www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-webpages.fr.html malwar...


From: GNUN
Subject: www/proprietary malware-webpages.fr.html malwar...
Date: Tue, 4 Dec 2018 11:28:40 -0500 (EST)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     18/12/04 11:28:40

Modified files:
        proprietary    : malware-webpages.fr.html 
                         malware-webpages.ru.html 
                         proprietary-surveillance.fr.html 
                         proprietary-surveillance.ru.html 
                         proprietary.fr.html proprietary.ru.html 
        proprietary/po : malware-webpages.fr-en.html 
                         malware-webpages.ru-en.html 
                         malware-webpages.ru.po 
                         proprietary-surveillance.fr-en.html 
                         proprietary-surveillance.ru-en.html 
                         proprietary-surveillance.ru.po 
                         proprietary.fr-en.html proprietary.ru-en.html 
                         proprietary.ru.po 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.fr.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr-en.html?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.439&r2=1.440
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.108&r2=1.109

Patches:
Index: malware-webpages.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.fr.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- malware-webpages.fr.html    6 Nov 2018 17:29:52 -0000       1.15
+++ malware-webpages.fr.html    4 Dec 2018 16:28:39 -0000       1.16
@@ -57,6 +57,22 @@
 <div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>De nombreux sites web utilisent du code JavaScript <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>pour
+récupérer l'information que les utilisateurs ont saisie dans un formulaire
+mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
+été <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>poursuivis</a>
+pour cela.</p>
+
+    <p>La messagerie instantanée de certains supports techiques utilise le 
même
+genre de maliciel pour <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>lire
+le messsage que l'utilisateur est en train d'écrire avant qu'il ne l'ait
+envoyé</a>.</p>
+  </li>
+
   <li id="M201807190">
     <p>British Airways a utilisé du <a
 
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>JavaScript
@@ -95,16 +111,6 @@
 navigateurs.</p>
   </li>
 
-  <li id="M201712210">
-    <p>De nombreux sites web utilisent du code JavaScript <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>pour
-récupérer l'information que les utilisateurs ont saisie dans un formulaire
-mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
-été <a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>poursuivis</a>
-pour cela.</p>
-  </li>
-
   <li id="M201711150">
     <p>Certains sites envoient du code JavaScript pour collecter tout ce qui 
est
 saisi par l'utilisateur, <a
@@ -286,7 +292,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/11/06 17:29:52 $
+$Date: 2018/12/04 16:28:39 $
 
 <!-- timestamp end -->
 </p>

Index: malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-webpages.ru.html    25 Oct 2018 17:00:13 -0000      1.13
+++ malware-webpages.ru.html    4 Dec 2018 16:28:39 -0000       1.14
@@ -56,6 +56,20 @@
 <div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Многие сайты <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>подглядывают
+за тем, что пользователи ввели в форму, но 
не отправили</a>. На некоторых за
+это <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+подали в суд</a>.</p>
+
+    <p>Средства переговоров некоторых служб 
применяют этого же рода вредоносные
+программы, чтобы <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+читать, что пользователь вводит перед тем, 
как отослать</a>.</p>
+  </li>
+
   <li id="M201807190">
     <p>British Airways пользовались на своем сайте <a
 
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>несвободными
@@ -95,15 +109,6 @@
 браузера</a>.</p>
   </li>
 
-  <li id="M201712210">
-    <p>Многие сайты <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>подглядывают
-за тем, что пользователи ввели в форму, но 
не отправили</a>. На некоторых за
-это <a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
-подали в суд</a>.</p>
-  </li>
-
   <li id="M201711150">
     <p>Некоторые сайты посылают программы на 
JavaScript, собирающие все, что вводит
 пользователь, <a
@@ -285,7 +290,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/10/25 17:00:13 $
+$Date: 2018/12/04 16:28:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- proprietary-surveillance.fr.html    1 Dec 2018 20:27:45 -0000       1.147
+++ proprietary-surveillance.fr.html    4 Dec 2018 16:28:39 -0000       1.148
@@ -1890,6 +1890,22 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>De nombreux sites web utilisent du code JavaScript <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>pour
+récupérer l'information que les utilisateurs ont saisie dans un formulaire
+mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
+été <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>poursuivis</a>
+pour cela.</p>
+
+    <p>La messagerie instantanée de certains supports techiques utilise le 
même
+genre de maliciel pour <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>lire
+le messsage que l'utilisateur est en train d'écrire avant qu'il ne l'ait
+envoyé</a>.</p>
+  </li>
+
   <li id="M201807190">
     <p>British Airways a utilisé du <a
 
