[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 5 Jan 2019 03:59:21 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/01/05 03:59:20
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.3&r2=1.4
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- de.po 1 Jan 2019 20:00:35 -0000 1.3
+++ de.po 5 Jan 2019 08:59:17 -0000 1.4
@@ -8422,6 +8422,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -9811,9 +9818,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
# | [-<a href=\"/proprietary/proprietary-drm.html\">Digital-]{+<em>Digital+}
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- es.po 3 Jan 2019 10:58:31 -0000 1.4
+++ es.po 5 Jan 2019 08:59:17 -0000 1.5
@@ -5983,6 +5983,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -6982,13 +6989,10 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Puerta trasera:</em> cualquier programa en funcionamiento en el "
-"ordenador, que esté a la espera de comandos procedentes de un extraño que "
-"puede ordenarle que haga cosas sin pedirle consentimiento al usuario."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
#. type: Content of: <table><tr><td><ol><li>
msgid ""
@@ -7959,6 +7963,15 @@
"procesadores Intel incorporarán software tirano</a>."
#~ msgid ""
+#~ "<em>Back door:</em> any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Puerta trasera:</em> cualquier programa en funcionamiento en el "
+#~ "ordenador, que esté a la espera de comandos procedentes de un extraño
que "
+#~ "puede ordenarle que haga cosas sin pedirle consentimiento al usuario."
+
+#~ msgid ""
#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#~ "Foundation, Inc."
#~ msgstr ""
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- fr.po 1 Jan 2019 22:29:04 -0000 1.4
+++ fr.po 5 Jan 2019 08:59:17 -0000 1.5
@@ -6649,6 +6649,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -7799,13 +7806,10 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Porte dérobée :</em> Tout programme en fonctionnement sur votre "
-"ordinateur qui est à l'écoute de commandes provenant d'un tiers, ce dernier
"
-"pouvant lui dire de faire des choses sans vous demander la permission."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
#. type: Content of: <table><tr><td><ol><li>
msgid ""
@@ -8931,6 +8935,16 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">Les "
"processeurs Intel vont avoir un tyran logiciel intégré</a>."
+#~ msgid ""
+#~ "<em>Back door:</em> any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Porte dérobée :</em> Tout programme en fonctionnement sur votre "
+#~ "ordinateur qui est à l'écoute de commandes provenant d'un tiers, ce "
+#~ "dernier pouvant lui dire de faire des choses sans vous demander la "
+#~ "permission."
+
#~ msgid "Copyright © 2014-2018 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2014-2018 Free Software Foundation, Inc."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- it.po 1 Jan 2019 20:00:35 -0000 1.3
+++ it.po 5 Jan 2019 08:59:17 -0000 1.4
@@ -7824,6 +7824,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -9125,9 +9132,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
# | [-<a href=\"/proprietary/proprietary-drm.html\">Digital-]{+<em>Digital+}
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- ja.po 1 Jan 2019 20:00:35 -0000 1.3
+++ ja.po 5 Jan 2019 08:59:17 -0000 1.4
@@ -6593,6 +6593,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -7713,9 +7720,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- nl.po 1 Jan 2019 20:00:35 -0000 1.3
+++ nl.po 5 Jan 2019 08:59:18 -0000 1.4
@@ -5151,6 +5151,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -6142,9 +6149,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
# | [-<a href=\"/proprietary/proprietary-drm.html\">Digital-]{+<em>Digital+}
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- pl.po 1 Jan 2019 20:00:35 -0000 1.3
+++ pl.po 5 Jan 2019 08:59:19 -0000 1.4
@@ -4629,6 +4629,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -5683,9 +5690,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
# | [-<a href=\"/philosophy/proprietary-drm.html\">Digital-]{+<em>Digital+}
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- pot 1 Jan 2019 20:00:35 -0000 1.3
+++ pot 5 Jan 2019 08:59:19 -0000 1.4
@@ -4432,6 +4432,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -5245,9 +5252,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary-back-doors.de-diff.html 1 Jan 2019 20:00:36 -0000 1.17
+++ proprietary-back-doors.de-diff.html 5 Jan 2019 08:59:19 -0000 1.18
@@ -32,6 +32,10 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
+<span class="inserted"><ins><em><p>We say a program has a “back
door“ when someone who is
+not supposed to be in control of the computer where it is installed
+can send it commands via some other channel.</p></em></ins></span>
+
<p>Here are examples of demonstrated back doors in proprietary software.
They are sorted out according to what they are known to allow. Back doors
that allow full control over the operating system are said to be
@@ -750,7 +754,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary-back-doors.de.po 1 Jan 2019 20:00:36 -0000 1.118
+++ proprietary-back-doors.de.po 5 Jan 2019 08:59:19 -0000 1.119
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -53,6 +53,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary-back-doors.fr.po 1 Jan 2019 22:19:49 -0000 1.115
+++ proprietary-back-doors.fr.po 5 Jan 2019 08:59:19 -0000 1.116
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2019-01-01 23:19+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -52,6 +53,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-back-doors.it-diff.html 1 Jan 2019 20:00:36 -0000 1.43
+++ proprietary-back-doors.it-diff.html 5 Jan 2019 08:59:19 -0000 1.44
@@ -32,6 +32,10 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
+<span class="inserted"><ins><em><p>We say a program has a “back
door“ when someone who is
+not supposed to be in control of the computer where it is installed
+can send it commands via some other channel.</p></em></ins></span>
+
<p>Here are examples of demonstrated back doors in proprietary <span
class="removed"><del><strong>software.</p>
<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>software.
@@ -122,94 +126,98 @@
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
iOS 8 security improvements</a>; but <a
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
- not <span class="removed"><del><strong>come</strong></del></span> as <span
class="inserted"><ins><em>much as Apple claims</a>.</p>
+ not <span class="removed"><del><strong>come</strong></del></span> as <span
class="removed"><del><strong>a surprise. Nonfree software for
+ encryption is never trustworthy.</p></strong></del></span>
<span class="inserted"><ins><em>much as Apple
claims</a>.</p></em></ins></span>
</li>
-</ul>
+ <span class="removed"><del><strong><li><p>A pregnancy test
controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts of</strong></del></span>
+<span class="inserted"><ins><em></ul>
-<h3 id='alter-data'>Altering user's data or settings</h3>
+
+<h3 id='alter-data'>Altering user's</em></ins></span> data <span
class="removed"><del><strong>in the phone, and in server accounts, it can
+ alter them too</a>.</p>
+ </li>
+
+ <li>
+ <p>Xiaomi phones come with</strong></del></span> <span
class="inserted"><ins><em>or settings</h3>
<ul class="blurbs">
<li id="M201809140">
- <p>Android has</em></ins></span> a <span
class="removed"><del><strong>surprise. Nonfree software</strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
- back door</em></ins></span> for
- <span class="removed"><del><strong>encryption is never
trustworthy.</p></strong></del></span> <span
class="inserted"><ins><em>remotely changing “user”
settings</a>.</p>
+ <p>Android has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
+ universal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change"></em></ins></span>
+ back door <span class="removed"><del><strong>in the application
processor,</strong></del></span> for
+ <span class="removed"><del><strong>Xiaomi's use</a>.</p>
- <p>The article suggests it might be a universal back door, but this
- isn't clear.</p>
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor that the local
+ phone company can use</a>.</p>
</li>
- <li id="M201607284">
- <p>The Dropbox app for Macintosh <a
-
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
- takes control of user interface items after luring the user into
- entering an admin password</a>.</p></em></ins></span>
+ <li><p>Capcom's Street Fighter V update <a
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed
+ a driver that can</strong></del></span> <span
class="inserted"><ins><em>remotely changing “user”
settings</a>.</p>
+
+ <p>The article suggests it might</em></ins></span> be <span
class="removed"><del><strong>used as a backdoor by any application
+ installed on</strong></del></span> a <span
class="removed"><del><strong>Windows
computer</a>.</p></strong></del></span> <span
class="inserted"><ins><em>universal back door, but this
+ isn't clear.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>A</strong></del></span>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
- <span class="inserted"><ins><em><li id="M201604250">
- <p>A</em></ins></span> pregnancy test controller application not
only can <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy</em></ins></span> on many sorts of data in the phone, and in server
accounts,
- it can alter them too</a>.</p>
+ <span class="inserted"><ins><em><li id="M201607284">
+ <p>The</em></ins></span> Dropbox app for Macintosh <a <span
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
+ total</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
+ takes</em></ins></span> control of <span class="removed"><del><strong>the
machine by repeatedly nagging</strong></del></span> <span
class="inserted"><ins><em>user interface items after luring</em></ins></span>
the user
+ <span class="removed"><del><strong>for</strong></del></span> <span
class="inserted"><ins><em>into
+ entering</em></ins></span> an <span
class="removed"><del><strong>admini</strong></del></span> <span
class="inserted"><ins><em>admin</em></ins></span> password</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
- universal</strong></del></span>
+ <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal</strong></del></span> <span
class="inserted"><ins><em>id="M201604250">
+ <p>A pregnancy test controller application not only can <a
+
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data in the phone, and in server accounts,
+ it can alter them too</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201512074">
+ <li id="M201512074">
<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
- Some D-Link routers</a> have a</em></ins></span> back door <span
class="removed"><del><strong>in the application
processor,</strong></del></span> for
- <span class="removed"><del><strong>Xiaomi's use</a>.</p>
-
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door</strong></del></span> <span
class="inserted"><ins><em>changing settings</em></ins></span> in <span
class="removed"><del><strong>the modem processor that the local
- phone company can use</a>.</p>
- </li>
-
- <li><p>Capcom's Street Fighter V update <a
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed
- a driver that can be used as</strong></del></span> a <span
class="removed"><del><strong>backdoor by any application
- installed on</strong></del></span>
- <span class="inserted"><ins><em>dlink of an eye.</p>
+ Some D-Link routers</a> have a</em></ins></span> back door <span
class="inserted"><ins><em>for changing settings</em></ins></span> in <span
class="removed"><del><strong>portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed to listen through their microphones</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span class="inserted"><ins><em>a
+ dlink</em></ins></span> of <span class="removed"><del><strong>this
problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
- router has</em></ins></span> a <span class="removed"><del><strong>Windows
computer</a>.</p></strong></del></span> <span
class="inserted"><ins><em>back door</a>.</p>
+ router has a back door</a>.</p>
<p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
routers have back doors</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Dropbox app for
Macintosh</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft</strong></del></span>
<span class="inserted"><ins><em><li id="M201511244">
- <p>Google has long had</em></ins></span> <a <span
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
- total control of the machine by repeatedly nagging the user
- for</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
- back door to remotely unlock</em></ins></span> an <span
class="removed"><del><strong>admini
password</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Android device</a>, unless its disk
- is encrypted (possible since Android 5.0 Lollipop, but still not
- quite the default).</p></em></ins></span>
+ <p>Google</em></ins></span> has <span
class="removed"><del><strong>already backdoored</strong></del></span> <span
class="inserted"><ins><em>long had <a
+
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+ back door to remotely unlock an Android device</a>,
unless</em></ins></span> its disk <span
class="removed"><del><strong>encryption</a>.</p></li>
+
+ <li><p>Modern</strong></del></span>
+ <span class="inserted"><ins><em>is encrypted (possible since Android 5.0
Lollipop, but still not
+ quite the default).</p>
</li>
- <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal</strong></del></span> <span
class="inserted"><ins><em>id="M201511194">
+ <li id="M201511194">
<p>Caterpillar vehicles come with <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
- a</em></ins></span> back door <span class="removed"><del><strong>in
portable phones <a
-
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
- employed</strong></del></span> to <span
class="removed"><del><strong>listen through their
microphones</a>.</p>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>shutoff the engine</a>
remotely.</p></em></ins></span>
+ a back door to shutoff the engine</a> remotely.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- Microsoft has already backdoored its disk
encryption</a>.</p></li>
-
- <li><p>Modern</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509160">
+ <li id="M201509160">
<p>Modern</em></ins></span> gratis game cr…apps <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
@@ -252,16 +260,12 @@
</li>
<li><p>ARRIS cable modem</strong></del></span> has <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor in</strong></del></span>
- <span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
- remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
+ backdoor in the backdoor</a>.</p>
</li>
<li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>books erased
was
- <cite>1984</cite>, by George Orwell.</p>
-
- <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>criticism by saying it
- would delete books only following orders from</em></ins></span> the <span
class="removed"><del><strong>engine</a>
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+ remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>engine</a>
remotely.</p>
</li>
<li><p>
@@ -269,16 +273,19 @@
intentional local back door for 4 years</a>.
