[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www manual/allgnupkgs.pt-br.html manual/po/allg...
From: |
GNUN |
Subject: |
www manual/allgnupkgs.pt-br.html manual/po/allg... |
Date: |
Sat, 2 Feb 2019 08:31:38 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/02/02 08:31:33
Modified files:
manual : allgnupkgs.pt-br.html
manual/po : allgnupkgs.pt-br.po manual.pt-br.po
manual.translist
philosophy/po : phone-anonymous-payment.pt-br.po
phone-anonymous-payment.translist
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-sabotage.de-diff.html
proprietary-sabotage.de.po
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Added files:
manual : manual.pt-br.html
manual/po : manual.pt-br-en.html
philosophy : phone-anonymous-payment.pt-br.html
philosophy/po : phone-anonymous-payment.pt-br-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.pt-br.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/manual.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/manual.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/manual.translist?cvsroot=www&r1=1.9&r2=1.10
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/manual.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/phone-anonymous-payment.pt-br.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/phone-anonymous-payment.pt-br.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/phone-anonymous-payment.translist?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/phone-anonymous-payment.pt-br-en.html?cvsroot=www&rev=1.1
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.364&r2=1.365
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.266&r2=1.267
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.456&r2=1.457
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.18&r2=1.19
Patches:
Index: manual/allgnupkgs.pt-br.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.pt-br.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- manual/allgnupkgs.pt-br.html 21 Jan 2019 07:59:33 -0000 1.69
+++ manual/allgnupkgs.pt-br.html 2 Feb 2019 13:31:26 -0000 1.70
@@ -1,37 +1,29 @@
+
<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
<p>
-<a href="#Archiving">Archiving</a> -
-<a href="#Audio">Audio</a> -
-<a href="#Business">Business and productivity</a> -
-<a href="#Database">Database</a> -
-<a href="#Dictionaries">Dictionaries</a> -
-<a href="#Translation">Documentation translation</a> -
-<a href="#Editors">Editors</a> -
-<a href="#Education">Education</a> -
-<a href="#Email">Email</a> -
-<a href="#Fonts">Fonts</a> -
-<a href="#gnuorg">GNU organization</a> -
-<a href="#Games">Games</a> -
-<a href="#Graphics">Graphics</a> -
-<a href="#Health">Health</a> -
-<a href="#Interface">Interface</a> -
-<a href="#Internet">Internet applications</a> -
-<a href="#Live">Live communications</a> -
-<a href="#Localization">Localization</a> -
-<a href="#Mathematics">Mathematics</a> -
-<a href="#Music">Music</a> -
-<a href="#Printing">Printing</a> -
-<a href="#Science">Science</a> -
-<a href="#Security">Security</a> -
-<a href="#Software">Software development</a> -
-<a href="#Libraries">Software libraries</a> -
-<a href="#Spreadsheets">Spreadsheets</a> -
-<a href="#Sysadmin">System administration</a> -
-<a href="#Telephony">Telephony</a> -
-<a href="#Text">Text creation and manipulation</a> -
-<a href="#Version">Version control</a> -
-<a href="#Video">Video</a> -
-<a href="#Web">Web authoring</a> -
+<a href="#Archiving">Arquivamento</a> - <a href="#Audio">Ãudio</a> - <a
+href="#Business">Negócios e produtividade</a> - <a
+href="#Database">Banco de dados</a> - <a
+href="#Dictionaries">Dicionários</a> - <a
+href="#Translation">Tradução da documentação</a> - <a
+href="#Editors">Editores</a> - <a href="#Education">Educação</a> - <a
+href="#Email">E-mail</a> - <a href="#Fonts">Fontes</a> - <a
+href="#gnuorg">Organização do GNU</a> - <a href="#Games">Jogos</a>
+- <a href="#Graphics">Gráficos</a> - <a href="#Health">Saúde</a> - <a
+href="#Interface">Interface</a> - <a
+href="#Internet">Aplicativos de Internet</a> - <a
+href="#Live">Comunicações ao vivo</a> - <a
+href="#Localization">Localização</a> - <a href="#Mathematics">Matemática</a>
+- <a href="#Music">Música</a> - <a href="#Printing">Impressão</a> - <a
+href="#Science">Ciência</a> - <a href="#Security">Segurança</a> - <a
+href="#Software">Desenvolvimento de software</a> - <a
+href="#Libraries">Bibliotecas de software</a> - <a
+href="#Spreadsheets">Planilhas</a> - <a
+href="#Sysadmin">Administração de sistema</a> - <a
+href="#Telephony">Telefonia</a> - <a
+href="#Text">Criação e manipulação de texto</a> - <a
+href="#Version">Controle de versão</a> - <a
+href="#Video">VÃdeo</a> - <a href="#Web">Autoria web</a> -
</p>
<table>
@@ -40,1867 +32,1970 @@
<tr>
-<td id="Archiving" colspan="2" style="padding-top:.8em;
padding-left:16%;"><big><b>Archiving</b></big></td></tr>
+<td id="Archiving" colspan="2" style="padding-top:.8em;
padding-left:16%;"><big><b>Arquivamento</b></big></td></tr>
<tr id="cpio"><td>* <a href="/software/cpio/manual/">Cpio</a></td>
- <td>Manage cpio and tar file archives.
- [<a href="/software/cpio/">cpio home</a>]</td></tr>
+ <td>Gerencia pacotes de arquivos cpio e tar. [<a
+href="/software/cpio/">página do cpio</a>]</td></tr>
<tr id="gzip"><td>* <a href="/software/gzip/manual/">Gzip</a></td>
- <td>General file (de)compression (using lzw).
- [<a href="/software/gzip/">gzip home</a>]</td></tr>
+ <td>(De)compressão de arquivos em geral (usando lzw). [<a
+href="/software/gzip/">página do gzip</a>]</td></tr>
<tr id="paxutils"><td>* <a href="/software/paxutils/">Paxutils</a></td>
- <td>Manage cpio, tar, and pax file archives.
- [<a href="/software/paxutils/">paxutils home</a>]</td></tr>
+ <td>Gerencia pacotes de arquivos cpio, tar e pax. [<a
+href="/software/paxutils/">página do paxutils</a>]</td></tr>
<tr id="sharutils"><td>* <a
href="/software/sharutils/manual/">Sharutils</a></td>
- <td>Archives in shell scripts, uuencode/uudecode.
- [<a href="/software/sharutils/">sharutils home</a>]</td></tr>
+ <td>Pacotes em scripts shell, uuencode/uudecode. [<a
+href="/software/sharutils/">página do sharutils</a>]</td></tr>
<tr id="tar"><td>* <a href="/software/tar/manual/">Tar</a></td>
- <td>Managing tar archives.
- [<a href="/software/tar/">tar home</a>]</td></tr>
+ <td>Gerencia pacotes tar. [<a
+href="/software/tar/">página do tar</a>]</td></tr>
<tr id="xorriso"><td>* <a
href="/software/xorriso/man_1_xorriso.html">Xorriso</a></td>
- <td>Create, manipulate, burn ISO-9660 filesystems.
- [<a href="/software/xorriso/">xorriso home</a>]</td></tr>
+ <td>Cria, manipula, grava sistemas de arquivos ISO-9660. [<a
+href="/software/xorriso/">página do xorriso</a>]</td></tr>
<tr>
-<td id="Audio" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/aud/"><big><b>Audio</b></big></a></td></tr>
+<td id="Audio" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/aud/"><big><b>Ãudio</b></big></a></td></tr>
<tr id="ccd2cue"><td>* <a href="/software/ccd2cue/manual/">Ccd2cue</a></td>
- <td>CCD to CUE sheet conversion.
- [<a href="/software/ccd2cue/">ccd2cue home</a>]</td></tr>
+ <td>Conversão de CCD para CUE. [<a
+href="/software/ccd2cue/">página do ccd2cue</a>]</td></tr>
<tr id="emms"><td>* <a
href="https://www.gnu.org/software/emms/manual/">EMMS</a></td>
- <td>Emacs Multimedia System.
- [<a href="/software/emms/">emms home</a>]</td></tr>
+ <td>Sistema de multimÃdia do Emacs. [<a
+href="/software/emms/">página do emms</a>]</td></tr>
-<tr id="gmediaserver"><td>* <a
href="https://www.gnu.org/software/gmediaserver/manual/">Gmediaserver</a></td>
- <td>UPnP compatible media server.
- [<a href="/software/gmediaserver/">gmediaserver home</a>]</td></tr>
+<tr id="gmediaserver"><td>* <a
+href="https://www.gnu.org/software/gmediaserver/manual/">Gmediaserver</a></td>
+ <td>Servidor de mÃdia compatÃvel com UPnP. [<a
+href="/software/gmediaserver/">página do gmediaserver</a>]</td></tr>
<tr id="gnufm"><td>* <a href="/software/gnufm/">GNUfm</a></td>
- <td>Social music explorations.
- [<a href="/software/gnufm/">gnufm home</a>]</td></tr>
+ <td>Explorações de música social. [<a
+href="/software/gnufm/">página do gnufm</a>]</td></tr>
<tr id="gnump3d"><td>* <a
href="/software/gnump3d/documents.html">GNUmp3d</a></td>
- <td>Server for streaming audio files.
- [<a href="/software/gnump3d/">gnump3d home</a>]</td></tr>
+ <td>Servidor para fazer streaming de arquivos de áudio. [<a
+href="/software/gnump3d/">página do gnump3d</a>]</td></tr>
<tr id="gnupod"><td>* <a href="/software/gnupod/gnupod.html">GNUpod</a></td>
- <td>Manage portable audio device.
- [<a href="/software/gnupod/">gnupod home</a>]</td></tr>
+ <td>Gerencia dispositivo de áudio portátil. [<a
+href="/software/gnupod/">página do gnupod</a>]</td></tr>
<tr id="gnuradio"><td>* <a
href="http://gnuradio.org/redmine/projects/gnuradio/wiki">Radio</a></td>
- <td>Software radio implementations.
- [<a href="/software/gnuradio/">gnuradio home</a>]</td></tr>
+ <td>Implementações de rádio por software [<a
+href="/software/gnuradio/">página do gnuradio</a>]</td></tr>
<tr id="gnusound"><td>* <a
href="/software/gnusound/Documentation/">GNUsound</a></td>
- <td>Multi-track sound editor for GNOME.
- [<a href="/software/gnusound/">gnusound home</a>]</td></tr>
+ <td>Editor de som multi-trilhas para o GNOME. [<a
+href="/software/gnusound/">página do gnusound</a>]</td></tr>
<tr id="guile-sdl"><td>* <a
href="/software/guile-sdl/manual/">Guile-SDL</a></td>
- <td>Guile interface for SDL (Simple DirectMedia Layer).
- [<a href="/software/guile-sdl/">guile-sdl home</a>]</td></tr>
+ <td>Interface Guile para SDL (Simple DirectMedia Layer). [<a
+href="/software/guile-sdl/">página do guile-sdl</a>]</td></tr>
<tr id="libcdio"><td>* <a
href="https://www.gnu.org/software/libcdio/libcdio.html">Libcdio</a>
-<small>(<a
href="https://www.gnu.org/software/libcdio/cd-text-format.html">cd-text</a>)</small>
+<small>(<a
+href="https://www.gnu.org/software/libcdio/cd-text-format.html">cd-text</a>)</small>
</td>
- <td>CD Input and Control library.
- [<a href="/software/libcdio/">libcdio home</a>]</td></tr>
+ <td>Biblioteca de controle e entrada de CD. [<a
+href="/software/libcdio/">página do libcdio</a>]</td></tr>
-<tr id="libextractor"><td>* <a
href="https://www.gnu.org/software/libextractor/manual/html_node/">Libextractor</a></td>
- <td>Library to extract meta-data from media files.
- [<a href="/software/libextractor/">libextractor home</a>]</td></tr>
+<tr id="libextractor"><td>* <a
+href="https://www.gnu.org/software/libextractor/manual/html_node/">Libextractor</a></td>
+ <td>Biblioteca para extrair metadados de arquivos de mÃdia. [<a
+href="/software/libextractor/">página do libextractor</a>]</td></tr>
<tr id="speex"><td>* <a href="http://www.speex.org/docs/">Speex</a></td>
- <td>Library for patent-free audio compression format.
- [<a href="/software/speex/">speex home</a>]</td></tr>
+ <td>Biblioteca para formato de compressão de áudio livre de patentes.
[<a
+href="/software/speex/">página do speex</a>]</td></tr>
<tr>
-<td id="Business" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/prod/"><big><b>Business and
productivity</b></big></a></td></tr>
+<td id="Business" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/prod/"><big><b>Negócios e
+produtividade</b></big></a></td></tr>
<tr id="barcode"><td>* <a href="/software/barcode/">Barcode</a></td>
- <td>Convert text strings to printed bars in various standards.
- [<a href="/software/barcode/">barcode home</a>]</td></tr>
+ <td>Converte sequências de texto para barras impressas em vários
padrões. [<a
+href="/software/barcode/">página do barcode</a>]</td></tr>
-<tr id="bpel2owfn"><td>* <a
href="https://www.gnu.org/software/bpel2owfn/manual/2.0.x/bpel2owfn.html">BPEL2oWFN</a></td>
- <td>Translating web service in BPEL to Open Workflow Nets.
- [<a href="/software/bpel2owfn/">bpel2owfn home</a>]</td></tr>
+<tr id="bpel2owfn"><td>* <a
+href="https://www.gnu.org/software/bpel2owfn/manual/2.0.x/bpel2owfn.html">BPEL2oWFN</a></td>
+ <td>Tradução de serviço web em BPEL para Open Workflow Nets. [<a
+href="/software/bpel2owfn/">página do bpel2owfn</a>]</td></tr>
<tr id="foliot"><td>* <a href="/software/foliot/">Foliot</a></td>
- <td>An application for tracking time spent on projects.
- [<a href="/software/foliot/">foliot home</a>]</td></tr>
+ <td>Um aplicativo para rastrear o tempo gasto em projetos. [<a
+href="/software/foliot/">página do foliot</a>]</td></tr>
<tr id="gcal"><td>* <a href="/software/gcal/manual/">Gcal</a></td>
- <td>Calculating and printing a wide variety of calendars.
- [<a href="/software/gcal/">gcal home</a>]</td></tr>
+ <td>Cálculo e impressão de uma ampla variedade de calendários. [<a
+href="/software/gcal/">página do gcal</a>]</td></tr>
<tr id="gnucash"><td>* <a
href="http://www.gnucash.org/docs.phtml">GnuCash</a></td>
- <td>Personal and small business financial accounting software.
- [<a href="/software/gnucash/">gnucash home</a>]</td></tr>
+ <td>Software de contabilidade financeira pessoal e de pequenas empresas.
[<a
+href="/software/gnucash/">página do gnucash</a>]</td></tr>
<tr id="gnue"><td>* <a href="/software/gnue/">GNU Enterprise</a></td>
- <td>Enterprise resource planning, et al.
- [<a href="/software/gnue/">gnue home</a>]</td></tr>
+ <td>Planejamento de recursos empresariais e outros. [<a
+href="/software/gnue/">página do gnue</a>]</td></tr>
<tr id="gretl"><td>* <a
href="http://sourceforge.net/projects/gretl/files/manual/">Gretl</a></td>
- <td>Statistical analysis of economic data (econometrics).
- [<a href="/software/gretl/">gretl home</a>]</td></tr>
+ <td>Análise estatÃstica de dados econômicos (econometria). [<a
+href="/software/gretl/">página do gretl</a>]</td></tr>
<tr id="pem"><td>* <a href="/software/pem/">Pem</a></td>
- <td>Personal expenses manager.
- [<a href="/software/pem/">pem home</a>]</td></tr>
+ <td>Gerenciador pessoal de despesas. [<a
+href="/software/pem/">página do pem</a>]</td></tr>
<tr id="taler"><td>* <a href="/software/taler/">Taler</a></td>
- <td>Electronic payments for a liberal society.
- [<a href="/software/taler/">taler home</a>]</td></tr>
+ <td>Pagamento eletrônico para uma sociedade liberal. [<a
+href="/software/taler/">página do taler</a>]</td></tr>
<tr>
-<td id="Database" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/db/"><big><b>Database</b></big></a></td></tr>
+<td id="Database" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/db/"><big><b>Banco de
+dados</b></big></a></td></tr>
<tr id="ferret"><td>* <a href="/software/ferret/">Ferret</a></td>
- <td>Entity/relationship based data modeler.
- [<a href="/software/ferret/">ferret home</a>]</td></tr>
+ <td>Modelador de dados baseado em entidade/relacionamento. [<a
+href="/software/ferret/">página do ferret</a>]</td></tr>
<tr id="gdbm"><td>* <a
href="http://www.gnu.org.ua/software/gdbm/manual/">Gdbm</a></td>
- <td>Hash library of database functions compatible with traditional dbm.
- [<a href="/software/gdbm/">gdbm home</a>]</td></tr>
+ <td>Biblioteca de hash de funções de banco de dados compatÃvel com o dbm
+tradicional. [<a
href="/software/gdbm/">página do gdbm</a>]</td></tr>
-<tr id="guile-dbi"><td>* <a
href="http://htmlpreview.github.io/?https://github.com/opencog/guile-dbi/blob/master/website/guile-dbi.html">Guile-dbi</a></td>
- <td>Guile database abstraction layer.
- [<a href="/software/guile-dbi/">guile-dbi home</a>]</td></tr>
+<tr id="guile-dbi"><td>* <a
+href="http://htmlpreview.github.io/?https://github.com/opencog/guile-dbi/blob/master/website/guile-dbi.html">Guile-dbi</a></td>
+ <td>Camada de abstração de banco de dados do Guile. [<a
+href="/software/guile-dbi/">página do guile-dbi</a>]</td></tr>
<tr id="gurgle"><td>* <a
href="http://homepages.inf.ed.ac.uk/timc/gurgle/gurgle.html">Gurgle</a></td>
- <td>GNU Report Generator Language.
- [<a href="/software/gurgle/">gurgle home</a>]</td></tr>
+ <td>Linguagem geradora de relatório do GNU. [<a
+href="/software/gurgle/">página do gurgle</a>]</td></tr>
<tr id="libdbh"><td>* <a href="/software/libdbh/">Libdbh</a></td>
- <td>Advanced library for disk-based hash tables.
- [<a href="/software/libdbh/">libdbh home</a>]</td></tr>
+ <td>Biblioteca avançada para tabelas de hash baseada em disco. [<a
+href="/software/libdbh/">página do libdbh</a>]</td></tr>
<tr id="metaexchange"><td>* <a
href="/software/metaexchange/#Documentation">Metaexchange</a></td>
- <td>Manipulate metadata from OAI-PMH and Z39.50.
- [<a href="/software/metaexchange/">metaexchange home</a>]</td></tr>
+ <td>Manipula metadados de OAI-PMH e Z39.50. [<a
+href="/software/metaexchange/">página do metaexchange</a>]</td></tr>
<tr id="recutils"><td>* <a href="/software/recutils/manual/">Recutils</a></td>
- <td>Manipulate plain text files as databases.
- [<a href="/software/recutils/">recutils home</a>]</td></tr>
+ <td>Manipula arquivos de texto simples como banco de dados. [<a
+href="/software/recutils/">página do recutils</a>]</td></tr>
<tr id="sqltutor"><td>* <a href="/software/sqltutor/manual/">Sqltutor</a></td>
- <td>Interactively learn SQL by example.
- [<a href="/software/sqltutor/">sqltutor home</a>]</td></tr>
+ <td>Aprenda SQL interativamente por exemplos. [<a
+href="/software/sqltutor/">página do sqltutor</a>]</td></tr>
<tr>
-<td id="Dictionaries" colspan="2" style="padding-top:.8em;
padding-left:16%;"><a
href="http://directory.fsf.org/category/dict/"><big><b>Dictionaries</b></big></a></td></tr>
+<td id="Dictionaries" colspan="2" style="padding-top:.8em;
padding-left:16%;"><a
+href="http://directory.fsf.org/category/dict/"><big><b>Dicionários</b></big></a></td></tr>
<tr id="dico"><td>* <a href="http://dico.man.gnu.org.ua/">Dico</a></td>
- <td>Implementation of DICT server (RFC 2229).
- [<a href="/software/dico/">dico home</a>]</td></tr>
+ <td>Uma implementação de servidor DICT (RFC 2229). [<a
+href="/software/dico/">página do dico</a>]</td></tr>
<tr id="gcide"><td>* <a href="/software/gcide/">Gcide</a></td>
- <td>GNU Collaborative International Dictionary of English.
- [<a href="/software/gcide/">gcide home</a>]</td></tr>
+ <td>Dicionário inglês internacional e colaborativo do GNU. [<a
+href="/software/gcide/">página do gcide</a>]</td></tr>
<tr id="vera"><td>* <a href="/software/vera/">Vera</a></td>
- <td>List of acronyms.
- [<a href="/software/vera/">vera home</a>]</td></tr>
+ <td>Lista de acrônimos. [<a
+href="/software/vera/">página do vera</a>]</td></tr>
<tr>
-<td id="Translation" colspan="2" style="padding-top:.8em;
padding-left:16%;"><a
href="http://directory.fsf.org/category/dtrans/"><big><b>Documentation
translation</b></big></a></td></tr>
+<td id="Translation" colspan="2" style="padding-top:.8em;
padding-left:16%;"><a
href="http://directory.fsf.org/category/dtrans/"><big><b>Tradução de
+documentação</b></big></a></td></tr>
<tr id="gnujdoc"><td>* <a href="/software/gnujdoc/">GNUjdoc</a></td>
- <td>Japanese translations of GNU documents.
- [<a href="/software/gnujdoc/">gnujdoc home</a>]</td></tr>
+ <td>Traduções japonesas de documentos do GNU. [<a
+href="/software/gnujdoc/">página do gnujdoc</a>]</td></tr>
-<tr id="gnun"><td>* <a href="/software/trans-coord/manual/">GNUnited
Nations</a>
-<small>(<a
href="https://www.gnu.org/software/trans-coord/manual/gnun/html_node/">gnun<!--
again --></a>
- <a
href="https://www.gnu.org/software/trans-coord/manual/web-trans/html_node/">web-trans</a>)</small>
+<tr id="gnun"><td><!-- again -->
+* <a href="/software/trans-coord/manual/">GNUnited Nations</a> <small>(<a
+href="https://www.gnu.org/software/trans-coord/manual/gnun/html_node/">gnun</a>
+<a
+href="https://www.gnu.org/software/trans-coord/manual/web-trans/html_node/">web-trans</a>)</small>
</td>
- <td>Build system for www.gnu.org translations.
- [<a href="/software/gnun/">gnun home</a>]</td></tr>
+ <td>Sistema de compilação de traduções do www.gnu.org. [<a
+href="/software/gnun/">página do gnun</a>]</td></tr>
<tr id="trans-coord"><td>* <a
href="/software/trans-coord/manual/">Trans-coord</a></td>
- <td>Organizational infrastructure for translating www.gnu.org.
- [<a href="/software/trans-coord/">trans-coord home</a>]</td></tr>
+ <td>Infraestrutura organizacional para tradução do www.gnu.org. [<a
+href="/software/trans-coord/">página do trans-coord</a>]</td></tr>
<tr>
-<td id="Editors" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/editors/"><big><b>Editors</b></big></a></td></tr>
+<td id="Editors" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/editors/"><big><b>Editores</b></big></a></td></tr>
-<tr id="emacs"><td>* <a href="/software/emacs/#Manuals">Emacs</a>
-<small>(<a
href="https://www.gnu.org/software/emacs/manual/html_node/ada-mode/">ada-mode</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/autotype/">autotype</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/ccmode/">ccmode</a>
- <a href="https://www.gnu.org/software/emacs/manual/html_node/cl/">cl</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/dired-x/">dired-x</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/ebrowse/">ebrowse</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/ediff/">ediff</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/eieio/">eieio</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/elisp/">elisp</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/emacs/">emacs<!--
again --></a>
- <a href="https://www.gnu.org/software/emacs/manual/html_node/epa/">epa</a>
- <a href="https://www.gnu.org/software/emacs/manual/html_node/erc/">erc</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/eshell/">eshell</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/flymake/">flymake</a>
- <a href="https://www.gnu.org/software/emacs/manual/html_node/gnus/">gnus</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/idlwave/">idlwave</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/message/">message</a>
- <a href="https://www.gnu.org/software/emacs/manual/html_node/mh-e/">mh-e</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/nxml-mode/">nxml-mode</a>
- <a href="https://www.gnu.org/software/emacs/manual/html_node/org/">org</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/pcl-cvs/">pcl-cvs</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/rcirc/">rcirc</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/semantic/">semantic</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/smtpmail/">smtp</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/speedbar/">speedbar</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/tramp/">tramp</a>
- <a href="https://www.gnu.org/software/emacs/manual/html_node/vip/">vip</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/viper/">viper</a>
- <a
href="https://www.gnu.org/software/emacs/manual/html_node/woman/">woman</a>)</small>
+<tr id="emacs"><td><!-- again -->
+* <a href="/software/emacs/#Manuals">Emacs</a> <small>(<a
+href="https://www.gnu.org/software/emacs/manual/html_node/ada-mode/">ada-mode</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/autotype/">autotype</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/ccmode/">ccmode</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/cl/">cl</a> <a
+href="https://www.gnu.org/software/emacs/manual/html_node/dired-x/">dired-x</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/ebrowse/">ebrowse</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/ediff/">ediff</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/eieio/">eieio</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/elisp/">elisp</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/emacs/">emacs</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/epa/">epa</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/erc/">erc</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/eshell/">eshell</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/flymake/">flymake</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/gnus/">gnus</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/idlwave/">idlwave</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/message/">message</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/mh-e/">mh-e</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/nxml-mode/">nxml-mode</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/org/">org</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/pcl-cvs/">pcl-cvs</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/rcirc/">rcirc</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/semantic/">semantic</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/smtpmail/">smtp</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/speedbar/">speedbar</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/tramp/">tramp</a>
+<a href="https://www.gnu.org/software/emacs/manual/html_node/vip/">vip</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/viper/">viper</a>
+<a
+href="https://www.gnu.org/software/emacs/manual/html_node/woman/">woman</a>)</small>
</td>
- <td>The extensible, customizable, self-documenting text editor.
- <br/>Available in print:
- <cite><a
href="https://shop.fsf.org/books-docs/emacs-reference-card-v25">Emacs Reference
Cards</a></cite>,
- <cite><a
href="https://shop.fsf.org/books/gnu-emacs-manual-18th-edition-v-261">GNU Emacs
Manual</a></cite>.
- [<a href="/software/emacs/">emacs home</a>]</td></tr>
+ <td>O editor de texto autodocumentável, extensÃvel e personalizável.
+ <br/>DisponÃvel impresso: <cite><a
+href="https://shop.fsf.org/books-docs/emacs-reference-card-v25">Cartão de
+Referência do Emacs</a></cite>, <cite><a
+href="https://shop.fsf.org/books/gnu-emacs-manual-18th-edition-v-261">Manual
+do GNU Emacs</a></cite>. [<a
+href="/software/emacs/">página do emacs</a>]</td></tr>
<tr id="moe"><td>* <a
href="https://www.gnu.org/software/moe/manual/moe_manual.html">Moe</a></td>
- <td>Modeless, multiple-buffer, user-friendly 8-bit text editor.
- [<a href="/software/moe/">moe home</a>]</td></tr>
+ <td>Editor de texto amigável de 8 bits, com múltiplos buffer e sem
modelo. [<a
+href="/software/moe/">página do moe</a>]</td></tr>
<tr id="nano"><td>* <a href="http://www.nano-editor.org/docs.php">Nano</a></td>
- <td>Small, user-friendly console text editor.
- [<a href="/software/nano/">nano home</a>]</td></tr>
+ <td>Editor de texto de console pequeno e amigável. [<a
+href="/software/nano/">página do nano</a>]</td></tr>
-<tr id="readline"><td>* <a
href="https://tiswww.cwru.edu/php/chet/readline/readline.html">Readline</a>
-<small>(<a
href="https://tiswww.cwru.edu/php/chet/readline/history.html">history</a>
- <a
href="https://tiswww.cwru.edu/php/chet/readline/rluserman.html">rluserman</a>)</small>
+<tr id="readline"><td>* <a
+href="https://tiswww.cwru.edu/php/chet/readline/readline.html">Readline</a>
+<small>(<a
+href="https://tiswww.cwru.edu/php/chet/readline/history.html">histórico</a>
+<a
+href="https://tiswww.cwru.edu/php/chet/readline/rluserman.html">rluserman</a>)</small>
</td>
- <td>Edit command lines while typing, with history support.
- [<a href="/software/readline/">readline home</a>]</td></tr>
+ <td>Edita linhas de comando enquanto digita, com suporte a histórico. [<a
+href="/software/readline/">página do readline</a>]</td></tr>
<tr id="zile"><td>* <a href="/software/zile/">Zile</a></td>
- <td>Zile is lossy Emacs, a lightweight Emacs clone.
- [<a href="/software/zile/">zile home</a>]</td></tr>
+ <td>Zile é um Emacs com perdas, um clone leve do Emacs. [<a
+href="/software/zile/">páginas do zile</a>]</td></tr>
<tr>
-<td id="Education" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/educ/"><big><b>Education</b></big></a></td></tr>
+<td id="Education" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/educ/"><big><b>Educação</b></big></a></td></tr>
<tr id="dr-geo"><td>* <a href="https://www.gnu.org/software/dr-geo/doc/">Dr.
Geo</a></td>
- <td>Interactive geometry software.
- [<a href="/software/dr-geo/">dr-geo home</a>]</td></tr>
+ <td>Software interativo de geometria. [<a
+href="/software/dr-geo/">página do dr-geo</a>]</td></tr>
<tr id="eprints"><td>* <a
href="http://wiki.eprints.org/w/EPrints_Manual">Eprints</a></td>
- <td>Web-based repository software, with a default setup for research
papers.
- [<a href="/software/eprints/">eprints home</a>]</td></tr>
+ <td>Software de repositório baseado em web, com uma configuração
padrão para
+trabalhos de pesquisa. [<a
+href="/software/eprints/">página do eprints</a>]</td></tr>
<tr id="fisicalab"><td>* <a href="/software/fisicalab/">FisicaLab</a></td>
- <td>Educational application for solving physics problems.
- [<a href="/software/fisicalab/">fisicalab home</a>]</td></tr>
+ <td>Aplicativo educacional para resolver problemas fÃsicos. [<a
+href="/software/fisicalab/">página do fisicalab</a>]</td></tr>
<tr id="gcompris"><td>* <a
href="http://gcompris.net/wiki/Manual">GCompris</a></td>
- <td>Educational games for small children.
- [<a href="/software/gcompris/">gcompris home</a>]</td></tr>
+ <td>Jogos educacionais para filhos pequenos. [<a
+href="/software/gcompris/">página do gcompris</a>]</td></tr>
<tr id="ggradebook"><td>* <a href="/software/ggradebook/">Ggradebook</a></td>
- <td>GNOME application to track students' grades for teachers.
- [<a href="/software/ggradebook/">ggradebook home</a>]</td></tr>
+ <td>Aplicativo do GNOME para professores rastrearem notas dos estudantes.
[<a
+href="/software/ggradebook/">página do ggradebook</a>]</td></tr>
<tr id="glean"><td>* <a href="/software/glean/">Glean</a></td>
- <td>extensible quizzing and tutorial for self-study.
- [<a href="/software/glean/">glean home</a>]</td></tr>
+ <td>Questionário e tutorial extensÃvel para estudo autodidata. [<a
+href="/software/glean/">página do glean</a>]</td></tr>
-<tr id="gnuschool"><td>* <a
href="https://www.gnu.org/software/gnuschool/gnuschool.html">GNUschool</a></td>
- <td>Web application for educators, students, and school administrators.
- [<a href="/software/gnuschool/">gnuschool home</a>]</td></tr>
+<tr id="gnuschool"><td>* <a
+href="https://www.gnu.org/software/gnuschool/gnuschool.html">GNUschool</a></td>
+ <td>Aplicativo web para educadores, estudantes e administradores de
escola. [<a
+href="/software/gnuschool/">página do gnuschool</a>]</td></tr>
<tr id="gtypist"><td>* <a
href="https://www.gnu.org/software/gtypist/doc/">Gtypist</a></td>
- <td>Typing tutor.
- [<a href="/software/gtypist/">gtypist home</a>]</td></tr>
+ <td>Tutor de digitação. [<a
+href="/software/gtypist/">página do gtypist</a>]</td></tr>
<tr id="ignuit"><td>* <a href="/software/ignuit/">Ignuit</a></td>
- <td>Memorization aid based on Leitner flashcards.
- [<a href="/software/ignuit/">ignuit home</a>]</td></tr>
+ <td>AuxÃlio de memorização baseado em <em>flashcards</em> de Leitner.
[<a
+href="/software/ignuit/">página do ignuit</a>]</td></tr>
<tr id="jtw"><td>* <a href="/software/jtw/">Java Training Wheels</a></td>
- <td>A simplified Java environment for learning programming.
- [<a href="/software/jtw/">jtw home</a>]</td></tr>
+ <td>Um ambinete simplificado de Java para aprender programação. [<a
+href="/software/jtw/">página do jtw</a>]</td></tr>
<tr id="mdk"><td>* <a href="/software/mdk/manual/">MIX Development Kit</a></td>
- <td>Virtual development environment for Knuth's MIX.
- <br/>Available in print:
- <cite><a href="http://shop.fsf.org/product/gnu-mdk/">GNU MDK</a></cite>.
- [<a href="/software/mdk/">mdk home</a>]</td></tr>
+ <td>Ambiente virtual de desenvolvimento para MIX do Knuth.
+ <br/>DisponÃvel impresso: <cite><a
+href="http://shop.fsf.org/product/gnu-mdk/">GNU MDK</a></cite>. [<a
+href="/software/mdk/">página do mdk</a>]</td></tr>
<tr>
-<td id="Email" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/email/"><big><b>Email</b></big></a></td></tr>
+<td id="Email" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/email/"><big><b>E-mail</b></big></a></td></tr>
<tr id="anubis"><td>* <a href="/software/anubis/manual/">Anubis</a></td>
- <td>SMTP message submission daemon.
- [<a href="/software/anubis/">anubis home</a>]</td></tr>
+ <td>Daemon de envio de mensagem SMTP. [<a
+href="/software/anubis/">página do anubis</a>]</td></tr>
<tr id="gnubiff"><td>* <a
href="http://gnubiff.sourceforge.net/documentation.php">GNUbiff</a></td>
- <td>Mail notification program.
- [<a href="/software/gnubiff/">gnubiff home</a>]</td></tr>
+ <td>Programa de notificação de correio. [<a
+href="/software/gnubiff/">página do gnubiff</a>]</td></tr>
<tr id="mailman"><td>* <a href="/software/mailman/docs.html">Mailman</a></td>
- <td>Mailing list manager.
- [<a href="/software/mailman/">mailman home</a>]</td></tr>
+ <td>Gerenciador de lista de discussão. [<a
+href="/software/mailman/">página do mailman</a>]</td></tr>
<tr id="mailutils"><td>* <a
href="/software/mailutils/manual/">Mailutils</a></td>
- <td>Utilities and library for reading and serving mail.
- [<a href="/software/mailutils/">mailutils home</a>]</td></tr>
+ <td>Utilitários e biblioteca para leitura e entrega de correio. [<a
+href="/software/mailutils/">página do mailutils</a>]</td></tr>
<tr>
-<td id="Fonts" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/fonts/"><big><b>Fonts</b></big></a></td></tr>
+<td id="Fonts" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/fonts/"><big><b>Fontes</b></big></a></td></tr>
<tr id="fontopia"><td>* <a href="/software/fontopia/">Fontopia</a></td>
- <td>A console font editor.
- [<a href="/software/fontopia/">fontopia home</a>]</td></tr>
+ <td>Um editor de fontes de console. [<a
+href="/software/fontopia/">página do fontopia</a>]</td></tr>
-<tr id="fontutils"><td>* <a
href="http://www.delorie.com/gnu/docs/fontutils/fontu_toc.html">Fontutils</a></td>
- <td>Scanned image, bitmap, outline font manipulation.
- [<a href="/software/fontutils/">fontutils home</a>]</td></tr>
+<tr id="fontutils"><td>* <a
+href="http://www.delorie.com/gnu/docs/fontutils/fontu_toc.html">Fontutils</a></td>
+ <td>Manipulação de imagem digitalizada, bitmap e fonte de contorno. [<a
+href="/software/fontutils/">página do fontutils</a>]</td></tr>
<tr id="freefont"><td>* <a href="/software/freefont/">Free UCS Outline
Fonts</a></td>
- <td>Unicode-encoded outline fonts.
- [<a href="/software/freefont/">freefont home</a>]</td></tr>
+ <td>Fontes de contorno codificadas em Unicode. [<a
+href="/software/freefont/">página do freefont</a>]</td></tr>
<tr id="intlfonts"><td>* <a href="/software/intlfonts/">Intlfonts</a></td>
- <td>TrueType and BDF fonts covering many scripts.
- [<a href="/software/intlfonts/">intlfonts home</a>]</td></tr>
+ <td>Fontes TrueType e BDF cobrindo muitos scripts. [<a
+href="/software/intlfonts/">página do intlfonts</a>]</td></tr>
<tr id="unifont"><td>* <a href="/software/unifont/">Unifont</a></td>
- <td>Large bitmap font covering Unicode's Basic Multilingual Plane.
- [<a href="/software/unifont/">unifont home</a>]</td></tr>
+ <td>Fonte bitmap grande cobrindo o Plano MultilÃngue Básico do Unicode.
[<a
+href="/software/unifont/">página do unifont</a>]</td></tr>
<tr>
-<td id="gnuorg" colspan="2" style="padding-top:.8em;
padding-left:16%;"><big><b>GNU organization</b></big></td></tr>
+<td id="gnuorg" colspan="2" style="padding-top:.8em;
padding-left:16%;"><big><b>Organização do GNU</b></big></td></tr>
-<tr id="gnustandards"><td>* <a href="/software/gnustandards/">GNU
organization</a>
-<small>(<a href="https://www.gnu.org/prep/maintain/html_node/">maintain</a>
- <a
href="https://www.gnu.org/prep/standards/html_node/">standards</a>)</small>
+<tr id="gnustandards"><td>* <a href="/software/gnustandards/">Organização do
GNU</a> <small>(<a
+href="https://www.gnu.org/prep/maintain/html_node/">manutenção</a> <a
+href="https://www.gnu.org/prep/standards/html_node/">padrões</a>)</small>
</td>
- <td>GNU coding standards and maintainer information.
- [<a href="/software/gnustandards/">gnustandards home</a>]</td></tr>
+ <td>Padrões de codificação do GNU e informações para mantenedores.
[<a
+href="/software/gnustandards/">página do gnustandards</a>]</td></tr>
<tr>
-<td id="Games" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/games/"><big><b>Games</b></big></a></td></tr>
+<td id="Games" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/games/"><big><b>Jogos</b></big></a></td></tr>
<tr id="acm"><td>* <a href="/software/acm/">Acm</a></td>
- <td>Multiplayer aerial combat simulation.
- [<a href="/software/acm/">acm home</a>]</td></tr>
+ <td>Simulação de combate aéreo multijogador. [<a
+href="/software/acm/">página do acm</a>]</td></tr>
<tr id="ballandpaddle"><td>* <a href="/software/ballandpaddle/">Ball and
Paddle</a></td>
- <td>Ball and paddle game extensible with Guile.
- [<a
href="/software/ballandpaddle/">ballandpaddle home</a>]</td></tr>
+ <td>Jogo de bola e remo extensÃvel com Guile. [<a
+href="/software/ballandpaddle/">página do ballandpaddle</a>]</td></tr>
<tr id="chess"><td>* <a href="/software/chess/manual/">Chess</a></td>
- <td>Full chess implementation.
- [<a href="/software/chess/">chess home</a>]</td></tr>
+ <td>Implementação completa de xadrez. [<a
+href="/software/chess/">página do chess </a>]</td></tr>
<tr id="dominion"><td>* <a href="/software/dominion/">Dominion</a></td>
- <td>Multi-player world simulation and role-playing game.
- [<a href="/software/dominion/">dominion home</a>]</td></tr>
+ <td>Jogo de RPG e simulação de mundo multijogador. [<a
+href="/software/dominion/">página do dominion</a>]</td></tr>
<tr id="freedink"><td>* <a
href="http://www.freedink.org/doc/">FreeDink</a></td>
- <td>Twisted adventures of young pig farmer Dink Smallwood.
- [<a href="/software/freedink/">freedink home</a>]</td></tr>
+ <td>As aventuras distorcidas do jovem criador de porcos Dink Smallwood.
[<a
+href="/software/freedink/">página do freedink</a>]</td></tr>
<tr id="gnubg"><td>* <a
href="http://www.gnubg.com/documentation/doku.php">Backgammon</a></td>
- <td>Backgammon game.
- [<a href="/software/gnubg/">gnubg home</a>]</td></tr>
+ <td>Um jogo de gamão. [<a
+href="/software/gnubg/">página do gnubg</a>]</td></tr>
<tr id="gnubik"><td>* <a href="/software/gnubik/manual/">GNUbik</a></td>
- <td>3d Rubik's cube game.
- [<a href="/software/gnubik/">gnubik home</a>]</td></tr>
+ <td>Jogo 3D de cubo do Rubik. [<a
+href="/software/gnubik/">página do gnubik</a>]</td></tr>
<tr id="gnugo"><td>* <a href="/software/gnugo/gnugo_toc.html">GNUgo</a></td>
- <td>Play the game of Go.
- [<a href="/software/gnugo/">gnugo home</a>]</td></tr>
+ <td>Jogue o jogo de Go. [<a
+href="/software/gnugo/">página do gnugo</a>]</td></tr>
<tr id="gnujump"><td>* <a href="/software/gnujump/">GNUjump</a></td>
- <td>Game of jumping to the next floor, trying not to fall.
- [<a href="/software/gnujump/">gnujump home</a>]</td></tr>
+ <td>Jogo de pular para o próximo andar, tentando não cair. [<a
+href="/software/gnujump/">página do gnujump</a>]</td></tr>
<tr id="gnukart"><td>* <a href="/software/gnukart/">GNUkart</a></td>
- <td>Racing game.
- [<a href="/software/gnukart/">gnukart home</a>]</td></tr>
+ <td>Jogo de corrida. [<a
+href="/software/gnukart/">página do gnukart</a>]</td></tr>
<tr id="gnurobots"><td>* <a
href="/software/gnurobots/readme.html">Robots</a></td>
- <td>Program a little robot and watch him explore a world.
- [<a href="/software/gnurobots/">gnurobots home</a>]</td></tr>
+ <td>Programe um pequeno robô e veja-o explorar um mundo. [<a
+href="/software/gnurobots/">página do gnurobots</a>]</td></tr>
-<tr id="gnushogi"><td>* <a
href="http://www.cs.caltech.edu/~mvanier/hacking/gnushogi/gnushogi_toc.html">GNUshogi</a></td>
- <td>The game of Shogi (Japanese chess).
- [<a href="/software/gnushogi/">gnushogi home</a>]</td></tr>
+<tr id="gnushogi"><td>* <a
+href="http://www.cs.caltech.edu/~mvanier/hacking/gnushogi/gnushogi_toc.html">GNUshogi</a></td>
+ <td>O jogo de Shogi (xadrez japonês). [<a
+href="/software/gnushogi/">página do gnushogi</a>]</td></tr>
<tr id="leg"><td>* <a href="/software/leg/">Leg</a></td>
- <td>Libraries and engines for game programming.
- [<a href="/software/leg/">leg home</a>]</td></tr>
+ <td>Bibliotecas e motores para programação de jogos. [<a
+href="/software/leg/">página do leg</a>]</td></tr>
<tr id="liquidwar6"><td>* <a href="/software/liquidwar6/manual/">Liquid War
6</a></td>
- <td>Multiplayer wargame where your army is a blob of liquid.
- [<a href="/software/liquidwar6/">liquidwar6 home</a>]</td></tr>
+ <td>Jogo de guerra multijogador em que seu exército é uma bolha de
lÃquido. [<a
+href="/software/liquidwar6/">página do liquidwar6</a>]</td></tr>
<tr id="motti"><td>* <a
href="https://www.gnu.org/software/motti/manual/">Motti</a></td>
- <td>Multiplayer strategy game.
- [<a href="/software/motti/">motti home</a>]</td></tr>
+ <td>Jogo de estratégia multijogador. [<a
+href="/software/motti/">página do motti</a>]</td></tr>
<tr id="rpge"><td>* <a href="/software/rpge/">Rpge</a></td>
- <td>Role playing game engine.
