www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www philosophy/free-software-even-more-importan...


From: GNUN
Subject: www philosophy/free-software-even-more-importan...
Date: Sat, 17 Nov 2018 02:27:57 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/11/17 02:27:57

Modified files:
        philosophy     : free-software-even-more-important.de.html 
                         free-software-even-more-important.it.html 
                         free-software-even-more-important.nl.html 
                         free-software-even-more-important.uk.html 
        philosophy/po  : free-software-even-more-important.it-diff.html 
                         free-software-even-more-important.uk-diff.html 
        proprietary    : proprietary.de.html proprietary.zh-tw.html 
        proprietary/po : proprietary.de-diff.html 
                         proprietary.zh-tw-diff.html 
Added files:
        philosophy/po  : free-software-even-more-important.de-diff.html 
                         free-software-even-more-important.nl-diff.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/free-software-even-more-important.de.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/free-software-even-more-important.it.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/free-software-even-more-important.nl.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/free-software-even-more-important.uk.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.it-diff.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.uk-diff.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.de-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.nl-diff.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.de.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.zh-tw.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.1&r2=1.2

Patches:
Index: philosophy/free-software-even-more-important.de.html
===================================================================
RCS file: /web/www/www/philosophy/free-software-even-more-important.de.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- philosophy/free-software-even-more-important.de.html        11 Nov 2017 
01:58:29 -0000      1.10
+++ philosophy/free-software-even-more-important.de.html        17 Nov 2018 
07:27:56 -0000      1.11
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/free-software-even-more-important.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/free-software-even-more-important.de.po">
+ https://www.gnu.org/philosophy/po/free-software-even-more-important.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/free-software-even-more-important.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/free-software-even-more-important.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-09-18" --><!--#set 
var="ENGLISH_PAGE" 
value="/philosophy/free-software-even-more-important.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -9,6 +14,7 @@
 
 <!--#include 
virtual="/philosophy/po/free-software-even-more-important.translist" -->
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Freie Software ist jetzt sogar noch wichtiger</h2>
 
 <p>von <strong><a href="//www.stallman.org/">Richard Stallman</a></strong></p>
@@ -413,7 +419,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2017/11/11 01:58:29 $
+$Date: 2018/11/17 07:27:56 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/free-software-even-more-important.it.html
===================================================================
RCS file: /web/www/www/philosophy/free-software-even-more-important.it.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- philosophy/free-software-even-more-important.it.html        30 Dec 2017 
13:29:18 -0000      1.13
+++ philosophy/free-software-even-more-important.it.html        17 Nov 2018 
07:27:56 -0000      1.14
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/free-software-even-more-important.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/free-software-even-more-important.it.po">
+ https://www.gnu.org/philosophy/po/free-software-even-more-important.it.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/free-software-even-more-important.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/free-software-even-more-important.it-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-09-18" --><!--#set 
var="ENGLISH_PAGE" 
value="/philosophy/free-software-even-more-important.en.html" -->
 
 <!--#include virtual="/server/header.it.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -9,6 +14,7 @@
 
 <!--#include 
virtual="/philosophy/po/free-software-even-more-important.translist" -->
 <!--#include virtual="/server/banner.it.html" -->
+<!--#include virtual="/server/outdated.it.html" -->
 <h2>Adesso il Software libero è ancora più importante </h2>
 
 <p>di <a href="http://www.stallman.org/";><strong>Richard 
Stallman</strong></a></p>
@@ -390,7 +396,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Ultimo aggiornamento:
 
-$Date: 2017/12/30 13:29:18 $
+$Date: 2018/11/17 07:27:56 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/free-software-even-more-important.nl.html
===================================================================
RCS file: /web/www/www/philosophy/free-software-even-more-important.nl.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- philosophy/free-software-even-more-important.nl.html        24 Nov 2017 
21:58:39 -0000      1.7
+++ philosophy/free-software-even-more-important.nl.html        17 Nov 2018 
07:27:56 -0000      1.8
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/free-software-even-more-important.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/free-software-even-more-important.nl.po">
+ https://www.gnu.org/philosophy/po/free-software-even-more-important.nl.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/free-software-even-more-important.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/free-software-even-more-important.nl-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-09-18" --><!--#set 
var="ENGLISH_PAGE" 
value="/philosophy/free-software-even-more-important.en.html" -->
 
 <!--#include virtual="/server/header.nl.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -9,6 +14,7 @@
 
 <!--#include 
virtual="/philosophy/po/free-software-even-more-important.translist" -->
 <!--#include virtual="/server/banner.nl.html" -->
+<!--#include virtual="/server/outdated.nl.html" -->
 <h2>Vrije software is juist tegenwoordig nog belangrijker</h2>
 
 <p>door <a href="http://www.stallman.org/";><strong>Richard
@@ -391,7 +397,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Bijgewerkt:
 
-$Date: 2017/11/24 21:58:39 $
+$Date: 2018/11/17 07:27:56 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/free-software-even-more-important.uk.html
===================================================================
RCS file: /web/www/www/philosophy/free-software-even-more-important.uk.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- philosophy/free-software-even-more-important.uk.html        10 Dec 2017 
07:30:45 -0000      1.10
+++ philosophy/free-software-even-more-important.uk.html        17 Nov 2018 
07:27:56 -0000      1.11
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" 
value="/philosophy/free-software-even-more-important.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/philosophy/po/free-software-even-more-important.uk.po">
+ https://www.gnu.org/philosophy/po/free-software-even-more-important.uk.po</a>'
+ --><!--#set var="ORIGINAL_FILE" 
value="/philosophy/free-software-even-more-important.html"
+ --><!--#set var="DIFF_FILE" 
value="/philosophy/po/free-software-even-more-important.uk-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-09-18" --><!--#set 
var="ENGLISH_PAGE" 
value="/philosophy/free-software-even-more-important.en.html" -->
 
 <!--#include virtual="/server/header.uk.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -9,6 +14,7 @@
 
 <!--#include 
virtual="/philosophy/po/free-software-even-more-important.translist" -->
 <!--#include virtual="/server/banner.uk.html" -->
+<!--#include virtual="/server/outdated.uk.html" -->
 <h2>Вільне програмне забезпечення ще 
важливішим зараз</h2>
 
 <p><a href="http://www.stallman.org/";><strong>Річард 
Столмен</strong></a></p>
@@ -380,7 +386,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Оновлено:
 
-$Date: 2017/12/10 07:30:45 $
+$Date: 2018/11/17 07:27:56 $
 
 <!-- timestamp end -->
 </p>

Index: philosophy/po/free-software-even-more-important.it-diff.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/free-software-even-more-important.it-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/free-software-even-more-important.it-diff.html        5 Sep 
2017 12:59:46 -0000       1.1
+++ philosophy/po/free-software-even-more-important.it-diff.html        17 Nov 
2018 07:27:57 -0000      1.2
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.85</em></ins></span> --&gt;
 &lt;title&gt;Free Software Is Even More Important Now
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include 
virtual="/philosophy/po/free-software-even-more-important.translist" --&gt;
@@ -27,7 +27,7 @@
 
href="http://www.wired.com/opinion/2013/09/why-free-software-is-more-important-now-than-ever-before"&gt;
 Wired&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;
-&lt;a <span 
class="removed"><del><strong>href="/help"&gt;Suggested</strong></del></span> 
<span 
class="inserted"><ins><em>href="/help/help.html"&gt;Suggested</em></ins></span> 
ways you can help the free software movement&lt;/a&gt;.
+&lt;a href="/help/help.html"&gt;Suggested ways you can help the free software 
movement&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/blockquote&gt;
 
@@ -46,9 +46,9 @@
 &lt;p&gt;Those two nonfree programs have something else in common: they are
 both &lt;em&gt;malware&lt;/em&gt;.  That is, both have functionalities 
designed to
 mistreat the user.  Proprietary software nowadays is often malware
-because &lt;a href="/proprietary/proprietary.html"&gt;the developers' power
-corrupts them&lt;/a&gt;.  That directory lists around 300 different
-malicious functionalities (as of Apr 2017), but it is surely just the
+because &lt;a href="/malware/"&gt;the developers' power
+corrupts them&lt;/a&gt;.  That directory lists around <span 
class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>350</em></ins></span> different
+malicious functionalities (as of <span class="removed"><del><strong>Apr 
2017),</strong></del></span> <span class="inserted"><ins><em>October, 
2018),</em></ins></span> but it is surely just the
 tip of the iceberg.&lt;/p&gt;
 
 &lt;p&gt;With free software, the users control the program, both individually
@@ -59,13 +59,13 @@
 &lt;p&gt;With proprietary software, the program controls the users, and some
 other entity (the developer or &ldquo;owner&rdquo;) controls the
 program.  So the proprietary program gives its developer power over
-its users.  That is unjust in itself, and tempts the developer to
+its users.  That is unjust in itself; moreover, it tempts the developer to
 mistreat the users in other ways.&lt;/p&gt;
 