</p></li>
-<li><p>Users reported</strong></del></span>
- <span class="inserted"><ins><em>state. However,</em></ins></span> that
<span class="removed"><del><strong><a
+<li><p>Users reported that <a
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+ Microsoft</strong></del></span> <span class="inserted"><ins><em>books
erased</em></ins></span> was <span class="removed"><del><strong>forcing
them</strong></del></span>
+ <span class="inserted"><ins><em><cite>1984</cite>, by George
Orwell.</p>
+
+ <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7 and 8 with all-spying
Windows 10</a>.</p>
<p>Microsoft was in fact <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7 and 8</a>, switching on a
flag
- that said whether to “upgrade” to Windows 10 when users
+ attacking computers that run Windows 7 and 8</a>, switching on a
flag</strong></del></span> <span class="inserted"><ins><em>criticism by saying
it
+ would delete books only following orders from the
+ state. However,</em></ins></span> that <span
class="removed"><del><strong>said whether to “upgrade” to Windows
10 when users
had turned</strong></del></span> <span class="inserted"><ins><em>policy
didn't last. In 2012</em></ins></span> it <span
class="removed"><del><strong>off.</p>
<p>Later on, Microsoft published instructions
on</strong></del></span> <a
@@ -287,135 +294,136 @@
<p>This seems to involve use of</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
- wiped</em></ins></span> a <span class="removed"><del><strong>back door in
Windows 7</strong></del></span> <span class="inserted"><ins><em>user's
Kindle-Swindle</em></ins></span> and <span
class="removed"><del><strong>8.</p>
+ wiped</em></ins></span> a <span class="inserted"><ins><em>user's
Kindle-Swindle and deleted her account</a>, then
+ offered her kafkaesque “explanations.”</p>
+
+ <p>Do other ebook readers have</em></ins></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
+ don't know,</em></ins></span> and <span
class="removed"><del><strong>8.</p>
</li>
<li>
-<p>Most mobile phones have a universal back door, which has been used to
-<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+<p>Most mobile phones</strong></del></span> <span
class="inserted"><ins><em>we</em></ins></span> have <span
class="inserted"><ins><em>no way to find out. There is no reason to
+ assume that they don't.</p>
+ </li>
+
+ <li id="M201011220">
+ <p>The iPhone has</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door, which has been used to</strong></del></span>
<span class="inserted"><ins><em>door for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.
-</p>
-</li>
+</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ remote wipe</a>. It's not always enabled, but users are led into
+ enabling it without understanding.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android has a universal back door</a>. Nearly all
-models of mobile phones</strong></del></span> <span
class="inserted"><ins><em>deleted her account</a>, then
- offered her kafkaesque “explanations.”</p>
+A Chinese version of Android</strong></del></span>
+<span class="inserted"><ins><em></ul>
+
- <p>Do other ebook readers</em></ins></span> have <span
class="removed"><del><strong>a universal</strong></del></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> in <span
class="removed"><del><strong>the modem chip. So
-why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
- don't know, and we have no way</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this one is controlled
+<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
+
+<ul class="blurbs">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
+ back <span class="removed"><del><strong>door</a>. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>door that can
make it cease to function</a>.</p>
+
+ <p>The article is full</em></ins></span> of <span
class="removed"><del><strong>mobile phones</strong></del></span> <span
class="inserted"><ins><em>confusions, errors and biases that
we</em></ins></span> have
+ <span class="inserted"><ins><em>an obligation to expose, given that we are
making</em></ins></span> a <span class="removed"><del><strong>universal back
door</strong></del></span> <span class="inserted"><ins><em>link to
them.</p>
+
+ <ul>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing</em></ins></span> in <span
class="inserted"><ins><em>its products. What it does enable</em></ins></span>
the <span class="removed"><del><strong>modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
+ to <span class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span>
is <span class="removed"><del><strong>controlled
by Coolpad.
</p>
</li>
<li>
-<p>Microsoft Windows has a universal back door through which
+<p>Microsoft Windows has</strong></del></span> <span
class="inserted"><ins><em>sue other companies if they do some particular thing
in
+ their products.</li>
+
+ <li>A company's policies about when to attack users
through</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back
+ door <span class="removed"><del><strong>through which
<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on the users</a>.
+any change whatsoever can be imposed on</strong></del></span> <span
class="inserted"><ins><em>are beside</em></ins></span> the <span
class="removed"><del><strong>users</a>.
</p>
<p>More information on when
<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
this was used</a>.
</p>
-<p>In Windows 10, the universal back door</strong></del></span> <span
class="inserted"><ins><em>find out. There</em></ins></span> is no <span
class="removed"><del><strong>longer hidden; all
+<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span
class="removed"><del><strong>universal</strong></del></span> back door is <span
class="removed"><del><strong>no longer hidden; all
“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
-and immediately imposed</a>.
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>wrong in the
+ first place,</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
</p>
</li>
<li><p>German government <a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
-away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span
class="inserted"><ins><em>reason</em></ins></span> to <span
class="removed"><del><strong>potential back
-door capabilities of the TPM 2.0 chip</a>.</p>
+away from Windows 8 computers with TPM 2.0 due to potential back
+door capabilities of</strong></del></span> <span
class="inserted"><ins><em>using</em></ins></span> the <span
class="removed"><del><strong>TPM 2.0 chip</a>.</p>
</li>
<li>
-<p>The iPhone has a back door
-<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
- <span class="inserted"><ins><em>assume</em></ins></span> that <span
class="removed"><del><strong>allows Apple to remotely delete apps</a>
which Apple considers
-“inappropriate”. Jobs said it's ok for Apple to have this power
-because of course we can trust Apple.
-</p></strong></del></span> <span class="inserted"><ins><em>they
don't.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201011220"></em></ins></span>
- <p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
- remote wipe</a>. It's not always enabled, but users are led into
- enabling it without <span class="removed"><del><strong>understanding.
-</p></strong></del></span> <span
class="inserted"><ins><em>understanding.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
- <p>Apple can, and regularly does,</strong></del></span>
-<span class="inserted"><ins><em></ul>
-
-
-<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
-
-<ul class="blurbs">
- <li id="M201811100">
- <p>Corel Paintshop Pro has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.
- </p>
- <p>This may have improved</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
- back door that can make it cease to function</a>.</p>
-
- <p>The article is full of confusions, errors and biases that we have
- an obligation to expose, given that we are making a link to them.</p>
-
- <ul>
- <li>Getting a patent does not “enable” a company to do
- any particular thing in its products. What it does enable the company
- to do is sue other companies if they do some particular thing in
- their products.</li>
-
- <li>A company's policies about when to attack users through a back
- door are beside the point. Inserting the back door is wrong in the
- first place, and using the back door is always wrong too. No software
- developer should have that power over users.</li>
+<p>The iPhone has a</strong></del></span> back door
+<span class="removed"><del><strong><a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
<span class="inserted"><ins><em>is always wrong too. No software
+ developer should have</em></ins></span> that <span
class="removed"><del><strong>allows Apple</strong></del></span> <span
class="inserted"><ins><em>power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word to refer to sharing copies is a smear;
+ attacking ships. Using that word</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
+“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span
class="inserted"><ins><em>refer</em></ins></span> to <span
class="removed"><del><strong>have this power
+because</strong></del></span> <span class="inserted"><ins><em>sharing copies
is a smear;
please don't smear sharing.</li>
- <li><p>The idea of “protecting our IP” is
- total confusion. The term “IP” itself is a <a
- href="/philosophy/not-ipr.html">bogus generalization about things
+ <li><p>The idea</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
+</p>
+</li>
+
+<li>
+<p>The iPhone has</strong></del></span> <span
class="inserted"><ins><em>“protecting our IP” is
+ total confusion. The term “IP” itself is</em></ins></span> a
<span class="removed"><del><strong>back door for</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>.</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/not-ipr.html">bogus
generalization about things
that have nothing in common</a>.</p>
<p>In addition, to speak of “protecting” that bogus
- generalization is a separate absurdity. It's like calling the cops
- because neighbors' kids are playing on your front yard, and saying
+ generalization is a separate absurdity.</em></ins></span> It's <span
class="removed"><del><strong>not always enabled, but
users</strong></del></span> <span class="inserted"><ins><em>like calling the
cops
+ because neighbors' kids</em></ins></span> are <span
class="removed"><del><strong>led into enabling</strong></del></span> <span
class="inserted"><ins><em>playing on your front yard, and saying
that you're “protecting the boundary line”. The kids can't do
harm
- to the boundary line, not even</em></ins></span> with <span
class="inserted"><ins><em>a jackhammer, because it is an
- abstraction and can't be affected by physical action.</p></li>
+ to the boundary line, not even with a jackhammer,
because</em></ins></span> it <span class="removed"><del><strong>without
understanding.
