[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www proprietary/po/malware-mobiles.de-diff.html...
From: |
GNUN |
Subject: |
www proprietary/po/malware-mobiles.de-diff.html... |
Date: |
Tue, 30 Oct 2018 11:28:32 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 18/10/30 11:28:30
Modified files:
proprietary/po : malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de.po proprietary.es.po
proprietary.fr.po proprietary.it-diff.html
proprietary.it.po proprietary.ja-diff.html
proprietary.ja.po proprietary.nl-diff.html
proprietary.nl.po proprietary.pl-diff.html
proprietary.pl.po proprietary.pot
proprietary.pt-br.po proprietary.ru.po
proprietary.zh-tw.po
server : body-include-2.sq.html outdated.sq.html
sitemap.sq.html top-addendum.sq.html
server/po : outdated.sq.po sitemap.sq.po top-addendum.sq.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.333&r2=1.334
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.422&r2=1.423
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/server/body-include-2.sq.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/server/outdated.sq.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/server/sitemap.sq.html?cvsroot=www&r1=1.257&r2=1.258
http://web.cvs.savannah.gnu.org/viewcvs/www/server/top-addendum.sq.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/outdated.sq.po?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/sitemap.sq.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/top-addendum.sq.po?cvsroot=www&r1=1.7&r2=1.8
Patches:
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/malware-mobiles.de-diff.html 27 Oct 2018 08:28:53 -0000
1.14
+++ proprietary/po/malware-mobiles.de-diff.html 30 Oct 2018 15:28:29 -0000
1.15
@@ -329,40 +329,49 @@
<ul>
<li><p>The Sarahah app
<a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone</strong></del></span>
+ uploads all phone numbers and email
addresses</a></strong></del></span>
<span class="inserted"><ins><em><li id="M201607290">
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
- WhatsApp messages are not entirely deleted</a>. They can be recovered
- in various ways.</p>
+ WhatsApp messages are not entirely deleted</a>. They can be
recovered</em></ins></span>
+ in <span class="inserted"><ins><em>various ways.</p>
</li>
<li id="M201607280">
<p>A half-blind security critique of a tracking app: it found that
<a
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
- blatant flaws allowed anyone to snoop on a user's personal data</a>.
- The critique fails entirely to express concern that the app sends the
- personal data to a server, where the <em>developer</em> gets
it all.
+ blatant flaws allowed anyone to snoop on a</em></ins></span> user's <span
class="removed"><del><strong>address
+ book</strong></del></span> <span class="inserted"><ins><em>personal
data</a>.
+ The critique fails entirely</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>express concern</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span> the
<span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span class="inserted"><ins><em>app
sends the
+ personal data</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>a
server, where the <em>developer</em> gets it all.
This “service” is for suckers!</p>
<p>The server surely has a “privacy policy,” and surely
- it is worthless since nearly all of them are.</p>
+ it is worthless since nearly all of them are.</p></em></ins></span>
</li>
- <li id="M201607190">
+ <span class="removed"><del><strong><li><p>Some
portable</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607190">
<p>A bug in a proprietary ASN.1 library, used
- in cell phone towers as well as cell phones and routers, <a
-
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
- taking control of those systems</a>.</p>
+ in cell phone towers as well as cell</em></ins></span> phones <span
class="inserted"><ins><em>and routers,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+ taking control</em></ins></span> of <span class="inserted"><ins><em>those
systems</a>.</p>
</li>
<li id="M201603100">
<p>Many proprietary payment apps <a
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
- personal data in an insecure way</a>. However,
- the worse aspect of these apps is that <a
- href="/philosophy/surveillance-vs-democracy.html">payment is not
+ personal</em></ins></span> data <span class="removed"><del><strong>to
China</a>.</p></li>
+
+<li>
+ <p>Facebook's app listens all</strong></del></span> <span
class="inserted"><ins><em>in an insecure way</a>.
However,</em></ins></span>
+ the <span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>worse aspect of these apps is that</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">payment
is not
anonymous</a>.</p>
</li>
@@ -370,9 +379,9 @@
<p><a
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
- your personal data on remote servers</a>. This leaves personal
+ your personal data</em></ins></span> on <span
class="removed"><del><strong>what people</strong></del></span> <span
class="inserted"><ins><em>remote servers</a>. This leaves personal
information like email addresses, passwords, and health information
- vulnerable. Because many of these apps are proprietary it makes it
+ vulnerable. Because many of these apps</em></ins></span> are <span
class="removed"><del><strong>listening to or watching</a>. In
addition,</strong></del></span> <span
class="inserted"><ins><em>proprietary</em></ins></span> it <span
class="removed"><del><strong>may</strong></del></span> <span
class="inserted"><ins><em>makes it
hard to impossible to know which apps are at risk.</p>
</li>
@@ -383,10 +392,11 @@
deactivated by its developer</a> which had discovered a security
flaw.</p>
- <p>That developer seems to be conscientious about protecting personal
+ <p>That developer seems to</em></ins></span> be <span
class="removed"><del><strong>analyzing people's
conversations</strong></del></span> <span
class="inserted"><ins><em>conscientious about protecting personal
data from third parties in general, but it can't protect that data
- from the state. Quite the contrary: confiding your data to someone
- else's server, if not first encrypted by you with free software,
+ from the state. Quite the contrary: confiding your data</em></ins></span>
to <span class="removed"><del><strong>serve them</strong></del></span> <span
class="inserted"><ins><em>someone
+ else's server, if not first encrypted by you</em></ins></span> with <span
class="removed"><del><strong>targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>free software,
undermines your rights.</p>
</li>
@@ -413,6 +423,12 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
+
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
@@ -484,8 +500,7 @@
<li id="M201708270">
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone</em></ins></span> numbers and email addresses</a>
in <span class="removed"><del><strong>user's address
- book</strong></del></span> <span class="inserted"><ins><em>user's address
+ uploads all phone numbers and email addresses</a> in user's address
book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
@@ -541,7 +556,7 @@
</li>
<li id="M201704260">
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>do lots of surveillance, judging by <a
+ <p>Faceapp appears to do lots of surveillance, judging by <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access it demands to personal data in the
device</a>.</p>
</li>
@@ -553,24 +568,16 @@
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses</em></ins></span> that this <span
class="removed"><del><strong>article misuses</strong></del></span> <span
class="inserted"><ins><em>was done without</em></ins></span> the <span
class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>users'
consent.
+ <p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>design
- the app to snoop at all</a>.</p></em></ins></span>
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs</em></ins></span> of <span
class="inserted"><ins><em>Android apps can collude
- to transmit users' personal</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
-
-<li>
- <p>Facebook's</strong></del></span> <span
class="inserted"><ins><em>servers. <a
+ <li id="M201704074">
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
@@ -578,15 +585,14 @@
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search</em></ins></span> app <span
class="removed"><del><strong>listens all</strong></del></span> <span
class="inserted"><ins><em>that it will</a> pre-install
- on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>same information
+ announced an opt-in proprietary search app that it will</a>
pre-install
+ on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>, and the user must
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
@@ -595,24 +601,23 @@
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span class="removed"><del><strong>serve
them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>a Chinese
company</a>.</p></em></ins></span>
+ user data to a Chinese company</a>.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611280">
+ <li id="M201611280">
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ massive surveillance.</p></em></ins></span>
</li>
- <li id="M201611160"></em></ins></span>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611160"></em></ins></span>
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -645,8 +650,7 @@
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores <span
class="removed"><del><strong>detailed logs
- and may turn them over to the UK government if
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
<span class="removed"><del><strong>may turn them over to the UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -699,8 +703,8 @@
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>detailed logs and
- may turn them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
+ <span class="inserted"><ins><em>may turn them over to</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
@@ -744,8 +748,7 @@
scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
and <span class="removed"><del><strong>location
tracking,</strong></del></span> <span
class="inserted"><ins><em>suggests</em></ins></span> you <span
class="removed"><del><strong>must
disable Google Play itself</strong></del></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>picture you take according</em></ins></span> to
<span class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>who is
- in</em></ins></span> the <span class="removed"><del><strong>user,
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>picture you take according</em></ins></span> to
<span class="removed"><del><strong>obey the user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
@@ -753,23 +756,24 @@
<li>
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
- pre-install on</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
-
- <p>This spyware feature seems to require online access
to</em></ins></span> some <span class="removed"><del><strong>of its phones. The
app will give Verizon the same
- information about</strong></del></span>
- <span class="inserted"><ins><em>known-faces database, which
means</em></ins></span> the <span class="removed"><del><strong>users' searches
that Google normally gets when
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
they use its search engine.</p>
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
- sent across</em></ins></span> the <span class="removed"><del><strong>app
is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>wire to Facebook's servers</em></ins></span>
and <span class="inserted"><ins><em>face-recognition
+ <p>Currently, the app</strong></del></span> <span
class="inserted"><ins><em>who</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span class="inserted"><ins><em>in</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>pictures are likely to be
+ sent across</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers and face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures are private anymore,
- even if</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However,</strong></del></span> <span
class="inserted"><ins><em>user didn't “upload” them
to</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>service.</p></em></ins></span>
+ <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook users' pictures are private anymore,
+ even if the user didn't “upload” them to the
service.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>The Meitu
photo-editing</strong></del></span>
@@ -933,10 +937,10 @@
send personal data to Motorola.</a></p>
</li>
- <li><p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span> <span
class="inserted"><ins><em>apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
+ <li><p>Some manufacturers add a</strong></del></span> <span
class="inserted"><ins><em>apps (but not</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect to 100 <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs, on the average.</p></em></ins></span>
</li>
@@ -1128,7 +1132,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/po/malware-mobiles.de.po 27 Oct 2018 08:28:53 -0000
1.83
+++ proprietary/po/malware-mobiles.de.po 30 Oct 2018 15:28:29 -0000
1.84
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -616,6 +616,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Spanish football streaming app <a href=\"https://boingboing."
"net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
"movements and listens through the microphone</a>."
Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary/po/malware-mobiles.es.po 27 Oct 2018 08:28:53 -0000
1.78
+++ proprietary/po/malware-mobiles.es.po 30 Oct 2018 15:28:29 -0000
1.79
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-07-27 11:25+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -588,6 +588,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Spanish football streaming app <a href=\"https://boingboing."
"net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
"movements and listens through the microphone</a>."
Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- proprietary/po/malware-mobiles.fr.po 27 Oct 2018 11:57:17 -0000
1.95
+++ proprietary/po/malware-mobiles.fr.po 30 Oct 2018 15:28:29 -0000
1.96
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-10-27 13:55+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -583,6 +584,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Spanish football streaming app <a href=\"https://boingboing."
"net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
"movements and listens through the microphone</a>."
Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/malware-mobiles.it-diff.html 27 Oct 2018 08:28:53 -0000
1.19
+++ proprietary/po/malware-mobiles.it-diff.html 30 Oct 2018 15:28:29 -0000
1.20
@@ -239,8 +239,8 @@
that <span class="removed"><del><strong>this
does</strong></del></span> <span class="inserted"><ins><em>impose censorship
on application programs.</li>
<li><a href="#tyrants">Tyrants</a>—systems
- that reject any operating system</em></ins></span> not <span
class="removed"><del><strong>operate via</strong></del></span> <span
class="inserted"><ins><em>“authorized” by the
- manufacturer.</li>
+ that reject any operating system</em></ins></span> not <span
class="removed"><del><strong>operate via</strong></del></span> <span
class="inserted"><ins><em>“authorized” by</em></ins></span> the
+ <span class="inserted"><ins><em>manufacturer.</li>
</ul>
</div>
@@ -248,27 +248,42 @@
<ul>
<li>
- <p>See above for the <a href="#universal-back-door">general
universal back
- door</a> in essentially all mobile phones, which permits converting
+ <p>See above for the <a
href="#universal-back-door">general</em></ins></span> universal back <span
class="removed"><del><strong>door that we know nearly</strong></del></span>
+ <span class="inserted"><ins><em>door</a> in
essentially</em></ins></span> all
+ <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>mobile phones, which permits converting
them into full-time listening devices.</p>
</li>
</ul>
<ul class="blurbs">
<li id="M201609130">
- <p>Xiaomi phones come with <a
-
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
- a universal back door in</em></ins></span> the <span
class="inserted"><ins><em>application processor, for Xiaomi's
+ <p>Xiaomi</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>come
with</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots of bugs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
+ a universal back door</em></ins></span> in the <span
class="removed"><del><strong>phones' radio software</a>.</p>
+ </li>
+</ul>
+
+<h3 id="surveillance">Mobile Surveillance</h3>
+<ul>
+ <li><p>The Sarahah app</strong></del></span> <span
class="inserted"><ins><em>application processor, for Xiaomi's
use</a>.</p>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the</em></ins></span>
- universal back door <span class="inserted"><ins><em>in the modem
processor</em></ins></span> that <span class="removed"><del><strong>we know
nearly</strong></del></span> <span class="inserted"><ins><em>the local phone
- company can use</a>.</p>
+ <p>This is separate from</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email
addresses</a></strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the
+ universal back door</em></ins></span> in <span
class="removed"><del><strong>user's address
+ book to developer's server. Note</strong></del></span> <span
class="inserted"><ins><em>the modem processor</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span> the
<span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>local phone
+ company can use</a>.</p></em></ins></span>
</li>
- <li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ <span class="removed"><del><strong><li><p>Some portable
phones</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511090">
+ <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files” as well as forcibly install
apps</a>.</p>
@@ -278,10 +293,11 @@
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>.