 &lt;p&gt;Even when proprietary software isn't downright malicious, its
 developers have an incentive to make it 
-&lt;a <span 
class="removed"><del><strong>href="https://getpocket.com/explore/item/how-technology-hijacks-people-s-minds-from-a-magician-and-google-s-design-ethicist-1300144185"&gt;addictive,</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://observer.com/2016/06/how-technology-hijacks-peoples-minds%E2%80%8A-%E2%80%8Afrom-a-magician-and-googles-design-ethicist/"&gt;
-addictive,</em></ins></span>
+&lt;a 
href="https://observer.com/2016/06/how-technology-hijacks-peoples-minds%E2%80%8A-%E2%80%8Afrom-a-magician-and-googles-design-ethicist/"&gt;
+addictive,
 controlling and manipulative&lt;/a&gt;.  You can say, as does the author of
 that article, that the developers have an ethical obligation not to do
 that, but generally they follow their interests.  If you want this not
@@ -306,8 +306,7 @@
 href="/licenses/license-recommendations.html"&gt; developing free
 software&lt;/a&gt; (for those of us who are programmers.) By refusing to
 develop or promote nonfree software or SaaSS.  By &lt;a
-<span 
class="removed"><del><strong>href="/help"&gt;spreading</strong></del></span>
-<span 
class="inserted"><ins><em>href="/help/help.html"&gt;spreading</em></ins></span> 
these ideas to others&lt;/a&gt;.&lt;/p&gt;
+href="/help/help.html"&gt;spreading these ideas to others&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;We and thousands of users have done this since 1984, which is how
 we now have the free GNU/Linux operating system that
@@ -362,7 +361,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2017 Richard Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -372,7 +371,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/09/05 12:59:46 $
+$Date: 2018/11/17 07:27:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/free-software-even-more-important.uk-diff.html
===================================================================
RCS file: 
/web/www/www/philosophy/po/free-software-even-more-important.uk-diff.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- philosophy/po/free-software-even-more-important.uk-diff.html        7 Nov 
2017 13:58:59 -0000       1.5
+++ philosophy/po/free-software-even-more-important.uk-diff.html        17 Nov 
2018 07:27:57 -0000      1.6
@@ -11,7 +11,7 @@
 </style></head>
 <body><pre>
 &lt;!--#include virtual="/server/header.html" --&gt;
-&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.77</strong></del></span> <span 
class="inserted"><ins><em>1.84</em></ins></span> --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.85</em></ins></span> --&gt;
 &lt;title&gt;Free Software Is Even More Important Now
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include 
virtual="/philosophy/po/free-software-even-more-important.translist" --&gt;
@@ -27,7 +27,7 @@
 
href="http://www.wired.com/opinion/2013/09/why-free-software-is-more-important-now-than-ever-before"&gt;
 Wired&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;
-&lt;a <span 
class="removed"><del><strong>href="/help"&gt;Suggested</strong></del></span> 
<span 
class="inserted"><ins><em>href="/help/help.html"&gt;Suggested</em></ins></span> 
ways you can help the free software movement&lt;/a&gt;.
+&lt;a href="/help/help.html"&gt;Suggested ways you can help the free software 
movement&lt;/a&gt;.
 &lt;/p&gt;
 &lt;/blockquote&gt;
 
@@ -46,9 +46,9 @@
 &lt;p&gt;Those two nonfree programs have something else in common: they are
 both &lt;em&gt;malware&lt;/em&gt;.  That is, both have functionalities 
designed to
 mistreat the user.  Proprietary software nowadays is often malware
-because &lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary.html"&gt;the</strong></del></span>
 <span class="inserted"><ins><em>href="/malware/"&gt;the</em></ins></span> 
developers' power
-corrupts them&lt;/a&gt;.  That directory lists around <span 
class="removed"><del><strong>260</strong></del></span> <span 
class="inserted"><ins><em>300</em></ins></span> different
-malicious functionalities (as of <span 
class="removed"><del><strong>Jan</strong></del></span> <span 
class="inserted"><ins><em>Apr</em></ins></span> 2017), but it is surely just the
+because &lt;a href="/malware/"&gt;the developers' power
+corrupts them&lt;/a&gt;.  That directory lists around <span 
class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>350</em></ins></span> different
+malicious functionalities (as of <span class="removed"><del><strong>Apr 
2017),</strong></del></span> <span class="inserted"><ins><em>October, 
2018),</em></ins></span> but it is surely just the
 tip of the iceberg.&lt;/p&gt;
 
 &lt;p&gt;With free software, the users control the program, both individually
@@ -59,13 +59,13 @@
 &lt;p&gt;With proprietary software, the program controls the users, and some
 other entity (the developer or &ldquo;owner&rdquo;) controls the
 program.  So the proprietary program gives its developer power over
-its users.  That is unjust in <span class="removed"><del><strong>itself, 
and</strong></del></span> <span class="inserted"><ins><em>itself; moreover, 
it</em></ins></span> tempts the developer to
+its users.  That is unjust in itself; moreover, it tempts the developer to
 mistreat the users in other ways.&lt;/p&gt;
 
 &lt;p&gt;Even when proprietary software isn't downright malicious, its
 developers have an incentive to make it 
-&lt;a <span 
class="removed"><del><strong>href="https://getpocket.com/explore/item/how-technology-hijacks-people-s-minds-from-a-magician-and-google-s-design-ethicist-1300144185"&gt;addictive,</strong></del></span>
 <span 
class="inserted"><ins><em>href="https://observer.com/2016/06/how-technology-hijacks-peoples-minds%E2%80%8A-%E2%80%8Afrom-a-magician-and-googles-design-ethicist/"&gt;
-addictive,</em></ins></span>
+&lt;a 
href="https://observer.com/2016/06/how-technology-hijacks-peoples-minds%E2%80%8A-%E2%80%8Afrom-a-magician-and-googles-design-ethicist/"&gt;
+addictive,
 controlling and manipulative&lt;/a&gt;.  You can say, as does the author of
 that article, that the developers have an ethical obligation not to do
 that, but generally they follow their interests.  If you want this not
@@ -306,8 +306,7 @@
 href="/licenses/license-recommendations.html"&gt; developing free
 software&lt;/a&gt; (for those of us who are programmers.) By refusing to
 develop or promote nonfree software or SaaSS.  By &lt;a
-<span 
class="removed"><del><strong>href="/help"&gt;spreading</strong></del></span>
-<span 
class="inserted"><ins><em>href="/help/help.html"&gt;spreading</em></ins></span> 
these ideas to others&lt;/a&gt;.&lt;/p&gt;
+href="/help/help.html"&gt;spreading these ideas to others&lt;/a&gt;.&lt;/p&gt;
 
 &lt;p&gt;We and thousands of users have done this since 1984, which is how
 we now have the free GNU/Linux operating system that
@@ -362,7 +361,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2015, 2017 Richard Stallman&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Richard 
Stallman&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -372,7 +371,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2017/11/07 13:58:59 $
+$Date: 2018/11/17 07:27:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/proprietary.de.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.de.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/proprietary.de.html     19 May 2018 11:33:05 -0000      1.21
+++ proprietary/proprietary.de.html     17 Nov 2018 07:27:57 -0000      1.22
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary.de.po">
+ https://www.gnu.org/proprietary/po/proprietary.de.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary.html"
+ --><!--#set var="DIFF_FILE" value="/proprietary/po/proprietary.de-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-09-18" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
 
 <!--#include virtual="/server/header.de.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -23,6 +28,7 @@
 </style>
 
 <!--#include virtual="/server/banner.de.html" -->
+<!--#include virtual="/server/outdated.de.html" -->
 <h2>Proprietäre Software ist häufig Schadsoftware</h2>
 
 <p>Proprietäre Software, auch unfreie Software genannt, bezeichnet Software,
@@ -195,7 +201,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Letzte Änderung:
 
-$Date: 2018/05/19 11:33:05 $
+$Date: 2018/11/17 07:27:57 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/proprietary.zh-tw.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.zh-tw.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- proprietary/proprietary.zh-tw.html  27 Mar 2018 09:31:32 -0000      1.5
+++ proprietary/proprietary.zh-tw.html  17 Nov 2018 07:27:57 -0000      1.6
@@ -1,4 +1,9 @@
-<!--#set var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
+<!--#set var="PO_FILE"
+ value='<a href="/proprietary/po/proprietary.zh-tw.po">
+ https://www.gnu.org/proprietary/po/proprietary.zh-tw.po</a>'
+ --><!--#set var="ORIGINAL_FILE" value="/proprietary/proprietary.html"
+ --><!--#set var="DIFF_FILE" 
value="/proprietary/po/proprietary.zh-tw-diff.html"
+ --><!--#set var="OUTDATED_SINCE" value="2018-09-18" --><!--#set 
var="ENGLISH_PAGE" value="/proprietary/proprietary.en.html" -->
 
 <!--#include virtual="/server/header.zh-tw.html" -->
 <!-- Parent-Version: 1.84 -->
@@ -23,6 +28,7 @@
 </style>
 
 <!--#include virtual="/server/banner.zh-tw.html" -->
+<!--#include virtual="/server/outdated.zh-tw.html" -->
 <h2>專有軟體常是惡意軟體</h2>
 
 <p>專有軟體,也稱為非自由軟體,表示該軟體不<a
@@ -153,7 +159,7 @@
 <p class="unprintable"><!-- timestamp start -->
 更新時間︰
 
