[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po malware-appliances.de-diff.h...
From: |
GNUN |
Subject: |
www/proprietary/po malware-appliances.de-diff.h... |
Date: |
Mon, 22 Oct 2018 06:28:27 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/22 06:28:26
Modified files:
proprietary/po : malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po proprietary-drm.de.po
proprietary-drm.fr.po
proprietary-drm.it-diff.html
proprietary-drm.it.po
proprietary-drm.ja-diff.html
proprietary-drm.ja.po proprietary-drm.pot
proprietary-drm.ru.po
proprietary-sabotage.de.po
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru.po proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pot?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.16&r2=1.17
Patches:
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-appliances.de-diff.html 17 Oct 2018 10:01:35 -0000 1.12
+++ malware-appliances.de-diff.html 22 Oct 2018 10:28:25 -0000 1.13
@@ -64,18 +64,25 @@
here, please write</em></ins></span>
to <span class="removed"><del><strong>make</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
of</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>conversation between</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span>
two <span class="removed"><del><strong>users</a>.</p>
- </li>
-
- <li>
- <p>Every “home security” camera, if its manufacturer
can</strong></del></span>
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>conversation between</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span>
two <span
class="removed"><del><strong>users</a>.</p></strong></del></span>
<span class="inserted"><ins><em>to present the specifics.</p>
</div>
</div>
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
- <li id="M201809260">
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li>
+ <p>Every “home security” camera, if its manufacturer
can</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201809260">
<p>Honeywell's “smart” thermostats</em></ins></span>
communicate <span class="removed"><del><strong>with it,
is a surveillance device.</strong></del></span>
<span class="inserted"><ins><em>only through the company's server. They
have
@@ -130,21 +137,22 @@
<span class="inserted"><ins><em>broken devices continued. But I
think</em></ins></span> that <span class="inserted"><ins><em>is a secondary
issue;
it made</em></ins></span> the <span class="removed"><del><strong>article
uses</strong></del></span> <span class="inserted"><ins><em>nasty consequences
extend to some additional people.
The fundamental wrong was to design</em></ins></span> the
- <span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></strong></del></span>
<span class="inserted"><ins><em>devices to depend on something
- else that didn't respect users' freedom.</p></em></ins></span>
- </li>
+ <span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>Many models of Internet-connected cameras are tremendously insecure.
They have login accounts with hard-coded passwords, which can't be
- changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way to
- delete these accounts either</a>.</p>
+ changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way</strong></del></span> <span
class="inserted"><ins><em>devices</em></ins></span> to
+ <span class="removed"><del><strong>delete these accounts
either</a>.</p>
</li>
<li>
-<p>The proprietary code that runs pacemakers, insulin pumps, and
other</strong></del></span>
+<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>depend on something
+ else</em></ins></span> that <span class="removed"><del><strong>runs
pacemakers, insulin pumps, and other</strong></del></span> <span
class="inserted"><ins><em>didn't respect users' freedom.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201804140">
+ <li id="M201804140">
<p>A</em></ins></span> medical <span
class="removed"><del><strong>devices is</strong></del></span> <span
class="inserted"><ins><em>insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
full of gross security faults</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
@@ -420,93 +428,94 @@
“Cube” 3D printer was designed with DRM</a>:
it</strong></del></span>
<span
class="inserted"><ins><em>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
cookers</em></ins></span> won't <span class="removed"><del><strong>accept
-third-party printing materials. It</strong></del></span>
+third-party printing materials. It is the Keurig</strong></del></span>
<span class="inserted"><ins><em>function</a>.</p>
</li>
<li id="M201703270">
- <p>When Miele's Internet of
- Stings hospital disinfectant dishwasher</em></ins></span> is <span
class="inserted"><ins><em><a
-
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to</em></ins></span> the <span
class="removed"><del><strong>Keurig of printers. Now it</strong></del></span>
<span class="inserted"><ins><em>Internet, its security</em></ins></span> is
+ <p>When Miele's Internet</em></ins></span> of <span
class="removed"><del><strong>printers. Now it</strong></del></span>
+ <span class="inserted"><ins><em>Stings hospital disinfectant
dishwasher</em></ins></span> is
<span class="removed"><del><strong>being discontinued, which means that
eventually authorized materials won't
-be available</strong></del></span> <span
class="inserted"><ins><em>crap</a>.</p>
-
- <p>For example, a cracker can gain access to the dishwasher's
- filesystem, infect it with malware,</em></ins></span> and <span
class="inserted"><ins><em>force</em></ins></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
+be available and the printers may become unusable.</p>
-<p>With a</strong></del></span> <span
class="inserted"><ins><em>dishwasher to launch
- attacks on other devices in the network. Since these dishwashers are
+<p>With a</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer that gets</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to</em></ins></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
+even be</strong></del></span> <span class="inserted"><ins><em>Internet, its
security is crap</a>.</p>
+
+ <p>For example,</em></ins></span> a <span
class="removed"><del><strong>remote possibility.</p>
+
+<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>cracker can gain access to</em></ins></span> the
<span class="removed"><del><strong>author of that article says that there was
+“nothing wrong”</strong></del></span> <span
class="inserted"><ins><em>dishwasher's
+ filesystem, infect it</em></ins></span> with <span
class="removed"><del><strong>designing</strong></del></span> <span
class="inserted"><ins><em>malware, and force</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>dishwasher</em></ins></span> to <span
class="removed"><del><strong>restrict users</strong></del></span> <span
class="inserted"><ins><em>launch
+ attacks on other devices</em></ins></span> in the <span
class="removed"><del><strong>first place. This is like putting a “cheat
me and mistreat me”
+sign</strong></del></span> <span class="inserted"><ins><em>network. Since
these dishwashers are
used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
</li>
<li id="M201703140">
- <p>A computerized vibrator</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through</em></ins></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
-even be a remote possibility.</p>
-
-<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>proprietary control app</a>.</p>
-
- <p>The app was reporting</em></ins></span> the <span
class="removed"><del><strong>author</strong></del></span> <span
class="inserted"><ins><em>temperature</em></ins></span> of <span
class="removed"><del><strong>that article says that there</strong></del></span>
<span class="inserted"><ins><em>the vibrator minute by
- minute (thus, indirectly, whether it</em></ins></span> was
-<span class="removed"><del><strong>“nothing wrong” with
designing</strong></del></span> <span class="inserted"><ins><em>surrounded by a
person's
- body), as well as</em></ins></span> the <span
class="removed"><del><strong>device to restrict users in</strong></del></span>
<span class="inserted"><ins><em>vibration frequency.</p>
-
- <p>Note</em></ins></span> the <span
class="removed"><del><strong>first place. This is like
putting</strong></del></span> <span class="inserted"><ins><em>totally
inadequate proposed response:</em></ins></span> a <span
class="removed"><del><strong>“cheat me</strong></del></span> <span
class="inserted"><ins><em>labeling
- standard with which manufacturers would make statements about their
- products, rather than free software which users could have
checked</em></ins></span>
- and <span class="removed"><del><strong>mistreat me”
-sign on your chest. We should know better: we should condemn all
companies</strong></del></span> <span
class="inserted"><ins><em>changed.</p>
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping</em></ins></span> on <span class="removed"><del><strong>your
chest. We should know better: we should condemn all companies
+that take advantage</strong></del></span> <span class="inserted"><ins><em>its
users through the proprietary control app</a>.</p>
+
+ <p>The app was reporting the temperature</em></ins></span> of <span
class="removed"><del><strong>people like him. Indeed,</strong></del></span>
<span class="inserted"><ins><em>the vibrator minute by
+ minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was surrounded by a person's
+ body), as well as</em></ins></span> the <span
class="removed"><del><strong>acceptance of</strong></del></span> <span
class="inserted"><ins><em>vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements
about</em></ins></span> their <span class="removed"><del><strong>unjust
practice</strong></del></span>
+ <span class="inserted"><ins><em>products, rather than free software which
users could have checked
+ and changed.</p>
- <p>The company</em></ins></span> that <span
class="removed"><del><strong>take advantage</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
+ <p>The company</em></ins></span> that <span
class="removed"><del><strong>teaches</strong></del></span> <span
class="inserted"><ins><em>made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots</em></ins></span> of <span
class="inserted"><ins><em>personal information about how</em></ins></span>
people <span class="removed"><del><strong>like him.