Nearly</em></ins></span>
- all
- <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>have
a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door">
+ A Chinese version</em></ins></span> of <span
class="removed"><del><strong>data to China</a>.</p></li>
+
+<li>
+ <p>Facebook's app listens</strong></del></span> <span
class="inserted"><ins><em>Android has a universal back door</a>.
Nearly</em></ins></span>
+ all <span class="removed"><del><strong>the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to</strong></del></span>
<span class="inserted"><ins><em>models of mobile phones have a <a
href="#universal-back-door">
universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
@@ -449,6 +465,12 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
+
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
@@ -466,8 +488,8 @@
<li id="M201804160">
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of the 5,855 Android apps studied by researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
+ of the 5,855 Android apps studied by researchers were found
to</em></ins></span> snoop
+ <span class="inserted"><ins><em>and collect information about its
users</a>. 40% of the apps were
found to insecurely snitch on its users. Furthermore, they could
detect only some methods of snooping, in these proprietary apps whose
source code they cannot look at. The other apps might be snooping
@@ -531,16 +553,16 @@
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on the contrary, it
+ <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="inserted"><ins><em>the contrary, it
worked in various ways to prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google specifically
+ discovering</em></ins></span> what <span
class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
+ <a
href="/philosophy/free-software-even-more-important.html">which</em></ins></span>
+ are <span class="removed"><del><strong>listening</strong></del></span>
<span class="inserted"><ins><em>malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
@@ -570,49 +592,39 @@
<li id="M201705040">
<p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
+ to <span class="inserted"><ins><em>ultrasound from beacons placed in
stores</em></ins></span> or <span
class="removed"><del><strong>watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>played by TV
programs</a>.</p>
</li>
<li id="M201704260">
<p>Faceapp appears to do lots of surveillance, judging by <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data</em></ins></span> in the <span
class="removed"><del><strong>phones' radio
software</a>.</p></strong></del></span> <span
class="inserted"><ins><em>device</a>.</p></em></ins></span>
+ how much access</em></ins></span> it <span class="removed"><del><strong>may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>demands</em></ins></span> to <span
class="removed"><del><strong>serve them</strong></del></span> <span
class="inserted"><ins><em>personal data in the device</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="surveillance">Mobile Surveillance</h3>
-<ul>
- <li><p>The Sarahah app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users
listen</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note</strong></del></span>
- <span class="inserted"><ins><em>along with the headphone's unique serial
number.</p>
+ the app would record the names of the audio files users listen to
+ along</em></ins></span> with <span class="removed"><del><strong>targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>the headphone's unique serial number.</p>
- <p>The suit accuses</em></ins></span> that this <span
class="removed"><del><strong>article misuses</strong></del></span> <span
class="inserted"><ins><em>was done without</em></ins></span> the <span
class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>users'
consent.
+ <p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>design
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
the app to snoop at all</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span>
- <span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs</em></ins></span> of <span
class="inserted"><ins><em>Android apps can collude
- to transmit users' personal</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
+<span class="removed"><del><strong><li></strong></del></span>
-<li>
- <p>Facebook's</strong></del></span> <span
class="inserted"><ins><em>servers. <a
+ <span class="inserted"><ins><em><li id="M201704074">
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
@@ -620,15 +632,14 @@
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search</em></ins></span> app <span
class="removed"><del><strong>listens all</strong></del></span> <span
class="inserted"><ins><em>that it will</a> pre-install
- on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>same information
+ announced an opt-in proprietary search app that it will</a>
pre-install
+ on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>, and the user must
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
@@ -637,14 +648,10 @@
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span class="removed"><del><strong>serve
them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>a Chinese
company</a>.</p></em></ins></span>
+ user data to a Chinese company</a>.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611280">
+ <li id="M201611280">
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
movements before and after the ride</a>.</p>
@@ -686,8 +693,8 @@
for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
- <span class="removed"><del><strong><dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it <span
class="removed"><del><strong>stores detailed logs
and may turn them over to the UK government if
requested.</dd>
@@ -741,10 +748,7 @@
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
-
- <span class="inserted"><ins><em><dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>stores detailed logs and
may turn them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -789,8 +793,7 @@
scans your mobile phone's photo collections for known
faces</a>,</em></ins></span>
and <span class="removed"><del><strong>location
tracking,</strong></del></span> <span
class="inserted"><ins><em>suggests</em></ins></span> you <span
class="removed"><del><strong>must
disable Google Play itself</strong></del></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
- yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>picture you take according</em></ins></span> to
<span class="removed"><del><strong>obey</strong></del></span> <span
class="inserted"><ins><em>who is
- in</em></ins></span> the <span class="removed"><del><strong>user,
+ yet another example of nonfree software pretending</strong></del></span>
<span class="inserted"><ins><em>picture you take according</em></ins></span> to
<span class="removed"><del><strong>obey the user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
@@ -798,22 +801,24 @@
<li>
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
- pre-install on</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
-
- <p>This spyware feature seems to require online access
to</em></ins></span> some <span class="removed"><del><strong>of its phones. The
app will give Verizon the same
- information about</strong></del></span>
- <span class="inserted"><ins><em>known-faces database, which
means</em></ins></span> the <span class="removed"><del><strong>users' searches
that Google normally gets when
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets when
they use its search engine.</p>
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
- sent across</em></ins></span> the <span class="removed"><del><strong>app
is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>wire to Facebook's servers</em></ins></span>
and <span class="inserted"><ins><em>face-recognition
+ <p>Currently, the app</strong></del></span> <span
class="inserted"><ins><em>who</em></ins></span> is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and</strong></del></span>
+ <span class="inserted"><ins><em>in</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>pictures are likely to be
+ sent across</em></ins></span> the
+ <span class="removed"><del><strong>app remains spyware—an
“optional” piece</strong></del></span> <span
class="inserted"><ins><em>wire to Facebook's servers and face-recognition
algorithms.</p>
- <p>If so, none of Facebook users' pictures are private anymore,
- even if</em></ins></span> the user <span class="removed"><del><strong>must
explicitly opt-in before the app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>didn't “upload” them
to</em></ins></span> the
- <span class="removed"><del><strong>app remains spyware—an
“optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>service.</p></em></ins></span>
+ <p>If so, none</em></ins></span> of <span
class="removed"><del><strong>spyware is
+ still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook users' pictures are private anymore,
+ even if the user didn't “upload” them to the
service.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>The Meitu
photo-editing</strong></del></span>
@@ -1172,7 +1177,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/po/malware-mobiles.it.po 27 Oct 2018 08:28:53 -0000
1.83
+++ proprietary/po/malware-mobiles.it.po 30 Oct 2018 15:28:29 -0000
1.84
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -567,6 +567,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Spanish football streaming app <a href=\"https://boingboing."
"net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
"movements and listens through the microphone</a>."
Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/malware-mobiles.ja-diff.html 27 Oct 2018 08:28:53 -0000
1.34
+++ proprietary/po/malware-mobiles.ja-diff.html 30 Oct 2018 15:28:29 -0000
1.35
@@ -415,6 +415,12 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
+
<li id="M201806110">
<p>The Spanish football streaming app <a
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
@@ -1017,7 +1023,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/po/malware-mobiles.ja.po 27 Oct 2018 08:28:53 -0000
1.71
+++ proprietary/po/malware-mobiles.ja.po 30 Oct 2018 15:28:29 -0000
1.72
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -488,6 +488,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Spanish football streaming app <a href=\"https://boingboing."
"net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
"movements and listens through the microphone</a>."
Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/malware-mobiles.pot 27 Oct 2018 08:28:53 -0000 1.50
+++ proprietary/po/malware-mobiles.pot 30 Oct 2018 15:28:29 -0000 1.51
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -396,6 +396,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a "
+"href=\"https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/\">
"
+"track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Spanish football streaming app <a "
"href=\"https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html\">tracks
"
"the user's movements and listens through the microphone</a>."
Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary/po/malware-mobiles.ru.po 27 Oct 2018 15:27:40 -0000
1.124
+++ proprietary/po/malware-mobiles.ru.po 30 Oct 2018 15:28:29 -0000
1.125
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-10-27 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -572,6 +573,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Spanish football streaming app <a href=\"https://boingboing."
"net/2018/06/11/spanish-football-app-turns-use.html\">tracks the user's "
"movements and listens through the microphone</a>."
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary/po/proprietary-surveillance.de-diff.html 27 Oct 2018
08:28:53 -0000 1.13
+++ proprietary/po/proprietary-surveillance.de-diff.html 30 Oct 2018
15:28:29 -0000 1.14
@@ -522,24 +522,12 @@
Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy;</strong></del></span>
<span class="inserted"><ins><em>spyware via
- BIOS</a></em></ins></span> on <span
class="inserted"><ins><em>Windows installs. Note that</em></ins></span> the
<span class="removed"><del><strong>contrary, it
- worked in various ways to prevent that, and deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for the snooping of these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</strong></del></span> <span
class="inserted"><ins><em>specific
- sabotage method Lenovo used did not affect GNU/Linux; also, a
+ <p>Google</strong></del></span> <span
class="inserted"><ins><em>spyware via
+ BIOS</a> on Windows installs. Note that the specific
+ sabotage method Lenovo used</em></ins></span> did not <span
class="removed"><del><strong>intend</strong></del></span> <span
class="inserted"><ins><em>affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility
for the injustice of their
- being nonfree. It also distributes</strong></del></span> its
- own <span class="removed"><del><strong>nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em>malware</a>.</p>
+ href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ own malware</a>.</p>
</li>
</ul>
@@ -558,59 +546,63 @@
<ul class="blurbs">
<li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
- cheating? There</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
- users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
- proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span> to <span
class="removed"><del><strong>see what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> they
- <span class="removed"><del><strong>do.</p>
-
- <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>can't “fool”</em></ins></span>
- the <span class="removed"><del><strong>source code for these
apps,</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ <p>The natural extension of monitoring
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</em></ins></span> to make <span
class="removed"><del><strong>these apps spy; on</strong></del></span> <span
class="inserted"><ins><em>sure they can't “fool”</em></ins></span>
+ the <span class="removed"><del><strong>contrary, it
+ worked in various ways</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According to Edward Snowden, <a
+ <p>According</em></ins></span> to <span
class="removed"><del><strong>prevent that,</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>study</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the
- <span class="removed"><del><strong>source code
somehow</strong></del></span> <span class="inserted"><ins><em>microphone,
- retrieve geo-location data from the GPS, take photographs, read
- text messages, read call, location and web browsing history, and
- read the contact list. This malware is designed</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat
users</strong></del></span> <span class="inserted"><ins><em>disguise itself
+ them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the <span
class="removed"><del><strong>snooping of these apps.</p>
+
+ <p>On</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
+ text messages, read call, location</em></ins></span> and
+ <span class="removed"><del><strong>therefore shares
in</strong></del></span> <span class="inserted"><ins><em>web browsing history,
and
+ read</em></ins></span> the <span
class="removed"><del><strong>responsibility for</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is designed to disguise
itself
from investigation.</p>
</li>
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data</em></ins></span> in
- <span class="removed"><del><strong>various ways. If it did a good job of
this,</strong></del></span> <span class="inserted"><ins><em>smart phones,
including iPhones,
+ The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
- detail here,</em></ins></span> it <span class="removed"><del><strong>could
more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart</strong></del></span> <span
class="inserted"><ins><em>seems that this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>checking.</p>
-
- <p>But since Google itself develops malicious
apps,</strong></del></span> <span class="inserted"><ins><em>universal back door
that</em></ins></span> we <span class="removed"><del><strong>cannot trust
- Google to protect us. We must demand release</strong></del></span> <span
class="inserted"><ins><em>know nearly all portable
- phones have. It may involve exploiting various bugs. There are <a
+ detail here, it seems that this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>injustice of their
+ being nonfree.</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
+ phones have.</em></ins></span> It <span class="removed"><del><strong>also
distributes its own nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>malicious</a>.</p>
+
+ <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of <span class="removed"><del><strong>source code
to</strong></del></span> <span class="inserted"><ins><em>bugs
in</em></ins></span> the
- <span class="removed"><del><strong>public, so we can
depend</strong></del></span> <span class="inserted"><ins><em>phones' radio
software</a>.</p>
+ lots</em></ins></span> of <span class="removed"><del><strong>preventing
apps from
+ cheating? There is no systematic way for Google, or Android
+ users, to inspect executable proprietary apps to see what they
+ do.</p>
+
+ <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> the <span
class="removed"><del><strong>source code for these apps,</strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location</em></ins></span> on <span
class="removed"><del><strong>each other.</p></strong></del></span> <span
class="inserted"><ins><em>remote command, and users cannot stop
- them</a>. (The US says it will eventually require all new portable
phones
- to have GPS.)</p></em></ins></span>
+ will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>study the
+ source code somehow to determine whether they
mistreat</strong></del></span> users <span class="removed"><del><strong>in
+ various ways. If it did a good job of this,</strong></del></span> <span
class="inserted"><ins><em>cannot stop
+ them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>could more or less
+ prevent such snooping, except when</strong></del></span> <span
class="inserted"><ins><em>will eventually require all new portable phones