-$Date: 2018/03/27 09:31:32 $
+$Date: 2018/11/17 07:27:57 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary/po/proprietary.de-diff.html     14 Mar 2018 15:59:09 -0000      
1.10
+++ proprietary/po/proprietary.de-diff.html     17 Nov 2018 07:27:57 -0000      
1.11
@@ -10,27 +10,54 @@
 span.inserted { background-color: #2f2; color: #000; }
 </style></head>
 <body><pre>
-&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!--#include <span 
class="removed"><del><strong>virtual="/server/header.html"</strong></del></span>
 <span 
class="inserted"><ins><em>virtual="/server/html5-header.html"</em></ins></span> 
--&gt;
 &lt;!-- Parent-Version: 1.84 --&gt;
+<span class="inserted"><ins><em>&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+     Please do not edit lists with items such as &lt;li id="Mnnnnnnnn"&gt;!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;</em></ins></span>
 &lt;title&gt;Proprietary Software
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/proprietary.translist" --&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-div.companies { float: right; margin-bottom: .5em; }
-div.malfunctions { max-width: 27em; }
-&lt;!--
-div.toc h3 {
-   text-align: left;
-   font-size: 1.2em;
-   padding: 0 .83em;
-   margin: .5em 1.5% 1em;
+<span class="removed"><del><strong>div.companies</strong></del></span>
+<span class="inserted"><ins><em>&lt;!--
+.button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
+<span class="removed"><del><strong>div.malfunctions</strong></del></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
+   max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
+   overflow: auto;
+   margin: 2.5em auto;
+   background: #f5f5f5;</em></ins></span>
 }
-div.toc li { list-style: none; margin-bottom: 1em; }
-div.toc { margin-top: 1em; }
---&gt;&lt;/style&gt;
+<span class="removed"><del><strong>&lt;!--
+div.toc h3</strong></del></span>
+<span class="inserted"><ins><em>#TOC th</em></ins></span> {
+   <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
+#TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+<span class="removed"><del><strong>div.toc</strong></del></span>
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="removed"><del><strong>div.toc</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+--&gt;
+&lt;/style&gt;
+&lt;style type="text/css" media="print,screen"&gt;
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
40em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
+<span class="inserted"><ins><em>&lt;p class="button"&gt;&lt;a 
href="#TOC"&gt;Table of contents&lt;/a&gt;&lt;/p&gt;
+&lt;p class="button"&gt;&lt;a href="#latest"&gt;Latest 
additions&lt;/a&gt;&lt;/p&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;</em></ins></span>
+
 &lt;p&gt;Proprietary software, also called nonfree software,
 means software that doesn't
 &lt;a href="/philosophy/free-sw.html"&gt;respect users' freedom and
@@ -54,63 +81,190 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, 2017, the files in this directory list around 300
-instances of malicious functionalities, but there are surely thousands
-more we don't know about.&lt;/p&gt;
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>350</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 400 references to
+back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
-&lt;div class="toc"&gt;
+<span class="removed"><del><strong>&lt;div class="toc"&gt;
 &lt;div class="companies"&gt;
-&lt;h3&gt;Company or type of product&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-webpages.html"&gt;Malware in 
webpages&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a</strong></del></span> 
href="/proprietary/malware-mobiles.html"&gt;Malware in mobile 
devices&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-games.html"&gt;Malware in 
games&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-appliances.html"&gt;Malware in 
appliances&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-cars.html"&gt;Malware in 
cars&lt;/a&gt;&lt;/li&gt;
-&lt;/ul&gt;
-&lt;/div&gt;
+&lt;h3&gt;Company</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;table id="TOC"&gt;
+ &lt;tr&gt;
+  &lt;th&gt;Injustices</em></ins></span> or <span 
class="removed"><del><strong>type of product&lt;/h3&gt;</strong></del></span> 
<span class="inserted"><ins><em>techniques&lt;/th&gt;
+  &lt;th&gt;Products or companies&lt;/th&gt;
+ &lt;/tr&gt;
+ &lt;tr&gt;
+  &lt;td&gt;</em></ins></span>
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/div&gt;
 
 &lt;div class="malfunctions"&gt;
-&lt;h3&gt;Type&nbsp;of&nbsp;malware&lt;/h3&gt;
-&lt;ul&gt;
-&lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-&lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a</em></ins></span> 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt; to
-servers&lt;/li&gt;
-&lt;li&gt;&lt;a href="/proprietary/proprietary-drm.html"&gt;Digital 
restrictions
-    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their computers.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems
-    that reject any operating system not &ldquo;authorized&rdquo; by the
-    manufacturer.&lt;/li&gt;
-&lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
+&lt;h3&gt;Type&nbsp;of&nbsp;malware&lt;/h3&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;/td&gt;
+  &lt;td&gt;</em></ins></span>
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+   &lt;/ul&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;/ul&gt;
+  &lt;/td&gt;
+ &lt;/tr&gt;
+ &lt;tr&gt;
+  &lt;td colspan="2"&gt;
+   &lt;ol&gt;
+    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any piece of 
software that is
+     running on your computer, and listens for commands from someone
+     else who can tell it</em></ins></span> to
+<span class="removed"><del><strong>servers&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>do things without asking your approval.&lt;/li&gt;
+
+    &lt;li id="f2"&gt;&lt;em&gt;Digital</em></ins></span> restrictions
+    <span 
class="removed"><del><strong>management&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>management,</em></ins></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means</strong></del></span>
+     <span 
class="inserted"><ins><em>&ldquo;DRM&rdquo;:&lt;/em&gt;&nbsp;</em></ins></span> 
functionalities designed to restrict
+     what users can do with the data in their computers.&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;li 
id="f3"&gt;&lt;em&gt;Jail:&lt;/em&gt;&nbsp; system</em></ins></span> that <span 
class="removed"><del><strong>impose</strong></del></span> <span 
class="inserted"><ins><em>imposes</em></ins></span> censorship on
+     application programs.&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+     permanent (or very frequent) connection to a server.&lt;/li&gt;
+
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+     system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
-&lt;/div&gt;
+&lt;/div&gt;</strong></del></span>
+   <span class="inserted"><ins><em>&lt;/ol&gt;
+  &lt;/td&gt;
+ &lt;/tr&gt;
+&lt;/table&gt;</em></ins></span>
 
 &lt;p&gt;Users of proprietary software are defenseless against these forms
 of mistreatment.  The way to avoid them is by insisting on
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;free
-(freedom-respecting) software.&lt;/a&gt;  Since free software is controlled
+(freedom-respecting) <span 
class="removed"><del><strong>software.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>software&lt;/a&gt;.</em></ins></span>  Since free 
software is controlled
 by its users, they have a pretty good defense against malicious
 software functionality.&lt;/p&gt;
 
+
+<span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a &lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
+
+    &lt;li&gt;&ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.&lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    that have nothing in common&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
+    security for your home. Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810240"&gt;
+    &lt;p&gt;Apple and Samsung deliberately &lt;a
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
+
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
@@ -158,7 +312,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -168,7 +322,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/03/14 15:59:09 $
+$Date: 2018/11/17 07:27:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/po/proprietary.zh-tw-diff.html  14 Mar 2018 15:59:09 -0000      
1.1
+++ proprietary/po/proprietary.zh-tw-diff.html  17 Nov 2018 07:27:57 -0000      
1.2
@@ -10,27 +10,54 @@
 span.inserted { background-color: #2f2; color: #000; }
 </style></head>
 <body><pre>
-&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!--#include <span 
class="removed"><del><strong>virtual="/server/header.html"</strong></del></span>
 <span 
class="inserted"><ins><em>virtual="/server/html5-header.html"</em></ins></span> 
--&gt;
 &lt;!-- Parent-Version: 1.84 --&gt;
+<span class="inserted"><ins><em>&lt;!-- 
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+     Please do not edit lists with items such as &lt;li id="Mnnnnnnnn"&gt;!
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+--&gt;</em></ins></span>
 &lt;title&gt;Proprietary Software
 - GNU Project - Free Software Foundation&lt;/title&gt;
  &lt;!--#include virtual="/proprietary/po/proprietary.translist" --&gt;
 &lt;style type="text/css" media="print,screen"&gt;
-div.companies { float: right; margin-bottom: .5em; }
-div.malfunctions { max-width: 27em; }
-&lt;!--
-div.toc h3 {
-   text-align: left;
-   font-size: 1.2em;
-   padding: 0 .83em;
-   margin: .5em 1.5% 1em;
+<span class="removed"><del><strong>div.companies</strong></del></span>
+<span class="inserted"><ins><em>&lt;!--
+.button</em></ins></span> { float: <span class="removed"><del><strong>right; 
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left; 
margin:</em></ins></span> .5em; }
+<span class="removed"><del><strong>div.malfunctions</strong></del></span>
+<span class="inserted"><ins><em>.button a</em></ins></span> { <span 
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+   display: block;</em></ins></span>
+   max-width: <span class="removed"><del><strong>27em;</strong></del></span> 
<span class="inserted"><ins><em>100%;
+   overflow: auto;
+   margin: 2.5em auto;
+   background: #f5f5f5;</em></ins></span>
 }
-div.toc li { list-style: none; margin-bottom: 1em; }
-div.toc { margin-top: 1em; }
---&gt;&lt;/style&gt;
+<span class="removed"><del><strong>&lt;!--
+div.toc h3</strong></del></span>
+<span class="inserted"><ins><em>#TOC th</em></ins></span> {
+   <span class="removed"><del><strong>text-align: left;</strong></del></span> 
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span> 
<span class="inserted"><ins><em>1.1em; }
+#TOC th, #TOC td {</em></ins></span> padding: <span 
class="removed"><del><strong>0 .83em;
+   margin: .5em 1.5% 1em;</strong></del></span> <span 
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
+<span class="removed"><del><strong>div.toc</strong></del></span>
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em 
0;</em></ins></span> list-style: none; <span 
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="removed"><del><strong>div.toc</strong></del></span>
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+--&gt;
+&lt;/style&gt;
+&lt;style type="text/css" media="print,screen"&gt;
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top: 
1em;</strong></del></span> <span class="inserted"><ins><em>width: 
40em;</em></ins></span> }
+<span class="removed"><del><strong>--&gt;&lt;/style&gt;</strong></del></span>
+<span class="inserted"><ins><em>&lt;/style&gt;</em></ins></span>
 &lt;!--#include virtual="/server/banner.html" --&gt;
 &lt;h2&gt;Proprietary Software Is Often Malware&lt;/h2&gt;
 
+<span class="inserted"><ins><em>&lt;p class="button"&gt;&lt;a 
href="#TOC"&gt;Table of contents&lt;/a&gt;&lt;/p&gt;
+&lt;p class="button"&gt;&lt;a href="#latest"&gt;Latest 
additions&lt;/a&gt;&lt;/p&gt;
+&lt;div style="clear: both"&gt;&lt;/div&gt;</em></ins></span>
+
 &lt;p&gt;Proprietary software, also called nonfree software,
 means software that doesn't
 &lt;a href="/philosophy/free-sw.html"&gt;respect users' freedom and
@@ -54,63 +81,190 @@
 it is standard practice.  Modern proprietary software is typically
 a way to be had.&lt;/p&gt;
 
-&lt;p&gt;As of April, 2017, the files in this directory list around 300
-instances of malicious functionalities, but there are surely thousands
-more we don't know about.&lt;/p&gt;
+&lt;p&gt;As of <span class="removed"><del><strong>April, 
2017,</strong></del></span> <span class="inserted"><ins><em>October, 
2018,</em></ins></span> the <span 
class="removed"><del><strong>files</strong></del></span> <span 
class="inserted"><ins><em>pages</em></ins></span> in this directory list around 
<span class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>350</em></ins></span>
+instances of malicious <span 
class="removed"><del><strong>functionalities,</strong></del></span> <span 
class="inserted"><ins><em>functionalities (with more than 400 references to
+back them up),</em></ins></span> but there are surely thousands more we don't 
know about.&lt;/p&gt;
 