+</p>
+</li>
+
+<li>
+ <p>Apple can,</strong></del></span> <span class="inserted"><ins><em>is
an
+ abstraction</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>can't be affected by physical
action.</p></li>
</ul>
</li>
<li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
+ <p>We link to the article</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
+ moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
apps</a>.</p>
@@ -464,34 +472,23 @@
<p>Google</em></ins></span> can also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
forcibly and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which
-seems, since that article, to have been merged into Google
Play).</strong></del></span> <span
class="inserted"><ins><em>GTalkService.</em></ins></span> This is
- not equivalent to a universal back door, but permits various dirty <span
class="removed"><del><strong>tricks.
-</p>
-
-<p>
-Although</strong></del></span>
- <span class="inserted"><ins><em>tricks.</p>
-
- <p>Although</em></ins></span> Google's <em>exercise</em>
of this power has not been
- malicious so far, the point is that nobody should have such power,
- which could also be used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em> programs
that
+seems, since</strong></del></span> <span
class="inserted"><ins><em>GTalkService. This is
+ not equivalent to a universal back door, but permits various dirty
+ tricks.</p>
+
+ <p>Although Google's <em>exercise</em> of this power has
not been
+ malicious so far, the point is</em></ins></span> that <span
class="removed"><del><strong>article,</strong></del></span> <span
class="inserted"><ins><em>nobody should have such power,
+ which could also be used maliciously. You might well
decide</em></ins></span> to
+ <span class="inserted"><ins><em>let a security service remotely
<em>deactivate</em> programs that
it considers malicious. But there is no excuse for allowing it to
- <em>delete</em> the programs, and you should have the right to
decide
- who (if anyone) to trust in this <span class="removed"><del><strong>way.
-</p></strong></del></span> <span
class="inserted"><ins><em>way.</p></em></ins></span>
+ <em>delete</em> the programs, and you should</em></ins></span>
have <span class="removed"><del><strong>been merged</strong></del></span> <span
class="inserted"><ins><em>the right to decide
+ who (if anyone) to trust in this way.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a id="samsung"
-href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
-Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M200808110">
- <p>The iPhone has</em></ins></span> a back
-<span class="removed"><del><strong>door</a></strong></del></span> <span
class="inserted"><ins><em>door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></em></ins></span>
- that <span class="removed"><del><strong>provides remote
access</strong></del></span> <span class="inserted"><ins><em>allows
Apple</em></ins></span> to <span class="inserted"><ins><em>remotely delete
apps</a> which Apple considers
+ <li id="M200808110">
+ <p>The iPhone has a back door <a
+
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+ that allows Apple to remotely delete apps</a> which Apple considers
“inappropriate”. Jobs said it's OK for Apple to have
this power because of course we can trust Apple.</p>
</li>
@@ -504,79 +501,61 @@
<li id="M201812300">
<p>New GM cars <a
href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer</em></ins></span> the <span class="removed"><del><strong>files
stored on</strong></del></span> <span class="inserted"><ins><em>feature of a
universal back door</a>.</p>
+ offer the feature of a universal back door</a>.</p>
- <p>Every nonfree program offers</em></ins></span> the <span
class="removed"><del><strong>device.
-</p></strong></del></span> <span class="inserted"><ins><em>user zero
security against its
+ <p>Every nonfree program offers the user zero security against its
developer. With this malfeature, GM has explicitly made things even
- worse.</p></em></ins></span>
+ worse.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711244"></em></ins></span>
- <p>The <span class="removed"><del><strong>Amazon
Kindle-Swindle</strong></del></span> <span class="inserted"><ins><em>Furby
Connect</em></ins></span> has a <span class="inserted"><ins><em><a
+ <li id="M201711244">
+ <p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal</em></ins></span> back <span class="removed"><del><strong>door
that</strong></del></span> <span class="inserted"><ins><em>door</a>. If
the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
+ universal back door</a>. If the product as shipped doesn't act as a
+ listening device, remote changes to the code could surely convert
it</em></ins></span>
+ into <span class="removed"><del><strong>Google Play).
+This is</strong></del></span> <span class="inserted"><ins><em>one.</p>
</li>
<li id="M201711010">
- <p>Sony</em></ins></span> has <span
class="removed"><del><strong>been</strong></del></span> <span
class="inserted"><ins><em>brought back its robotic pet Aibo, this time <a
+ <p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
with a universal back door, and tethered to a server that requires
a subscription</a>.</p>
</li>
<li id="M201709091">
- <p>Tesla</em></ins></span> used <span
class="inserted"><ins><em>software</em></ins></span> to
-<span class="removed"><del><strong><a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
-remotely erase books</a>. One</strong></del></span> <span
class="inserted"><ins><em>limit the part</em></ins></span> of the <span
class="removed"><del><strong>books erased</strong></del></span> <span
class="inserted"><ins><em>battery
- that</em></ins></span> was <span class="removed"><del><strong>1984, by
George Orwell.
-</p>
-
-<p>Amazon responded</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>criticism by saying it</strong></del></span> <span
class="inserted"><ins><em>customers in some cars, and <a
+ <p>Tesla used software to limit the part of the battery
+ that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
a universal back door in the software</a> to temporarily increase
this limit.</p>
<p>While remotely allowing car “owners” to use the
- whole battery capacity did not do them any harm, the same back
- door</em></ins></span> would <span class="removed"><del><strong>delete
books only
-following orders from</strong></del></span> <span
class="inserted"><ins><em>permit Tesla (perhaps under</em></ins></span> the
<span class="removed"><del><strong>state. However, that policy didn't last.
-In 2012
-it</strong></del></span> <span class="inserted"><ins><em>command of some
- government) to remotely order the car to use none of its battery. Or
+ whole battery capacity did</em></ins></span> not <span
class="removed"><del><strong>equivalent</strong></del></span> <span
class="inserted"><ins><em>do them any harm, the same back
+ door would permit Tesla (perhaps under the command of some
+ government) to remotely order the car</em></ins></span> to <span
class="inserted"><ins><em>use none of its battery. Or
perhaps to drive its passenger to a torture prison.</p>
</li>
<li id="M201702061">
- <p>Vizio “smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
- have</em></ins></span> a <span class="removed"><del><strong>user's
Kindle-Swindle and deleted her account</a>, then offered her
-kafkaesque “explanations.”</p>
-
-
-<p>The Kindle-Swindle also has</strong></del></span> <span
class="inserted"><ins><em>universal back door</a>.</p>
+ <p>Vizio “smart” TVs <a
+
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
+ have a universal back door</a>.</p>
</li>
<li id="M201609130">
<p>Xiaomi phones come with <a
-
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"></em></ins></span>
- a <span class="inserted"><ins><em>universal back door in the application
processor, for Xiaomi's
+
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
+ a universal back door in the application processor, for Xiaomi's
use</a>.</p>
- <p>This is separate from</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090"></strong></del></span>
<span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the</em></ins></span>
- universal back <span class="removed"><del><strong>door</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>door in the
modem processor that the local phone
- company can use</a>.</p></em></ins></span>
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor that the local phone
+ company can use</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>HP “storage appliances”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201608172">
+ <li id="M201608172">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -584,9 +563,8 @@
<p>This was <a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- reported in 2007</a> for XP and Vista, and it seems</em></ins></span>
- that <span class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>Microsoft used</em></ins></span> the <span
class="removed"><del><strong>proprietary
-“Left Hand” operating system</strong></del></span> <span
class="inserted"><ins><em>same method to push the <a
+ reported in 2007</a> for XP and Vista, and it seems
+ that Microsoft used the same method to push the <a
href="/proprietary/malware-microsoft.html#windows10-forcing">
Windows 10 downgrade</a> to computers running Windows 7 and
8.</p>
@@ -597,52 +575,90 @@
</li>
<li id="M201606060">
- <p>The Amazon Echo appears to</em></ins></span> have <span
class="inserted"><ins><em>a universal</em></ins></span> back <span
class="removed"><del><strong>doors that give
-HP</strong></del></span> <span class="inserted"><ins><em>door,
since</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
+ <p>The Amazon Echo appears to have a universal back door, since <a
+ href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
it installs “updates” automatically</a>.</p>
<p>We have found nothing explicitly documenting the lack of any way
- to disable</em></ins></span> remote <span
class="removed"><del><strong>login access</a></strong></del></span> <span
class="inserted"><ins><em>changes</em></ins></span> to <span
class="removed"><del><strong>them. HP claims that this
does</strong></del></span> <span class="inserted"><ins><em>the software, so we
are</em></ins></span> not <span class="removed"><del><strong>give HP
-access</strong></del></span> <span class="inserted"><ins><em>completely
+ to disable remote changes to the software, so we are not completely
sure there isn't one, but this seems pretty clear.</p>
</li>
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>. Nearly
- all models of mobile phones have a <a href="#universal-back-door">
- universal back door in the modem chip</a>. So why did Coolpad
bother</em></ins></span>
- to <span class="inserted"><ins><em>introduce another? Because this one is
controlled by Coolpad.</p>
+ A Chinese version of Android has</em></ins></span> a universal back <span
class="removed"><del><strong>door, but permits various
+dirty tricks.