+ to have GPS.)</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
@@ -620,40 +612,48 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA and the EU Copyright Directive make it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>, because
- this would require circumventing the iOS DRM.</p>
+ <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>app developers are clever
+ enough</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it <a
+ href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy on users</a>,
because
+ this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google</strong></del></span> <span class="inserted"><ins><em>iOS
DRM.</p>
</li>
<li id="M201709210">
- <p>In</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>latest iThings system,
- “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>security
- of 283 Android VPN apps concluded that “in spite
of</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the
- <span class="removed"><del><strong>promises</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
+ <p>In the latest iThings system,
+ “turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>privacy, security, and anonymity given by the
- majority of VPN apps—millions of users may</strong></del></span>
<span class="inserted"><ins><em>you—“We
- know you want to</em></ins></span> be <span
class="removed"><del><strong>unawarely subject</strong></del></span> <span
class="inserted"><ins><em>spied on”.</p>
+ them off—only until 5am. That's Apple for you—“We
+ know you want to be spied on”.</p>
</li>
<li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
- to <span class="removed"><del><strong>poor security guarantees and abusive
practices inflicted by
+ to <span class="removed"><del><strong>protect us. We must demand release
of source code</strong></del></span> <span class="inserted"><ins><em>use it
without having your fingerprints taken. Users would have
+ no way</em></ins></span> to <span class="inserted"><ins><em>tell
whether</em></ins></span> the
+ <span class="removed"><del><strong>public, so we can
depend</strong></del></span> <span class="inserted"><ins><em>phone is
snooping</em></ins></span> on <span class="removed"><del><strong>each
other.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+ <p>A</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611170">
+ <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated the privacy and security
+ of 283 Android VPN apps concluded that “in spite of the
+ promises for privacy, security, and anonymity given by the
+ majority of VPN apps—millions of users may be unawarely subject
+ to poor security guarantees and abusive practices inflicted by
VPN apps.”</p>
<p>Following is a non-exhaustive list of proprietary VPN apps from
- the research paper that tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>use it without having your fingerprints taken. Users
would have
- no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
- </li>
-
- <li id="M201611170">
- <p>iPhones <a
-
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ the research paper that tracks and infringes the
privacy</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
lots</em></ins></span> of
<span class="removed"><del><strong>users:</p>
@@ -686,14 +686,14 @@
requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span
class="inserted"><ins><em>up</em></ins></span> to <span
class="removed"><del><strong>the
- users.</strong></del></span> <span class="inserted"><ins><em>date on all
your devices. Any edits you
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span
class="inserted"><ins><em>up</em></ins></span> to <span
class="inserted"><ins><em>date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.)</em></ins></span> The
<span class="removed"><del><strong>stated purpose of</strong></del></span>
<span class="inserted"><ins><em>iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>JS
injection</strong></del></span>
- <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated
purpose</strong></del></span>
+ <span class="inserted"><ins><em>startup</em></ins></span> of <span
class="removed"><del><strong>the JS injection</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
don't ask where.”</p>
<p>There</em></ins></span> is <span class="inserted"><ins><em>a
way</em></ins></span> to <span class="removed"><del><strong>display
@@ -709,102 +709,109 @@
surveillance functionality.</p>
<p>Unknown people apparently took advantage</em></ins></span> of
this <span class="removed"><del><strong>app have
- confirmed that the non-premium version</strong></del></span> <span
class="inserted"><ins><em>to <a
+ confirmed that the non-premium version of the app does
+ JavaScript injection for tracking and display ads.</dd>
+ </dl>
+</li>
+<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span> <span
class="inserted"><ins><em>to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span class="removed"><del><strong>the
app does
- JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em>many celebrities</a>. They needed to break
Apple's
- security to get at them, but NSA can access any of them through <a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ nude photos</em></ins></span> of <span class="removed"><del><strong>the
top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as
“free”,</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed to break Apple's
+ security to get at them,</em></ins></span> but <span
class="removed"><del><strong>most</strong></del></span> <span
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span
class="removed"><del><strong>are not in fact</strong></del></span> <span
class="inserted"><ins><em>through</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
- <li id="M201409220">
- <p>Apple can,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>regularly
does, <a
+<span class="removed"><del><strong><li>
+ <p>Apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409220">
+ <p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>BART</strong></del></span> <span
class="inserted"><ins><em>the state</a>.</p>
+
+ <p>This may have improved with</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
- <p>This may have improved with <a
-
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+<li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.
+ </p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
not as much as Apple claims</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201407230"></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</em></ins></span> of <span
class="inserted"><ins><em>iOS seem to exist
- for no possible purpose other than surveillance</a>. Here
is</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p></strong></del></span>
<span class="inserted"><ins><em><a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+<span class="removed"><del><strong><li>
+ <p>Pairs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407230">
+ <p><a
+
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude to transmit users'
personal
+ data</strong></del></span> <span class="inserted"><ins><em>iOS
seem</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>exist
+ for no possible purpose other than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></em></ins></span>
</li>
- <li id="M201401100"></em></ins></span>
- <p>The <span class="removed"><del><strong>article confusingly
describes gratis apps as “free”,
- but most of them are not in fact</strong></del></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses</strong></del></span> <span
class="inserted"><ins><em>class="not-a-duplicate"
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401100">
+ <p>The</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
+ iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
- for that word</strong></del></span> <span class="inserted"><ins><em>NSA
snoop on all the data in an iThing, or it</em></ins></span>
- is <span class="removed"><del><strong>“exploit”; nearly always
that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>totally
incompetent</a>.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
- <p>Apps for BART</strong></del></span>
+ Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
- <span class="inserted"><ins><em><li id="M201308080">
- <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>they don't snoop.</p>
- <p>With proprietary apps, one</strong></del></span> can <span
class="removed"><del><strong>only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em>be
- turned off.</p></em></ins></span>
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing,
or it</em></ins></span>
+ is <span class="removed"><del><strong>not enough
+to legitimize actions like this. At this point, most users have
+stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>totally incompetent</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that</strong></del></span>
+ <li id="M201308080">
+ <p>The iThing also <a
+
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information it collects on</strong></del></span>
<span class="inserted"><ins><em>can be
+ turned off.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201210170">
- <p>There is also a feature for web sites to</em></ins></span> track
<span class="removed"><del><strong>users by</strong></del></span> <span
class="inserted"><ins><em>users, which is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or
played</strong></del></span>
- <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled</em></ins></span> by <span class="removed"><del><strong>TV
programs</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>default</a>. (That article talks about iOS 6,
but it is
- still true in iOS 7.)</p></em></ins></span>
+ <li id="M201210170">
+ <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
+
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
+ still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Pairs of Android apps can collude to transmit users' personal
- data</strong></del></span>
+ <li id="M201204280">
+ <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
- <span class="inserted"><ins><em><li id="M201204280">
- <p>Users cannot make an Apple ID (<a
+<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that collude</a>.</p>
-</li>
-
-<li>
-<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users that</strong></del></span> install <span
class="inserted"><ins><em>even gratis apps</a>) without giving a valid
- email address and receiving</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking the “consent” of users is not
enough</strong></del></span> <span class="inserted"><ins><em>verification code
Apple sends</em></ins></span>
- to <span class="removed"><del><strong>legitimize actions like this. At
this point, most users have
-stopped reading the “Terms and Conditions” that spell out
-what they are “consenting” to.</strong></del></span> <span
class="inserted"><ins><em>it.</p>
+ to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>other companies from getting this personal
information in</strong></del></span> <span class="inserted"><ins><em>receiving
the verification code Apple sends
+ to it.</p>
</li>
</ul>
@@ -816,21 +823,17 @@
<ul class="blurbs">
<li id="M201711210">
- <p>Android tracks location for</em></ins></span> Google <span
class="removed"><del><strong>should clearly
-and honestly identify</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Android tracks location for Google <a
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
even when “location services” are turned off, even
when</em></ins></span>
- the <span class="removed"><del><strong>information it collects on users,
instead</strong></del></span> <span class="inserted"><ins><em>phone has no SIM
card</a>.</p>
+ the <span class="removed"><del><strong>first
+place!</p></strong></del></span> <span class="inserted"><ins><em>phone
has no SIM card</a>.</p>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</em></ins></span> of <span
class="removed"><del><strong>hiding it in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google
-and other companies from getting this personal information in the first
-place!</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
+ sold with spyware sending lots of data to
China</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -879,79 +882,93 @@
Journal (in an</em></ins></span> article <span
class="removed"><del><strong>takes for granted</strong></del></span> <span
class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="inserted"><ins><em><a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
the <span class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any other snooping.</p>
+ legitimate, but</strong></del></span> <span class="inserted"><ins><em>FBI
can remotely activate the GPS and microphone in Android phones
+ and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
- <li><p>Gratis</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
- connect to 100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>phones</em></ins></span>
- and <span class="removed"><del><strong>advertising</a> URLs,
- on the average.</p></strong></del></span> <span
class="inserted"><ins><em>laptops</a>. (I suspect this means Windows
laptops.) Here is <a
- href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
- </li>
- <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201307280">
- <p>Spyware</em></ins></span> is present in some Android devices when
they are
- sold. Some Motorola <span class="removed"><del><strong>phones
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when
this company was owned
- by Google, use a modified version of</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a
+
+ <li id="M201307280">
+ <p>Spyware</em></ins></span> is <span
class="inserted"><ins><em>present in some Android devices when they are
+ sold. Some Motorola phones, made when this company was owned
+ by Google, use a modified version of Android</em></ins></span> that <span
class="removed"><del><strong>valid? Software</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- <span class="removed"><del><strong>send</strong></del></span>
- <span class="inserted"><ins><em>sends</em></ins></span> personal data to
Motorola</a>.</p>
+ sends personal data to Motorola</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+ <li id="M201307250">
+ <p>A Motorola phone <a
+
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
+ </li>
+
+ <li id="M201302150">
+ <p>Google Play intentionally sends app</em></ins></span> developers
<span class="removed"><del><strong>have no right</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
- <span class="inserted"><ins><em><li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
+ <p>Merely asking the “consent” of users is not
enough</em></ins></span> to
+ <span class="removed"><del><strong>analyze what</strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most</em></ins></span> users <span class="removed"><del><strong>are
doing or how. “Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>have stopped
+ reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>spell out what
+ they</em></ins></span> are
+ <span class="removed"><del><strong>just as wrong as any other
snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>“consenting” to. Google should
clearly</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span>
+ <span class="inserted"><ins><em>honestly identify</em></ins></span> the
<span class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>information it collects on users, instead of
+ hiding it</em></ins></span> in <span class="removed"><del><strong>some
Android devices when they are sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>an obscurely worded EULA.</p>
+
+ <p>However,</em></ins></span> to
+ <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send</strong></del></span> <span class="inserted"><ins><em>truly protect
people's privacy, we must prevent Google
+ and other companies from getting this</em></ins></span> personal <span
class="removed"><del><strong>data to
Motorola</a>.</p></strong></del></span> <span
class="inserted"><ins><em>information in the
+ first place!</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Some</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201111170">
+ <p>Some</em></ins></span> manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier <span
class="removed"><del><strong>IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
+ Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span
class="inserted"><ins><em>IQ</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
-<!-- #SpywareOnMobiles -->
+<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
-<div style="clear: left;"></div>
+<div style="clear: left;"></div></strong></del></span>
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
+ <span <span
class="removed"><del><strong>class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
<ul>
- <li><p>The DMCA and the EU Copyright Directive make
it</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201302150">
- <p>Google Play intentionally sends app developers</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
- the personal details of users that install the app</a>.</p>
-
- <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this.
At</em></ins></span> this
- <span class="removed"><del><strong>would require circumventing the iOS
DRM.</p>
+ <li><p>The DMCA and the EU Copyright Directive make it <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal to study how iOS cr...apps spy on users</a>, because this
+ would require circumventing the iOS DRM.</p>
</li>
- <li><p>In</strong></del></span> <span
class="inserted"><ins><em>point, most users have stopped
- reading</em></ins></span> the <span class="removed"><del><strong>latest
iThings system, “turning off” WiFi</strong></del></span> <span
class="inserted"><ins><em>“Terms</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>Conditions” that spell out what
- they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the
- <span class="removed"><del><strong>obvious way <a
+ <li><p>In the latest iThings system, “turning off”
WiFi and Bluetooth the
+ obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
A more advanced way really does turn them off—only until 5am.