Indeed,</strong></del></span>
+ was sued for collecting lots of personal information about
how</em></ins></span> people <span
class="removed"><del><strong>to</strong></del></span>
<span class="inserted"><ins><em>used it</a>.</p>
- <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>acceptance of
-their unjust practice that teaches people to</strong></del></span> <span
class="inserted"><ins><em>data may</em></ins></span> be <span
class="removed"><del><strong>doormats.</p>
+ <p>The company's statement that it was anonymizing the data
may</em></ins></span> be <span class="removed"><del><strong>doormats.</p>
</li>
<li>
<p>Philips “smart” lightbulbs <a
href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml"></strong></del></span>
<span class="inserted"><ins><em>true, but it doesn't really matter. If it
had sold the data to a data
- broker, the data broker would</em></ins></span> have been <span
class="removed"><del><strong>designed not</strong></del></span> <span
class="inserted"><ins><em>able</em></ins></span> to <span
class="removed"><del><strong>interact with other companies' smart
-lightbulbs</a>.</p>
-
-<p>If</strong></del></span> <span class="inserted"><ins><em>figure out
who the
+ broker, the data broker would</em></ins></span> have been <span
class="removed"><del><strong>designed not</strong></del></span> <span
class="inserted"><ins><em>able</em></ins></span> to <span
class="removed"><del><strong>interact</strong></del></span> <span
class="inserted"><ins><em>figure out who the
user was.</p>
<p>Following this lawsuit, <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay</em></ins></span> a <span
class="removed"><del><strong>product is “smart”, and you didn't
build it, it is
-cleverly serving</strong></del></span> <span class="inserted"><ins><em>total
of C$4m</a> to</em></ins></span> its <span
class="removed"><del><strong>manufacturer <em>against
you</em>.</p></strong></del></span>
- <span class="inserted"><ins><em>customers.</p></em></ins></span>
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
-<span class="removed"><del><strong><li>
+ <li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>other companies' smart
+lightbulbs</a>.</p>
+
+<p>If</strong></del></span> <span class="inserted"><ins><em>microphones
<a
+
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found</em></ins></span> a <span
class="removed"><del><strong>product is “smart”, and you didn't
build it, it is
+cleverly serving its manufacturer <em>against you</em>.</p>
+</li>
+
+<li>
<p><a
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
DVDs and Bluray disks have DRM</a>.
-</p>
-
-<p>That page uses spin terms that favor DRM,
-including</strong></del></span>
+</p></strong></del></span> <span class="inserted"><ins><em>way to access
the data</a> collected by the
+ manufacturer's snooping.</p></em></ins></span>
- <span class="inserted"><ins><em><li id="M201702280">
- <p>“CloudPets” toys with microphones</em></ins></span>
<a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+ <p>That <span class="removed"><del><strong>page uses spin terms that
favor DRM,
+including <a
href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
digital “rights” management</a>
-and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
-and it claims that “artists” (rather than companies) are
+and <a
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
<span class="inserted"><ins><em>the manufacturer</em></ins></span> and <span
class="removed"><del><strong>it claims that “artists” (rather than
companies) are
primarily responsible for putting digital restrictions management into
-these disks. Nonetheless, it is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found</em></ins></span> a <span
class="removed"><del><strong>reference for</strong></del></span> <span
class="inserted"><ins><em>way to access</em></ins></span> the <span
class="removed"><del><strong>facts.
+these disks. Nonetheless, it is a reference for</strong></del></span> the
<span class="removed"><del><strong>facts.
</p>
<p>Every Bluray disk (with few, rare exceptions) has DRM—so
@@ -516,10 +525,7 @@
<li id="cameras-bugs">
<p>Over 70 brands of network-connected surveillance cameras have <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
-security bugs that allow anyone</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by the
- manufacturer's snooping.</p>
-
- <p>That the manufacturer and the FBI could listen</em></ins></span>
to <span class="removed"><del><strong>watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these
+security bugs that allow anyone</strong></del></span> <span
class="inserted"><ins><em>FBI could listen</em></ins></span> to <span
class="removed"><del><strong>watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>these
conversations was unacceptable by itself.</p></em></ins></span>
</li>
@@ -542,129 +548,67 @@
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
report everything</em></ins></span> that <span
class="removed"><del><strong>this</strong></del></span> is <span
class="removed"><del><strong>an “open” platform
so</strong></del></span> <span class="inserted"><ins><em>viewed on them, and
not just broadcasts and
cable</a>. Even if</em></ins></span> the
-<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>fault of app developers. That is clearly true
if</strong></del></span> <span class="inserted"><ins><em>user's own
computer,</em></ins></span>
- the <span class="removed"><del><strong>apps are proprietary
software.</p>
+<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>image</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>coming from</em></ins></span> the <span
class="removed"><del><strong>fault</strong></del></span> <span
class="inserted"><ins><em>user's own computer,
+ the TV reports what it is. The existence</em></ins></span> of <span
class="removed"><del><strong>app developers. That is clearly
true</strong></del></span> <span class="inserted"><ins><em>a way to disable the
+ surveillance, even</em></ins></span> if <span class="inserted"><ins><em>it
were not hidden as it was in these TVs,
+ does not legitimize</em></ins></span> the <span
class="removed"><del><strong>apps are proprietary software.</p>
-<p>Anything whose name is “Smart” is most likely
going</strong></del></span> <span class="inserted"><ins><em>TV reports what it
is. The existence of a way</em></ins></span> to
-<span class="removed"><del><strong>screw you.</p>
-</li>
-
-<li>
-<p>
-Malware found on <a
-href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
-security cameras available through Amazon</a>.