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>JavaScript
@@ -1904,16 +1920,6 @@
 navigateurs.</p>
   </li>
 
-  <li id="M201712210">
-    <p>De nombreux sites web utilisent du code JavaScript <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>pour
-récupérer l'information que les utilisateurs ont saisie dans un formulaire
-mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
-été <a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>poursuivis</a>
-pour cela.</p>
-  </li>
-
   <li id="M201711150">
     <p>Certains sites envoient du code JavaScript pour collecter tout ce qui 
est
 saisi par l'utilisateur, <a
@@ -2090,7 +2096,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/12/01 20:27:45 $
+$Date: 2018/12/04 16:28:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary-surveillance.ru.html    2 Dec 2018 18:28:12 -0000       1.146
+++ proprietary-surveillance.ru.html    4 Dec 2018 16:28:39 -0000       1.147
@@ -1865,6 +1865,20 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Многие сайты пользуются программами 
на JavaScript, чтобы <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>подглядывать,
+что пользователи ввели в форму, но не 
отправили</a>, чтобы определить их
+личность. На некоторых <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+подали за это в суд</a>.</p>
+
+    <p>Средства переговоров некоторых служб 
применяют этого же рода вредоносные
+программы, чтобы <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+читать, что пользователь вводит перед тем, 
как отослать</a>.</p>
+  </li>
+
   <li id="M201807190">
     <p>British Airways пользовались на своем сайте <a
 
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>несвободными
@@ -1879,15 +1893,6 @@
 браузера</a>.</p>
   </li>
 
-  <li id="M201712210">
-    <p>Многие сайты пользуются программами 
на JavaScript, чтобы <a
-href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>подглядывать,
-что пользователи ввели в форму, но не 
отправили</a>, чтобы определить их
-личность. На некоторых <a
-href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
-подали за это в суд</a>.</p>
-  </li>
-
   <li id="M201711150">
     <p>Некоторые сайты посылают программы на 
JavaScript, собирающие все, что вводит
 пользователь, <a
@@ -2060,7 +2065,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/12/02 18:28:12 $
+$Date: 2018/12/04 16:28:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary.fr.html 13 Nov 2018 17:27:59 -0000      1.46
+++ proprietary.fr.html 4 Dec 2018 16:28:39 -0000       1.47
@@ -151,6 +151,22 @@
 <h3 id="latest">Ajouts récents</h3>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>De nombreux sites web utilisent du code JavaScript <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>pour
+récupérer l'information que les utilisateurs ont saisie dans un formulaire
+mais n'ont pas envoyée</a>, et ainsi découvrir leur identité. Certains ont
+été <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>poursuivis</a>
+pour cela.</p>
+
+    <p>La messagerie instantanée de certains supports techiques utilise le 
même
+genre de maliciel pour <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>lire
+le messsage que l'utilisateur est en train d'écrire avant qu'il ne l'ait
+envoyé</a>.</p>
+  </li>
+
   <li id="M201811100">
     <p>Corel Paintshop Pro a une <a
 
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/";>porte
@@ -215,27 +231,6 @@
 les performances des anciens téléphones pour forcer les utilisateurs à
 acheter leurs nouveaux modèles</a>.</p>
   </li>
-
-  <li id="M201810230">
-    <p>General Motors <a
-href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html";>gardait
-la trace des programmes radio choisis</a> dans ses voitures « connectées 
»,
-minute par minute.</p>
-
-    <p>GM n'avait pas le consentement des utilisateurs, mais il aurait été 
facile
-de le glisser dans le contrat de souscription à un service numérique
-quelconque. Une exigence de consentement revient en fait à une absence de
-protection.</p>
-
-    <p>Les voitures peuvent aussi récolter une quantité d'autres données : 
elles
-peuvent vous écouter, vous regarder, suivre vos mouvements, suivre à la
-trace les téléphones mobiles des passagers. <em>Tout</em> recueil de données
-de ce type doit être interdit.</p>
-
-    <p>Mais si on veut être vraiment en sécurité, on doit s'assurer que le 
matériel
-de la voiture ne peut collecter aucune de ces données, ou bien que le
-logiciel est libre, ce qui permet de savoir si c'est bien le cas.</p>
-  </li>
 </ul>
 
 
@@ -316,7 +311,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Dernière mise à jour :
 