@@ -960,26 +977,8 @@
<li><p>Apple proposes
<a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
- taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>collects on users, instead of
- hiding it in an obscurely worded EULA.</p>
-
- <p>However,</em></ins></span> to <span
class="removed"><del><strong>tell whether</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information
in</em></ins></span> the <span class="removed"><del><strong>phone is
snooping</strong></del></span>
- <span class="inserted"><ins><em>first place!</p>
- </li>
-
- <li id="M201111170">
- <p>Some manufacturers add a <a
-
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier IQ</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">E-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+ — which would mean no way to use it without having your
fingerprints
+ taken. Users would have no way to tell whether the phone is
snooping</strong></del></span> <span
class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
<ul class="blurbs">
@@ -1028,21 +1027,26 @@
</div>
<ul class="blurbs">
- <li id="M201808030">
- <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
+ <li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
without giving a valid email address and receiving</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span class="removed"><del><strong>code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>user's
location even when users disable “location
- tracking”</a>.</p>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track</em></ins></span> the <span class="removed"><del><strong>code Apple
+ sends to it.</p>
+ </li>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>it.</p>
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>phones</em></ins></span> of <span
class="removed"><del><strong>the most popular iOS</strong></del></span> <span
class="inserted"><ins><em>users that have deleted them</a>.</p>
</li>
- <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
- <a class="not-a-duplicate"
+ <li id="M201808030">
+ <p>Some Google</em></ins></span> apps <span
class="inserted"><ins><em>on Android</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>other kinds</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>location
+ behavioral and</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's</em></ins></span> location <span
class="removed"><del><strong>information</a></strong></del></span> <span
class="inserted"><ins><em>even when users disable “location
+ tracking”</a>.</p>
+
+ <p>There are other ways to turn off the other
kinds</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> <span
class="inserted"><ins><em>location
tracking, but most</em></ins></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>will
be tricked by the misleading control.</p></em></ins></span>
</li>
@@ -2986,7 +2990,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary/po/proprietary-surveillance.de.po 27 Oct 2018 08:28:53
-0000 1.239
+++ proprietary/po/proprietary-surveillance.de.po 30 Oct 2018 15:28:29
-0000 1.240
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1778,6 +1778,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Google apps on Android <a href=\"https://www.theguardian.com/"
"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
"record the user's location even when users disable “location "
Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.333
retrieving revision 1.334
diff -u -b -r1.333 -r1.334
--- proprietary/po/proprietary-surveillance.fr.po 27 Oct 2018 08:48:58
-0000 1.333
+++ proprietary/po/proprietary-surveillance.fr.po 30 Oct 2018 15:28:29
-0000 1.334
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-10-27 10:48+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1347,6 +1348,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Google apps on Android <a href=\"https://www.theguardian.com/"
"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
"record the user's location even when users disable “location "
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/proprietary-surveillance.it-diff.html 27 Oct 2018
08:28:53 -0000 1.80
+++ proprietary/po/proprietary-surveillance.it-diff.html 30 Oct 2018
15:28:29 -0000 1.81
@@ -1048,16 +1048,10 @@
<span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
report even which page</em></ins></span> the <span
class="removed"><del><strong>user's consent”
for surveillance is inadequate as a protection against massive
- surveillance.</p>
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
</li>
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span> <span
class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Apps that include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
<span class="inserted"><ins><em></ul>
@@ -1074,6 +1068,18 @@
</div>
<ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p>
+ </li>
+
+ <li><p>Apps</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users</em></ins></span> that <span
class="removed"><del><strong>include
+ <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>have deleted them</a>.</p>
+ </li>
+
<li id="M201808030">
<p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>what radio and TV programs</strong></del></span>
<span class="inserted"><ins><em>Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
@@ -1171,27 +1177,26 @@
<span class="inserted"><ins><em>companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of whether the app
developers get</strong></del></span> <span class="inserted"><ins><em>designed
so that</em></ins></span> users <span class="inserted"><ins><em>communicate
such info</em></ins></span> to <span class="removed"><del><strong>say “I
agree”. That is no excuse for malware.</p></strong></del></span>
<span class="inserted"><ins><em>each
- other but not to the server's database.</p></em></ins></span>
+ It could</em></ins></span> be <span
class="removed"><del><strong>distracted by the question of
whether</strong></del></span> <span class="inserted"><ins><em>designed so that
users communicate such info to each
+ other but not to</em></ins></span> the <span
class="inserted"><ins><em>server's database.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201803050">
- <p>The moviepass</em></ins></span> app
- <span class="removed"><del><strong><a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use</strong></del></span>
<span class="inserted"><ins><em>and dis-service
- spy on users even more than users expected. It <a
+ <li id="M201803050">
+ <p>The moviepass</em></ins></span> app <span
class="removed"><del><strong>developers get</strong></del></span> <span
class="inserted"><ins><em>and dis-service
+ spy on</em></ins></span> users <span class="removed"><del><strong>to say
“I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>even
more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p>
+ <p>Don't be tracked—pay cash!</p></em></ins></span>
</li>
- <li id="M201711240">
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711240">
<p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
-
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store</em></ins></span> by
<span
class="removed"><del><strong>companies.</a></p></strong></del></span>
<span class="inserted"><ins><em>noticing WiFi
networks</a>.</p>
</li>
@@ -1253,12 +1258,18 @@
the <span class="removed"><del><strong>NSA takes
advantage</strong></del></span> <span class="inserted"><ins><em>source code
somehow</em></ins></span> to <span class="removed"><del><strong>spy
through</strong></del></span> <span class="inserted"><ins><em>determine whether
they mistreat users in
various ways. If</em></ins></span> it <span
class="removed"><del><strong>too</a>.
Here's information on
- <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html"></strong></del></span>
<span class="inserted"><ins><em>did a good job of this, it
could</em></ins></span> more <span class="removed"><del><strong>spyware
apps</a>.</p>
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA</strong></del></span> <span class="inserted"><ins><em>or
less
- prevent such snooping, except when the</em></ins></span> app <span
class="removed"><del><strong>spying</a>.</p>
+ More about NSA</strong></del></span> <span class="inserted"><ins><em>did
a good job of this, it could more or less
+ prevent such snooping, except when the</em></ins></span> app <span
class="removed"><del><strong>spying</a>.</p></strong></del></span>
<span class="inserted"><ins><em>developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
@@ -1268,79 +1279,73 @@
<ul>
<li>
- <p>The “smart” toys My Friend Cayla and i-Que transmit
- <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span> <span class="inserted"><ins><em>developers
are clever
- enough</em></ins></span> to <span class="removed"><del><strong>Nuance
Communications</a>,
- a speech recognition company based in the U.S.</p>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
+ on users</a>.</p>
+
+ <p>With free software apps, users could <em>make
sure</em> that they
+ don't snoop.</p>
+
+ <p>With proprietary apps, one can only hope that they
don't.</p>
+ </li>
+
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</em></ins></span>
+ to <span class="removed"><del><strong>Nuance Communications</a>,
+ a speech recognition company based</strong></del></span> <span
class="inserted"><ins><em>ultrasound from beacons placed</em></ins></span> in
<span class="removed"><del><strong>the U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>toys with a mobile phone. This would
- enable crackers</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+ can remotely control the toys with a mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
+ programs</a>.</p>
+ </li>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source
code</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak
- into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span>
- <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
+ <li id="M201704260">
+ <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>do lots of surveillance, judging by <a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal data</em></ins></span> in <span
class="removed"><del><strong>on a child's speech, and even speak
+ into</strong></del></span> the <span class="removed"><del><strong>toys
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>device</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>A computerized vibrator</strong></del></span>
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping</strong></del></span>
- <span
class="inserted"><ins><em>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</em></ins></span>
- on <span class="removed"><del><strong>its users through the proprietary
control app</a>.</p>
+ <span class="inserted"><ins><em><li id="M201704190">
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for</em></ins></span> its <span
class="removed"><del><strong>users through</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>proprietary control
app</a>.</p>
+
+ <p>The</strong></del></span> app <span
class="removed"><del><strong>was reporting</strong></del></span> <span
class="inserted"><ins><em>would record</em></ins></span> the <span
class="removed"><del><strong>temperature</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it</strong></del></span> <span
class="inserted"><ins><em>audio files users listen to
+ along with the headphone's unique serial number.</p>
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <p>The suit accuses that this</em></ins></span> was <span
class="removed"><del><strong>surrounded by a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em>done without</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
- <p>Note the totally inadequate proposed response: a labeling
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>users'
consent.
+ If</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
-
- <p>With</em></ins></span> free software <span
class="removed"><del><strong>which</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> users could <span
class="removed"><del><strong>have
+ their products, rather than free software which users could have
checked and changed.</p>
- <p>The company</strong></del></span> <span
class="inserted"><ins><em><em>make sure</em></em></ins></span> that
<span class="removed"><del><strong>made the vibrator</strong></del></span>
<span class="inserted"><ins><em>they
- don't snoop.</p>
-
- <p>With proprietary apps, one can only hope that they
don't.</p>
- </li>
+ <p>The company that made</strong></del></span> <span
class="inserted"><ins><em>fine print of</em></ins></span> the <span
class="removed"><del><strong>vibrator
+ <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued</strong></del></span> <span class="inserted"><ins><em>app said
that users gave consent</em></ins></span> for <span
class="removed"><del><strong>collecting lots of personal information about how
+ people used it</a>.</p>
+
+ <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>this,
+ would</em></ins></span> that <span
class="inserted"><ins><em>make</em></ins></span> it <span
class="removed"><del><strong>was anonymizing the data may</strong></del></span>
<span class="inserted"><ins><em>acceptable? No way! It should</em></ins></span>
be
+ <span class="removed"><del><strong>true, but it doesn't really matter.
If it had sold the data to a
+ data broker, the data broker would have been able to
figure</strong></del></span> <span
class="inserted"><ins><em>flat</em></ins></span> out
+ <span class="removed"><del><strong>who the user was.</p>
- <li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
- programs</a>.</p>
- </li>
-
- <li id="M201704260">
- <p>Faceapp appears to do</em></ins></span> lots of <span
class="removed"><del><strong>personal information about</strong></del></span>
<span class="inserted"><ins><em>surveillance, judging by <a
-
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/"></em></ins></span>
- how
- <span class="removed"><del><strong>people used it</a>.</p>
-
- <p>The company's statement that</strong></del></span> <span
class="inserted"><ins><em>much access</em></ins></span> it <span
class="removed"><del><strong>was anonymizing the</strong></del></span> <span
class="inserted"><ins><em>demands to personal</em></ins></span> data <span
class="removed"><del><strong>may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>data to</strong></del></span> <span
class="inserted"><ins><em>device</a>.</p>
- </li>
-
- <li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>spyware app for its headphones</a>.