-</p>
-
-<p>A camera that records locally on physical media, and has no network
-connection, does not threaten people with surveillance—neither
-by watching people through</strong></del></span> <span
class="inserted"><ins><em>disable</em></ins></span> the <span
class="removed"><del><strong>camera, nor through malware</strong></del></span>
- <span class="inserted"><ins><em>surveillance, even if it were not hidden
as it was</em></ins></span> in <span class="inserted"><ins><em>these TVs,
- does not legitimize</em></ins></span> the
-<span class="removed"><del><strong>camera.</p></strong></del></span>
<span class="inserted"><ins><em>surveillance.</p></em></ins></span>
+<p>Anything whose name is “Smart”</strong></del></span>
<span class="inserted"><ins><em>surveillance.</p>
</li>
-<span class="removed"><del><strong><li>
-<p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612230">
+ <li id="M201612230">
<p>VR equipment, measuring every slight motion,
creates the potential for the most intimate
- surveillance ever. All it takes to make this potential
real</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-FitBit fitness trackers have a Bluetooth vulnerability</a> that allows
-attackers to send malware to the devices, which can subsequently
-spread to computers and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
- software as malicious as many</em></ins></span> other <span
class="removed"><del><strong>FitBit trackers that interact with
-them.</p>
-</li>
-
-<li>
-<p> “Self-encrypting” disk drives do</strong></del></span>
<span class="inserted"><ins><em>programs listed in this
+ surveillance ever. All it takes to make this potential real <a
+
href="https://theintercept.com/2016/12/23/virtual-reality-allows-the-most-detailed-intimate-digital-surveillance-yet/">is
+ software as malicious as many other programs listed in this
page</a>.</p>
- <p>You can bet Facebook will implement</em></ins></span> the <span
class="removed"><del><strong>encryption with
-proprietary firmware so you can't</strong></del></span> <span
class="inserted"><ins><em>maximum possible
- surveillance on Oculus Rift devices. The moral is, never</em></ins></span>
trust <span class="removed"><del><strong>it. Western Digital's <a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
-“My Passport” drives have</strong></del></span> a <span
class="removed"><del><strong>back
door</a>.</p></strong></del></span> <span
class="inserted"><ins><em>VR
- system with nonfree software in it.</p></em></ins></span>
+ <p>You can bet Facebook will implement the maximum possible
+ surveillance on Oculus Rift devices. The moral is, never trust a VR
+ system with nonfree software in it.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>
-Hospira infusion pumps, which are used to administer drugs
to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612200">
+ <li id="M201612200">
<p>The developer of Ham Radio Deluxe <a
-
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged</em></ins></span>
- a <span class="removed"><del><strong>patient, were rated “<a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
-least secure IP device I've ever seen</a>”
by</strong></del></span> <span class="inserted"><ins><em>customer's
installation as punishment for posting</em></ins></span> a <span
class="removed"><del><strong>security
-researcher.</p>
-
-<p>Depending on what drug</strong></del></span> <span
class="inserted"><ins><em>negative
+
href="https://www.techdirt.com/articles/20161220/12411836320/company-bricks-users-software-after-he-posts-negative-review.shtml">sabotaged
+ a customer's installation as punishment for posting a negative
review</a>.</p>
<p>Most proprietary software companies don't use their power so
- harshly, but it</em></ins></span> is <span
class="removed"><del><strong>being infused, the insecurity could
-open the door to murder.</p></strong></del></span> <span
class="inserted"><ins><em>an injustice that they all <em>have</em>
such
- power.</p></em></ins></span>
+ harshly, but it is an injustice that they all <em>have</em>
such
+ power.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Due</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201612061">
+ <li id="M201612061">
<p>The “smart” toys My Friend Cayla and i-Que can be
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access is not
- necessary. This would enable crackers</em></ins></span> to <span
class="removed"><del><strong>bad security</strong></del></span> <span
class="inserted"><ins><em>listen</em></ins></span> in <span
class="inserted"><ins><em>on</em></ins></span> a <span
class="removed"><del><strong>drug pump, crackers</strong></del></span> <span
class="inserted"><ins><em>child's
+ necessary. This would enable crackers to listen in on a child's
conversations, and even speak into the toys themselves.</p>
- <p>This means a burglar</em></ins></span> could <span
class="removed"><del><strong>use it</strong></del></span> <span
class="inserted"><ins><em>speak into the toys and ask the
child</em></ins></span>
- to <span class="removed"><del><strong><a
-href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
-kill patients</a>.</p></strong></del></span> <span
class="inserted"><ins><em>unlock the front door while Mommy's not
looking.</p></em></ins></span>
+ <p>This means a burglar could speak into the toys and ask the child
+ to unlock the front door while Mommy's not looking.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“Smart homes”</a> turn out to be stupidly
vulnerable</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609200">
+ <li id="M201609200">
<p>HP's firmware downgrade <a
href="https://www.theguardian.com/technology/2016/sep/20/hp-inkjet-printers-unofficial-cartridges-software-update">imposed
- DRM on some printers, which now refuse</em></ins></span> to
-<span class="removed"><del><strong>intrusion.</p></strong></del></span>
<span class="inserted"><ins><em>function with third-party
- ink cartridges</a>.</p></em></ins></span>
+ DRM on some printers, which now refuse to function with third-party
+ ink cartridges</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201608080">
- <p>Ransomware</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-FTC punished a company</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
- has been developed</em></ins></span> for <span
class="removed"><del><strong>making webcams with bad security</a>
so</strong></del></span> <span class="inserted"><ins><em>a
thermostat</em></ins></span> that <span class="removed"><del><strong>it was
easy for anyone to watch them.</p></strong></del></span> <span
class="inserted"><ins><em>uses proprietary
- software</a>.</p></em></ins></span>
+ <li id="M201608080">
+ <p>Ransomware <a
+
href="https://www.pentestpartners.com/security-blog/thermostat-ransomware-a-lesson-in-iot-security/">
+ has been developed for a thermostat that uses proprietary
+ software</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>It is possible to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201605020">
- <p>Samsung's “Smart Home” has a big security
hole;</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-kill</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
- unauthorized</em></ins></span> people <span
class="removed"><del><strong>by taking</strong></del></span> <span
class="inserted"><ins><em>can remotely</em></ins></span> control <span
class="removed"><del><strong>of medical implants by radio</a>. More
-information in <a
-href="http://www.bbc.co.uk/news/technology-17631838">BBC
News</a></strong></del></span> <span
class="inserted"><ins><em>it</a>.</p>
+ <li id="M201605020">
+ <p>Samsung's “Smart Home” has a big security hole; <a
+
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+ unauthorized people can remotely control it</a>.</p>
<p>Samsung claims that this is an “open” platform so the
problem is partly the fault of app developers. That is clearly true
@@ -679,27 +623,22 @@
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
security cameras available through Amazon</a>.</p>
- <p>A camera that records locally on physical
media,</em></ins></span> and <span class="inserted"><ins><em>has no network
+ <p>A camera that records locally on physical media, and has no
network
connection, does not threaten people with surveillance—neither
by watching people through the camera, nor through malware in the
camera.</p>
</li>
<li id="M201604050">
- <p>Google/Alphabet</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+ <p>Google/Alphabet <a
+
href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
intentionally broke Revolv home automatic control products that
depended on a server</a> to function, by shutting down the server.
The lesson is, reject all such products. Insist on self-contained
- computers that run free software!</p></em></ins></span>
+ computers that run free software!</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Lots</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201603220">
+ <li id="M201603220">
<p>Over 70 brands of network-connected surveillance cameras have
<a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
@@ -709,15 +648,13 @@
<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
“Cube” 3D printer was designed with DRM</a>: it
- won't accept third-party printing materials. It is the
Keurig</em></ins></span> of
- <span class="inserted"><ins><em>printers. Now it is being discontinued,
which means that eventually
+ won't accept third-party printing materials. It is the Keurig of
+ printers. Now it is being discontinued, which means that eventually
authorized materials won't be available and the printers may become
unusable.</p>
- <p>With a</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
-hospital equipment has lousy security</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ <p>With a <a
+ href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
printer that gets the Respects Your Freedom</a>, this problem would
not even be a remote possibility.</p>
@@ -787,50 +724,116 @@
link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having it enabled by default
- is an injustice already.</p>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>most
likely going</strong></del></span> <span
class="inserted"><ins><em>possible</em></ins></span> to
+<span class="removed"><del><strong>screw you.</p></strong></del></span>
<span class="inserted"><ins><em>turn this off, but having it enabled by default
+ is an injustice already.</p></em></ins></span>
</li>
- <li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to the 600 millions social media profiles the company
+<span class="removed"><del><strong><li>
+<p>
+Malware found on <a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+security cameras available through Amazon</a>.