+</p>
+
+<p>
+Although Google's <em>exercise</em></strong></del></span> <span
class="inserted"><ins><em>door</a>. Nearly
+ all models</em></ins></span> of <span class="removed"><del><strong>this
power has not been
+malicious so far, the point is that nobody should</strong></del></span> <span
class="inserted"><ins><em>mobile phones</em></ins></span> have <span
class="removed"><del><strong>such power,
+which could also be used maliciously. You might well decide to
let</strong></del></span> a
+<span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs that it
+considers malicious. But there is no excuse for allowing it
+to <em>delete</em> the programs, and you should
have</strong></del></span> <span class="inserted"><ins><em><a
href="#universal-back-door">
+ universal back door in</em></ins></span> the <span
class="removed"><del><strong>right to
+decide who (if anyone)</strong></del></span> <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad
bother</em></ins></span>
+ to <span class="removed"><del><strong>trust in</strong></del></span> <span
class="inserted"><ins><em>introduce another? Because</em></ins></span> this
<span class="removed"><del><strong>way.
+</p></strong></del></span> <span class="inserted"><ins><em>one is
controlled by Coolpad.</p></em></ins></span>
</li>
- <li id="M201311300">
- <p><a
-
href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
- Some applications come with MyFreeProxy, which is a universal back
- door</a> that can download programs and run them.</p>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201311300"></em></ins></span>
+ <p><a <span class="removed"><del><strong>id="samsung"
+href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
+Samsung Galaxy devices running proprietary Android
versions</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techienews.co.uk/973462/bitcoin-miners-bundled-pups-legitimate-applications-backed-eula/">
+ Some applications</em></ins></span> come with <span
class="inserted"><ins><em>MyFreeProxy, which is</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back
+ door</a> that <span class="removed"><del><strong>provides remote
access to the files stored on the device.
+</p></strong></del></span> <span class="inserted"><ins><em>can download
programs and run them.</p></em></ins></span>
</li>
- <li id="M201202280">
- <p>ChromeOS has a universal back
- door. At least, Google says it does—in <a
- href="https://www.google.com/intl/en/chromebook/termsofservice.html">
- section 4 of</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>EULA</a>.</p>
+<span class="removed"><del><strong><li>
+<p>The Amazon Kindle-Swindle</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201202280">
+ <p>ChromeOS</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door that has been used to</strong></del></span>
+ <span class="inserted"><ins><em>door. At least, Google says it
does—in</em></ins></span> <a <span
class="removed"><del><strong>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+remotely erase books</a>. One</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.google.com/intl/en/chromebook/termsofservice.html">
+ section 4</em></ins></span> of the <span
class="removed"><del><strong>books erased was 1984, by George Orwell.
+</p>
+
+<p>Amazon responded</strong></del></span> <span
class="inserted"><ins><em>EULA</a>.</p>
</li>
<li id="M200700001">
- <p>In addition to its <a href="#swindle-eraser">book
- eraser</a>,</em></ins></span> the <span
class="inserted"><ins><em>Kindle-Swindle has a <a
+ <p>In addition</em></ins></span> to <span
class="removed"><del><strong>criticism by saying it would delete books only
+following orders from the state. However, that policy didn't last.
+In 2012
+it</strong></del></span> <span class="inserted"><ins><em>its</em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">wiped
+a user's Kindle-Swindle and deleted her account</a>, then offered her
+kafkaesque “explanations.”</p>
+
+
+<p>The</strong></del></span> <span
class="inserted"><ins><em>href="#swindle-eraser">book
+ eraser</a>, the</em></ins></span> Kindle-Swindle <span
class="removed"><del><strong>also</strong></del></span> has a <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
- universal back door</a>.</p>
+ universal back <span class="removed"><del><strong>door</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
</li>
- <li id="M200612050">
+<span class="removed"><del><strong><li>
+<p>HP “storage appliances” that use the proprietary
+“Left Hand” operating system have</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200612050">
<p>Almost every phone's communication
- processor has a universal back door which is <a
-
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
- often used to make a phone transmit all conversations it hears</a>.
See
+ processor has a universal</em></ins></span> back <span
class="removed"><del><strong>doors that give
+HP</strong></del></span> <span class="inserted"><ins><em>door which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a> to them. HP claims that this does not give HP
+access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">
+ often used</em></ins></span> to <span class="removed"><del><strong>the
customer's data, but if the</strong></del></span> <span
class="inserted"><ins><em>make a phone transmit all conversations it
hears</a>. See
<a
href="/proprietary/malware-mobiles.html#universal-back-door">Malware
in Mobile Devices</a> for more info.</p>
</li>
@@ -815,7 +831,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary-back-doors.it.po 1 Jan 2019 20:00:36 -0000 1.110
+++ proprietary-back-doors.it.po 5 Jan 2019 08:59:19 -0000 1.111
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -52,6 +52,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary-back-doors.ja-diff.html 1 Jan 2019 20:00:36 -0000 1.40
+++ proprietary-back-doors.ja-diff.html 5 Jan 2019 08:59:19 -0000 1.41
@@ -32,6 +32,10 @@
basic injustice</a>. The developers often exercise that power to the
detriment of the users they ought to serve.</p>
+<span class="inserted"><ins><em><p>We say a program has a “back
door“ when someone who is
+not supposed to be in control of the computer where it is installed
+can send it commands via some other channel.</p></em></ins></span>
+
<p>Here are examples of demonstrated back doors in proprietary <span
class="removed"><del><strong>software.</p>
<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>software.
@@ -39,18 +43,23 @@
<ul>
<li>
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
- universal back door</strong></del></span> <span
class="inserted"><ins><em>what they are known to allow. Back doors
-that allow full control over the operating system are said to be
+ universal back door in the application processor, for
+ Xiaomi's use</a>.</p>
+
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in</strong></del></span> <span
class="inserted"><ins><em>what they are known to allow. Back doors
+that allow full control over</em></ins></span> the <span
class="removed"><del><strong>modem processor</strong></del></span> <span
class="inserted"><ins><em>operating system are said to be
“universal”.</p>
<div class="important">
-<p>If you know of an example that ought to be</em></ins></span> in <span
class="inserted"><ins><em>this page but isn't
+<p>If you know of an example</em></ins></span> that <span
class="inserted"><ins><em>ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>application processor, for
- Xiaomi's use</a>.</p>
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>local
+ phone company can use</a>.</p>
+ </li>
- <p>This is separate from</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or two
+ <li><p>Capcom's Street Fighter V update</strong></del></span>
<span class="inserted"><ins><em>URL of a trustworthy reference or two
to serve as specific substantiation.</p>
</div>
</div>
@@ -70,43 +79,53 @@
<li id="M201706202">
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login
- accounts with hard-coded passwords, which can't be changed,
and</em></ins></span> <a <span
class="removed"><del><strong>href="#universal-back-door-phone-modem">the
- universal</strong></del></span>
+ accounts with hard-coded passwords, which can't be changed,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
there is no way to delete these accounts either</a>.</p>
<p>Since these accounts with hard-coded passwords are impossible
- to delete, this problem is not merely an insecurity; it amounts to
- a</em></ins></span> back door <span class="removed"><del><strong>in the
modem processor</strong></del></span> that <span
class="removed"><del><strong>the local
- phone company</strong></del></span> can <span
class="removed"><del><strong>use</a>.</p></strong></del></span>
<span class="inserted"><ins><em>be used by the manufacturer (and
- government) to spy on users.</p></em></ins></span>
+ to delete, this problem is not merely an insecurity; it amounts
to</em></ins></span>
+ a <span class="removed"><del><strong>driver</strong></del></span> <span
class="inserted"><ins><em>back door</em></ins></span> that can be used <span
class="removed"><del><strong>as a backdoor</strong></del></span> by <span
class="removed"><del><strong>any application
+ installed</strong></del></span> <span class="inserted"><ins><em>the
manufacturer (and
+ government) to spy</em></ins></span> on <span
class="removed"><del><strong>a Windows
computer</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Capcom's Street
Fighter V update</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Dropbox app for
Macintosh</strong></del></span>
<span class="inserted"><ins><em><li id="M201701130">
- <p>WhatsApp has a feature that</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed</strong></del></span>
+ <p>WhatsApp has a feature that</em></ins></span> <a <span
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
+ total control</strong></del></span>
<span
class="inserted"><ins><em>href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
- has been described as</em></ins></span> a <span
class="removed"><del><strong>driver</strong></del></span> <span
class="inserted"><ins><em>“back door”</a> because it would
+ has been described as a “back door”</a> because it would
enable governments to nullify its encryption.</p>
- <p>The developers say</em></ins></span> that <span
class="removed"><del><strong>can be used</strong></del></span> <span
class="inserted"><ins><em>it wasn't intended</em></ins></span> as a <span
class="removed"><del><strong>backdoor</strong></del></span> <span
class="inserted"><ins><em>back door, and that
- may well be true. But that leaves the crucial question of whether it
- functions as one. Because the program is nonfree, we cannot
check</em></ins></span> by <span class="removed"><del><strong>any application
- installed on</strong></del></span>
- <span class="inserted"><ins><em>studying it.</p>
+ <p>The developers say that it wasn't intended as a back door, and
that
+ may well be true. But that leaves the crucial question</em></ins></span>
of <span class="inserted"><ins><em>whether it
+ functions as one. Because</em></ins></span> the <span
class="removed"><del><strong>machine</strong></del></span> <span