Specifically,</em></ins></span>
- the <span class="removed"><del><strong>data broker</strong></del></span>
<span class="inserted"><ins><em>app</em></ins></span> would <span
class="removed"><del><strong>have been able</strong></del></span> <span
class="inserted"><ins><em>record the names of the audio files users
listen</em></ins></span> to <span class="removed"><del><strong>figure out
- who</strong></del></span>
- <span class="inserted"><ins><em>along with</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>headphone's unique serial number.</p>
-
- <p>The suit accuses that</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
+ <p>Following this lawsuit,</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design</em></ins></span>
the <span class="removed"><del><strong>company has been
ordered</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> to <span
class="removed"><del><strong>pay a total</strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p>
</li>
@@ -1382,12 +1387,12 @@
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span>
+<!-- WEBMASTERS: make sure to place</strong></del></span>
<span class="inserted"><ins><em><li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection --></strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -1699,17 +1704,17 @@
good deal of personal data</a>, including lots of activities which
have nothing to do with cheating.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-section">
- <h3 <span class="removed"><del><strong>id="SpywareAtLowLevel">Spyware
at Low Level</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInEquipment">Spyware in Connected
Equipment</h3></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInEquipment">#SpywareInEquipment</a>)</span></em></ins></span>
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
@@ -1720,11 +1725,11 @@
<p>It is unfortunate that the article uses the term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
-</ul></em></ins></span>
+</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInBIOS">Spyware</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInTVSets">TV Sets</h4>
+ <h4 id="SpywareInTVSets">TV Sets</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
@@ -1786,7 +1791,7 @@
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users to new combined surveillance by default.</p>
+ users to</em></ins></span> new <span
class="removed"><del><strong>items</strong></del></span> <span
class="inserted"><ins><em>combined surveillance by default.</p>
</li>
<li id="M201507240">
@@ -1798,7 +1803,17 @@
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch, and even what they wanted to
+ snoops</em></ins></span> on <span class="removed"><del><strong>top under
each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>what programs people watch, and even what they wanted
to
record</a>.</p>
</li>
@@ -2790,7 +2805,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary/po/proprietary-surveillance.it.po 27 Oct 2018 08:28:53
-0000 1.252
+++ proprietary/po/proprietary-surveillance.it.po 30 Oct 2018 15:28:29
-0000 1.253
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1702,6 +1702,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Google apps on Android <a href=\"https://www.theguardian.com/"
"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
"record the user's location even when users disable “location "
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary-surveillance.ja-diff.html 27 Oct 2018
08:28:53 -0000 1.91
+++ proprietary/po/proprietary-surveillance.ja-diff.html 30 Oct 2018
15:28:29 -0000 1.92
@@ -921,26 +921,23 @@
<p>Adobe made “Digital Editions,”</em></ins></span>
the <span class="removed"><del><strong>user's consent”
for surveillance is inadequate as a protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app</strong></del></span>
<span class="inserted"><ins><em>e-reader used by most US
libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries, <a
+
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
<span class="inserted"><ins><em><li id="M201212030">
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop on</strong></del></span>
+ <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page the user reads at</em></ins></span> what <span
class="removed"><del><strong>radio and TV programs
- are playing nearby</a>. Also</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ report even which page the user reads at what
time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -956,15 +953,22 @@
</div>
<ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
+
<li id="M201808030">
- <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>Android <a
+ <p>Some Google apps</em></ins></span> on <span
class="removed"><del><strong>what radio and TV programs</strong></del></span>
<span class="inserted"><ins><em>Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>post on various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>disable “location
+ record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There are other ways to turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
+ <p>There</em></ins></span> are <span
class="removed"><del><strong>playing nearby</a>. Also on
what</strong></del></span> <span class="inserted"><ins><em>other ways to turn
off the other kinds of location
+ tracking, but most</em></ins></span> users <span
class="removed"><del><strong>post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>will be tricked by the misleading
control.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
@@ -997,12 +1001,12 @@
algorithms.</p>
<p>If so, none</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>Facebook users'
pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>apps were
- found</em></ins></span> to <span class="removed"><del><strong>the
service.</p>
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them to the
service.</p>
</li>
<li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
+ is based</strong></del></span> <span class="inserted"><ins><em>apps were
+ found to insecurely snitch</em></ins></span> on <span
class="inserted"><ins><em>its users. Furthermore, they could
detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>malware
(DRM</strong></del></span> <span class="inserted"><ins><em>apps whose
source code they cannot look at. The other apps might be snooping
in other ways.</p>
@@ -1011,9 +1015,9 @@
their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span
class="removed"><del><strong>submit</strong></del></span>
- <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>increased snooping</a>, and some
- are starting to realize that it is nasty.</p>
+ demanded</strong></del></span> <span class="inserted"><ins><em>freedom,
Android</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some
+ are starting</strong></del></span>
+ <span class="inserted"><ins><em>need</em></ins></span> to <span
class="removed"><del><strong>realize that it is nasty.</p>
<p>This article shows</strong></del></span> <span
class="inserted"><ins><em>get rid of</em></ins></span> the <span
class="inserted"><ins><em>proprietary software—both proprietary
Android by</em></ins></span> <a
@@ -1057,16 +1061,15 @@
other but not to the server's database.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight app
- <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p></strong></del></span>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
- <span class="inserted"><ins><em><li id="M201803050"></em></ins></span>
- <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>moviepass</em></ins></span> app <span
class="removed"><del><strong>because it asked the user</strong></del></span>
<span class="inserted"><ins><em>and dis-service
+ <span class="inserted"><ins><em><li id="M201803050">
+ <p>The moviepass</em></ins></span> app
+ <span class="removed"><del><strong><a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use</strong></del></span>
<span class="inserted"><ins><em>and dis-service
spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>a
movie</a>.</p>
+ where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
@@ -1075,23 +1078,24 @@
<p>Tracking software in popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
+ follow a user's movements around a physical store</em></ins></span> by
<span
class="removed"><del><strong>companies.</a></p></strong></del></span>
<span class="inserted"><ins><em>noticing WiFi
networks</a>.</p>
</li>
- <li id="M201708270">
- <p>The Sarahah app <a
+ <li id="M201708270"></em></ins></span>
+ <p>The <span class="removed"><del><strong>FTC criticized
this</strong></del></span> <span
class="inserted"><ins><em>Sarahah</em></ins></span> app <span
class="removed"><del><strong>because it asked</strong></del></span> <span
class="inserted"><ins><em><a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book</em></ins></span> to <span class="inserted"><ins><em>developer's
server. Note that this article misuses</em></ins></span> the <span
class="removed"><del><strong>app developer but</strong></del></span> <span
class="inserted"><ins><em>words
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ referring</em></ins></span> to
+ <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>zero price.</p>
</li>
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
+ calls and sent them and text messages and emails</em></ins></span> to
<span class="removed"><del><strong>the app developer but</strong></del></span>
<span class="inserted"><ins><em>snoopers</a>.</p>
<p>Google</em></ins></span> did not
<span class="removed"><del><strong>ask about
sending</strong></del></span> <span class="inserted"><ins><em>intend to make
these apps spy; on the contrary,</em></ins></span> it
@@ -1150,8 +1154,7 @@
<ul>
- <li><p>A company that makes internet-controlled vibrators <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued</strong></del></span> <span
class="inserted"><ins><em>developers are clever
+ <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
@@ -1160,19 +1163,20 @@
</li>
<li id="M201705230">
- <p>Apps</em></ins></span> for <span
class="removed"><del><strong>collecting</strong></del></span> <span
class="inserted"><ins><em>BART <a
+ <p>Apps for BART <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make
sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>makes
internet-controlled vibrators</strong></del></span> <span
class="inserted"><ins><em>they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that track users by <a
-
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
@@ -1241,7 +1245,7 @@
<li id="M201704074">
<p>Pairs of Android apps can collude
to transmit users' personal data to servers.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
+Lenovo stealthily installed crapware</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
@@ -1511,16 +1515,16 @@
<p>Red Shell is a spyware that
is found in many proprietary games. It <a
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data</em></ins></span> on <span
class="removed"><del><strong>Windows installs.
-Note</strong></del></span> <span class="inserted"><ins><em>users' computers
and sends it to third parties</a>.</p>
+ tracks data on users' computers</em></ins></span> and <span
class="inserted"><ins><em>sends it to third parties</a>.</p>
</li>
<li id="M201804144">
- <p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
+ <p>ArenaNet surreptitiously installed a</em></ins></span> spyware
<span class="removed"><del><strong>via BIOS</a></strong></del></span>
+ <span class="inserted"><ins><em>program along with an update to the massive
multiplayer game Guild War 2. The spyware allowed ArenaNet <a
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ to snoop</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
+Note</strong></del></span> <span class="inserted"><ins><em>all open processes
running on its user's computer</a>.</p>
</li>
<li id="M201711070">
@@ -2626,7 +2630,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/27 08:28:53 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary/po/proprietary-surveillance.ja.po 27 Oct 2018 08:28:53
-0000 1.225
+++ proprietary/po/proprietary-surveillance.ja.po 30 Oct 2018 15:28:29
-0000 1.226
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1406,6 +1406,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Google apps on Android <a href=\"https://www.theguardian.com/"
"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
"record the user's location even when users disable “location "
Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary/po/proprietary-surveillance.pot 27 Oct 2018 08:28:53 -0000
1.174
+++ proprietary/po/proprietary-surveillance.pot 30 Oct 2018 15:28:29 -0000
1.175
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -954,6 +954,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a "
+"href=\"https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/\">
"
+"track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Google apps on Android <a "
"href=\"https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile\">
"
"record the user's location even when users disable “location "
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.422
retrieving revision 1.423
diff -u -b -r1.422 -r1.423
--- proprietary/po/proprietary-surveillance.ru.po 27 Oct 2018 15:27:40
-0000 1.422
+++ proprietary/po/proprietary-surveillance.ru.po 30 Oct 2018 15:28:29
-0000 1.423
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2018-10-27 08:26+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-10-26 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1335,6 +1336,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Google apps on Android <a href=\"https://www.theguardian.com/"
"technology/2018/aug/13/google-location-tracking-android-iphone-mobile\"> "
"record the user's location even when users disable “location "
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/proprietary.de.po 30 Oct 2018 02:27:47 -0000 1.60
+++ proprietary/po/proprietary.de.po 30 Oct 2018 15:28:29 -0000 1.61
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -423,6 +423,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -474,44 +480,6 @@
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary.es.po 30 Oct 2018 02:27:47 -0000 1.59
+++ proprietary/po/proprietary.es.po 30 Oct 2018 15:28:29 -0000 1.60
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-09-19 10:49+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -436,6 +436,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -487,44 +493,6 @@
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/po/proprietary.fr.po 30 Oct 2018 11:40:11 -0000 1.71
+++ proprietary/po/proprietary.fr.po 30 Oct 2018 15:28:29 -0000 1.72
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-10-30 12:39+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -290,6 +291,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -369,67 +376,6 @@
"systems-with-\">comprenait un « mineur »</a>, c'est-à -dire un
exécutable qui "
"pirate le processeur de l'ordinateur client pour générer une cryptomonnaie."
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-"Un cracker a exploité une faille dans un logiciel non mis à jour <a href="
-"\"https://www.pcmag.com/news/360968/400-websites-secretly-served-"
-"cryptocurrency-miners-to-visito\">pour injecter un « mineur » dans les
pages "
-"web</a> servies aux visiteurs. Ce type de maliciel pirate le processeur de "
-"l'ordinateur pour générer une cryptomonnaie. (Notez que l'article se
réfère "
-"au logiciel infecté sous le nom de « système de gestion de contenu ».
Il "
-"aurait été plus correct de l'appeler « <a
href=\"/philosophy/words-to-avoid."
-"html#Content\">système de révision pour site web</a> ».)"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-"Comme le mineur était un programme JavaScript, les visiteurs n'auraient pas "
-"été affectés s'ils avaient utilisé <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Il existe également plusieurs extensions de navigateurs qui "
-"<a href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-"
-"to-mine-coins/\">bloquent spécifiquement les mineurs JavaScript</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"Les thermostats « intelligents » d'Honeywell communiquent par "
-"l'intermédiaire du serveur de la société. Ils ont toutes les "
-"caractéristiques de ce genre d'appareil : <a href=\"https://www."
-"businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
-"particulier ou de tous les utilisateurs en même temps), sans compter le "
-"risque de panne du serveur (c'est ce qui vient d'arriver)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"De plus, le réglage de la température se fait au moyen d'un logiciel non "
-"libre. Avec un thermostat traditionnel, on peut le faire directement sur le "
-"thermostat."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -507,6 +453,65 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "A cracker used an exploit in outdated software to <a href=\"https://www."
+#~ "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
+#~ "to-visito\"> inject a “miner” in web pages</a> served to "
+#~ "visitors. This type of malware hijacks the computer's processor to mine a "
+#~ "cryptocurrency. (Note that the article refers to the infected software as "
+#~ "“content management system”. A better term would be “<a "
+#~ "href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
+#~ "a>”.)"
+#~ msgstr ""
+#~ "Un cracker a exploité une faille dans un logiciel non mis à jour <a
href="
+#~ "\"https://www.pcmag.com/news/360968/400-websites-secretly-served-"
+#~ "cryptocurrency-miners-to-visito\">pour injecter un « mineur » dans les
"
+#~ "pages web</a> servies aux visiteurs. Ce type de maliciel pirate le "
+#~ "processeur de l'ordinateur pour générer une cryptomonnaie. (Notez que "
+#~ "l'article se réfère au logiciel infecté sous le nom de « système de "
+#~ "gestion de contenu ». Il aurait été plus correct de l'appeler « <a
href="
+#~ "\"/philosophy/words-to-avoid.html#Content\">système de révision pour
site "
+#~ "web</a> ».)"
+
+#~ msgid ""
+#~ "Since the miner was a nonfree JavaScript program, visitors wouldn't have "
+#~ "been affected if they had used <a href=\"/software/librejs/index.html"
+#~ "\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet."
+#~ "com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
+#~ "specifically block JavaScript miners</a> are also available."
+#~ msgstr ""
+#~ "Comme le mineur était un programme JavaScript, les visiteurs n'auraient "
+#~ "pas été affectés s'ils avaient utilisé <a
href=\"/software/librejs/index."
+#~ "html\">LibreJS</a>. Il existe également plusieurs extensions de "
+#~ "navigateurs qui <a href=\"https://www.cnet.com/how-to/how-to-stop-sites-"
+#~ "from-using-your-cpu-to-mine-coins/\">bloquent spécifiquement les mineurs "
+#~ "JavaScript</a>."
+
+#~ msgid ""
+#~ "Honeywell's “smart” thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-"
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "Les thermostats « intelligents » d'Honeywell communiquent par "
+#~ "l'intermédiaire du serveur de la société. Ils ont toutes les "
+#~ "caractéristiques de ce genre d'appareil : <a href=\"https://www."
+#~ "businessinsider.com/honeywell-iot-thermostats-server-"
+#~ "outage-2018-9\">surveillance et risque de sabotage</a> (d'un utilisateur "
+#~ "particulier ou de tous les utilisateurs en même temps), sans compter le "
+#~ "risque de panne du serveur (c'est ce qui vient d'arriver)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "De plus, le réglage de la température se fait au moyen d'un logiciel non
"
+#~ "libre. Avec un thermostat traditionnel, on peut le faire directement sur "
+#~ "le thermostat."
+
+#~ msgid ""
#~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/"
#~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
#~ "hide voice commands in other audio</a>, so that people cannot hear them, "
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary.it-diff.html 30 Oct 2018 02:27:47 -0000
1.18
+++ proprietary/po/proprietary.it-diff.html 30 Oct 2018 15:28:29 -0000
1.19
@@ -25,9 +25,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -38,19 +38,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 40em; }
-</style></em></ins></span>
+#TOC { width: 40em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -154,10 +154,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -179,6 +179,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
+
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
@@ -219,38 +225,6 @@
included a “miner”</a>, i.e. an executable that hijacks
the CPU in users' computers to mine a cryptocurrency.</p>
</li>
-
- <li id="M201805080">
- <p>A cracker used an exploit in outdated software to <a
-
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
- inject a “miner” in web pages</a> served to visitors.