-&lt;div class="toc"&gt;
+<span class="removed"><del><strong>&lt;div class="toc"&gt;
 &lt;div class="companies"&gt;
-&lt;h3&gt;Company or type of product&lt;/h3&gt;
-&lt;ul&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-microsoft.html"&gt;Microsoft 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-webpages.html"&gt;Malware in 
webpages&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-phones.html"&gt;Malware 
in phones&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a</strong></del></span> 
href="/proprietary/malware-mobiles.html"&gt;Malware in mobile 
devices&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-games.html"&gt;Malware in 
games&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-appliances.html"&gt;Malware in 
appliances&lt;/a&gt;&lt;/li&gt;
-  &lt;li&gt;&lt;a href="/proprietary/malware-cars.html"&gt;Malware in 
cars&lt;/a&gt;&lt;/li&gt;
-&lt;/ul&gt;
-&lt;/div&gt;
+&lt;h3&gt;Company</strong></del></span>
+
+<span class="inserted"><ins><em>&lt;table id="TOC"&gt;
+ &lt;tr&gt;
+  &lt;th&gt;Injustices</em></ins></span> or <span 
class="removed"><del><strong>type of product&lt;/h3&gt;</strong></del></span> 
<span class="inserted"><ins><em>techniques&lt;/th&gt;
+  &lt;th&gt;Products or companies&lt;/th&gt;
+ &lt;/tr&gt;
+ &lt;tr&gt;
+  &lt;td&gt;</em></ins></span>
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-apple.html"&gt;Apple 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&nbsp;(&lt;a 
href="#f1"&gt;1&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-microsoft.html"&gt;Microsoft
 Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-google.html"&gt;Google 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-adobe.html"&gt;Adobe 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-amazon.html"&gt;Amazon 
Malware&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html"&gt;DRM&lt;/a&gt;&nbsp;(&lt;a
 href="#f2"&gt;2&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-webpages.html"&gt;Malware
 in webpages&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-mobiles.html"&gt;Malware
 in mobile devices&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-games.html"&gt;Malware 
in games&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-appliances.html"&gt;Malware
 in appliances&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&nbsp;(&lt;a
 href="#f3"&gt;3&lt;/a&gt;)&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/malware-cars.html"&gt;Malware 
in cars&lt;/a&gt;&lt;/li&gt;</strong></del></span> <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;&nbsp;(&lt;a 
href="#f4"&gt;4&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&nbsp;(&lt;a 
href="#f5"&gt;5&lt;/a&gt;)&lt;/li&gt;
+    &lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;In the 
pipe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+   &lt;/ul&gt;
+<span class="removed"><del><strong>&lt;/div&gt;
 
 &lt;div class="malfunctions"&gt;
-&lt;h3&gt;Type&nbsp;of&nbsp;malware&lt;/h3&gt;
-&lt;ul&gt;
-&lt;li&gt;&lt;a href="/proprietary/proprietary-back-doors.html"&gt;Back 
doors&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-&lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</em></ins></span>
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a <span 
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a</em></ins></span> 
href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt; to
-servers&lt;/li&gt;
-&lt;li&gt;&lt;a href="/proprietary/proprietary-drm.html"&gt;Digital 
restrictions
-    management&lt;/a&gt; or &ldquo;DRM&rdquo; means functionalities designed
-    to restrict what users can do with the data in their computers.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&mdash;systems
-    that impose censorship on application programs.&lt;/li&gt;
-&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems
-    that reject any operating system not &ldquo;authorized&rdquo; by the
-    manufacturer.&lt;/li&gt;
-&lt;li&gt;&lt;a href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
+&lt;h3&gt;Type&nbsp;of&nbsp;malware&lt;/h3&gt;</strong></del></span>
+  <span class="inserted"><ins><em>&lt;/td&gt;
+  &lt;td&gt;</em></ins></span>
+   &lt;ul&gt;
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html"&gt;Back
 doors&lt;/a&gt;&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-censorship.html"&gt;Censorship&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-appliances.html"&gt;Appliances&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html"&gt;Coverups&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-cars.html"&gt;Cars&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-deception.html"&gt;Deception&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-games.html"&gt;Games&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html"&gt;Incompatibility&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html"&gt;Mobiles&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html"&gt;Insecurity&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-webpages.html"&gt;Webpages&lt;/a&gt;&lt;/li&gt;
+   &lt;/ul&gt;
+   &lt;ul&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-interference.html"&gt;Interference&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-adobe.html"&gt;Adobe&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html"&gt;Sabotage&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-amazon.html"&gt;Amazon&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html"&gt;Surveillance&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-apple.html"&gt;Apple&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html"&gt;Subscriptions&lt;/a&gt;&lt;/li&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-google.html"&gt;Google&lt;/a&gt;&lt;/li&gt;</em></ins></span>
+    &lt;li&gt;&lt;a <span 
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html"&gt;Tethers&lt;/a&gt;</strong></del></span>
 <span 
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html"&gt;Microsoft&lt;/a&gt;&lt;/li&gt;
+   &lt;/ul&gt;
+  &lt;/td&gt;
+ &lt;/tr&gt;
+ &lt;tr&gt;
+  &lt;td colspan="2"&gt;
+   &lt;ol&gt;
+    &lt;li id="f1"&gt;&lt;em&gt;Back door:&lt;/em&gt;&nbsp; any piece of 
software that is
+     running on your computer, and listens for commands from someone
+     else who can tell it</em></ins></span> to
+<span class="removed"><del><strong>servers&lt;/li&gt;
+&lt;li&gt;&lt;a 
href="/proprietary/proprietary-drm.html"&gt;Digital</strong></del></span> <span 
class="inserted"><ins><em>do things without asking your approval.&lt;/li&gt;
+
+    &lt;li id="f2"&gt;&lt;em&gt;Digital</em></ins></span> restrictions
+    <span 
class="removed"><del><strong>management&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>management,</em></ins></span> or <span 
class="removed"><del><strong>&ldquo;DRM&rdquo; means</strong></del></span>
+     <span 
class="inserted"><ins><em>&ldquo;DRM&rdquo;:&lt;/em&gt;&nbsp;</em></ins></span> 
functionalities designed to restrict
+     what users can do with the data in their computers.&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-jails.html"&gt;Jails&lt;/a&gt;&mdash;systems</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;li 
id="f3"&gt;&lt;em&gt;Jail:&lt;/em&gt;&nbsp; system</em></ins></span> that <span 
class="removed"><del><strong>impose</strong></del></span> <span 
class="inserted"><ins><em>imposes</em></ins></span> censorship on
+     application programs.&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/proprietary-tyrants.html"&gt;Tyrants&lt;/a&gt;&mdash;systems</strong></del></span>
+
+    <span class="inserted"><ins><em>&lt;li 
id="f4"&gt;&lt;em&gt;Tether:&lt;/em&gt;&nbsp; functionality that requires
+     permanent (or very frequent) connection to a server.&lt;/li&gt;
+
+    &lt;li id="f5"&gt;&lt;em&gt;Tyrant:&lt;/em&gt;&nbsp; 
system</em></ins></span> that <span 
class="removed"><del><strong>reject</strong></del></span> <span 
class="inserted"><ins><em>rejects</em></ins></span> any operating
+     system not &ldquo;authorized&rdquo; by the manufacturer.&lt;/li&gt;
+<span class="removed"><del><strong>&lt;li&gt;&lt;a 
href="/proprietary/potential-malware.html"&gt;Potential 
Malware&lt;/a&gt;&lt;/li&gt;
 &lt;/ul&gt;
 &lt;/div&gt;
-&lt;/div&gt;
+&lt;/div&gt;</strong></del></span>
+   <span class="inserted"><ins><em>&lt;/ol&gt;
+  &lt;/td&gt;
+ &lt;/tr&gt;
+&lt;/table&gt;</em></ins></span>
 
 &lt;p&gt;Users of proprietary software are defenseless against these forms
 of mistreatment.  The way to avoid them is by insisting on
 &lt;a href="/philosophy/free-software-even-more-important.html"&gt;free
-(freedom-respecting) software.&lt;/a&gt;  Since free software is controlled
+(freedom-respecting) <span 
class="removed"><del><strong>software.&lt;/a&gt;</strong></del></span> <span 
class="inserted"><ins><em>software&lt;/a&gt;.</em></ins></span>  Since free 
software is controlled
 by its users, they have a pretty good defense against malicious
 software functionality.&lt;/p&gt;
 