class="inserted"><ins><em>program is nonfree, we cannot check</em></ins></span>
by <span class="removed"><del><strong>repeatedly nagging the user
+ for an admini password</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>studying it.</p></em></ins></span>
+ </li>
+
+ <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal back door in portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed to listen through their microphones</a>.</p>
+ <p>More about</strong></del></span> <span
class="inserted"><ins><em>id="M201512280">
+ <p>Microsoft has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p>
</li>
- <li id="M201512280">
- <p>Microsoft has <a
+ <li><p><a</strong></del></span>
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- backdoored its disk encryption</a>.</p>
+ <span class="removed"><del><strong>Microsoft has
already</strong></del></span>
+ backdoored its disk <span
class="removed"><del><strong>encryption</a>.</p></li>
+
+ <li><p>Modern gratis game cr…apps</strong></del></span>
<span class="inserted"><ins><em>encryption</a>.</p>
</li>
<li id="M201409220">
- <p>Apple can, and regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some</em></ins></span> data <span
class="removed"><del><strong>about their users and their</strong></del></span>
<span class="inserted"><ins><em>from iPhones for the state</a>.</p>
<p>This may have improved with <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
@@ -121,26 +140,22 @@
<ul class="blurbs">
<li id="M201809140">
- <p>Android has</em></ins></span> a <span
class="removed"><del><strong>Windows
computer</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Android has a <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
back door for remotely changing “user”
settings</a>.</p>
<p>The article suggests it might be a universal back door, but this
- isn't clear.</p></em></ins></span>
+ isn't clear.</p>
</li>
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607284">
- <p>The</em></ins></span> Dropbox app for Macintosh <a <span
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
- total</strong></del></span>
- <span
class="inserted"><ins><em>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
- takes</em></ins></span> control of <span class="removed"><del><strong>the
machine by repeatedly nagging</strong></del></span> <span
class="inserted"><ins><em>user interface items after luring</em></ins></span>
the user
- <span class="removed"><del><strong>for</strong></del></span> <span
class="inserted"><ins><em>into
- entering</em></ins></span> an <span
class="removed"><del><strong>admini</strong></del></span> <span
class="inserted"><ins><em>admin</em></ins></span> password</a>.</p>
+ <li id="M201607284">
+ <p>The Dropbox app for Macintosh <a
+
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
+ takes control of user interface items after luring the user into
+ entering an admin password</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal</strong></del></span> <span
class="inserted"><ins><em>id="M201604250">
+ <li id="M201604250">
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
spy on many sorts of data in the phone, and in server accounts,
@@ -150,29 +165,21 @@
<li id="M201512074">
<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
- Some D-Link routers</a> have a</em></ins></span> back door <span
class="inserted"><ins><em>for changing settings</em></ins></span> in <span
class="removed"><del><strong>portable phones <a
-
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
- employed to listen through their microphones</a>.</p>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span class="inserted"><ins><em>a
- dlink</em></ins></span> of <span class="removed"><del><strong>this
problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an eye.</p>
+ Some D-Link routers</a> have a back door for changing settings in a
+ dlink of an eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
router has a back door</a>.</p>
<p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
- routers have back doors</a>.</p></em></ins></span>
+ routers have back doors</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- Microsoft</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511244">
- <p>Google</em></ins></span> has <span
class="removed"><del><strong>already backdoored</strong></del></span> <span
class="inserted"><ins><em>long had <a
+ <li id="M201511244">
+ <p>Google has long had <a
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
- back door to remotely unlock an Android device</a>,
unless</em></ins></span> its disk <span
class="removed"><del><strong>encryption</a>.</p></li>
-
- <li><p>Modern</strong></del></span>
- <span class="inserted"><ins><em>is encrypted (possible since Android 5.0
Lollipop, but still not
+ back door to remotely unlock an Android device</a>, unless its disk
+ is encrypted (possible since Android 5.0 Lollipop, but still not
quite the default).</p>
</li>
@@ -183,9 +190,9 @@
</li>
<li id="M201509160">
- <p>Modern</em></ins></span> gratis game cr…apps <a
+ <p>Modern gratis game cr…apps <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
+ collect a wide range of data about their users and their</em></ins></span>
users'
friends and associates</a>.</p>
<p>Even nastier, they do it through ad networks that merge the data
@@ -224,162 +231,95 @@
<p>It is used by 14,000 Android applications.</p>
</li>
-<li><p>ARRIS cable modem</strong></del></span> has <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor in</strong></del></span>
- <span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
- remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
+<li><p>ARRIS cable modem</strong></del></span> has <span
class="removed"><del><strong>a
+ <a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in the backdoor</a>.</p>
</li>
<li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>books erased
was
- <cite>1984</cite>, by George Orwell.</p>
-
- <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>criticism by saying it
- would delete books only following orders from</em></ins></span> the <span
class="removed"><del><strong>engine</a>
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>been
used</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+ remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>engine</a>
remotely.</p>
</li>
<li><p>
-Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local back door for 4 years</a>.
-</p></li>
+Mac OS X had an</strong></del></span> <span class="inserted"><ins><em>books
erased was
+ <cite>1984</cite>, by George Orwell.</p>
-<li><p>Users reported</strong></del></span>
- <span class="inserted"><ins><em>state. However,</em></ins></span> that
<span class="inserted"><ins><em>policy didn't last. In 2012
it</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7</strong></del></span>
+ <p>Amazon responded to criticism by saying it
+ would delete books only following orders from the
+ state. However, that policy didn't last. In 2012 it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
- wiped a user's Kindle-Swindle</em></ins></span> and <span
class="removed"><del><strong>8 with all-spying
- Windows 10</a>.</p>
-
- <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>deleted her account</a>, then
+ wiped a user's Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
- <p>Do other ebook readers have back doors</em></ins></span> in <span
class="removed"><del><strong>fact <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
- don't know,</em></ins></span> and <span
class="removed"><del><strong>8</a>, switching on a flag
- that said whether to “upgrade” to Windows 10 when users
- had turned it off.</p>
-
- <p>Later on, Microsoft published instructions on <a
-
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject the downgrade to Windows 10</a>.</p>
-
- <p>This seems to involve use of a back door in Windows 7 and
8.</p>
-</li>
-
-<li>
-<p>Most mobile phones have a universal back door, which has been used to
-<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p>
-</li>
-
-<li>
-<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android has a universal back door</a>. Nearly all
-models of mobile phones</strong></del></span> <span
class="inserted"><ins><em>we</em></ins></span> have <span
class="removed"><del><strong>a universal back door in the modem chip. So
-why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this one is controlled
-by Coolpad.
-</p>
-</li>
-
-<li>
-<p>Microsoft Windows has a universal back door through which
-<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on the users</a>.
-</p>
-<p>More information on when
-<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
-this was used</a>.
-</p>
-<p>In Windows 10, the universal back door</strong></del></span> <span
class="inserted"><ins><em>find out. There</em></ins></span> is no <span
class="removed"><del><strong>longer hidden; all
-“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
-and immediately imposed</a>.
-</p>
-</li>
-
-<li>
-<p>Windows 8's back doors are so gaping that
-<a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
-the German government has decided it can't be trusted</a>.
-</p>
-</li>
-
-<li>
-<p>The iPhone has a back door
-<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
-that allows Apple</strong></del></span> <span
class="inserted"><ins><em>reason</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
-“inappropriate”. Jobs said it's ok for Apple to have this power
-because of course we can trust Apple.
-</p></strong></del></span>
- <span class="inserted"><ins><em>assume that they
don't.</p></em></ins></span>
+ <p>Do other ebook readers have back doors in their nonfree software?
We
+ don't know, and we have no way to find out. There is no reason to
+ assume that they don't.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+ <li id="M201011220">
+ <p>The iPhone has a</em></ins></span> back door for <span
class="removed"><del><strong>4 years</a>.
+</p></li>
- <span class="inserted"><ins><em><li id="M201011220"></em></ins></span>
- <p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
- remote wipe</a>. It's not always enabled, but users are led into
- enabling it without <span class="removed"><del><strong>understanding.
-</p>
-</li>
+<li><p>Users reported that</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
-<li>
- <p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.
- </p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but
- <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>understanding.</p></em></ins></span>
+ <p>Microsoft was in fact</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ remote wipe</a>. It's not always enabled, but users are led into
+ enabling it without understanding.</p>
</li>
-
-
-<span class="removed"><del><strong><li>
-<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
-Windows 8 also</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
<ul class="blurbs">
<li id="M201811100">
- <p>Corel Paintshop Pro</em></ins></span> has a <span
class="inserted"><ins><em><a
-
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
- back door <span class="removed"><del><strong>for remotely deleting
apps</a>.