- [<a href="/software/rpge/">rpge home</a>]</td></tr>
+ <td>Motor de RPG. [<a
href="/software/rpge/">página do rpge</a>]</td></tr>
-<tr id="talkfilters"><td>* <a
href="http://www.hyperrealm.com/talkfilters/talkfilters.pdf">Talkfilters</a></td>
- <td>Convert English text to humorous dialects.
- [<a href="/software/talkfilters/">talkfilters home</a>]</td></tr>
+<tr id="talkfilters"><td>* <a
+href="http://www.hyperrealm.com/talkfilters/talkfilters.pdf">Talkfilters</a></td>
+ <td>Converte texto em inglês para dialetos humorÃsticos. [<a
+href="/software/talkfilters/">página do talkfilters</a>]</td></tr>
<tr id="xboard"><td>* <a href="/software/xboard/manual/">XBoard</a></td>
- <td>Graphical user interface for chess programs.
- [<a href="/software/xboard/">xboard home</a>]</td></tr>
+ <td>Interface gráfica de usuário para programas de xadrez. [<a
+href="/software/xboard/">página do xboard</a>]</td></tr>
<tr>
-<td id="Graphics" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/graph/"><big><b>Graphics</b></big></a></td></tr>
+<td id="Graphics" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/graph/"><big><b>Gráficos</b></big></a></td></tr>
<tr id="pkg_3dldf"><td>* <a href="/software/3dldf/manual/">3DLDF</a></td>
- <td>3D drawing with MetaPost output.
- [<a href="/software/3dldf/">3dldf home</a>]</td></tr>
+ <td>Desenho em 3D com saÃda MetaPost. [<a
+href="/software/3dldf/">página do 3dldf</a>]</td></tr>
<tr id="dia"><td>* <a
href="http://wiki.gnome.org/Apps/Dia/Documentation">Dia</a></td>
- <td>Diagram creation for GNOME.
- [<a href="/software/dia/">dia home</a>]</td></tr>
+ <td>Criação de diagrama para o GNOME. [<a
+href="/software/dia/">página do dia</a>]</td></tr>
<tr id="gift"><td>* <a href="/software/gift/">GIFT</a></td>
- <td>GNU Image Finding Tool, with query by example.
- [<a href="/software/gift/">gift home</a>]</td></tr>
+ <td>Ferramenta de localização de imagem do GNU, com consulta por
exemplos. [<a
+href="/software/gift/">página do gift</a>]</td></tr>
<tr id="gimp"><td>* <a href="http://www.gimp.org/docs/">GIMP</a></td>
- <td>GNU Image Manipulation Program.
- [<a href="/software/gimp/">gimp home</a>]</td></tr>
+ <td>Programa de manipulação de imagem do GNU. [<a
+href="/software/gimp/">página do gimp</a>]</td></tr>
<tr id="gpaint"><td>* <a href="/software/gpaint/">Gpaint</a></td>
- <td>Simple paint program for GNOME.
- [<a href="/software/gpaint/">gpaint home</a>]</td></tr>
+ <td>Programa simples de pintura para o GNOME. [<a
+href="/software/gpaint/">página do gpaint</a>]</td></tr>
<tr id="gsegrafix"><td>* <a href="/software/gsegrafix/">Gsegrafix</a></td>
- <td>GNOME application to create scientific and engineering plots.
- [<a href="/software/gsegrafix/">gsegrafix home</a>]</td></tr>
+ <td>Aplicativo GNOME para criar gráficos cientÃficos e de engenharia.
[<a
+href="/software/gsegrafix/">página do gsegrafix</a>]</td></tr>
<tr id="guile-opengl"><td>* <a
href="/software/guile-opengl/">Guile-opengl</a></td>
- <td>Guile binding for the OpenGL graphics API.
- [<a href="/software/guile-opengl/">guile-opengl home</a>]</td></tr>
+ <td>Vinculação do Guile para a API de gráficos OpenGL. [<a
+href="/software/guile-opengl/">página do guile-opengl</a>]</td></tr>
<tr id="libxmi"><td>* <a href="/software/libxmi/">Libxmi</a></td>
- <td>Library for rasterizing 2-d vector graphics.
- [<a href="/software/libxmi/">libxmi home</a>]</td></tr>
+ <td>Biblioteca para rasterizar gráficos vetoriais em 2D. [<a
+href="/software/libxmi/">página do libxmi</a>]</td></tr>
<tr id="maverik"><td>* <a href="/software/maverik/">Maverik</a></td>
- <td>Support interactive 3d virtual environments.
- [<a href="/software/maverik/">maverik home</a>]</td></tr>
+ <td>Suporte a ambientes virtuais interativos em 3D. [<a
+href="/software/maverik/">página do maverik</a>]</td></tr>
<tr id="panorama"><td>* <a href="/software/panorama/">Panorama</a></td>
- <td>Framework for 3D graphics production.
- [<a href="/software/panorama/">panorama home</a>]</td></tr>
+ <td>Framework para produção de gráficos 3D. [<a
+href="/software/panorama/">página do panorama</a>]</td></tr>
<tr id="plotutils"><td>* <a href="/software/plotutils/">Plotutils</a></td>
- <td>Plotting utilities and library.
- [<a href="/software/plotutils/">plotutils home</a>]</td></tr>
+ <td>Utilitários e biblioteca de plotagem. [<a
+href="/software/plotutils/">página do plotutils</a>]</td></tr>
<tr id="xaos"><td>* <a
href="http://matek.hu/xaos/doku.php?id=documentation:main">XaoS</a></td>
- <td>Real-time fractal zoomer.
- [<a href="/software/xaos/">xaos home</a>]</td></tr>
+ <td>Aproximador/afastador (<em>zoom in/zoom out</em>) de fractal em tempo
real.
+[<a href="/software/xaos/">página do xaos</a>]</td></tr>
<tr>
-<td id="Health" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/health/"><big><b>Health</b></big></a></td></tr>
+<td id="Health" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/health/"><big><b>Saúde</b></big></a></td></tr>
<tr id="gnumed"><td>* <a
href="http://wiki.gnumed.de/bin/view/Gnumed/GnumedManual">GNUmed</a></td>
- <td>Paperless medical practice.
- [<a href="/software/gnumed/">gnumed home</a>]</td></tr>
+ <td>Prática médica sem papel. [<a
+href="/software/gnumed/">página do gnumed</a>]</td></tr>
<tr id="gnutrition"><td>* <a
href="/software/gnutrition/manual/">GNUtrition</a></td>
- <td>Nutrition analysis.
- [<a href="/software/gnutrition/">gnutrition home</a>]</td></tr>
+ <td>Análise nutricional. [<a
+href="/software/gnutrition/">página do gnutrition</a>]</td></tr>
<tr id="health"><td>* <a href="/software/health/">Health</a></td>
- <td>Health and hospital information system.
- [<a href="/software/health/">health home</a>]</td></tr>
+ <td>Sistema de informação hospitalar e saúde. [<a
+href="/software/health/">página do health</a>]</td></tr>
<tr>
-<td id="Interface" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/iface/"><big><b>Interface</b></big></a></td></tr>
+<td id="Interface" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/iface/"><big><b>Interface</b></big></a></td></tr>
<tr id="g-golf"><td>* <a href="/software/g-golf/">G-Golf</a></td>
- <td>Guile bindings for GObject Introspection.
- [<a href="/software/g-golf/">g-golf home</a>]</td></tr>
+ <td>Vinculações Guile para introspecção de GObject. [<a
+href="/software/g-golf/">página do g-golf</a>]</td></tr>
<tr id="gnome"><td>* <a href="http://library.gnome.org">GNOME</a></td>
- <td>The GNU desktop environment.
- [<a href="/software/gnome/">gnome home</a>]</td></tr>
+ <td>O ambiente gráfico do GNU. [<a
+href="/software/gnome/">página do gnome</a>]</td></tr>
<tr id="gnudos"><td>* <a href="/software/gnudos/">GnuDOS</a></td>
- <td>MS-DOS-like file manager, editor, and other tools.
- [<a href="/software/gnudos/">gnudos home</a>]</td></tr>
+ <td>Gerenciador de arquivos semelhante ao MS-DOS, editor e outras
ferramentas.
+[<a href="/software/gnudos/">página do gnudos</a>]</td></tr>
<tr id="gnuit"><td>* <a href="/software/gnuit/manual/">GNU Interactive
Tools</a></td>
- <td>Interactive utilities for file browsing, viewing, and more.
- [<a href="/software/gnuit/">gnuit home</a>]</td></tr>
+ <td>Utilitários interativos para navegação de arquivos, visualização
e mais.
+[<a href="/software/gnuit/">páginas do gnuit</a>]</td></tr>
<tr id="gnuspeech"><td>* <a
href="/software/gnuspeech/#Manuals">GNUspeech</a></td>
- <td>Extensible rule-based text-to-speech.
- [<a href="/software/gnuspeech/">gnuspeech home</a>]</td></tr>
+ <td>Texto-para-voz baseado em regras extensÃveis. [<a
+href="/software/gnuspeech/">página do gnuspeech</a>]</td></tr>
<tr id="gtk"><td>* <a
href="http://library.gnome.org/devel/gtk/stable/">GTK+</a></td>
- <td>Cross-platform toolkit for creating graphical user interfaces.
- [<a href="/software/gtk+/">gtk+ home</a>]</td></tr>
+ <td>Kit de ferramentas multiplataforma para criar interfaces gráficas de
+usuário. [<a href="/software/gtk+/">página do gtk+</a>]</td></tr>
<tr id="guile-ncurses"><td>* <a
href="/software/guile-ncurses/manual/">Guile-ncurses</a></td>
- <td>Guile bindings to ncurses.
- [<a
href="/software/guile-ncurses/">guile-ncurses home</a>]</td></tr>
+ <td>Vinculações Guile para ncurses. [<a
+href="/software/guile-ncurses/">página do guile-ncurses</a>]</td></tr>
<tr id="gxmessage"><td>* <a href="/software/gxmessage/">Gxmessage</a></td>
- <td>Open popup message window with buttons for return.
- [<a href="/software/gxmessage/">gxmessage home</a>]</td></tr>
+ <td>Abre uma janela de mensagem <i lang="en">pop-up</i> com botões para
+retorno. [<a
href="/software/gxmessage/">página do gxmessage</a>]</td></tr>
<tr id="inklingreader"><td>* <a
href="/software/inklingreader/">Inklingreader</a></td>
- <td>Wacom Inkling sketch format conversion and manipulation.
- [<a
href="/software/inklingreader/">inklingreader home</a>]</td></tr>
+ <td>Conversão e manipulação de formato de esboço do Wacom Inkling. [<a
+href="/software/inklingreader/">página do inklingreader</a>]</td></tr>
<tr id="mc"><td>* <a href="/software/mc/">Midnight Commander</a></td>
- <td>Graphical file manager.
- [<a href="/software/mc/">mc home</a>]</td></tr>
+ <td>Gerenciador de arquivos gráfico. [<a
+href="/software/mc/">página do mc</a>]</td></tr>
<tr id="ncurses"><td>* <a href="/software/ncurses/">Ncurses</a></td>
- <td>Terminal emulation (termcap, terminfo) library.
- [<a href="/software/ncurses/">ncurses home</a>]</td></tr>
+ <td>Biblioteca de emulação de terminal (termcap, terminfo). [<a
+href="/software/ncurses/">página do ncurses</a>]</td></tr>
<tr id="oo-browser"><td>* <a href="/software/oo-browser/">OO-Browser</a></td>
- <td>An interactive object-oriented class browser for Emacs.
- [<a href="/software/oo-browser/">oo-browser home</a>]</td></tr>
+ <td>Um navegador interativo de classe orientado a objetos para o Emacs.
[<a
+href="/software/oo-browser/">página do oo-browser</a>]</td></tr>
<tr id="phantom_home"><td>* <a
href="/software/phantom_home/">Phantom.Home</a></td>
- <td>Computer-controlled home automation.
- [<a href="/software/phantom_home/">phantom_home home</a>]</td></tr>
+ <td>Automação residencial controlada por computador. [<a
+href="/software/phantom_home/">página do phantom_home</a>]</td></tr>
<tr id="powerguru"><td>* <a
href="/software/powerguru/#documentation">PowerGuru</a></td>
- <td>Monitoring, logging, and remote control of power generation.
- [<a href="/software/powerguru/">powerguru home</a>]</td></tr>
+ <td>Monitoramento, registro e controle remoto da geração de energia. [<a
+href="/software/powerguru/">página do powerguru</a>]</td></tr>
<tr id="remotecontrol"><td>* <a
href="/software/remotecontrol/manual/">Remotecontrol</a></td>
- <td>Management of IP-enabled thermostats and other HVAC devices.
- [<a
href="/software/remotecontrol/">remotecontrol home</a>]</td></tr>
+ <td>Gerenciamento de termostatos com IP e outros dispositivos HVAC. [<a
+href="/software/remotecontrol/">página do remotecontrol</a>]</td></tr>
<tr id="stalkerfs"><td>* <a href="/software/stalkerfs/">Stalkerfs</a></td>
- <td>Desktop search engine for local files, using FUSE.
- [<a href="/software/stalkerfs/">stalkerfs home</a>]</td></tr>
+ <td>Buscador de área de trabalho para arquivos locais, usando FUSE. [<a
+href="/software/stalkerfs/">página do stalkerfs</a>]</td></tr>
<tr id="termcap"><td>* <a
href="/software/termutils/manual/termcap-1.3/termcap.html">Termcap</a></td>
- <td>Terminal-independent display support.
- [<a href="/software/termcap/">termcap home</a>]</td></tr>
+ <td>Suporte de exibição independente de terminal. [<a
+href="/software/termcap/">página do termcap</a>]</td></tr>
<tr id="termutils"><td>* <a
href="/software/termutils/manual/termutils-2.0/tput.html">Termutils</a></td>
- <td>The tput and tabs utilities for terminal operations.
- [<a href="/software/termutils/">termutils home</a>]</td></tr>
+ <td>Os utilitários tput e tabs para operações de terminal. [<a
+href="/software/termutils/">página do termutils</a>]</td></tr>
-<tr id="tramp"><td>* <a
href="https://www.gnu.org/software/emacs/manual/html_node/tramp/">TRAMP</a></td>
- <td>Transparent Remote Access, Multiple Protocol GNU Emacs package.
- [<a href="/software/tramp/">tramp home</a>]</td></tr>
+<tr id="tramp"><td>* <a
+href="https://www.gnu.org/software/emacs/manual/html_node/tramp/">TRAMP</a></td>
+ <td>Acesso remoto transparente, por múltiplos protocolos, do pacote GNU
Emacs.
+[<a href="/software/tramp/">página do tramp</a>]</td></tr>
<tr>
-<td id="Internet" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/net/"><big><b>Internet
applications</b></big></a></td></tr>
+<td id="Internet" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/net/"><big><b>Aplicativos de
+Internet</b></big></a></td></tr>
<tr id="alive"><td>* <a href="/software/alive/manual/">Alive</a></td>
- <td>Autologin and keep-alive daemon.
- [<a href="/software/alive/">alive home</a>]</td></tr>
+ <td>Daemon de autologin e de kepp-alive. [<a
+href="/software/alive/">página do alive</a>]</td></tr>
-<tr id="artanis"><td>* <a
href="https://www.gnu.org/software/artanis/manual/html_node/">Artanis</a></td>
- <td>Web application framework written in Guile.
- [<a href="/software/artanis/">artanis home</a>]</td></tr>
+<tr id="artanis"><td>* <a
+href="https://www.gnu.org/software/artanis/manual/html_node/">Artanis</a></td>
+ <td>Framework de aplicativo da Web escrita em Guile. [<a
+href="/software/artanis/">página do artanis</a>]</td></tr>
<tr id="consensus"><td>* <a href="/software/consensus/">Consensus</a></td>
- <td>Coordinate free software social networking projects.
- [<a href="/software/consensus/">consensus home</a>]</td></tr>
+ <td>Coordena projetos de redes sociais de software livre. [<a
+href="/software/consensus/">página do consensus</a>]</td></tr>
<tr id="freetalk"><td>* <a
href="/software/freetalk/freetalk.html">Freetalk</a></td>
- <td>Extensible console-based Jabber client.
- [<a href="/software/freetalk/">freetalk home</a>]</td></tr>
+ <td>Cliente Jabber extensÃvel, baseado em console. [<a
+href="/software/freetalk/">página do freetalk</a>]</td></tr>
<tr id="garpd"><td>* <a href="/software/garpd/">Gratuitous ARP Daemon</a></td>
- <td>Broadcast gratuitous ARP requests for IPMI and more.
- [<a href="/software/garpd/">garpd home</a>]</td></tr>
+ <td>Transmissão de solicitações ARP gratuitas para o IPMI e mais. [<a
+href="/software/garpd/">página do garpd</a>]</td></tr>
<tr id="gnash"><td>* <a
href="/software/gnash/documentation.html">Gnash</a></td>
- <td>Flash movie player.
- [<a href="/software/gnash/">gnash home</a>]</td></tr>
+ <td>Reprodutor de vÃdeos em Flash. [<a
+href="/software/gnash/">página do gnash</a>]</td></tr>
<tr id="gnunet"><td>* <a href="http://gnunet.org/book">GNUnet</a></td>
- <td>Secure, decentralized, peer-to-peer networking framework.
- [<a href="/software/gnunet/">gnunet home</a>]</td></tr>
+ <td>Framework de rede segura, descentralizada e ponto a ponto. [<a
+href="/software/gnunet/">página do gnunet</a>]</td></tr>
<tr id="gnuzilla"><td>* <a href="/software/gnuzilla/">GNUzilla</a></td>
- <td>Entirely free browser derived from Mozilla Firefox.
- [<a href="/software/gnuzilla/">gnuzilla home</a>]</td></tr>
+ <td>Navegador totalmente livre derivado do Mozilla Firefox. [<a
+href="/software/gnuzilla/">página do gnuzilla</a>]</td></tr>
<tr id="httptunnel"><td>* <a href="/software/httptunnel/">Httptunnel</a></td>
- <td>Bidirectional connection tunnelled inside HTTP requests.
- [<a href="/software/httptunnel/">httptunnel home</a>]</td></tr>
+ <td>Conexão bidirecional encapsulada dentro de solicitações HTTP. [<a
+href="/software/httptunnel/">página do httptunnel</a>]</td></tr>
<tr id="icecat"><td>* <a href="/software/icecat/">Icecat</a></td>
- <td>Entirely free browser derived from Mozilla Firefox.
- [<a href="/software/icecat/">icecat home</a>]</td></tr>
+ <td>Navegador totalmente livre derivado do Mozilla Firefox. [<a
+href="/software/icecat/">página do icecat</a>]</td></tr>
<tr id="inetutils"><td>* <a
href="/software/inetutils/manual/">Inetutils</a></td>
- <td>Basic networking utilities.
- [<a href="/software/inetutils/">inetutils home</a>]</td></tr>
+ <td>Utilitários básicos de redes de computadores. [<a
+href="/software/inetutils/">página do inetutils</a>]</td></tr>
<tr id="jwhois"><td>* <a href="/software/jwhois/manual/">Jwhois</a></td>
- <td>An extended whois client.
- [<a href="/software/jwhois/">jwhois home</a>]</td></tr>
+ <td>Um cliente whois estendido. [<a
+href="/software/jwhois/">página do jwhois</a>]</td></tr>
<tr id="librejs"><td>* <a href="/software/librejs/manual/">Librejs</a></td>
- <td>Browser add-on that blocks nonfree nontrivial JavaScript.
- [<a href="/software/librejs/">librejs home</a>]</td></tr>
+ <td>Complemento de navegador que bloqueia JavaScript não trivial e não
livre.
+[<a href="/software/librejs/">página do librejs</a>]</td></tr>
<tr id="lrzsz"><td>* <a href="/software/lrzsz/">Lrzsz</a></td>
- <td>Implementation of XMODEM/YMODEM/ZMODEM transfer protocols.
- [<a href="/software/lrzsz/">lrzsz home</a>]</td></tr>
+ <td>Implementação dos protocolos de transferência XMODEM/YMODEM/ZMODEM.
[<a
+href="/software/lrzsz/">página do lrzsz</a>]</td></tr>
<tr id="macchanger"><td>* <a href="/software/macchanger/">MAC Changer</a></td>
- <td>Viewing and manipulating MAC addresses of network interfaces.
- [<a href="/software/macchanger/">macchanger home</a>]</td></tr>
+ <td>Visualização e manipulação de endereços MAC de interfaces de
rede. [<a
+href="/software/macchanger/">página do macchanger</a>]</td></tr>
<tr id="mediagoblin"><td>* <a
href="http://docs.mediagoblin.org/">Mediagoblin</a></td>
- <td>Photo and media sharing.
- [<a href="/software/mediagoblin/">mediagoblin home</a>]</td></tr>
+ <td>Compartilhamento de foto e mÃdia. [<a
+href="/software/mediagoblin/">página do mediagoblin</a>]</td></tr>
<tr id="network"><td>* <a href="/software/network/">Network</a></td>
- <td>Initiative to encourage development of free network services.
- [<a href="/software/network/">network home</a>]</td></tr>
+ <td>Iniciativa para encorajar desenvolvimento de serviços de rede livre.
[<a
+href="/software/network/">página do network</a>]</td></tr>
<tr id="pipo"><td>* <a href="/software/pipo/">Pipo</a></td>
- <td>Bulletin board system.
- [<a href="/software/pipo/">pipo home</a>]</td></tr>
+ <td>Sistema de boletins. [<a
+href="/software/pipo/">página do pipo</a>]</td></tr>
<tr id="proxyknife"><td>* <a
href="/software/proxyknife/manual/">Proxyknife</a></td>
- <td>Customizable multithread proxy hunter.
- [<a href="/software/proxyknife/">proxyknife home</a>]</td></tr>
+ <td>Caçador de proxy multithread personalizável. [<a
+href="/software/proxyknife/">página do proxyknife</a>]</td></tr>
<tr id="shishi"><td>* <a href="/software/shishi/#status">Shishi</a></td>
- <td>Implementation of the Kerberos 5 network security system.
- [<a href="/software/shishi/">shishi home</a>]</td></tr>
+ <td>Implementação do sistema de segurança de rede Kerberos 5. [<a
+href="/software/shishi/">página do shishi</a>]</td></tr>
<tr id="social"><td>* <a href="/software/social/">Social</a></td>
- <td>Decentralized social networking server.
- [<a href="/software/social/">social home</a>]</td></tr>
+ <td>Servidor de rede social descentralizado. [<a
+href="/software/social/">página do social</a>]</td></tr>
<tr id="stump"><td>* <a href="/software/stump/">Stump</a></td>
- <td>Secure team-based Usenet moderation program.
- [<a href="/software/stump/">stump home</a>]</td></tr>
+ <td>Programa seguro de moderação de Usenet baseado em equipe. [<a
+href="/software/stump/">página do stump</a>]</td></tr>
<tr id="websocket4j"><td>* <a
href="/software/websocket4j/manual/">Websocket4j</a></td>
- <td>WebSocket protocol implementation for Java-HTML5 communication.
- [<a href="/software/websocket4j/">websocket4j home</a>]</td></tr>
+ <td>Implementação do protocolo WebSocket para comunicação Java-HTML5.
[<a
+href="/software/websocket4j/">página do websocket4j</a>]</td></tr>
<tr id="webstump"><td>* <a href="/software/webstump/">WebSTUMP</a></td>
- <td>Web interface to STUMP.
- [<a href="/software/webstump/">webstump home</a>]</td></tr>
+ <td>Interface web para STUMP. [<a
+href="/software/webstump/">página do webstump</a>]</td></tr>
<tr id="wget"><td>* <a href="/software/wget/manual/">Wget</a></td>
- <td>Non-interactive command-line utility for downloading files.
- [<a href="/software/wget/">wget home</a>]</td></tr>
+ <td>Utilitário de linha de comando não interativo para <i
lang="en">download</i>
+de arquivos. [<a
href="/software/wget/">página do wget</a>]</td></tr>
<tr>
-<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
+<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Comunicação ao
+vivo</b></big></a></td></tr>
<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
- <td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ <td>Um programa de comunicação que respeita a privacidade. [<a
+href="/software/ring/">página do ring</a>]</td></tr>
<tr>
-<td id="Localization" colspan="2" style="padding-top:.8em;
padding-left:16%;"><a
href="http://directory.fsf.org/category/local/"><big><b>Localization</b></big></a></td></tr>
+<td id="Localization" colspan="2" style="padding-top:.8em;
padding-left:16%;"><a
+href="http://directory.fsf.org/category/local/"><big><b>Localização</b></big></a></td></tr>
<tr id="fribidi"><td>* <a href="/software/fribidi/">FriBiDi</a></td>
- <td>Implementation of the Unicode bidirectional algorithm.
- [<a href="/software/fribidi/">fribidi home</a>]</td></tr>
+ <td>Implementação do algoritmo bidirecional Unicode. [<a
+href="/software/fribidi/">página do fribidi</a>]</td></tr>
<tr id="gettext"><td>* <a href="/software/gettext/manual/">Gettext</a></td>
- <td>Tools and documentation for translation.
- [<a href="/software/gettext/">gettext home</a>]</td></tr>
+ <td>Ferramentas e documentação para tradução. [<a
+href="/software/gettext/">página do gettext</a>]</td></tr>
<tr>
-<td id="Mathematics" colspan="2" style="padding-top:.8em;
padding-left:16%;"><a
href="http://directory.fsf.org/category/math/"><big><b>Mathematics</b></big></a></td></tr>
+<td id="Mathematics" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/math/"><big><b>Matemática</b></big></a></td></tr>
<tr id="aris"><td>* <a href="/software/aris/">Aris</a></td>
- <td>Natural deduction first-order logic interface.
- [<a href="/software/aris/">aris home</a>]</td></tr>
+ <td>Interface lógica de primeira ordem para dedução natural. [<a
+href="/software/aris/">página do aris</a>]</td></tr>
<tr id="bc"><td>* <a href="/software/bc/manual/bc.html">Bc</a></td>
- <td>Arbitrary precision numeric processing language.
- [<a href="/software/bc/">bc home</a>]</td></tr>
+ <td>Linguagem de processamento numérico de precisão arbitrária. [<a
+href="/software/bc/">página do bc</a>]</td></tr>
<tr id="c-graph"><td>* <a href="/software/c-graph/manual/">C-graph</a></td>
- <td>Visualizing and demonstrating convolution.
- [<a href="/software/c-graph/">c-graph home</a>]</td></tr>
+ <td>Visualização e demonstração de convolução. [<a
+href="/software/c-graph/">página do c-graph</a>]</td></tr>
<tr id="dap"><td>* <a href="/software/dap/">Dap</a></td>
- <td>Statistics and graphics package.
- [<a href="/software/dap/">dap home</a>]</td></tr>
+ <td>Pacote de estatÃstica e gráficos. [<a
+href="/software/dap/">página do dap</a>]</td></tr>
<tr id="datamash"><td>* <a href="/software/datamash/">Datamash</a></td>
- <td>Scriptable statistics and data calculation.
- [<a href="/software/datamash/">datamash home</a>]</td></tr>
+ <td>Cálculo de dados e estatÃsticas programáveis. [<a
+href="/software/datamash/">página do datamash</a>]</td></tr>
<tr id="dc"><td>* <a href="/software/bc/manual/dc-1.05/">Dc</a></td>
- <td>Arbitrary precision numeric processing with reverse-polish notation.
- [<a href="/software/dc/">dc home</a>]</td></tr>
+ <td>Processamento numérico de precisão arbitrária com notação de
polimento
+reverso. [<a href="/software/dc/">página do dc</a>]</td></tr>
<tr id="gmp"><td>* <a href="/software/gmp/manual/">GMP</a></td>
- <td>Multiple-precision arithmetic library.
- [<a href="/software/gmp/">gmp home</a>]</td></tr>
+ <td>Biblioteca aritmética de precisão múltipla. [<a
+href="/software/gmp/">página do gmp</a>]</td></tr>
-<tr id="gsl"><td>* <a
href="https://www.gnu.org/software/gsl/manual/html_node/">GNU Scientific
Library</a></td>
- <td>Numerical library for C and C++.
- [<a href="/software/gsl/">gsl home</a>]</td></tr>
+<tr id="gsl"><td>* <a
href="https://www.gnu.org/software/gsl/manual/html_node/">GNU
+Scientific Library</a></td>
+ <td>Biblioteca numérica para C e C++. [<a
+href="/software/gsl/">página do gsl</a>]</td></tr>
<tr id="jacal"><td>* <a
href="http://people.csail.mit.edu/jaffer/jacal_toc.html">JACAL</a></td>
- <td>Symbolic mathematics system.
- [<a href="/software/jacal/">jacal home</a>]</td></tr>
+ <td>Sistema de matemática simbólica. [<a
+href="/software/jacal/">página do jacal</a>]</td></tr>
-<tr id="libmatheval"><td>* <a
href="https://www.gnu.org/software/libmatheval/manual/libmatheval.html">Libmatheval</a></td>
- <td>Library for evaluating symbolic expressions.
- [<a href="/software/libmatheval/">libmatheval home</a>]</td></tr>
+<tr id="libmatheval"><td>* <a
+href="https://www.gnu.org/software/libmatheval/manual/libmatheval.html">Libmatheval</a></td>
+ <td>Biblioteca para avaliar expressões simbólicas. [<a
+href="/software/libmatheval/">página do libmatheval</a>]</td></tr>
<tr id="mcsim"><td>* <a
href="http://www.gnu.org/software/mcsim/mcsim.html">MCSim</a></td>
- <td>Monte Carlo simulation and analysis.
- [<a href="/software/mcsim/">mcsim home</a>]</td></tr>
+ <td>Simulação e análise de Monte Carlo. [<a
+href="/software/mcsim/">página do mcsim</a>]</td></tr>
<tr id="metalogic-inference"><td>* <a
href="/software/metalogic-inference/">MLI</a></td>
- <td>Logical proof program.
- [<a
href="/software/metalogic-inference/">metalogic-inference home</a>]</td></tr>
+ <td>Programa de prova lógica. [<a
+href="/software/metalogic-inference/">página do metalogic-inference</a>]</td></tr>
<tr id="mpc"><td>* <a
href="http://www.multiprecision.org/downloads/mpc-1.1.0.pdf">Mpc</a></td>
- <td>C library for arbitrary precision complex arithmetic.
- [<a href="/software/mpc/">mpc home</a>]</td></tr>
+ <td>Biblioteca C para aritmética complexa de precisão arbitrária. [<a
+href="/software/mpc/">página do mpc</a>]</td></tr>
<tr id="mpfr"><td>* <a
href="http://www.mpfr.org/mpfr-current/#doc">Mpfr</a></td>
- <td>C library for arbitrary precision floating-point arithmetic.
- [<a href="/software/mpfr/">mpfr home</a>]</td></tr>
+ <td>Biblioteca C para aritmética de ponto flutuante de precisão
arbitrária. [<a
+href="/software/mpfr/">página do mpfr</a>]</td></tr>
<tr id="mpria"><td>* <a href="/software/mpria/">Mpria</a></td>
- <td>C library for arbitrary precision rational arithmetic.
- [<a href="/software/mpria/">mpria home</a>]</td></tr>
+ <td>Biblioteca C para aritmética racional de precisão arbitrária. [<a
+href="/software/mpria/">página do mpria</a>]</td></tr>
<tr id="octave"><td>* <a href="/software/octave/support.html">Octave</a></td>
- <td>High-level language for numerical computation.
- [<a href="/software/octave/">octave home</a>]</td></tr>
+ <td>Linguagem de alto nÃvel para computação numérica. [<a
+href="/software/octave/">página do octave</a>]</td></tr>
<tr id="pspp"><td>* <a href="/software/pspp/manual/">PSPP</a></td>
- <td>Statistical analysis.
- [<a href="/software/pspp/">pspp home</a>]</td></tr>
+ <td>Análise estatÃstica. [<a
+href="/software/pspp/">página do pspp</a>]</td></tr>
<tr id="r"><td>* <a href="http://cran.r-project.org/#doc">R</a></td>
- <td>Environment for statistical computing and graphics.
- [<a href="/software/r/">r home</a>]</td></tr>
+ <td>Ambiente para computação estatÃstica e gráficos. [<a
+href="/software/r/">página do r</a>]</td></tr>
<tr>
-<td id="Music" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/music/"><big><b>Music</b></big></a></td></tr>
+<td id="Music" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/music/"><big><b>Música</b></big></a></td></tr>
<tr id="cursynth"><td>* <a href="/software/cursynth/">Cursynth</a></td>
- <td>Polyphonic and MIDI subtractive music synthesizer using curses.
- [<a href="/software/cursynth/">cursynth home</a>]</td></tr>
+ <td>Sintetizador de música subtrativo polifônico e MIDI usando curses.
[<a
+href="/software/cursynth/">página do cursynth</a>]</td></tr>
<tr id="denemo"><td>* <a href="/software/denemo/">Denemo</a></td>
- <td>Graphical music notation, front-end to GNU Lilypond.
- [<a href="/software/denemo/">denemo home</a>]</td></tr>
+ <td>Notação de gráfica música, <i lang="en">front-end</i> para o GNU
Lilypond.
+[<a href="/software/denemo/">página do denemo</a>]</td></tr>
<tr id="gtick"><td>* <a href="/software/gtick/">GTick</a></td>
- <td>Customizable metronome application.
- [<a href="/software/gtick/">gtick home</a>]</td></tr>
+ <td>Aplicativo de metrônomo personalizável. [<a
+href="/software/gtick/">página do gtick</a>]</td></tr>
<tr id="lilypond"><td>* <a
href="http://lilypond.org/manuals.html">Lilypond</a></td>
- <td>Music typesetting.
- [<a href="/software/lilypond/">lilypond home</a>]</td></tr>
+ <td>Compositor de música. [<a
+href="/software/lilypond/">página do lilypond</a>]</td></tr>
-<tr id="psychosynth"><td>* <a
href="http://www.psychosynth.com/index.php?title=Documentation">Psychosynth</a></td>
- <td>Interactive software synthesizer.
- [<a href="/software/psychosynth/">psychosynth home</a>]</td></tr>
+<tr id="psychosynth"><td>* <a
+href="http://www.psychosynth.com/index.php?title=Documentation">Psychosynth</a></td>
+ <td>Sintetizador de software interativo. [<a
+href="/software/psychosynth/">página do psychosynth</a>]</td></tr>
<tr id="solfege"><td>* <a href="/software/solfege/">Solfege</a></td>
- <td>Ear training.
- [<a href="/software/solfege/">solfege home</a>]</td></tr>
+ <td>Treinamento de ouvido. [<a
+href="/software/solfege/">página do solfege</a>]</td></tr>
<tr>
-<td id="Printing" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/print/"><big><b>Printing</b></big></a></td></tr>
+<td id="Printing" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/print/"><big><b>Impressão</b></big></a></td></tr>
<tr id="a2ps"><td>* <a href="/software/a2ps/">a2ps</a></td>
- <td>Any file to PostScript, including pretty-printing.
- [<a href="/software/a2ps/">a2ps home</a>]</td></tr>
+ <td>Qualquer arquivo para PostScript, incluindo impressão bonita. [<a
+href="/software/a2ps/">página do a2ps</a>]</td></tr>
<tr id="enscript"><td>* <a href="/software/enscript/">Enscript</a></td>
- <td>Generating PostScript, including pretty-printing.
- [<a href="/software/enscript/">enscript home</a>]</td></tr>
+ <td>Geração de PostScript, incluindo impressão bonita. [<a
+href="/software/enscript/">página do enscript</a>]</td></tr>
<tr id="ghostscript"><td>* <a href="/software/ghostscript/">GNU
Ghostscript</a></td>
- <td>PostScript and PDF interpreter.
- [<a href="/software/ghostscript/">ghostscript home</a>]</td></tr>
+ <td>Interpretador de PostScript e PDF. [<a
+href="/software/ghostscript/">página do ghostscript</a>]</td></tr>
<tr id="gnuspool"><td>* <a href="/software/gnuspool/">GNUspool</a></td>
- <td>Spooling system with a variety of interfaces.
- [<a href="/software/gnuspool/">gnuspool home</a>]</td></tr>
+ <td>Sistema de <i lang="en">spool</i> com uma variedade de interfaces. [<a
+href="/software/gnuspool/">página do gnuspool</a>]</td></tr>
<tr id="gv"><td>* <a href="/software/gv/manual/">Gv</a></td>
- <td>PostScript and PDF viewer using Ghostscript as a back-end.
- [<a href="/software/gv/">gv home</a>]</td></tr>
+ <td>Visualizador de PostScript e PDF usando o Ghostscript como back-end.
[<a
+href="/software/gv/">página do gv</a>]</td></tr>
<tr id="hp2xx"><td>* <a href="/software/hp2xx/">Hp2xx</a></td>
- <td>Convert HP-GL format graphics to other vector and bitmap formats.
- [<a href="/software/hp2xx/">hp2xx home</a>]</td></tr>
+ <td>Converte gráficos em formato HP-GL para outros formatos vetoriais e de
+bitmap. [<a href="/software/hp2xx/">página do hp2xx</a>]</td></tr>
<tr id="pdf"><td>* <a href="/software/pdf/">Pdf</a></td>
- <td>Library and programs for manipulating PDF.
- [<a href="/software/pdf/">pdf home</a>]</td></tr>
+ <td>Biblioteca e programas para manipulação de PDF. [<a
+href="/software/pdf/">página do pdf</a>]</td></tr>
<tr id="trueprint"><td>* <a href="/software/trueprint/">Trueprint</a></td>
- <td>Pretty-print C sources and other plain text to PostScript.
- [<a href="/software/trueprint/">trueprint home</a>]</td></tr>
+ <td>Fontes C de impressão bonita e outro texto simples para PostScript.
[<a
+href="/software/trueprint/">página do trueprint</a>]</td></tr>
<tr>
-<td id="Science" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/science/"><big><b>Science</b></big></a></td></tr>
+<td id="Science" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/science/"><big><b>Ciência</b></big></a></td></tr>
<tr id="archimedes"><td>* <a
href="/software/archimedes/manual/">Archimedes</a></td>
- <td>Semiconductor device simulator.
- [<a href="/software/archimedes/">archimedes home</a>]</td></tr>
+ <td>Simulador de dispositivo semicondutor. [<a
+href="/software/archimedes/">página do archimedes</a>]</td></tr>
<tr id="dionysus"><td>* <a href="/software/dionysus/">Dionysus</a></td>
- <td>Local search for universal constants and scientific values.
- [<a href="/software/dionysus/">dionysus home</a>]</td></tr>
+ <td>Busca local por constantes universais e valores cientÃficos. [<a
+href="/software/dionysus/">página do dionysus</a>]</td></tr>
<tr id="electric"><td>* <a
href="http://www.staticfreesoft.com/jmanual/">Electric</a></td>
- <td>Electrical CAD system.
- [<a href="/software/electric/">electric home</a>]</td></tr>
+ <td>Sistema de CAD elétrico. [<a
+href="/software/electric/">página do electric</a>]</td></tr>
<tr id="gama"><td>* <a href="/software/gama/manual/">Gama</a></td>
- <td>Adjustment of geodetic networks.
- [<a href="/software/gama/">gama home</a>]</td></tr>
+ <td>Ajuste de redes geodésicas. [<a
+href="/software/gama/">página do gama</a>]</td></tr>
<tr id="gbehistun"><td>* <a href="/software/gbehistun/">Gbehistun</a></td>
- <td>Planetary Science tools.
- [<a href="/software/gbehistun/">gbehistun home</a>]</td></tr>
+ <td>Ferramentas de ciência planetária. [<a
+href="/software/gbehistun/">página do gbehistun</a>]</td></tr>
<tr id="gneuralnetwork"><td>* <a href="/software/gneuralnetwork/">Gneural
Network</a></td>
- <td>Programmable neural network.
- [<a
href="/software/gneuralnetwork/">gneuralnetwork home</a>]</td></tr>
+ <td>Rede neural programável. [<a
+href="/software/gneuralnetwork/">página do gneuralnetwork</a>]</td></tr>
<tr id="gnuae"><td>* <a href="/software/gnuae/manual/">GnuAE</a></td>
- <td>Designing alternate energy systems.
- [<a href="/software/gnuae/">gnuae home</a>]</td></tr>
+ <td>Projetando sistemas de energia alternativos. [<a
+href="/software/gnuae/">página do gnuae</a>]</td></tr>
<tr id="gnuastro"><td>* <a href="/software/gnuastro/">Gnuastro</a></td>
- <td>Astronomy utilities.
- [<a href="/software/gnuastro/">gnuastro home</a>]</td></tr>
+ <td>Utilitários de astronomia. [<a
+href="/software/gnuastro/">página do gnuastro</a>]</td></tr>
<tr id="gnucap"><td>* <a
href="/software/gnucap/gnucap-man-html/">GNUcap</a></td>
- <td>Mixed analog and digital circuit simulator.
- [<a href="/software/gnucap/">gnucap home</a>]</td></tr>
+ <td>Simulador de circuito analógico e digital misto. [<a
+href="/software/gnucap/">página do gnucap</a>]</td></tr>
<tr id="goptical"><td>* <a href="/software/goptical/manual/">Goptical</a></td>
- <td>C++ optical design and simulation library.
- [<a href="/software/goptical/">goptical home</a>]</td></tr>
+ <td>Biblioteca C++ de design óptico e de simulação. [<a
+href="/software/goptical/">página do goptical</a>]</td></tr>
<tr id="libredwg"><td>* <a href="/software/libredwg/">Libredwg</a></td>
- <td>C library to handle DWG (CAD-related) files.
- [<a href="/software/libredwg/">libredwg home</a>]</td></tr>
+ <td>Biblioteca C para manipular arquivos DWG (relacionado a CAD). [<a
+href="/software/libredwg/">página do libredwg</a>]</td></tr>
<tr id="lims"><td>* <a href="/software/lims/">Lims</a></td>
- <td>Scientific laboratory information management system.
- [<a href="/software/lims/">lims home</a>]</td></tr>
+ <td>Sistema de gestão de informação cientÃfica em laboratório. [<a
+href="/software/lims/">página do lims</a>]</td></tr>
-<tr id="melting"><td>* <a
href="http://www.ebi.ac.uk/compneur-srv/melting/melting5-doc/melting.html">Melting</a></td>
- <td>Temperature computations for a nucleic acid duplex.
- [<a href="/software/melting/">melting home</a>]</td></tr>
+<tr id="melting"><td>* <a
+href="http://www.ebi.ac.uk/compneur-srv/melting/melting5-doc/melting.html">Melting</a></td>
+ <td>Cálculos de temperatura para um duplex de ácido nucleico. [<a
+href="/software/melting/">página do melting</a>]</td></tr>
<tr id="nano-archimedes"><td>* <a
href="/software/nano-archimedes/">Nano-archimedes</a></td>
- <td>Simulation of quantum systems using the Wigner Monte Carlo method.
- [<a
href="/software/nano-archimedes/">nano-archimedes home</a>]</td></tr>
+ <td>Simulação de sistemas quânticos usando o método de Wigner Monte
Carlo. [<a
+href="/software/nano-archimedes/">página do nano-archimedes</a>]</td></tr>
<tr id="pcb"><td>* <a href="/software/pcb/">Pcb</a></td>
- <td>Design printed circuit board layouts.
- [<a href="/software/pcb/">pcb home</a>]</td></tr>
+ <td>Projete layouts de placa de circuito impresso. [<a
+href="/software/pcb/">página do pcb</a>]</td></tr>
<tr id="polyxmass"><td>* <a href="/software/polyxmass/">Polyxmass</a></td>
- <td>Mass spectrometric data simulations and analyses.
- [<a href="/software/polyxmass/">polyxmass home</a>]</td></tr>
+ <td>Simulações e análises de dados de espectrometria de massa. [<a
+href="/software/polyxmass/">página do polyxmass</a>]</td></tr>
<tr id="spacechart"><td>* <a href="/software/spacechart/">SpaceChart</a></td>
- <td>Stargazing in 3D under GNOME.
- [<a href="/software/spacechart/">spacechart home</a>]</td></tr>
+ <td>Observação das estrelas em 3D sob o GNOME. [<a
+href="/software/spacechart/">página do spacechart</a>]</td></tr>
<tr id="units"><td>* <a href="/software/units/manual/">Units</a></td>
- <td>Conversion between thousands of scales.
- [<a href="/software/units/">units home</a>]</td></tr>
+ <td>Conversão entre milhares de escalas. [<a
+href="/software/units/">página do units</a>]</td></tr>
<tr>
-<td id="Security" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/sec/"><big><b>Security</b></big></a></td></tr>
+<td id="Security" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/sec/"><big><b>Segurança</b></big></a></td></tr>
<tr id="gnu-crypto"><td>* <a
href="https://www.gnu.org/software/gnu-crypto/manual/">Crypto</a></td>
- <td>Cryptographic primitives and tools for Java programming.