+
+<span class="inserted"><ins><em>&lt;h3 id="latest"&gt;Latest 
additions&lt;/h3&gt;
+
+&lt;ul class="blurbs"&gt;
+  &lt;li id="M201811100"&gt;
+    &lt;p&gt;Corel Paintshop Pro has a &lt;a
+    
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"&gt;
+    back door that can make it cease to function&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;The article is full of confusions, errors and biases that we have
+    an obligation to expose, given that we are making a link to them.&lt;/p&gt;
+
+    &lt;ul&gt;
+    &lt;li&gt;Getting a patent does not &ldquo;enable&rdquo; a company to do
+    any particular thing in its products. What it does enable the company
+    to do is sue other companies if they do some particular thing in
+    their products.&lt;/li&gt;
+
+    &lt;li&gt;A company's policies about when to attack users through a back
+    door are beside the point. Inserting the back door is wrong in the
+    first place, and using the back door is always wrong too. No software
+    developer should have that power over users.&lt;/li&gt;
+
+    &lt;li&gt;&ldquo;&lt;a
+    href="/philosophy/words-to-avoid.html#Piracy"&gt;Piracy&lt;/a&gt;&rdquo; 
means
+    attacking ships. Using that word to refer to sharing copies is a smear;
+    please don't smear sharing.&lt;/li&gt;
+
+    &lt;li&gt;&lt;p&gt;The idea of &ldquo;protecting our IP&rdquo; is
+    total confusion. The term &ldquo;IP&rdquo; itself is a &lt;a
+    href="/philosophy/not-ipr.html"&gt;bogus generalization about things
+    that have nothing in common&lt;/a&gt;.&lt;/p&gt;
+
+    &lt;p&gt;In addition, to speak of &ldquo;protecting&rdquo; that bogus
+    generalization is a separate absurdity. It's like calling the cops
+    because neighbors' kids are playing on your front yard, and saying
+    that you're &ldquo;protecting the boundary line&rdquo;. The kids can't do 
harm
+    to the boundary line, not even with a jackhammer, because it is an
+    abstraction and can't be affected by physical action.&lt;/p&gt;&lt;/li&gt;
+    &lt;/ul&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810300"&gt;
+    &lt;p&gt;Nearly all &ldquo;home security cameras&rdquo; &lt;a
+    
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"&gt;
+    give the manufacturer an unencrypted copy of everything they
+    see&lt;/a&gt;. &ldquo;Home insecurity camera&rdquo; would be a better
+    name!&lt;/p&gt;
+
+    &lt;p&gt;When Consumer Reports tested them, it suggested that these
+    manufacturers promise not to look at what's in the videos. That's not
+    security for your home. Security means making sure they don't get to
+    see through your camera.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810244"&gt;
+    &lt;p&gt;Some Android apps &lt;a
+    
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/"&gt;
+    track the phones of users that have deleted them&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810240"&gt;
+    &lt;p&gt;Apple and Samsung deliberately &lt;a
+    
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones"&gt;degrade
+    the performance of older phones to force users to buy their newer
+    phones&lt;/a&gt;.&lt;/p&gt;
+  &lt;/li&gt;
+
+  &lt;li id="M201810230"&gt;
+    &lt;p&gt;GM &lt;a
+    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html"&gt;
+    tracked the choices of radio programs&lt;/a&gt; in its
+    &ldquo;connected&rdquo; cars, minute by minute.&lt;/p&gt;
+
+    &lt;p&gt;GM did not get users' consent, but it could have got that easily 
by
+    sneaking it into the contract that users sign for some digital service
+    or other. A requirement for consent is effectively no protection.&lt;/p&gt;
+
+    &lt;p&gt;The cars can also collect lots of other data: listening to you,
+    watching you, following your movements, tracking passengers' cell
+    phones. &lt;em&gt;All&lt;/em&gt; such data collection should be 
forbidden.&lt;/p&gt;
+
+    &lt;p&gt;But if you really want to be safe, we must make sure the car's
+    hardware cannot collect any of that data, or that the software
+    is free so we know it won't collect any of that data.&lt;/p&gt;
+  &lt;/li&gt;
+&lt;/ul&gt;</em></ins></span>
+
+
 &lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
 &lt;!--#include virtual="/server/footer.html" --&gt;
 &lt;div id="footer"&gt;
@@ -158,7 +312,7 @@
      There is more detail about copyright years in the GNU Maintainers
      Information document, www.gnu.org/prep/maintain. --&gt;
 
-&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Free Software 
Foundation, Inc.&lt;/p&gt;
+&lt;p&gt;Copyright &copy; 2013, 2014, 2015, 2016, 2017, 2018 Free Software 
Foundation, Inc.&lt;/p&gt;
 
 &lt;p&gt;This page is licensed under a &lt;a rel="license"
 href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
@@ -168,7 +322,7 @@
 
 &lt;p class="unprintable"&gt;Updated:
 &lt;!-- timestamp start --&gt;
-$Date: 2018/03/14 15:59:09 $
+$Date: 2018/11/17 07:27:57 $
 &lt;!-- timestamp end --&gt;
 &lt;/p&gt;
 &lt;/div&gt;