This
- type of malware hijacks the computer's processor to mine a
- cryptocurrency. (Note that the article refers to the infected software
- as “content management system”. A better term would be
- “<a href="/philosophy/words-to-avoid.html#Content">website
- revision system</a>”.)</p>
-
- <p>Since the miner was a nonfree JavaScript program,
- visitors wouldn't have been affected if they had used <a
- href="/software/librejs/index.html">LibreJS</a>. Some
- browser extensions that <a
-
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
- specifically block JavaScript miners</a> are also
available.</p>
- </li>
-
- <li id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices: <a
-
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
- all users at once), as well as the risk of an outage (which is what
- just happened).</p>
-
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 02:27:47 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/proprietary.it.po 30 Oct 2018 02:27:47 -0000 1.69
+++ proprietary/po/proprietary.it.po 30 Oct 2018 15:28:29 -0000 1.70
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -427,6 +427,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -478,44 +484,6 @@
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary.ja-diff.html 30 Oct 2018 02:27:47 -0000
1.20
+++ proprietary/po/proprietary.ja-diff.html 30 Oct 2018 15:28:29 -0000
1.21
@@ -25,9 +25,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,8 +40,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -93,17 +93,17 @@
</tr>
<tr>
<td>
- <ul>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html">Malware
in the Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+ <li><a
href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -152,10 +152,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -176,6 +176,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
+
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
@@ -216,38 +222,6 @@
included a “miner”</a>, i.e. an executable that hijacks
the CPU in users' computers to mine a cryptocurrency.</p>
</li>
-
- <li id="M201805080">
- <p>A cracker used an exploit in outdated software to <a
-
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
- inject a “miner” in web pages</a> served to visitors.
This
- type of malware hijacks the computer's processor to mine a
- cryptocurrency. (Note that the article refers to the infected software
- as “content management system”. A better term would be
- “<a href="/philosophy/words-to-avoid.html#Content">website
- revision system</a>”.)</p>
-
- <p>Since the miner was a nonfree JavaScript program,
- visitors wouldn't have been affected if they had used <a
- href="/software/librejs/index.html">LibreJS</a>. Some
- browser extensions that <a
-
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
- specifically block JavaScript miners</a> are also
available.</p>
- </li>
-
- <li id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices: <a
-
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
- all users at once), as well as the risk of an outage (which is what
- just happened).</p>
-
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p>
- </li>
</ul></em></ins></span>
@@ -308,7 +282,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 02:27:47 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/proprietary.ja.po 30 Oct 2018 02:27:47 -0000 1.52
+++ proprietary/po/proprietary.ja.po 30 Oct 2018 15:28:29 -0000 1.53
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -349,6 +349,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -400,44 +406,6 @@
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary.nl-diff.html 30 Oct 2018 02:27:47 -0000
1.18
+++ proprietary/po/proprietary.nl-diff.html 30 Oct 2018 15:28:29 -0000
1.19
@@ -25,9 +25,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -38,19 +38,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
+#TOC ul { padding-bottom: .5em;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
-#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 40em; }
-</style></em></ins></span>
+#TOC { width: 40em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -179,6 +179,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
+
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
@@ -219,38 +225,6 @@
included a “miner”</a>, i.e. an executable that hijacks
the CPU in users' computers to mine a cryptocurrency.</p>
</li>
-
- <li id="M201805080">
- <p>A cracker used an exploit in outdated software to <a
-
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
- inject a “miner” in web pages</a> served to visitors.
This
- type of malware hijacks the computer's processor to mine a
- cryptocurrency. (Note that the article refers to the infected software
- as “content management system”. A better term would be
- “<a href="/philosophy/words-to-avoid.html#Content">website
- revision system</a>”.)</p>
-
- <p>Since the miner was a nonfree JavaScript program,
- visitors wouldn't have been affected if they had used <a
- href="/software/librejs/index.html">LibreJS</a>. Some
- browser extensions that <a
-
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
- specifically block JavaScript miners</a> are also
available.</p>
- </li>
-
- <li id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices: <a
-
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
- all users at once), as well as the risk of an outage (which is what
- just happened).</p>
-
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 02:27:47 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary.nl.po 30 Oct 2018 02:27:47 -0000 1.42
+++ proprietary/po/proprietary.nl.po 30 Oct 2018 15:28:29 -0000 1.43
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -420,6 +420,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -471,44 +477,6 @@
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary.pl-diff.html 30 Oct 2018 02:27:47 -0000
1.36
+++ proprietary/po/proprietary.pl-diff.html 30 Oct 2018 15:28:29 -0000
1.37
@@ -40,8 +40,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -85,8 +85,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>October, 2018, the pages in this directory
list around 350
-instances of malicious functionalities (with more than 400 references to
+<p>As of October, 2018, the pages in this directory list around 350
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -122,17 +122,17 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -177,6 +177,12 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
+ </li>
+
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
@@ -217,38 +223,6 @@
included a “miner”</a>, i.e. an executable that hijacks
the CPU in users' computers to mine a cryptocurrency.</p>
</li>
-
- <li id="M201805080">
- <p>A cracker used an exploit in outdated software to <a
-
href="https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito">
- inject a “miner” in web pages</a> served to visitors.
This
- type of malware hijacks the computer's processor to mine a
- cryptocurrency. (Note that the article refers to the infected software
- as “content management system”. A better term would be
- “<a href="/philosophy/words-to-avoid.html#Content">website
- revision system</a>”.)</p>
-
- <p>Since the miner was a nonfree JavaScript program,
- visitors wouldn't have been affected if they had used <a
- href="/software/librejs/index.html">LibreJS</a>. Some
- browser extensions that <a
-
href="https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/">
- specifically block JavaScript miners</a> are also
available.</p>
- </li>
-
- <li id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through the company's server. They have
- all the nasty characteristics of such devices: <a
-
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of a specific user, or of
- all users at once), as well as the risk of an outage (which is what
- just happened).</p>
-
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +283,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2018/10/30 02:27:47 $
+$Date: 2018/10/30 15:28:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary.pl.po 30 Oct 2018 02:27:48 -0000 1.37
+++ proprietary/po/proprietary.pl.po 30 Oct 2018 15:28:29 -0000 1.38
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -501,6 +501,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -552,44 +558,6 @@
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/proprietary.pot 30 Oct 2018 02:27:48 -0000 1.34
+++ proprietary/po/proprietary.pot 30 Oct 2018 15:28:30 -0000 1.35
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -241,6 +241,13 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a "
+"href=\"https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/\">
"
+"track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a "
"href=\"https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade
"
"the performance of older phones to force users to buy their newer "
@@ -292,46 +299,6 @@
"in users' computers to mine a cryptocurrency."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a "
-"href=\"https://www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-visito\">
"
-"inject a “miner” in web pages</a> served to visitors. This type "
-"of malware hijacks the computer's processor to mine a cryptocurrency. (Note "
-"that the article refers to the infected software as “content "
-"management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision "
-"system</a>”.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a "
-"href=\"/software/librejs/index.html\">LibreJS</a>. Some browser extensions "
-"that <a "
-"href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\">
"
-"specifically block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a "
-"href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9\">
"
-"surveillance, and danger of sabotage</a> (of a specific user, or of all "
-"users at once), as well as the risk of an outage (which is what just "
-"happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary.pt-br.po 30 Oct 2018 02:27:48 -0000 1.21
+++ proprietary/po/proprietary.pt-br.po 30 Oct 2018 15:28:30 -0000 1.22
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-10-29 13:02-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -294,6 +294,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -369,67 +375,6 @@
"executável que sequestra a CPU nos computadores dos usuários para minerar "
"uma criptomoeda."
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-"Um cracker usou um exploit em software desatualizado para <a href=\"https://"
-"www.pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
-"to-visito\"> injetar um âmineradorâ em páginas da web</a> servidas aos "
-"visitantes. Esse tipo de malware sequestra o processador do computador para "
-"minerar uma criptomoeda. (Observe que o artigo se refere ao software "
-"infectado como âsistema de gerenciamento de conteúdoâ. Um termo melhor
seria "
-"â<a href=\"/philosophy/words-to-avoid.html#Content\">sistema de revisão de
"
-"web sites</a>â.)"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-"Como o minerador era um programa JavaScript não livre, os visitantes não "
-"seriam afetados se tivessem usado o <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Algumas extensões de navegador que <a href=\"https://www."
-"cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
-"bloqueiam especificamente os mineradores em JavaScript</a> também estão "
-"disponÃveis."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"Termostatos âinteligentesâ da Honeywell se comunicam apenas através do "
-"servidor da empresa. Eles têm todas as caracterÃsticas desagradáveis de
tais "
-"dispositivos: <a href=\"https://www.businessinsider.com/honeywell-iot-"
-"thermostats-server-outage-2018-9\">vigilância e perigo de sabotagem</a> (de "
-"um usuário especÃfico ou de todos os usuários ao mesmo tempo), bem como o "
-"risco de uma indisponibilidade (que foi o que aconteceu)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"Além disso, definir a temperatura desejada requer a execução de software
não "
-"livre. Com um termostato antiquado, você pode fazê-lo usando controles "
-"diretamente no termostato."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -508,6 +453,63 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "A cracker used an exploit in outdated software to <a href=\"https://www."
+#~ "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
+#~ "to-visito\"> inject a “miner” in web pages</a> served to "
+#~ "visitors. This type of malware hijacks the computer's processor to mine a "
+#~ "cryptocurrency. (Note that the article refers to the infected software as "
+#~ "“content management system”. A better term would be “<a "
+#~ "href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
+#~ "a>”.)"
+#~ msgstr ""
+#~ "Um cracker usou um exploit em software desatualizado para <a href="
+#~ "\"https://www.pcmag.com/news/360968/400-websites-secretly-served-"
+#~ "cryptocurrency-miners-to-visito\"> injetar um âmineradorâ em páginas
da "
+#~ "web</a> servidas aos visitantes. Esse tipo de malware sequestra o "
+#~ "processador do computador para minerar uma criptomoeda. (Observe que o "
+#~ "artigo se refere ao software infectado como âsistema de gerenciamento de
"
+#~ "conteúdoâ. Um termo melhor seria â<a
href=\"/philosophy/words-to-avoid."
+#~ "html#Content\">sistema de revisão de web sites</a>â.)"
+
+#~ msgid ""
+#~ "Since the miner was a nonfree JavaScript program, visitors wouldn't have "
+#~ "been affected if they had used <a href=\"/software/librejs/index.html"
+#~ "\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet."
+#~ "com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
+#~ "specifically block JavaScript miners</a> are also available."
+#~ msgstr ""
+#~ "Como o minerador era um programa JavaScript não livre, os visitantes não
"
+#~ "seriam afetados se tivessem usado o <a href=\"/software/librejs/index.html"
+#~ "\">LibreJS</a>. Algumas extensões de navegador que <a href=\"https://www."
+#~ "cnet.com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
+#~ "bloqueiam especificamente os mineradores em JavaScript</a> também estão "
+#~ "disponÃveis."
+
+#~ msgid ""
+#~ "Honeywell's “smart” thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-"
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "Termostatos âinteligentesâ da Honeywell se comunicam apenas através
do "
+#~ "servidor da empresa. Eles têm todas as caracterÃsticas desagradáveis de
"
+#~ "tais dispositivos: <a href=\"https://www.businessinsider.com/honeywell-"
+#~ "iot-thermostats-server-outage-2018-9\">vigilância e perigo de sabotagem</"
+#~ "a> (de um usuário especÃfico ou de todos os usuários ao mesmo tempo),
bem "
+#~ "como o risco de uma indisponibilidade (que foi o que aconteceu)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "Além disso, definir a temperatura desejada requer a execução de
software "
+#~ "não livre. Com um termostato antiquado, você pode fazê-lo usando "
+#~ "controles diretamente no termostato."
+
+#~ msgid ""
#~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/"
#~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
#~ "hide voice commands in other audio</a>, so that people cannot hear them, "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary/po/proprietary.ru.po 30 Oct 2018 05:58:21 -0000 1.94
+++ proprietary/po/proprietary.ru.po 30 Oct 2018 15:28:30 -0000 1.95
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-10-30 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2018-10-30 15:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -294,6 +295,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -374,68 +381,6 @@
"коÑоÑÐ°Ñ Ð·Ð°Ñ
ваÑÑвала пÑоÑеÑÑÐ¾Ñ Ð²
компÑÑÑеÑе полÑзоваÑелÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ "
"кÑипÑовалÑÑÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-"ÐзломÑик воÑполÑзовалÑÑ Ð±ÑеÑÑÑ Ð²
необновленной пÑогÑамме Ð´Ð»Ñ <a href="
-"\"https://www.pcmag.com/news/360968/400-websites-secretly-served-"
-"cryptocurrency-miners-to-visito\"> вÑÑавки
“майнеÑа” на "
-"ÑÑÑаниÑаÑ
ÑайÑа</a>, пеÑедаваемÑÑ
поÑеÑиÑелÑм. Такого Ñода вÑедоноÑнÑе "
-"пÑогÑÐ°Ð¼Ð¼Ñ Ð·Ð°Ñ
ваÑÑваÑÑ Ð¿ÑоÑеÑÑоÑ
компÑÑÑеÑа, ÑÑÐ¾Ð±Ñ Ð²ÑÑабаÑÑваÑÑ
кÑипÑовалÑÑÑ. "
-"(ÐбÑаÑаем ваÑе внимание, ÑÑо в ÑÑаÑÑе
заÑаженнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð°Ð·ÑваÑÑÑÑ “"
-"ÑиÑÑемой ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ ÐºÐ¾Ð½ÑенÑом”. ÐÑÑÑим
назÑванием бÑло Ð±Ñ “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">ÑиÑÑема
ÑедакÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ "
-"ÑайÑов</a>”.)"