-</p>
+ <p>Corel Paintshop Pro has a</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door</em></ins></span> that <span class="removed"><del><strong>run
Windows 7</strong></del></span> <span class="inserted"><ins><em>can make it
cease to function</a>.</p>
-<p>
-You might well decide to let a security service that you trust
-remotely <em>deactivate</em> programs</strong></del></span> that
<span class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>can make it cease to function</a>.</p>
+ <p>The article is full of confusions, errors</em></ins></span> and
<span class="removed"><del><strong>8</a>, switching on a
flag</strong></del></span> <span
class="inserted"><ins><em>biases</em></ins></span> that <span
class="removed"><del><strong>said whether</strong></del></span> <span
class="inserted"><ins><em>we have
+ an obligation</em></ins></span> to <span
class="removed"><del><strong>“upgrade”</strong></del></span> <span
class="inserted"><ins><em>expose, given that we are making a
link</em></ins></span> to <span class="removed"><del><strong>Windows 10 when
users
+ had turned it off.</p>
- <p>The article is full of confusions, errors and biases that we have
- an obligation to expose, given that we are making a link to them.</p>
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how</strong></del></span> <span class="inserted"><ins><em>them.</p>
<ul>
- <li>Getting a patent does not “enable” a company to do
- any particular thing in its products. What it does enable the company
- to do is sue other companies if they do some particular thing in
+ <li>Getting a patent does not “enable” a
company</em></ins></span> to <span class="removed"><del><strong>permanently
reject</strong></del></span> <span class="inserted"><ins><em>do
+ any particular thing in its products. What it does
enable</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
+ to <span class="removed"><del><strong>Windows 10</a>.</p>
+
+ <p>This seems</strong></del></span> <span
class="inserted"><ins><em>do is sue other companies if they do some particular
thing in
their products.</li>
- <li>A company's policies about when to attack users through a back
- door are beside the point. Inserting the back door is wrong in the
- first place, and using the back door is always wrong too. No software
+ <li>A company's policies about when</em></ins></span> to <span
class="removed"><del><strong>involve use of</strong></del></span> <span
class="inserted"><ins><em>attack users through</em></ins></span> a back
+ door <span class="inserted"><ins><em>are beside the point. Inserting the
back door is wrong</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>the
+ first place,</em></ins></span> and <span
class="removed"><del><strong>8.</p>
+</li>
+
+<li>
+<p>Most mobile phones have a universal</strong></del></span> <span
class="inserted"><ins><em>using the</em></ins></span> back <span
class="removed"><del><strong>door, which has been used</strong></del></span>
<span class="inserted"><ins><em>door is always wrong too. No software
developer should have that power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word to refer to sharing copies is a smear;
+ attacking ships. Using that word</em></ins></span> to <span
class="inserted"><ins><em>refer to sharing copies is a smear;
please don't smear sharing.</li>
<li><p>The idea of “protecting our IP” is
- total confusion. The term “IP” itself is a <a
- href="/philosophy/not-ipr.html">bogus generalization about things
+ total confusion. The term “IP” itself is a</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
+</p></strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/not-ipr.html">bogus
generalization about things
that have nothing in common</a>.</p>
<p>In addition, to speak of “protecting” that bogus
@@ -388,23 +328,28 @@
that you're “protecting the boundary line”. The kids can't do
harm
to the boundary line, not even with a jackhammer, because it is an
abstraction and can't be affected by physical action.</p></li>
- </ul>
+ </ul></em></ins></span>
</li>
- <li id="M201804010">
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A Chinese version</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
+ moral weakness</em></ins></span> of <span
class="inserted"><ins><em>surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
+ <p>Baidu's proprietary</em></ins></span> Android <span
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door</a>. Nearly all
+models of mobile phones have</strong></del></span> <span
class="inserted"><ins><em>door that <a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files” as well as forcibly install
apps</a>.</p>
@@ -414,63 +359,76 @@
<li id="M201112080">
<p> In addition to its <a href="#windows-update">universal back
- door</a>, Windows 8 has a back door for <a
+ door</a>, Windows 8 has</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>for <a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
- <p>You might well decide to let a security service that you trust
- remotely <em>deactivate</em> programs that
it</em></ins></span> considers malicious.
- But there is no excuse for <em>deleting</em> the programs, and
you
- should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.
-</p>
-
-<p>
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p></strong></del></span>
- <span class="inserted"><ins><em>way.</p></em></ins></span>
+ <p>You might well decide</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>let a security
service that you trust
+ remotely <em>deactivate</em> programs that it considers
malicious.
+ But there</em></ins></span> is <span
class="removed"><del><strong>controlled
+by Coolpad.
+</p></strong></del></span> <span class="inserted"><ins><em>no excuse for
<em>deleting</em> the programs, and you
+ should have the right to decide whom (if anyone) to trust in this
+ way.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<span class="removed"><del><strong><li>
+<p>Microsoft Windows</strong></del></span>
- <span class="inserted"><ins><em><li id="M201103070"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201103070">
<p>In Android, <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> in a
- program called <span class="removed"><del><strong>GTalkService).
-</p>
+ Google</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>to remotely delete apps</a>. (It was in a
+ program called GTalkService,</em></ins></span> which
+<span class="removed"><del><strong><a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever</strong></del></span> <span
class="inserted"><ins><em>seems since then to have been
+ merged into Google Play.)</p>
-<p></strong></del></span> <span class="inserted"><ins><em>GTalkService,
which seems since then to have been
- merged into</em></ins></span> Google <span
class="inserted"><ins><em>Play.)</p>
-
- <p>Google</em></ins></span> can also <a
-
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which
-seems, since that article, to have been merged into Google
Play).</strong></del></span> <span
class="inserted"><ins><em>GTalkService.</em></ins></span> This is
- not equivalent to a universal back door, but permits various dirty <span
class="removed"><del><strong>tricks.
+ <p>Google</em></ins></span> can <span
class="removed"><del><strong>be imposed on the users</a>.
</p>
+<p>More information on when</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+this was used</a>.
+</p>
+<p>In Windows 10, the</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through GTalkService. This is
+ not equivalent to a</em></ins></span> universal back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
+ tricks.</p>
+
+ <p>Although Google's <em>exercise</em> of this power has
not been
+ malicious so far, the point</em></ins></span> is <span
class="removed"><del><strong>no longer hidden; all
+“upgrades” will</strong></del></span> <span
class="inserted"><ins><em>that nobody should have such power,
+ which could also</em></ins></span> be <span
class="removed"><del><strong><a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
+and immediately imposed</a>.
+</p>
+</li>
-<p>
-Although</strong></del></span>
- <span class="inserted"><ins><em>tricks.</p>
-
- <p>Although</em></ins></span> Google's <em>exercise</em>
of this power has not been
- malicious so far, the point is that nobody should have such power,
- which could also be <span class="removed"><del><strong>used maliciously.
You might well decide</strong></del></span> <span
class="inserted"><ins><em>used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for allowing it to
+<li>
+<p>Windows 8's back doors are so gaping</strong></del></span> <span
class="inserted"><ins><em>used maliciously. You might well decide to
+ let a security service remotely <em>deactivate</em>
programs</em></ins></span> that
+<span class="removed"><del><strong><a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
+the German government has decided</strong></del></span>
+ it <span class="removed"><del><strong>can't be trusted</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>considers
malicious. But there is no excuse for allowing it to
<em>delete</em> the programs, and you should have the right to
decide
- who (if anyone) to trust in this way.</p>
+ who (if anyone) to trust in this way.</p></em></ins></span>
</li>
- <li id="M200808110">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
<p>The iPhone has a back door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have
- this power because of course we can trust Apple.</p>
+ “inappropriate”. Jobs said it's <span
class="removed"><del><strong>ok</strong></del></span> <span
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
+ this power because of course we can trust <span
class="removed"><del><strong>Apple.
+</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li>
+<p>The iPhone has</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id='universal'>Full control</h3>
@@ -479,74 +437,125 @@
<li id="M201812300">
<p>New GM cars <a
href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
+ offer the feature of</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door for
+<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
enabling
+it without understanding.
+</p>
+</li>
+
+<li>
+ <p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>door</a>.</p>
- <p>Every nonfree program offers the user zero security against its
+ <p>Every nonfree program offers</em></ins></span> the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8</strong></del></span> <span class="inserted"><ins><em>user
zero</em></ins></span> security <span
class="removed"><del><strong>improvements</a>; but</strong></del></span>
<span class="inserted"><ins><em>against its
developer. With this malfeature, GM has explicitly made things even
worse.</p>
</li>
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
listening device, remote changes to the code could surely convert it
- into one.</p>
+ into one.</p></em></ins></span>
</li>
- <li id="M201711010">
- <p>Sony has brought back its robotic pet Aibo, this time <a
+
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+Windows 8 also</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711010">
+ <p>Sony</em></ins></span> has <span
class="inserted"><ins><em>brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with a universal back door, and tethered to a server that requires
+ with</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door for remotely deleting apps</a>.
+</p>
+
+<p>
+You might well decide</strong></del></span> <span
class="inserted"><ins><em>door, and tethered</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> a <span
class="removed"><del><strong>security service that you trust
+remotely <em>deactivate</em> programs</strong></del></span> <span
class="inserted"><ins><em>server</em></ins></span> that <span
class="removed"><del><strong>it considers malicious.
+But there is no excuse for <em>deleting</em></strong></del></span>
<span class="inserted"><ins><em>requires
a subscription</a>.</p>
</li>
<li id="M201709091">
- <p>Tesla used software to limit the part of the battery
- that was available to customers in some cars, and <a
+ <p>Tesla used software to limit</em></ins></span> the <span
class="removed"><del><strong>programs, and you
+should have</strong></del></span> <span class="inserted"><ins><em>part
of</em></ins></span> the <span class="removed"><del><strong>right to decide who
(if anyone)</strong></del></span> <span class="inserted"><ins><em>battery
+ that was available</em></ins></span> to <span
class="removed"><del><strong>trust</strong></del></span> <span
class="inserted"><ins><em>customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
- a universal back door in the software</a> to temporarily increase
- this limit.</p>
+ a universal back door</em></ins></span> in <span
class="inserted"><ins><em>the software</a> to temporarily
increase</em></ins></span>
+ this <span class="removed"><del><strong>way.
+</p>
+
+<p>
+As these pages show, if you do want</strong></del></span> <span
class="inserted"><ins><em>limit.</p>
- <p>While remotely allowing car “owners” to use the
+ <p>While remotely allowing car
“owners”</em></ins></span> to <span
class="removed"><del><strong>clean your computer</strong></del></span> <span
class="inserted"><ins><em>use the
whole battery capacity did not do them any harm, the same back
- door would permit Tesla (perhaps under the command of some
- government) to remotely order the car to use none of its battery. Or
- perhaps to drive its passenger to a torture prison.</p>
+ door would permit Tesla (perhaps under the command</em></ins></span> of
<span class="removed"><del><strong>malware,</strong></del></span> <span
class="inserted"><ins><em>some
+ government) to remotely order</em></ins></span> the <span
class="removed"><del><strong>first software</strong></del></span> <span
class="inserted"><ins><em>car</em></ins></span> to <span
class="removed"><del><strong>delete is Windows or iOS.