+</p>
+
+<p>A camera that records locally on physical media, and has no network
+connection, does not threaten people</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance</em></ins></span> with <span
class="removed"><del><strong>surveillance—neither
+by watching people through</strong></del></span> <span
class="inserted"><ins><em>Viacom adds 2.3 million households
+ to</em></ins></span> the <span class="removed"><del><strong>camera, nor
through malware in</strong></del></span> <span class="inserted"><ins><em>600
millions social media profiles</em></ins></span> the
+<span class="removed"><del><strong>camera.</p>
+</li>
+
+<li>
+<p></strong></del></span> <span class="inserted"><ins><em>company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can now <a
- href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ information with online social media participation, Tivo can
now</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+FitBit</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
users to new combined surveillance by default.</p>
</li>
<li id="M201510210">
- <p>FitBit fitness trackers have a <a
-
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+ <p>FitBit</em></ins></span> fitness trackers have a <span
class="inserted"><ins><em><a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></em></ins></span>
Bluetooth vulnerability</a> that allows attackers to send malware
to the devices, which can subsequently spread to computers and other
FitBit trackers that interact with them.</p>
</li>
- <li id="M201510200">
- <p>“Self-encrypting” disk drives
+<span class="removed"><del><strong><li>
+<p> “Self-encrypting”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510200">
+ <p>“Self-encrypting”</em></ins></span> disk drives
do the encryption with proprietary firmware so you
- can't trust it. Western Digital's “My Passport” drives <a
-
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ can't trust it. Western Digital's <span class="removed"><del><strong><a
+href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"></strong></del></span>
“My Passport” drives <span class="inserted"><ins><em><a
+
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"></em></ins></span>
have a back door</a>.</p>
</li>
- <li id="M201507240">
+<span class="removed"><del><strong><li>
+<p>
+Hospira infusion pumps, which</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't a TV
channel.</p>
+ what people</em></ins></span> are <span class="removed"><del><strong>used
to administer drugs to
+a patient, were rated “<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
+least secure IP device I've ever seen</a>”
by</strong></del></span> <span class="inserted"><ins><em>watching</a>,
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
+researcher.</p>
+
+<p>Depending on what drug is being infused, the insecurity could
+open the door to murder.</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
</li>
- <li id="M201506080">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506080"></em></ins></span>
<p>Due to bad security in a drug pump, crackers could use it to <a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
kill patients</a>.</p>
</li>
- <li id="M201505290">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+“Smart homes”</a> turn out to be stupidly vulnerable to
+intrusion.</p>
+</li>
+
+<li>
+<p>The <a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+FTC punished a company for making webcams with bad security</a> so
+that it was easy for anyone to watch them.</p>
+</li>
+
+<li>
+<p>It is possible to <a
+href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+kill people by taking control of medical implants by radio</a>. More
+information in <a
+href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
+<a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+IOActive Labs Research blog</a>.</p>
+</li>
+
+<li>
+<p>Lots of <a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+hospital equipment has lousy security</a>,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>it can be fatal.</p></strong></del></span>
<span class="inserted"><ins><em>even what they wanted to
@@ -1208,7 +1211,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:35 $
+$Date: 2018/10/22 10:28:25 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-appliances.de.po 7 Oct 2018 20:58:30 -0000 1.58
+++ malware-appliances.de.po 22 Oct 2018 10:28:25 -0000 1.59
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 20:56+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -104,6 +104,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-appliances.fr.po 8 Oct 2018 17:12:34 -0000 1.88
+++ malware-appliances.fr.po 22 Oct 2018 10:28:25 -0000 1.89
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-07 20:56+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-10-08 19:03+0200\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- malware-appliances.pot 7 Oct 2018 20:58:30 -0000 1.44
+++ malware-appliances.pot 22 Oct 2018 10:28:25 -0000 1.45
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-07 20:56+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a "
+"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\">
"
+"HP and Epson have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a "
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- malware-appliances.ru.po 8 Oct 2018 07:58:03 -0000 1.119
+++ malware-appliances.ru.po 22 Oct 2018 10:28:25 -0000 1.120
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2018-10-07 20:56+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-10-01 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
Index: proprietary-drm.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary-drm.de.po 7 Oct 2018 21:27:57 -0000 1.57
+++ proprietary-drm.de.po 22 Oct 2018 10:28:25 -0000 1.58
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -101,6 +101,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The game Metal Gear Rising for MacOS was tethered to a server. The company "
"<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-"
"unplayable-drm\"> shut down the server, and all copies stopped working</a>."
Index: proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-drm.fr.po 8 Oct 2018 17:12:34 -0000 1.52
+++ proprietary-drm.fr.po 22 Oct 2018 10:28:25 -0000 1.53
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-10-08 19:03+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -91,6 +92,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The game Metal Gear Rising for MacOS was tethered to a server. The company "
"<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-"
"unplayable-drm\"> shut down the server, and all copies stopped working</a>."
Index: proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-drm.it-diff.html 17 Oct 2018 10:01:36 -0000 1.17
+++ proprietary-drm.it-diff.html 22 Oct 2018 10:28:25 -0000 1.18
@@ -60,6 +60,14 @@
<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
@@ -221,9 +229,9 @@
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
forces the use of Google DNS</a>. This</em></ins></span> is <span
class="removed"><del><strong>flawed in that it
fails to treat DRM as an ethical question; it takes for
granted</strong></del></span> <span class="inserted"><ins><em>one of the
methods</em></ins></span> that
-<span class="removed"><del><strong>whatever Amazon might do to its users is
legitimate. It refers</strong></del></span>
- <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span
class="removed"><del><strong>DRM
-as digital “rights” management, which is</strong></del></span>
<span class="inserted"><ins><em>enforce</em></ins></span> the <span
class="removed"><del><strong>spin term
+<span class="removed"><del><strong>whatever Amazon might
do</strong></del></span>
+ <span class="inserted"><ins><em>Netflix uses</em></ins></span> to <span
class="removed"><del><strong>its users is legitimate. It refers to DRM
+as digital “rights” management, which is the spin term
used to promote DRM. Nonetheless it serves as a reference for the
facts.
</p>
@@ -249,8 +257,8 @@
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">DRM
in MacOS</a>. This article focuses on the fact that a new model of
Macbook introduced a requirement for monitors to have malicious
-hardware, but DRM software in MacOS is involved in activating the
-hardware. The software for accessing iTunes is also responsible.
+hardware, but DRM software in MacOS is involved in
activating</strong></del></span> <span
class="inserted"><ins><em>enforce</em></ins></span> the
+<span class="removed"><del><strong>hardware. The software for accessing
iTunes is also responsible.
</p>
<p>A further consequence of this malware is that users may have
@@ -302,18 +310,18 @@
<p>Every Bluray disk (with few, rare exceptions) has DRM—so
don't use Bluray <span class="removed"><del><strong>disks!
-</p></strong></del></span> <span
class="inserted"><ins><em>disks!</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>disks!</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201102250">
+ <li id="M201102250">
<p>Android <a
href="https://developer.android.com/reference/android/drm/package-summary.html">
- contains facilities specifically to support DRM</a>.</p>
+ contains facilities specifically to support
DRM</a>.</p></em></ins></span>
</li>
- <li id="M201002180">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201002180">
<p>DRM does more nastiness to published works than merely stopping
people from looking at and/or copying them. Even when it allows you to
look, it harasses you in many ways. Cory Doctorow's article presents
@@ -435,7 +443,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/22 10:28:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary-drm.it.po 7 Oct 2018 21:27:57 -0000 1.46
+++ proprietary-drm.it.po 22 Oct 2018 10:28:25 -0000 1.47
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2017-12-30 14:17+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -88,6 +88,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The game Metal Gear Rising for MacOS was tethered to a server. The company "
"<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-"
"unplayable-drm\"> shut down the server, and all copies stopped working</a>."