- [<a href="/software/gnu-crypto/">gnu-crypto home</a>]</td></tr>
+ <td>Primitivas e ferramentas criptográficas para programação em Java.
[<a
+href="/software/gnu-crypto/">página do gnu-crypto</a>]</td></tr>
<tr id="gnu-pw-mgr"><td>* <a href="/software/gnu-pw-mgr/">GNU-pw-mgr</a></td>
- <td>Retrieve login credentials without recording passwords.
- [<a href="/software/gnu-pw-mgr/">gnu-pw-mgr home</a>]</td></tr>
+ <td>Obtenha credenciais de login sem registrar senhas. [<a
+href="/software/gnu-pw-mgr/">página do gnu-pw-mgr</a>]</td></tr>
-<tr id="gnupg"><td>* <a href="http://www.gnupg.org/documentation/">GnuPG</a>
-<small>(<a
href="https://www.gnupg.org/documentation/manuals/assuan/">assuan</a>
- <a href="https://www.gnupg.org/documentation/manuals/dirmngr/">dirmngr</a>
- <a href="https://www.gnupg.org/documentation/manuals/gcrypt/">gcrypt</a>
- <a href="https://www.gnupg.org/documentation/manuals/gcrypt/">libgcrypt</a>
- <a href="https://www.gnupg.org/documentation/manuals/gnupg/">gnupg<!-- again
--></a>
- <a href="https://www.gnupg.org/documentation/manuals/gpgme/">gpgme</a>
- <a href="https://www.gnupg.org/documentation/manuals/ksba/">ksba</a>)</small>
+<tr id="gnupg"><td><!-- again -->
+* <a href="http://www.gnupg.org/documentation/">GnuPG</a> <small>(<a
+href="https://www.gnupg.org/documentation/manuals/assuan/">assuan</a> <a
+href="https://www.gnupg.org/documentation/manuals/dirmngr/">dirmngr</a> <a
+href="https://www.gnupg.org/documentation/manuals/gcrypt/">gcrypt</a> <a
+href="https://www.gnupg.org/documentation/manuals/gcrypt/">libgcrypt</a> <a
+href="https://www.gnupg.org/documentation/manuals/gnupg/">gnupg</a> <a
+href="https://www.gnupg.org/documentation/manuals/gpgme/">gpgme</a> <a
+href="https://www.gnupg.org/documentation/manuals/ksba/">ksba</a>)</small>
</td>
- <td>GNU Privacy Guard.
- [<a href="/software/gnupg/">gnupg home</a>]</td></tr>
+ <td>GNU Privacy Guard (i.e. guardião de privacidade). [<a
+href="/software/gnupg/">página do gnupg</a>]</td></tr>
<tr id="gvpe"><td>* <a href="/software/gvpe/">GVPE</a></td>
- <td>Secure VPN among multiple nodes over an untrusted network.
- [<a href="/software/gvpe/">gvpe home</a>]</td></tr>
+ <td>VPN segura entre vários nós em uma rede não confiável. [<a
+href="/software/gvpe/">página do gvpe</a>]</td></tr>
<tr id="libtasn1"><td>* <a href="/software/libtasn1/manual/">Libtasn1</a></td>
- <td>ASN.1 library.
- [<a href="/software/libtasn1/">libtasn1 home</a>]</td></tr>
+ <td>Biblioteca ASN.1. [<a
+href="/software/libtasn1/">página do libtasn1</a>]</td></tr>
<tr id="lsh"><td>* <a
href="http://www.lysator.liu.se/~nisse/lsh/lsh.html">Lsh</a></td>
- <td>GNU implementation of the Secure Shell (ssh) protocols.
- [<a href="/software/lsh/">lsh home</a>]</td></tr>
+ <td>Implementação do GNU de protocolos de Secure Shell (ssh). [<a
+href="/software/lsh/">página do lsh</a>]</td></tr>
<tr id="nettle"><td>* <a
href="http://www.lysator.liu.se/~nisse/nettle/nettle.html">Nettle</a></td>
- <td>C library for low-level cryptographic functionality.
- [<a href="/software/nettle/">nettle home</a>]</td></tr>
+ <td>Biblioteca C para funcionalidade criptográfica de baixo nÃvel. [<a
+href="/software/nettle/">página do nettle</a>]</td></tr>
<tr id="radius"><td>* <a href="/software/radius/manual/">Radius</a></td>
- <td>Authentication and accounting services and daemon.
- [<a href="/software/radius/">radius home</a>]</td></tr>
+ <td>Serviços de autenticação e contabilidade e daemon. [<a
+href="/software/radius/">página do radius</a>]</td></tr>
-<tr id="userv"><td>* <a
href="http://www.chiark.greenend.org.uk/~ian/userv/spec.html/">Userv</a></td>
- <td>Daemon to control service access.
- [<a href="/software/userv/">userv home</a>]</td></tr>
+<tr id="userv"><td>* <a
+href="http://www.chiark.greenend.org.uk/~ian/userv/spec.html/">Userv</a></td>
+ <td>Daemon para controlar acesso a serviços. [<a
+href="/software/userv/">página do userv</a>]</td></tr>
<tr>
-<td id="Software" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/dev/"><big><b>Software
development</b></big></a></td></tr>
+<td id="Software" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/dev/"><big><b>Desenvolvimento de
+software</b></big></a></td></tr>
<tr id="apl"><td>* <a href="/software/apl/">APL</a></td>
- <td>APL interpreter.
- [<a href="/software/apl/">apl home</a>]</td></tr>
+ <td>Interpretador de APL. [<a
+href="/software/apl/">página do apl</a>]</td></tr>
<tr id="autoconf"><td>* <a href="/software/autoconf/manual/">Autoconf</a></td>
- <td>Create source code configuration scripts.
- [<a href="/software/autoconf/">autoconf home</a>]</td></tr>
+ <td>Criação de scripts de configuração de código-fonte. [<a
+href="/software/autoconf/">página do autoconf</a>]</td></tr>
<tr id="autoconf-archive"><td>* <a
href="/software/autoconf-archive/">Autoconf-archive</a></td>
- <td>Collection of freely reusable Autoconf macros.
- [<a
href="/software/autoconf-archive/">autoconf-archive home</a>]</td></tr>
+ <td>Coleção de macros de Autoconf livremente reusáveis. [<a
+href="/software/autoconf-archive/">página do autoconf-archive</a>]</td></tr>
<tr id="autogen"><td>* <a href="/software/autogen/manual/">Autogen</a></td>
- <td>Automated program generator.
- [<a href="/software/autogen/">autogen home</a>]</td></tr>
+ <td>Gerador automatizado de programa. [<a
+href="/software/autogen/">página do autogen</a>]</td></tr>
<tr id="automake"><td>* <a href="/software/automake/manual/">Automake</a></td>
- <td>Making GNU standards-compliant Makefiles.
- [<a href="/software/automake/">automake home</a>]</td></tr>
+ <td>Criação de Makefiles compatÃveis com o padrão do GNU. [<a
+href="/software/automake/">página do automake</a>]</td></tr>
<tr id="bash"><td>* <a href="/software/bash/manual/">Bash</a></td>
- <td>The GNU Bourne-Again SHell.
- [<a href="/software/bash/">bash home</a>]</td></tr>
+ <td>O GNU Bourne-Again SHell. [<a
+href="/software/bash/">página do bash</a>]</td></tr>
-<tr id="binutils"><td>* <a href="/software/binutils/manual/">Binutils</a>
-<small>(<a href="https://sourceware.org/binutils/docs/as/">as</a>
- <a href="https://sourceware.org/binutils/docs/bfd/">bfd</a>
- <a href="https://sourceware.org/binutils/docs/binutils/">binutils<!-- again
--></a>
- <a href="https://sourceware.org/binutils/docs/gprof/">gprof</a>
- <a href="https://sourceware.org/binutils/docs/ld/">ld</a>)</small>
+<tr id="binutils"><td><!-- again -->
+* <a href="/software/binutils/manual/">Binutils</a> <small>(<a
+href="https://sourceware.org/binutils/docs/as/">as</a> <a
+href="https://sourceware.org/binutils/docs/bfd/">bfd</a> <a
+href="https://sourceware.org/binutils/docs/binutils/">binutils</a> <a
+href="https://sourceware.org/binutils/docs/gprof/">gprof</a> <a
+href="https://sourceware.org/binutils/docs/ld/">ld</a>)</small>
</td>
- <td>Binary utilities: bfd gas gprof ld.
- [<a href="/software/binutils/">binutils home</a>]</td></tr>
+ <td>Utilitários de binários: bfd gas gprof ld. [<a
+href="/software/binutils/">página do binutils</a>]</td></tr>
<tr id="bison"><td>* <a href="/software/bison/manual/">Bison</a></td>
- <td>Parser generator.
- <br/>Available in print:
- <cite><a href="http://shop.fsf.org/product/bison-manual/">The Bison
Manual</a></cite>.
- [<a href="/software/bison/">bison home</a>]</td></tr>
+ <td>Gerador de analisador.
+ <br/>DisponÃvel impresso: <cite><a
+href="http://shop.fsf.org/product/bison-manual/">O manual do
+Bison</a></cite>. [<a
href="/software/mdk/">página do mdk</a>]</td></tr>
<tr id="ccide"><td>* <a href="/software/ccide/">Ccide</a></td>
- <td>Decision table code generator.
- [<a href="/software/ccide/">ccide home</a>]</td></tr>
+ <td>Gerador de código de tabela de decisão. [<a
+href="/software/ccide/">página do ccide</a>]</td></tr>
<tr id="cflow"><td>* <a href="/software/cflow/manual/">Cflow</a></td>
- <td>Create a graph of control flow within a program.
- [<a href="/software/cflow/">cflow home</a>]</td></tr>
+ <td>Crie um grafo de fluxo de controle dentro de um programa. [<a
+href="/software/cflow/">página do cflow</a>]</td></tr>
<tr id="cim"><td>* <a href="/software/cim/">Cim</a></td>
- <td>Simula compiler.
- [<a href="/software/cim/">cim home</a>]</td></tr>
+ <td>Compilador de Simula. [<a
+href="/software/cim/">página do cim</a>]</td></tr>
<tr id="clisp"><td>* <a
href="/software/clisp/impnotes/clisp.html">CLISP</a></td>
- <td>A Common Lisp implementation.
- [<a href="/software/clisp/">clisp home</a>]</td></tr>
+ <td>Uma implementação do Common Lisp. [<a
+href="/software/clisp/">página do clisp</a>]</td></tr>
<tr id="complexity"><td>* <a
href="/software/complexity/manual/">Complexity</a></td>
- <td>Analyze complexity of C functions.
- [<a href="/software/complexity/">complexity home</a>]</td></tr>
+ <td>Análise de complexidade de funções C. [<a
+href="/software/complexity/">página do complexity</a>]</td></tr>
<tr id="config"><td>* <a href="/software/config/">Config</a></td>
- <td>Ubiquitious config.guess and config.sub scripts.
- [<a href="/software/config/">config home</a>]</td></tr>
+ <td>Scripts onipresentes config.guess e config.sub. [<a
+href="/software/config/">página do config</a>]</td></tr>
<tr id="coreutils"><td>* <a
href="/software/coreutils/manual/">Coreutils</a></td>
- <td>Core GNU utilities (file, text, shell).
- [<a href="/software/coreutils/">coreutils home</a>]</td></tr>
+ <td>Utilitários principais do GNU (arquivo, texto, shell). [<a
+href="/software/coreutils/">página do coreutils</a>]</td></tr>
<tr id="cppi"><td>* <a href="/software/cppi/manual/">Cppi</a></td>
- <td>Indent C preprocessor directives to reflect nesting and more.
- [<a href="/software/cppi/">cppi home</a>]</td></tr>
+ <td>Aplica recuo de diretivas do pré-processador C para refletir o
aninhamento e
+mais. [<a href="/software/cppi/">página do cppi</a>]</td></tr>
-<tr id="ddd"><td>* <a
href="https://www.gnu.org/software/ddd/manual/html_mono/ddd.html">DDD</a></td>
- <td>Graphical front-end for GDB and other debuggers.
- [<a href="/software/ddd/">ddd home</a>]</td></tr>
+<tr id="ddd"><td>* <a
+href="https://www.gnu.org/software/ddd/manual/html_mono/ddd.html">DDD</a></td>
+ <td>Front-end gráfico para o GDB e outros depuradores. [<a
+href="/software/ddd/">página do ddd</a>]</td></tr>
<tr id="dejagnu"><td>* <a href="/software/dejagnu/manual/">DejaGnu</a></td>
- <td>GNU software testing framework.
- [<a href="/software/dejagnu/">dejagnu home</a>]</td></tr>
+ <td>Framework de teste de softwares GNU. [<a
+href="/software/dejagnu/">página do dejagnu</a>]</td></tr>
<tr id="djgpp"><td>* <a href="/software/djgpp/">DJGPP</a></td>
- <td>Development system and GNU utilities for DOS on x86 hardware.
- [<a href="/software/djgpp/">djgpp home</a>]</td></tr>
+ <td>Sistema de desenvolvimento e utilitários GNU para DOS em hardware
x86. [<a
+href="/software/djgpp/">página do djgpp</a>]</td></tr>
<tr id="edma"><td>* <a href="/software/edma/">EDMA</a></td>
- <td>Object-oriented component-based development environment.
- [<a href="/software/edma/">edma home</a>]</td></tr>
+ <td>Ambiente de desenvolvimento baseado em componentes orientado a objeto.
[<a
+href="/software/edma/">página do edma</a>]</td></tr>
<tr id="epsilon"><td>* <a href="/software/epsilon/manual/">Epsilon</a></td>
- <td>A purely functional programming language.
- [<a href="/software/epsilon/">epsilon home</a>]</td></tr>
+ <td>Uma linguagem de programação puramente funcional. [<a
+href="/software/epsilon/">página do epsilon</a>]</td></tr>
<tr id="findutils"><td>* <a
href="/software/findutils/manual/">Findutils</a></td>
- <td>Operating on files matching given criteria.
- [<a href="/software/findutils/">findutils home</a>]</td></tr>
+ <td>Operação em arquivos que correspondem a critérios dados. [<a
+href="/software/findutils/">página do findutils</a>]</td></tr>
-<tr id="gcc"><td>* <a href="/software/gcc/">GCC</a>
-<small>(<a href="https://gcc.gnu.org/onlinedocs/cpp/">cpp</a>
- <a href="https://gcc.gnu.org/onlinedocs/cppinternals/">cppinternals</a>
- <a href="https://gcc.gnu.org/onlinedocs/gcc/">gcc<!-- again --></a>
- <a href="https://gcc.gnu.org/onlinedocs/gccint/">gccint</a>
- <a href="https://gcc.gnu.org/onlinedocs/gfc-internals/">gfc-internals</a>
- <a href="https://gcc.gnu.org/onlinedocs/gfortran/">gfortran</a>
- <a href="https://gcc.gnu.org/onlinedocs/gnat-style/">gnat-style</a>
- <a href="https://gcc.gnu.org/onlinedocs/gnat_rm/">gnat_rm</a>
- <a href="https://gcc.gnu.org/onlinedocs/gnat_ugn/">gnat_ugn</a>
- <a href="https://gcc.gnu.org/onlinedocs/libgomp/">libgomp</a>
- <a href="https://gcc.gnu.org/onlinedocs/libiberty/">libiberty</a>
- <a href="https://gcc.gnu.org/onlinedocs/libstdc++/">libstdc++</a>)</small>
+<tr id="gcc"><td><!-- again -->
+* <a href="/software/gcc/">GCC</a> <small>(<a
+href="https://gcc.gnu.org/onlinedocs/cpp/">cpp</a> <a
+href="https://gcc.gnu.org/onlinedocs/cppinternals/">cppinternals</a> <a
+href="https://gcc.gnu.org/onlinedocs/gcc/">gcc</a> <a
+href="https://gcc.gnu.org/onlinedocs/gccint/">gccint</a> <a
+href="https://gcc.gnu.org/onlinedocs/gfc-internals/">gfc-internals</a> <a
+href="https://gcc.gnu.org/onlinedocs/gfortran/">gfortran</a> <a
+href="https://gcc.gnu.org/onlinedocs/gnat-style/">gnat-style</a> <a
+href="https://gcc.gnu.org/onlinedocs/gnat_rm/">gnat_rm</a> <a
+href="https://gcc.gnu.org/onlinedocs/gnat_ugn/">gnat_ugn</a> <a
+href="https://gcc.gnu.org/onlinedocs/libgomp/">libgomp</a> <a
+href="https://gcc.gnu.org/onlinedocs/libiberty/">libiberty</a> <a
+href="https://gcc.gnu.org/onlinedocs/libstdc++/">libstdc++</a>)</small>
</td>
<td>GNU Compiler Collection.
- <br/>Available in print:
- <cite><a
href="http://shop.fsf.org/product/using-gcc-gnu-compiler-collection-reference-manual/">Using
GCC: The GNU Compiler Collection Reference Manual</a></cite>.
- [<a href="/software/gcc/">gcc home</a>]</td></tr>
+ <br/>DisponÃvel impresso: <cite><a
+href="http://shop.fsf.org/product/using-gcc-gnu-compiler-collection-reference-manual/">Using
+GCC: The GNU Compiler Collection Reference Manual</a></cite>. [<a
+href="/software/gcc/">página do gcc</a>]</td></tr>
<tr id="gcl"><td>* <a href="/software/gcl/">GNU Common Lisp</a></td>
- <td>A Common Lisp implementation.
- [<a href="/software/gcl/">gcl home</a>]</td></tr>
+ <td>Uma implementação do Common Lisp. [<a
+href="/software/gcl/">página do gcl</a>]</td></tr>
-<tr id="gdb"><td>* <a href="/software/gdb/documentation/">GDB</a>
-<small>(<a href="https://sourceware.org/gdb/current/onlinedocs/gdb/">gdb<!--
again --></a>
- <a
href="https://sourceware.org/gdb/current/onlinedocs/stabs/">stabs</a>)</small>
+<tr id="gdb"><td><!-- again -->
+* <a href="/software/gdb/documentation/">GDB</a> <small>(<a
+href="https://sourceware.org/gdb/current/onlinedocs/gdb/">gdb</a> <a
+href="https://sourceware.org/gdb/current/onlinedocs/stabs/">stabs</a>)</small>
</td>
- <td>The GNU debugger.
- <br/>Available in print:
- <cite><a
href="http://shop.fsf.org/product/debugging-gdb-gnu-source-level-debugger-10/">Debugging
with GDB: The GNU Source-Level Debugger</a></cite>.
- [<a href="/software/gdb/">gdb home</a>]</td></tr>
+ <td>O depurador do GNU.
+ <br/>DisponÃvel impresso: <cite><a
+href="http://shop.fsf.org/product/debugging-gdb-gnu-source-level-debugger-10/">Debugging
+with GDB: The GNU Source-Level Debugger</a></cite>. [<a
+href="/software/gdb/">página do gdb</a>]</td></tr>
<tr id="gengen"><td>* <a href="/software/gengen/gengen.html">Gengen</a></td>
- <td>A parameterized-text-generator generator based on a template.
- [<a href="/software/gengen/">gengen home</a>]</td></tr>
+ <td>Um gerador de gerador-parametrizado-por-texto baseado em um modelo.
[<a
+href="/software/gengen/">página do gengen</a>]</td></tr>
<tr id="gengetopt"><td>* <a
href="/software/gengetopt/gengetopt.html">Gengetopt</a></td>
- <td>Create parsers for command line options.
- [<a href="/software/gengetopt/">gengetopt home</a>]</td></tr>
+ <td>Cria analisadores para opções de linha de comando. [<a
+href="/software/gengetopt/">página do gengetopt</a>]</td></tr>
-<tr id="gforth"><td>* <a
href="https://www.complang.tuwien.ac.at/forth/gforth/Docs-html/">Gforth</a></td>
- <td>Forth interpreter.
- [<a href="/software/gforth/">gforth home</a>]</td></tr>
-
-<tr id="global"><td>* <a
href="https://www.gnu.org/software/global/manual/global.html">Global</a></td>
- <td>Cross-environment source code tag system.
- [<a href="/software/global/">global home</a>]</td></tr>
+<tr id="gforth"><td>* <a
+href="https://www.complang.tuwien.ac.at/forth/gforth/Docs-html/">Gforth</a></td>
+ <td>Interpretador de Forth. [<a
+href="/software/gforth/">página do gforth</a>]</td></tr>
+
+<tr id="global"><td>* <a
+href="https://www.gnu.org/software/global/manual/global.html">Global</a></td>
+ <td>Sistema de tag de código-fonte de ambiente cruzado. [<a
+href="/software/global/">página do global</a>]</td></tr>
<tr id="glue"><td>* <a href="/software/glue/">GLUE</a></td>
- <td>Distributed groupware application framework.
- [<a href="/software/glue/">glue home</a>]</td></tr>
+ <td>Estrutura de aplicativo de groupware distribuÃdo. [<a
+href="/software/glue/">página do glue</a>]</td></tr>
<tr id="gnat"><td>* <a href="/software/gnat/">GNAT</a></td>
- <td>Ada compiler.
- [<a href="/software/gnat/">gnat home</a>]</td></tr>
+ <td>Compilador de Ada. [<a
href="/software/gnat/">página do gnat</a>]</td></tr>
<tr id="gnats"><td>* <a href="/software/gnats/#documentation">GNATS</a></td>
- <td>GNU problem report and bug management system.
- [<a href="/software/gnats/">gnats home</a>]</td></tr>
+ <td>Sistema GNU para relatório de problemas e gerenciamento de bugs. [<a
+href="/software/gnats/">página do gnats</a>]</td></tr>
<tr id="gnatsweb"><td>* <a href="/software/gnatsweb/">Gnatsweb</a></td>
- <td>Web interface to GNATS.
- [<a href="/software/gnatsweb/">gnatsweb home</a>]</td></tr>
+ <td>Interface web para o GNATS. [<a
+href="/software/gnatsweb/">página do gnatsweb</a>]</td></tr>
-<tr id="gnu-c-manual"><td>* <a
href="https://www.gnu.org/software/gnu-c-manual/gnu-c-manual.html">GNU C
reference manual</a></td>
- <td>Reference manual for the C programming language.
- [<a href="/software/gnu-c-manual/">gnu-c-manual home</a>]</td></tr>
+<tr id="gnu-c-manual"><td>* <a
+href="https://www.gnu.org/software/gnu-c-manual/gnu-c-manual.html">Manual de
+referência C do GNU</a></td>
+ <td>Manual de referência para a linguagem de programação C. [<a
+href="/software/gnu-c-manual/">página do gnu-c-manual</a>]</td></tr>
<tr id="gnucobol"><td>* <a
href="http://open-cobol.sourceforge.net/doc/gnucobol.html">GnuCOBOL</a></td>
- <td>A modern COBOL compiler.
- [<a href="/software/gnucobol/">gnucobol home</a>]</td></tr>
+ <td>Um compilador moderno de COBOL. [<a
+href="/software/gnucobol/">página do gnucobol</a>]</td></tr>
<tr id="gnulib"><td>* <a href="/software/gnulib/manual/">GNUlib</a></td>
- <td>Source files to share among distributions.
- [<a href="/software/gnulib/">gnulib home</a>]</td></tr>
+ <td>Arquivos fontes para compartilhar entre distribuições. [<a
+href="/software/gnulib/">página do gnulib</a>]</td></tr>
<tr id="gnumach"><td>* <a
href="/software/hurd/microkernel/mach/documentation.html">Mach</a></td>
- <td>Microkernel of the GNU system.
- [<a href="/software/gnumach/">gnumach home</a>]</td></tr>
+ <td>Microkernel do sistema GNU. [<a
+href="/software/gnumach/">página do gnumach</a>]</td></tr>
-<tr id="gnuprologjava"><td>* <a
href="/software/gnuprologjava/api/">GNUprologjava</a>
-<small>(<a
href="https://www.gnu.org/software/gnuprologjava/manual/">gnuprologjava<!--
again --></a>)</small>
+<tr id="gnuprologjava"><td><!-- again -->
+* <a href="/software/gnuprologjava/api/">GNUprologjava</a> <small>(<a
+href="https://www.gnu.org/software/gnuprologjava/manual/">gnuprologjava</a>)</small>
</td>
- <td>Implementation of Prolog as a Java library.
- [<a
href="/software/gnuprologjava/">gnuprologjava home</a>]</td></tr>
+ <td>Implementação de Prolog como uma biblioteca Java. [<a
+href="/software/gnuprologjava/">página do gnuprologjava</a>]</td></tr>
<tr id="gnustep"><td>* <a
href="http://www.gnustep.org/developers/documentation.html">GNUstep</a></td>
- <td>Object-oriented application development environment.
- [<a href="/software/gnustep/">gnustep home</a>]</td></tr>
+ <td>Ambiente de desenvolvimento de aplicativos orientado a objeto. [<a
+href="/software/edma/">página do gnustep</a>]</td></tr>
<tr id="gorm"><td>* <a
href="http://wiki.gnustep.org/index.php/Gorm_Manual">Gorm</a></td>
- <td>GNUstep interface designer.
- [<a href="/software/gorm/">gorm home</a>]</td></tr>
+ <td>Designer de interface GNUstep. [<a
+href="/software/gorm/">página do gorm</a>]</td></tr>
<tr id="gperf"><td>* <a href="/software/gperf/manual/">Gperf</a></td>
- <td>Perfect hash function generator.
- [<a href="/software/gperf/">gperf home</a>]</td></tr>
+ <td>Gerador de função de hash perfeita. [<a
+href="/software/gperf/">página do gperf</a>]</td></tr>
<tr id="gprolog"><td>* <a
href="http://www.gprolog.org/manual/">Gprolog</a></td>
- <td>Prolog compiler.
- [<a href="/software/gprolog/">gprolog home</a>]</td></tr>
+ <td>Compilador de Prolog. [<a
+href="/software/gprolog/">página do gprolog</a>]</td></tr>
<tr id="greg"><td>* <a href="/software/greg/gregdoc.html">Greg</a></td>
- <td>Software testing framework.
- [<a href="/software/greg/">greg home</a>]</td></tr>
+ <td>Framework de teste de software. [<a
+href="/software/greg/">página do greg</a>]</td></tr>
<tr id="guile"><td>* <a href="/software/guile/manual/">Guile</a></td>
- <td>Scheme implementation intended especially for extensions.
- [<a href="/software/guile/">guile home</a>]</td></tr>
+ <td>Implementação de Scheme destinada especialmente para extensões. [<a
+href="/software/guile/">página do guile</a>]</td></tr>
-<tr id="guile-gnome"><td>* <a
href="/software/guile-gnome/docs/">Guile-gnome</a>
-<small>(<a
href="https://www.gnu.org/software/guile-gnome/docs/atk/html/">atk</a>
- <a
href="https://www.gnu.org/software/guile-gnome/docs/clutter-glx/html/">clutter-glx</a>
- <a
href="https://www.gnu.org/software/guile-gnome/docs/clutter/html/">clutter</a>
- <a href="https://www.gnu.org/software/guile-gnome/docs/corba/html/">corba</a>
- <a href="https://www.gnu.org/software/guile-gnome/docs/gconf/html/">gconf</a>
- <a href="https://www.gnu.org/software/guile-gnome/docs/gdk/html/">gdk</a>
- <a href="https://www.gnu.org/software/guile-gnome/docs/glib/html/">glib</a>
- <a
href="https://www.gnu.org/software/guile-gnome/docs/gnome-vfs/html/">gnome-vfs</a>
- <a
href="https://www.gnu.org/software/guile-gnome/docs/gobject/html/">gobject</a>
- <a href="https://www.gnu.org/software/guile-gnome/docs/gtk/html/">gtk</a>
- <a
href="https://www.gnu.org/software/guile-gnome/docs/libglade/html/">libglade</a>
- <a
href="https://www.gnu.org/software/guile-gnome/docs/libgnome/html/">libgnome</a>
- <a
href="https://www.gnu.org/software/guile-gnome/docs/libgnomecanvas/html/">libgnomecanvas</a>
- <a
href="https://www.gnu.org/software/guile-gnome/docs/libgnomeui/html/">libgnomeui</a>
- <a href="https://www.gnu.org/software/guile-gnome/docs/pango/html/">pango</a>
- <a
href="https://www.gnu.org/software/guile-gnome/docs/pangocairo/html/">pangocairo</a>)</small>
+<tr id="guile-gnome"><td>* <a
href="/software/guile-gnome/docs/">Guile-gnome</a> <small>(<a
+href="https://www.gnu.org/software/guile-gnome/docs/atk/html/">atk</a> <a
+href="https://www.gnu.org/software/guile-gnome/docs/clutter-glx/html/">clutter-glx</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/clutter/html/">clutter</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/corba/html/">corba</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/gconf/html/">gconf</a>
+<a href="https://www.gnu.org/software/guile-gnome/docs/gdk/html/">gdk</a> <a
+href="https://www.gnu.org/software/guile-gnome/docs/glib/html/">glib</a> <a
+href="https://www.gnu.org/software/guile-gnome/docs/gnome-vfs/html/">gnome-vfs</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/gobject/html/">gobject</a>
+<a href="https://www.gnu.org/software/guile-gnome/docs/gtk/html/">gtk</a> <a
+href="https://www.gnu.org/software/guile-gnome/docs/libglade/html/">libglade</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/libgnome/html/">libgnome</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/libgnomecanvas/html/">libgnomecanvas</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/libgnomeui/html/">libgnomeui</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/pango/html/">pango</a>
+<a
+href="https://www.gnu.org/software/guile-gnome/docs/pangocairo/html/">pangocairo</a>)</small>
</td>
- <td>Guile interface for GTK+ programming for GNOME.
- [<a href="/software/guile-gnome/">guile-gnome home</a>]</td></tr>
+ <td>Interface Guile para programação em GTK+ para o GNOME. [<a
+href="/software/guile-gnome/">página do guile-gnome</a>]</td></tr>
<tr id="guile-rpc"><td>* <a
href="/software/guile-rpc/manual/">Guile-rpc</a></td>
- <td>Pure Scheme implementation for the ONC RPC standard.
- [<a href="/software/guile-rpc/">guile-rpc home</a>]</td></tr>
+ <td>Implementação do Pure Scheme para o padrão ONC RPC. [<a
+href="/software/guile-rpc/">página do guile-rpc</a>]</td></tr>
<tr id="hello"><td>* <a href="/software/hello/manual/">Hello</a></td>
- <td>Hello, GNU world: An example GNU package.
- [<a href="/software/hello/">hello home</a>]</td></tr>
+ <td>Olá, mundo GNU: Um exemplo de pacote GNU. [<a
+href="/software/hello/">página do hello</a>]</td></tr>
<tr id="hurd"><td>* <a href="/software/hurd/doc/doc.html">Hurd</a></td>
- <td>The kernel servers for the GNU operating system.
- [<a href="/software/hurd/">hurd home</a>]</td></tr>
+ <td>Os servidores do kernel para o sistema operacional GNU. [<a
+href="/software/hurd/">página do hurd</a>]</td></tr>
<tr id="idutils"><td>* <a href="/software/idutils/manual/">Idutils</a></td>
- <td>Identifier database utilities.
- [<a href="/software/idutils/">idutils home</a>]</td></tr>
+ <td>Utilitários do banco de dados de identificadores. [<a
+href="/software/idutils/">página do idutils</a>]</td></tr>
<tr id="indent"><td>* <a href="/software/indent/manual/">Indent</a></td>
- <td>Code reformatter.
- [<a href="/software/indent/">indent home</a>]</td></tr>
+ <td>Reformatador de código. [<a
+href="/software/indent/">página do indent</a>]</td></tr>
<tr id="kawa"><td>* <a href="/software/kawa/">Kawa</a></td>
- <td>Java framework and implementation of Scheme, Elisp, and more.
- [<a href="/software/kawa/">kawa home</a>]</td></tr>
+ <td>Framework Java e implementação de Scheme, Elisp e muito mais. [<a
+href="/software/kawa/">página do kawa</a>]</td></tr>
<tr id="kopi"><td>* <a href="/software/kopi/">Kopi</a></td>
- <td>Java development environment for interactive database applications.
- [<a href="/software/kopi/">kopi home</a>]</td></tr>
+ <td>Ambiente de desenvolvimento Java para aplicativos interativos de banco
de
+dados. [<a href="/software/kopi/">página do kopi</a>]</td></tr>
<tr id="liberty-eiffel"><td>* <a href="/software/liberty-eiffel/">Liberty
Eiffel</a></td>
- <td>Eiffel compiler.
- [<a
href="/software/liberty-eiffel/">liberty-eiffel home</a>]</td></tr>
+ <td>Compilador de Eiffel. [<a
+href="/software/liberty-eiffel/">página do liberty-eiffel</a>]</td></tr>
<tr id="libsigsegv"><td>* <a href="/software/libsigsegv/">Libsigsegv</a></td>
- <td>Library for handling page faults.
- [<a href="/software/libsigsegv/">libsigsegv home</a>]</td></tr>
+ <td>Biblioteca para lidar com falhas de página. [<a
+href="/software/libsigsegv/">página do libsigsegv</a>]</td></tr>
<tr id="linux-libre"><td>* <a
href="/software/linux-libre/">Linux-libre</a></td>
- <td>100% free redistribution of a cleaned Linux kernel.
- [<a href="/software/linux-libre/">linux-libre home</a>]</td></tr>
+ <td>Redistribuição 100% livre de um kernel Linux limpo. [<a
+href="/software/linux-libre/">página do linux-libre</a>]</td></tr>
-<tr id="lispintro"><td>* <a
href="/software/emacs/emacs-lisp-intro/emacs-lisp-intro.html">Lispintro</a></td>
- <td>Introduction to programming in Emacs Lisp.
- <br/>Available in print:
- <cite><a
href="http://shop.fsf.org/product/Intro_to_Emacs_Lisp_3rd_Ed/">An Introduction
to Emacs Lisp</a></cite>.
- [<a href="/software/lispintro/">lispintro home</a>]</td></tr>
+<tr id="lispintro"><td>* <a
+href="/software/emacs/emacs-lisp-intro/emacs-lisp-intro.html">Lispintro</a></td>
+ <td>Introdução à programação no Lisp do Emacs.
+ <br/>DisponÃvel impresso: <cite><a
+href="http://shop.fsf.org/product/Intro_to_Emacs_Lisp_3rd_Ed/">An
+Introduction to Emacs Lisp</a></cite>. [<a
+href="/software/lispintro/">página do lispintro</a>]</td></tr>
<tr id="make"><td>* <a href="/software/make/manual/">Make</a></td>
- <td>Remake files automatically.
- [<a href="/software/make/">make home</a>]</td></tr>
+ <td>Recria arquivos automaticamente. [<a
+href="/software/make/">página do make</a>]</td></tr>
<tr id="marst"><td>* <a href="/software/marst/">MARST</a></td>
- <td>Algol-to-C translator.
- [<a href="/software/marst/">marst home</a>]</td></tr>
+ <td>Tradução Algol para C. [<a
+href="/software/marst/">página do marst</a>]</td></tr>
<tr id="mig"><td>* <a href="/software/mig/">Mig</a></td>
- <td>Mach 3.0 interface generator for the Hurd.
- [<a href="/software/mig/">mig home</a>]</td></tr>
+ <td>Gerador de interface Mach 3.0 para o Hurd. [<a
+href="/software/mig/">página do mig</a>]</td></tr>
<tr id="mit-scheme"><td>* <a
href="/software/mit-scheme/#Documentation">MIT/GNU Scheme</a>
-<small>(<a
href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-imail/">mit-scheme-imail</a>
- <a
href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-ref/">mit-scheme-ref</a>
- <a
href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/">sos</a>
- <a
href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-user/">mit-scheme-user</a>)</small>
+<small>(<a
+href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-imail/">mit-scheme-imail</a>
+<a
+href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-ref/">mit-scheme-ref</a>
+<a
+href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/">sos</a>
+<a
+href="https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-user/">mit-scheme-user</a>)</small>
</td>
- <td>A Scheme implementation with integrated editor and debugger.
- [<a href="/software/mit-scheme/">mit-scheme home</a>]</td></tr>
+ <td>Uma implementação de Scheme com editor e depurador integrados. [<a
+href="/software/mit-scheme/">página do mit-scheme</a>]</td></tr>
<tr id="pascal"><td>* <a href="http://www.gnu-pascal.de/gpc/">Pascal</a></td>
- <td>GNU Pascal compiler.
- [<a href="/software/pascal/">pascal home</a>]</td></tr>
+ <td>Compilador GNU Pascal. [<a
+href="/software/pascal/">página do pascal</a>]</td></tr>
<tr id="patch"><td>* <a
href="/software/diffutils/manual/#Invoking-patch">Patch</a></td>
- <td>Apply differences to originals, with optional backups.
- [<a href="/software/patch/">patch home</a>]</td></tr>
+ <td>Aplica diferenças a originais, com backups opcionais. [<a
+href="/software/patch/">página do patch</a>]</td></tr>
<tr id="pexec"><td>* <a href="/software/pexec/pexec.1.html">Pexec</a></td>
- <td>Execute a command in parallel on multiple hosts.
- [<a href="/software/pexec/">pexec home</a>]</td></tr>
+ <td>Executa um comando em paralelo em vários hosts. [<a
+href="/software/pexec/">página do pexec</a>]</td></tr>
<tr id="pgccfd"><td>* <a href="/software/pgccfd/">Porting GCC for
Dunces</a></td>
- <td>Guide on porting the GNU compiler to new platforms.
- [<a href="/software/pgccfd/">pgccfd home</a>]</td></tr>
+ <td>Guia sobre como portar o compilador GNU para novas plataformas. [<a
+href="/software/pgccfd/">página do pgccfd</a>]</td></tr>
<tr id="pies"><td>* <a
href="http://www.gnu.org.ua/software/pies/manual.html">Pies</a></td>
- <td>Program invocation and execution supervisor.
- [<a href="/software/pies/">pies home</a>]</td></tr>
+ <td>Supervisor de invocação e execução de programas. [<a
+href="/software/pies/">página do pies</a>]</td></tr>
<tr id="pyconfigure"><td>* <a
href="/software/pyconfigure/manual/">Pyconfigure</a></td>
- <td>Configure interface for Python-based packages.
- [<a href="/software/pyconfigure/">pyconfigure home</a>]</td></tr>
+ <td>Configura interface para pacotes baseados em Python. [<a
+href="/software/pyconfigure/">página do pyconfigure</a>]</td></tr>
<tr id="pythonwebkit"><td>* <a
href="/software/pythonwebkit/">Pythonwebkit</a></td>
- <td>W3C DOM bindings to Webkit for use with GTK and more.
- [<a href="/software/pythonwebkit/">pythonwebkit home</a>]</td></tr>
+ <td>Vinculações DOM do W3C ao Webkit para uso com o GTK e mais. [<a
+href="/software/pythonwebkit/">página do pythonwebkit</a>]</td></tr>
<tr id="qexo"><td>* <a href="/software/qexo/#Documentation">Qexo</a></td>
- <td>Java implementation of XQuery using GNU Kawa.
- [<a href="/software/qexo/">qexo home</a>]</td></tr>
+ <td>Implementação Java de XQuery usando GNU Kawa. [<a
+href="/software/qexo/">página do qexo</a>]</td></tr>
<tr id="rush"><td>* <a
href="http://puszcza.gnu.org.ua/software/rush/manual.html">Rush</a></td>
- <td>Restricted user (login) shell.
- [<a href="/software/rush/">rush home</a>]</td></tr>
+ <td>Shell de usuário restrito (<i lang="en">login</i>). [<a
+href="/software/rush/">página do rush</a>]</td></tr>
<tr id="sather"><td>* <a href="/software/sather/#doc">Sather</a></td>
- <td>An object-oriented language designed to be simple, efficient, safe.
- [<a href="/software/sather/">sather home</a>]</td></tr>
+ <td>Uma linguagem orientada a objetos projetada para ser simples,
eficiente e
+segura. [<a
href="/software/sather/">página do sather</a>]</td></tr>
<tr id="scm"><td>* <a
href="http://people.csail.mit.edu/jaffer/scm_toc.html">SCM</a></td>
- <td>A Scheme implementation.
- [<a href="/software/scm/">scm home</a>]</td></tr>
+ <td>Uma implementação de Scheme. [<a
+href="/software/scm/">página do scm</a>]</td></tr>
<tr id="screen"><td>* <a href="/software/screen/manual/">Screen</a></td>
- <td>Full-screen window manager providing multiple terminals.
- [<a href="/software/screen/">screen home</a>]</td></tr>
+ <td>Gerenciador de janela de tela cheia fornecendo vários terminais. [<a
+href="/software/screen/">página do screen</a>]</td></tr>
<tr id="shmm"><td>* <a href="/software/shmm/">Shmm</a></td>
- <td>Shared memory manager utility.
- [<a href="/software/shmm/">shmm home</a>]</td></tr>
+ <td>Utilitário gerenciador de memória compartilhada. [<a
+href="/software/shmm/">página do shmm</a>]</td></tr>
<tr id="shtool"><td>* <a href="/software/shtool/">Shtool</a></td>
- <td>Compilation of utility shell scripts into a shell tool.
- [<a href="/software/shtool/">shtool home</a>]</td></tr>
+ <td>Compilação de shell scripts utilitários em uma ferramenta de shell.
[<a
+href="/software/shtool/">página do shtool</a>]</td></tr>
<tr id="slib"><td>* <a
href="http://people.csail.mit.edu/jaffer/slib/index.html">SLIB</a></td>
- <td>Portable library for Scheme.
- [<a href="/software/slib/">slib home</a>]</td></tr>
+ <td>Biblioteca portátil para Scheme. [<a
+href="/software/slib/">página do slib</a>]</td></tr>
-<tr id="smalltalk"><td>* <a
href="http://smalltalk.gnu.org/documentation">Smalltalk</a>
-<small>(<a
href="https://www.gnu.org/software/smalltalk/manual-base/html_node/">smalltalk-base</a>
- <a
href="https://www.gnu.org/software/smalltalk/manual-libs/html_node/">smalltalk-libs</a>
- <a
href="https://www.gnu.org/software/smalltalk/manual/html_node/">smalltalk<!--
again --></a>)</small>
+<tr id="smalltalk"><td><!-- again -->
+* <a href="http://smalltalk.gnu.org/documentation">Smalltalk</a> <small>(<a
+href="https://www.gnu.org/software/smalltalk/manual-base/html_node/">smalltalk-base</a>
+<a
+href="https://www.gnu.org/software/smalltalk/manual-libs/html_node/">smalltalk-libs</a>
+<a
+href="https://www.gnu.org/software/smalltalk/manual/html_node/">smalltalk</a>)</small>
</td>
- <td>Smalltalk environment.
- [<a href="/software/smalltalk/">smalltalk home</a>]</td></tr>
+ <td>Ambiente para Smalltalk. [<a
+href="/software/smalltalk/">página do smalltalk</a>]</td></tr>
<tr id="superopt"><td>* <a href="/software/superopt/">Superopt</a></td>
- <td>Super-optimizer of given functions.
- [<a href="/software/superopt/">superopt home</a>]</td></tr>
+ <td>Superotimizador de funções dadas. [<a
+href="/software/superopt/">página do superopt</a>]</td></tr>
<tr id="swbis"><td>* <a
href="https://www.gnu.org/software/swbis/manual.html">Swbis</a></td>
- <td>POSIX software packaging utilities.
- [<a href="/software/swbis/">swbis home</a>]</td></tr>
+ <td>Utilitários de empacotamento de software POSIX. [<a
+href="/software/swbis/">página do swbis</a>]</td></tr>
<tr id="teseq"><td>* <a href="/software/teseq/manual/">Teseq</a></td>
- <td>Analyze files with terminal control sequences, for debugging.
- [<a href="/software/teseq/">teseq home</a>]</td></tr>
+ <td>Analisa arquivos com sequências de controle de terminal, para
depuração.
+[<a href="/software/teseq/">página do teseq</a>]</td></tr>
<tr id="thales"><td>* <a
href="https://www.gnu.org/software/thales/manual/">Thales</a></td>
- <td>Unit test framework for Guile.
- [<a href="/software/thales/">thales home</a>]</td></tr>
+ <td>Framework de teste de unidade para Guile. [<a
+href="/software/thales/">página do thales</a>]</td></tr>
<tr id="vmgen"><td>* <a href="/software/vmgen/">Vmgen</a></td>
- <td>Generic virtual machine generation, used by gforth.
- [<a href="/software/vmgen/">vmgen home</a>]</td></tr>
+ <td>Geração de máquina virtual genérica, usado pelo gforth. [<a
+href="/software/vmgen/">página do vmgen</a>]</td></tr>
<tr id="womb"><td>* <a href="/software/womb/">Womb</a></td>
- <td>Repository for GNU work not intended to be separate packages.