+</p></strong></del></span> <span class="inserted"><ins><em>use none of
its battery. Or
+ perhaps to drive its passenger to a torture
prison.</p></em></ins></span>
</li>
- <li id="M201702061">
- <p>Vizio “smart” TVs <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
+<span class="removed"><del><strong><li>
+<p>In Android,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702061">
+ <p>Vizio “smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+Google has</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
have a universal back door</a>.</p>
</li>
<li id="M201609130">
<p>Xiaomi phones come with <a
-
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
- a universal back door in the application processor, for Xiaomi's
+
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered"></em></ins></span>
+ a <span class="inserted"><ins><em>universal</em></ins></span> back door
<span class="removed"><del><strong>to remotely delete apps.</a>
(It</strong></del></span> <span class="inserted"><ins><em>in the application
processor, for Xiaomi's
use</a>.</p>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor that the local phone
+ <p>This</em></ins></span> is <span
class="inserted"><ins><em>separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door</em></ins></span> in <span
class="inserted"><ins><em>the modem processor that the local phone
company can use</a>.</p>
</li>
<li id="M201608172">
<p id="windows-update">Microsoft
- Windows has a universal back door through which <a
+ Windows has</em></ins></span> a <span class="removed"><del><strong>program
+called GTalkService).
+</p>
+
+<p>
+Google</strong></del></span> <span class="inserted"><ins><em>universal back
door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
- any change whatsoever can be imposed on the users</a>.</p>
+ any change whatsoever</em></ins></span> can <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>be imposed on the users</a>.</p>
- <p>This was <a
- href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- reported in 2007</a> for XP and Vista, and it seems
- that Microsoft used the same method to push the <a
+ <p>This was</em></ins></span> <a <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+forcibly</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ reported in 2007</a> for XP</em></ins></span> and <span
class="removed"><del><strong>remotely install apps</a> through
GTalkService (which
+seems, since</strong></del></span> <span class="inserted"><ins><em>Vista, and
it seems</em></ins></span>
+ that <span class="removed"><del><strong>article,</strong></del></span>
<span class="inserted"><ins><em>Microsoft used the same
method</em></ins></span> to <span class="removed"><del><strong>have been merged
into Google Play).
+This is not equivalent</strong></del></span> <span
class="inserted"><ins><em>push the <a
href="/proprietary/malware-microsoft.html#windows10-forcing">
- Windows 10 downgrade</a> to computers running Windows 7 and
8.</p>
+ Windows 10 downgrade</a></em></ins></span> to <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>computers running Windows 7 and 8.</p>
+
+ <p>In Windows 10, the</em></ins></span> universal back <span
class="removed"><del><strong>door, but permits various
+dirty tricks.
+</p>
- <p>In Windows 10, the universal back door
- is no longer hidden; all “upgrades” will be <a
+<p>
+Although Google's <em>exercise</em> of this power has not been
+malicious so far, the point</strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span>
+ is <span class="removed"><del><strong>that nobody should have such power,
+which could also</strong></del></span> <span class="inserted"><ins><em>no
longer hidden; all “upgrades” will</em></ins></span> be <span
class="removed"><del><strong>used maliciously. You might well
decide</strong></del></span> <span class="inserted"><ins><em><a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
forcibly and immediately imposed</a>.</p>
</li>
@@ -801,7 +810,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary-back-doors.ja.po 1 Jan 2019 20:00:36 -0000 1.90
+++ proprietary-back-doors.ja.po 5 Jan 2019 08:59:19 -0000 1.91
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -51,6 +51,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary-back-doors.pot 1 Jan 2019 20:00:36 -0000 1.60
+++ proprietary-back-doors.pot 5 Jan 2019 08:59:19 -0000 1.61
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -42,6 +42,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be "
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary-back-doors.ru.po 1 Jan 2019 20:58:56 -0000 1.160
+++ proprietary-back-doors.ru.po 5 Jan 2019 08:59:19 -0000 1.161
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -51,6 +52,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary.de-diff.html 1 Jan 2019 20:00:36 -0000 1.26
+++ proprietary.de-diff.html 5 Jan 2019 08:59:19 -0000 1.27
@@ -139,11 +139,11 @@
<tr>
<td colspan="2">
<ol>
- <li id="f1"><em>Back door:</em> any piece of
software that is
- running on your computer, and listens for commands from someone
- else who can tell it</em></ins></span> to
+ <li id="f1"><em>Back door:</em> any feature of a
program
+ that enables someone who is not supposed</em></ins></span> to
<span class="removed"><del><strong>servers</li>
-<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>do things without asking your approval.</li>
+<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>be in control of the
+ computer where it is installed to send it commands.</li>
<li id="f2"><em>Digital</em></ins></span> restrictions
<span
class="removed"><del><strong>management</a></strong></del></span> <span
class="inserted"><ins><em>management,</em></ins></span> or <span
class="removed"><del><strong>“DRM” means</strong></del></span>
@@ -321,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.de.po 1 Jan 2019 20:00:36 -0000 1.69
+++ proprietary.de.po 5 Jan 2019 08:59:19 -0000 1.70
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -326,9 +326,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary.es.po 3 Jan 2019 10:39:52 -0000 1.72
+++ proprietary.es.po 5 Jan 2019 08:59:19 -0000 1.73
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2019-01-03 11:29+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -232,13 +233,10 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Puerta trasera:</em> cualquier programa en funcionamiento en el "
-"ordenador, que esté a la espera de comandos procedentes de un extraño que "
-"puede ordenarle que haga cosas sin pedirle consentimiento al usuario."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
#. type: Content of: <table><tr><td><ol><li>
msgid ""
@@ -528,6 +526,15 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "<em>Back door:</em> any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Puerta trasera:</em> cualquier programa en funcionamiento en el "
+#~ "ordenador, que esté a la espera de comandos procedentes de un extraño
que "
+#~ "puede ordenarle que haga cosas sin pedirle consentimiento al usuario."
+
+#~ msgid ""
#~ "Some Android apps <a href=\"https://www.androidauthority.com/apps-"
#~ "uninstall-trackers-917539/amp/\"> track the phones of users that have "
#~ "deleted them</a>."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary.fr.po 1 Jan 2019 22:19:49 -0000 1.87
+++ proprietary.fr.po 5 Jan 2019 08:59:19 -0000 1.88
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2019-01-01 23:19+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -229,13 +230,10 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Porte dérobée :</em> Tout programme en fonctionnement sur votre "
-"ordinateur qui est à l'écoute de commandes provenant d'un tiers, ce dernier
"
-"pouvant lui dire de faire des choses sans vous demander la permission."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
#. type: Content of: <table><tr><td><ol><li>
msgid ""
@@ -525,3 +523,13 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "<em>Back door:</em> any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Porte dérobée :</em> Tout programme en fonctionnement sur votre "
+#~ "ordinateur qui est à l'écoute de commandes provenant d'un tiers, ce "
+#~ "dernier pouvant lui dire de faire des choses sans vous demander la "
+#~ "permission."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary.it-diff.html 1 Jan 2019 20:00:36 -0000 1.38
+++ proprietary.it-diff.html 5 Jan 2019 08:59:19 -0000 1.39
@@ -43,14 +43,14 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 40em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
40em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -97,17 +97,17 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
+ <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
@@ -138,11 +138,11 @@
<tr>
<td colspan="2">
<ol>
- <li id="f1"><em>Back door:</em> any piece of
software that is
- running on your computer, and listens for commands from someone
- else who can tell it</em></ins></span> to
+ <li id="f1"><em>Back door:</em> any feature of a
program
+ that enables someone who is not supposed</em></ins></span> to
<span class="removed"><del><strong>servers</li>
-<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>do things without asking your approval.</li>
+<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>be in control of the
+ computer where it is installed to send it commands.</li>
<li id="f2"><em>Digital</em></ins></span> restrictions
<span
class="removed"><del><strong>management</a></strong></del></span> <span
class="inserted"><ins><em>management,</em></ins></span> or <span
class="removed"><del><strong>“DRM” means</strong></del></span>
@@ -320,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary.it.po 1 Jan 2019 20:00:36 -0000 1.78
+++ proprietary.it.po 5 Jan 2019 08:59:19 -0000 1.79
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -331,9 +331,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary.ja-diff.html 1 Jan 2019 20:00:36 -0000 1.39
+++ proprietary.ja-diff.html 5 Jan 2019 08:59:19 -0000 1.40
@@ -136,11 +136,11 @@
<tr>
<td colspan="2">
<ol>
- <li id="f1"><em>Back door:</em> any piece of
software that is
- running on your computer, and listens for commands from someone
- else who can tell it</em></ins></span> to
+ <li id="f1"><em>Back door:</em> any feature of a
program
+ that enables someone who is not supposed</em></ins></span> to
<span class="removed"><del><strong>servers</li>
-<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>do things without asking your approval.</li>
+<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>be in control of the
+ computer where it is installed to send it commands.</li>
<li id="f2"><em>Digital</em></ins></span> restrictions
<span
class="removed"><del><strong>management</a></strong></del></span> <span
class="inserted"><ins><em>management,</em></ins></span> or <span
class="removed"><del><strong>“DRM” means</strong></del></span>
@@ -317,7 +317,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary.ja.po 1 Jan 2019 20:00:36 -0000 1.61
+++ proprietary.ja.po 5 Jan 2019 08:59:19 -0000 1.62
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -272,9 +272,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary.nl-diff.html 1 Jan 2019 20:00:36 -0000 1.38
+++ proprietary.nl-diff.html 5 Jan 2019 08:59:19 -0000 1.39
@@ -43,14 +43,14 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 40em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
40em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -97,18 +97,18 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
<li><a href="/proprietary/potential-malware.html">In the
pipe</a></li></em></ins></span>
@@ -138,11 +138,11 @@
<tr>
<td colspan="2">
<ol>
- <li id="f1"><em>Back door:</em> any piece of
software that is
- running on your computer, and listens for commands from someone
- else who can tell it</em></ins></span> to
+ <li id="f1"><em>Back door:</em> any feature of a
program
+ that enables someone who is not supposed</em></ins></span> to
<span class="removed"><del><strong>servers</li>
-<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>do things without asking your approval.</li>
+<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>be in control of the
+ computer where it is installed to send it commands.</li>
<li id="f2"><em>Digital</em></ins></span> restrictions
<span
class="removed"><del><strong>management</a></strong></del></span> <span
class="inserted"><ins><em>management,</em></ins></span> or <span
class="removed"><del><strong>“DRM” means</strong></del></span>
@@ -320,7 +320,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary.nl.po 1 Jan 2019 20:00:36 -0000 1.50
+++ proprietary.nl.po 5 Jan 2019 08:59:19 -0000 1.51
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -324,9 +324,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary.pl-diff.html 1 Jan 2019 20:00:36 -0000 1.56
+++ proprietary.pl-diff.html 5 Jan 2019 08:59:19 -0000 1.57
@@ -40,8 +40,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -123,9 +123,9 @@
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
+ <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -139,9 +139,9 @@
<tr>
<td colspan="2">
<ol>
- <li id="f1"><em>Back door:</em> any piece of
software that is
- running on your computer, and listens for commands from someone
- else who can tell it to do things without asking your approval.</li>
+ <li id="f1"><em>Back door:</em> any feature of a
program
+ that enables someone who is not supposed to be in control of the
+ computer where it is installed to send it commands.</li>
<li id="f2"><em>Digital</em></ins></span> restrictions
<span
class="removed"><del><strong>management</a></strong></del></span> <span
class="inserted"><ins><em>management,</em></ins></span> or <span
class="removed"><del><strong>“DRM” means</strong></del></span>
@@ -318,7 +318,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary.pl.po 1 Jan 2019 20:00:36 -0000 1.45
+++ proprietary.pl.po 5 Jan 2019 08:59:19 -0000 1.46
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -404,9 +404,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary.pot 1 Jan 2019 20:00:36 -0000 1.42
+++ proprietary.pot 5 Jan 2019 08:59:19 -0000 1.43
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -197,9 +197,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary.pt-br.po 1 Jan 2019 21:59:32 -0000 1.43
+++ proprietary.pt-br.po 5 Jan 2019 08:59:19 -0000 1.44
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2019-01-01 19:44-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -229,13 +230,10 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Back door:</em> qualquer parte do software que está sendo "
-"executado no seu computador, e ouve comandos de alguém que pode dizer para "
-"fazer as coisas sem pedir sua aprovação."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
#. type: Content of: <table><tr><td><ol><li>
msgid ""
@@ -519,6 +517,15 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "<em>Back door:</em> any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Back door:</em> qualquer parte do software que está sendo "
+#~ "executado no seu computador, e ouve comandos de alguém que pode dizer "
+#~ "para fazer as coisas sem pedir sua aprovação."