Index: philosophy/po/free-software-even-more-important.de-diff.html
===================================================================
RCS file: philosophy/po/free-software-even-more-important.de-diff.html
diff -N philosophy/po/free-software-even-more-important.de-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/free-software-even-more-important.de-diff.html        17 Nov 
2018 07:27:56 -0000      1.1
@@ -0,0 +1,381 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/free-software-even-more-important.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.85</em></ins></span> --&gt;
+&lt;title&gt;Free Software Is Even More Important Now
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include 
virtual="/philosophy/po/free-software-even-more-important.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+
+&lt;h2&gt;Free Software Is Even More Important Now&lt;/h2&gt;
+
+&lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard
+Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
+
+&lt;blockquote&gt;
+&lt;p&gt;A substantially edited version of this article was published in &lt;a
+href="http://www.wired.com/opinion/2013/09/why-free-software-is-more-important-now-than-ever-before"&gt;
+Wired&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;
+&lt;a href="/help/help.html"&gt;Suggested ways you can help the free software 
movement&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/blockquote&gt;
+
+&lt;p&gt;Since 1983, the Free Software Movement has campaigned for computer
+users' freedom&mdash;for users to control the software they
+use, rather than vice versa.  When a program respects users' freedom
+and community, we call it &ldquo;free software.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;We also sometimes call it &ldquo;libre software&rdquo; to emphasize
+that we're talking about liberty, not price.  Some proprietary
+(nonfree) programs, such as Photoshop, are very expensive; others,
+such as Flash Player, are available gratis&mdash;but that's a minor
+detail.  Either way, they give the program's developer power
+over the users, power that no one should have.&lt;/p&gt;
+
+&lt;p&gt;Those two nonfree programs have something else in common: they are
+both &lt;em&gt;malware&lt;/em&gt;.  That is, both have functionalities 
designed to
+mistreat the user.  Proprietary software nowadays is often malware
+because &lt;a href="/malware/"&gt;the developers' power
+corrupts them&lt;/a&gt;.  That directory lists around <span 
class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>350</em></ins></span> different
+malicious functionalities (as of <span class="removed"><del><strong>Apr 
2017),</strong></del></span> <span class="inserted"><ins><em>October, 
2018),</em></ins></span> but it is surely just the
+tip of the iceberg.&lt;/p&gt;
+
+&lt;p&gt;With free software, the users control the program, both individually
+and collectively.  So they control what their computers do (assuming
+those computers are &lt;a 
href="/philosophy/loyal-computers.html"&gt;loyal&lt;/a&gt;
+and do what the users' programs tell them to do).&lt;/p&gt;
+
+&lt;p&gt;With proprietary software, the program controls the users, and some
+other entity (the developer or &ldquo;owner&rdquo;) controls the
+program.  So the proprietary program gives its developer power over
+its users.  That is unjust in itself; moreover, it tempts the developer to
+mistreat the users in other ways.&lt;/p&gt;
+
+&lt;p&gt;Even when proprietary software isn't downright malicious, its
+developers have an incentive to make it 
+&lt;a 
href="https://observer.com/2016/06/how-technology-hijacks-peoples-minds%E2%80%8A-%E2%80%8Afrom-a-magician-and-googles-design-ethicist/"&gt;
+addictive,
+controlling and manipulative&lt;/a&gt;.  You can say, as does the author of
+that article, that the developers have an ethical obligation not to do
+that, but generally they follow their interests.  If you want this not
+to happen, make sure the program is controlled by its users.&lt;/p&gt;
+
+&lt;p&gt;Freedom means having control over your own life.  If you use a
+program to carry out activities in your life, your freedom depends on
+your having control over the program.  You deserve to have control
+over the programs you use, and all the more so when you use them for
+something important in your life.&lt;/p&gt;
+
+&lt;p&gt;Users' control over the program requires four
+&lt;a href="/philosophy/free-sw.html"&gt;essential freedoms&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;(0) The freedom to run the program as you wish, for whatever 
purpose.&lt;/p&gt;
+
+&lt;p&gt;(1) The freedom to study the program's &ldquo;source code&rdquo;,
+and change it, so the program does your computing as you wish.
+Programs are written by programmers in a programming
+language&mdash;like English combined with algebra&mdash;and that form
+of the program is the &ldquo;source code&rdquo;.  Anyone who knows
+programming, and has the program in source code form, can read the
+source code, understand its functioning, and change it too.  When all
+you get is the executable form, a series of numbers that are efficient
+for the computer to run but extremely hard for a human being to
+understand, understanding and changing the program in that form are
+forbiddingly hard.&lt;/p&gt;
+
+&lt;p&gt;(2) The freedom to make and distribute exact copies when you wish.
+(It is not an obligation; doing this is your choice.  If the program
+is free, that doesn't mean someone has an obligation to offer you a
+copy, or that you have an obligation to offer him a copy.
+Distributing a program to users without freedom mistreats them;
+however, choosing not to distribute the program&mdash;using it
+privately&mdash;does not mistreat anyone.)&lt;/p&gt; 
+
+&lt;p&gt;(3) The freedom to make and distribute copies of your modified
+versions, when you wish.&lt;/p&gt;
+
+&lt;p&gt;The first two freedoms mean each user can exercise individual
+control over the program.  With the other two freedoms, any group of
+users can together exercise &lt;em&gt;collective control&lt;/em&gt; over the
+program.  With all four freedoms, the users fully control the program.
+If any of them is missing or inadequate, the program is proprietary
+(nonfree), and unjust.&lt;/p&gt;
+
+&lt;p&gt;Other kinds of works are also used for practical activities, including
+recipes for cooking, educational works such as textbooks, reference
+works such as dictionaries and encyclopedias, fonts for displaying
+paragraphs of text, circuit diagrams for hardware for people to build,
+and patterns for making useful (not merely decorative) objects with a
+3D printer.  Since these are not software, the free software movement
+strictly speaking doesn't cover them; but the same reasoning applies
+and leads to the same conclusion: these works should carry the four
+freedoms.&lt;/p&gt;
+
+&lt;p&gt;A free program allows you to tinker with it to make it do what you
+want (or cease do to something you dislike).  Tinkering with software
+may sound ridiculous if you are accustomed to proprietary software as
+a sealed box, but in the Free World it's a common thing to do, and a
+good way to learn programming.  Even the traditional American pastime
+of tinkering with cars is obstructed because cars now contain nonfree
+software.&lt;/p&gt;
+
+&lt;h3&gt;The Injustice of Proprietariness&lt;/h3&gt;
+
+&lt;p&gt;If the users don't control the program, the program controls the
+users.  With proprietary software, there is always some entity, the
+developer or &ldquo;owner&rdquo; of the program, that controls the
+program&mdash;and through it, exercises power over its users.  A
+nonfree program is a yoke, an instrument of unjust power.&lt;/p&gt;
+
+&lt;p&gt;In outrageous cases (though this outrage has become quite usual) &lt;a
+href="/proprietary/proprietary.html"&gt;proprietary programs are designed
+to spy on the users, restrict them, censor them, and abuse them&lt;/a&gt;.
+For instance, the operating system of Apple iThings does all of these,
+and so does Windows on mobile devices with ARM chips.  Windows, mobile
+phone firmware, and Google Chrome for Windows include a universal back
+door that allows some company to change the program remotely without
+asking permission. The Amazon Kindle has a back door that can erase
+books.&lt;/p&gt;
+
+&lt;p&gt;The use of nonfree software in the &ldquo;internet of things&rdquo;
+would turn it into
+the &lt;a 
href="http://ieet.org/index.php/IEET/more/rinesi20150806"&gt;&ldquo;internet
+of telemarketers&rdquo;&lt;/a&gt; as well as the &ldquo;internet of
+snoopers&rdquo;.&lt;/p&gt;
+
+&lt;p&gt;With the goal of ending the injustice of nonfree software, the free
+software movement develops free programs so users can free themselves.
+We began in 1984 by developing the free operating system &lt;a
+href="/gnu/the-gnu-project.html"&gt;GNU&lt;/a&gt;. Today, millions of computers
+run GNU, mainly in the &lt;a href="/gnu/gnu-linux-faq.html"&gt;GNU/Linux
+combination&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Distributing a program to users without freedom mistreats those users;
+however, choosing not to distribute the program does not mistreat
+anyone.  If you write a program and use it privately, that does no
+wrong to others.  (You do miss an opportunity to do good, but that's
+not the same as doing wrong.)  Thus, when we say all software must
+be free, we mean that every copy must come with the four freedoms,
+but we don't mean that someone has an obligation to offer you a copy.&lt;/p&gt;
+
+&lt;h3&gt;Nonfree Software and SaaSS&lt;/h3&gt;
+
+&lt;p&gt;Nonfree software was the first way for companies to take control of
+people's computing.  Nowadays, there is another way, called Service as
+a Software Substitute, or SaaSS.  That means letting someone else's
+server do your own computing tasks.&lt;/p&gt;
+
+&lt;p&gt;SaaSS doesn't mean the programs on the server are nonfree (though they
+often are).  Rather, using SaaSS causes the same injustices as using a
+nonfree program: they are two paths to the same bad place.  Take the
+example of a SaaSS translation service: The user sends text to the
+server, and the server translates it (from English to Spanish, say)
+and sends the translation back to the user.  Now the job of
+translating is under the control of the server operator rather than
+the user.&lt;/p&gt;
+
+&lt;p&gt;If you use SaaSS, the server operator controls your computing.  It
+requires entrusting all the pertinent data to the server operator,
+which will be forced to show it to the state as well&mdash;&lt;a
+href="/philosophy/who-does-that-server-really-serve.html"&gt;who
+does that server really serve, after all?&lt;/a&gt;&lt;/p&gt;
+
+&lt;h3&gt;Primary And Secondary Injustices&lt;/h3&gt;
+
+&lt;p&gt;When you use proprietary programs or SaaSS, first of all you do wrong
+to yourself, because it gives some entity unjust power over you.  For
+your own sake, you should escape.  It also wrongs others if you make a
+promise not to share.  It is evil to keep such a promise, and a lesser
+evil to break it; to be truly upright, you should not make the promise
+at all.&lt;/p&gt;
+
+&lt;p&gt;There are cases where using nonfree software puts pressure directly
+on others to do likewise.  Skype is a clear example: when one person
+uses the nonfree Skype client software, it requires another person to
+use that software too&mdash;thus both surrender their freedom.
+(Google Hangouts have the same problem.)  It is wrong even to suggest
+using such programs.  We should refuse to use them even briefly, even
+on someone else's computer.&lt;/p&gt;
+
+&lt;p&gt;Another harm of using nonfree programs and SaaSS is that it rewards
+the perpetrator, encouraging further development of that program or
+&ldquo;service&rdquo;, leading in turn to even more people falling
+under the company's thumb.&lt;/p&gt;
+
+&lt;p&gt;All the forms of indirect harm are magnified when the user is a
+public entity or a school.&lt;/p&gt;
+
+&lt;h3&gt;Free Software and the State&lt;/h3&gt;
+
+&lt;p&gt;Public agencies exist for the people, not for themselves.  When they
+do computing, they do it for the people.  They have a duty to maintain
+full control over that computing so that they can assure it is done
+properly for the people.  (This constitutes the computational
+sovereignty of the state.)  They must never allow control over the
+state's computing to fall into private hands.&lt;/p&gt;
+
+&lt;p&gt;To maintain control of the people's computing, public agencies must
+not do it with proprietary software (software under the control of an
+entity other than the state).  And they must not entrust it to a
+service programmed and run by an entity other than the state, since
+this would be SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Proprietary software has no security at all in one crucial case
+&mdash; against its developer.  And the developer may help others attack.
+&lt;a 
href="http://arstechnica.com/security/2013/06/nsa-gets-early-access-to-zero-day-data-from-microsoft-others/"&gt;
+Microsoft shows Windows bugs to the NSA&lt;/a&gt; (the US government digital
+spying agency) before fixing them.  We do not know whether Apple does
+likewise, but it is under the same government pressure as Microsoft.
+If the government of any other country uses such software, it
+endangers national security.  Do you want the NSA to break into your
+government's computers?  See
+our &lt;a href="/philosophy/government-free-software.html"&gt;suggested
+policies for governments to promote free software&lt;/a&gt;.&lt;/p&gt;
+
+&lt;h3&gt;Free Software and Education&lt;/h3&gt;
+
+&lt;p&gt;Schools (and this includes all educational activities) influence the
+future of society through what they teach.  They should teach
+exclusively free software, so as to use their influence for the good.
+To teach a proprietary program is to implant dependence, which goes
+against the mission of education.  By training in use of free
+software, schools will direct society's future towards freedom, and
+help talented programmers master the craft.&lt;/p&gt;
+
+&lt;p&gt;They will also teach students the habit of cooperating, helping
+other people.  Each class should have this rule: &ldquo;Students, this
+class is a place where we share our knowledge.  If you bring software
+to class, you may not keep it for yourself.  Rather, you must share
+copies with the rest of the class&mdash;including the program's source
+code, in case someone else wants to learn.  Therefore, bringing
+proprietary software to class is not permitted except to reverse
+engineer it.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;Proprietary developers would have us punish students who are good
+enough at heart to share software and thwart those curious enough to
+want to change it.  This means a bad education.  See
+&lt;a href="/education/"&gt;http://www.gnu.org/education/&lt;/a&gt;
+for more discussion of the use of free software in schools.&lt;/p&gt;
+
+&lt;h3&gt;Free Software: More Than &ldquo;Advantages&rdquo;&lt;/h3&gt;
+
+&lt;p&gt;I'm often asked to describe the &ldquo;advantages&rdquo; of free
+software.  But the word &ldquo;advantages&rdquo; is too weak when it
+comes to freedom.  Life without freedom is oppression, and that
+applies to computing as well as every other activity in our lives.  We
+must refuse to give the developers of the programs or computing services
+control over the computing we do.  This is the right thing to do, for
+selfish reasons; but not solely for selfish reasons.&lt;/p&gt;
+
+&lt;p&gt;Freedom includes the freedom to cooperate with others.  Denying
+people that freedom means keeping them divided, which is the start of
+a scheme to oppress them.  In the free software community, we are very
+much aware of the importance of the freedom to cooperate because our
+work consists of organized cooperation.  If your friend comes to visit
+and sees you use a program, she might ask for a copy.  A program which
+stops you from redistributing it, or says you're &ldquo;not supposed
+to&rdquo;, is antisocial.&lt;/p&gt;
+
+&lt;p&gt;In computing, cooperation includes redistributing exact copies of a
+program to other users.  It also includes distributing your changed
+versions to them.  Free software encourages these forms of
+cooperation, while proprietary software forbids them.  It forbids
+redistribution of copies, and by denying users the source code, it
+blocks them from making changes.  SaaSS has the same effects: if your
+computing is done over the web in someone else's server, by someone
+else's copy of a program, you can't see it or touch the software that
+does your computing, so you can't redistribute it or change it.&lt;/p&gt;
+
+&lt;h3&gt;Conclusion&lt;/h3&gt;
+
+&lt;p&gt;We deserve to have control of our own computing; how can we win
+this control?  By rejecting nonfree software on the computers we own
+or regularly use, and rejecting SaaSS.  By &lt;a
+href="/licenses/license-recommendations.html"&gt; developing free
+software&lt;/a&gt; (for those of us who are programmers.) By refusing to
+develop or promote nonfree software or SaaSS.  By &lt;a
+href="/help/help.html"&gt;spreading these ideas to others&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;We and thousands of users have done this since 1984, which is how
+we now have the free GNU/Linux operating system that
+anyone&mdash;programmer or not&mdash;can use.  Join our cause, as a
+programmer or an activist.  Let's make all computer users free.&lt;/p&gt;
+
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Richard 
Stallman&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2018/11/17 07:27:56 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>