- [<a href="/software/womb/">womb home</a>]</td></tr>
+ <td>Repositório para o trabalho do GNU não destinado a pacotes
separados. [<a
+href="/software/womb/">página do womb</a>]</td></tr>
<tr id="xnee"><td>* <a
href="http://xnee.wordpress.com/documentation/">Xnee</a></td>
- <td>Record, replay and distribute user actions under X11.
- [<a href="/software/xnee/">xnee home</a>]</td></tr>
+ <td>Grava, reproduz e distribui ações de usuários sob o X11. [<a
+href="/software/xnee/">página do xnee</a>]</td></tr>
<tr>
-<td id="Libraries" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/libs/"><big><b>Software
libraries</b></big></a></td></tr>
+<td id="Libraries" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/libs/"><big><b>Bibliotecas de
+software</b></big></a></td></tr>
<tr id="pkg_8sync"><td>* <a href="/software/8sync/manual/">8sync</a></td>
- <td>An asynchronous programming library for Guile.
- [<a href="/software/8sync/">8sync home</a>]</td></tr>
+ <td>Uma biblioteca de programação assÃncrona para Guile. [<a
+href="/software/8sync/">página do 8sync</a>]</td></tr>
<tr id="adns"><td>* <a href="/software/adns/">Adns</a></td>
- <td>Asynchronous DNS client library and utilities.
- [<a href="/software/adns/">adns home</a>]</td></tr>
+ <td>Biblioteca e utilitários de cliente DNS assÃncrono. [<a
+href="/software/adns/">página do adns</a>]</td></tr>
<tr id="avl"><td>* <a href="http://adtinfo.org/libavl.html/">Avl</a></td>
- <td>Binary and balanced search trees.
- [<a href="/software/avl/">avl home</a>]</td></tr>
+ <td>Ãrvores de pesquisa binária e balanceada. [<a
+href="/software/avl/">página do avl</a>]</td></tr>
<tr id="bfd"><td>* <a
href="https://sourceware.org/binutils/docs/bfd/">BFD</a></td>
- <td>Binary File Descriptor library.
- [<a href="/software/bfd/">bfd home</a>]</td></tr>
+ <td>Biblioteca de Binary File Descriptor. [<a
+href="/software/bfd/">página do bfd</a>]</td></tr>
<tr id="cgicc"><td>* <a href="/software/cgicc/">Cgicc</a></td>
- <td>C++ class library for writing CGI applications.
- [<a href="/software/cgicc/">cgicc home</a>]</td></tr>
+ <td>Biblioteca de classes C++ para escrita de aplicativos de CGI. [<a
+href="/software/cgicc/">página do cgicc</a>]</td></tr>
<tr id="classpath"><td>* <a href="/software/classpath/docs/">Classpath</a></td>
- <td>Core class libraries for Java.
- [<a href="/software/classpath/">classpath home</a>]</td></tr>
+ <td>Bibliotecas de classes centrais para Java. [<a
+href="/software/classpath/">página do classpath</a>]</td></tr>
<tr id="classpathx"><td>* <a href="/software/classpathx/">Classpathx</a></td>
- <td>Classpath extensions: javax.* libraries.
- [<a href="/software/classpathx/">classpathx home</a>]</td></tr>
+ <td>Extensões de classpath: bibliotecas javax.*. [<a
+href="/software/classpathx/">página do classpathx</a>]</td></tr>
-<tr id="commoncpp"><td>* <a
href="/software/commoncpp/commoncpp.html#documentation">[u]Common C++</a></td>
- <td>[u]Common C++ framework for threaded applications.
- [<a href="/software/commoncpp/">commoncpp home</a>]</td></tr>
+<tr id="commoncpp"><td>* <a
href="/software/commoncpp/commoncpp.html#documentation">[u]Common
+C++</a></td>
+ <td>Framework de [u]Common C++ para aplicativos <i lang="en">threaded</i>.
[<a
+href="/software/commoncpp/">página do commoncpp</a>]</td></tr>
<tr id="freeipmi"><td>* <a
href="/software/freeipmi/documentation.html">FreeIPMI</a></td>
- <td>Platform management, including sensor and power monitoring.
- [<a href="/software/freeipmi/">freeipmi home</a>]</td></tr>
+ <td>Gerenciamento de plataforma, incluindo monitoramento de sensor e
energia.
+[<a href="/software/freeipmi/">página do freeipmi</a>]</td></tr>
<tr id="gleem"><td>* <a href="/software/gleem/doc/">Gleem</a></td>
- <td>OpenGL Extremely Easy-to-use Manipulators.
- [<a href="/software/gleem/">gleem home</a>]</td></tr>
+ <td>Manipuladores de OpenGL extremamente fáceis de usar. [<a
+href="/software/gleem/">página do gleem</a>]</td></tr>
<tr id="glib"><td>* <a
href="http://library.gnome.org/devel/glib/unstable/">GLib</a></td>
- <td>Thread-safe general utility library; basis of GTK+ and GNOME.
- [<a href="/software/glib/">glib home</a>]</td></tr>
+ <td>Biblioteca de utilitário geral de <i lang="en">thread</i> segura;
base do
+GTK+ e GNOME. [<a
href="/software/glib/">página do glib</a>]</td></tr>
<tr id="glpk"><td>* <a href="/software/glpk/">GLPK</a></td>
- <td>GNU Linear Programming Kit, supporting the MathProg language.
- [<a href="/software/glpk/">glpk home</a>]</td></tr>
+ <td>GNU Linear Programming Kit, com suporte à linguagem MathProg. [<a
+href="/software/glpk/">página do glpk</a>]</td></tr>
<tr id="gnutls"><td>* <a href="/software/gnutls/manual/">GnuTLS</a></td>
- <td>Transport layer security library.
- [<a href="/software/gnutls/">gnutls home</a>]</td></tr>
+ <td>Biblioteca de segurança para a camada de transporte. [<a
+href="/software/gnutls/">página do gnutls</a>]</td></tr>
<tr id="gsasl"><td>* <a href="/software/gsasl/manual/">Gsasl</a></td>
- <td>Simple Authentication and Security Layer library.
- [<a href="/software/gsasl/">gsasl home</a>]</td></tr>
+ <td>Biblioteca Simple Authentication and Security Layer. [<a
+href="/software/gsasl/">página do gsasl</a>]</td></tr>
<tr id="gslip"><td>* <a href="/software/gslip/">GNU Slip</a></td>
- <td>SLIP (Symmetric LIst Processor) implementation.
- [<a href="/software/gslip/">gslip home</a>]</td></tr>
+ <td>Implementação de SLIP (Symmetric LIst Processor). [<a
+href="/software/gslip/">página do gslip</a>]</td></tr>
<tr id="gss"><td>* <a href="/software/gss/manual/">Generic Security
Service</a></td>
- <td>Generic Security Service library.
- [<a href="/software/gss/">gss home</a>]</td></tr>
+ <td>Biblioteca Generic Security Service. [<a
+href="/software/gss/">página do gss</a>]</td></tr>
<tr id="guile-cv"><td>* <a href="/software/guile-cv/">Guile-cv</a></td>
- <td>Computer Vision library for Guile.
- [<a href="/software/guile-cv/">guile-cv home</a>]</td></tr>
+ <td>Biblioteca Computer Vision para Guile. [<a
+href="/software/guile-cv/">página do guile-cv</a>]</td></tr>
<tr id="gwl"><td>* <a href="/software/gwl/">GWL</a></td>
- <td>Workflow language for GNU Guix.
- [<a href="/software/gwl/">gwl home</a>]</td></tr>
+ <td>Linguagem de fluxo de trabalho para GNU Guix. [<a
+href="/software/gwl/">página do gwl</a>]</td></tr>
-<tr id="java-getopt"><td>* <a
href="http://www.urbanophile.com/arenn/hacking/getopt/Package-gnu.getopt.html">Java-getopt</a></td>
- <td>Java port of GNU getopt.
- [<a href="/software/java-getopt/">java-getopt home</a>]</td></tr>
+<tr id="java-getopt"><td>* <a
+href="http://www.urbanophile.com/arenn/hacking/getopt/Package-gnu.getopt.html">Java-getopt</a></td>
+ <td><i lang="en">Port</i> Java do GNU getopt. [<a
+href="/software/java-getopt/">página do java-getopt</a>]</td></tr>
<tr id="jel"><td>* <a href="/software/jel/manual.html">Jel</a></td>
- <td>Java expression library and compiler.
- [<a href="/software/jel/">jel home</a>]</td></tr>
+ <td>Biblioteca e compilador de expressões java. [<a
+href="/software/jel/">página do jel</a>]</td></tr>
<tr id="libc"><td>* <a href="/software/libc/manual/">GNU C Library</a></td>
- <td>C library.
- [<a href="/software/libc/">libc home</a>]</td></tr>
+ <td>Biblioteca C do GNU. [<a
+href="/software/libc/">página do libc</a>]</td></tr>
<tr id="libffcall"><td>* <a href="/software/libffcall/">Libffcall</a></td>
- <td>Foreign function calls from interpreters.
- [<a href="/software/libffcall/">libffcall home</a>]</td></tr>
+ <td>Chamadas de funções estrangeiras de interpretadores. [<a
+href="/software/libffcall/">página do libffcall</a>]</td></tr>
-<tr id="libgcrypt"><td>* <a
href="https://www.gnupg.org/documentation/manuals/gcrypt/">Libgcrypt</a></td>
- <td>Cryptographic function library.
- [<a href="/software/libgcrypt/">libgcrypt home</a>]</td></tr>
+<tr id="libgcrypt"><td>* <a
+href="https://www.gnupg.org/documentation/manuals/gcrypt/">Libgcrypt</a></td>
+ <td>Biblioteca de função criptográfica. [<a
+href="/software/libgcrypt/">página do libgcrypt</a>]</td></tr>
<tr id="libiconv"><td>* <a href="/software/libiconv/">Libiconv</a></td>
- <td>Character set conversion library.
- [<a href="/software/libiconv/">libiconv home</a>]</td></tr>
+ <td>Biblioteca de conversão de conjunto de caracteres. [<a
+href="/software/libiconv/">página do libiconv</a>]</td></tr>
<tr id="libidn"><td>* <a href="/software/libidn/manual/">Libidn</a></td>
- <td>Internationalized string processing library.
- [<a href="/software/libidn/">libidn home</a>]</td></tr>
+ <td>Biblioteca de processamento de textos internacionalizados. [<a
+href="/software/libidn/">página do libidn</a>]</td></tr>
<tr id="libjit"><td>* <a href="/software/libjit/">Libjit</a></td>
- <td>Just-in-Time compilation library.
- [<a href="/software/libjit/">libjit home</a>]</td></tr>
+ <td>Biblioteca de compilação Just-in-Time. [<a
+href="/software/libjit/">página do libjit</a>]</td></tr>
<tr id="libmicrohttpd"><td>* <a
href="/software/libmicrohttpd/manual/">Libmicrohttpd</a></td>
- <td>C library implementing an HTTP 1.1 server.
- [<a
href="/software/libmicrohttpd/">libmicrohttpd home</a>]</td></tr>
+ <td>Implementação da biblioteca C em um servidor HTTP 1.1. [<a
+href="/software/libmicrohttpd/">página do libmicrohttpd</a>]</td></tr>
<tr id="libtool"><td>* <a href="/software/libtool/manual/">Libtool</a></td>
- <td>Generic shared library support tools.
- [<a href="/software/libtool/">libtool home</a>]</td></tr>
+ <td>Ferramentas genéricas de suporte a bibliotecas compartilhadas. [<a
+href="/software/libtool/">página do libtool</a>]</td></tr>
<tr id="libunistring"><td>* <a
href="/software/libunistring/manual/">Libunistring</a></td>
- <td>C library for manipulating Unicode strings.
- [<a href="/software/libunistring/">libunistring home</a>]</td></tr>
+ <td>Biblioteca C para manipular textos em Unicode. [<a
+href="/software/libunistring/">página do libunistring</a>]</td></tr>
<tr id="lightning"><td>* <a
href="/software/lightning/manual/">Lightning</a></td>
- <td>Library for generating assembly code at runtime.
- [<a href="/software/lightning/">lightning home</a>]</td></tr>
+ <td>Biblioteca para gerar código assembly em tempo de execução. [<a
+href="/software/lightning/">página do lightning</a>]</td></tr>
<tr id="mempool"><td>* <a href="/software/mempool/">MemPool</a></td>
- <td>Block allocator library.
- [<a href="/software/mempool/">mempool home</a>]</td></tr>
+ <td>Biblioteca alocadora de bloco. [<a
+href="/software/mempool/">página do mempool</a>]</td></tr>
<tr id="mifluz"><td>* <a href="/software/mifluz/doc.en.html">Mifluz</a></td>
- <td>Full text indexing library.
- [<a href="/software/mifluz/">mifluz home</a>]</td></tr>
+ <td>Biblioteca de indexação de texto completo. [<a
+href="/software/mifluz/">página do mifluz</a>]</td></tr>
<tr id="nana"><td>* <a href="/software/nana/">Nana</a></td>
- <td>Library for assertions, logging, performance measurement.
- [<a href="/software/nana/">nana home</a>]</td></tr>
+ <td>Biblioteca para asserções, registros, medida de desempenho. [<a
+href="/software/nana/">página do nana</a>]</td></tr>
<tr id="osip"><td>* <a href="/software/osip/doc/html/">oSIP</a></td>
- <td>Library implementing SIP (RFC-3261).
- [<a href="/software/osip/">osip home</a>]</td></tr>
+ <td>Biblioteca que implementa SIP (RFC-3261). [<a
+href="/software/osip/">página do osip</a>]</td></tr>
<tr id="pth"><td>* <a href="/software/pth/pth-manual.html">Pth</a></td>
- <td>Portable thread library.
- [<a href="/software/pth/">pth home</a>]</td></tr>
+ <td>Biblioteca de <i lang="en">thread</i> portátil. [<a
+href="/software/pth/">página do pth</a>]</td></tr>
<tr id="quickthreads"><td>* <a
href="/software/quickthreads/">Quickthreads</a></td>
- <td>Thread library.
- [<a href="/software/quickthreads/">quickthreads home</a>]</td></tr>
+ <td>Biblioteca de <i lang="en">thread</i>. [<a
+href="/software/quickthreads/">página do quickthreads</a>]</td></tr>
<tr id="wb"><td>* <a
href="http://people.csail.mit.edu/jaffer/wb_toc.html">WB</a></td>
- <td>Disk-based associative array B-tree database library.
- [<a href="/software/wb/">wb home</a>]</td></tr>
+ <td>Biblioteca de banco de dados de árvore B de matriz associativa
baseada em
+disco. [<a href="/software/wb/">página do wb</a>]</td></tr>
<tr>
-<td id="Spreadsheets" colspan="2" style="padding-top:.8em;
padding-left:16%;"><a
href="http://directory.fsf.org/category/ssheet/"><big><b>Spreadsheets</b></big></a></td></tr>
+<td id="Spreadsheets" colspan="2" style="padding-top:.8em;
padding-left:16%;"><a
+href="http://directory.fsf.org/category/ssheet/"><big><b>Planilhas</b></big></a></td></tr>
-<tr id="gnumeric"><td>* <a
href="http://www.gnome.org/projects/gnumeric/doc/gnumeric.shtml">GNUmeric</a></td>
- <td>Spreadsheet application.
- [<a href="/software/gnumeric/">gnumeric home</a>]</td></tr>
+<tr id="gnumeric"><td>* <a
+href="http://www.gnome.org/projects/gnumeric/doc/gnumeric.shtml">GNUmeric</a></td>
+ <td>Aplicativo de planilha. [<a
+href="/software/gnumeric/">página do gnumeric</a>]</td></tr>
<tr id="oleo"><td>* <a href="/software/oleo/doc/oleo.html">Oleo</a></td>
- <td>Spreadsheet for both terminal and graphical interfaces.
- [<a href="/software/oleo/">oleo home</a>]</td></tr>
+ <td>Planilha para interfaces gráficas e terminais. [<a
+href="/software/oleo/">página do oleo</a>]</td></tr>
<tr id="ssw"><td>* <a href="/software/ssw/">Spread Sheet Widget</a></td>
- <td>Gtk+ widget for viewing and manipulating tabular data.
- [<a href="/software/ssw/">ssw home</a>]</td></tr>
+ <td>Widget Gtk+ para visualizar e manipular dados tabulares. [<a
+href="/software/ssw/">página do ssw</a>]</td></tr>
<tr>
-<td id="Sysadmin" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/admin/"><big><b>System
administration</b></big></a></td></tr>
+<td id="Sysadmin" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/admin/"><big><b>Administração de
+sistema</b></big></a></td></tr>
<tr id="acct"><td>* <a
href="/software/acct/manual/accounting.html">Acct</a></td>
- <td>Standard login and process accounting utilities.
- [<a href="/software/acct/">acct home</a>]</td></tr>
+ <td>Utilitários padrão de login e contas de processo. [<a
+href="/software/acct/">página do acct</a>]</td></tr>
-<tr id="ddrescue"><td>* <a
href="https://www.gnu.org/software/ddrescue/manual/ddrescue_manual.html">ddrescue</a></td>
- <td>Data recovery utility.
- [<a href="/software/ddrescue/">ddrescue home</a>]</td></tr>
+<tr id="ddrescue"><td>* <a
+href="https://www.gnu.org/software/ddrescue/manual/ddrescue_manual.html">ddrescue</a></td>
+ <td>Utilitário de recuperação de dados. [<a
+href="/software/ddrescue/">página do ddrescue</a>]</td></tr>
<tr id="direvent"><td>* <a href="/software/direvent/">Direvent</a></td>
- <td>Daemon to monitor directories for events such as file removal.
- [<a href="/software/direvent/">direvent home</a>]</td></tr>
+ <td>Daemon para monitorar diretórios de eventos, como remoção de
arquivos. [<a
+href="/software/direvent/">página do direvent</a>]</td></tr>
<tr id="fdisk"><td>* <a href="/software/fdisk/">Fdisk</a></td>
- <td>Low-level disk partitioning and formatting.
- [<a href="/software/fdisk/">fdisk home</a>]</td></tr>
+ <td>Particionamento e formatação de disco de baixo nÃvel. [<a
+href="/software/fdisk/">página do fdisk</a>]</td></tr>
<tr id="gnubatch"><td>* <a href="/software/gnubatch/">GNUbatch</a></td>
- <td>Advanced batch scheduling and job control.
- [<a href="/software/gnubatch/">gnubatch home</a>]</td></tr>
+ <td>Agendamento em lote avançado e controle de tarefas. [<a
+href="/software/gnubatch/">página do gnubatch</a>]</td></tr>
<tr id="grub"><td>* <a
href="/software/grub/grub-documentation.html">GRUB</a></td>
- <td>GRand Unified Boot loader.
- [<a href="/software/grub/">grub home</a>]</td></tr>
+ <td>Carregador GRand Unified Boot. [<a
+href="/software/grub/">página do grub</a>]</td></tr>
<tr id="gsrc"><td>* <a href="/software/gsrc/manual/">GNU Source Release
Collection</a></td>
- <td>Install latest official GNU releases from original source.
- [<a href="/software/gsrc/">gsrc home</a>]</td></tr>
+ <td>Instala os últimos lançamentos oficiais do GNU a partir do
código-fonte
+original. [<a href="/software/gsrc/">página do gsrc</a>]</td></tr>
<tr id="guix"><td>* <a href="/software/guix/manual/">Guix</a></td>
- <td>Functional package manager for installed software packages and
versions.
- [<a href="/software/guix/">guix home</a>]</td></tr>
+ <td>Gerenciador de pacotes funcional para pacotes e versões de software
+instalados. [<a
href="/software/guix/">página do guix</a>]</td></tr>
<tr id="mcron"><td>* <a href="/software/mcron/">Mcron</a></td>
- <td>Run jobs at scheduled times.
- [<a href="/software/mcron/">mcron home</a>]</td></tr>
+ <td>Executa tarefas em horários agendados. [<a
+href="/software/mcron/">página do mcron</a>]</td></tr>
<tr id="mes"><td>* <a href="/software/mes/manual/">Mes</a></td>
- <td>Full source bootstrapping for GNU systems.
- [<a href="/software/mes/">mes home</a>]</td></tr>
+ <td><i lang="en">Bootstrap</i> de fonte completa para sistemas GNU. [<a
+href="/software/mes/">página do mes</a>]</td></tr>
<tr id="mtools"><td>* <a href="/software/mtools/mailing.html">Mtools</a></td>
- <td>Access MS-DOS disks without mounting.
- [<a href="/software/mtools/">mtools home</a>]</td></tr>
+ <td>Acessa discos MS-DOS sem montá-los. [<a
+href="/software/mtools/">página do mtools</a>]</td></tr>
<tr id="parallel"><td>* <a href="/software/parallel/man.html">Parallel</a></td>
- <td>Build and execute command lines in parallel.
- [<a href="/software/parallel/">parallel home</a>]</td></tr>
+ <td>Compila e executa linhas de comandos em paralelo. [<a
+href="/software/parallel/">página do parallel</a>]</td></tr>
<tr id="parted"><td>* <a href="/software/parted/manual/">Parted</a></td>
- <td>Disk partition editor.
- [<a href="/software/parted/">parted home</a>]</td></tr>
+ <td>Editor de partição de disco. [<a
+href="/software/parted/">página do parted</a>]</td></tr>
<tr id="rottlog"><td>* <a href="/software/rottlog/manual/">Rottlog</a></td>
- <td>Log rotation and management.
- [<a href="/software/rottlog/">rottlog home</a>]</td></tr>
+ <td>Rotação e gerenciamento de logs. [<a
+href="/software/rottlog/">página do rottlog</a>]</td></tr>
<tr id="serveez"><td>* <a href="/software/serveez/manual/">Serveez</a></td>
- <td>Framework for implementing IP-based servers.
- [<a href="/software/serveez/">serveez home</a>]</td></tr>
+ <td>Framework para implementar servidores baseados em IP. [<a
+href="/software/serveez/">página do serveez</a>]</td></tr>
<tr id="shepherd"><td>* <a href="/software/shepherd/">Shepherd</a></td>
- <td>System service manager.
- [<a href="/software/shepherd/">shepherd home</a>]</td></tr>
+ <td>Gerenciador de serviço de sistema. [<a
+href="/software/shepherd/">página do shepherd</a>]</td></tr>
<tr id="stow"><td>* <a href="/software/stow/manual/">Stow</a></td>
- <td>Managing installed software packages.
- [<a href="/software/stow/">stow home</a>]</td></tr>
+ <td>Gerenciamento de pacotes de softwares instalados. [<a
+href="/software/stow/">página do stow</a>]</td></tr>
<tr id="sysutils"><td>* <a href="/software/sysutils/">Sysutils</a></td>
- <td>Standard system administration utilities: passwd, chsh, and more.
- [<a href="/software/sysutils/">sysutils home</a>]</td></tr>
+ <td>Utilitários padrão de administração de sistema: passwd, chsh e
mais. [<a
+href="/software/sysutils/">página do sysutils</a>]</td></tr>
<tr id="time"><td>* <a href="/software/time/">Time</a></td>
- <td>Run a command, then display its resource usage.
- [<a href="/software/time/">time home</a>]</td></tr>
+ <td>Executa um comando, então exibe seu uso de recursos. [<a
+href="/software/time/">página do time</a>]</td></tr>
<tr id="uucp"><td>* <a href="/software/uucp/">UUCP</a></td>
- <td>UUCP protocol implementation.
- [<a href="/software/uucp/">uucp home</a>]</td></tr>
+ <td>Implementação do protocolo UUCP. [<a
+href="/software/uucp/">página do uucp</a>]</td></tr>
<tr id="which"><td>* <a href="/software/which/">Which</a></td>
- <td>Find full path of shell commands.
- [<a href="/software/which/">which home</a>]</td></tr>
+ <td>Localiza o caminho completo de comandos de shell. [<a
+href="/software/which/">página do which</a>]</td></tr>
<tr id="xlogmaster"><td>* <a
href="/software/xlogmaster/tutorial_toc.html">Xlogmaster</a></td>
- <td>GUI program for monitoring log and other files.
- [<a href="/software/xlogmaster/">xlogmaster home</a>]</td></tr>
+ <td>Programa GUI para monitorar log e outros arquivos. [<a
+href="/software/xlogmaster/">página do xlogmaster</a>]</td></tr>
<tr>
-<td id="Telephony" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/tel/"><big><b>Telephony</b></big></a></td></tr>
+<td id="Telephony" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/tel/"><big><b>Telefonia</b></big></a></td></tr>
<tr id="bayonne"><td>* <a
href="/software/bayonne/bayonne.html#documentation">Bayonne</a></td>
- <td>Telephony server.
- [<a href="/software/bayonne/">bayonne home</a>]</td></tr>
+ <td>Servidor de telefonia. [<a
+href="/software/bayonne/">página do bayonne</a>]</td></tr>
<tr id="ccaudio"><td>* <a
href="/software/ccaudio/ccaudio.html#documentation">ccAudio</a></td>
- <td>Standalone C++ class framework for manipulating audio data.
- [<a href="/software/ccaudio/">ccaudio home</a>]</td></tr>
+ <td>Framework de classe C++ autônomo para manipular dados de áudio. [<a
+href="/software/ccaudio/">página do ccaudio</a>]</td></tr>
<tr id="ccrtp"><td>* <a
href="/software/ccrtp/ccrtp.html#documentation">ccRTP</a></td>
- <td>Implementation of RTP (real-time transport protocol).
- [<a href="/software/ccrtp/">ccrtp home</a>]</td></tr>
+ <td>Implementação de RTP (protocolo de transporte em tempo real). [<a
+href="/software/ccrtp/">página do ccrtp</a>]</td></tr>
<tr id="ccscript"><td>* <a
href="/software/ccscript/ccscript.html#documentation">ccScript</a></td>
- <td>C++ class framework for virtual machine execution.
- [<a href="/software/ccscript/">ccscript home</a>]</td></tr>
+ <td>Framework de classe C++ para execução de máquina virtual. [<a
+href="/software/ccscript/">página do ccscript</a>]</td></tr>
<tr id="gnucomm"><td>* <a
href="/software/gnucomm/overview.html">GnuComm</a></td>
- <td>GNU telecommunications project / GNU Telephony.
- [<a href="/software/gnucomm/">gnucomm home</a>]</td></tr>
+ <td>Projeto de telecomunicações do GNU / GNU Telephony. [<a
+href="/software/gnucomm/">página do gnucomm</a>]</td></tr>
<tr id="halifax"><td>* <a href="/software/halifax/">HaliFAX</a></td>
- <td>Fax support.
- [<a href="/software/halifax/">halifax home</a>]</td></tr>
+ <td>Suporte a fax. [<a
+href="/software/halifax/">página do halifax</a>]</td></tr>
<tr id="sipwitch"><td>* <a
href="/software/sipwitch/sipwitch.html#documentation">Sipwitch</a></td>
- <td>Secure peer-to-peer VoIP server for the SIP protocol.
- [<a href="/software/sipwitch/">sipwitch home</a>]</td></tr>
+ <td>Servidor VOIP ponto a ponto seguro para o protocolo SIP. [<a
+href="/software/sipwitch/">página do sipwitch</a>]</td></tr>
<tr>
-<td id="Text" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/text/"><big><b>Text creation and
manipulation</b></big></a></td></tr>
+<td id="Text" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/text/"><big><b>Criação e
+manipulação de texto</b></big></a></td></tr>
<tr id="aspell"><td>* <a
href="http://aspell.net/man-html/index.html">Aspell</a></td>
- <td>Spell checker.
- [<a href="/software/aspell/">aspell home</a>]</td></tr>
+ <td>Verificador ortográfico. [<a
+href="/software/aspell/">página do aspell</a>]</td></tr>
<tr id="auctex"><td>* <a href="/software/auctex/manual/">AUCTeX</a></td>
- <td>Emacs environment for editing (all flavors of) TeX files.
- [<a href="/software/auctex/">auctex home</a>]</td></tr>
+ <td>Ambiente Emacs para edição de (todos os sabores de) arquivos TeX.
[<a
+href="/software/auctex/">página do auctex</a>]</td></tr>
<tr id="bool"><td>* <a href="/software/bool/">Bool</a></td>
- <td>Finding text and HTML files that match boolean expressions.
- [<a href="/software/bool/">bool home</a>]</td></tr>
+ <td>Localiza texto e arquivos HTML que correspondem a expressões
booleanas. [<a
+href="/software/bool/">página do bool</a>]</td></tr>
<tr id="combine"><td>* <a href="/software/combine/manual/">Combine</a></td>
- <td>Extensible file matching and filtering.
- [<a href="/software/combine/">combine home</a>]</td></tr>
+ <td>Combinação e filtragem de arquivos extensÃveis. [<a
+href="/software/combine/">página do combine</a>]</td></tr>
<tr id="diction"><td>* <a href="/software/diction/">Diction</a></td>
- <td>Identifies wordy and commonly misused phrases.
- [<a href="/software/diction/">diction home</a>]</td></tr>
+ <td>Identifica frases com palavras comumente mal utilizadas. [<a
+href="/software/diction/">página do diction</a>]</td></tr>
-<tr id="diffutils"><td>* <a
href="https://www.gnu.org/software/diffutils/manual/html_node/">Diffutils</a></td>
- <td>Comparing and merging files.
- [<a href="/software/diffutils/">diffutils home</a>]</td></tr>
+<tr id="diffutils"><td>* <a
+href="https://www.gnu.org/software/diffutils/manual/html_node/">Diffutils</a></td>
+ <td>Comparação e mesclagem de arquivos. [<a
+href="/software/diffutils/">página do diffutils</a>]</td></tr>
<tr id="ed"><td>* <a
href="https://www.gnu.org/software/ed/manual/ed_manual.html">Ed</a></td>
- <td>Line-oriented text editor.
- [<a href="/software/ed/">ed home</a>]</td></tr>
+ <td>Editor de texto orientado a linha. [<a
+href="/software/ed/">página do ed</a>]</td></tr>
-<tr id="gawk"><td>* <a href="/software/gawk/manual/">Gawk</a>
-<small>(<a
href="https://www.gnu.org/software/gawk/manual/gawkinet/html_node/">gawkinet</a>
- <a href="https://www.gnu.org/software/gawk/manual/html_node/">gawk<!-- again
--></a>)</small>
+<tr id="gawk"><td><!-- again -->
+* <a href="/software/gawk/manual/">Gawk</a> <small>(<a
+href="https://www.gnu.org/software/gawk/manual/gawkinet/html_node/">gawkinet</a>
+<a
+href="https://www.gnu.org/software/gawk/manual/html_node/">gawk</a>)</small>
</td>
- <td>Text scanning and processing language.
- [<a href="/software/gawk/">gawk home</a>]</td></tr>
+ <td>Linguagem de varredura e processamento de texto. [<a
+href="/software/gawk/">página do gawk</a>]</td></tr>
<tr id="grep"><td>* <a href="/software/grep/manual/">Grep</a></td>
- <td>Print lines matching a pattern.
- [<a href="/software/grep/">grep home</a>]</td></tr>
+ <td>Imprime linhas correspondentes a um padrão. [<a
+href="/software/grep/">página do grep</a>]</td></tr>
<tr id="groff"><td>* <a
href="https://www.gnu.org/software/groff/manual/html_node/">Groff</a></td>
- <td>Typesetting from plain text mixed with formatting commands.
- [<a href="/software/groff/">groff home</a>]</td></tr>
+ <td>Formatação de texto simples misturado com comandos de formatação.
[<a
+href="/software/groff/">página do groff</a>]</td></tr>
<tr id="help2man"><td>* <a href="/software/help2man/">Help2man</a></td>
- <td>Automatically generate man pages from program --help.
- [<a href="/software/help2man/">help2man home</a>]</td></tr>
+ <td>Gera automaticamente páginas man a partir do --help do programa. [<a
+href="/software/help2man/">página do help2man</a>]</td></tr>
<tr id="html-info"><td>* <a href="/software/html-info/">Html-info</a></td>
- <td>HTML-Info viewer and tools.
- [<a href="/software/html-info/">html-info home</a>]</td></tr>
+ <td>Visualizador e ferramentas de HTML-Info. [<a
+href="/software/html-info/">página do html-info</a>]</td></tr>
<tr id="hyperbole"><td>* <a href="/software/hyperbole/">Hyperbole</a></td>
- <td>Emacs hypertext system via customizable buttons.
- [<a href="/software/hyperbole/">hyperbole home</a>]</td></tr>
+ <td>Sistema de hipertexto para Emacs por meio de botões personalizáveis.
[<a
+href="/software/hyperbole/">página do hyperbole</a>]</td></tr>
<tr id="less"><td>* <a href="/software/less/">Less</a></td>
- <td>Paginator for terminals.
- [<a href="/software/less/">less home</a>]</td></tr>
+ <td>Paginador para terminais. [<a
+href="/software/less/">página do less</a>]</td></tr>
<tr id="m4"><td>* <a href="/software/m4/manual/">M4</a></td>
- <td>Macro processor.
- [<a href="/software/m4/">m4 home</a>]</td></tr>
+ <td>Processador de macros. [<a
href="/software/m4/">página do m4</a>]</td></tr>
<tr id="miscfiles"><td>* <a href="/software/miscfiles/">Miscfiles</a></td>
- <td>Data files for airport codes, zip codes, a dictionary, and more.
- [<a href="/software/miscfiles/">miscfiles home</a>]</td></tr>
+ <td>Arquivos de dados para códigos de aeroporto, códigos postais, um
dicionário
+e mais. [<a
href="/software/miscfiles/">página do miscfiles</a>]</td></tr>
-<tr id="ocrad"><td>* <a
href="https://www.gnu.org/software/ocrad/manual/ocrad_manual.html">Ocrad</a></td>
- <td>Optical character recognition based on feature extraction.
- [<a href="/software/ocrad/">ocrad home</a>]</td></tr>
+<tr id="ocrad"><td>* <a
+href="https://www.gnu.org/software/ocrad/manual/ocrad_manual.html">Ocrad</a></td>
+ <td>Reconhecimento ótico de caracteres baseado na extração de recursos.
[<a
+href="/software/ocrad/">página do ocrad</a>]</td></tr>
<tr id="orgadoc"><td>* <a
href="/software/orgadoc/orgadoc.html">OrgaDoc</a></td>
- <td>Eiffel program to maintain and query documents across machines.
- [<a href="/software/orgadoc/">orgadoc home</a>]</td></tr>
+ <td>Programa Eiffel para manter e consultar documentos entre máquinas.
[<a
+href="/software/orgadoc/">página do orgadoc</a>]</td></tr>
<tr id="reftex"><td>* <a
href="/software/auctex/manual/reftex.index.html">Reftex</a></td>
- <td>Emacs support for LaTeX cross-references of all kinds.
- [<a href="/software/reftex/">reftex home</a>]</td></tr>
+ <td>Suporte ao Emacs para referências cruzadas em LaTeX de todos os
tipos. [<a
+href="/software/reftex/">página do reftex</a>]</td></tr>
<tr id="sed"><td>* <a href="/software/sed/manual/">Sed</a></td>
- <td>Stream editor.
- [<a href="/software/sed/">sed home</a>]</td></tr>
+ <td>Editor de fluxo. [<a
href="/software/sed/">página do sed</a>]</td></tr>
<tr id="spell"><td>* <a href="/software/spell/">Spell</a></td>
- <td>Spell checking.
- [<a href="/software/spell/">spell home</a>]</td></tr>
+ <td>Verificação ortográfica. [<a
+href="/software/spell/">página do spell</a>]</td></tr>
-<tr id="src-highlite"><td>* <a
href="https://www.gnu.org/software/src-highlite/source-highlight.html">Src-highlite</a></td>
- <td>Produce a document with syntax highlighting from a source file.
- [<a href="/software/src-highlite/">src-highlite home</a>]</td></tr>
+<tr id="src-highlite"><td>* <a
+href="https://www.gnu.org/software/src-highlite/source-highlight.html">Src-highlite</a></td>
+ <td>Produz um documento com realce de sintaxe a partir de um arquivo
fonte. [<a
+href="/software/src-highlite/">página do src-highlite</a>]</td></tr>
<tr id="teximpatient"><td>* <a href="/software/teximpatient/">TeX for the
Impatient</a></td>
- <td>Book on TeX, plain TeX, and Eplain.
- [<a href="/software/teximpatient/">teximpatient home</a>]</td></tr>
+ <td>Livro em Tex, Tex simples e Eplain. [<a
+href="/software/teximpatient/">página do teximpatient</a>]</td></tr>
-<tr id="texinfo"><td>* <a href="/software/texinfo/manual/">Texinfo</a>
-<small>(<a
href="https://www.gnu.org/software/texinfo/manual/info-stnd/html_node/">info-stnd</a>
- <a
href="https://www.gnu.org/software/texinfo/manual/texinfo/html_node/">texinfo<!--
again --></a>)</small>
+<tr id="texinfo"><td><!-- again -->
+* <a href="/software/texinfo/manual/">Texinfo</a> <small>(<a
+href="https://www.gnu.org/software/texinfo/manual/info-stnd/html_node/">info-stnd</a>
+<a
+href="https://www.gnu.org/software/texinfo/manual/texinfo/html_node/">texinfo</a>)</small>
</td>
- <td>The GNU documentation format.
- [<a href="/software/texinfo/">texinfo home</a>]</td></tr>
+ <td>O formato de documentação do GNU. [<a
+href="/software/texinfo/">página do texinfo</a>]</td></tr>
<tr id="texmacs"><td>* <a href="/software/texmacs/">TeXmacs</a></td>
- <td>Editing platform with special features for scientists.
- [<a href="/software/texmacs/">texmacs home</a>]</td></tr>
+ <td>Plataforma de edição com recursos especiais para cientistas. [<a
+href="/software/texmacs/">página do texmacs</a>]</td></tr>
<tr id="unrtf"><td>* <a href="/software/unrtf/">UnRTF</a></td>
- <td>Convert Rich Text Format documents to other formats.
- [<a href="/software/unrtf/">unrtf home</a>]</td></tr>
+ <td>Converte documentos Rich Text Format para outros formatos. [<a
+href="/software/unrtf/">página do unrtf</a>]</td></tr>
<tr id="wdiff"><td>* <a href="/software/wdiff/manual/">Wdiff</a></td>
- <td>Word difference finder.
- [<a href="/software/wdiff/">wdiff home</a>]</td></tr>
+ <td>Localizador de diferença entre palavras. [<a
+href="/software/wdiff/">página do wdiff</a>]</td></tr>
<tr>
-<td id="Version" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/vc/"><big><b>Version
control</b></big></a></td></tr>
+<td id="Version" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/vc/"><big><b>Controle de
+versão</b></big></a></td></tr>
<tr id="bazaar"><td>* <a
href="http://doc.bazaar.canonical.com/en/">Bazaar</a></td>
- <td>Version control system supporting both distributed and centralized
workflows.
- [<a href="/software/bazaar/">bazaar home</a>]</td></tr>
+ <td>Sistema de controle de versão com suporte a fluxos de trabalho
distribuÃdo e
+centralizado. [<a
href="/software/bazaar/">página do bazaar</a>]</td></tr>
<tr id="cssc"><td>* <a
href="https://www.gnu.org/software/cssc/manual/">CSSC</a></td>
- <td>File-based version control like SCCS.
- [<a href="/software/cssc/">cssc home</a>]</td></tr>
+ <td>Controle de versão baseado em arquivos, como SCCS. [<a
+href="/software/cssc/">página do cssc</a>]</td></tr>
<tr id="rcs"><td>* <a href="/software/rcs/manual/">RCS</a></td>
- <td>Per-file local revision control system.
- [<a href="/software/rcs/">rcs home</a>]</td></tr>
+ <td>Sistema de controle de revisão local por arquivo. [<a
+href="/software/rcs/">página do rcs</a>]</td></tr>
<tr id="vc-dwim"><td>* <a href="/software/vc-dwim/manual/">Vc-dwim</a></td>
- <td>Version-control-agnostic ChangeLog diff and commit tool.
- [<a href="/software/vc-dwim/">vc-dwim home</a>]</td></tr>
+ <td>Ferramenta de commit e diff de ChangeLog agnóstico a controle de
versão.
+[<a href="/software/vc-dwim/">página do vc-dwim</a>]</td></tr>
<tr>
-<td id="Video" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/video/"><big><b>Video</b></big></a></td></tr>
+<td id="Video" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
+href="http://directory.fsf.org/category/video/"><big><b>VÃdeo</b></big></a></td></tr>
<tr id="vcdimager"><td>* <a href="/software/vcdimager/">VCDImager</a></td>
- <td>Authoring, disassembling and analyzing (super and) video CDs.
- [<a href="/software/vcdimager/">vcdimager home</a>]</td></tr>
+ <td>Criação, desmontagem e análise de Super CDs e CDs de vÃdeo. [<a
+href="/software/vcdimager/">página do vcdimager</a>]</td></tr>
<tr>
-<td id="Web" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/web/"><big><b>Web
authoring</b></big></a></td></tr>
+<td id="Web" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/web/"><big><b>Criação
+web</b></big></a></td></tr>
<tr id="easejs"><td>* <a
href="http://www.gnu.org/software/easejs/manual.html">Easejs</a></td>
- <td>Classical object-oriented framework for JavaScript.
- [<a href="/software/easejs/">easejs home</a>]</td></tr>
+ <td>Framework orientado a objeto clássico para JavaScript. [<a
+href="/software/easejs/">plágina do easejs</a>]</td></tr>
<tr id="emacs-muse"><td>* <a
href="/software/emacs-muse/manual/">Emacs-muse</a></td>
- <td>Authoring and publishing environment for Emacs.
- [<a href="/software/emacs-muse/">emacs-muse home</a>]</td></tr>
+ <td>Ambiente de criação e publicação para o Emacs. [<a
+href="/software/emacs-muse/">página do emacs-muse</a>]</td></tr>
<tr id="gnowsys"><td>* <a href="/software/gnowsys/">GNOWSYS</a></td>
- <td>Distributed network-based memory and knowledge management.
- [<a href="/software/gnowsys/">gnowsys home</a>]</td></tr>
+ <td>Gerenciamento de conhecimento e memória baseado em rede distribuÃda.
[<a
+href="/software/gnowsys/">página do gnowsys</a>]</td></tr>
<tr id="grabcomics"><td>* <a
href="http://server.phpgrabcomics.org/docs/">phpGrabComics</a></td>
- <td>Saves comic strips from the web.
- [<a href="/software/grabcomics/">grabcomics home</a>]</td></tr>
+ <td>Salva tiras de revistas em quadrinhos da web. [<a
+href="/software/grabcomics/">página do grabcomics</a>]</td></tr>
<tr id="metahtml"><td>* <a
href="http://metahtml.sourceforge.net/documentation/">Metahtml</a></td>
- <td>Combining HTML and Lisp, specifically designed for Web servers.
- [<a href="/software/metahtml/">metahtml home</a>]</td></tr>
+ <td>Combinação de HTML e Lisp, especificamente projetados para
servidores web.
+[<a href="/software/metahtml/">página do metahtml</a>]</td></tr>
<tr id="xmlat"><td>* <a href="/software/xmlat/">Xmlat</a></td>
- <td>Simple XML for defining and implementing markup languages.