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-"ÐоÑколÑÐºÑ “майнеє бÑл неÑвободной
пÑогÑаммой на JavaScript, "
-"поÑеÑиÑели не бÑли Ð±Ñ Ð¿Ð¾Ð´Ð²ÐµÑженÑ
злоÑпоÑÑеблениÑ, еÑли Ð±Ñ Ð¾Ð½Ð¸ пÑименÑли <a "
-"href=\"/software/librejs/index.html\">LibreJS</a>. ÐÑÑÑ Ñакже
ÑаÑÑиÑÐµÐ½Ð¸Ñ "
-"бÑаÑзеÑов, <a
href=\"https://www.cnet.com/how-to/how-to-stop-sites-from-"
-"using-your-cpu-to-mine-coins/\"> ÑозданнÑе ÑпеÑиалÑно
Ð´Ð»Ñ Ð±Ð»Ð¾ÐºÐ¸Ñовки "
-"майнеÑов на JavaScript</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-"“ÐнÑеллекÑÑалÑнÑе” ÑеÑмоÑÑаÑÑ Honeywell
ÑвÑзÑваÑÑÑÑ ÑолÑко Ñ "
-"ÑеÑвеÑом компании. У ниÑ
еÑÑÑ Ð²Ñе ÑквеÑнÑе
ÑеÑÑÑ ÑакиÑ
ÑÑÑÑойÑÑв: <a href="
-"\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> Ñлежка и опаÑноÑÑÑ ÑабоÑажа</a>
(конкÑеÑного полÑзоваÑÐµÐ»Ñ Ð¸ "
-"вÑеÑ
полÑзоваÑелей ÑÑазÑ), а Ñакже ÑиÑк
пеÑеÑÑвов в ÑабоÑе (именно ÑÑо и "
-"пÑоизоÑло)."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-"ÐÑоме Ñого, ÑÑÑановка ÑÑебÑемой
ÑемпеÑаÑÑÑÑ ÑÑебÑÐµÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм.
Ð "
-"ÑÑаÑомоднÑÑ
ÑеÑмоÑÑаÑаÑ
ÑÑо делаеÑÑÑ Ñ
помоÑÑÑ Ð¾Ñганов ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑÑмо на "
-"ÑеÑмоÑÑаÑе."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -515,6 +460,64 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "A cracker used an exploit in outdated software to <a href=\"https://www."
+#~ "pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-"
+#~ "to-visito\"> inject a “miner” in web pages</a> served to "
+#~ "visitors. This type of malware hijacks the computer's processor to mine a "
+#~ "cryptocurrency. (Note that the article refers to the infected software as "
+#~ "“content management system”. A better term would be “<a "
+#~ "href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
+#~ "a>”.)"
+#~ msgstr ""
+#~ "ÐзломÑик воÑполÑзовалÑÑ Ð±ÑеÑÑÑ Ð²
необновленной пÑогÑамме Ð´Ð»Ñ <a href="
+#~ "\"https://www.pcmag.com/news/360968/400-websites-secretly-served-"
+#~ "cryptocurrency-miners-to-visito\"> вÑÑавки
“майнеÑа” на "
+#~ "ÑÑÑаниÑаÑ
ÑайÑа</a>, пеÑедаваемÑÑ
поÑеÑиÑелÑм. Такого Ñода вÑедоноÑнÑе "
+#~ "пÑогÑÐ°Ð¼Ð¼Ñ Ð·Ð°Ñ
ваÑÑваÑÑ Ð¿ÑоÑеÑÑоÑ
компÑÑÑеÑа, ÑÑÐ¾Ð±Ñ Ð²ÑÑабаÑÑваÑÑ "
+#~ "кÑипÑовалÑÑÑ. (ÐбÑаÑаем ваÑе внимание,
ÑÑо в ÑÑаÑÑе заÑаженнÑе пÑогÑÐ°Ð¼Ð¼Ñ "
+#~ "назÑваÑÑÑÑ “ÑиÑÑемой ÑпÑавлениÑ
конÑенÑом”. ÐÑÑÑим назÑванием "
+#~ "бÑло Ð±Ñ “<a href=\"/philosophy/words-to-avoid.html#Content"
+#~ "\">ÑиÑÑема ÑедакÑиÑÐ¾Ð²Ð°Ð½Ð¸Ñ ÑайÑов</a>”.)"
+
+#~ msgid ""
+#~ "Since the miner was a nonfree JavaScript program, visitors wouldn't have "
+#~ "been affected if they had used <a href=\"/software/librejs/index.html"
+#~ "\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet."
+#~ "com/how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> "
+#~ "specifically block JavaScript miners</a> are also available."
+#~ msgstr ""
+#~ "ÐоÑколÑÐºÑ “майнеє бÑл
неÑвободной пÑогÑаммой на JavaScript, "
+#~ "поÑеÑиÑели не бÑли Ð±Ñ Ð¿Ð¾Ð´Ð²ÐµÑженÑ
злоÑпоÑÑеблениÑ, еÑли Ð±Ñ Ð¾Ð½Ð¸ пÑименÑли "
+#~ "<a href=\"/software/librejs/index.html\">LibreJS</a>. ÐÑÑÑ Ñакже "
+#~ "ÑаÑÑиÑÐµÐ½Ð¸Ñ Ð±ÑаÑзеÑов, <a
href=\"https://www.cnet.com/how-to/how-to-stop-"
+#~ "sites-from-using-your-cpu-to-mine-coins/\"> ÑозданнÑе
ÑпеÑиалÑно Ð´Ð»Ñ "
+#~ "блокиÑовки майнеÑов на JavaScript</a>."
+
+#~ msgid ""
+#~ "Honeywell's “smart” thermostats communicate only through the "
+#~ "company's server. They have all the nasty characteristics of such "
+#~ "devices: <a href=\"https://www.businessinsider.com/honeywell-iot-"
+#~ "thermostats-server-outage-2018-9\"> surveillance, and danger of sabotage</"
+#~ "a> (of a specific user, or of all users at once), as well as the risk of "
+#~ "an outage (which is what just happened)."
+#~ msgstr ""
+#~ "“ÐнÑеллекÑÑалÑнÑе” ÑеÑмоÑÑаÑÑ
Honeywell ÑвÑзÑваÑÑÑÑ ÑолÑко Ñ "
+#~ "ÑеÑвеÑом компании. У ниÑ
еÑÑÑ Ð²Ñе
ÑквеÑнÑе ÑеÑÑÑ ÑакиÑ
ÑÑÑÑойÑÑв: <a href="
+#~ "\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
+#~ "outage-2018-9\"> Ñлежка и опаÑноÑÑÑ ÑабоÑажа</a>
(конкÑеÑного "
+#~ "полÑзоваÑÐµÐ»Ñ Ð¸ вÑеÑ
полÑзоваÑелей
ÑÑазÑ), а Ñакже ÑиÑк пеÑеÑÑвов в ÑабоÑе "
+#~ "(именно ÑÑо и пÑоизоÑло)."
+
+#~ msgid ""
+#~ "In addition, setting the desired temperature requires running nonfree "
+#~ "software. With an old-fashioned thermostat, you can do it using controls "
+#~ "right on the thermostat."
+#~ msgstr ""
+#~ "ÐÑоме Ñого, ÑÑÑановка ÑÑебÑемой
ÑемпеÑаÑÑÑÑ ÑÑебÑÐµÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм. "
+#~ "Ð ÑÑаÑомоднÑÑ
ÑеÑмоÑÑаÑаÑ
ÑÑо делаеÑÑÑ
Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð¾Ñганов ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¿ÑÑмо "
+#~ "на ÑеÑмоÑÑаÑе."
+
+#~ msgid ""
#~ "Researchers have discovered how to <a href=\"http://news.rub.de/english/"
#~ "press-releases/2018-09-24-it-security-secret-messages-alexa-and-co\"> "
#~ "hide voice commands in other audio</a>, so that people cannot hear them, "
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary.zh-tw.po 30 Oct 2018 02:27:48 -0000 1.20
+++ proprietary/po/proprietary.zh-tw.po 30 Oct 2018 15:28:30 -0000 1.21
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2018-10-30 02:25+0000\n"
+"POT-Creation-Date: 2018-10-30 15:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -338,6 +338,12 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
+"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
@@ -389,44 +395,6 @@
"hijacks the CPU in users' computers to mine a cryptocurrency."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A cracker used an exploit in outdated software to <a href=\"https://www."
-"pcmag.com/news/360968/400-websites-secretly-served-cryptocurrency-miners-to-"
-"visito\"> inject a “miner” in web pages</a> served to visitors. "
-"This type of malware hijacks the computer's processor to mine a "
-"cryptocurrency. (Note that the article refers to the infected software as "
-"“content management system”. A better term would be “<a "
-"href=\"/philosophy/words-to-avoid.html#Content\">website revision system</"
-"a>”.)"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Since the miner was a nonfree JavaScript program, visitors wouldn't have "
-"been affected if they had used <a href=\"/software/librejs/index.html"
-"\">LibreJS</a>. Some browser extensions that <a href=\"https://www.cnet.com/"
-"how-to/how-to-stop-sites-from-using-your-cpu-to-mine-coins/\"> specifically "
-"block JavaScript miners</a> are also available."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Honeywell's “smart” thermostats communicate only through the "
-"company's server. They have all the nasty characteristics of such devices: "
-"<a href=\"https://www.businessinsider.com/honeywell-iot-thermostats-server-"
-"outage-2018-9\"> surveillance, and danger of sabotage</a> (of a specific "
-"user, or of all users at once), as well as the risk of an outage (which is "
-"what just happened)."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In addition, setting the desired temperature requires running nonfree "
-"software. With an old-fashioned thermostat, you can do it using controls "
-"right on the thermostat."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: server/body-include-2.sq.html
===================================================================
RCS file: /web/www/www/server/body-include-2.sq.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- server/body-include-2.sq.html 3 Jan 2018 21:31:06 -0000 1.110
+++ server/body-include-2.sq.html 30 Oct 2018 15:28:30 -0000 1.111
@@ -74,14 +74,14 @@
<li id="tabLicenses" class="active">
<!--#echo encoding="none" var="MARK_START" -->
-<a href="/licenses/licenses.html">LEJE</a>
+<a href="/licenses/licenses.html">LICENCA</a>
<!--#echo encoding="none" var="MARK_END" -->
</li>
<!--#else -->
-<li id="tabLicenses"><a href="/licenses/licenses.html">LEJE</a></li>
+<li id="tabLicenses"><a href="/licenses/licenses.html">LICENCA</a></li>
<!--#endif -->
<!--#if expr="$REQUEST_URI = /^\/education\//" -->
Index: server/outdated.sq.html
===================================================================
RCS file: /web/www/www/server/outdated.sq.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- server/outdated.sq.html 29 Nov 2014 10:27:30 -0000 1.13
+++ server/outdated.sq.html 30 Oct 2018 15:28:30 -0000 1.14
@@ -17,19 +17,19 @@
<!--
TRANSLATORS: The text of the link; the next string is the last part
of the sentence (just a period in English). -->
-origjinali në Anglisht</a>.
+origjinali në anglisht</a>.