Index: proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-drm.ja-diff.html 17 Oct 2018 10:01:36 -0000 1.18
+++ proprietary-drm.ja-diff.html 22 Oct 2018 10:28:25 -0000 1.19
@@ -61,6 +61,14 @@
<div class="column-limit" id="proprietary-drm"></div>
<ul class="blurbs">
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
<li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
@@ -225,10 +233,10 @@
<span class="inserted"><ins><em><li id="M201501030">
<p id="netflix-app-geolocation-drm">The Netflix Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="#bluray">Bluray</a>
-disks. (The article talks about how the same malware would later be
-introduced in MacOS. That had not been done at</strong></del></span>
+disks. (The article talks about how</strong></del></span>
<span
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
- forces</em></ins></span> the <span class="removed"><del><strong>time, but
it was
+ forces</em></ins></span> the <span class="removed"><del><strong>same
malware would later be
+introduced in MacOS. That had not been done at the time, but it was
done subsequently.)
</p>
</li>
@@ -291,18 +299,18 @@
<p>Every Bluray disk (with few, rare exceptions) has DRM—so
don't use Bluray <span class="removed"><del><strong>disks!
-</p></strong></del></span> <span
class="inserted"><ins><em>disks!</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>disks!</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201102250">
+ <li id="M201102250">
<p>Android <a
href="https://developer.android.com/reference/android/drm/package-summary.html">
- contains facilities specifically to support DRM</a>.</p>
+ contains facilities specifically to support
DRM</a>.</p></em></ins></span>
</li>
- <li id="M201002180">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201002180">
<p>DRM does more nastiness to published works than merely stopping
people from looking at and/or copying them. Even when it allows you to
look, it harasses you in many ways. Cory Doctorow's article presents
@@ -424,7 +432,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/22 10:28:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-drm.ja.po 7 Oct 2018 21:27:57 -0000 1.42
+++ proprietary-drm.ja.po 22 Oct 2018 10:28:25 -0000 1.43
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:55+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -84,6 +84,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The game Metal Gear Rising for MacOS was tethered to a server. The company "
"<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-"
"unplayable-drm\"> shut down the server, and all copies stopped working</a>."
Index: proprietary-drm.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pot,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-drm.pot 7 Oct 2018 21:27:57 -0000 1.26
+++ proprietary-drm.pot 22 Oct 2018 10:28:25 -0000 1.27
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -69,6 +69,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a "
+"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\">
"
+"HP and Epson have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The game Metal Gear Rising for MacOS was tethered to a server. The company "
"<a "
"href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm\">
"
Index: proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary-drm.ru.po 8 Oct 2018 07:58:03 -0000 1.69
+++ proprietary-drm.ru.po 22 Oct 2018 10:28:25 -0000 1.70
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2018-10-07 21:25+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-10-08 17:34+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -91,6 +92,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The game Metal Gear Rising for MacOS was tethered to a server. The company "
"<a href=\"http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-"
"unplayable-drm\"> shut down the server, and all copies stopped working</a>."
Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary-sabotage.de.po 10 Oct 2018 07:58:36 -0000 1.102
+++ proprietary-sabotage.de.po 22 Oct 2018 10:28:25 -0000 1.103
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -74,6 +74,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jawbone fitness tracker was tethered to a proprietary phone app. In "
"2017, the company shut down and made the app stop working. <a href=\"https://"
"www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"
Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary-sabotage.fr.po 10 Oct 2018 10:48:03 -0000 1.110
+++ proprietary-sabotage.fr.po 22 Oct 2018 10:28:25 -0000 1.111
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-10-10 12:47+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -73,6 +74,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jawbone fitness tracker was tethered to a proprietary phone app. In "
"2017, the company shut down and made the app stop working. <a href=\"https://"
"www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"
Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary-sabotage.it-diff.html 17 Oct 2018 10:01:36 -0000 1.18
+++ proprietary-sabotage.it-diff.html 22 Oct 2018 10:28:25 -0000 1.19
@@ -49,6 +49,14 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
<li id="M201807050">
<p>The Jawbone fitness tracker was tethered to a proprietary phone
app. In 2017, the company shut down and made the app stop working. <a
@@ -686,7 +694,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/22 10:28:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary-sabotage.it.po 10 Oct 2018 07:58:36 -0000 1.95
+++ proprietary-sabotage.it.po 22 Oct 2018 10:28:25 -0000 1.96
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -68,6 +68,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jawbone fitness tracker was tethered to a proprietary phone app. In "
"2017, the company shut down and made the app stop working. <a href=\"https://"
"www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"
Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-sabotage.ja-diff.html 17 Oct 2018 10:01:36 -0000 1.22
+++ proprietary-sabotage.ja-diff.html 22 Oct 2018 10:28:25 -0000 1.23
@@ -47,6 +47,14 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
<li id="M201807050">
<p>The Jawbone fitness tracker was tethered to a proprietary phone
app. In 2017, the company shut down and made the app stop working. <a
@@ -672,7 +680,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:36 $
+$Date: 2018/10/22 10:28:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-sabotage.ja.po 10 Oct 2018 07:58:36 -0000 1.87
+++ proprietary-sabotage.ja.po 22 Oct 2018 10:28:25 -0000 1.88
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -67,6 +67,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jawbone fitness tracker was tethered to a proprietary phone app. In "
"2017, the company shut down and made the app stop working. <a href=\"https://"
"www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"
Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-sabotage.pot 10 Oct 2018 07:58:36 -0000 1.55
+++ proprietary-sabotage.pot 22 Oct 2018 10:28:25 -0000 1.56
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -57,6 +57,15 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a "
+"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\">
"
+"HP and Epson have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jawbone fitness tracker was tethered to a proprietary phone app. In "
"2017, the company shut down and made the app stop working. <a "
"href=\"https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which\">All
"
Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary-sabotage.ru.po 11 Oct 2018 06:59:25 -0000 1.145
+++ proprietary-sabotage.ru.po 22 Oct 2018 10:28:25 -0000 1.146
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2018-10-10 07:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-10-10 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -70,6 +71,16 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Jawbone fitness tracker was tethered to a proprietary phone app. In "
"2017, the company shut down and made the app stop working. <a href=\"https://"
"www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-"
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.de.po 14 Oct 2018 11:58:30 -0000 1.56
+++ proprietary.de.po 22 Oct 2018 10:28:25 -0000 1.57
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -98,19 +98,19 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <p>
-# | As of [-April, 2017,-] {+September, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+nearly 350+} instances of malicious
-# | [-functionalities,-] {+functionalities (with close to 400 references to
-# | back them up),+} but there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+339+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2017, the files in this directory list around 300 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
"In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten "
"aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt sind "
@@ -423,6 +423,24 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -444,14 +462,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -475,18 +485,6 @@
"Alexa and Siri can."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary.es.po 14 Oct 2018 11:58:30 -0000 1.55
+++ proprietary.es.po 22 Oct 2018 10:28:25 -0000 1.56
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-09-19 10:49+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -92,19 +92,19 @@
"de ser engañado."