+
+#~ msgid ""
#~ "Some Android apps <a href=\"https://www.androidauthority.com/apps-"
#~ "uninstall-trackers-917539/amp/\"> track the phones of users that have "
#~ "deleted them</a>."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary.ru.po 1 Jan 2019 20:58:56 -0000 1.114
+++ proprietary.ru.po 5 Jan 2019 08:59:19 -0000 1.115
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2018-12-11 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-01-05 08:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -233,13 +234,10 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Ðазейка:</em> — лÑбой ÑÑаÑÑок
пÑогÑаммÑ, ÑабоÑаÑÑей на ваÑем "
-"компÑÑÑеÑе и ÑлÑÑаÑÑийÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´, пÑиÑ
одÑÑиÑ
Ð¾Ñ ÐºÐ¾Ð³Ð¾-Ñо дÑÑгого, кÑо Ð¼Ð¾Ð¶ÐµÑ "
-"пÑиказÑваÑÑ ÐµÐ¹ делаÑÑ ÑÑо-Ñо без ваÑего
ÑазÑеÑениÑ."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
#. type: Content of: <table><tr><td><ol><li>
msgid ""
@@ -531,6 +529,15 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "<em>Back door:</em> any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Ðазейка:</em> — лÑбой ÑÑаÑÑок
пÑогÑаммÑ, ÑабоÑаÑÑей на "
+#~ "ваÑем компÑÑÑеÑе и ÑлÑÑаÑÑийÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´,
пÑиÑ
одÑÑиÑ
Ð¾Ñ ÐºÐ¾Ð³Ð¾-Ñо дÑÑгого, кÑо "
+#~ "Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиказÑваÑÑ ÐµÐ¹ делаÑÑ ÑÑо-Ñо без
ваÑего ÑазÑеÑениÑ."
+
+#~ msgid ""
#~ "Some Android apps <a href=\"https://www.androidauthority.com/apps-"
#~ "uninstall-trackers-917539/amp/\"> track the phones of users that have "
#~ "deleted them</a>."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary.zh-tw-diff.html 1 Jan 2019 20:00:36 -0000 1.16
+++ proprietary.zh-tw-diff.html 5 Jan 2019 08:59:19 -0000 1.17
@@ -139,11 +139,11 @@
<tr>
<td colspan="2">
<ol>
- <li id="f1"><em>Back door:</em> any piece of
software that is
- running on your computer, and listens for commands from someone
- else who can tell it</em></ins></span> to
+ <li id="f1"><em>Back door:</em> any feature of a
program
+ that enables someone who is not supposed</em></ins></span> to
<span class="removed"><del><strong>servers</li>
-<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>do things without asking your approval.</li>
+<li><a
href="/proprietary/proprietary-drm.html">Digital</strong></del></span> <span
class="inserted"><ins><em>be in control of the
+ computer where it is installed to send it commands.</li>
<li id="f2"><em>Digital</em></ins></span> restrictions
<span
class="removed"><del><strong>management</a></strong></del></span> <span
class="inserted"><ins><em>management,</em></ins></span> or <span
class="removed"><del><strong>“DRM” means</strong></del></span>
@@ -321,7 +321,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/01 20:00:36 $
+$Date: 2019/01/05 08:59:19 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary.zh-tw.po 1 Jan 2019 20:00:36 -0000 1.28
+++ proprietary.zh-tw.po 5 Jan 2019 08:59:19 -0000 1.29
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-01 19:56+0000\n"
+"POT-Creation-Date: 2019-01-05 08:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -263,9 +263,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- pt-br.po 1 Jan 2019 21:59:32 -0000 1.4
+++ pt-br.po 5 Jan 2019 08:59:19 -0000 1.5
@@ -4678,6 +4678,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -5583,13 +5590,10 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Back door:</em> qualquer parte do software que está sendo "
-"executado no seu computador, e ouve comandos de alguém que pode dizer para "
-"fazer as coisas sem pedir sua aprovação."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
#. type: Content of: <table><tr><td><ol><li>
msgid ""
@@ -6507,6 +6511,15 @@
msgstr ""
#~ msgid ""
+#~ "<em>Back door:</em> any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Back door:</em> qualquer parte do software que está sendo "
+#~ "executado no seu computador, e ouve comandos de alguém que pode dizer "
+#~ "para fazer as coisas sem pedir sua aprovação."
+
+#~ msgid ""
#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#~ "Foundation, Inc."
#~ msgstr ""
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- ru.po 1 Jan 2019 21:29:25 -0000 1.7
+++ ru.po 5 Jan 2019 08:59:19 -0000 1.8
@@ -6600,6 +6600,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -7746,13 +7753,10 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
-msgstr ""
-"<em>Ðазейка:</em> — лÑбой ÑÑаÑÑок
пÑогÑаммÑ, ÑабоÑаÑÑей на ваÑем "
-"компÑÑÑеÑе и ÑлÑÑаÑÑийÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´, пÑиÑ
одÑÑиÑ
Ð¾Ñ ÐºÐ¾Ð³Ð¾-Ñо дÑÑгого, кÑо Ð¼Ð¾Ð¶ÐµÑ "
-"пÑиказÑваÑÑ ÐµÐ¹ делаÑÑ ÑÑо-Ñо без ваÑего
ÑазÑеÑениÑ."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
+msgstr ""
#. type: Content of: <table><tr><td><ol><li>
msgid ""
@@ -8868,6 +8872,15 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\"> Ð "
"пÑоÑеÑÑоÑаÑ
Intel бÑдÑÑ Ð²ÑÑÑоеннÑе
неÑвободнÑе пÑогÑаммÑ-ÑиÑанÑ</a>."
+#~ msgid ""
+#~ "<em>Back door:</em> any piece of software that is running on your "
+#~ "computer, and listens for commands from someone else who can tell it to "
+#~ "do things without asking your approval."
+#~ msgstr ""
+#~ "<em>Ðазейка:</em> — лÑбой ÑÑаÑÑок
пÑогÑаммÑ, ÑабоÑаÑÑей на "
+#~ "ваÑем компÑÑÑеÑе и ÑлÑÑаÑÑийÑÑ ÐºÐ¾Ð¼Ð°Ð½Ð´,
пÑиÑ
одÑÑиÑ
Ð¾Ñ ÐºÐ¾Ð³Ð¾-Ñо дÑÑгого, кÑо "
+#~ "Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑиказÑваÑÑ ÐµÐ¹ делаÑÑ ÑÑо-Ñо без
ваÑего ÑазÑеÑениÑ."
+
# type: Content of: <div><p>
#~ msgid "Copyright © 2014-2018 Free Software Foundation, Inc."
#~ msgstr "Copyright © 2014-2018 Free Software Foundation, Inc."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- zh-tw.po 1 Jan 2019 20:00:36 -0000 1.3
+++ zh-tw.po 5 Jan 2019 08:59:20 -0000 1.4
@@ -4575,6 +4575,13 @@
#. type: Content of: <div><p>
msgid ""
+"We say a program has a “back door“ when someone who is not "
+"supposed to be in control of the computer where it is installed can send it "
+"commands via some other channel."
+msgstr ""
+
+#. type: Content of: <div><p>
+msgid ""
"Here are examples of demonstrated back doors in proprietary software. They "
"are sorted out according to what they are known to allow. Back doors that "
"allow full control over the operating system are said to be “"
@@ -5487,9 +5494,9 @@
#. type: Content of: <table><tr><td><ol><li>
msgid ""
-"<em>Back door:</em> any piece of software that is running on your "
-"computer, and listens for commands from someone else who can tell it to do "
-"things without asking your approval."
+"<em>Back door:</em> any feature of a program that enables someone who "
+"is not supposed to be in control of the computer where it is installed to "
+"send it commands."
msgstr ""
#. type: Content of: <table><tr><td><ol><li>
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/01
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/14
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/17
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/19
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/01/28