- [<a href="/software/xmlat/">xmlat home</a>]</td></tr>
+ <td>XML simples para definição e implementação de linguages de
marcação. [<a
+href="/software/xmlat/">página do xmlat</a>]</td></tr>
</table>
<p>
-<a href="#Archiving">Archiving</a> -
-<a href="#Audio">Audio</a> -
-<a href="#Business">Business and productivity</a> -
-<a href="#Database">Database</a> -
-<a href="#Dictionaries">Dictionaries</a> -
-<a href="#Translation">Documentation translation</a> -
-<a href="#Editors">Editors</a> -
-<a href="#Education">Education</a> -
-<a href="#Email">Email</a> -
-<a href="#Fonts">Fonts</a> -
-<a href="#gnuorg">GNU organization</a> -
-<a href="#Games">Games</a> -
-<a href="#Graphics">Graphics</a> -
-<a href="#Health">Health</a> -
-<a href="#Interface">Interface</a> -
-<a href="#Internet">Internet applications</a> -
-<a href="#Live">Live communications</a> -
-<a href="#Localization">Localization</a> -
-<a href="#Mathematics">Mathematics</a> -
-<a href="#Music">Music</a> -
-<a href="#Printing">Printing</a> -
-<a href="#Science">Science</a> -
-<a href="#Security">Security</a> -
-<a href="#Software">Software development</a> -
-<a href="#Libraries">Software libraries</a> -
-<a href="#Spreadsheets">Spreadsheets</a> -
-<a href="#Sysadmin">System administration</a> -
-<a href="#Telephony">Telephony</a> -
-<a href="#Text">Text creation and manipulation</a> -
-<a href="#Version">Version control</a> -
-<a href="#Video">Video</a> -
-<a href="#Web">Web authoring</a> -
+<a href="#Archiving">Arquivamento</a> - <a href="#Audio">Ãudio</a> - <a
+href="#Business">Negócios e produtividade</a> - <a
+href="#Database">Banco de dados</a> - <a
+href="#Dictionaries">Dicionários</a> - <a
+href="#Translation">Tradução da documentação</a> - <a
+href="#Editors">Editores</a> - <a href="#Education">Educação</a> - <a
+href="#Email">E-mail</a> - <a href="#Fonts">Fontes</a> - <a
+href="#gnuorg">Organização do GNU</a> - <a href="#Games">Jogos</a>
+- <a href="#Graphics">Gráficos</a> - <a href="#Health">Saúde</a> - <a
+href="#Interface">Interface</a> - <a
+href="#Internet">Aplicativos de Internet</a> - <a
+href="#Live">Comunicações ao vivo</a> - <a
+href="#Localization">Localização</a> - <a href="#Mathematics">Matemática</a>
+- <a href="#Music">Música</a> - <a href="#Printing">Impressão</a> - <a
+href="#Science">Ciência</a> - <a href="#Security">Segurança</a> - <a
+href="#Software">Desenvolvimento de software</a> - <a
+href="#Libraries">Bibliotecas de software</a> - <a
+href="#Spreadsheets">Planilhas</a> - <a
+href="#Sysadmin">Administração de sistema</a> - <a
+href="#Telephony">Telefonia</a> - <a
+href="#Text">Criação e manipulação de texto</a> - <a
+href="#Version">Controle de versão</a> - <a
+href="#Video">VÃdeo</a> - <a href="#Web">Autoria web</a> -
</p>
<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
Index: manual/po/allgnupkgs.pt-br.po
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- manual/po/allgnupkgs.pt-br.po 2 Feb 2019 13:16:11 -0000 1.1
+++ manual/po/allgnupkgs.pt-br.po 2 Feb 2019 13:31:26 -0000 1.2
@@ -3747,21 +3747,21 @@
#. type: Content of: <table><tr><td>
msgid ""
-"* <a href=\"/software/mit-scheme/#Documentation\">MIT/GNU Scheme</a> "
-"<small>(<a href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-"
-"scheme-imail/\">mit-scheme-imail</a> <a href=\"https://www.gnu.org/software/"
-"mit-scheme/documentation/mit-scheme-ref/\">mit-scheme-ref</a> <a href="
-"\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/"
-"\">sos</a> <a href=\"https://www.gnu.org/software/mit-scheme/documentation/"
-"mit-scheme-user/\">mit-scheme-user</a>)</small>"
-msgstr ""
-"* <a href=\"/software/mit-scheme/#Documentation\">MIT/GNU Scheme</a> "
-"<small>(<a href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-"
-"scheme-imail/\">mit-scheme-imail</a> <a href=\"https://www.gnu.org/software/"
-"mit-scheme/documentation/mit-scheme-ref/\">mit-scheme-ref</a> <a href="
-"\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/"
-"\">sos</a> <a href=\"https://www.gnu.org/software/mit-scheme/documentation/"
-"mit-scheme-user/\">mit-scheme-user</a>)</small>"
+"* <a href=\"/software/mit-scheme/#Documentation\">MIT/GNU Scheme</a> <small>"
+"(<a href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-"
+"imail/\">mit-scheme-imail</a> <a href=\"https://www.gnu.org/software/mit-"
+"scheme/documentation/mit-scheme-ref/\">mit-scheme-ref</a> <a href=\"https://"
+"www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/\">sos</a> <a "
+"href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-user/"
+"\">mit-scheme-user</a>)</small>"
+msgstr ""
+"* <a href=\"/software/mit-scheme/#Documentation\">MIT/GNU Scheme</a> <small>"
+"(<a href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-"
+"imail/\">mit-scheme-imail</a> <a href=\"https://www.gnu.org/software/mit-"
+"scheme/documentation/mit-scheme-ref/\">mit-scheme-ref</a> <a href=\"https://"
+"www.gnu.org/software/mit-scheme/documentation/mit-scheme-sos/\">sos</a> <a "
+"href=\"https://www.gnu.org/software/mit-scheme/documentation/mit-scheme-user/"
+"\">mit-scheme-user</a>)</small>"
#. type: Content of: <table><tr><td>
msgid ""
@@ -3956,17 +3956,17 @@
#. again
#. type: Content of: <table><tr><td>
msgid ""
-"* <a href=\"http://smalltalk.gnu.org/documentation\">Smalltalk</a> "
-"<small>(<a href=\"https://www.gnu.org/software/smalltalk/manual-base/"
-"html_node/\">smalltalk-base</a> <a href=\"https://www.gnu.org/software/"
-"smalltalk/manual-libs/html_node/\">smalltalk-libs</a> <a href=\"https://www."
-"gnu.org/software/smalltalk/manual/html_node/\">smalltalk</a>)</small>"
-msgstr ""
-"* <a href=\"http://smalltalk.gnu.org/documentation\">Smalltalk</a> "
-"<small>(<a href=\"https://www.gnu.org/software/smalltalk/manual-base/"
-"html_node/\">smalltalk-base</a> <a href=\"https://www.gnu.org/software/"
-"smalltalk/manual-libs/html_node/\">smalltalk-libs</a> <a href=\"https://www."
-"gnu.org/software/smalltalk/manual/html_node/\">smalltalk</a>)</small>"
+"* <a href=\"http://smalltalk.gnu.org/documentation\">Smalltalk</a> <small>"
+"(<a href=\"https://www.gnu.org/software/smalltalk/manual-base/html_node/"
+"\">smalltalk-base</a> <a href=\"https://www.gnu.org/software/smalltalk/"
+"manual-libs/html_node/\">smalltalk-libs</a> <a href=\"https://www.gnu.org/"
+"software/smalltalk/manual/html_node/\">smalltalk</a>)</small>"
+msgstr ""
+"* <a href=\"http://smalltalk.gnu.org/documentation\">Smalltalk</a> <small>"
+"(<a href=\"https://www.gnu.org/software/smalltalk/manual-base/html_node/"
+"\">smalltalk-base</a> <a href=\"https://www.gnu.org/software/smalltalk/"
+"manual-libs/html_node/\">smalltalk-libs</a> <a href=\"https://www.gnu.org/"
+"software/smalltalk/manual/html_node/\">smalltalk</a>)</small>"
#. type: Content of: <table><tr><td>
msgid ""
Index: manual/po/manual.pt-br.po
===================================================================
RCS file: /web/www/www/manual/po/manual.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- manual/po/manual.pt-br.po 2 Feb 2019 13:16:04 -0000 1.1
+++ manual/po/manual.pt-br.po 2 Feb 2019 13:31:26 -0000 1.2
@@ -89,7 +89,6 @@
"sugestões podem ser enviadas para <a href=\"mailto:address@hidden"><"
"address@hidden></a>."
-#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -140,4 +139,4 @@
#. timestamp start
#. type: Content of: <div><p>
msgid "Updated:"
-msgstr "Ãltima atualização:"
+msgstr "Ãltima atualização: "
Index: manual/po/manual.translist
===================================================================
RCS file: /web/www/www/manual/po/manual.translist,v
retrieving revision 1.9
retrieving revision 1.10
diff -u -b -r1.9 -r1.10
--- manual/po/manual.translist 10 Nov 2015 08:29:12 -0000 1.9
+++ manual/po/manual.translist 2 Feb 2019 13:31:26 -0000 1.10
@@ -6,6 +6,7 @@
<span dir="ltr"><a lang="de" hreflang="de"
href="/manual/manual.de.html">Deutsch</a> [de]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/manual/manual.fr.html">français</a> [fr]</span>
<span dir="ltr"><a lang="ja" hreflang="ja"
href="/manual/manual.ja.html">æ¥æ¬èª</a> [ja]</span>
+<span dir="ltr"><a lang="pt-br" hreflang="pt-br"
href="/manual/manual.pt-br.html">português do Brasil</a> [pt-br]</span>
</p>
</div>' -->
<link rel="alternate" type="text/html" href="/manual/manual.html"
hreflang="x-default" />
@@ -13,4 +14,5 @@
<link rel="alternate" type="text/html" lang="de" hreflang="de"
href="/manual/manual.de.html" title="Deutsch" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/manual/manual.fr.html" title="français" />
<link rel="alternate" type="text/html" lang="ja" hreflang="ja"
href="/manual/manual.ja.html" title="æ¥æ¬èª" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br"
href="/manual/manual.pt-br.html" title="português do Brasil" />
<!-- end translist file -->
Index: philosophy/po/phone-anonymous-payment.pt-br.po
===================================================================
RCS file: /web/www/www/philosophy/po/phone-anonymous-payment.pt-br.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- philosophy/po/phone-anonymous-payment.pt-br.po 2 Feb 2019 13:16:00
-0000 1.1
+++ philosophy/po/phone-anonymous-payment.pt-br.po 2 Feb 2019 13:31:27
-0000 1.2
@@ -91,7 +91,6 @@
"sugestões podem ser enviadas para <a href=\"mailto:address@hidden"><"
"address@hidden></a>."
-#
#. TRANSLATORS: Ignore the original text in this paragraph,
#. replace it with the translation of these two:
#. We work hard and do our best to provide accurate, good quality
@@ -143,4 +142,4 @@
#. timestamp start
#. type: Content of: <div><p>
msgid "Updated:"
-msgstr "Ãltima atualização:"
+msgstr "Ãltima atualização: "
Index: philosophy/po/phone-anonymous-payment.translist
===================================================================
RCS file: /web/www/www/philosophy/po/phone-anonymous-payment.translist,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/phone-anonymous-payment.translist 20 Dec 2018 09:59:13
-0000 1.2
+++ philosophy/po/phone-anonymous-payment.translist 2 Feb 2019 13:31:27
-0000 1.3
@@ -4,9 +4,11 @@
<p>
<span dir="ltr" class="original"><a lang="en" hreflang="en"
href="/philosophy/phone-anonymous-payment.en.html">English</a> [en]</span>
<span dir="ltr"><a lang="fr" hreflang="fr"
href="/philosophy/phone-anonymous-payment.fr.html">français</a> [fr]</span>
+<span dir="ltr"><a lang="pt-br" hreflang="pt-br"
href="/philosophy/phone-anonymous-payment.pt-br.html">português do Brasil</a> [pt-br]</span>
</p>
</div>' -->
<link rel="alternate" type="text/html"
href="/philosophy/phone-anonymous-payment.html" hreflang="x-default" />
<link rel="alternate" type="text/html" lang="en" hreflang="en"
href="/philosophy/phone-anonymous-payment.en.html" title="English" />
<link rel="alternate" type="text/html" lang="fr" hreflang="fr"
href="/philosophy/phone-anonymous-payment.fr.html" title="français" />
+<link rel="alternate" type="text/html" lang="pt-br" hreflang="pt-br"
href="/philosophy/phone-anonymous-payment.pt-br.html" title="português do
Brasil" />
<!-- end translist file -->
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/de.po 28 Jan 2019 23:59:19 -0000 1.18
+++ proprietary/po/de.po 2 Feb 2019 13:31:27 -0000 1.19
@@ -7126,6 +7126,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -10079,10 +10100,23 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
@@ -10424,6 +10458,14 @@
msgstr "<a href=\"#SpywareInMobileApps\">⦠in Anwendungssoftware</a>"
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">⦠in Anwendungssoftware</a>"
+
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInMobileApps\">Mobile Apps</a>+}
#. type: Content of: <div><div><ul><li><ul><li>
#, fuzzy
@@ -10865,6 +10907,23 @@
msgstr " "
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr " "
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -11171,6 +11230,14 @@
"em> oder <em>proprietär</em> zu nennen</a>, aber nichtsdestotrotz ist die "
"Ãberwachung ein Missbrauch."
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr ""
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/es.po 29 Jan 2019 12:00:18 -0000 1.23
+++ proprietary/po/es.po 2 Feb 2019 13:31:27 -0000 1.24
@@ -5026,6 +5026,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -7252,28 +7273,26 @@
msgid "Latest additions"
msgstr "Añadidos recientes"
-# | Until 2015, any tweet that listed a geographical tag <a
-# |
[-href=\"https://www.wired.com/story/twitter-location-data-gps-privacy/\">-]
-# |
{+href=\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/\">+}
-# | sent the precise GPS location to Twitter's server</a>. It still contains
-# | these GPS locations.
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Until 2015, any tweet that listed a geographical tag <a href=\"https://"
-#| "www.wired.com/story/twitter-location-data-gps-privacy/\"> sent the "
-#| "precise GPS location to Twitter's server</a>. It still contains these GPS "
-#| "locations."
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
-"Hasta 2015, cualquier tweet que incluyera una etiqueta geográfica <a href="
-"\"https://www.wired.com/story/twitter-location-data-gps-privacy/\">enviaba "
-"la localización GPS precisa al servidor de Twitter</a>. Este conserva aún "
-"esas localizaciones GPS."
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
@@ -7538,6 +7557,12 @@
#. type: Content of: <div><div><ul><li><ul><li>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"/proprietary/malware-mobiles.html\">Móviles</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr "<a href=\"/proprietary/malware-mobiles.html\">Móviles</a>"
@@ -7834,6 +7859,16 @@
msgstr ""
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
#, fuzzy
#| msgid "Mobile Jails"
msgid "Mobile Apps"
@@ -8065,6 +8100,29 @@
"proprietary”</a>, but the surveillance is an abuse all the same."
msgstr ""
+# | Until 2015, any tweet that listed a geographical tag <a
+# |
[-href=\"https://www.wired.com/story/twitter-location-data-gps-privacy/\">-]
+# |
{+href=\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/\">+}
+# | sent the precise GPS location to Twitter's server</a>. It still contains
+# | these GPS locations.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Until 2015, any tweet that listed a geographical tag <a href=\"https://"
+#| "www.wired.com/story/twitter-location-data-gps-privacy/\"> sent the "
+#| "precise GPS location to Twitter's server</a>. It still contains these GPS "
+#| "locations."
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+"Hasta 2015, cualquier tweet que incluyera una etiqueta geográfica <a href="
+"\"https://www.wired.com/story/twitter-location-data-gps-privacy/\">enviaba "
+"la localización GPS precisa al servidor de Twitter</a>. Este conserva aún "
+"esas localizaciones GPS."
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr ""
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/fr.po 29 Jan 2019 08:56:31 -0000 1.35
+++ proprietary/po/fr.po 2 Feb 2019 13:31:27 -0000 1.36
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: fr.po\n"
-"POT-Creation-Date: 2019-01-28 23:56+0000\n"
+"POT-Creation-Date: 2019-01-05 11:26+0000\n"
"PO-Revision-Date: 2019-01-29 09:53+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -5595,6 +5595,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -8023,15 +8044,24 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
-"Jusqu'en 2015, les tweets géolocalisés <a
href=\"http://web-old.archive.org/"
-"web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-"
-"privacy/\">envoyaient les coordonnées GPS précises au serveur de Twitter</"
-"a>. Ils contiennent toujours ces coordonnées."
#. type: Content of: <div><p>
msgid ""
@@ -8312,6 +8342,14 @@
msgid "<a href=\"#SpywareInApplications\">Spyware in Applications</a>"
msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop+} Apps</a>
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Applications mobiles</a>"
+
#. type: Content of: <div><div><ul><li><ul><li>
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr "<a href=\"#SpywareInMobileApps\">Applications mobiles</a>"
@@ -8653,6 +8691,25 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr "Applications mobiles"
@@ -8958,6 +9015,18 @@
"« privateurs » (propriétaires)</a>, mais ce flicage constitue malgré
tout un "
"abus."
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+"Jusqu'en 2015, les tweets géolocalisés <a
href=\"http://web-old.archive.org/"
+"web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-"
+"privacy/\">envoyaient les coordonnées GPS précises au serveur de Twitter</"
+"a>. Ils contiennent toujours ces coordonnées."
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr "JavaScript"
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/it.po 28 Jan 2019 23:59:19 -0000 1.18
+++ proprietary/po/it.po 2 Feb 2019 13:31:27 -0000 1.19
@@ -6688,6 +6688,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -9363,10 +9384,23 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
@@ -9689,6 +9723,14 @@
msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInMobileApps\">Mobile Apps</a>+}
#. type: Content of: <div><div><ul><li><ul><li>
#, fuzzy
@@ -10141,6 +10183,25 @@
"\">#SpywareIniThings</a>)</span>"
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -10447,6 +10508,14 @@
"nonfree.html\">non ha senso chiamarli “liberi” o “"
"proprietari”</a>, ma la sorveglianza rimane comunque un abuso."
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr ""
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/ja.po 28 Jan 2019 23:59:19 -0000 1.18
+++ proprietary/po/ja.po 2 Feb 2019 13:31:27 -0000 1.19
@@ -5678,6 +5678,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -7927,10 +7948,23 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <div><p>
@@ -8226,6 +8260,12 @@
#. type: Content of: <div><div><ul><li><ul><li>
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
@@ -8614,6 +8654,22 @@
"\">#SpywareIniThings</a>)</span>"
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -8900,6 +8956,14 @@
"nonfree.html\">ããããèªç±ããããã¯ããããã©ã¤ã¨ã¿ãªãã¨å¼ã¶ãã¨ã«ã¯æå³ã"
"ããã¾ãã</a>ããç£è¦ãä¹±ç¨ã§ããã¨è¨ãã®ã¯ã¾ã£ããåãã§ãã"
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr ""
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/malware-mobiles.de-diff.html 28 Jan 2019 09:29:56 -0000
1.33
+++ proprietary/po/malware-mobiles.de-diff.html 2 Feb 2019 13:31:28 -0000
1.34
@@ -469,6 +469,21 @@
tracking people's locations.</p>
</li>
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
@@ -1186,7 +1201,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 09:29:56 $
+$Date: 2019/02/02 13:31:28 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/malware-mobiles.de.po 28 Jan 2019 09:29:57 -0000
1.91
+++ proprietary/po/malware-mobiles.de.po 2 Feb 2019 13:31:29 -0000
1.92
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -774,6 +774,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/malware-mobiles.es.po 29 Jan 2019 11:32:40 -0000
1.90
+++ proprietary/po/malware-mobiles.es.po 2 Feb 2019 13:31:29 -0000
1.91
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -656,6 +657,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary/po/malware-mobiles.fr.po 28 Jan 2019 13:53:33 -0000
1.111
+++ proprietary/po/malware-mobiles.fr.po 2 Feb 2019 13:31:29 -0000
1.112
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2019-01-28 14:33+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -658,6 +659,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/malware-mobiles.it-diff.html 28 Jan 2019 09:29:57 -0000
1.38
+++ proprietary/po/malware-mobiles.it-diff.html 2 Feb 2019 13:31:29 -0000
1.39
@@ -475,6 +475,21 @@
tracking people's locations.</p>
</li>
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
@@ -739,7 +754,7 @@
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, <span
class="removed"><del><strong>it stores detailed logs
+ <dd>Sends traffic to LinkedIn. Also, it <span
class="removed"><del><strong>stores detailed logs
and may turn them over to the UK government if
requested.</dd>
@@ -793,7 +808,7 @@
<li>
<p>Google Play intentionally sends app developers <a
-href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>it stores detailed logs and
+href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>stores detailed logs and
may turn them over to</em></ins></span> the <span
class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>UK government if
requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -1222,7 +1237,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:29 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/malware-mobiles.it.po 28 Jan 2019 09:29:57 -0000
1.91
+++ proprietary/po/malware-mobiles.it.po 2 Feb 2019 13:31:31 -0000
1.92
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -732,6 +732,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/malware-mobiles.ja-diff.html 28 Jan 2019 09:29:57 -0000
1.52
+++ proprietary/po/malware-mobiles.ja-diff.html 2 Feb 2019 13:31:31 -0000
1.53
@@ -469,6 +469,21 @@
tracking people's locations.</p>
</li>
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
@@ -1062,7 +1077,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary/po/malware-mobiles.ja.po 28 Jan 2019 09:29:57 -0000
1.79
+++ proprietary/po/malware-mobiles.ja.po 2 Feb 2019 13:31:31 -0000
1.80
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -613,6 +613,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-mobiles.pot 28 Jan 2019 09:29:57 -0000 1.57
+++ proprietary/po/malware-mobiles.pot 2 Feb 2019 13:31:31 -0000 1.58
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -447,6 +447,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a "
+"href=\"https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report\">
"
+"report on the user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various "
+"apps. Some of them send Facebook detailed information about the user's "
+"activities in the app; others only say that the user is using that app, but "
+"that alone is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "This spying occurs regardless of whether the user has a Facebook
account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a "
"href=\"https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent\">
"
"upload call logs automatically from Android phones</a> while disguising what "
Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- proprietary/po/malware-mobiles.ru.po 28 Jan 2019 10:30:14 -0000
1.141
+++ proprietary/po/malware-mobiles.ru.po 2 Feb 2019 13:31:31 -0000
1.142
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -646,6 +647,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/nl.po 28 Jan 2019 23:59:19 -0000 1.18
+++ proprietary/po/nl.po 2 Feb 2019 13:31:31 -0000 1.19
@@ -4443,6 +4443,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -6379,10 +6400,23 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
@@ -6639,6 +6673,18 @@
#| msgid ""
#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
#| "a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr ""
+"<a href=\"/proprietary/malware-mobiles.html\">Malware in mobiele apparaten</"
+"a>"
+
+# | <a [-href=\"/proprietary/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"/proprietary/malware-mobiles.html\">Mobiles</a>+}
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#| "a>"
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr ""
"<a href=\"/proprietary/malware-mobiles.html\">Malware in mobiele apparaten</"
@@ -6955,6 +7001,16 @@
msgstr ""
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -7184,6 +7240,14 @@
"proprietary”</a>, but the surveillance is an abuse all the same."
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr ""
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/pl.po 28 Jan 2019 23:59:19 -0000 1.18
+++ proprietary/po/pl.po 2 Feb 2019 13:31:31 -0000 1.19
@@ -3913,6 +3913,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -5916,10 +5937,23 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
@@ -6170,6 +6204,17 @@
#, fuzzy
#| msgid ""
#| "<a href=\"/philosophy/malware-mobiles.html\">Malware in mobile devices</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr ""
+"<a href=\"/philosophy/malware-mobiles.html\">Malware w urzÄ
dzeniach "
+"mobilnych</a>"
+
+# | <a [-href=\"/philosophy/malware-mobiles.html\">Malware in mobile
+# | devices</a>-] {+href=\"/proprietary/malware-mobiles.html\">Mobiles</a>+}
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/philosophy/malware-mobiles.html\">Malware in mobile devices</a>"
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr ""
"<a href=\"/philosophy/malware-mobiles.html\">Malware w urzÄ
dzeniach "
@@ -6484,6 +6529,16 @@
msgstr ""
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -6713,6 +6768,14 @@
"proprietary”</a>, but the surveillance is an abuse all the same."
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr ""
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/pot 28 Jan 2019 23:59:20 -0000 1.18
+++ proprietary/po/pot 2 Feb 2019 13:31:31 -0000 1.19
@@ -3736,6 +3736,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -5413,10 +5434,23 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <div><p>
@@ -5631,6 +5665,10 @@
msgstr ""
#. type: Content of: <div><div><ul><li><ul><li>
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li>
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr ""
@@ -5907,6 +5945,16 @@
msgstr ""
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -6136,6 +6184,14 @@
"proprietary”</a>, but the surveillance is an abuse all the same."
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr ""
Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary-sabotage.de-diff.html 5 Jan 2019 11:31:35
-0000 1.26
+++ proprietary/po/proprietary-sabotage.de-diff.html 2 Feb 2019 13:31:31
-0000 1.27
@@ -48,12 +48,26 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+
+<p>Here</strong></del></span> <span class="inserted"><ins><em>injustice
of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201810240">
<p>Apple and Samsung deliberately <a
-
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
- the <span class="removed"><del><strong>specifics.</p>
-
-<p>Here</strong></del></span> <span
class="inserted"><ins><em>performance of older phones to force users to buy
their newer
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
+ the performance of older phones to force users to buy their newer
phones</a>.</p>
</li>
@@ -123,13 +137,21 @@
requires users to talk with them through some specialized
service.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li>
+ <p>Tesla used software to limit customers to using
just</strong></del></span>
<span class="inserted"><ins><em><li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
-
href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
- changes the file system from HFS+ to APFS</a>, which cannot be
- accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
+ <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">part
of</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
+ changes</em></ins></span> the <span class="removed"><del><strong>battery
of some
+ cars</a>.</p>
+ </li>
+
+ <li>
+ <p>Sonos
+ <a
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+ told all its customers, “Agree”</strong></del></span> <span
class="inserted"><ins><em>file system from HFS+</em></ins></span> to <span
class="removed"><del><strong>snooping</strong></del></span> <span
class="inserted"><ins><em>APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows</em></ins></span> or <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>even older versions of MacOS.</p>
</li>
<li id="M201710041">
@@ -146,63 +168,57 @@
a temptation to commit sabotage.</p>
</li>
- <li id="M201709090"></em></ins></span>
+ <li id="M201709090">
<p>Tesla used software to limit customers to using just <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">part
of the battery of some cars</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708230"></em></ins></span>
+ <li id="M201708230">
<p>Sonos <a
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”
- to snooping or the product will stop working</a>. <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">Another</strong></del></span>
+ to snooping or the</em></ins></span> product will stop working</a>.
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/08/23/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/#more-10287321">Another</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
Another</em></ins></span> article</a> says they won't forcibly
change the software, but
people won't be able to get any upgrades and eventually it will
stop <span class="removed"><del><strong>working.
- </p></strong></del></span> <span
class="inserted"><ins><em>working.</p></em></ins></span>
+ </p>
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p>Revolv is an IoT device which managed “smart home”
- operations: switching</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706060">
- <p>Apple will stop <a
-
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
- bugs for older model iThings</a>.</p>
-
- <p>Meanwhile, Apple stops people from fixing problems themselves;
- that's</em></ins></span> the <span class="removed"><del><strong>lights,
operate motion sensors, regulating
+ operations: switching the lights, operate motion sensors, regulating
temperature, etc. On May 15th, 2016, Google said it would shut down the
service linked to the device, making it unusable.</p>
<p>Although you may own the device, its functioning depended on the
server
- that never belonged to you. So you never really had
control</strong></del></span> <span
class="inserted"><ins><em>nature</em></ins></span> of <span
class="removed"><del><strong>it. This
+ that never belonged to you. So you never really had control of it. This
unjust design is called
<a href="/philosophy/network-services-arent-free-or-nonfree.html">
- Service as</strong></del></span> <span
class="inserted"><ins><em>proprietary software.</p>
+ Service as a Software Substitute (SaaSS)</a>. That is what gave the
+ company the power to convert it into a $300 out-of-warranty brick, for
+ your “dumb home”.</p></strong></del></span> <span
class="inserted"><ins><em>working.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li></strong></del></span>
- <li id="M201705180">
- <p>Bird and rabbit pets were implemented for Second
- Life by</em></ins></span> a <span class="removed"><del><strong>Software
Substitute (SaaSS)</a>. That is what gave the</strong></del></span>
company <span class="removed"><del><strong>the power</strong></del></span>
<span class="inserted"><ins><em>that tethered their food</em></ins></span> to
<span class="removed"><del><strong>convert it into</strong></del></span> a
<span class="removed"><del><strong>$300 out-of-warranty brick, for
- your “dumb home”.</p>
- </li>
- <li>
- <p>Apple will stop</strong></del></span> <span
class="inserted"><ins><em>server.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older
- model iThings</a>.</p>
+ <span class="inserted"><ins><em><li id="M201706060"></em></ins></span>
+ <p>Apple will stop <a
+
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
+ bugs for older model iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down</em></ins></span> the <span
class="removed"><del><strong>nature of proprietary
software.</p></strong></del></span> <span
class="inserted"><ins><em>server and the pets more or less
died</a>.</p></em></ins></span>
+ that's the nature of proprietary software.</p>
</li>
<span class="removed"><del><strong><li><p>
Microsoft</strong></del></span>
- <span class="inserted"><ins><em><li id="M201704194">
+ <span class="inserted"><ins><em><li id="M201705180">
+ <p>Bird and rabbit pets were implemented for Second
+ Life by a company that tethered their food to a server. <a
+
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
+ It shut down the server and the pets more or less died</a>.</p>
+ </li>
+
+ <li id="M201704194">
<p>Microsoft has made Windows 7
and 8 cease to function on certain new computers, <a
href="https://support.microsoft.com/en-us/help/4012982/the-processor-is-not-supported-together-with-the-windows-version-that">effectively
@@ -279,7 +295,10 @@
ink cartridges</a>.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li>
+
+ <p>Once Microsoft has tricked a user into accepting installation
+ of</strong></del></span>
<span class="inserted"><ins><em><li id="M201606270">
<p id="windows10-forcing">In its efforts to trick users of Windows
@@ -305,9 +324,9 @@
while refusing to fix them itself.</p>
</li>
- <li id="M201606010"></em></ins></span>
+ <li id="M201606010">
<p>Once Microsoft has tricked a user
- into accepting installation of Windows 10, <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</strong></del></span>
+ into accepting installation of</em></ins></span> Windows 10, <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they</em></ins></span>
find that they are denied the option to cancel or even postpone the
imposed date of installation</a>.</p>
@@ -317,10 +336,7 @@
to get screwed sooner or later.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The Apple Music client
- program <a
href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
- the</strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201605150">
<p>Revolv is an IoT device which managed “smart home”
@@ -337,10 +353,10 @@
for your “dumb home”.</p>
</li>
- <li id="M201605040">
- <p>The Apple Music client program <a
-
href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans
- the</em></ins></span> user's file system for music files, copies them to
an Apple server,
+ <li id="M201605040"></em></ins></span>
+ <p>The Apple Music client program <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170520213355/https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</em></ins></span>
+ the user's file system for music files, copies them to an Apple server,
and deletes them</a>.</p>
</li>
@@ -398,7 +414,10 @@
<p>Microsoft
is <a
href="http://gizmodo.com/woman-wins-10-000-from-microsoft-after-unwanted-window-1782666146">
forcibly
- pushing</a> <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">Windows
+ pushing</a></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511244">
+ <p>Google has long had</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">Windows
update to its version 10</a>, ignoring the flag on Windows 7 or 8
that you could set to not upgrade. This reaffirms the presence of
a <a href="/proprietary/proprietary-back-doors.html">universal
@@ -409,12 +428,11 @@
href="http://www.ghacks.net/2015/11/24/beware-latest-windows-10-update-may-remove-programs-automatically/">
delete applications</a> without asking permission.</p>
</li>
- <li><p>Google</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511244">
- <p>Google</em></ins></span> has long had <a
+ <li><p>Google has long had <a
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
- back door to remotely unlock an Android device</a>, unless its disk
+ back door</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+ back door</em></ins></span> to remotely unlock an Android
device</a>, unless its disk
is encrypted (possible since Android 5.0 Lollipop, but still not
quite the <span class="removed"><del><strong>default).</p></li>
<li><p>
@@ -738,7 +756,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/02 13:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary/po/proprietary-sabotage.de.po 5 Jan 2019 11:31:35 -0000
1.109
+++ proprietary/po/proprietary-sabotage.de.po 2 Feb 2019 13:31:31 -0000
1.110
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -85,6 +85,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
Index: proprietary/po/proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary/po/proprietary-sabotage.fr.po 17 Jan 2019 07:52:57 -0000
1.125
+++ proprietary/po/proprietary-sabotage.fr.po 2 Feb 2019 13:31:31 -0000
1.126
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2019-01-16 21:50+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -73,6 +74,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
Index: proprietary/po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary-sabotage.it-diff.html 5 Jan 2019 11:31:35
-0000 1.36
+++ proprietary/po/proprietary-sabotage.it-diff.html 2 Feb 2019 13:31:31
-0000 1.37
@@ -51,6 +51,20 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
@@ -705,7 +719,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/02 13:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/proprietary-sabotage.it.po 5 Jan 2019 11:31:35 -0000
1.102
+++ proprietary/po/proprietary-sabotage.it.po 2 Feb 2019 13:31:31 -0000
1.103
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -68,6 +68,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
Index: proprietary/po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary-sabotage.ja-diff.html 5 Jan 2019 11:31:35
-0000 1.39
+++ proprietary/po/proprietary-sabotage.ja-diff.html 2 Feb 2019 13:31:31
-0000 1.40
@@ -52,6 +52,20 @@
<div class="column-limit" id="proprietary-sabotage"></div>
<ul class="blurbs">
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running
it</a>.</em></ins></span> The <span class="inserted"><ins><em>result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
@@ -82,7 +96,7 @@
<li id="M201806250">
<p>The game Metal Gear Rising for
- MacOS was tethered to a server.</em></ins></span> The <span
class="inserted"><ins><em>company <a
+ MacOS was tethered to a server. The company <a
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
shut down the server, and all copies stopped working</a>.</p>
</li>
@@ -685,7 +699,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/02 13:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary/po/proprietary-sabotage.ja.po 5 Jan 2019 11:31:35 -0000
1.94
+++ proprietary/po/proprietary-sabotage.ja.po 2 Feb 2019 13:31:31 -0000
1.95
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -67,6 +67,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
Index: proprietary/po/proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary-sabotage.pot 5 Jan 2019 11:31:35 -0000
1.61
+++ proprietary/po/proprietary-sabotage.pot 2 Feb 2019 13:31:31 -0000
1.62
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -57,6 +57,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a "
+"href=\"https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/\">
"
+"reports information to identify who is running it</a>. The result is often a "
+"legal threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a "
"href=\"https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade
"
"the performance of older phones to force users to buy their newer "
Index: proprietary/po/proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary/po/proprietary-sabotage.ru.po 17 Jan 2019 06:30:31 -0000
1.163
+++ proprietary/po/proprietary-sabotage.ru.po 2 Feb 2019 13:31:31 -0000
1.164
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2018-12-10 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -70,6 +71,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple and Samsung deliberately <a href=\"https://www.theguardian.com/"
"technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones\">degrade "
"the performance of older phones to force users to buy their newer phones</a>."
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/proprietary-surveillance.de-diff.html 23 Jan 2019
16:59:17 -0000 1.36
+++ proprietary/po/proprietary-surveillance.de-diff.html 2 Feb 2019
13:31:31 -0000 1.37
@@ -118,10 +118,11 @@
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareInBIOS">Spyware in
BIOS</a></li>
</ul>
- </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
+ </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareAtWork">Spyware at Work</a>
- <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInSkype">Spyware in
Skype</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInGames">Games</a></li></em></ins></span>
+ <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInSkype">Spyware in
Skype</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li>
+ <li><a
href="#SpywareInGames">Games</a></li></em></ins></span>
</ul>
</li>
<li><a <span
class="removed"><del><strong>href="#SpywareOnTheRoad">Spyware on the
Road</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInEquipment">Spyware in Connected
Equipment</a></em></ins></span>
@@ -324,7 +325,9 @@
<p>To use proprietary software is to invite such treatment.</p>
</li>
- <span class="removed"><del><strong><li><p></strong></del></span>
+ <span class="removed"><del><strong><li><p>
+ Windows 10 <a
href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+ ships with default settings that show no regard</strong></del></span>
<span class="inserted"><ins><em><li id="M201508180">
<p><a
@@ -335,16 +338,16 @@
<li id="M201508130">
<p><a
-
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/"></em></ins></span>
- Windows 10 <span class="inserted"><ins><em>sends identifiable information
to Microsoft</a>, even if
+
href="http://arstechnica.com/information-technology/2015/08/even-when-told-not-to-windows-10-just-cant-stop-talking-to-microsoft/">
+ Windows 10 sends identifiable information to Microsoft</a>, even if
a user turns off its Bing search and Cortana features, and activates
the privacy-protection settings.</p>
</li>
<li id="M201507300">
- <p>Windows 10</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20151001035410/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/"></em></ins></span>
- ships with default settings that show no regard for the privacy of
+ <p>Windows 10 <a
+
href="https://web.archive.org/web/20180923125732/https://jonathan.porta.codes/2015/07/30/windows-10-seems-to-have-some-scary-privacy-defaults/">
+ ships with default settings that show no regard</em></ins></span> for the
privacy of
its users</a>, giving Microsoft the “right” to snoop on
the users' files, text input, voice input, location info, contacts,
calendar records and web browsing history, as well as automatically
@@ -526,24 +529,12 @@
Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy;</strong></del></span>
<span class="inserted"><ins><em>spyware via
- BIOS</a></em></ins></span> on <span
class="inserted"><ins><em>Windows installs. Note that</em></ins></span> the
<span class="removed"><del><strong>contrary, it
- worked in various ways to prevent that, and deleted these apps
- after discovering what they did. So we cannot blame Google
- specifically for the snooping of these apps.</p>
-
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares</strong></del></span> <span
class="inserted"><ins><em>specific
- sabotage method Lenovo used did not affect GNU/Linux; also, a
+ <p>Google</strong></del></span> <span
class="inserted"><ins><em>spyware via
+ BIOS</a> on Windows installs. Note that the specific
+ sabotage method Lenovo used</em></ins></span> did not <span
class="removed"><del><strong>intend</strong></del></span> <span
class="inserted"><ins><em>affect GNU/Linux; also, a
“clean” Windows install is not really clean since <a
- href="/proprietary/malware-microsoft.html">Microsoft
puts</em></ins></span> in <span class="removed"><del><strong>the responsibility
for the injustice of their
- being nonfree. It also distributes</strong></del></span> its
- own <span class="removed"><del><strong>nonfree apps, such as
- Google
- Play, <a
href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
-
- <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em>malware</a>.</p>
+ href="/proprietary/malware-microsoft.html">Microsoft puts in its
+ own malware</a>.</p>
</li>
</ul>
@@ -562,42 +553,27 @@
<ul class="blurbs">
<li id="M201601110">
- <p>The natural extension</em></ins></span> of <span
class="removed"><del><strong>preventing apps from
- cheating? There</strong></del></span> <span
class="inserted"><ins><em>monitoring
- people through “their” phones</em></ins></span> is <span
class="removed"><del><strong>no systematic way for Google, or Android
- users, to inspect executable</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html"></em></ins></span>
- proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>software</em></ins></span> to <span
class="removed"><del><strong>see what</strong></del></span> <span
class="inserted"><ins><em>make sure</em></ins></span> they
- <span class="removed"><del><strong>do.</p>
-
- <p>Google could demand the source code for these apps, and
study</strong></del></span> <span class="inserted"><ins><em>can't
“fool”</em></ins></span>
- the
- <span class="removed"><del><strong>source code
somehow</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
+ <p>The natural extension of monitoring
+ people through “their” phones is <a
+
href="http://www.northwestern.edu/newscenter/stories/2016/01/fool-activity-tracker.html">
+ proprietary software</em></ins></span> to make <span
class="removed"><del><strong>these apps spy; on</strong></del></span> <span
class="inserted"><ins><em>sure they can't “fool”</em></ins></span>
+ the <span class="removed"><del><strong>contrary, it
+ worked in various ways</strong></del></span> <span
class="inserted"><ins><em>monitoring</a>.</p>
</li>
<li id="M201510050">
- <p>According</em></ins></span> to <span
class="removed"><del><strong>determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough</strong></del></span> <span class="inserted"><ins><em>Edward
Snowden, <a
+ <p>According</em></ins></span> to <span
class="removed"><del><strong>prevent that,</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
href="http://www.bbc.com/news/uk-34444233">agencies can take over
smartphones</a> by sending hidden text messages which enable
- them</em></ins></span> to <span
class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>turn</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
+ them to turn the phones on</em></ins></span> and <span
class="removed"><del><strong>deleted these apps
+ after discovering what they did. So we cannot blame Google
+ specifically for</strong></del></span> <span
class="inserted"><ins><em>off, listen to</em></ins></span> the <span
class="removed"><del><strong>snooping of these apps.</p>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>phones on and off,
listen</em></ins></span> to the
- <span class="removed"><del><strong>public, so we can depend on each
other.</p>
-</li>
-<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</strong></del></span> <span
class="inserted"><ins><em>microphone,
- retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>GPS, take photographs, read
- text messages, read call, location</em></ins></span> and <span
class="removed"><del><strong>security
- of 283 Android VPN apps concluded that “in spite of the
- promises for privacy, security,</strong></del></span> <span
class="inserted"><ins><em>web browsing history,</em></ins></span> and <span
class="removed"><del><strong>anonymity given by</strong></del></span>
- <span class="inserted"><ins><em>read</em></ins></span> the
- <span class="removed"><del><strong>majority of VPN apps—millions of
users may be unawarely subject</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is
designed</em></ins></span> to <span class="removed"><del><strong>poor security
guarantees</strong></del></span> <span class="inserted"><ins><em>disguise itself
+ <p>On</strong></del></span> <span class="inserted"><ins><em>microphone,
+ retrieve geo-location data from</em></ins></span> the <span
class="removed"><del><strong>other hand, Google redistributes nonfree Android
apps,</strong></del></span> <span class="inserted"><ins><em>GPS, take
photographs, read
+ text messages, read call, location</em></ins></span> and
+ <span class="removed"><del><strong>therefore shares
in</strong></del></span> <span class="inserted"><ins><em>web browsing history,
and
+ read</em></ins></span> the <span
class="removed"><del><strong>responsibility for</strong></del></span> <span
class="inserted"><ins><em>contact list. This malware is designed to disguise
itself
from investigation.</p>
</li>
@@ -605,37 +581,34 @@
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
- Android,</em></ins></span> and <span class="removed"><del><strong>abusive
practices inflicted by
- VPN apps.”</p>
+ Android, and BlackBerry</a>. While there is not much
+ detail here, it seems that this does not operate via</em></ins></span>
+ the <span class="removed"><del><strong>injustice of their
+ being nonfree.</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
+ phones have.</em></ins></span> It <span class="removed"><del><strong>also
distributes its own nonfree apps, such as
+ Google
+ Play, <a
href="/philosophy/free-software-even-more-important.html">which</strong></del></span>
<span class="inserted"><ins><em>may involve exploiting various bugs.