-$Date: 2018/11/13 17:27:59 $
+$Date: 2018/12/04 16:28:39 $
 
 <!-- timestamp end -->
 </p>

Index: proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary.ru.html 13 Nov 2018 15:28:27 -0000      1.41
+++ proprietary.ru.html 4 Dec 2018 16:28:39 -0000       1.42
@@ -156,6 +156,20 @@
 <h3 id="latest">Последние добавления</h3>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Многие сайты применяют программы на 
JavaScript, чтобы <a
+href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+выуживать информацию, которую 
пользователи ввели в форме, но не
+отправили</a> для определения их личности. 
На некоторых за это <a
+href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+подали в суд</a>.</p>
+
+    <p>Средства переговоров некоторых служб 
применяют этого же рода вредоносные
+программы, чтобы <a
+href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+читать, что пользователь вводит перед тем, 
как отослать</a>.</p>
+  </li>
+
   <li id="M201811100">
     <p>В Corel Paintshop Pro есть <a
 
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/";>
@@ -217,26 +231,6 @@
 характеристики старых телефонов, чтобы 
вынудить пользователей покупать
 новые</a>.</p>
   </li>
-
-  <li id="M201810230">
-    <p>GM <a 
href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html";>
-отслеживает переключения на различные 
программы радиопередач</a> в
-&ldquo;подключенных&rdquo; автомобилях, 
поминутно.</p>
-
-    <p>GM не получал согласия пользователей, 
но они легко могли бы его получить,
-вставив в контракт, который подписывают 
пользователи, какую-нибудь цифровую
-услугу или что-то подобное. Требование на 
согласие от пользователей
-фактически не защищает.</p>
-
-    <p>Автомобили могут собирать также массу 
других данных: они могут слушать вас,
-смотреть на вас, отслеживать ваши 
перемещения и сотовые телефоны
-пассажиров. <em>Любой</em> сбор таких данных 
должен быть запрещен.</p>
-
-    <p>Но если вы хотите настоящей 
безопасности, нужно гарантировать, что
-аппаратура автомобиля не может собирать 
ничего из этих данных или что
-программы свободны, так что мы знаем, что 
они не будут собирать ничего из
-этих данных.</p>
-  </li>
 </ul>
 
 
@@ -318,7 +312,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Обновлено:
 
-$Date: 2018/11/13 15:28:27 $
+$Date: 2018/12/04 16:28:39 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-webpages.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr-en.html,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- po/malware-webpages.fr-en.html      25 Oct 2018 11:28:59 -0000      1.12
+++ po/malware-webpages.fr-en.html      4 Dec 2018 16:28:39 -0000       1.13
@@ -49,6 +49,20 @@
 <div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.</p>
+  </li>
+
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -86,15 +100,6 @@
     swipes usernames from browser-based password managers</a>.</p>
   </li>
 
-  <li id="M201712210">
-    <p>Many web sites use JavaScript code <a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
-    to snoop on information that users have typed into a
-    form but not sent</a>, in order to learn their identity. Some are <a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
-    getting sued</a> for this.</p>
-  </li>
-
   <li id="M201711150">
     <p>Some websites send
     JavaScript code to collect all the user's input, <a
@@ -254,7 +259,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/25 11:28:59 $
+$Date: 2018/12/04 16:28:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- po/malware-webpages.ru-en.html      25 Oct 2018 17:00:14 -0000      1.13
+++ po/malware-webpages.ru-en.html      4 Dec 2018 16:28:39 -0000       1.14
@@ -49,6 +49,20 @@
 <div class="column-limit" id="malware-webpages"></div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.</p>
+  </li>
+
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -86,15 +100,6 @@
     swipes usernames from browser-based password managers</a>.</p>
   </li>
 
-  <li id="M201712210">
-    <p>Many web sites use JavaScript code <a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
-    to snoop on information that users have typed into a
-    form but not sent</a>, in order to learn their identity. Some are <a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
-    getting sued</a> for this.</p>
-  </li>
-
   <li id="M201711150">
     <p>Some websites send
     JavaScript code to collect all the user's input, <a
@@ -254,7 +259,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/10/25 17:00:14 $
+$Date: 2018/12/04 16:28:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/malware-webpages.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- po/malware-webpages.ru.po   4 Dec 2018 16:03:30 -0000       1.29
+++ po/malware-webpages.ru.po   4 Dec 2018 16:28:39 -0000       1.30
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-12-04 14:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Malware in Webpages - GNU Project - Free Software Foundation"

Index: po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- po/proprietary-surveillance.fr-en.html      1 Dec 2018 20:27:46 -0000       
1.135
+++ po/proprietary-surveillance.fr-en.html      4 Dec 2018 16:28:39 -0000       
1.136
@@ -1808,6 +1808,20 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.</p>
+  </li>
+
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -1821,15 +1835,6 @@
     swipes usernames from browser-based password managers</a>.</p>
   </li>
 