<!--#else -->
<!--
TRANSLATORS: The link to the English page will follow this string. -->
-Ky përkthim mund të mos i pasqyrojë ndryshimet e bëra te
+Ky përkthim mund të mos i pasqyrojë ndryshimet më të reja të bëra te
<!--#echo encoding="none" var="ORIGINAL_LINK" -->
<!--
TRANSLATORS: The text of the link; the next string is the last part
of the sentence (just a period in English). -->
-origjinali në Anglisht</a><span>.</span>
+origjinali në anglisht</a><span>.</span>
<!--#endif -->
Index: server/sitemap.sq.html
===================================================================
RCS file: /web/www/www/server/sitemap.sq.html,v
retrieving revision 1.257
retrieving revision 1.258
diff -u -b -r1.257 -r1.258
--- server/sitemap.sq.html 27 Oct 2018 17:00:55 -0000 1.257
+++ server/sitemap.sq.html 30 Oct 2018 15:28:30 -0000 1.258
@@ -68,7 +68,7 @@
<dl><dt><a class="topmost-title"
href="/accessibility/accessibility.html">përdorshmëri</a></dt>
<dd><span class="topmost-title">
-Deklaratë e GNU-së Mbi Hyrshmërinë
+Deklaratë e GNU-së Mbi Përdorimin Nën Me Aftësi të Kufizuara
</span>
</dd></dl>
</div>
@@ -659,7 +659,7 @@
<dt><a href="/graphics/free-your-soul.html">free-your-soul.html</a></dt>
<dd>Sfond ekrani âÃlironi Shpirtin Tuajâ</dd>
<dt><a
href="/graphics/freedom-reflection.html">freedom-reflection.html</a></dt>
- <dd>Freedom Reflection</dd>
+ <dd>Përsiatje Mbi Lirinë</dd>
<dt><a href="/graphics/freedom.html">freedom.html</a></dt>
<dd>Ã'do të Thorë Liri</dd>
<dt><a href="/graphics/french-motto.html">french-motto.html</a></dt>
@@ -671,7 +671,7 @@
<dt><a href="/graphics/FSFS-logo.html">FSFS-logo.html</a></dt>
<dd>Logoja për kapakun e librit "Software i Lirë, Shoqëri e Lirë"</dd>
<dt><a href="/graphics/gg3po.html">gg3po.html</a></dt>
- <dd>New GNU</dd>
+ <dd>GNU i ri</dd>
<dt><a href="/graphics/gleesons.html">gleesons.html</a></dt>
<dd>Art GNU nga Gleeson</dd>
<dt><a href="/graphics/gNewSense.html">gNewSense.html</a></dt>
@@ -786,7 +786,7 @@
<dt><a href="/graphics/Trisquel.html">Trisquel.html</a></dt>
<dd>Trisquel</dd>
<dt><a href="/graphics/usegnu.html">usegnu.html</a></dt>
- <dd>Use 'GNU</dd>
+ <dd>Përdorni 'GNU</dd>
<dt><a href="/graphics/wallpapers.html">wallpapers.html</a></dt>
<dd>Sfonde</dd>
<dt><a href="/graphics/whatsgnu.html">whatsgnu.html</a></dt>
@@ -1252,7 +1252,7 @@
<dd>Liri apo Pushtet?</dd>
<dt><a
href="/philosophy/fs-and-sustainable-development.html">fs-and-sustainable-development.html</a></dt>
- <dd>Free Software and Sustainable Development</dd>
+ <dd>Software-i Lirë dhe Zhvillim i Qëndrueshëm</dd>
<dt><a href="/philosophy/fs-motives.html">fs-motives.html</a></dt>
<dd>Arsye Për Shkrim Software-i të Lirë</dd>
<dt><a href="/philosophy/fs-translations.html">fs-translations.html</a></dt>
@@ -2022,7 +2022,7 @@
<div id="directory-usenet">
<dl><dt><a class="topmost-title" href="/usenet/usenet.html">usenet</a></dt>
<dd><span class="topmost-title">
-gnUSENET gnu.* Hierarchy
+Hierarki në gnUSENET gnu.*
</span>
</dd></dl>
</div>
@@ -2130,7 +2130,7 @@
<p class="unprintable"><!-- timestamp start -->
U përditësua më:
-$Date: 2018/10/27 17:00:55 $
+$Date: 2018/10/30 15:28:30 $
<!-- timestamp end -->
</p>
Index: server/top-addendum.sq.html
===================================================================
RCS file: /web/www/www/server/top-addendum.sq.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- server/top-addendum.sq.html 29 Aug 2014 07:04:45 -0000 1.5
+++ server/top-addendum.sq.html 30 Oct 2018 15:28:30 -0000 1.6
@@ -10,7 +10,7 @@
<!--#endif -->
<p class="trans-disclaimer">
<!--#echo encoding="none" var="link_to_english_page" -->
-Ky është përkthim i një faqeje Anglisht në origjinal.
+Ky është përkthim i një faqeje anglisht në origjinal.
<br />
<!--#if expr="${ENGLISH_PAGE}" -->
Index: server/po/outdated.sq.po
===================================================================
RCS file: /web/www/www/server/po/outdated.sq.po,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
Index: server/po/sitemap.sq.po
===================================================================
RCS file: /web/www/www/server/po/sitemap.sq.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- server/po/sitemap.sq.po 30 Oct 2018 14:23:34 -0000 1.295
+++ server/po/sitemap.sq.po 30 Oct 2018 15:28:30 -0000 1.296
@@ -2,7 +2,7 @@
msgid ""
msgstr ""
"Project-Id-Version: \n"
-"POT-Creation-Date: 2018-09-29 16:56+0000\n"
+"POT-Creation-Date: 2018-10-27 16:57+0000\n"
"PO-Revision-Date: 2018-10-30 14:59+0200\n"
"Last-Translator: Besnik Bleta <address@hidden>\n"
"Language-Team: address@hidden"
@@ -102,7 +102,7 @@
#. type: Content of: <div><dl><dd><span>
msgid "GNU Accessibility Statement"
-msgstr ""
+msgstr "Deklaratë e GNU-së Mbi Përdorimin Nën Me Aftësi të Kufizuara"
#. type: Content of: <div><dl><dd>
msgid "</span>"
@@ -893,14 +893,6 @@
msgstr "C pak a shumë"
#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/clinton.tree.html\">clinton.tree.html</a>"
-msgstr "<a href=\"/fun/jokes/clinton.tree.html\">clinton.tree.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "If Clinton was a tree!"
-msgstr "Sikur Klintoni të qe pemë!"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
msgid "<a href=\"/fun/jokes/courtroom.quips.html\">courtroom.quips.html</a>"
msgstr "<a href=\"/fun/jokes/courtroom.quips.html\">courtroom.quips.html</a>"
@@ -917,14 +909,6 @@
msgstr "Viç i Ngordhur?"
#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/declarations.html\">declarations.html</a>"
-msgstr "<a href=\"/fun/jokes/declarations.html\">declarations.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Funny C/C++ declarations!"
-msgstr "Deklarime C/C++ zbavitëse!"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
msgid "<a href=\"/fun/jokes/dna.html\">dna.html</a>"
msgstr "<a href=\"/fun/jokes/dna.html\">dna.html</a>"
@@ -1060,14 +1044,6 @@
msgstr ""
#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/gingrinch.html\">gingrinch.html</a>"
-msgstr "<a href=\"/fun/jokes/gingrinch.html\">gingrinch.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "THE GINGRINCH THAT STOLE CONGRESS"
-msgstr ""
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
msgid "<a href=\"/fun/jokes/gnu-overflow.html\">gnu-overflow.html</a>"
msgstr "<a href=\"/fun/jokes/gnu-overflow.html\">gnu-overflow.html</a>"
@@ -1201,23 +1177,6 @@
msgstr "E meta e Fundit"
#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/lawyers.html\">lawyers.html</a>"
-msgstr "<a href=\"/fun/jokes/lawyers.html\">lawyers.html</a>"
-
-# type: Content of: <ul><li>
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Lawyers"
-msgstr "Avokatët"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/linus-islam.html\">linus-islam.html</a>"
-msgstr "<a href=\"/fun/jokes/linus-islam.html\">linus-islam.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Linus Converts to Islam"
-msgstr "Linusi konvertohet në Islam"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
msgid "<a href=\"/fun/jokes/long-options.html\">long-options.html</a>"
msgstr "<a href=\"/fun/jokes/long-options.html\">long-options.html</a>"
@@ -1364,14 +1323,6 @@
msgstr "Klauzolë!"
#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/jokes/quayle.html\">quayle.html</a>"
-msgstr "<a href=\"/fun/jokes/quayle.html\">quayle.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Dan Quayle"
-msgstr "Dan Quayle"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
msgid "<a href=\"/fun/jokes/quotations.html\">quotations.html</a>"
msgstr "<a href=\"/fun/jokes/quotations.html\">quotations.html</a>"
@@ -1432,18 +1383,6 @@
msgstr ""
#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid ""
-"<a href=\"/fun/jokes/top-10-election-2000-bumper-stickers.html\">top-10-"
-"election-2000-bumper-stickers.html</a>"
-msgstr ""
-"<a href=\"/fun/jokes/top-10-election-2000-bumper-stickers.html\">top-10-"
-"election-2000-bumper-stickers.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "Top 10 Election 2000 Bumper Stickers"
-msgstr ""
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
msgid "<a href=\"/fun/jokes/typoglycemia.html\">typoglycemia.html</a>"
msgstr "<a href=\"/fun/jokes/typoglycemia.html\">typoglycemia.html</a>"
@@ -1564,14 +1503,6 @@
msgstr "<a href=\"/fun/spam/\">zbavitje/spam</a>"
#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
-msgid "<a href=\"/fun/spam/darkprofits.html\">darkprofits.html</a>"
-msgstr "<a href=\"/fun/spam/darkprofits.html\">darkprofits.html</a>"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dd>
-msgid "darkprofits.net"
-msgstr "darkprofits.net"
-
-#. type: Content of: <div><dl><dd><div><dl><dd><dl><dt>
msgid "<a href=\"/fun/spam/sheep.html\">sheep.html</a>"
msgstr "<a href=\"/fun/spam/sheep.html\">sheep.html</a>"
@@ -4246,6 +4177,18 @@
"<a href=\"/philosophy/kevin-cole-response.html\">kevin-cole-response.html</a>"
#. type: Content of: <div><dl><dd><dl><dt>
+msgid ""
+"<a href=\"/philosophy/kind-communication.html\">kind-communication.html</a>"
+msgstr ""
+"<a href=\"/philosophy/kind-communication.html\">kind-communication.html</a>"
+
+#. type: Content of: <div><dl><dd><dl><dd>
+#, fuzzy
+#| msgid "GNU Webmastering Guidelines"
+msgid "GNU Kind Communications Guidelines"
+msgstr "Udhëzime për Përgjegjësa Web të GNU-së"
+
+#. type: Content of: <div><dl><dd><dl><dt>
msgid "<a href=\"/philosophy/komongistan.html\">komongistan.html</a>"
msgstr "<a href=\"/philosophy/komongistan.html\">komongistan.html</a>"
@@ -6777,6 +6720,53 @@
msgid "Updated:"
msgstr "U përditësua më:"
+#~ msgid "<a href=\"/fun/jokes/clinton.tree.html\">clinton.tree.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/clinton.tree.html\">clinton.tree.html</a>"
+
+#~ msgid "If Clinton was a tree!"
+#~ msgstr "Sikur Klintoni të qe pemë!"
+
+#~ msgid "<a href=\"/fun/jokes/declarations.html\">declarations.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/declarations.html\">declarations.html</a>"
+
+#~ msgid "Funny C/C++ declarations!"
+#~ msgstr "Deklarime C/C++ zbavitëse!"
+
+#~ msgid "<a href=\"/fun/jokes/gingrinch.html\">gingrinch.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/gingrinch.html\">gingrinch.html</a>"
+
+#~ msgid "<a href=\"/fun/jokes/lawyers.html\">lawyers.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/lawyers.html\">lawyers.html</a>"
+
+# type: Content of: <ul><li>
+#~ msgid "Lawyers"
+#~ msgstr "Avokatët"
+
+#~ msgid "<a href=\"/fun/jokes/linus-islam.html\">linus-islam.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/linus-islam.html\">linus-islam.html</a>"
+
+#~ msgid "Linus Converts to Islam"
+#~ msgstr "Linusi konvertohet në Islam"
+
+#~ msgid "<a href=\"/fun/jokes/quayle.html\">quayle.html</a>"
+#~ msgstr "<a href=\"/fun/jokes/quayle.html\">quayle.html</a>"
+
+#~ msgid "Dan Quayle"
+#~ msgstr "Dan Quayle"
+
+#~ msgid ""
+#~ "<a href=\"/fun/jokes/top-10-election-2000-bumper-stickers.html\">top-10-"
+#~ "election-2000-bumper-stickers.html</a>"
+#~ msgstr ""
+#~ "<a href=\"/fun/jokes/top-10-election-2000-bumper-stickers.html\">top-10-"
+#~ "election-2000-bumper-stickers.html</a>"
+
+#~ msgid "<a href=\"/fun/spam/darkprofits.html\">darkprofits.html</a>"
+#~ msgstr "<a href=\"/fun/spam/darkprofits.html\">darkprofits.html</a>"
+
+#~ msgid "darkprofits.net"
+#~ msgstr "darkprofits.net"
+
#~ msgid ""
#~ "<a href=\"/server/fsf-html-style-sheet.html\">fsf-html-style-sheet.html</"
#~ "a>"
Index: server/po/top-addendum.sq.po
===================================================================
RCS file: /web/www/www/server/po/top-addendum.sq.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- server/po/top-addendum.sq.po 30 Oct 2018 14:23:34 -0000 1.7
+++ server/po/top-addendum.sq.po 30 Oct 2018 15:28:30 -0000 1.8
@@ -9,11 +9,11 @@
"POT-Creation-Date: 2012-09-27 05:00-0300\n"
"PO-Revision-Date: 2018-10-30 14:41+0200\n"
"Last-Translator: Besnik Bleta <address@hidden>\n"
+"Language-Team: \n"
"Language: sq\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"Language-Team: \n"
"X-Generator: Poedit 2.0.5\n"
#. #echo encoding="none" var="link_to_english_page"
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www proprietary/po/malware-mobiles.de-diff.html...,
GNUN <=