There</em></ins></span> are <span
class="removed"><del><strong>malicious</a>.</p>
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>BlackBerry</a>. While there</em></ins></span>
is <span class="removed"><del><strong>a non-exhaustive list of proprietary VPN
apps from
- the research paper</strong></del></span> <span
class="inserted"><ins><em>not much
- detail here, it seems</em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>this does not operate via</em></ins></span>
- the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There are <a
+ <p>Could Google have done a better job</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</em></ins></span> of
- <span class="removed"><del><strong>users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+ lots</em></ins></span> of <span class="removed"><del><strong>preventing
apps from
+ cheating? There is no systematic way for Google, or Android
+ users, to inspect executable proprietary apps to see what they
+ do.</p>
- <dt>sFly Network Booster</dt>
- <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> the <span
class="removed"><del><strong><code>READ_SMS</code></strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
+ <p>Google could demand</strong></del></span> <span
class="inserted"><ins><em>bugs in</em></ins></span> the <span
class="removed"><del><strong>source code for these apps,</strong></del></span>
<span class="inserted"><ins><em>phones' radio software</a>.</p>
</li>
<li id="M201307000">
<p>Portable phones with GPS <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
- will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong><code>SEND_SMS</code>
- permissions upon installation, meaning</strong></del></span> <span
class="inserted"><ins><em>users cannot stop
- them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>has full access</strong></del></span> <span
class="inserted"><ins><em>will eventually require all new portable
phones</em></ins></span>
- to
- <span class="removed"><del><strong>users' text messages.</dd>
-
- <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
+ will send their GPS location on remote command,</em></ins></span> and
<span class="removed"><del><strong>study the
+ source code somehow to determine whether they
mistreat</strong></del></span> users <span class="removed"><del><strong>in
+ various ways. If it did a good job of this,</strong></del></span> <span
class="inserted"><ins><em>cannot stop
+ them</a>. (The US says</em></ins></span> it <span
class="removed"><del><strong>could more or less
+ prevent such snooping, except when the app developers are clever
+ enough</strong></del></span> <span class="inserted"><ins><em>will
eventually require all new portable phones</em></ins></span>
+ to <span class="removed"><del><strong>outsmart</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
</li>
</ul>
@@ -647,134 +620,204 @@
<ul class="blurbs">
<li id="M201711250">
- <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
- <dd>Requests</strong></del></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read logs
- for other apps and also core system logs. TigerVPN developers
- have confirmed this.</dd>
+ <p>The DMCA and</em></ins></span> the <span
class="removed"><del><strong>checking.</p>
- <dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also,</strong></del></span> <span
class="inserted"><ins><em>EU Copyright Directive make</em></ins></span> it
<span class="removed"><del><strong>stores detailed logs
- and may turn them over</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>But since Google itself develops malicious apps, we cannot trust
+ Google to protect us. We must demand release of source
code</strong></del></span> <span class="inserted"><ins><em>EU Copyright
Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</em></ins></span> to <span class="inserted"><ins><em>study how iOS
cr…apps spy on users</a>, because
- this would require circumventing</em></ins></span> the <span
class="removed"><del><strong>UK government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>iOS
DRM.</p>
+ illegal</em></ins></span> to <span class="removed"><del><strong>the
+ public, so we can depend</strong></del></span> <span
class="inserted"><ins><em>study how iOS cr…apps spy</em></ins></span> on
<span class="removed"><del><strong>each other.</p></strong></del></span>
<span class="inserted"><ins><em>users</a>, because
+ this would require circumventing the iOS DRM.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p>A
+ <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span>
- <li id="M201709210">
- <p>In the latest iThings system,
- “turning off” WiFi and Bluetooth the obvious way <a
+ <span class="inserted"><ins><em><li id="M201709210">
+ <p>In</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>latest iThings system,
+ “turning off” WiFi</em></ins></span> and <span
class="removed"><del><strong>security
+ of 283 Android VPN apps concluded that “in spite
of</strong></del></span> <span
class="inserted"><ins><em>Bluetooth</em></ins></span> the
+ <span class="removed"><del><strong>promises</strong></del></span> <span
class="inserted"><ins><em>obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>. A more advanced way really does
turn
- them off—only until 5am. That's Apple for you—“We
- know you want to be spied on”.</p>
+ them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>privacy, security, and anonymity given by the
+ majority of VPN apps—millions of users may</strong></del></span>
<span class="inserted"><ins><em>you—“We
+ know you want to</em></ins></span> be <span
class="removed"><del><strong>unawarely subject</strong></del></span> <span
class="inserted"><ins><em>spied on”.</p>
</li>
<li id="M201702150">
<p>Apple proposes <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
- fingerprint-scanning touch screen</a>—which would mean no way
- to use it without having your fingerprints taken. Users would have
- no way</em></ins></span> to <span class="inserted"><ins><em>tell
whether</em></ins></span> the
- <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span class="inserted"><ins><em>phone is snooping
on them.</p>
+ fingerprint-scanning touch screen</a>—which would mean no
way</em></ins></span>
+ to <span class="removed"><del><strong>poor security guarantees and abusive
practices inflicted by
+ VPN apps.”</p>
+
+ <p>Following is a non-exhaustive list of proprietary VPN apps from
+ the research paper that tracks and infringes</strong></del></span> <span
class="inserted"><ins><em>use it without having your fingerprints taken. Users
would have
+ no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>phone is snooping on them.</p>
</li>
<li id="M201611170">
<p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span class="inserted"><ins><em>personal data to
Apple's servers</a>. Big Brother can get
- them from there.</p>
+ lots</em></ins></span> of
+ <span class="removed"><del><strong>users:</p>
+
+ <dl>
+ <dt>SurfEasy</dt>
+ <dd>Includes tracking libraries such as NativeX and Appflood,
+ meant</strong></del></span> <span class="inserted"><ins><em>personal
data</em></ins></span> to <span class="removed"><del><strong>track users and
show</strong></del></span> <span class="inserted"><ins><em>Apple's
servers</a>. Big Brother can get</em></ins></span>
+ them <span class="removed"><del><strong>targeted ads.</dd>
+
+ <dt>sFly Network Booster</dt>
+ <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning it has full
access</strong></del></span> <span class="inserted"><ins><em>from
there.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload to Apple's servers
all</em></ins></span> the <span class="removed"><del><strong>JS
injection</strong></del></span> <span class="inserted"><ins><em>photos
- and videos they make.</p>
+ <p>iThings automatically upload</em></ins></span> to
+ <span class="removed"><del><strong>users' text messages.</dd>
+
+ <dt>DroidVPN and TigerVPN</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>Apple's servers all</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code> permission to
read logs
+ for other apps</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
+ and <span class="removed"><del><strong>also core system logs. TigerVPN
developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it</strong></del></span> <span
class="inserted"><ins><em>videos they make.</p>
- <blockquote><p> iCloud Photo Library stores every photo and
video you
- take, and keeps them up to date on all your devices. Any edits you
+ <blockquote><p> iCloud Photo Library</em></ins></span> stores
<span class="removed"><del><strong>detailed logs</strong></del></span> <span
class="inserted"><ins><em>every photo</em></ins></span> and <span
class="removed"><del><strong>may turn</strong></del></span> <span
class="inserted"><ins><em>video you
+ take, and keeps</em></ins></span> them <span
class="removed"><del><strong>over to the UK government if
+ requested.</dd>
+
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span
class="inserted"><ins><em>up</em></ins></span> to <span
class="removed"><del><strong>the
+ users.</strong></del></span> <span class="inserted"><ins><em>date on all
your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup of iOS</a>. The term “cloud” means “please
+ information</a> as accessed on 24 Sep 2015.)</em></ins></span> The
<span class="removed"><del><strong>stated purpose of</strong></del></span>
<span class="inserted"><ins><em>iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated
by</em></ins></span> the <span class="removed"><del><strong>JS
injection</strong></del></span>
+ <span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
don't ask where.”</p>
<p>There</em></ins></span> is <span class="inserted"><ins><em>a
way</em></ins></span> to <span class="removed"><del><strong>display
ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
iCloud</a>, but it's active by default so</em></ins></span> it <span
class="removed"><del><strong>redirects the
- user's traffic</strong></del></span> <span
class="inserted"><ins><em>still counts as a
+ user's traffic through valueclick.com (an advertising
+ website).</dd>
+
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages, and also uses
+ roughly 5 tracking libraries. Developers of this app have
+ confirmed that the non-premium version</strong></del></span> <span
class="inserted"><ins><em>still counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage of this to <a
+ <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>the app does
+ JavaScript injection for tracking and display ads.</dd>
+ </dl>
+</li>
+<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span> <span
class="inserted"><ins><em>this to <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA can access any of them</em></ins></span>
through <span class="removed"><del><strong>valueclick.com (an advertising
- website).</dd>
+ nude photos</em></ins></span> of <span class="removed"><del><strong>the
top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries. For
+ the paid proprietary apps, it was only 60%.</p>
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript</strong></del></span> <span
class="inserted"><ins><em><a
-
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ <p>The article confusingly describes gratis apps as
“free”,</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed to break Apple's
+ security to get at them,</em></ins></span> but <span
class="removed"><del><strong>most</strong></del></span> <span
class="inserted"><ins><em>NSA can access any</em></ins></span> of them <span
class="removed"><del><strong>are not in fact</strong></del></span> <span
class="inserted"><ins><em>through</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
- <li id="M201409220">
+<span class="removed"><del><strong><li>
+ <p>Apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.</p>
+ remotely extract some data from iPhones</em></ins></span> for <span
class="removed"><del><strong>BART</strong></del></span> <span
class="inserted"><ins><em>the state</a>.</p>
- <p>This may have improved with <a
-
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but <a
- href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p>
+ <p>This may have improved with</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they don't.</p>
+</li>
+
+<li>
+ <p>A study found 234 Android apps that track users
by</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.
+ </p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p></em></ins></span>
</li>
- <li id="M201407230">
+<span class="removed"><del><strong><li>
+ <p>Pairs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem to exist
- for no possible purpose other than surveillance</a>. Here is the
<a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
+ Several “features”</em></ins></span> of <span
class="removed"><del><strong>Android apps can collude to transmit users'
personal
+ data</strong></del></span> <span class="inserted"><ins><em>iOS
seem</em></ins></span> to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>exist
+ for no possible purpose other than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
+ tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></em></ins></span>
</li>
- <li id="M201401100">
- <p>The <a class="not-a-duplicate"
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401100">
+ <p>The</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
+ iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>personal details of users that
install</strong></del></span> <span class="inserted"><ins><em>iThing is, and
get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop on all the data in an iThing, or it
- is totally incompetent</a>.</p>
+ Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>app</a>.</p>
+
+<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="removed"><del><strong>“consent” of
users</strong></del></span> <span class="inserted"><ins><em>data in an iThing,
or it</em></ins></span>
+ is <span class="removed"><del><strong>not enough
+to legitimize actions like this. At this point, most users have
+stopped reading the “Terms and Conditions”</strong></del></span>
<span class="inserted"><ins><em>totally incompetent</a>.</p>
</li>
<li id="M201308080">
<p>The iThing also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default, though that can be
+ tells Apple its geolocation</a> by default, though</em></ins></span>
that <span class="removed"><del><strong>spell out
+what they are “consenting” to. Google should clearly
+and honestly identify the information it collects on</strong></del></span>
<span class="inserted"><ins><em>can be
turned off.</p>
</li>
<li id="M201210170">
- <p>There is also a feature for web sites to track users, which is
<a
+ <p>There is also a feature for web sites to track</em></ins></span>
users, <span class="removed"><del><strong>instead
+of hiding</strong></del></span> <span class="inserted"><ins><em>which is <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it is
- still true in iOS 7.)</p>
+ enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it <span class="inserted"><ins><em>is
+ still true</em></ins></span> in <span class="inserted"><ins><em>iOS
7.)</p>
</li>
<li id="M201204280">
- <p>Users cannot make an Apple ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
- to install even gratis apps</a>) without giving a valid
- email address and receiving the verification</em></ins></span> code <span
class="removed"><del><strong>into HTML pages,</strong></del></span> <span
class="inserted"><ins><em>Apple sends
+ <p>Users cannot make</em></ins></span> an <span
class="removed"><del><strong>obscurely worded EULA.</p>
+
+<p>However,</strong></del></span> <span class="inserted"><ins><em>Apple
ID (<a
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
+ to <span class="removed"><del><strong>truly protect people's privacy, we
must prevent Google</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>other companies</strong></del></span> <span
class="inserted"><ins><em>receiving the verification code Apple sends
to it.</p>
</li>
</ul>
@@ -789,8 +832,9 @@
<li id="M201812060">
<p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
- upload call logs automatically from Android phones</a> while
disguising
- what the “consent” was for.</p>
+ upload call logs automatically</em></ins></span> from <span
class="removed"><del><strong>getting this personal information
in</strong></del></span> <span class="inserted"><ins><em>Android
phones</a> while disguising
+ what</em></ins></span> the <span class="removed"><del><strong>first
+place!</p></strong></del></span> <span
class="inserted"><ins><em>“consent” was for.</p>
</li>
<li id="M201711210">
@@ -803,10 +847,12 @@
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of data to China</a>.</p>
+ sold with spyware sending lots of data to
China</a>.</p></em></ins></span>
</li>
- <li id="M201609140">
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201609140"></em></ins></span>
<p>Google Play (a component of Android) <a
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
tracks the users' movements without their permission</a>.</p>
@@ -818,90 +864,89 @@
unthinkable with free software.</p>
</li>
- <li id="M201507030">
- <p>Samsung phones come with <a
-
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers of this app have
- confirmed</strong></del></span> <span class="inserted"><ins><em>they
send so much data</em></ins></span> that <span class="inserted"><ins><em>their
- transmission is a substantial expense for users. Said transmission,
- not wanted or requested by</em></ins></span> the <span
class="removed"><del><strong>non-premium version</strong></del></span> <span
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
- of <span class="removed"><del><strong>the app does
- JavaScript injection for tracking and display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em>some
kind.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li><p>More than 73% of the
most popular Android apps</strong></del></span>
- <span class="inserted"><ins><em><li id="M201403120"></em></ins></span>
- <p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</em></ins></span> the <span class="removed"><del><strong>top-ranked gratis
- proprietary</strong></del></span> <span
class="inserted"><ins><em>system.</p>
+ <span class="inserted"><ins><em><li id="M201507030">
+ <p>Samsung phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
+ behavioral</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
+ that users can't delete</a>,</em></ins></span> and <span
class="removed"><del><strong>location information</a>
of</strong></del></span> <span class="inserted"><ins><em>they send so much data
that</em></ins></span> their <span class="removed"><del><strong>users with
third parties.</p></strong></del></span>
+ <span class="inserted"><ins><em>transmission is a substantial expense for
users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>“Cryptic
communication,” unrelated</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201403120">
+ <p><a href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</em></ins></span> to <span
class="inserted"><ins><em>any file on</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found</strong></del></span> <span class="inserted"><ins><em>system.</p>
</li>
<li id="M201308010">
- <p>Spyware in</em></ins></span> Android <span
class="removed"><del><strong>apps contained recognizable tracking libraries.
For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The</strong></del></span> <span class="inserted"><ins><em>phones
(and Windows? laptops): The Wall Street
- Journal (in an</em></ins></span> article <span
class="removed"><del><strong>confusingly describes gratis apps as
“free”,
- but most of them are not in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses the ugly word “monetize”. A good replacement
- for that word is “exploit”; nearly always</strong></del></span>
<span class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="removed"><del><strong>will fit
- perfectly.</p>
-</li>
+ <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>the 500 most popular gratis</strong></del></span>
Android <span class="removed"><del><strong>apps</a>.</p>
-<li>
- <p>Apps for BART</strong></del></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI</em></ins></span> can <span class="removed"><del><strong>only hope
that they don't.</p>
-</li>
+ <p>The article should not have described these apps as
+ “free”—they are not free software.</strong></del></span>
<span class="inserted"><ins><em>phones (and Windows?
laptops):</em></ins></span> The <span class="removed"><del><strong>clear way to
say
+ “zero price” is “gratis.”</p>
-<li>
- <p>A study found 234</strong></del></span> <span
class="inserted"><ins><em>remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps that track
users by</strong></del></span> <span class="inserted"><ins><em>phones
- and laptops</a>. (I suspect this means Windows laptops.) Here
is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</strong></del></span>
- <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ <p>The</strong></del></span> <span class="inserted"><ins><em>Wall
Street
+ Journal (in an</em></ins></span> article <span
class="removed"><del><strong>takes for granted</strong></del></span> <span
class="inserted"><ins><em>blocked from us by a paywall)
reports</em></ins></span> that <span class="inserted"><ins><em><a
+
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></em></ins></span>
+ the <span class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no right to
+ analyze what users are doing or how. “Analytics” tools that
snoop are
+ just as wrong as any other snooping.</p>
+ </li>
+ <li><p>Gratis</strong></del></span> <span
class="inserted"><ins><em>FBI can remotely activate the GPS and microphone
in</em></ins></span> Android <span class="removed"><del><strong>apps (but not
<a href="/philosophy/free-sw.html">free software</a>)
+ connect to 100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>phones</em></ins></span>
+ and <span class="removed"><del><strong>advertising</a> URLs,
+ on the average.</p></strong></del></span> <span
class="inserted"><ins><em>laptops</a>. (I suspect this means Windows
laptops.) Here is <a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Spyware</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307280">
+ <p>Spyware</em></ins></span> is present in some Android devices when
they are
+ sold. Some Motorola <span class="removed"><del><strong>phones
modify</strong></del></span> <span class="inserted"><ins><em>phones, made when
this company was owned
+ by Google, use a modified version of</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ <span class="removed"><del><strong>send</strong></del></span>
+ <span class="inserted"><ins><em>sends</em></ins></span> personal data to
Motorola</a>.</p>
</li>
- <li id="M201307280">
- <p>Spyware is present</em></ins></span> in <span
class="removed"><del><strong>stores or played</strong></del></span> <span
class="inserted"><ins><em>some Android devices when they are
- sold. Some Motorola phones, made when this company was
owned</em></ins></span>
- by <span class="removed"><del><strong>TV programs</a>.
- </p>
-
-</li>
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
-<li>
- <p>Pairs</strong></del></span> <span class="inserted"><ins><em>Google,
use a modified version</em></ins></span> of Android <span
class="removed"><del><strong>apps can collude to transmit
users'</strong></del></span> <span class="inserted"><ins><em>that <a
-
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends</em></ins></span> personal data to <span
class="removed"><del><strong>servers.</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ <span class="inserted"><ins><em><li id="M201307250">
+ <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
- <li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span>
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file
on</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all the time</a>.</p></em></ins></span>
+ listens for voice all</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>time</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
-<span class="removed"><del><strong><li></strong></del></span>
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <span class="inserted"><ins><em><li id="M201302150"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201302150">
<p>Google Play intentionally sends app developers <a
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
the personal details of users that install the app</a>.</p>
- <p>Merely asking the “consent” of users is not enough to
- legitimize actions like this. At this point, most users have stopped
+ <p>Merely asking the “consent” of users is not
enough</em></ins></span> to <span class="removed"><del><strong>place new items
on top under each subsection --></strong></del></span>
+ <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify the information it collects on <span
class="removed"><del><strong>users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However,</strong></del></span> <span class="inserted"><ins><em>users,
instead of
+ honestly identify the information it collects on users, instead of
hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
@@ -942,17 +987,46 @@
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
report even which page the user reads at what time</a>.</p>
</li>
-</ul>
+</ul></em></ins></span>
<div class="big-section">
- <h3 id="SpywareInApplications">Spyware in Applications</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareInApplications">#SpywareInApplications</a>)</span>
+ <h3 <span class="removed"><del><strong>id="SpywareOnMobiles">Spyware
on Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInApplications">Spyware in
Applications</h3></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInApplications">#SpywareInApplications</a>)</span></em></ins></span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareIniThings">Spyware
in iThings</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDesktopApps">Desktop
Apps</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareIniThings">#SpywareIniThings</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span></em></ins></span>
+</div>
+
+<span class="removed"><del><strong><ul>
+ <li><p>The DMCA and the EU Copyright Directive make
it</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201811020">
+ <p>Foundry's graphics software</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because</strong></del></span> <span class="inserted"><ins><em>identify who is
running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that</em></ins></span> this
+ <span class="removed"><del><strong>would require
circumventing</strong></del></span> <span class="inserted"><ins><em>is used for
repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>In</strong></del></span>
+<span class="inserted"><ins><em></ul>
+
+<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
@@ -961,275 +1035,212 @@
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to the company's server</a>. The company is
- being sued, demanding that it notify the users of what it will do
- with the data.</p>
-
- <p>I think that lawsuit is about a side issue. What the company does
- with the data is a secondary issue. The principal wrong here is that
- the company gets that data at all.</p>
+ stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi and Bluetooth</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The company is
+ being sued, demanding that it notify</em></ins></span> the
+ <span class="removed"><del><strong>obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple for you—“We know you want to be spied
on”.</p>
+ </li>
+
+ <li><p>Apple proposes
+ <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way to use</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>without having your fingerprints
+ taken. Users would have no way to tell whether</strong></del></span>
<span class="inserted"><ins><em>will do
+ with</em></ins></span> the <span
class="removed"><del><strong>phone</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+
+ <p>I think that lawsuit</em></ins></span> is <span
class="removed"><del><strong>snooping on
+ them.</p></li>
+
+ <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots of personal</strong></del></span> <span
class="inserted"><ins><em>about a side issue. What the company does
+ with the</em></ins></span> data <span class="removed"><del><strong>to
Apple's servers</a>. Big Brother can
+ get them from there.</p>
+ </li>
+
+ <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells</strong></del></span>
<span class="inserted"><ins><em>is</em></ins></span> a <span
class="removed"><del><strong>server every phone number</strong></del></span>
<span class="inserted"><ins><em>secondary issue. The principal wrong here
is</em></ins></span> that
+ the <span class="removed"><del><strong>user types into it</a>; the
server records these numbers for</strong></del></span> <span
class="inserted"><ins><em>company gets that data</em></ins></span> at <span
class="removed"><del><strong>least 30
+ days.</p></strong></del></span> <span
class="inserted"><ins><em>all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
Other weather apps</a>, including Accuweather and WeatherBug, are
- tracking people's locations.</p>
+ tracking people's locations.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Users cannot make an
Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of</em></ins></span> gratis <span
class="removed"><del><strong>apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on</em></ins></span> the <span class="removed"><del><strong>code
Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span class="removed"><del><strong>it.</p>
+ </li>
+
+ <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some</em></ins></span> of <span
class="inserted"><ins><em>them send Facebook detailed information
about</em></ins></span>
+ the <span class="removed"><del><strong>most popular
iOS</strong></del></span> <span class="inserted"><ins><em>user's activities in
the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
</li>
<li id="M201810244">
- <p>Some Android apps <a
-
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted them</a>.</p>
+ <p>Some Android</em></ins></span> apps <a <span
class="removed"><del><strong>class="not-a-duplicate"
+ href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral and location information</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> users <span
class="removed"><del><strong>with third
parties.</p></strong></del></span> <span class="inserted"><ins><em>that
have deleted them</a>.</p></em></ins></span>
</li>
- <li id="M201808030">
+ <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201808030">
<p>Some Google apps on Android <a
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+ record</em></ins></span> the <span class="removed"><del><strong>photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you
take,</strong></del></span> <span class="inserted"><ins><em>user's location
even when users disable “location
tracking”</a>.</p>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google
-and</strong></del></span> <span class="inserted"><ins><em>turn off
the</em></ins></span> other <span class="removed"><del><strong>companies from
getting this personal information in</strong></del></span> <span
class="inserted"><ins><em>kinds of location
- tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>first
-place!</p></strong></del></span> <span
class="inserted"><ins><em>misleading control.</p></em></ins></span>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component of Android)</strong></del></span>
+ <li id="M201806110">
+ <p>The Spanish football streaming app <a
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements</em></ins></span> and <span
class="removed"><del><strong>keeps</strong></del></span> <span
class="inserted"><ins><em>listens through the microphone</a>.</p>
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>users'</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>without their permission</a>.</p>
-
- <p>Even if you disable Google Maps</strong></del></span> and <span
class="removed"><del><strong>location tracking, you must
- disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
-
- <p>This makes them act as spies for licensing enforcement.</p>
-
- <p>I expect it implements DRM, too—that
there</em></ins></span> is
- <span class="removed"><del><strong>yet another example of nonfree software
pretending</strong></del></span> <span class="inserted"><ins><em>no
way</em></ins></span> to <span class="removed"><del><strong>obey the user,
- when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>save</em></ins></span>
- a <span class="removed"><del><strong>thing would</strong></del></span>
<span class="inserted"><ins><em>recording. But I can't</em></ins></span> be
<span class="removed"><del><strong>almost
- unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>sure from the article.</p>
-
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p></em></ins></span>
- </li>
-
- <span
class="removed"><del><strong><li><p>More</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More</em></ins></span> than <span
class="removed"><del><strong>73%</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of the <span class="removed"><del><strong>most
popular</strong></del></span> <span
class="inserted"><ins><em>5,855</em></ins></span> Android apps
- <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral</strong></del></span> <span class="inserted"><ins><em>studied by
researchers were found to snoop</em></ins></span>
- and <span class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>. 40%
of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods</em></ins></span> of <span
class="inserted"><ins><em>snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
+ <p>This makes</em></ins></span> them <span
class="removed"><del><strong>up</strong></del></span> <span
class="inserted"><ins><em>act as spies for licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no
way</em></ins></span> to <span class="removed"><del><strong>date on all your
devices.
+ Any edits</strong></del></span> <span class="inserted"><ins><em>save
+ a recording. But I can't be sure from the article.</p>
+
+ <p>If</em></ins></span> you <span class="removed"><del><strong>make
are automatically updated everywhere. [...]
+ </p></blockquote>
- <p>This is evidence that proprietary apps generally work against
- their users. To protect</em></ins></span> their <span
class="inserted"><ins><em>privacy and freedom, Android</em></ins></span> users
<span class="removed"><del><strong>with third parties.</p>
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>learn to care
much less about sports, you will benefit in
+ many ways. This</em></ins></span> is <span class="inserted"><ins><em>one
more.</p>
</li>
- <li><p>“Cryptic communication,”
unrelated</strong></del></span>
- <span class="inserted"><ins><em>need</em></ins></span> to <span
class="inserted"><ins><em>get rid of</em></ins></span> the <span
class="removed"><del><strong>app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,
- and</em></ins></span> the <span class="removed"><del><strong>500 most
popular gratis Android apps</a>.</p>
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied</em></ins></span> by <span
class="inserted"><ins><em>researchers were found to snoop
+ and collect information about its users</a>. 40%
of</em></ins></span> the
+ <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods</em></ins></span> of <span
class="removed"><del><strong>iOS</a>.</strong></del></span> <span
class="inserted"><ins><em>snooping, in these proprietary apps whose
+ source code they cannot look at.</em></ins></span> The <span
class="removed"><del><strong>term “cloud” means
+ “please don't ask where.”</p>
- <p>The article should not have described these</strong></del></span>
<span class="inserted"><ins><em>proprietary</em></ins></span> apps <span
class="removed"><del><strong>as
- “free”—they are not</strong></del></span> <span
class="inserted"><ins><em>by getting apps from the</em></ins></span> free <span
class="removed"><del><strong>software. The clear way to say
- “zero price” is “gratis.”</p>
+ <p>There</strong></del></span> <span class="inserted"><ins><em>other
apps might be snooping
+ in other ways.</p>
- <p>The article takes for granted</strong></del></span> <span
class="inserted"><ins><em>software
- only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="inserted"><ins><em><a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently
warns</em></ins></span>
- the <span class="removed"><del><strong>usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what</strong></del></span> <span class="inserted"><ins><em>user if
an app contains anti-features</a>.</p>
+ <p>This</em></ins></span> is <span class="removed"><del><strong>a
way</strong></del></span> <span class="inserted"><ins><em>evidence that
proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need</em></ins></span> to <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default so it still
counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>get rid</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>the proprietary software—both proprietary
+ Android by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They
needed</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="removed"><del><strong>break Apple's
+ security to get at them, but NSA can access any of them
through</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
<li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which</em></ins></span> users are <span class="removed"><del><strong>doing
or how. “Analytics” tools</strong></del></span> <span
class="inserted"><ins><em>HIV-positive, then provides the information to
+ which users are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
- It could be designed so</em></ins></span> that <span
class="removed"><del><strong>snoop are
- just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>users communicate such info to each</em></ins></span>
- other <span class="removed"><del><strong>snooping.</p>
- </li>
- <li><p>Gratis Android apps (but</strong></del></span> <span
class="inserted"><ins><em>but</em></ins></span> not <span
class="removed"><del><strong><a href="/philosophy/free-sw.html">free
software</a>)
- connect</strong></del></span> to <span class="removed"><del><strong>100
- <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>the server's database.</p>
+ It could be designed so that users communicate such info to each
+ other but not to the server's database.</p>
</li>
<li id="M201803050">
- <p>The moviepass app</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
<span class="inserted"><ins><em>dis-service
- spy</em></ins></span> on <span class="removed"><del><strong>the
average.</p></strong></del></span> <span class="inserted"><ins><em>users
even more than users expected. It <a
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
- </li>
- <span class="removed"><del><strong><li><p>Spyware is
present</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>some</strong></del></span> <span
class="inserted"><ins><em>popular</em></ins></span> Android <span
class="removed"><del><strong>devices when they are sold.</strong></del></span>
<span class="inserted"><ins><em>apps
- is pervasive and sometimes very clever.</em></ins></span> Some <span
class="removed"><del><strong>Motorola phones modify Android
to</strong></del></span> <span class="inserted"><ins><em>trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p>
- </li>
-
- <li><p>Some manufacturers add</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a
- <span class="removed"><del><strong><a
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p>
+ <p>Don't be tracked—pay cash!</p>
</li>
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file on the
system.</p></strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store by noticing WiFi
- networks</a>.</p></em></ins></span>
+ <li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
-</div>
-
-<ul>
- <li><p>The DMCA and the EU Copyright Directive make
it</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book</em></ins></span> to <span class="removed"><del><strong>study how iOS
cr...apps spy on users</a>, because</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that</em></ins></span> this
- <span class="removed"><del><strong>would require
circumventing</strong></del></span> <span class="inserted"><ins><em>article
misuses</em></ins></span> the <span class="removed"><del><strong>iOS
DRM.</p></strong></del></span> <span class="inserted"><ins><em>words
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></em></ins></span>
+ referring to zero price.</p>
</li>
- <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth the
- obvious way</strong></del></span>
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent</em></ins></span> them <span
class="removed"><del><strong>off—only until 5am.
- That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em>and text messages and emails</em></ins></span>
to <span class="removed"><del><strong>be spied on”.</p>
- </li>
-
- <li><p>Apple proposes
- <a
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
-
- <p>Google did not intend</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>make these apps spy; on the
contrary,</em></ins></span> it <span class="removed"><del><strong>without
having your fingerprints
- taken. Users would have no way</strong></del></span>
- <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="removed"><del><strong>tell whether</strong></del></span> <span
class="inserted"><ins><em>prevent that, and deleted these apps after
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>phone
is</strong></del></span> snooping <span class="removed"><del><strong>on
- them.</p></li>
-
- <li><p>iPhones <a
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
- lots</strong></del></span> of <span
class="removed"><del><strong>personal data to Apple's servers</a>. Big
Brother can
- get them from there.</p>
- </li>
+ for the snooping of these apps.</p>
- <li><p>The iMessage app on iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that</strong></del></span> <span
class="inserted"><ins><em>these apps.</p>
-
- <p>On</em></ins></span> the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>other hand, Google redistributes nonfree Android
apps, and
- therefore shares in</em></ins></span> the <span
class="removed"><del><strong>server records these numbers</strong></del></span>
<span class="inserted"><ins><em>responsibility</em></ins></span> for <span
class="removed"><del><strong>at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot make an Apple ID</strong></del></span> <span
class="inserted"><ins><em>the injustice of their being
- nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a>
- without giving</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done</em></ins></span> a <span
class="removed"><del><strong>valid email address</strong></del></span> <span
class="inserted"><ins><em>better job of preventing apps from
+ <p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand the source code for these
apps,</em></ins></span> and <span
class="removed"><del><strong>receiving</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span>
- the <span class="inserted"><ins><em>source</em></ins></span> code <span
class="removed"><del><strong>Apple
- sends</strong></del></span> <span
class="inserted"><ins><em>somehow</em></ins></span> to <span
class="removed"><del><strong>it.</p>
- </li>
-
- <li><p>Around 47%</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
- various ways. If it did a good job</em></ins></span> of <span
class="inserted"><ins><em>this, it could more or less
- prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a> of their users with third
parties.</p>
- </li>
-
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>app developers are clever
- enough</em></ins></span> to <span class="removed"><del><strong>Apple's
servers all</strong></del></span> <span
class="inserted"><ins><em>outsmart</em></ins></span> the <span
class="removed"><del><strong>photos and
- videos they make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google</em></ins></span> to <span class="removed"><del><strong>date on all
your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud feature is
- <a href="https://support.apple.com/en-us/HT202033">activated by the
- startup</strong></del></span> <span class="inserted"><ins><em>protect
us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
- “please don't ask where.”</p>
-
- <p>There is a way</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> to <span
class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by
default</strong></del></span> <span class="inserted"><ins><em>the
- public,</em></ins></span> so <span class="removed"><del><strong>it still
counts as a
- surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage of this
to</strong></del></span> <span class="inserted"><ins><em>we can depend on each
other.</p>
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security to get at them, but NSA</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one</em></ins></span> can <span
class="removed"><del><strong>access any of them through</strong></del></span>
<span class="inserted"><ins><em>only hope that they don't.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
@@ -3079,7 +3090,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/23 16:59:17 $
+$Date: 2019/02/02 13:31:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- proprietary/po/proprietary-surveillance.de.po 23 Jan 2019 13:28:28
-0000 1.253
+++ proprietary/po/proprietary-surveillance.de.po 2 Feb 2019 13:31:31
-0000 1.254
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -211,6 +211,14 @@
#. type: Content of: <div><div><ul><li><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">⦠in Anwendungssoftware</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInMobileApps\">Mobile Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -1792,6 +1800,44 @@
msgstr " "
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr " "
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -1825,6 +1871,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.364
retrieving revision 1.365
diff -u -b -r1.364 -r1.365
--- proprietary/po/proprietary-surveillance.fr.po 23 Jan 2019 13:34:36
-0000 1.364
+++ proprietary/po/proprietary-surveillance.fr.po 2 Feb 2019 13:31:31
-0000 1.365
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2019-01-23 14:34+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -162,6 +163,14 @@
msgstr "<a href=\"#SpywareInApplications\">Espions dans les applications</a>"
#. type: Content of: <div><div><ul><li><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Applications mobiles</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr "<a href=\"#SpywareInMobileApps\">Applications mobiles</a>"
@@ -1347,6 +1356,46 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr "Applications mobiles"
@@ -1394,6 +1443,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary-surveillance.it-diff.html 23 Jan 2019
16:59:17 -0000 1.103
+++ proprietary/po/proprietary-surveillance.it-diff.html 2 Feb 2019
13:31:32 -0000 1.104
@@ -117,24 +117,25 @@
<li><a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">Spyware at Low
Level</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInApplications">Spyware in
Applications</a></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareInBIOS">Spyware in
BIOS</a></li>
- <!--</strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInFirmware">Spyware in
Firmware</a></li> --></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li>
- <li><a
href="#SpywareInGames">Games</a></li></em></ins></span>
+ <!--</strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInFirmware">Spyware in
Firmware</a></li> -->
+ </ul>
+ </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareAtWork">Spyware at Work</a>
+ <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInSkype">Spyware in
Skype</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInGames">Games</a></li></em></ins></span>
</ul>
</li>
- <li><a <span
class="removed"><del><strong>href="#SpywareAtWork">Spyware at
Work</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInEquipment">Spyware in Connected
Equipment</a></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareOnTheRoad">Spyware on the
Road</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInEquipment">Spyware in Connected
Equipment</a></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="#SpywareInSkype">Spyware in
Skype</a></li>
- </ul>
- </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInTVSets">TV
Sets</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareOnTheRoad">Spyware on the
Road</a>
- <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInCameras">Cameras</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInCameras">Spyware in
Cameras</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInToys">Toys</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">Spyware in
e-Readers</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDrones">Drones</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInCameras">Spyware in
Cameras</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInTVSets">TV
Sets</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">Spyware in
e-Readers</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInCameras">Cameras</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInVehicles">Spyware in
Vehicles</a></li>
</ul>
- </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareAtHome">Other
Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareAtHome">Spyware at
Home</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareOnWearables">Wearables</a></em></ins></span>
+ </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInToys">Toys</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareAtHome">Spyware at
Home</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDrones">Drones</a></li>
+ <li><a href="#SpywareAtHome">Other
Appliances</a></li>
+ <li><a
href="#SpywareOnWearables">Wearables</a></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareInTVSets">Spyware in TV
Sets</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareOnSmartWatches">“Smart”
Watches</a></li></em></ins></span>
</ul>
@@ -233,8 +234,8 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201712110">
- <p>HP's proprietary operating system</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-42309371">includes
a
+ <p>HP's proprietary operating system <a
+ href="http://www.bbc.com/news/technology-42309371">includes a
proprietary keyboard driver with a key logger in it</a>.</p>
</li>
@@ -251,8 +252,8 @@
<p>The <a
href="https://docs.microsoft.com/en-us/windows/privacy/configure-windows-diagnostic-data-in-your-organization#full-level">
“Full” telemetry mode</a> allows Microsoft Windows
- engineers to access, among other things, registry keys <a
- href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
+ engineers to access, among other things, registry keys</em></ins></span>
<a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://technet.microsoft.com/en-us/library/cc939702.aspx">which
can contain sensitive information like administrator's login
password</a>.</p>
</li>
@@ -484,7 +485,7 @@
</li>
<span class="removed"><del><strong><li><p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms
to</strong></del></span>
+ Spotlight search</a> sends users' search
terms</strong></del></span>
<span class="inserted"><ins><em><li id="M201410200">
<p>Various operations in <a
@@ -495,7 +496,7 @@
<li id="M201401101">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms to</em></ins></span>
Apple.</p>
+ Spotlight search</a> sends users' search terms</em></ins></span> to
Apple.</p>
</li>
</ul>
@@ -1081,9 +1082,13 @@
<p>If so, none of Facebook users' pictures are private
anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>reads at what
time</a>.</p>
+ report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -1094,40 +1099,55 @@
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+ <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
</div>
<ul class="blurbs">
- <li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>service.</p>
- </li>
+ <li id="M201811020">
+ <p>Foundry's graphics software</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit to increased snooping</a>, and some
+ are starting</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
- <li><p>Like most “music screaming” disservices,
Spotify</strong></del></span> <span class="inserted"><ins><em>company's
server</a>. The company</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
- 2015</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding
that</em></ins></span> it <span class="removed"><del><strong><a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span> <span class="inserted"><ins><em>notify
the</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some
- are starting to realize that</strong></del></span> <span
class="inserted"><ins><em>of what</em></ins></span> it <span
class="removed"><del><strong>is nasty.</p>
+ <p>The fact</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> is <span
class="removed"><del><strong>nasty.</p></strong></del></span> <span
class="inserted"><ins><em>used for repression of forbidden sharing
+ makes it even more vicious.</p></em></ins></span>
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>will do
- with</em></ins></span> the <span class="removed"><del><strong><a
+ <p>This <span class="removed"><del><strong>article shows the <a
href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a way
+ twisted ways</strong></del></span> <span
class="inserted"><ins><em>illustrates</em></ins></span> that <span
class="removed"><del><strong>they present snooping as</strong></del></span>
<span class="inserted"><ins><em>making unauthorized copies of nonfree software
+ is not</em></ins></span> a <span class="removed"><del><strong>way
to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>lawsuit</em></ins></span> is <span
class="inserted"><ins><em>about</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>side issue. What</em></ins></span> the <span
class="removed"><del><strong>attitude of the proprietary software industry
towards
+ whether they want that. This is a typical example
of</strong></del></span> <span class="inserted"><ins><em>cure
for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>the proprietary software industry towards
those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
</li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps</strong></del></span> <span class="inserted"><ins><em>company does
- with</em></ins></span> the <span class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>secondary issue. The principal wrong here is that
+ <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying</em></ins></span> for <span class="removed"><del><strong>mobile
devices report which other
+ apps</strong></del></span> the <span class="removed"><del><strong>user has
+ installed.</strong></del></span> <span class="inserted"><ins><em>nasty
thing, but cannot make it less nasty.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Mobile Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201901050">
+ <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's server</a>. The
company</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span>
+ <span class="inserted"><ins><em>being sued, demanding that it notify the
users of what it will do
+ with the data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
the company gets</em></ins></span> that <span
class="inserted"><ins><em>data</em></ins></span> at <span
class="removed"><del><strong>least is visible</strong></del></span> <span
class="inserted"><ins><em>all.</p>
<p><a
@@ -1139,72 +1159,55 @@
<span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Androids</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google</em></ins></span> apps <span
class="removed"><del><strong>snoop</strong></del></span> on <span
class="inserted"><ins><em>Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>user's location
even when users disable “location
- tracking”</a>.</p>
-
- <p>There are other ways</em></ins></span> to <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS in the
- phone.</p>
-
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
- tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>tricked</em></ins></span> by the <span
class="removed"><del><strong>question of whether the app developers get
- users to say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>misleading control.</p></em></ins></span>
+ <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
+
+ <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
+ Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>data it obtains
from</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities</em></ins></span> in the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless</em></ins></span> of whether the
<span class="removed"><del><strong>app developers get
+ users to say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span class="inserted"><ins><em>user
has a Facebook
+ account.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming</em></ins></span> app <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
-
- <p>This makes them act as spies</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
-
- <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <p>I expect</em></ins></span> it <span
class="removed"><del><strong>asked the user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no
way</em></ins></span> to <span class="inserted"><ins><em>save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <span class="inserted"><ins><em><li id="M201810244">
+ <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will benefit in
- many ways.</em></ins></span> This <span class="removed"><del><strong>shows
the
- weakness</strong></del></span> <span class="inserted"><ins><em>is one
more.</p>
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track</em></ins></span> the <span class="removed"><del><strong>user to
+ approve sending personal data to</strong></del></span> <span
class="inserted"><ins><em>phones of users that have deleted
them</a>.</p>
</li>
- <li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>surveillance: why
should a flashlight
- app send any</strong></del></span> <span class="inserted"><ins><em>snoop
- and collect</em></ins></span> information <span
class="removed"><del><strong>to anyone? A</strong></del></span> <span
class="inserted"><ins><em>about its users</a>. 40% of the apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
+ <li id="M201808030">
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>app
developer but did not
+ ask about sending it to</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
+ tracking”</a>.</p>
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need to get rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the</em></ins></span> free
software <span class="removed"><del><strong>flashlight</strong></del></span>
- <span class="inserted"><ins><em>only <a
href="https://f-droid.org/">F-Droid store</a> that <a
- href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
- the user if an</em></ins></span> app <span
class="removed"><del><strong>would not.</p></strong></del></span> <span
class="inserted"><ins><em>contains
anti-features</a>.</p></em></ins></span>
+ <p>There are</em></ins></span> other <span
class="removed"><del><strong>companies. This shows</strong></del></span> <span
class="inserted"><ins><em>ways to turn off</em></ins></span> the
+ <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>other kinds</em></ins></span> of <span
class="inserted"><ins><em>location
+ tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>misleading control.</p></em></ins></span>
</li>
<span class="removed"><del><strong></ul>
@@ -1217,140 +1220,156 @@
<ul>
<li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804020">
- <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which</em></ins></span> users <span class="removed"><del><strong>identify
themselves and</strong></del></span> <span class="inserted"><ins><em>are
HIV-positive,</em></ins></span> then <span class="removed"><del><strong>sends
personal data about them to
+ <span class="inserted"><ins><em><li id="M201806110">
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements</em></ins></span> and <span
class="removed"><del><strong>then sends personal data
about</strong></del></span> <span class="inserted"><ins><em>listens through the
microphone</a>.</p>
+
+ <p>This makes</em></ins></span> them <span
class="removed"><del><strong>to
nVidia servers</a>.</p>
</li>
<li><p>Angry Birds
- <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies, and</strong></del></span> <span
class="inserted"><ins><em>provides</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
- Here's</strong></del></span>
- <span class="inserted"><ins><em>companies</a>.</p>
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"></strong></del></span>
<span class="inserted"><ins><em>act as</em></ins></span> spies for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>Grindr should not have so much</em></ins></span> information
<span class="removed"><del><strong>on
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's information on
<a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More</strong></del></span> about <span class="removed"><del><strong>NSA
app spying</a>.</p></strong></del></span> <span
class="inserted"><ins><em>its users.