Index: philosophy/po/free-software-even-more-important.nl-diff.html
===================================================================
RCS file: philosophy/po/free-software-even-more-important.nl-diff.html
diff -N philosophy/po/free-software-even-more-important.nl-diff.html
--- /dev/null   1 Jan 1970 00:00:00 -0000
+++ philosophy/po/free-software-even-more-important.nl-diff.html        17 Nov 
2018 07:27:57 -0000      1.1
@@ -0,0 +1,381 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
+    "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd";>
+<!-- Generated by GNUN -->
+<html xmlns="http://www.w3.org/1999/xhtml"; xml:lang="en" lang="en">
+<head>
+<meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>/philosophy/free-software-even-more-important.html-diff</title>
+<style type="text/css">
+span.removed { background-color: #f22; color: #000; }
+span.inserted { background-color: #2f2; color: #000; }
+</style></head>
+<body><pre>
+&lt;!--#include virtual="/server/header.html" --&gt;
+&lt;!-- Parent-Version: <span 
class="removed"><del><strong>1.84</strong></del></span> <span 
class="inserted"><ins><em>1.85</em></ins></span> --&gt;
+&lt;title&gt;Free Software Is Even More Important Now
+- GNU Project - Free Software Foundation&lt;/title&gt;
+ &lt;!--#include 
virtual="/philosophy/po/free-software-even-more-important.translist" --&gt;
+&lt;!--#include virtual="/server/banner.html" --&gt;
+
+&lt;h2&gt;Free Software Is Even More Important Now&lt;/h2&gt;
+
+&lt;p&gt;by &lt;a href="http://www.stallman.org/"&gt;&lt;strong&gt;Richard
+Stallman&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
+
+&lt;blockquote&gt;
+&lt;p&gt;A substantially edited version of this article was published in &lt;a
+href="http://www.wired.com/opinion/2013/09/why-free-software-is-more-important-now-than-ever-before"&gt;
+Wired&lt;/a&gt;.&lt;/p&gt;
+&lt;p&gt;
+&lt;a href="/help/help.html"&gt;Suggested ways you can help the free software 
movement&lt;/a&gt;.
+&lt;/p&gt;
+&lt;/blockquote&gt;
+
+&lt;p&gt;Since 1983, the Free Software Movement has campaigned for computer
+users' freedom&mdash;for users to control the software they
+use, rather than vice versa.  When a program respects users' freedom
+and community, we call it &ldquo;free software.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;We also sometimes call it &ldquo;libre software&rdquo; to emphasize
+that we're talking about liberty, not price.  Some proprietary
+(nonfree) programs, such as Photoshop, are very expensive; others,
+such as Flash Player, are available gratis&mdash;but that's a minor
+detail.  Either way, they give the program's developer power
+over the users, power that no one should have.&lt;/p&gt;
+
+&lt;p&gt;Those two nonfree programs have something else in common: they are
+both &lt;em&gt;malware&lt;/em&gt;.  That is, both have functionalities 
designed to
+mistreat the user.  Proprietary software nowadays is often malware
+because &lt;a href="/malware/"&gt;the developers' power
+corrupts them&lt;/a&gt;.  That directory lists around <span 
class="removed"><del><strong>300</strong></del></span> <span 
class="inserted"><ins><em>350</em></ins></span> different
+malicious functionalities (as of <span class="removed"><del><strong>Apr 
2017),</strong></del></span> <span class="inserted"><ins><em>October, 
2018),</em></ins></span> but it is surely just the
+tip of the iceberg.&lt;/p&gt;
+
+&lt;p&gt;With free software, the users control the program, both individually
+and collectively.  So they control what their computers do (assuming
+those computers are &lt;a 
href="/philosophy/loyal-computers.html"&gt;loyal&lt;/a&gt;
+and do what the users' programs tell them to do).&lt;/p&gt;
+
+&lt;p&gt;With proprietary software, the program controls the users, and some
+other entity (the developer or &ldquo;owner&rdquo;) controls the
+program.  So the proprietary program gives its developer power over
+its users.  That is unjust in itself; moreover, it tempts the developer to
+mistreat the users in other ways.&lt;/p&gt;
+
+&lt;p&gt;Even when proprietary software isn't downright malicious, its
+developers have an incentive to make it 
+&lt;a 
href="https://observer.com/2016/06/how-technology-hijacks-peoples-minds%E2%80%8A-%E2%80%8Afrom-a-magician-and-googles-design-ethicist/"&gt;
+addictive,
+controlling and manipulative&lt;/a&gt;.  You can say, as does the author of
+that article, that the developers have an ethical obligation not to do
+that, but generally they follow their interests.  If you want this not
+to happen, make sure the program is controlled by its users.&lt;/p&gt;
+
+&lt;p&gt;Freedom means having control over your own life.  If you use a
+program to carry out activities in your life, your freedom depends on
+your having control over the program.  You deserve to have control
+over the programs you use, and all the more so when you use them for
+something important in your life.&lt;/p&gt;
+
+&lt;p&gt;Users' control over the program requires four
+&lt;a href="/philosophy/free-sw.html"&gt;essential freedoms&lt;/a&gt;.
+&lt;/p&gt;
+
+&lt;p&gt;(0) The freedom to run the program as you wish, for whatever 
purpose.&lt;/p&gt;
+
+&lt;p&gt;(1) The freedom to study the program's &ldquo;source code&rdquo;,
+and change it, so the program does your computing as you wish.
+Programs are written by programmers in a programming
+language&mdash;like English combined with algebra&mdash;and that form
+of the program is the &ldquo;source code&rdquo;.  Anyone who knows
+programming, and has the program in source code form, can read the
+source code, understand its functioning, and change it too.  When all
+you get is the executable form, a series of numbers that are efficient
+for the computer to run but extremely hard for a human being to
+understand, understanding and changing the program in that form are
+forbiddingly hard.&lt;/p&gt;
+
+&lt;p&gt;(2) The freedom to make and distribute exact copies when you wish.
+(It is not an obligation; doing this is your choice.  If the program
+is free, that doesn't mean someone has an obligation to offer you a
+copy, or that you have an obligation to offer him a copy.
+Distributing a program to users without freedom mistreats them;
+however, choosing not to distribute the program&mdash;using it
+privately&mdash;does not mistreat anyone.)&lt;/p&gt; 
+
+&lt;p&gt;(3) The freedom to make and distribute copies of your modified
+versions, when you wish.&lt;/p&gt;
+
+&lt;p&gt;The first two freedoms mean each user can exercise individual
+control over the program.  With the other two freedoms, any group of
+users can together exercise &lt;em&gt;collective control&lt;/em&gt; over the
+program.  With all four freedoms, the users fully control the program.
+If any of them is missing or inadequate, the program is proprietary
+(nonfree), and unjust.&lt;/p&gt;
+
+&lt;p&gt;Other kinds of works are also used for practical activities, including
+recipes for cooking, educational works such as textbooks, reference
+works such as dictionaries and encyclopedias, fonts for displaying
+paragraphs of text, circuit diagrams for hardware for people to build,
+and patterns for making useful (not merely decorative) objects with a
+3D printer.  Since these are not software, the free software movement
+strictly speaking doesn't cover them; but the same reasoning applies
+and leads to the same conclusion: these works should carry the four
+freedoms.&lt;/p&gt;
+
+&lt;p&gt;A free program allows you to tinker with it to make it do what you
+want (or cease do to something you dislike).  Tinkering with software
+may sound ridiculous if you are accustomed to proprietary software as
+a sealed box, but in the Free World it's a common thing to do, and a
+good way to learn programming.  Even the traditional American pastime
+of tinkering with cars is obstructed because cars now contain nonfree
+software.&lt;/p&gt;
+
+&lt;h3&gt;The Injustice of Proprietariness&lt;/h3&gt;
+
+&lt;p&gt;If the users don't control the program, the program controls the
+users.  With proprietary software, there is always some entity, the
+developer or &ldquo;owner&rdquo; of the program, that controls the
+program&mdash;and through it, exercises power over its users.  A
+nonfree program is a yoke, an instrument of unjust power.&lt;/p&gt;
+
+&lt;p&gt;In outrageous cases (though this outrage has become quite usual) &lt;a
+href="/proprietary/proprietary.html"&gt;proprietary programs are designed
+to spy on the users, restrict them, censor them, and abuse them&lt;/a&gt;.
+For instance, the operating system of Apple iThings does all of these,
+and so does Windows on mobile devices with ARM chips.  Windows, mobile
+phone firmware, and Google Chrome for Windows include a universal back
+door that allows some company to change the program remotely without
+asking permission. The Amazon Kindle has a back door that can erase
+books.&lt;/p&gt;
+
+&lt;p&gt;The use of nonfree software in the &ldquo;internet of things&rdquo;
+would turn it into
+the &lt;a 
href="http://ieet.org/index.php/IEET/more/rinesi20150806"&gt;&ldquo;internet
+of telemarketers&rdquo;&lt;/a&gt; as well as the &ldquo;internet of
+snoopers&rdquo;.&lt;/p&gt;
+
+&lt;p&gt;With the goal of ending the injustice of nonfree software, the free
+software movement develops free programs so users can free themselves.
+We began in 1984 by developing the free operating system &lt;a
+href="/gnu/the-gnu-project.html"&gt;GNU&lt;/a&gt;. Today, millions of computers
+run GNU, mainly in the &lt;a href="/gnu/gnu-linux-faq.html"&gt;GNU/Linux
+combination&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;Distributing a program to users without freedom mistreats those users;
+however, choosing not to distribute the program does not mistreat
+anyone.  If you write a program and use it privately, that does no
+wrong to others.  (You do miss an opportunity to do good, but that's
+not the same as doing wrong.)  Thus, when we say all software must
+be free, we mean that every copy must come with the four freedoms,
+but we don't mean that someone has an obligation to offer you a copy.&lt;/p&gt;
+
+&lt;h3&gt;Nonfree Software and SaaSS&lt;/h3&gt;
+
+&lt;p&gt;Nonfree software was the first way for companies to take control of
+people's computing.  Nowadays, there is another way, called Service as
+a Software Substitute, or SaaSS.  That means letting someone else's
+server do your own computing tasks.&lt;/p&gt;
+
+&lt;p&gt;SaaSS doesn't mean the programs on the server are nonfree (though they
+often are).  Rather, using SaaSS causes the same injustices as using a