#. type: Content of: <p>
-# | As of September, 2018, the [-files-] {+pages+} in this directory list
-# | [-around 400-] {+nearly 350+} instances of malicious [-functionalities,-]
-# | {+functionalities (with close to 400 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-September,-] {+October 22,+} 2018, the [-files-] {+pages+} in this
+# | directory list [-around 400-] {+339+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of September, 2018, the files in this directory list around 400 "
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
"Hasta septiembre de 2018, los archivos de este directorio ofrecÃan una lista
"
"de alrededor de 400 ejemplos de funcionalidades maliciosas, pero seguramente "
@@ -436,6 +436,24 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -457,14 +475,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -488,18 +498,6 @@
"Alexa and Siri can."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary.fr.po 14 Oct 2018 12:35:22 -0000 1.63
+++ proprietary.fr.po 22 Oct 2018 10:28:25 -0000 1.64
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-10-14 13:36+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -86,10 +87,19 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <p>
-msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-September,-] {+October 22,+} 2018, the pages in this directory
+# | list [-nearly 350-] {+339+} instances of malicious functionalities (with
+# | [-close to 400-] {+403+} references to back them up), but there are surely
+# | thousands more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2018, the pages in this directory list nearly 350 "
+#| "instances of malicious functionalities (with close to 400 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
"En septembre 2018, les pages de ce répertoire dénombraient environ 350 cas "
"de fonctionnalités malveillante (appuyés par près de 400 références),
mais "
@@ -290,6 +300,28 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+"Un jeu vidéo non libre proposé par le client Steam non libre <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\">comprenait un « mineur »</a>, c'est-à -dire un
exécutable qui "
+"pirate le processeur de l'ordinateur client pour générer une cryptomonnaie."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -324,18 +356,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-"Un jeu vidéo non libre proposé par le client Steam non libre <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\">comprenait un « mineur »</a>, c'est-à -dire un
exécutable qui "
-"pirate le processeur de l'ordinateur client pour générer une cryptomonnaie."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -373,24 +393,6 @@
"\">cacher des commandes vocales dans d'autres flux audio</a>. Elles sont "
"inaudibles pour les humains, mais Alexa et Siri peuvent les entendre."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-"Android a une <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\">porte dérobée permettant de modifier à distance la configuration "
-"« utilisateur »</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-"L'article suggère qu'il pourrait s'agir d'une porte dérobée universelle, "
-"mais ce n'est pas clair."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -468,6 +470,23 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "Android has a <a href=\"https://www.theverge.com/platform/"
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> back door for remotely changing “user” settings</a>."
+#~ msgstr ""
+#~ "Android a une <a href=\"https://www.theverge.com/platform/"
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\">porte dérobée permettant de modifier à distance la
configuration "
+#~ "« utilisateur »</a>."
+
+#~ msgid ""
+#~ "The article suggests it might be a universal back door, but this isn't "
+#~ "clear."
+#~ msgstr ""
+#~ "L'article suggère qu'il pourrait s'agir d'une porte dérobée
universelle, "
+#~ "mais ce n'est pas clair."
+
+#~ msgid ""
#~ "One version of Windows 10 <a href=\"https://www.ghacks.net/2018/09/12/"
#~ "microsoft-intercepting-firefox-chrome-installation-on-windows-10/\"> "
#~ "harangues users if they try to install Firefox (or Chrome)</a>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary.it-diff.html 17 Oct 2018 10:01:37 -0000 1.14
+++ proprietary.it-diff.html 22 Oct 2018 10:28:25 -0000 1.15
@@ -81,8 +81,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>September,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 300</strong></del></span> <span
class="inserted"><ins><em>nearly 350</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with close to 400 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October 22,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 300</strong></del></span> <span
class="inserted"><ins><em>339</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with 403 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -179,6 +179,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
+ <li id="M201807310">
+ <p>A nonfree video game, available through the nonfree Steam client,
<a
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+ included a “miner”</a>, i.e. an executable that hijacks
+ the CPU in users' computers to mine a cryptocurrency.</p>
+ </li>
+
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -197,13 +212,6 @@
specifically block JavaScript miners</a> are also
available.</p>
</li>
- <li id="M201807310">
- <p>A nonfree video game, available through the nonfree Steam client,
<a
-
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
- included a “miner”</a>, i.e. an executable that hijacks
- the CPU in users' computers to mine a cryptocurrency.</p>
- </li>
-
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -224,15 +232,6 @@
hide voice commands in other audio</a>, so that people cannot hear
them, but Alexa and Siri can.</p>
</li>
-
- <li id="M201809140">
- <p>Android has a <a
-
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
- back door for remotely changing “user”
settings</a>.</p>
-
- <p>The article suggests it might be a universal back door, but this
- isn't clear.</p>
- </li>
</ul></em></ins></span>
@@ -293,7 +292,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:37 $
+$Date: 2018/10/22 10:28:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary.it.po 14 Oct 2018 11:58:30 -0000 1.65
+++ proprietary.it.po 22 Oct 2018 10:28:25 -0000 1.66
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -94,19 +94,19 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <p>
-# | As of [-April, 2017,-] {+September, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+nearly 350+} instances of malicious
-# | [-functionalities,-] {+functionalities (with close to 400 references to
-# | back them up),+} but there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+339+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2017, the files in this directory list around 300 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
"Nel 2017 questo elenco comprende circa 300 esempi di funzionalità malevole, "
"ma sicuramente ce ne sono altre migliaia che ancora non conosciamo."
@@ -427,6 +427,24 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -448,14 +466,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -479,18 +489,6 @@
"Alexa and Siri can."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary.ja-diff.html 17 Oct 2018 10:01:37 -0000 1.16
+++ proprietary.ja-diff.html 22 Oct 2018 10:28:25 -0000 1.17
@@ -77,8 +77,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>September,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 260</strong></del></span> <span
class="inserted"><ins><em>nearly 350</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with close to 400 references to
+<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>October 22,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 260</strong></del></span> <span
class="inserted"><ins><em>339</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with 403 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -176,6 +176,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
+ <li id="M201807310">
+ <p>A nonfree video game, available through the nonfree Steam client,
<a
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+ included a “miner”</a>, i.e. an executable that hijacks
+ the CPU in users' computers to mine a cryptocurrency.</p>
+ </li>
+
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -194,13 +209,6 @@
specifically block JavaScript miners</a> are also
available.</p>
</li>
- <li id="M201807310">
- <p>A nonfree video game, available through the nonfree Steam client,
<a
-
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
- included a “miner”</a>, i.e. an executable that hijacks
- the CPU in users' computers to mine a cryptocurrency.</p>
- </li>
-
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -221,15 +229,6 @@
hide voice commands in other audio</a>, so that people cannot hear
them, but Alexa and Siri can.</p>
</li>
-
- <li id="M201809140">
- <p>Android has a <a
-
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
- back door for remotely changing “user”
settings</a>.</p>
-
- <p>The article suggests it might be a universal back door, but this
- isn't clear.</p>
- </li>
</ul></em></ins></span>
@@ -290,7 +289,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:37 $
+$Date: 2018/10/22 10:28:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary.ja.po 14 Oct 2018 11:58:30 -0000 1.48
+++ proprietary.ja.po 22 Oct 2018 10:28:25 -0000 1.49
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -95,9 +95,9 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ãã¾"
"ããã確å®ã«ããããã¡ãç¥ããªãä½åãã®ä¾ãããã§ãããã"
@@ -349,6 +349,24 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -370,14 +388,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -401,18 +411,6 @@
"Alexa and Siri can."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary.nl-diff.html 17 Oct 2018 10:01:37 -0000 1.14
+++ proprietary.nl-diff.html 22 Oct 2018 10:28:25 -0000 1.15
@@ -81,8 +81,8 @@
it is standard practice. Modern proprietary software is typically
a way to be had.</p>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>September,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 300</strong></del></span> <span
class="inserted"><ins><em>nearly 350</em></ins></span>
-instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with close to 400 references to
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October 22,
2018,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list <span
class="removed"><del><strong>around 300</strong></del></span> <span
class="inserted"><ins><em>339</em></ins></span>
+instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with 403 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
<span class="removed"><del><strong><div class="toc">
@@ -179,6 +179,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
+ <li id="M201807310">
+ <p>A nonfree video game, available through the nonfree Steam client,
<a
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+ included a “miner”</a>, i.e. an executable that hijacks
+ the CPU in users' computers to mine a cryptocurrency.</p>
+ </li>
+
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -197,13 +212,6 @@
specifically block JavaScript miners</a> are also
available.</p>
</li>
- <li id="M201807310">
- <p>A nonfree video game, available through the nonfree Steam client,
<a
-
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
- included a “miner”</a>, i.e. an executable that hijacks
- the CPU in users' computers to mine a cryptocurrency.</p>
- </li>
-
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -224,15 +232,6 @@
hide voice commands in other audio</a>, so that people cannot hear
them, but Alexa and Siri can.</p>
</li>
-
- <li id="M201809140">
- <p>Android has a <a
-
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
- back door for remotely changing “user”
settings</a>.</p>
-
- <p>The article suggests it might be a universal back door, but this
- isn't clear.</p>
- </li>
</ul></em></ins></span>
@@ -293,7 +292,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:37 $
+$Date: 2018/10/22 10:28:25 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary.nl.po 14 Oct 2018 11:58:30 -0000 1.38
+++ proprietary.nl.po 22 Oct 2018 10:28:26 -0000 1.39
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -96,19 +96,19 @@
"je meestal belazerd."
