
+    <li><a href="/proprietary/proprietary-drm.html">DRM</a>&nbsp;(<a 
href="#f2">2</a>)</li>
+    <li><a 
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
+    <li><a href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+    <li><a 
href="/proprietary/proprietary-interference.html">Interference</a></li>
+    <li><a href="/proprietary/proprietary-jails.html">Jails</a>&nbsp;(<a 
href="#f3">3</a>)</li>
+    <li><a href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+    <li><a 
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+    <li><a 
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+    <li><a href="/proprietary/proprietary-tethers.html">Tethers</a>&nbsp;(<a 
href="#f4">4</a>)</li>
+    <li><a href="/proprietary/proprietary-tyrants.html">Tyrants</a>&nbsp;(<a 
href="#f5">5</a>)</li>
+    <li><a href="/proprietary/potential-malware.html">In the pipe</a></li>
+   </ul>
+  </td>
+  <td>
+   <ul>
+    <li><a href="/proprietary/malware-appliances.html">Appliances</a></li>
+    <li><a href="/proprietary/malware-cars.html">Cars</a></li>
+    <li><a href="/proprietary/malware-games.html">Games</a></li>
+    <li><a href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+    <li><a href="/proprietary/malware-webpages.html">Webpages</a></li>
+   </ul>
+   <ul>
+    <li><a href="/proprietary/malware-adobe.html">Adobe</a></li>
+    <li><a href="/proprietary/malware-amazon.html">Amazon</a></li>
+    <li><a href="/proprietary/malware-apple.html">Apple</a></li>
+    <li><a href="/proprietary/malware-google.html">Google</a></li>
+    <li><a href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+   </ul>
+  </td>
+ </tr>
+ <tr>
+  <td colspan="2">
+   <ol>
+    <li id="f1"><em>Back door:</em>&nbsp; any piece of software that is
+     running on your computer, and listens for commands from someone
+     else who can tell it to do things without asking your approval.</li>
+
+    <li id="f2"><em>Digital restrictions management, or
+     &ldquo;DRM&rdquo;:</em>&nbsp; functionalities designed to restrict
+     what users can do with the data in their computers.</li>
+
+    <li id="f3"><em>Jail:</em>&nbsp; system that imposes censorship on
+     application programs.</li>
+
+    <li id="f4"><em>Tether:</em>&nbsp; functionality that requires
+     permanent (or very frequent) connection to a server.</li>
+
+    <li id="f5"><em>Tyrant:</em>&nbsp; system that rejects any operating
+     system not &ldquo;authorized&rdquo; by the manufacturer.</li>
+   </ol>
+  </td>
+ </tr>
+</table>
 
 <p>Users of proprietary software are defenseless against these forms
 of mistreatment.  The way to avoid them is by insisting on
 <a href="/philosophy/free-software-even-more-important.html">free
-(freedom-respecting) software.</a>  Since free software is controlled
+(freedom-respecting) software</a>.  Since free software is controlled
 by its users, they have a pretty good defense against malicious
 software functionality.</p>
 
+
+<h3 id="latest">Latest additions</h3>
+
+<ul class="blurbs">
+<!-- INSERT latest -->
+  <li id="M201809260">
+    <p>Honeywell's &ldquo;smart&rdquo; thermostats communicate
+    only through the company's server. They have
+    all the nasty characteristics of such devices: <a
+    
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9";>
+    surveillance, and danger of sabotage</a> (of a specific user, or of
+    all users at once), as well as the risk of an outage (which is what
+    just happened).</p>
+
+    <p>In addition, setting the desired temperature requires running
+    nonfree software. With an old-fashioned thermostat, you can do it
+    using controls right on the thermostat.</p>
+  </li>
+
+  <li id="M201809240">
+    <p>Researchers have discovered how to <a
+    
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co";>
+    hide voice commands in other audio</a>, so that people cannot hear
+    them, but Alexa and Siri can.</p>
+  </li>
+
+  <li id="M201809140">
+    <p>Android has a <a
+    
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change";>
+    back door for remotely changing &ldquo;user&rdquo; settings</a>.</p>
+
+    <p>The article suggests it might be a universal back door, but this
+    isn't clear.</p>
+  </li>
+
+  <li id="M201809120">
+    <p>One version of Windows 10 <a
+    
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/";>
+    harangues users if they try to install Firefox (or Chrome)</a>.</p>
+  </li>
+
+  <li id="M201712060">
+    <p>Learn how <a
+    
href="https://www.huffingtonpost.com/joseph-farrell/the-fascinating-psycholog_b_6076502.html";>
+    gratis-to-play-and-not-win-much games manipulate their useds
+    psychologically</a>.</p>
+
+    <p>These manipulative behaviors are malicious functionalities, and they
+    are possible because the game is proprietary. If it were free, people
+    could publish a non-manipulative version and play that instead.</p>
+  </li>
+</ul>
+
+
 </div><!-- for id="content", starts in the include above -->
 <!--#include virtual="/server/footer.html" -->
 <div id="footer">
@@ -155,7 +248,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/09/18 20:27:43 $
+$Date: 2018/10/10 10:57:51 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]