+nonfree program: they are two paths to the same bad place.  Take the
+example of a SaaSS translation service: The user sends text to the
+server, and the server translates it (from English to Spanish, say)
+and sends the translation back to the user.  Now the job of
+translating is under the control of the server operator rather than
+the user.&lt;/p&gt;
+
+&lt;p&gt;If you use SaaSS, the server operator controls your computing.  It
+requires entrusting all the pertinent data to the server operator,
+which will be forced to show it to the state as well&mdash;&lt;a
+href="/philosophy/who-does-that-server-really-serve.html"&gt;who
+does that server really serve, after all?&lt;/a&gt;&lt;/p&gt;
+
+&lt;h3&gt;Primary And Secondary Injustices&lt;/h3&gt;
+
+&lt;p&gt;When you use proprietary programs or SaaSS, first of all you do wrong
+to yourself, because it gives some entity unjust power over you.  For
+your own sake, you should escape.  It also wrongs others if you make a
+promise not to share.  It is evil to keep such a promise, and a lesser
+evil to break it; to be truly upright, you should not make the promise
+at all.&lt;/p&gt;
+
+&lt;p&gt;There are cases where using nonfree software puts pressure directly
+on others to do likewise.  Skype is a clear example: when one person
+uses the nonfree Skype client software, it requires another person to
+use that software too&mdash;thus both surrender their freedom.
+(Google Hangouts have the same problem.)  It is wrong even to suggest
+using such programs.  We should refuse to use them even briefly, even
+on someone else's computer.&lt;/p&gt;
+
+&lt;p&gt;Another harm of using nonfree programs and SaaSS is that it rewards
+the perpetrator, encouraging further development of that program or
+&ldquo;service&rdquo;, leading in turn to even more people falling
+under the company's thumb.&lt;/p&gt;
+
+&lt;p&gt;All the forms of indirect harm are magnified when the user is a
+public entity or a school.&lt;/p&gt;
+
+&lt;h3&gt;Free Software and the State&lt;/h3&gt;
+
+&lt;p&gt;Public agencies exist for the people, not for themselves.  When they
+do computing, they do it for the people.  They have a duty to maintain
+full control over that computing so that they can assure it is done
+properly for the people.  (This constitutes the computational
+sovereignty of the state.)  They must never allow control over the
+state's computing to fall into private hands.&lt;/p&gt;
+
+&lt;p&gt;To maintain control of the people's computing, public agencies must
+not do it with proprietary software (software under the control of an
+entity other than the state).  And they must not entrust it to a
+service programmed and run by an entity other than the state, since
+this would be SaaSS.&lt;/p&gt;
+
+&lt;p&gt;Proprietary software has no security at all in one crucial case
+&mdash; against its developer.  And the developer may help others attack.
+&lt;a 
href="http://arstechnica.com/security/2013/06/nsa-gets-early-access-to-zero-day-data-from-microsoft-others/"&gt;
+Microsoft shows Windows bugs to the NSA&lt;/a&gt; (the US government digital
+spying agency) before fixing them.  We do not know whether Apple does
+likewise, but it is under the same government pressure as Microsoft.
+If the government of any other country uses such software, it
+endangers national security.  Do you want the NSA to break into your
+government's computers?  See
+our &lt;a href="/philosophy/government-free-software.html"&gt;suggested
+policies for governments to promote free software&lt;/a&gt;.&lt;/p&gt;
+
+&lt;h3&gt;Free Software and Education&lt;/h3&gt;
+
+&lt;p&gt;Schools (and this includes all educational activities) influence the
+future of society through what they teach.  They should teach
+exclusively free software, so as to use their influence for the good.
+To teach a proprietary program is to implant dependence, which goes
+against the mission of education.  By training in use of free
+software, schools will direct society's future towards freedom, and
+help talented programmers master the craft.&lt;/p&gt;
+
+&lt;p&gt;They will also teach students the habit of cooperating, helping
+other people.  Each class should have this rule: &ldquo;Students, this
+class is a place where we share our knowledge.  If you bring software
+to class, you may not keep it for yourself.  Rather, you must share
+copies with the rest of the class&mdash;including the program's source
+code, in case someone else wants to learn.  Therefore, bringing
+proprietary software to class is not permitted except to reverse
+engineer it.&rdquo;&lt;/p&gt;
+
+&lt;p&gt;Proprietary developers would have us punish students who are good
+enough at heart to share software and thwart those curious enough to
+want to change it.  This means a bad education.  See
+&lt;a href="/education/"&gt;http://www.gnu.org/education/&lt;/a&gt;
+for more discussion of the use of free software in schools.&lt;/p&gt;
+
+&lt;h3&gt;Free Software: More Than &ldquo;Advantages&rdquo;&lt;/h3&gt;
+
+&lt;p&gt;I'm often asked to describe the &ldquo;advantages&rdquo; of free
+software.  But the word &ldquo;advantages&rdquo; is too weak when it
+comes to freedom.  Life without freedom is oppression, and that
+applies to computing as well as every other activity in our lives.  We
+must refuse to give the developers of the programs or computing services
+control over the computing we do.  This is the right thing to do, for
+selfish reasons; but not solely for selfish reasons.&lt;/p&gt;
+
+&lt;p&gt;Freedom includes the freedom to cooperate with others.  Denying
+people that freedom means keeping them divided, which is the start of
+a scheme to oppress them.  In the free software community, we are very
+much aware of the importance of the freedom to cooperate because our
+work consists of organized cooperation.  If your friend comes to visit
+and sees you use a program, she might ask for a copy.  A program which
+stops you from redistributing it, or says you're &ldquo;not supposed
+to&rdquo;, is antisocial.&lt;/p&gt;
+
+&lt;p&gt;In computing, cooperation includes redistributing exact copies of a
+program to other users.  It also includes distributing your changed
+versions to them.  Free software encourages these forms of
+cooperation, while proprietary software forbids them.  It forbids
+redistribution of copies, and by denying users the source code, it
+blocks them from making changes.  SaaSS has the same effects: if your
+computing is done over the web in someone else's server, by someone
+else's copy of a program, you can't see it or touch the software that
+does your computing, so you can't redistribute it or change it.&lt;/p&gt;
+
+&lt;h3&gt;Conclusion&lt;/h3&gt;
+
+&lt;p&gt;We deserve to have control of our own computing; how can we win
+this control?  By rejecting nonfree software on the computers we own
+or regularly use, and rejecting SaaSS.  By &lt;a
+href="/licenses/license-recommendations.html"&gt; developing free
+software&lt;/a&gt; (for those of us who are programmers.) By refusing to
+develop or promote nonfree software or SaaSS.  By &lt;a
+href="/help/help.html"&gt;spreading these ideas to others&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;We and thousands of users have done this since 1984, which is how
+we now have the free GNU/Linux operating system that
+anyone&mdash;programmer or not&mdash;can use.  Join our cause, as a
+programmer or an activist.  Let's make all computer users free.&lt;/p&gt;
+
+
+&lt;/div&gt;&lt;!-- for id="content", starts in the include above --&gt;
+&lt;!--#include virtual="/server/footer.html" --&gt;
+&lt;div id="footer"&gt;
+&lt;div class="unprintable"&gt;
+
+&lt;p&gt;Please send general FSF &amp; GNU inquiries to
+&lt;a href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.
+There are also &lt;a href="/contact/"&gt;other ways to contact&lt;/a&gt;
+the FSF.  Broken links and other corrections or suggestions can be sent
+to &lt;a 
href="mailto:address@hidden"&gt;&lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+&lt;p&gt;&lt;!-- TRANSLATORS: Ignore the original text in this paragraph,
+        replace it with the translation of these two:
+
+        We work hard and do our best to provide accurate, good quality
+        translations.  However, we are not exempt from imperfection.
+        Please send your comments and general suggestions in this regard
+        to &lt;a href="mailto:address@hidden"&gt;
+        &lt;address@hidden&gt;&lt;/a&gt;.&lt;/p&gt;
+
+        &lt;p&gt;For information on coordinating and submitting translations of
+        our web pages, see &lt;a
+        href="/server/standards/README.translations.html"&gt;Translations
+        README&lt;/a&gt;. --&gt;
+Please see the &lt;a
+href="/server/standards/README.translations.html"&gt;Translations
+README&lt;/a&gt; for information on coordinating and submitting translations
+of this article.&lt;/p&gt;
+&lt;/div&gt;
+
+&lt;!-- Regarding copyright, in general, standalone pages (as opposed to
+     files generated as part of manuals) on the GNU web server should
+     be under CC BY-ND 4.0.  Please do NOT change or remove this
+     without talking with the webmasters or licensing team first.
+     Please make sure the copyright date is consistent with the
+     document.  For web pages, it is ok to list just the latest year the
+     document was modified, or published.
+     
+     If you wish to list earlier years, that is ok too.
+     Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+     years, as long as each year in the range is in fact a copyrightable
+     year, i.e., a year in which the document was published (including
+     being publicly visible on the web or in a revision control system).
+     
+     There is more detail about copyright years in the GNU Maintainers
+     Information document, www.gnu.org/prep/maintain. --&gt;
+
+&lt;p&gt;Copyright &copy; 2015, <span 
class="removed"><del><strong>2017</strong></del></span> <span 
class="inserted"><ins><em>2017, 2018</em></ins></span> Richard 
Stallman&lt;/p&gt;
+
+&lt;p&gt;This page is licensed under a &lt;a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/"&gt;Creative
+Commons Attribution-NoDerivatives 4.0 International 
License&lt;/a&gt;.&lt;/p&gt;
+
+&lt;!--#include virtual="/server/bottom-notes.html" --&gt;
+
+&lt;p class="unprintable"&gt;Updated:
+&lt;!-- timestamp start --&gt;
+$Date: 2018/11/17 07:27:57 $
+&lt;!-- timestamp end --&gt;
+&lt;/p&gt;
+&lt;/div&gt;
+&lt;/div&gt;
+&lt;/body&gt;
+&lt;/html&gt;
+</pre></body></html>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]