#. type: Content of: <p>
-# | As of [-April, 2017,-] {+September, 2018,+} the [-files-] {+pages+} in
-# | this directory list [-around 300-] {+nearly 350+} instances of malicious
-# | [-functionalities,-] {+functionalities (with close to 400 references to
-# | back them up),+} but there are surely thousands more we don't know about.
+# | As of [-April, 2017,-] {+October 22, 2018,+} the [-files-] {+pages+} in
+# | this directory list [-around 300-] {+339+} instances of malicious
+# | [-functionalities,-] {+functionalities (with 403 references to back them
+# | up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2017, the files in this directory list around 300 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
"Anno april 2017 staan er in dit overzicht ongeveer 300 gevallen van "
"kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
@@ -420,6 +420,24 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -441,14 +459,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -472,18 +482,6 @@
"Alexa and Siri can."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary.pl-diff.html 17 Oct 2018 10:01:37 -0000 1.32
+++ proprietary.pl-diff.html 22 Oct 2018 10:28:26 -0000 1.33
@@ -85,8 +85,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>September, 2018, the pages in this directory
list nearly 350
-instances of malicious functionalities (with close to 400 references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October 22, 2018, the pages in this directory
list 339
+instances of malicious functionalities (with 403 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -177,6 +177,21 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use of independent replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p>
+ </li>
+
+ <li id="M201807310">
+ <p>A nonfree video game, available through the nonfree Steam client,
<a
+
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
+ included a “miner”</a>, i.e. an executable that hijacks
+ the CPU in users' computers to mine a cryptocurrency.</p>
+ </li>
+
<li id="M201805080">
<p>A cracker used an exploit in outdated software to <a
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
@@ -195,13 +210,6 @@
specifically block JavaScript miners</a> are also
available.</p>
</li>
- <li id="M201807310">
- <p>A nonfree video game, available through the nonfree Steam client,
<a
-
href="https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-">
- included a “miner”</a>, i.e. an executable that hijacks
- the CPU in users' computers to mine a cryptocurrency.</p>
- </li>
-
<li id="M201809260">
<p>Honeywell's “smart” thermostats communicate
only through the company's server. They have
@@ -222,15 +230,6 @@
hide voice commands in other audio</a>, so that people cannot hear
them, but Alexa and Siri can.</p>
</li>
-
- <li id="M201809140">
- <p>Android has a <a
-
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
- back door for remotely changing “user”
settings</a>.</p>
-
- <p>The article suggests it might be a universal back door, but this
- isn't clear.</p>
- </li>
</ul></em></ins></span>
@@ -291,7 +290,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/17 10:01:37 $
+$Date: 2018/10/22 10:28:26 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary.pl.po 14 Oct 2018 11:58:30 -0000 1.33
+++ proprietary.pl.po 22 Oct 2018 10:28:26 -0000 1.34
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -135,9 +135,9 @@
#. type: Content of: <p>
msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
#. type: Content of: <table><tr><th>
@@ -501,6 +501,24 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -522,14 +540,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -553,18 +563,6 @@
"Alexa and Siri can."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary.pot 14 Oct 2018 11:58:30 -0000 1.30
+++ proprietary.pot 22 Oct 2018 10:28:26 -0000 1.31
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -70,9 +70,9 @@
#. type: Content of: <p>
msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
#. type: Content of: <table><tr><th>
@@ -241,6 +241,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a "
+"href=\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates\">
"
+"HP and Epson have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a "
+"href=\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-\">
"
+"included a “miner”</a>, i.e. an executable that hijacks the CPU "
+"in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a "
"href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\">
"
"inject a “miner” in web pages</a> served to visitors. This type "
@@ -263,14 +280,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a "
-"href=\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-systems-with-\">
"
-"included a “miner”</a>, i.e. an executable that hijacks the CPU "
-"in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a "
@@ -295,19 +304,6 @@
"Alexa and Siri can."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a "
-"href=\"https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change\">
"
-"back door for remotely changing “user” settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't "
-"clear."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary.pt-br.po 14 Oct 2018 23:57:58 -0000 1.13
+++ proprietary.pt-br.po 22 Oct 2018 10:28:26 -0000 1.14
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-10-14 20:35-0300\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -84,10 +85,15 @@
"de ser mal."
#. type: Content of: <p>
-msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+#, fuzzy
+#| msgid ""
+#| "As of September, 2018, the pages in this directory list nearly 350 "
+#| "instances of malicious functionalities (with close to 400 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
"Desde setembro de 2018, as páginas neste diretório listam quase 350
exemplos "
"de funcionalidades maliciosas (com cerca de 400 referências para confirmá-"
@@ -288,6 +294,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+"Um videogame não livre, disponÃvel através do cliente não livre Steam, <a
"
+"href=\"https://www.extremetech.com/gaming/274552-great-now-games-are-"
+"hijacking-systems-with-\"> incluiu um \"minerador\"</a>, ou seja, um "
+"executável que sequestra a CPU nos computadores dos usuários para minerar "
+"uma criptomoeda."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -323,19 +352,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-"Um videogame não livre, disponÃvel através do cliente não livre Steam, <a
"
-"href=\"https://www.extremetech.com/gaming/274552-great-now-games-are-"
-"hijacking-systems-with-\"> incluiu um \"minerador\"</a>, ou seja, um "
-"executável que sequestra a CPU nos computadores dos usuários para minerar "
-"uma criptomoeda."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -372,24 +388,6 @@
"comandos de voz em outro áudio</a>, para que as pessoas não possam
ouvi-las, "
"mas Alexa e Siri podem."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-"Android tem um <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door para alterar remotamente as configurações do
âusuárioâ</"
-"a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-"O artigo sugere que pode ser uma porta traseira universal, mas isso não
está "
-"claro."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -468,6 +466,23 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Android has a <a href=\"https://www.theverge.com/platform/"
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> back door for remotely changing “user” settings</a>."