- It could be designed so that users communicate such info to each
- other but not to the server's database.</p></em></ins></span>
+ More</strong></del></span> <span class="inserted"><ins><em>care much
less</em></ins></span> about <span class="removed"><del><strong>NSA app
spying</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
+</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
- <li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201803050"></em></ins></span>
- <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla</strong></del></span> <span class="inserted"><ins><em>moviepass
app</em></ins></span> and <span class="removed"><del><strong>i-Que
transmit</strong></del></span> <span class="inserted"><ins><em>dis-service
- spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>Nuance
Communications</a>,</strong></del></span> a <span
class="removed"><del><strong>speech recognition company
based</strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
-
- <p>Don't be tracked—pay cash!</p>
+ <li>
+ <p>The “smart” toys My Friend Cayla and i-Que
transmit</strong></del></span>
+ <span class="inserted"><ins><em>many ways. This is one more.</p>
</li>
- <li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>the U.S.</p>
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
+ a speech recognition company based in the U.S.</p>
- <p>Those toys also contain major security vulnerabilities;
crackers</strong></del></span> <span class="inserted"><ins><em>popular Android
apps
- is pervasive and sometimes very clever. Some trackers</em></ins></span>
can <span class="removed"><del><strong>remotely control the toys
with</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>mobile
phone. This would
- enable crackers to listen in on</strong></del></span> <span
class="inserted"><ins><em>user's movements around</em></ins></span> a <span
class="removed"><del><strong>child's speech, and even speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>physical store by noticing WiFi
- networks</a>.</p></em></ins></span>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of</em></ins></span> the <span class="removed"><del><strong>toys with a
mobile phone. This would
+ enable crackers</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech,</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and <span class="removed"><del><strong>even speak
+ into</strong></del></span> <span class="inserted"><ins><em>collect
information about its users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p>
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p>A computerized vibrator
<a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p></strong></del></span>
+ was snooping</strong></del></span> <span class="inserted"><ins><em>apps
were
+ found to insecurely snitch</em></ins></span> on its <span
class="removed"><del><strong>users through the</strong></del></span> <span
class="inserted"><ins><em>users. Furthermore, they could
+ detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>control app</a>.</p>
- <span class="inserted"><ins><em><li id="M201708270"></em></ins></span>
- <p>The <span class="inserted"><ins><em>Sarahah</em></ins></span> app
<span class="removed"><del><strong>was reporting the temperature of the
vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+ <p>The app was reporting the temperature</strong></del></span> <span
class="inserted"><ins><em>apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
- <p>Note the totally inadequate proposed response: a labeling
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it was
surrounded</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android</em></ins></span> by <span class="removed"><del><strong>a person's
+ body), as well as</strong></del></span> <span
class="inserted"><ins><em><a href="https://replicant.us">switching to
Replicant</a>,
+ and</em></ins></span> the <span class="removed"><del><strong>vibration
frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
standard with which manufacturers would make statements about
- their products, rather than free software which users could have
- checked</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>changed.</p>
+ their products, rather than</strong></del></span> free software <span
class="removed"><del><strong>which users could have
+ checked and changed.</p>
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>email addresses</a> in user's address
- book to developer's server. Note</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ <p>The company</strong></del></span>
+ <span class="inserted"><ins><em>only <a
href="https://f-droid.org/">F-Droid store</a></em></ins></span> that
<span class="removed"><del><strong>made the vibrator</strong></del></span>
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns
+ the user if an app contains anti-features</a>.</p>
</li>
- <li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how
+ <li id="M201804020">
+ <p>Grindr collects</em></ins></span> information about <span
class="removed"><del><strong>how
people used it</a>.</p>
- <p>The company's statement that it was
anonymizing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em><a
+
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>information</em></ins></span> to <span
class="removed"><del><strong>a
+ data broker, the data broker would</strong></del></span>
+ <span class="inserted"><ins><em>companies</a>.</p>
- <p>Google did not intend to make these apps spy;
on</em></ins></span> the <span class="removed"><del><strong>data may be
- true, but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>contrary,</em></ins></span> it <span
class="removed"><del><strong>had sold the data</strong></del></span>
- <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="removed"><del><strong>a
- data broker,</strong></del></span> <span
class="inserted"><ins><em>prevent that, and deleted these apps after
- discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span class="removed"><del><strong>data broker
would have been able to figure out
- who</strong></del></span> <span class="inserted"><ins><em>snooping of
these apps.</p>
+ <p>Grindr should not</em></ins></span> have <span
class="removed"><del><strong>been able</strong></del></span> <span
class="inserted"><ins><em>so much information about its users.
+ It could be designed so that users communicate such info to each
+ other but not</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who</strong></del></span> the <span class="removed"><del><strong>user
was.</p>
+
+ <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>server's database.</p>
+ </li>
- <p>On</em></ins></span> the <span class="removed"><del><strong>user
was.</p>
+ <li id="M201803050">
+ <p>The moviepass app and dis-service
+ spy on users even more than users expected. It</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going</em></ins></span> to <span
class="removed"><del><strong>pay</strong></del></span> a <span
class="removed"><del><strong>total of C$4m</a>
+ to its customers.</p></strong></del></span> <span
class="inserted"><ins><em>movie</a>.</p>
- <p>Following this lawsuit,
- <a
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps, and
- therefore shares in</em></ins></span> the <span
class="removed"><del><strong>company has been ordered to pay a
total</strong></del></span> <span class="inserted"><ins><em>responsibility for
the injustice</em></ins></span> of <span
class="removed"><del><strong>C$4m</a>
- to</strong></del></span> <span class="inserted"><ins><em>their being
- nonfree. It also distributes</em></ins></span> its <span
class="removed"><del><strong>customers.</p>
+ <p>Don't be tracked—pay cash!</p></em></ins></span>
</li>
- <li><p> “CloudPets” toys with microphones
+ <span class="removed"><del><strong><li><p>
“CloudPets” toys with microphones
<a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to the
- manufacturer</a>. Guess what?</strong></del></span> <span
class="inserted"><ins><em>own nonfree apps, such as Google
Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
- are malicious</a>.</p>
+ manufacturer</a>. Guess what?</strong></del></span>
- <p>Could Google have done</em></ins></span> a <span
class="inserted"><ins><em>better job of preventing apps from
- cheating? There is no systematic</em></ins></span> way <span
class="inserted"><ins><em>for Google, or Android users,</em></ins></span>
- to <span class="removed"><del><strong>access the data</a>
- collected by</strong></del></span> <span
class="inserted"><ins><em>inspect executable proprietary apps to see what they
do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>manufacturer's snooping.</p>
-
- <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>source code for these apps,</em></ins></span> and
<span class="inserted"><ins><em>study</em></ins></span>
- the <span class="removed"><del><strong>FBI</strong></del></span> <span
class="inserted"><ins><em>source code somehow to determine whether they
mistreat users in
- various ways. If it did a good job of this, it</em></ins></span> could
<span class="removed"><del><strong>listen</strong></del></span> <span
class="inserted"><ins><em>more or less
- prevent such snooping, except when the app developers are clever
- enough</em></ins></span> to <span class="removed"><del><strong>these
conversations
+ <span class="inserted"><ins><em><li id="M201711240">
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow</em></ins></span> a <span class="removed"><del><strong>way to
access the data</a>
+ collected by the manufacturer's snooping.</p>
+
+ <p>That the manufacturer</strong></del></span> <span
class="inserted"><ins><em>user's movements around a physical store by noticing
WiFi
+ networks</a>.</p>
+ </li>
+
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers</em></ins></span> and <span
class="inserted"><ins><em>email addresses</a> in user's address
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span class="removed"><del><strong>FBI could
listen</strong></del></span> <span class="inserted"><ins><em>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</em></ins></span> to <span class="removed"><del><strong>these
conversations
was unacceptable by itself.</p></li>
- <li><p>Barbie
- <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span> <span class="inserted"><ins><em>outsmart the
checking.</p>
+ <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>zero price.</p>
+ </li>
- <p>But since Google itself develops malicious apps, we cannot trust
- Google</em></ins></span> to <span class="removed"><del><strong>spy on
children and adults</a>.</p>
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls</em></ins></span> and <span
class="removed"><del><strong>adults</a>.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>protect us. We must demand release of source
code</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>the
- public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>top under</strong></del></span> each <span
class="removed"><del><strong>subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>sent them and text messages and
emails</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1360,59 +1379,71 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware in BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>the contrary, it
+ worked</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>other.</p>
+<li><p></strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that, and deleted these apps
after
+ discovering what they did. So we cannot blame Google specifically
+ for the snooping of these apps.</p>
+
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ are malicious</a>.</p>
+
+ <p>Could Google have done a better job of preventing apps from
+ cheating? There is no systematic way for Google, or Android users,
+ to inspect executable proprietary apps to see what they do.</p>
+
+ <p>Google could demand the source code for these
apps,</em></ins></span> and <span class="removed"><del><strong>spyware via
BIOS</a> on Windows installs.
+Note that</strong></del></span> <span
class="inserted"><ins><em>study</em></ins></span>
+ the <span class="removed"><del><strong>specific sabotage method Lenovo
used</strong></del></span> <span class="inserted"><ins><em>source code somehow
to determine whether they mistreat users in
+ various ways. If it</em></ins></span> did <span
class="removed"><del><strong>not affect
+GNU/Linux; also,</strong></del></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean</strong></del></span> <span class="inserted"><ins><em>good job of this,
it could more or less
+ prevent such snooping, except when the app developers are clever
+ enough to outsmart the checking.</p>
+
+ <p>But</em></ins></span> since <span
class="removed"><del><strong><a
href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>Google itself develops malicious apps, we cannot trust
+ Google</em></ins></span> to <span class="removed"><del><strong>place new
items on top under</strong></del></span> <span
class="inserted"><ins><em>protect us. We must demand release of source code to
the
+ public, so we can depend on</em></ins></span> each <span
class="removed"><del><strong>subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via
BIOS</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop</em></ins></span> on <span class="removed"><del><strong>Windows
installs.
-Note</strong></del></span> <span
class="inserted"><ins><em>users</a>.</p>
-
- <p>With free software apps, users could <em>make
sure</em></em></ins></span> that <span class="removed"><del><strong>the
specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>they
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop on users</a>.</p>
+
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
<li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
+ <p>A study found 234 Android apps that track users by <a
+
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging by</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ <p>Faceapp appears to do lots of surveillance, judging by <a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access it demands to personal data in the
device</a>.</p>
</li>
@@ -1427,13 +1458,24 @@
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ the app to snoop</em></ins></span> at <span
class="removed"><del><strong>Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span
class="inserted"><ins><em>all</a>.</p>
</li>
<li id="M201704074">
<p>Pairs of Android apps can collude
- to transmit users' personal data to servers. <a
-
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
+ to transmit users' personal data to servers.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
@@ -2873,7 +2915,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/23 16:59:17 $
+$Date: 2019/02/02 13:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.266
retrieving revision 1.267
diff -u -b -r1.266 -r1.267
--- proprietary/po/proprietary-surveillance.it.po 23 Jan 2019 13:28:28
-0000 1.266
+++ proprietary/po/proprietary-surveillance.it.po 2 Feb 2019 13:31:32
-0000 1.267
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -197,6 +197,14 @@
#. type: Content of: <div><div><ul><li><ul><li>
# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop Apps</a>+}
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">Spyware in applicazioni mobili</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>-]
# | {+href=\"#SpywareInMobileApps\">Mobile Apps</a>+}
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
@@ -1727,6 +1735,46 @@
"\">#SpywareIniThings</a>)</span>"
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -1762,6 +1810,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary/po/proprietary-surveillance.ja-diff.html 23 Jan 2019
16:59:18 -0000 1.113
+++ proprietary/po/proprietary-surveillance.ja-diff.html 2 Feb 2019
13:31:32 -0000 1.114
@@ -117,24 +117,25 @@
<li><a <span
class="removed"><del><strong>href="#SpywareAtLowLevel">Spyware at Low
Level</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInApplications">Spyware in
Applications</a></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareInBIOS">Spyware in
BIOS</a></li>
- <!--</strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInFirmware">Spyware in
Firmware</a></li> --></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li>
- <li><a
href="#SpywareInGames">Games</a></li></em></ins></span>
+ <!--</strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDesktopApps">Desktop
Apps</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInFirmware">Spyware in
Firmware</a></li> -->
+ </ul>
+ </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInMobileApps">Mobile
Apps</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareAtWork">Spyware at Work</a>
+ <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInSkype">Skype</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInSkype">Spyware in
Skype</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInGames">Games</a></li></em></ins></span>
</ul>
</li>
- <li><a <span
class="removed"><del><strong>href="#SpywareAtWork">Spyware at
Work</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInEquipment">Spyware in Connected
Equipment</a></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareOnTheRoad">Spyware on the
Road</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInEquipment">Spyware in Connected
Equipment</a></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="#SpywareInSkype">Spyware in
Skype</a></li>
- </ul>
- </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInTVSets">TV
Sets</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareOnTheRoad">Spyware on the
Road</a>
- <ul></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInCameras">Cameras</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInCameras">Spyware in
Cameras</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInToys">Toys</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">Spyware in
e-Readers</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDrones">Drones</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInCameras">Spyware in
Cameras</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInTVSets">TV
Sets</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">Spyware in
e-Readers</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInCameras">Cameras</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="#SpywareInVehicles">Spyware in
Vehicles</a></li>
</ul>
- </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareAtHome">Other
Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="#SpywareAtHome">Spyware at
Home</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareOnWearables">Wearables</a></em></ins></span>
+ </li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInToys">Toys</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="#SpywareAtHome">Spyware at
Home</a></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareInDrones">Drones</a></li>
+ <li><a href="#SpywareAtHome">Other
Appliances</a></li>
+ <li><a
href="#SpywareOnWearables">Wearables</a></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="#SpywareInTVSets">Spyware in TV
Sets</a></li></strong></del></span> <span
class="inserted"><ins><em>href="#SpywareOnSmartWatches">“Smart”
Watches</a></li></em></ins></span>
</ul>
@@ -251,7 +252,7 @@
<li>In order to increase</strong></del></span> Windows <span
class="removed"><del><strong>10's install base, Microsoft</strong></del></span>
<span class="inserted"><ins><em>10, called the
“Creators Update,” Windows maximized the
surveillance</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice</strong></del></span>
+blatantly disregards user</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/10/dutch-privacy-regulator-says-that-windows-10-breaks-the-law">
by force setting the telemetry mode to
“Full”</a>.</p>
@@ -281,7 +282,7 @@
<li id="M201608171">
<p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
- blatantly disregards user choice</em></ins></span> and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>privacy</a>.</p></em></ins></span>
+ blatantly disregards user</em></ins></span> choice and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>privacy</a>.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p><a</strong></del></span>
@@ -464,9 +465,9 @@
the latest</strong></del></span>
<span class="inserted"><ins><em><li id="M201410300">
- <p></em></ins></span> MacOS <span class="removed"><del><strong>send
reports to Apple</a> servers.</p></strong></del></span> <span
class="inserted"><ins><em>automatically <a
+ <p></em></ins></span> MacOS <span class="removed"><del><strong>send
reports</strong></del></span> <span class="inserted"><ins><em>automatically
<a
href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- sends to Apple servers unsaved documents being edited</a>. The
+ sends</em></ins></span> to <span
class="removed"><del><strong>Apple</a>
servers.</p></strong></del></span> <span class="inserted"><ins><em>Apple
servers unsaved documents being edited</a>. The
things you have not decided to save are <a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
even more sensitive</a> than the things you have stored in
files.</p></em></ins></span>
@@ -568,10 +569,9 @@
Some Motorola phones modify Android</strong></del></span>
<span class="inserted"><ins><em><li id="M201510050">
- <p>According</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal</strong></del></span> <span
class="inserted"><ins><em>Edward Snowden, <a
- href="http://www.bbc.com/news/uk-34444233">agencies can take over
+ <p>According</em></ins></span> to <span
class="inserted"><ins><em>Edward Snowden,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/uk-34444233">agencies
can take over
smartphones</a> by sending hidden text messages which enable
them to turn the phones on and off, listen to the microphone,
retrieve geo-location</em></ins></span> data <span
class="inserted"><ins><em>from the GPS, take photographs, read
@@ -674,10 +674,10 @@
behavioral and location information</a> of their users with third
parties.</p>
</li>
- <li><p>iThings</strong></del></span>
+ <li><p>iThings automatically upload to Apple's servers
all</strong></del></span>
<span class="inserted"><ins><em><li id="M201509240">
- <p>iThings</em></ins></span> automatically upload to Apple's servers
all the photos
+ <p>iThings automatically upload to Apple's servers
all</em></ins></span> the photos
and videos they make.</p>
<blockquote><p> iCloud Photo Library stores every photo and
video you
@@ -913,7 +913,9 @@
the <span class="removed"><del><strong>ride</a>.</p>
<p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>personal
details of users that install</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance is inadequate as a protection against massive
+ for surveillance</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+
+ <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>inadequate as a
protection against massive
surveillance.</p>
</li>
@@ -921,9 +923,7 @@
all conversations</a>.</p>
</li>
- <li><p>Apps</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
-
- <p>Merely asking the “consent” of users is not enough to
+ <li><p>Apps</strong></del></span> <span
class="inserted"><ins><em>not enough to
legitimize actions like this. At this point, most users have stopped
reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>include
<a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
@@ -982,9 +982,11 @@
<p>If so, none of Facebook users' pictures are private
anymore,</strong></del></span> <span class="inserted"><ins><em>Kindle:
<a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
- report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>reads at what
time</a>.</p>
+ report</em></ins></span> even <span
class="removed"><del><strong>if</strong></del></span> <span
class="inserted"><ins><em>which page</em></ins></span> the user <span
class="removed"><del><strong>didn't “upload” them to the
service.</p></strong></del></span> <span class="inserted"><ins><em>reads
at what time</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -995,40 +997,56 @@
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInMobileApps">Mobile Apps</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+ <h4 id="SpywareInDesktopApps">Desktop Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInDesktopApps">#SpywareInDesktopApps</a>)</span>
</div>
<ul class="blurbs">
- <li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify</strong></del></span> <span class="inserted"><ins><em>company's
server</a>. The company</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
- 2015</strong></del></span>
- <span class="inserted"><ins><em>being sued, demanding
that</em></ins></span> it <span class="removed"><del><strong><a
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who</em></ins></span> is <span
class="removed"><del><strong>based on proprietary malware (DRM and snooping).
In August
+ 2015 it <a
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded</strong></del></span> <span class="inserted"><ins><em>notify
the</em></ins></span> users <span class="removed"><del><strong>submit to
increased snooping</a>, and some
- are starting to realize that</strong></del></span> <span
class="inserted"><ins><em>of what</em></ins></span> it <span
class="removed"><del><strong>is nasty.</p>
+ demanded users submit to increased snooping</a>, and some
+ are starting to realize</strong></del></span> <span
class="inserted"><ins><em>running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
- <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>will do
- with</em></ins></span> the <span class="removed"><del><strong><a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</strong></del></span> <span
class="inserted"><ins><em>data.</p>
+ <p>The fact</em></ins></span> that <span
class="removed"><del><strong>it</strong></del></span> <span
class="inserted"><ins><em>this</em></ins></span> is <span
class="removed"><del><strong>nasty.</p></strong></del></span> <span
class="inserted"><ins><em>used for repression of forbidden sharing
+ makes it even more vicious.</p></em></ins></span>
- <p>I think</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a way
+ <p>This <span class="removed"><del><strong>article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</strong></del></span> <span
class="inserted"><ins><em>illustrates</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a way
to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>lawsuit</em></ins></span> is <span
class="inserted"><ins><em>about</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>side issue. What</em></ins></span> the <span
class="removed"><del><strong>attitude of the proprietary software industry
towards
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
+ is <span class="inserted"><ins><em>not</em></ins></span> a <span
class="removed"><del><strong>typical example of</strong></del></span> <span
class="inserted"><ins><em>cure for</em></ins></span> the <span
class="removed"><del><strong>attitude</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>the proprietary software industry towards
those they have subjugated.</p>
<p>Out, out, damned Spotify!</p>
</li>
- <li><p>Many proprietary apps for mobile devices report which
other
- apps</strong></del></span> <span class="inserted"><ins><em>company does
- with</em></ins></span> the <span class="removed"><del><strong>user has
- installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>data</em></ins></span> is <span
class="removed"><del><strong>doing this in</strong></del></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>secondary issue. The principal wrong here is that
+ <li><p>Many proprietary apps</strong></del></span> <span
class="inserted"><ins><em>nonfree software. It may avoid
+ paying</em></ins></span> for <span class="removed"><del><strong>mobile
devices report which other
+ apps</strong></del></span> the <span class="removed"><del><strong>user has
+ installed.</strong></del></span> <span class="inserted"><ins><em>nasty
thing, but cannot make it less nasty.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInMobileApps">Mobile Apps</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
+</div>
+
+<ul class="blurbs">
+ <li id="M201901050">
+ <p>The Weather Channel app</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored users' locations to the company's server</a>. The
company</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span>
+ <span class="inserted"><ins><em>being sued, demanding that it notify the
users of what it will do
+ with the data.</p>
+
+ <p>I think that lawsuit is about</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
the company gets</em></ins></span> that <span
class="inserted"><ins><em>data</em></ins></span> at <span
class="removed"><del><strong>least is visible</strong></del></span> <span
class="inserted"><ins><em>all.</p>
<p><a
@@ -1040,151 +1058,166 @@
<span class="removed"><del><strong><li><p>FTC says most
mobile</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect
privacy:</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones of users that have deleted
them</a>.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201812290">
+ <p>Around 40% of gratis Androids</em></ins></span> apps <span
class="removed"><del><strong>for children don't respect privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
+ <li><p>Widely used</strong></del></span> <a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report</em></ins></span> on the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>user's
actions</em></ins></span> to <span
class="inserted"><ins><em>Facebook</a>.</p>
- <span class="inserted"><ins><em><li id="M201808030">
- <p>Some Google</em></ins></span> apps <span
class="removed"><del><strong>snoop</strong></del></span> on <span
class="inserted"><ins><em>Android <a
-
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>user's location
even when users disable “location
- tracking”</a>.</p>
+ <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>snooping done by</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,” so that
+ Facebook can correlate</em></ins></span> the <span
class="removed"><del><strong>phone company, and perhaps
by</strong></del></span> <span class="inserted"><ins><em>data it obtains
from</em></ins></span> the <span
class="removed"><del><strong>OS</strong></del></span> <span
class="inserted"><ins><em>same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities</em></ins></span> in the
+ <span class="removed"><del><strong>phone.</p>
- <p>There are other ways</em></ins></span> to <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>snooping done by the phone company, and perhaps by
the OS in the
- phone.</p>
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>app; others only say that</em></ins></span> the <span
class="removed"><del><strong>question of</strong></del></span> <span
class="inserted"><ins><em>user is
+ using that app, but that alone is often quite informative.</p>
- <p>Don't</strong></del></span> <span
class="inserted"><ins><em>other kinds of location
- tracking, but most users will</em></ins></span> be <span
class="removed"><del><strong>distracted</strong></del></span> <span
class="inserted"><ins><em>tricked</em></ins></span> by the <span
class="removed"><del><strong>question of whether the app developers get
- users to say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>misleading control.</p></em></ins></span>
+ <p>This spying occurs regardless of</em></ins></span> whether the
<span class="removed"><del><strong>app developers get</strong></del></span>
<span class="inserted"><ins><em>user has a Facebook
+ account.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming</em></ins></span> app <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
- the user's movements and listens through the
microphone</a>.</p>
-
- <p>This makes them act as spies</em></ins></span> for <span
class="removed"><del><strong>use by companies.</a></p>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of</em></ins></span> users <span
class="removed"><del><strong>to say “I agree”. That is no excuse
for malware.</p></strong></del></span> <span
class="inserted"><ins><em>that have deleted
them</a>.</p></em></ins></span>
+ </li>
- <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
- <p>I expect</em></ins></span> it <span
class="removed"><del><strong>asked</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no way to save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <span class="inserted"><ins><em><li id="M201808030">
+ <p>Some Google apps on Android</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
- <p>If you learn</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal data to the
app developer but did not
- ask</strong></del></span> <span class="inserted"><ins><em>care much
less</em></ins></span> about <span class="removed"><del><strong>sending it to
other companies.</strong></del></span> <span class="inserted"><ins><em>sports,
you will benefit in
- many ways.</em></ins></span> This <span class="removed"><del><strong>shows
the
- weakness</strong></del></span> <span class="inserted"><ins><em>is one
more.</p>
- </li>
+ <p>The FTC criticized this app because it
asked</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record</em></ins></span> the <span class="removed"><del><strong>user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>user's location even when users disable
“location
+ tracking”</a>.</p>
- <li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of the <span class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>surveillance: why
should a flashlight
- app send any</strong></del></span> <span class="inserted"><ins><em>snoop
- and collect</em></ins></span> information <span
class="inserted"><ins><em>about its users</a>. 40% of the apps were
- found</em></ins></span> to <span class="removed"><del><strong>anyone? A
free software flashlight
- app would not.</p>
+ <p>There are other ways</em></ins></span> to <span
class="inserted"><ins><em>turn off</em></ins></span> the <span
class="removed"><del><strong>app developer but did not
+ ask about sending it to</strong></del></span> other <span
class="removed"><del><strong>companies. This shows the
+ weakness</strong></del></span> <span
class="inserted"><ins><em>kinds</em></ins></span> of <span
class="inserted"><ins><em>location
+ tracking, but most users will be tricked by</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information to anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>misleading control.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<div class="big-subsection">
- <h4 id="SpywareInGames">Spyware</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch on its users. Furthermore, they
could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>Games</h4>
+ <h4 id="SpywareInGames">Spyware in Games</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInGames">#SpywareInGames</a>)</span>
</div>
<ul>
- <li><p>nVidia's</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> proprietary <span
class="removed"><del><strong>GeForce Experience <a
href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
- users identify themselves</strong></del></span> <span
class="inserted"><ins><em>apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
+ <li><p>nVidia's proprietary GeForce
Experience</strong></del></span>
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy</em></ins></span> and <span
class="removed"><del><strong>then sends personal data about
them</strong></del></span> <span class="inserted"><ins><em>freedom, Android
users
- need</em></ins></span> to
- <span class="removed"><del><strong>nVidia servers</a>.</p>
+ <span class="inserted"><ins><em><li id="M201806110">
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.gamersnexus.net/industry/2672-geforce-experience-data-transfer-analysis">makes
+ users identify themselves</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements</em></ins></span> and <span
class="removed"><del><strong>then sends personal data
about</strong></del></span> <span class="inserted"><ins><em>listens through the
microphone</a>.</p>
+
+ <p>This makes</em></ins></span> them <span
class="removed"><del><strong>to
+ nVidia servers</a>.</p>
</li>
- <li><p>Angry Birds</strong></del></span> <span
class="inserted"><ins><em>get rid of the proprietary software—both
proprietary
- Android by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
- spies for companies,</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
- and the <span class="removed"><del><strong>NSA takes advantage to spy
through it too</a>.
- Here's information on</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps from the free
software
- only</em></ins></span> <a <span
class="removed"><del><strong>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ <li><p>Angry Birds
+ <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html"></strong></del></span>
<span class="inserted"><ins><em>act as</em></ins></span> spies for <span
class="removed"><del><strong>companies, and</strong></del></span> <span
class="inserted"><ins><em>licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that there is no way to save
+ a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>NSA takes advantage</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>spy through it too</a>.
+ Here's information on
+ <a
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More</strong></del></span> <span class="inserted"><ins><em>care much
less</em></ins></span> about <span class="removed"><del><strong>NSA app
spying</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <h4 id="SpywareInToys">Spyware</strong></del></span> <span
class="inserted"><ins><em>sports, you will benefit</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
<ul>
- <li><p>A company</strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span class="removed"><del><strong>makes
internet-controlled vibrators</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
- being sued for collecting lots of personal</strong></del></span>
- <span
class="inserted"><ins><em>href="https://f-droid.org/wiki/page/Antifeatures">
prominently warns
- the user if an app contains anti-features</a>.</p>
+ <li><p>A company that makes internet-controlled
vibrators</strong></del></span>
+ <span class="inserted"><ins><em>many ways. This is one more.</p>
</li>
- <li id="M201804020">
- <p>Grindr collects</em></ins></span> information about <span
class="removed"><del><strong>how
+ <li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+ being sued for collecting lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
+ of <span class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>the 5,855 Android apps studied by researchers were
found to snoop
+ and collect</em></ins></span> information about <span
class="removed"><del><strong>how
people use it</a>.</p>
- <p>The company's statement that it
anonymizes</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users are HIV-positive, then provides</em></ins></span> the <span
class="removed"><del><strong>data may</strong></del></span> <span
class="inserted"><ins><em>information to
- companies</a>.</p>
-
- <p>Grindr should not have so much information about its users.
- It could</em></ins></span> be
- <span class="removed"><del><strong>true,</strong></del></span> <span
class="inserted"><ins><em>designed so that users communicate such info to each
- other</em></ins></span> but <span class="removed"><del><strong>it doesn't
really matter. If it sells the data</strong></del></span> <span
class="inserted"><ins><em>not</em></ins></span> to <span
class="removed"><del><strong>a
- data broker, the data broker can figure out who</strong></del></span>
the <span class="removed"><del><strong>user is.</p></strong></del></span>
<span class="inserted"><ins><em>server's database.</p></em></ins></span>
+ <p>The company's statement that it
anonymizes</strong></del></span> <span class="inserted"><ins><em>its
users</a>. 40% of</em></ins></span> the <span
class="removed"><del><strong>data may be
+ true, but it doesn't really matter. If it sells the
data</strong></del></span> <span class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span class="removed"><del><strong>a
+ data broker, the data broker can figure out who the user is.</p>
</li>
- <span class="removed"><del><strong><li><p>A computerized
- vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops
- on its users through the proprietary control
app</a>.</p></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201803050"></em></ins></span>
- <p>The <span class="inserted"><ins><em>moviepass</em></ins></span>
app <span class="removed"><del><strong>reports the temperature of the vibrator
minute by
- minute (thus, indirectly, whether it is surrounded by a person's
- body),</strong></del></span> and <span class="removed"><del><strong>the
vibration frequency.</p>
+ <li><p>A computerized
+ vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">snoops</strong></del></span>
<span class="inserted"><ins><em>insecurely snitch</em></ins></span> on its
<span class="removed"><del><strong>users through the</strong></del></span>
<span class="inserted"><ins><em>users. Furthermore, they could
+ detect only some methods of snooping, in these</em></ins></span>
proprietary <span class="removed"><del><strong>control app</a>.</p>
- <p>Note the totally inadequate proposed response: a labeling
+ <p>The app reports the temperature</strong></del></span> <span
class="inserted"><ins><em>apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
+
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy and freedom, Android users
+ need to get rid</em></ins></span> of the <span
class="removed"><del><strong>vibrator minute by
+ minute (thus, indirectly, whether it is surrounded</strong></del></span>
<span class="inserted"><ins><em>proprietary software—both proprietary
+ Android</em></ins></span> by <span class="removed"><del><strong>a person's
+ body),</strong></del></span> <span class="inserted"><ins><em><a
href="https://replicant.us">switching to
Replicant</a>,</em></ins></span>
+ and the <span class="removed"><del><strong>vibration frequency.</p>
+
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps
from</em></ins></span> the <span class="removed"><del><strong>totally
inadequate proposed response: a labeling
standard with which manufacturers would make statements about
- their products, rather</strong></del></span> <span
class="inserted"><ins><em>dis-service
- spy on users even more</em></ins></span> than <span
class="removed"><del><strong>free software which</strong></del></span> users
<span class="removed"><del><strong>can check
- and change.</p>
- </li>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before and after</em></ins></span> going to <span
class="removed"><del><strong>spy on children and
adults.</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a movie</a>.</p>
+ their products, rather than</strong></del></span> free software <span
class="removed"><del><strong>which users can check
+ and change.</p></strong></del></span>
+ <span class="inserted"><ins><em>only <a
href="https://f-droid.org/">F-Droid store</a> that <a
+ href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
+ the user if an app contains
anti-features</a>.</p></em></ins></span>
+ </li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804020">
+ <p>Grindr collects information about</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
+ which users are HIV-positive, then provides the information to
+ companies</a>.</p>
- <p>Don't be tracked—pay cash!</p></em></ins></span>
+ <p>Grindr should not have so much information about its users.
+ It could be designed so that users communicate such info to each
+ other but not</em></ins></span> to <span class="inserted"><ins><em>the
server's database.</p>
</li>
-<span class="removed"><del><strong></ul>
+
+ <li id="M201803050">
+ <p>The moviepass app and dis-service</em></ins></span>
+ spy on <span class="removed"><del><strong>children</strong></del></span>
<span class="inserted"><ins><em>users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p>
+ </li>
+</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>after going</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
@@ -1194,45 +1227,40 @@
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>a movie</a>.</p>
+
+ <p>Don't be tracked—pay cash!</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201711240">
+ <li id="M201711240">
<p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
<ul>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>popular Android apps
- is pervasive and sometimes very clever. Some trackers
can</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
+<li><p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+ is pervasive</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows installs.
+Note that the specific sabotage method Lenovo used did not affect
+GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some trackers can <a
+
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
+clean since</strong></del></span> <span class="inserted"><ins><em>user's
movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
<li id="M201708270">
- <p>The Sarahah app <a
-
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers</em></ins></span> and <span
class="removed"><del><strong>spyware via BIOS</a> on Windows
installs.</strong></del></span> <span class="inserted"><ins><em>email
addresses</a> in user's address
- book to developer's server.</em></ins></span> Note that <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo
used</strong></del></span> <span class="inserted"><ins><em>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
- </li>
-
- <li id="M201707270">
- <p>20 dishonest Android apps recorded <a
-
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
-
- <p>Google</em></ins></span> did not <span
class="removed"><del><strong>affect
-GNU/Linux; also, a “clean” Windows install is not really
-clean since <a href="/proprietary/malware-microsoft.html">Microsoft
-puts in its own malware</a>.
+ <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
+puts</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a></em></ins></span>
in <span class="removed"><del><strong>its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>intend</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>make these apps spy;</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>user's address
+ book</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -1246,91 +1274,107 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically,</strong></del></span> <span
class="inserted"><ins><em>the contrary,</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span>
- <span class="inserted"><ins><em>worked in various ways to prevent that,
and deleted these apps after
+ <p>Specifically, it can collect</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article
misuses</em></ins></span> the <span class="inserted"><ins><em>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
+ </li>
+
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and</em></ins></span> emails <span
class="removed"><del><strong>of members of Parliament
+ this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>to snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy; on the
contrary,</em></ins></span> it <span class="removed"><del><strong>through
Microsoft.</p></li>
+
+ <li><p>Spyware in Cisco TNP IP phones:
+ <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInSkype">Spyware</strong></del></span>
+ <span class="inserted"><ins><em>worked</em></ins></span> in <span
class="removed"><del><strong>Skype</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+</div>
+
+<ul>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>various ways to prevent that, and deleted these apps
after
discovering what they did. So we cannot blame Google specifically
- for</em></ins></span> the <span
class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>these apps.</p>
+ for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice</em></ins></span>
of <span class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span
class="inserted"><ins><em>their being
- nonfree. It also distributes its own nonfree apps, such as Google Play,
- <a href="/philosophy/free-software-even-more-important.html">which
+ therefore shares</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google
Play,</em></ins></span>
+ <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see what</em></ins></span> they
<span class="removed"><del><strong>pass it through
Microsoft.</p></li>
+ cheating? There is no systematic way</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
+ </li>
+</ul>
+
- <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>do.</p>
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>Google, or Android users,</em></ins></span>
+ to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>inspect executable
proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat
users</em></ins></span> in <span class="removed"><del><strong>Cisco TNP IP
phones:</strong></del></span>
- <span class="inserted"><ins><em>various ways. If it did a good job of
this, it could more or less
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ public, so we can depend</em></ins></span> on <span
class="removed"><del><strong>top under</strong></del></span> each <span
class="removed"><del><strong>subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>other.</p>
</li>
<li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040">
+ <li id="M201705040">
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed</em></ins></span> in <span
class="removed"><del><strong>Skype:</strong></del></span> <span
class="inserted"><ins><em>stores or played by TV
+ to ultrasound from beacons placed in stores or played by TV
programs</a>.</p>
</li>
<li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ <p>Faceapp appears to do lots of surveillance, judging by <a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
how much access it demands to personal data in the
device</a>.</p>
</li>
<li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS:</strong></del></span> <span class="inserted"><ins><em>its
headphones</a>. Specifically,
+ <p>Users are suing Bose for <a
+
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
- would that</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span> <span class="inserted"><ins><em>design
+ would that make it acceptable? No way! It should be flat out <a
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
the app to snoop at all</a>.</p>
</li>
@@ -1344,10 +1388,8 @@
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install</em></ins></span>
- on <span class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section"></strong></del></span> <span
class="inserted"><ins><em>some of its phones. The app will give Verizon the
same information
+ announced an opt-in proprietary search app that it will</a>
pre-install
+ on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
@@ -1678,8 +1720,8 @@
-<div class="big-section"></em></ins></span>
- <h3 <span
class="removed"><del><strong>id="SpywareOnTheRoad">Spyware</strong></del></span>
<span class="inserted"><ins><em>id="SpywareInEquipment">Spyware in
Connected Equipment</h3>
+<div class="big-section">
+ <h3 id="SpywareInEquipment">Spyware in Connected Equipment</h3>
<span class="anchor-reference-id">(<a
href="#SpywareInEquipment">#SpywareInEquipment</a>)</span>
</div>
<div style="clear: left;"></div>
@@ -2727,7 +2769,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/23 16:59:18 $
+$Date: 2019/02/02 13:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary/po/proprietary-surveillance.ja.po 23 Jan 2019 13:28:28
-0000 1.239
+++ proprietary/po/proprietary-surveillance.ja.po 2 Feb 2019 13:31:32
-0000 1.240
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -171,6 +171,12 @@
#. type: Content of: <div><div><ul><li><ul><li>
#, fuzzy
#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Spyware in Mobile Applications</a>"
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr "<a
href=\"#SpywareInMobileApps\">ã¢ãã¤ã«ã»ã¢ããªã®ã¹ãã¤ã¦ã§ã¢</a>"
@@ -1436,6 +1442,43 @@
"\">#SpywareIniThings</a>)</span>"
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -1471,6 +1514,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary/po/proprietary-surveillance.pot 23 Jan 2019 13:28:28 -0000
1.187
+++ proprietary/po/proprietary-surveillance.pot 2 Feb 2019 13:31:32 -0000
1.188
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -133,6 +133,10 @@
msgstr ""
#. type: Content of: <div><div><ul><li><ul><li>
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr ""
+
+#. type: Content of: <div><div><ul><li><ul><li>
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr ""
@@ -951,6 +955,37 @@
msgstr ""
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a "
+"href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a "
+"href=\"https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/\">
"
+"reports information to identify who is running it</a>. The result is often a "
+"legal threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -985,6 +1020,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a "
+"href=\"https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report\">
"
+"report on the user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various "
+"apps. Some of them send Facebook detailed information about the user's "
+"activities in the app; others only say that the user is using that app, but "
+"that alone is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "This spying occurs regardless of whether the user has a Facebook
account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a "
"href=\"https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/\">
"
"track the phones of users that have deleted them</a>."
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.456
retrieving revision 1.457
diff -u -b -r1.456 -r1.457
--- proprietary/po/proprietary-surveillance.ru.po 23 Jan 2019 17:29:24
-0000 1.456
+++ proprietary/po/proprietary-surveillance.ru.po 2 Feb 2019 13:31:32
-0000 1.457
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-01-23 13:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -158,6 +159,14 @@
msgstr "<a href=\"#SpywareInMobileApps\">ÐÑикладнÑе
пÑогÑаммÑ</a>"
#. type: Content of: <div><div><ul><li><ul><li>
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop+} Apps</a>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">ÐобилÑнÑе
пÑиложениÑ</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr "<a href=\"#SpywareInMobileApps\">ÐобилÑнÑе
пÑиложениÑ</a>"
@@ -1335,6 +1344,46 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr "ÐобилÑнÑе пÑиложениÑ"
@@ -1381,6 +1430,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Some Android apps <a href=\"https://www.androidauthority.com/apps-uninstall-"
"trackers-917539/amp/\"> track the phones of users that have deleted them</a>."
msgstr ""
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary.de-diff.html 28 Jan 2019 09:29:57 -0000
1.38
+++ proprietary/po/proprietary.de-diff.html 2 Feb 2019 13:31:32 -0000
1.39
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -183,6 +183,35 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201901110">
<p>Samsung phones come preloaded with <a
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
@@ -197,43 +226,6 @@
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
are going one step further in their hijacking of users' devices.</p>
</li>
-
- <li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical tag <a
-
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
- contains these GPS locations.</p>
- </li>
-
- <li id="M201612290">
- <p>In the game Fruit Pop, the player buys boosts with coins to get
- a high score. The player gets coins at the end of each game, and can
- buy more coins with real money.</p>
-
- <p>Getting a higher score once leads the player to desire higher
- score again later. But the higher score resulting from the boost <a
-
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/">does
- not give the player more coins, and does not help the player get
- a higher score in subsequent games</a>. To get that, the player
- will need a boost frequently, and usually has to pay real money
- for that. Since boosts are exciting and entertaining, the player is
- subtly pushed to purchase more coins with real money to get boosts,
- and it can develop into a costly habit.</p>
- </li>
-
- <li id="M201612140">
- <p>The Microsoft Telemetry Compatibility service <a
-
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
- drastically reduces the performances of machines running
- Windows 10</a>, and can't be disabled easily.</p>
- </li>
-
- <li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p>
- </li>
</ul></em></ins></span>
@@ -294,7 +286,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary/po/proprietary.de.po 28 Jan 2019 09:29:57 -0000 1.80
+++ proprietary/po/proprietary.de.po 2 Feb 2019 13:31:32 -0000 1.81
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,66 +431,64 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
+"one step further in their hijacking of users' devices."
msgstr ""
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary.es.po 29 Jan 2019 11:32:57 -0000 1.88
+++ proprietary/po/proprietary.es.po 2 Feb 2019 13:31:32 -0000 1.89
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2019-01-29 12:26+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -298,6 +299,48 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
@@ -329,77 +372,6 @@
"facebook\">among others</a>) están dando un paso más en su secuestro de los
"
"dispositivos de los usuarios."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
-msgstr ""
-"Hasta 2015, cualquier tweet que incluyera una etiqueta geográfica <a href="
-"\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/"
-"twitter-location-data-gps-privacy/\">enviaba la localización GPS precisa al "
-"servidor de Twitter</a>. Este conserva aún esas localizaciones GPS."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
-msgstr ""
-"En el juego Fruit Pop, el jugador compra poderes con monedas para obtener "
-"una puntuación más alta. El jugador consigue monedas al final de cada
juego, "
-"y puede comprar más monedas con dinero real."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
-msgstr ""
-"La obtención en una ocasión de una puntuación más alta lleva al jugador a
"
-"desear luego una puntuación más alta aún. Pero la puntuación mayor "
-"resultante de los poderes adquiridos <a href=\"https://qz.com/873348/50000-"
-"coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-"
-"understanding-of-basic-economic-ideas/\">no le proporciona al jugador más "
-"monedas, y no le ayuda a obtener puntuaciones más altas en las siguientes "
-"jugadas</a>. Para lograrlo necesitará poderes con frecuencia, y "
-"habitualmente tiene que pagar para ello dinero real. Como los poderes son "
-"excitantes y divertidos, el jugador se ve sutilmente incitado a comprar más "
-"monedas con dinero real para asà obtener poderes, con lo cual esto puede "
-"convertirse en costoso hábito."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
-msgstr ""
-"El servicio de Compatibilidad de TelemetrÃa de Microsoft <a href=\"https://"
-"answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
-"telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
-"tab=AllReplies#tabs\">reduce drásticamente el rendimiento de los ordenadores
"
-"con Windows 10</a>, y no puede deshabilitarse con facilidad."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
-msgstr ""
-"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www."
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
-"\">envÃan la señal de vÃdeo que capturan a los servidores de Amazon</a>,
que "
-"la guardan de forma permanente."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -479,6 +451,75 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+#~ "server</a>. It still contains these GPS locations."
+#~ msgstr ""
+#~ "Hasta 2015, cualquier tweet que incluyera una etiqueta geográfica <a
href="
+#~ "\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/"
+#~ "story/twitter-location-data-gps-privacy/\">enviaba la localización GPS "
+#~ "precisa al servidor de Twitter</a>. Este conserva aún esas localizaciones
"
+#~ "GPS."
+
+#~ msgid ""
+#~ "In the game Fruit Pop, the player buys boosts with coins to get a high "
+#~ "score. The player gets coins at the end of each game, and can buy more "
+#~ "coins with real money."
+#~ msgstr ""
+#~ "En el juego Fruit Pop, el jugador compra poderes con monedas para obtener "
+#~ "una puntuación más alta. El jugador consigue monedas al final de cada "
+#~ "juego, y puede comprar más monedas con dinero real."
+
+#~ msgid ""
+#~ "Getting a higher score once leads the player to desire higher score again "
+#~ "later. But the higher score resulting from the boost <a href=\"https://qz."
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">does not give the "
+#~ "player more coins, and does not help the player get a higher score in "
+#~ "subsequent games</a>. To get that, the player will need a boost "
+#~ "frequently, and usually has to pay real money for that. Since boosts are "
+#~ "exciting and entertaining, the player is subtly pushed to purchase more "
+#~ "coins with real money to get boosts, and it can develop into a costly "
+#~ "habit."
+#~ msgstr ""
+#~ "La obtención en una ocasión de una puntuación más alta lleva al
jugador a "
+#~ "desear luego una puntuación más alta aún. Pero la puntuación mayor "
+#~ "resultante de los poderes adquiridos <a href=\"https://qz."
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">no le proporciona "
+#~ "al jugador más monedas, y no le ayuda a obtener puntuaciones más altas
en "
+#~ "las siguientes jugadas</a>. Para lograrlo necesitará poderes con "
+#~ "frecuencia, y habitualmente tiene que pagar para ello dinero real. Como "
+#~ "los poderes son excitantes y divertidos, el jugador se ve sutilmente "
+#~ "incitado a comprar más monedas con dinero real para asà obtener poderes,
"
+#~ "con lo cual esto puede convertirse en costoso hábito."
+
+#~ msgid ""
+#~ "The Microsoft Telemetry Compatibility service <a href=\"https://answers."
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> drastically reduces the performances of machines "
+#~ "running Windows 10</a>, and can't be disabled easily."