-  <li id="M201712210">
-    <p>Many web sites use JavaScript code <a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
-    to snoop on information that users have typed into a
-    form but not sent</a>, in order to learn their identity. Some are <a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
-    getting sued</a> for this.</p>
-  </li>
-
   <li id="M201711150">
     <p>Some websites send
     JavaScript code to collect all the user's input, <a
@@ -1979,7 +1984,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/12/01 20:27:46 $
+$Date: 2018/12/04 16:28:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- po/proprietary-surveillance.ru-en.html      2 Dec 2018 18:28:12 -0000       
1.139
+++ po/proprietary-surveillance.ru-en.html      4 Dec 2018 16:28:39 -0000       
1.140
@@ -1808,6 +1808,20 @@
 </div>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.</p>
+  </li>
+
   <li id="M201807190">
     <p>British Airways used <a
     
href="https://www.theverge.com/2018/7/19/17591732/british-airways-gdpr-compliance-twitter-personal-data-security";>nonfree
@@ -1821,15 +1835,6 @@
     swipes usernames from browser-based password managers</a>.</p>
   </li>
 
-  <li id="M201712210">
-    <p>Many web sites use JavaScript code <a
-    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
-    to snoop on information that users have typed into a
-    form but not sent</a>, in order to learn their identity. Some are <a
-    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
-    getting sued</a> for this.</p>
-  </li>
-
   <li id="M201711150">
     <p>Some websites send
     JavaScript code to collect all the user's input, <a
@@ -1979,7 +1984,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/12/02 18:28:12 $
+$Date: 2018/12/04 16:28:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.439
retrieving revision 1.440
diff -u -b -r1.439 -r1.440
--- po/proprietary-surveillance.ru.po   4 Dec 2018 16:03:30 -0000       1.439
+++ po/proprietary-surveillance.ru.po   4 Dec 2018 16:28:39 -0000       1.440
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-12-04 14:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -960,8 +959,8 @@
 "(Из <a href=\"https://www.apple.com/icloud/photos/\";>Информации 
об Apple's "
 "iCloud</a> на 24&nbsp;сентября 2015&nbsp;года.) Функция 
iCloud <a href="
 "\"https://support.apple.com/en-us/HT202033\";>активизируется 
при загрузке "
-"iOS</a>. Слово &ldquo;<span lang=\"en\" xml:lang=\"en\">cloud</span> "
-"(облако)&rdquo; означает &ldquo;пожалуйста, не 
спрашивайте, где это&rdquo;."
+"iOS</a>. Слово &ldquo;<span lang=\"en\" xml:lang=\"en\">cloud</span> 
(облако)"
+"&rdquo; означает &ldquo;пожалуйста, не 
спрашивайте, где это&rdquo;."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -2026,8 +2025,8 @@
 "technology/2015/may/06/free-android-apps-connect-tracking-advertising-"
 "websites\">tracking and advertising</a> URLs, on the average."
 msgstr ""
-"Бесплатные (но не <a 
href=\"/philosophy/free-sw.html\">свободные</"
-"a>)приложения Android <a 
href=\"http://www.theguardian.com/technology/2015/";
+"Бесплатные (но не <a 
href=\"/philosophy/free-sw.html\">свободные</a>)"
+"приложения Android <a 
href=\"http://www.theguardian.com/technology/2015/";
 "may/06/free-android-apps-connect-tracking-advertising-websites"
 "\">подключаются к 100 URL слежки и рекламы</a> (в 
среднем)."
 

Index: po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- po/proprietary.fr-en.html   13 Nov 2018 17:28:00 -0000      1.37
+++ po/proprietary.fr-en.html   4 Dec 2018 16:28:39 -0000       1.38
@@ -141,6 +141,20 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.</p>
+  </li>
+
   <li id="M201811100">
     <p>Corel Paintshop Pro has a <a
     
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/";>
@@ -204,25 +218,6 @@
     the performance of older phones to force users to buy their newer
     phones</a>.</p>
   </li>
-
-  <li id="M201810230">
-    <p>GM <a
-    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html";>
-    tracked the choices of radio programs</a> in its
-    &ldquo;connected&rdquo; cars, minute by minute.</p>
-
-    <p>GM did not get users' consent, but it could have got that easily by
-    sneaking it into the contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.</p>
-
-    <p>The cars can also collect lots of other data: listening to you,
-    watching you, following your movements, tracking passengers' cell
-    phones. <em>All</em> such data collection should be forbidden.</p>
-
-    <p>But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that data.</p>
-  </li>
 </ul>
 