+#~ msgstr ""
+#~ "Android tem um <a href=\"https://www.theverge.com/platform/"
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> back door para alterar remotamente as configurações do "
+#~ "âusuárioâ</a>."
+
+#~ msgid ""
+#~ "The article suggests it might be a universal back door, but this isn't "
+#~ "clear."
+#~ msgstr ""
+#~ "O artigo sugere que pode ser uma porta traseira universal, mas isso não "
+#~ "está claro."
+
+#~ msgid ""
#~ "One version of Windows 10 <a href=\"https://www.ghacks.net/2018/09/12/"
#~ "microsoft-intercepting-firefox-chrome-installation-on-windows-10/\"> "
#~ "harangues users if they try to install Firefox (or Chrome)</a>."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary.ru.po 14 Oct 2018 13:28:28 -0000 1.82
+++ proprietary.ru.po 22 Oct 2018 10:28:26 -0000 1.83
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-10-14 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-22 10:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -88,10 +89,19 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <p>
-msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+# | As of [-September,-] {+October 22,+} 2018, the pages in this directory
+# | list [-nearly 350-] {+339+} instances of malicious functionalities (with
+# | [-close to 400-] {+403+} references to back them up), but there are surely
+# | thousands more we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of September, 2018, the pages in this directory list nearly 350 "
+#| "instances of malicious functionalities (with close to 400 references to "
+#| "back them up), but there are surely thousands more we don't know about."
+msgid ""
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
"Ðа ÑенÑÑбÑÑ 2018 на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около 350 пÑимеÑов "
"вÑедоноÑнÑÑ
ÑÑнкÑий (и поÑÑи 400 ÑÑÑлок,
подкÑеплÑÑÑиÑ
иÑ
), но еÑÑÑ, "
@@ -294,6 +304,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+"ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð²Ð¸Ð´ÐµÐ¾Ð¸Ð³Ñа, доÑÑÑÐ¿Ð½Ð°Ñ ÑеÑез
неÑвободнÑй ÐºÐ»Ð¸ÐµÐ½Ñ Steam, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> ÑодеÑжала “майнеÑа”</a>, Ñ.е.
пÑогÑаммÑ, "
+"коÑоÑÐ°Ñ Ð·Ð°Ñ
ваÑÑвала пÑоÑеÑÑÐ¾Ñ Ð²
компÑÑÑеÑе полÑзоваÑелÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ "
+"кÑипÑовалÑÑÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -330,19 +363,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-"ÐеÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð²Ð¸Ð´ÐµÐ¾Ð¸Ð³Ñа, доÑÑÑÐ¿Ð½Ð°Ñ ÑеÑез
неÑвободнÑй ÐºÐ»Ð¸ÐµÐ½Ñ Steam, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> ÑодеÑжала “майнеÑа”</a>, Ñ.е.
пÑогÑаммÑ, "
-"коÑоÑÐ°Ñ Ð·Ð°Ñ
ваÑÑвала пÑоÑеÑÑÐ¾Ñ Ð²
компÑÑÑеÑе полÑзоваÑелÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ "
-"кÑипÑовалÑÑÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -379,23 +399,6 @@
"голоÑовÑе ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² дÑÑгиÑ
звÑкозапиÑÑÑ
</a>, Ñак ÑÑо лÑди ÑÑи ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð½Ðµ "
"ÑлÑÑаÑ, но иÑ
ÑлÑÑÐ°Ñ Alexa и Siri."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-"Ð ÑиÑÑеме Android еÑÑÑ <a
href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> лазейка Ð´Ð»Ñ Ñдаленного изменениÑ
наÑÑÑоек “"
-"полÑзоваÑелє</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-"Ð ÑÑаÑÑе пÑедполагаеÑÑÑ, ÑÑо ÑÑо
ÑнивеÑÑалÑÐ½Ð°Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°, но ÑÑо не ÑÑно."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -475,6 +478,22 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Android has a <a href=\"https://www.theverge.com/platform/"
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> back door for remotely changing “user” settings</a>."
+#~ msgstr ""
+#~ "Ð ÑиÑÑеме Android еÑÑÑ <a
href=\"https://www.theverge.com/platform/"
+#~ "amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
+#~ "change\"> лазейка Ð´Ð»Ñ Ñдаленного изменениÑ
наÑÑÑоек “"
+#~ "полÑзоваÑелє</a>."
+
+#~ msgid ""
+#~ "The article suggests it might be a universal back door, but this isn't "
+#~ "clear."
+#~ msgstr ""
+#~ "Ð ÑÑаÑÑе пÑедполагаеÑÑÑ, ÑÑо ÑÑо
ÑнивеÑÑалÑÐ½Ð°Ñ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°, но ÑÑо не ÑÑно."
+
+#~ msgid ""
#~ "One version of Windows 10 <a href=\"https://www.ghacks.net/2018/09/12/"
#~ "microsoft-intercepting-firefox-chrome-installation-on-windows-10/\"> "
#~ "harangues users if they try to install Firefox (or Chrome)</a>."
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary.zh-tw.po 14 Oct 2018 11:58:30 -0000 1.16
+++ proprietary.zh-tw.po 22 Oct 2018 10:28:26 -0000 1.17
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-14 11:55+0000\n"
+"POT-Creation-Date: 2018-10-22 10:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -92,9 +92,9 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of September, 2018, the pages in this directory list nearly 350 instances "
-"of malicious functionalities (with close to 400 references to back them up), "
-"but there are surely thousands more we don't know about."
+"As of October 22, 2018, the pages in this directory list 339 instances of "
+"malicious functionalities (with 403 references to back them up), but there "
+"are surely thousands more we don't know about."
msgstr ""
"å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°é"
"æä¸å種æåä¸ç解çå©ç¨æ¹å¼ã"
@@ -338,6 +338,24 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Printer manufacturers are very innovative—at blocking the use of "
+"independent replacement ink cartridges. Their “security "
+"upgrades” occasionally impose new forms of cartridge DRM. <a href="
+"\"https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-"
+"crippling-cheap-ink-cartridges-via-bogus-security-updates\"> HP and Epson "
+"have done this</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"A nonfree video game, available through the nonfree Steam client, <a href="
+"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
+"systems-with-\"> included a “miner”</a>, i.e. an executable that "
+"hijacks the CPU in users' computers to mine a cryptocurrency."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"A cracker used an exploit in outdated software to <a href=\"https://www."
"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
"visito\"> inject a “miner” in web pages</a> served to visitors. "
@@ -359,14 +377,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"A nonfree video game, available through the nonfree Steam client, <a href="
-"\"https://www.extremetech.com/gaming/274552-great-now-games-are-hijacking-"
-"systems-with-\"> included a “miner”</a>, i.e. an executable that "
-"hijacks the CPU in users' computers to mine a cryptocurrency."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Honeywell's “smart” thermostats communicate only through the "
"company's server. They have all the nasty characteristics of such devices: "
"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
@@ -390,18 +400,6 @@
"Alexa and Siri can."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Android has a <a href=\"https://www.theverge.com/platform/"
-"amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-"
-"change\"> back door for remotely changing “user” settings</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article suggests it might be a universal back door, but this isn't clear."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"