 
@@ -283,7 +278,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/11/13 17:28:00 $
+$Date: 2018/12/04 16:28:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- po/proprietary.ru-en.html   13 Nov 2018 15:59:33 -0000      1.39
+++ po/proprietary.ru-en.html   4 Dec 2018 16:28:39 -0000       1.40
@@ -141,6 +141,20 @@
 <h3 id="latest">Latest additions</h3>
 
 <ul class="blurbs">
+  <li id="M201811270">
+    <p>Many web sites use JavaScript code <a
+    
href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081";>
+    to snoop on information that users have typed into a
+    form but not sent</a>, in order to learn their identity. Some are <a
+    
href="https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-Allege";>
+    getting sued</a> for this.</p>
+
+    <p>The chat facilities of some customer services use the same sort of
+    malware to <a
+    
href="https://gizmodo.com/be-warned-customer-service-agents-can-see-what-youre-t-1830688119";>
+    read what the user is typing before it is posted</a>.</p>
+  </li>
+
   <li id="M201811100">
     <p>Corel Paintshop Pro has a <a
     
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/";>
@@ -204,25 +218,6 @@
     the performance of older phones to force users to buy their newer
     phones</a>.</p>
   </li>
-
-  <li id="M201810230">
-    <p>GM <a
-    href="https://boingboing.net/2018/10/23/dont-touch-that-dial.html";>
-    tracked the choices of radio programs</a> in its
-    &ldquo;connected&rdquo; cars, minute by minute.</p>
-
-    <p>GM did not get users' consent, but it could have got that easily by
-    sneaking it into the contract that users sign for some digital service
-    or other. A requirement for consent is effectively no protection.</p>
-
-    <p>The cars can also collect lots of other data: listening to you,
-    watching you, following your movements, tracking passengers' cell
-    phones. <em>All</em> such data collection should be forbidden.</p>
-
-    <p>But if you really want to be safe, we must make sure the car's
-    hardware cannot collect any of that data, or that the software
-    is free so we know it won't collect any of that data.</p>
-  </li>
 </ul>
 
 
@@ -283,7 +278,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2018/11/13 15:59:33 $
+$Date: 2018/12/04 16:28:39 $
 <!-- timestamp end -->
 </p>
 </div>

Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- po/proprietary.ru.po        4 Dec 2018 16:03:30 -0000       1.108
+++ po/proprietary.ru.po        4 Dec 2018 16:28:39 -0000       1.109
@@ -15,7 +15,6 @@
 "MIME-Version: 1.0\n"
 "Content-Type: text/plain; charset=UTF-8\n"
 "Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2018-12-04 14:26+0000\n"
 
 #. type: Content of: <title>
 msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,12 +301,12 @@
 "Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
 "Allege\"> getting sued</a> for this."
 msgstr ""
-"Многие сайты применяют программы на 
JavaScript, чтобы <a href=\"http://gizmodo.com/before-you-";
-"hit-submit-this-company-has-already-logge-1795906081\"> выуживать 
информацию, "
-"которую пользователи ввели в форме, но не 
отправили</a> для определения "
-"их личности. На некоторых за это <a 
href=\"https://www.manatt.com/Insights/";
-"Newsletters/Advertising-Law/Sites-Illegally-Tracked-Consumers-New-Suits-"
-"Allege\"> подали в суд</a>."
+"Многие сайты применяют программы на 
JavaScript, чтобы <a href=\"http://";
+"gizmodo.com/before-you-hit-submit-this-company-has-already-"
+"logge-1795906081\"> выуживать информацию, которую 
пользователи ввели в "
+"форме, но не отправили</a> для определения 
их личности. На некоторых за это "
+"<a href=\"https://www.manatt.com/Insights/Newsletters/Advertising-Law/Sites-";
+"Illegally-Tracked-Consumers-New-Suits-Allege\"> подали в суд</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""
@@ -317,8 +316,9 @@
 "a>."
 msgstr ""
 "Средства переговоров некоторых служб 
применяют этого же рода вредоносные "
-"программы, чтобы <a 
href=\"https://gizmodo.com/be-warned-customer-service-agents-can-see-";
-"what-youre-t-1830688119\"> читать, что пользователь 
вводит перед тем, как отослать</a>."
+"программы, чтобы <a 
href=\"https://gizmodo.com/be-warned-customer-service-";
+"agents-can-see-what-youre-t-1830688119\"> читать, что 
пользователь вводит "
+"перед тем, как отослать</a>."
 
 #. type: Content of: <ul><li><p>
 msgid ""



reply via email to

[Prev in Thread] Current Thread [Next in Thread]