+#~ msgstr ""
+#~ "El servicio de Compatibilidad de TelemetrÃa de Microsoft <a href="
+#~ "\"https://answers.microsoft.com/en-us/windows/forum/windows_10-"
+#~ "performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-"
+#~ "aef6-2d5f01bb38f2?tab=AllReplies#tabs\">reduce drásticamente el "
+#~ "rendimiento de los ordenadores con Windows 10</a>, y no puede "
+#~ "deshabilitarse con facilidad."
+
+#~ msgid ""
+#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www."
+#~ "engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+#~ "\">envÃan la señal de vÃdeo que capturan a los servidores de
Amazon</a>, "
+#~ "que la guardan de forma permanente."
+
+#~ msgid ""
#~ "The Weather Channel app <a href=\"https://www.theguardian.com/"
#~ "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"
#~ "\"> stored users' locations to the company's server</a>. The company is "
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/proprietary.fr.po 28 Jan 2019 13:53:33 -0000 1.110
+++ proprietary/po/proprietary.fr.po 2 Feb 2019 13:31:32 -0000 1.111
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2019-01-28 14:33+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,48 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
@@ -325,75 +368,6 @@
"facebook\">parmi d'autres</a>) vont encore plus loin dans le piratage des "
"appareils des utilisateurs."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
-msgstr ""
-"Jusqu'en 2015, les tweets géolocalisés <a
href=\"http://web-old.archive.org/"
-"web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-"
-"privacy/\">envoyaient les coordonnées GPS précises au serveur de Twitter</"
-"a>. Ils contiennent toujours ces coordonnées."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
-msgstr ""
-"Dans le jeu Fruit Pop, le joueur achète des améliorations avec des pièces "
-"pour obtenir un meilleur score. Il récupère des pièces à la fin de chaque
"
-"partie et peut en acheter d'autres avec de l'argent réel."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
-msgstr ""
-"Un bon score lors d'une partie pousse le joueur à vouloir faire plus, à se "
-"surpasser. Mais le score plus élevé obtenu grâce à l'amélioration <a
href="
-"\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-"
-"purchases-are-warping-kids-understanding-of-basic-economic-ideas/\">ne donne "
-"pas plus de pièces et n'aide pas le joueur à obtenir un meilleur score dans
"
-"les parties suivantes.</a> Pour cela il aura souvent besoin d'une "
-"amélioration qu'il devra généralement payer. Puisque les améliorations
sont "
-"amusantes et excitantes, il est subtilement poussé à l'achat de pièces
pour "
-"en obtenir plus, ce qui peut devenir coûteux à la longue."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
-msgstr ""
-"Le service <cite>Microsoft Telemetry Compatibility</cite> <a href=\"https://"
-"answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
-"telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
-"tab=AllReplies#tabs\">réduit considérablement les performances des machines
"
-"sous Windows 10</a> et ne peut pas être désactivé facilement."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
-msgstr ""
-"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
-"leurs enregistrements vidéo aux serveurs d'Amazon</a> qui les sauvegardent "
-"de façon permanente."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -467,3 +441,70 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+#~ "server</a>. It still contains these GPS locations."
+#~ msgstr ""
+#~ "Jusqu'en 2015, les tweets géolocalisés <a href=\"http://web-old.archive."
+#~ "org/web/20190115233002/https://www.wired.com/story/twitter-location-data-"
+#~ "gps-privacy/\">envoyaient les coordonnées GPS précises au serveur de "
+#~ "Twitter</a>. Ils contiennent toujours ces coordonnées."
+
+#~ msgid ""
+#~ "In the game Fruit Pop, the player buys boosts with coins to get a high "
+#~ "score. The player gets coins at the end of each game, and can buy more "
+#~ "coins with real money."
+#~ msgstr ""
+#~ "Dans le jeu Fruit Pop, le joueur achète des améliorations avec des
pièces "
+#~ "pour obtenir un meilleur score. Il récupère des pièces à la fin de
chaque "
+#~ "partie et peut en acheter d'autres avec de l'argent réel."
+
+#~ msgid ""
+#~ "Getting a higher score once leads the player to desire higher score again "
+#~ "later. But the higher score resulting from the boost <a href=\"https://qz."
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">does not give the "
+#~ "player more coins, and does not help the player get a higher score in "
+#~ "subsequent games</a>. To get that, the player will need a boost "
+#~ "frequently, and usually has to pay real money for that. Since boosts are "
+#~ "exciting and entertaining, the player is subtly pushed to purchase more "
+#~ "coins with real money to get boosts, and it can develop into a costly "
+#~ "habit."
+#~ msgstr ""
+#~ "Un bon score lors d'une partie pousse le joueur à vouloir faire plus, à "
+#~ "se surpasser. Mais le score plus élevé obtenu grâce à l'amélioration
<a "
+#~ "href=\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-"
+#~ "purchases-are-warping-kids-understanding-of-basic-economic-ideas/\">ne "
+#~ "donne pas plus de pièces et n'aide pas le joueur à obtenir un meilleur "
+#~ "score dans les parties suivantes.</a> Pour cela il aura souvent besoin "
+#~ "d'une amélioration qu'il devra généralement payer. Puisque les "
+#~ "améliorations sont amusantes et excitantes, il est subtilement poussé Ã
"
+#~ "l'achat de pièces pour en obtenir plus, ce qui peut devenir coûteux Ã
la "
+#~ "longue."
+
+#~ msgid ""
+#~ "The Microsoft Telemetry Compatibility service <a href=\"https://answers."
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> drastically reduces the performances of machines "
+#~ "running Windows 10</a>, and can't be disabled easily."
+#~ msgstr ""
+#~ "Le service <cite>Microsoft Telemetry Compatibility</cite> <a href="
+#~ "\"https://answers.microsoft.com/en-us/windows/forum/windows_10-"
+#~ "performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-"
+#~ "aef6-2d5f01bb38f2?tab=AllReplies#tabs\">réduit considérablement les "
+#~ "performances des machines sous Windows 10</a> et ne peut pas être "
+#~ "désactivé facilement."
+
+#~ msgid ""
+#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Les dispositifs de « sécurité » de Ring <a
href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+#~ "\">envoient leurs enregistrements vidéo aux serveurs d'Amazon</a> qui les
"
+#~ "sauvegardent de façon permanente."
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/proprietary.it-diff.html 28 Jan 2019 09:29:57 -0000
1.50
+++ proprietary/po/proprietary.it-diff.html 2 Feb 2019 13:31:32 -0000
1.51
@@ -45,14 +45,14 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -182,6 +182,35 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201901110">
<p>Samsung phones come preloaded with <a
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
@@ -196,43 +225,6 @@
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
are going one step further in their hijacking of users' devices.</p>
</li>
-
- <li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical tag <a
-
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
- contains these GPS locations.</p>
- </li>
-
- <li id="M201612290">
- <p>In the game Fruit Pop, the player buys boosts with coins to get
- a high score. The player gets coins at the end of each game, and can
- buy more coins with real money.</p>
-
- <p>Getting a higher score once leads the player to desire higher
- score again later. But the higher score resulting from the boost <a
-
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/">does
- not give the player more coins, and does not help the player get
- a higher score in subsequent games</a>. To get that, the player
- will need a boost frequently, and usually has to pay real money
- for that. Since boosts are exciting and entertaining, the player is
- subtly pushed to purchase more coins with real money to get boosts,
- and it can develop into a costly habit.</p>
- </li>
-
- <li id="M201612140">
- <p>The Microsoft Telemetry Compatibility service <a
-
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
- drastically reduces the performances of machines running
- Windows 10</a>, and can't be disabled easily.</p>
- </li>
-
- <li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p>
- </li>
</ul></em></ins></span>
@@ -293,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary/po/proprietary.it.po 28 Jan 2019 09:29:57 -0000 1.89
+++ proprietary/po/proprietary.it.po 2 Feb 2019 13:31:32 -0000 1.90
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,66 +435,64 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
+"one step further in their hijacking of users' devices."
msgstr ""
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary/po/proprietary.ja-diff.html 28 Jan 2019 09:29:57 -0000
1.51
+++ proprietary/po/proprietary.ja-diff.html 2 Feb 2019 13:31:32 -0000
1.52
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
.button</em></ins></span> { float: <span class="removed"><del><strong>right;
margin-bottom:</strong></del></span> <span class="inserted"><ins><em>left;
margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>.button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>.button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -95,16 +95,16 @@
</tr>
<tr>
<td>
- <ul>
- <li><a
href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-kindle-swindle.html">Malware
in the Amazon
- Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
+ Swindle</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
+ <li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li>
<li><a
href="/proprietary/proprietary-interference.html">Interference</a></li>
<li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -155,10 +155,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -179,6 +179,35 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201901110">
<p>Samsung phones come preloaded with <a
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
@@ -193,43 +222,6 @@
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
are going one step further in their hijacking of users' devices.</p>
</li>
-
- <li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical tag <a
-
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
- contains these GPS locations.</p>
- </li>
-
- <li id="M201612290">
- <p>In the game Fruit Pop, the player buys boosts with coins to get
- a high score. The player gets coins at the end of each game, and can
- buy more coins with real money.</p>
-
- <p>Getting a higher score once leads the player to desire higher
- score again later. But the higher score resulting from the boost <a
-
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/">does
- not give the player more coins, and does not help the player get
- a higher score in subsequent games</a>. To get that, the player
- will need a boost frequently, and usually has to pay real money
- for that. Since boosts are exciting and entertaining, the player is
- subtly pushed to purchase more coins with real money to get boosts,
- and it can develop into a costly habit.</p>
- </li>
-
- <li id="M201612140">
- <p>The Microsoft Telemetry Compatibility service <a
-
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
- drastically reduces the performances of machines running
- Windows 10</a>, and can't be disabled easily.</p>
- </li>
-
- <li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p>
- </li>
</ul></em></ins></span>
@@ -290,7 +282,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary/po/proprietary.ja.po 28 Jan 2019 09:29:57 -0000 1.72
+++ proprietary/po/proprietary.ja.po 2 Feb 2019 13:31:32 -0000 1.73
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,66 +355,64 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
+"one step further in their hijacking of users' devices."
msgstr ""
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/proprietary.nl-diff.html 28 Jan 2019 09:29:57 -0000
1.50
+++ proprietary/po/proprietary.nl-diff.html 2 Feb 2019 13:31:32 -0000
1.51
@@ -157,10 +157,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -182,6 +182,35 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201901110">
<p>Samsung phones come preloaded with <a
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
@@ -196,43 +225,6 @@
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
are going one step further in their hijacking of users' devices.</p>
</li>
-
- <li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical tag <a
-
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
- contains these GPS locations.</p>
- </li>
-
- <li id="M201612290">
- <p>In the game Fruit Pop, the player buys boosts with coins to get
- a high score. The player gets coins at the end of each game, and can
- buy more coins with real money.</p>
-
- <p>Getting a higher score once leads the player to desire higher
- score again later. But the higher score resulting from the boost <a
-
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/">does
- not give the player more coins, and does not help the player get
- a higher score in subsequent games</a>. To get that, the player
- will need a boost frequently, and usually has to pay real money
- for that. Since boosts are exciting and entertaining, the player is
- subtly pushed to purchase more coins with real money to get boosts,
- and it can develop into a costly habit.</p>
- </li>
-
- <li id="M201612140">
- <p>The Microsoft Telemetry Compatibility service <a
-
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
- drastically reduces the performances of machines running
- Windows 10</a>, and can't be disabled easily.</p>
- </li>
-
- <li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p>
- </li>
</ul></em></ins></span>
@@ -293,7 +285,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/proprietary.nl.po 28 Jan 2019 09:29:57 -0000 1.61
+++ proprietary/po/proprietary.nl.po 2 Feb 2019 13:31:32 -0000 1.62
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,66 +428,64 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
+"one step further in their hijacking of users' devices."
msgstr ""
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/proprietary.pl-diff.html 28 Jan 2019 09:29:57 -0000
1.68
+++ proprietary/po/proprietary.pl-diff.html 2 Feb 2019 13:31:32 -0000
1.69
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -124,18 +124,18 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li>
- <li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -156,10 +156,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -180,6 +180,35 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201901110">
<p>Samsung phones come preloaded with <a
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
@@ -194,43 +223,6 @@
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
are going one step further in their hijacking of users' devices.</p>
</li>
-
- <li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical tag <a
-
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
- contains these GPS locations.</p>
- </li>
-
- <li id="M201612290">
- <p>In the game Fruit Pop, the player buys boosts with coins to get
- a high score. The player gets coins at the end of each game, and can
- buy more coins with real money.</p>
-
- <p>Getting a higher score once leads the player to desire higher
- score again later. But the higher score resulting from the boost <a
-
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/">does
- not give the player more coins, and does not help the player get
- a higher score in subsequent games</a>. To get that, the player
- will need a boost frequently, and usually has to pay real money
- for that. Since boosts are exciting and entertaining, the player is
- subtly pushed to purchase more coins with real money to get boosts,
- and it can develop into a costly habit.</p>
- </li>
-
- <li id="M201612140">
- <p>The Microsoft Telemetry Compatibility service <a
-
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
- drastically reduces the performances of machines running
- Windows 10</a>, and can't be disabled easily.</p>
- </li>
-
- <li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p>
- </li>
</ul></em></ins></span>
@@ -291,7 +283,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary/po/proprietary.pl.po 28 Jan 2019 09:29:57 -0000 1.56
+++ proprietary/po/proprietary.pl.po 2 Feb 2019 13:31:32 -0000 1.57
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,66 +510,64 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
+"one step further in their hijacking of users' devices."
msgstr ""
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary.pot 28 Jan 2019 09:29:57 -0000 1.53
+++ proprietary/po/proprietary.pot 2 Feb 2019 13:31:32 -0000 1.54
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,64 +245,63 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Samsung phones come preloaded with <a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\">
"
-"a version of the Facebook app that can't be deleted</a>. <a "
-"href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app\">
"
-"Facebook claims this is a stub</a> which doesn't do anything, but we have to "
-"take their word for it, and there is the permanent risk that the app will be "
-"activated by an automatic update."
+"Around 40% of gratis Androids apps <a "
+"href=\"https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report\">
"
+"report on the user's actions to Facebook</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\">among
"
-"others</a>) are going one step further in their hijacking of users' "
-"devices."
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various "
+"apps. Some of them send Facebook detailed information about the user's "
+"activities in the app; others only say that the user is using that app, but "
+"that alone is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid "This spying occurs regardless of whether the user has a Facebook
account."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a "
-"href=\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/\">
"
-"sent the precise GPS location to Twitter's server</a>. It still contains "
-"these GPS locations."
+"Foundry's graphics software <a "
+"href=\"https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/\">
"
+"reports information to identify who is running it</a>. The result is often a "
+"legal threat demanding a lot of money."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a "
-"href=\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/\">does
"
-"not give the player more coins, and does not help the player get a higher "
-"score in subsequent games</a>. To get that, the player will need a boost "
-"frequently, and usually has to pay real money for that. Since boosts are "
-"exciting and entertaining, the player is subtly pushed to purchase more "
-"coins with real money to get boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The Microsoft Telemetry Compatibility service <a "
-"href=\"https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\">
"
-"drastically reduces the performances of machines running "
-"Windows 10</a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\">
"
+"a version of the Facebook app that can't be deleted</a>. <a "
+"href=\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app\">
"
+"Facebook claims this is a stub</a> which doesn't do anything, but we have to "
+"take their word for it, and there is the permanent risk that the app will be "
+"activated by an automatic update."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a "
-"href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">
"
-"send the video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook\">among
"
+"others</a>) are going one step further in their hijacking of users' "
+"devices."
msgstr ""
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary.pt-br.po 29 Jan 2019 14:00:44 -0000 1.70
+++ proprietary/po/proprietary.pt-br.po 2 Feb 2019 13:31:33 -0000 1.71
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2019-01-29 10:01-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1)\n"
"X-Generator: Gtranslator 3.31.0\n"
@@ -293,6 +294,48 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
@@ -324,77 +367,6 @@
"a>) estão indo um passo adiante em seu sequestro de dispositivos dos "
"usuários."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
-msgstr ""
-"Até 2015, qualquer tweet que listasse uma tag geográfica <a href=\"http://"
-"web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> enviou a localização precisa do GPS para o "
-"servidor do Twitter</a>. Ainda contém essas localizações GPS."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
-msgstr ""
-"No jogo Fruit Pop, o jogador compra bônus com moedas para obter uma "
-"pontuação alta. O jogador recebe moedas no final de cada jogo e pode
comprar "
-"mais moedas com dinheiro real."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
-msgstr ""
-"Obter uma pontuação mais alta uma vez leva o jogador a desejar maior "
-"pontuação novamente mais tarde. Mas uma pontuação maior resultante do "
-"impulsionador <a href=\"https://qz.com/873348/50000-coins-for-1-99-how-"
-"mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-"
-"economic-ideas/\"> não dá ao jogador mais moedas, e não ajuda o jogador a "
-"obter uma pontuação mais alta nos jogos subsequentes</a>. Para conseguir "
-"isso, o jogador precisará de um impulsionador com frequência e, geralmente,
"
-"terá que pagar em dinheiro real por isso. Como os impulsionadores são "
-"empolgantes e divertidos, o jogador é sutilmente empurrado para comprar mais
"
-"moedas com dinheiro real para obter reforços, e isso pode se transformar em "
-"um hábito caro."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
-msgstr ""
-"O serviço Microsoft Telemetry Compatibility <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"reduz drasticamente o desempenho de máquinas com Windows 10</a> e pode "
-"ser facilmente desabilitado."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
-msgstr ""
-"Os dispositivos de âsegurançaâ Amazon Ring <a
href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam o "
-"vÃdeo que eles capturam para os servidores da Amazon</a>, os quais
armazenam-"
-"o permanentemente."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -470,6 +442,73 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+#~ "server</a>. It still contains these GPS locations."
+#~ msgstr ""
+#~ "Até 2015, qualquer tweet que listasse uma tag geográfica <a
href=\"http://"
+#~ "web-old.archive.org/web/20190115233002/https://www.wired.com/story/"
+#~ "twitter-location-data-gps-privacy/\"> enviou a localização precisa do
GPS "
+#~ "para o servidor do Twitter</a>. Ainda contém essas localizações GPS."
+
+#~ msgid ""
+#~ "In the game Fruit Pop, the player buys boosts with coins to get a high "
+#~ "score. The player gets coins at the end of each game, and can buy more "
+#~ "coins with real money."
+#~ msgstr ""
+#~ "No jogo Fruit Pop, o jogador compra bônus com moedas para obter uma "
+#~ "pontuação alta. O jogador recebe moedas no final de cada jogo e pode "
+#~ "comprar mais moedas com dinheiro real."
+
+#~ msgid ""
+#~ "Getting a higher score once leads the player to desire higher score again "
+#~ "later. But the higher score resulting from the boost <a href=\"https://qz."
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">does not give the "
+#~ "player more coins, and does not help the player get a higher score in "
+#~ "subsequent games</a>. To get that, the player will need a boost "
+#~ "frequently, and usually has to pay real money for that. Since boosts are "
+#~ "exciting and entertaining, the player is subtly pushed to purchase more "
+#~ "coins with real money to get boosts, and it can develop into a costly "
+#~ "habit."
+#~ msgstr ""
+#~ "Obter uma pontuação mais alta uma vez leva o jogador a desejar maior "
+#~ "pontuação novamente mais tarde. Mas uma pontuação maior resultante do "
+#~ "impulsionador <a href=\"https://qz.com/873348/50000-coins-for-1-99-how-"
+#~ "mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-"
+#~ "economic-ideas/\"> não dá ao jogador mais moedas, e não ajuda o jogador
a "
+#~ "obter uma pontuação mais alta nos jogos subsequentes</a>. Para conseguir
"
+#~ "isso, o jogador precisará de um impulsionador com frequência e, "
+#~ "geralmente, terá que pagar em dinheiro real por isso. Como os "
+#~ "impulsionadores são empolgantes e divertidos, o jogador é sutilmente "
+#~ "empurrado para comprar mais moedas com dinheiro real para obter reforços,
"
+#~ "e isso pode se transformar em um hábito caro."
+
+#~ msgid ""
+#~ "The Microsoft Telemetry Compatibility service <a href=\"https://answers."
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> drastically reduces the performances of machines "
+#~ "running Windows 10</a>, and can't be disabled easily."
+#~ msgstr ""
+#~ "O serviço Microsoft Telemetry Compatibility <a href=\"https://answers."
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> reduz drasticamente o desempenho de máquinas com "
+#~ "Windows 10</a> e pode ser facilmente desabilitado."
+
+#~ msgid ""
+#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Os dispositivos de âsegurançaâ Amazon Ring <a
href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam "
+#~ "o vÃdeo que eles capturam para os servidores da Amazon</a>, os quais "
+#~ "armazenam-o permanentemente."
+
+#~ msgid ""
#~ "The Weather Channel app <a href=\"https://www.theguardian.com/"
#~ "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"
#~ "\"> stored users' locations to the company's server</a>. The company is "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary/po/proprietary.ru.po 28 Jan 2019 10:30:14 -0000 1.136
+++ proprietary/po/proprietary.ru.po 2 Feb 2019 13:31:33 -0000 1.137
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2019-01-23 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-02 13:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,48 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
@@ -329,76 +372,6 @@
"facebook\">в ÑиÑле пÑоÑиÑ
</a>) делаÑÑ ÐµÑе один
Ñаг к заÑ
ваÑÑ ÑÑÑойÑÑв "
"полÑзоваÑелей."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
-msgstr ""
-"Ðо 2015 года лÑбой ÑÐ²Ð¸Ñ Ñ Ð³ÐµÐ¾Ð³ÑаÑиÑеÑким
Ñегом <a href=\"http://web-old."
-"archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-"
-"data-gps-privacy/\"> оÑÑÑлал ÑоÑнÑе кооÑдинаÑÑ Ð½Ð°
ÑеÑÐ²ÐµÑ Ð¢Ð²Ð¸ÑÑеÑа</a>. ÐÑи "
-"кооÑдинаÑÑ Ñ
ÑанÑÑÑÑ Ñам до ÑиÑ
поÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
-msgstr ""
-"РигÑе Fruit Pop игÑок покÑÐ¿Ð°ÐµÑ ÑÐ¸Ð»Ñ Ð·Ð° монеÑÑ,
ÑÑÐ¾Ð±Ñ Ð½Ð°Ð±ÑаÑÑ Ð±Ð¾Ð»ÑÑе оÑков. "
-"ÐгÑок полÑÑÐ°ÐµÑ Ð¼Ð¾Ð½ÐµÑÑ Ð² конÑе каждой игÑÑ
и Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾ÐºÑпаÑÑ Ð¸Ñ
дополниÑелÑно "
-"за наÑÑоÑÑие денÑги."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
-msgstr ""
-"ÐабÑав Ð¾Ð´Ð½Ð°Ð¶Ð´Ñ Ð¼Ð½Ð¾Ð³Ð¾ оÑков, игÑок
ÑÑÑемиÑÑÑ Ð²Ð¿Ð¾ÑледÑÑвии Ñнова полÑÑаÑÑ "
-"много оÑков. Ðо вÑÑокий ÑÑеÑ, полÑÑеннÑй в
ÑезÑлÑÑаÑе кÑпленнÑÑ
Ñил, <a href="
-"\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-"
-"purchases-are-warping-kids-understanding-of-basic-economic-ideas/\">не
Ð´Ð°ÐµÑ "
-"игÑÐ¾ÐºÑ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑнÑÑ
Ð¼Ð¾Ð½ÐµÑ Ð¸ не помогаеÑ
игÑÐ¾ÐºÑ Ð¿Ð¾Ð»ÑÑиÑÑ Ð±Ð¾Ð»ÐµÐµ вÑÑокий ÑÑÐµÑ "
-"в поÑледÑÑÑиÑ
игÑаÑ
</a>. ЧÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ ÐµÐ³Ð¾,
игÑÐ¾ÐºÑ Ð½Ñжно ÑаÑÑо покÑпаÑÑ "
-"ÑилÑ, и обÑÑно Ð´Ð»Ñ ÑÑого пÑиÑ
одиÑÑÑ
ÑÑаÑиÑÑ Ð½Ð°ÑÑоÑÑие денÑги. ÐоÑколÑÐºÑ "
-"пÑиобÑеÑение Ñил Ð´Ð°ÐµÑ Ð·Ð°Ñ
ваÑÑваÑÑие
возможноÑÑи, игÑока Ñонко побÑждаÑÑ "
-"покÑпаÑÑ Ð¼Ð¾Ð½ÐµÑÑ Ð·Ð° наÑÑоÑÑие денÑги,
ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ ÑилÑ, а ÑÑо Ð¼Ð¾Ð¶ÐµÑ "
-"пÑевÑаÑиÑÑÑÑ Ð² доÑогоÑÑоÑÑÑÑ Ð¿ÑивÑÑкÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
-msgstr ""
-"СлÑжба Telemetry Compatibility Microsoft <a
href=\"https://answers.microsoft."
-"com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"ÑадикалÑно ÑÐ½Ð¸Ð¶Ð°ÐµÑ Ð±ÑÑÑÑодейÑÑвие маÑин
под Windows 10</a>, а оÑклÑÑиÑÑ "
-"ее непÑоÑÑо."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
-msgstr ""
-"УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
-"оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они "
-"ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð°Ð²Ñегда."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -478,6 +451,72 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+#~ "old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+#~ "location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+#~ "server</a>. It still contains these GPS locations."
+#~ msgstr ""
+#~ "Ðо 2015 года лÑбой ÑÐ²Ð¸Ñ Ñ Ð³ÐµÐ¾Ð³ÑаÑиÑеÑким
Ñегом <a href=\"http://web-old."
+#~ "archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+#~ "location-data-gps-privacy/\"> оÑÑÑлал ÑоÑнÑе
кооÑдинаÑÑ Ð½Ð° ÑеÑÐ²ÐµÑ "
+#~ "ТвиÑÑеÑа</a>. ÐÑи кооÑдинаÑÑ Ñ
ÑанÑÑÑÑ Ñам
до ÑиÑ
поÑ."
+
+#~ msgid ""
+#~ "In the game Fruit Pop, the player buys boosts with coins to get a high "
+#~ "score. The player gets coins at the end of each game, and can buy more "
+#~ "coins with real money."
+#~ msgstr ""
+#~ "РигÑе Fruit Pop игÑок покÑÐ¿Ð°ÐµÑ ÑÐ¸Ð»Ñ Ð·Ð°
монеÑÑ, ÑÑÐ¾Ð±Ñ Ð½Ð°Ð±ÑаÑÑ Ð±Ð¾Ð»ÑÑе "
+#~ "оÑков. ÐгÑок полÑÑÐ°ÐµÑ Ð¼Ð¾Ð½ÐµÑÑ Ð² конÑе
каждой игÑÑ Ð¸ Ð¼Ð¾Ð¶ÐµÑ Ð¿Ð¾ÐºÑпаÑÑ Ð¸Ñ
"
+#~ "дополниÑелÑно за наÑÑоÑÑие денÑги."
+
+#~ msgid ""
+#~ "Getting a higher score once leads the player to desire higher score again "
+#~ "later. But the higher score resulting from the boost <a href=\"https://qz."
+#~ "com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-"
+#~ "warping-kids-understanding-of-basic-economic-ideas/\">does not give the "
+#~ "player more coins, and does not help the player get a higher score in "
+#~ "subsequent games</a>. To get that, the player will need a boost "
+#~ "frequently, and usually has to pay real money for that. Since boosts are "
+#~ "exciting and entertaining, the player is subtly pushed to purchase more "
+#~ "coins with real money to get boosts, and it can develop into a costly "
+#~ "habit."
+#~ msgstr ""
+#~ "ÐабÑав Ð¾Ð´Ð½Ð°Ð¶Ð´Ñ Ð¼Ð½Ð¾Ð³Ð¾ оÑков, игÑок
ÑÑÑемиÑÑÑ Ð²Ð¿Ð¾ÑледÑÑвии Ñнова полÑÑаÑÑ "
+#~ "много оÑков. Ðо вÑÑокий ÑÑеÑ, полÑÑеннÑй
в ÑезÑлÑÑаÑе кÑпленнÑÑ
Ñил, <a "
+#~ "href=\"https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-"
+#~ "purchases-are-warping-kids-understanding-of-basic-economic-ideas/\">не "
+#~ "Ð´Ð°ÐµÑ Ð¸Ð³ÑÐ¾ÐºÑ Ð´Ð¾Ð¿Ð¾Ð»Ð½Ð¸ÑелÑнÑÑ
Ð¼Ð¾Ð½ÐµÑ Ð¸ не
Ð¿Ð¾Ð¼Ð¾Ð³Ð°ÐµÑ Ð¸Ð³ÑÐ¾ÐºÑ Ð¿Ð¾Ð»ÑÑиÑÑ Ð±Ð¾Ð»ÐµÐµ "
+#~ "вÑÑокий ÑÑÐµÑ Ð² поÑледÑÑÑиÑ
игÑаÑ
</a>.
ЧÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ ÐµÐ³Ð¾, игÑÐ¾ÐºÑ Ð½Ñжно "
+#~ "ÑаÑÑо покÑпаÑÑ ÑилÑ, и обÑÑно Ð´Ð»Ñ ÑÑого
пÑиÑ
одиÑÑÑ ÑÑаÑиÑÑ Ð½Ð°ÑÑоÑÑие "
+#~ "денÑги. ÐоÑколÑÐºÑ Ð¿ÑиобÑеÑение Ñил даеÑ
заÑ
ваÑÑваÑÑие возможноÑÑи, игÑока "
+#~ "Ñонко побÑждаÑÑ Ð¿Ð¾ÐºÑпаÑÑ Ð¼Ð¾Ð½ÐµÑÑ Ð·Ð°
наÑÑоÑÑие денÑги, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑаÑÑ ÑилÑ, "
+#~ "а ÑÑо Ð¼Ð¾Ð¶ÐµÑ Ð¿ÑевÑаÑиÑÑÑÑ Ð²
доÑогоÑÑоÑÑÑÑ Ð¿ÑивÑÑкÑ."
+
+#~ msgid ""
+#~ "The Microsoft Telemetry Compatibility service <a href=\"https://answers."
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> drastically reduces the performances of machines "
+#~ "running Windows 10</a>, and can't be disabled easily."
+#~ msgstr ""
+#~ "СлÑжба Telemetry Compatibility Microsoft <a href=\"https://answers."
+#~ "microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-"
+#~ "telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?"
+#~ "tab=AllReplies#tabs\"> ÑадикалÑно ÑнижаеÑ
бÑÑÑÑодейÑÑвие маÑин под "
+#~ "Windows 10</a>, а оÑклÑÑиÑÑ ÐµÐµ непÑоÑÑо."
+
+#~ msgid ""
+#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
+#~ "engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+#~ "\"> оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, "
+#~ "где они ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð°Ð²Ñегда."
+
+#~ msgid ""
#~ "The Weather Channel app <a href=\"https://www.theguardian.com/"
#~ "technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling"
#~ "\"> stored users' locations to the company's server</a>. The company is "
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/proprietary.zh-tw-diff.html 28 Jan 2019 09:29:57 -0000
1.28
+++ proprietary/po/proprietary.zh-tw-diff.html 2 Feb 2019 13:31:33 -0000
1.29
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -183,6 +183,35 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201812290">
+ <p>Around 40% of gratis Androids apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
+
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
+
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
+
+ <li id="M201811020">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ reports information to identify who is running it</a>. The result is
+ often a legal threat demanding a lot of money.</p>
+
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
+
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
+ </li>
+
<li id="M201901110">
<p>Samsung phones come preloaded with <a
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
@@ -197,43 +226,6 @@
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
are going one step further in their hijacking of users' devices.</p>
</li>
-
- <li id="M201901101">
- <p>Until 2015, any tweet that listed a geographical tag <a
-
href="http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/">
- sent the precise GPS location to Twitter's server</a>. It still
- contains these GPS locations.</p>
- </li>
-
- <li id="M201612290">
- <p>In the game Fruit Pop, the player buys boosts with coins to get
- a high score. The player gets coins at the end of each game, and can
- buy more coins with real money.</p>
-
- <p>Getting a higher score once leads the player to desire higher
- score again later. But the higher score resulting from the boost <a
-
href="https://qz.com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-kids-understanding-of-basic-economic-ideas/">does
- not give the player more coins, and does not help the player get
- a higher score in subsequent games</a>. To get that, the player
- will need a boost frequently, and usually has to pay real money
- for that. Since boosts are exciting and entertaining, the player is
- subtly pushed to purchase more coins with real money to get boosts,
- and it can develop into a costly habit.</p>
- </li>
-
- <li id="M201612140">
- <p>The Microsoft Telemetry Compatibility service <a
-
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
- drastically reduces the performances of machines running
- Windows 10</a>, and can't be disabled easily.</p>
- </li>
-
- <li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p>
- </li>
</ul></em></ins></span>
@@ -294,7 +286,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/28 09:29:57 $
+$Date: 2019/02/02 13:31:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary/po/proprietary.zh-tw.po 28 Jan 2019 09:29:57 -0000 1.39
+++ proprietary/po/proprietary.zh-tw.po 2 Feb 2019 13:31:33 -0000 1.40
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-01-28 09:26+0000\n"
+"POT-Creation-Date: 2019-02-02 13:26+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,66 +344,64 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
-"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
-"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
-"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
-"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
-"have to take their word for it, and there is the permanent risk that the app "
-"will be activated by an automatic update."
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Preloading crapware along with a nonfree operating system is common "
-"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
-"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
-"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
-"one step further in their hijacking of users' devices."
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"In the game Fruit Pop, the player buys boosts with coins to get a high "
-"score. The player gets coins at the end of each game, and can buy more coins "
-"with real money."
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Getting a higher score once leads the player to desire higher score again "
-"later. But the higher score resulting from the boost <a href=\"https://qz."
-"com/873348/50000-coins-for-1-99-how-mobile-game-in-app-purchases-are-warping-"
-"kids-understanding-of-basic-economic-ideas/\">does not give the player more "
-"coins, and does not help the player get a higher score in subsequent games</"
-"a>. To get that, the player will need a boost frequently, and usually has to "
-"pay real money for that. Since boosts are exciting and entertaining, the "
-"player is subtly pushed to purchase more coins with real money to get "
-"boosts, and it can develop into a costly habit."
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"The Microsoft Telemetry Compatibility service <a href=\"https://answers."
-"microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-"
-"compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs\"> "
-"drastically reduces the performances of machines running Windows 10</"
-"a>, and can't be disabled easily."
+"Samsung phones come preloaded with <a href=\"https://www.bloomberg.com/news/"
+"articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-"
+"facebook\"> a version of the Facebook app that can't be deleted</a>. <a href="
+"\"https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-"
+"app\"> Facebook claims this is a stub</a> which doesn't do anything, but we "
+"have to take their word for it, and there is the permanent risk that the app "
+"will be activated by an automatic update."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"Preloading crapware along with a nonfree operating system is common "
+"practice, but by making the crapware undeletable, Facebook and Samsung (<a "
+"href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-"
+"users-get-a-shock-they-can-t-delete-facebook\">among others</a>) are going "
+"one step further in their hijacking of users' devices."
msgstr ""
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/pt-br.po 29 Jan 2019 14:00:44 -0000 1.26
+++ proprietary/po/pt-br.po 2 Feb 2019 13:31:33 -0000 1.27
@@ -3983,6 +3983,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -5833,15 +5854,24 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
-"Até 2015, qualquer tweet que listasse uma tag geográfica <a href=\"http://"
-"web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> enviou a localização precisa do GPS para o "
-"servidor do Twitter</a>. Ainda contém essas localizações GPS."
#. type: Content of: <div><p>
#, fuzzy
@@ -6077,6 +6107,12 @@
#. type: Content of: <div><div><ul><li><ul><li>
#, fuzzy
#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"/proprietary/malware-mobiles.html\">Móveis</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"/proprietary/malware-mobiles.html\">Mobiles</a>"
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr "<a href=\"/proprietary/malware-mobiles.html\">Móveis</a>"
@@ -6363,6 +6399,16 @@
msgstr ""
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -6592,6 +6638,18 @@
"proprietary”</a>, but the surveillance is an abuse all the same."
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+"Até 2015, qualquer tweet que listasse uma tag geográfica <a href=\"http://"
+"web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> enviou a localização precisa do GPS para o "
+"servidor do Twitter</a>. Ainda contém essas localizações GPS."
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr ""
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/ru.po 29 Jan 2019 08:54:42 -0000 1.41
+++ proprietary/po/ru.po 2 Feb 2019 13:31:33 -0000 1.42
@@ -5551,6 +5551,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -7986,15 +8007,24 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
-"Ðо 2015 года лÑбой ÑÐ²Ð¸Ñ Ñ Ð³ÐµÐ¾Ð³ÑаÑиÑеÑким
Ñегом <a href=\"http://web-old."
-"archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-"
-"data-gps-privacy/\"> оÑÑÑлал ÑоÑнÑе кооÑдинаÑÑ Ð½Ð°
ÑеÑÐ²ÐµÑ Ð¢Ð²Ð¸ÑÑеÑа</a>. ÐÑи "
-"кооÑдинаÑÑ Ñ
ÑанÑÑÑÑ Ñам до ÑиÑ
поÑ."
#. type: Content of: <div><p>
msgid ""
@@ -8275,6 +8305,14 @@
msgid "<a href=\"#SpywareInApplications\">Spyware in Applications</a>"
msgstr "<a href=\"#SpywareInMobileApps\">ÐÑикладнÑе
пÑогÑаммÑ</a>"
+# | <a [-href=\"#SpywareInMobileApps\">Mobile-]
+# | {+href=\"#SpywareInDesktopApps\">Desktop+} Apps</a>
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a href=\"#SpywareInMobileApps\">ÐобилÑнÑе
пÑиложениÑ</a>"
+
#. type: Content of: <div><div><ul><li><ul><li>
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr "<a href=\"#SpywareInMobileApps\">ÐобилÑнÑе
пÑиложениÑ</a>"
@@ -8614,6 +8652,25 @@
"\">#SpywareInApplications</a>)</span>"
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+# | <span class=\"anchor-reference-id\">(<a
+# | [-href=\"#SpywareInMobileApps\">#SpywareInMobileApps</a>)</span>-]
+# | {+href=\"#SpywareInDesktopApps\">#SpywareInDesktopApps</a>)</span>+}
+#. type: Content of: <div>
+#, fuzzy
+#| msgid ""
+#| "<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+#| "\">#SpywareInMobileApps</a>)</span>"
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInMobileApps"
+"\">#SpywareInMobileApps</a>)</span>"
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr "ÐобилÑнÑе пÑиложениÑ"
@@ -8914,6 +8971,18 @@
"nonfree.html\"> понÑÑÐ¸Ñ “ÑвободнÑй” и
“неÑвободнÑй” "
"Ð´Ð»Ñ Ð½Ð¸Ñ
не имеÑÑ ÑмÑÑла</a>, но вÑе Ñавно
Ñлежка ÑвлÑеÑÑÑ Ð·Ð»Ð¾ÑпоÑÑеблением."
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+"Ðо 2015 года лÑбой ÑÐ²Ð¸Ñ Ñ Ð³ÐµÐ¾Ð³ÑаÑиÑеÑким
Ñегом <a href=\"http://web-old."
+"archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-"
+"data-gps-privacy/\"> оÑÑÑлал ÑоÑнÑе кооÑдинаÑÑ Ð½Ð°
ÑеÑÐ²ÐµÑ Ð¢Ð²Ð¸ÑÑеÑа</a>. ÐÑи "
+"кооÑдинаÑÑ Ñ
ÑанÑÑÑÑ Ñам до ÑиÑ
поÑ."
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr "JavaScript"
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/zh-tw.po 28 Jan 2019 23:59:20 -0000 1.18
+++ proprietary/po/zh-tw.po 2 Feb 2019 13:31:33 -0000 1.19
@@ -3865,6 +3865,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Around 40% of gratis Androids apps <a href=\"https://privacyinternational."
+"org/report/2647/how-apps-android-share-data-facebook-report\"> report on the "
+"user's actions to Facebook</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Often they send the machine's “advertising ID,” so that Facebook "
+"can correlate the data it obtains from the same machine via various apps. "
+"Some of them send Facebook detailed information about the user's activities "
+"in the app; others only say that the user is using that app, but that alone "
+"is often quite informative."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This spying occurs regardless of whether the user has a Facebook account."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Facebook's app got “consent” to <a href=\"https://www."
"theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-"
"over-call-log-consent\"> upload call logs automatically from Android phones</"
@@ -5692,10 +5713,23 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
-"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
-"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
-"server</a>. It still contains these GPS locations."
+"Foundry's graphics software <a href=\"https://torrentfreak.com/software-"
+"company-fines-pirates-after-monitoring-their-computers-181102/\"> reports "
+"information to identify who is running it</a>. The result is often a legal "
+"threat demanding a lot of money."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The fact that this is used for repression of forbidden sharing makes it even "
+"more vicious."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This illustrates that making unauthorized copies of nonfree software is not "
+"a cure for the injustice of nonfree software. It may avoid paying for the "
+"nasty thing, but cannot make it less nasty."
msgstr ""
#. type: Content of: <div><p>
@@ -5937,6 +5971,14 @@
#| msgid ""
#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
#| "a>"
+msgid "<a href=\"#SpywareInDesktopApps\">Desktop Apps</a>"
+msgstr "<a
href=\"/proprietary/malware-mobiles.html\">è¡åè£ç½®çæ¡æè»é«</a>"
+
+#. type: Content of: <div><div><ul><li><ul><li>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"/proprietary/malware-mobiles.html\">Malware in mobile devices</"
+#| "a>"
msgid "<a href=\"#SpywareInMobileApps\">Mobile Apps</a>"
msgstr "<a
href=\"/proprietary/malware-mobiles.html\">è¡åè£ç½®çæ¡æè»é«</a>"
@@ -6228,6 +6270,16 @@
msgstr ""
#. type: Content of: <div><h4>
+msgid "Desktop Apps"
+msgstr ""
+
+#. type: Content of: <div>
+msgid ""
+"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInDesktopApps"
+"\">#SpywareInDesktopApps</a>)</span>"
+msgstr ""
+
+#. type: Content of: <div><h4>
msgid "Mobile Apps"
msgstr ""
@@ -6457,6 +6509,14 @@
"proprietary”</a>, but the surveillance is an abuse all the same."
msgstr ""
+#. type: Content of: <ul><li><p>
+msgid ""
+"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
+"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
+"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
+"server</a>. It still contains these GPS locations."
+msgstr ""
+
#. type: Content of: <div><h4>
msgid "JavaScript"
msgstr ""
Index: manual/manual.pt-br.html
===================================================================
RCS file: manual/manual.pt-br.html
diff -N manual/manual.pt-br.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ manual/manual.pt-br.html 2 Feb 2019 13:31:26 -0000 1.1
@@ -0,0 +1,120 @@
+<!--#set var="ENGLISH_PAGE" value="/manual/manual.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.86 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Manuais GNU online - Projeto GNU - Free Software Foundation</title>
+
+<!--#include virtual="/manual/po/manual.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<h2>Manuais GNU online</h2>
+
+<p id="topinfo">Esta tabela lista <a href="/software/software.html">pacotes
GNU oficiais</a>
+com links para a documentação principal, quando disponÃvel. Quando um pacote
+tem vários manuais associados, todos eles são listados. Se um pacote não
+tiver um manual online especÃfico, o link vai para a página inicial do
+pacote (que também está vinculada explicitamente).</p>
+
+<p>Muitos pacotes podem ser listados em qualquer uma das várias categorias,
mas
+para a tabela aqui apenas um deve ser escolhido, geralmente seguindo o <a
+href="https://directory.fsf.org/">Diretório de Software Livre</a> .</p>
+
+<p>Relatórios de erros: para qualquer discussão sobre manuais especÃficos,
+entre em contato com os mantenedores do pacote. Para discussões sobre esta
+página em particular (por exemplo, se você é um mantenedor do GNU e deseja
+corrigir ou discutir sua entrada), entre em contato com <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><a href="/doc/doc.html">Mais documentação do Projeto GNU</a>.</p>
+
+<!-- regenerate this when official list changes, via
+ gm generate manuals html
+ in the womb/gnumaint CVS source directory on savannah. -->
+<!--#include virtual="/manual/allgnupkgs.pt-br.html" -->
+<p>Veja <a href="#topinfo">informações sobre essa lista no topo</a>.</p>
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:address@hidden"><address@hidden></a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções acuradas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:address@hidden"><address@hidden></a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e o
envio de
+traduções das páginas desse site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2014, 2018 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/deed.pt_BR">Creative
+Commons Atribuição-SemDerivações 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+Traduzido por: Rafael Fontenelle <a
+href="mailto:address@hidden"><address@hidden></a>,
+2018.Revisado por: Cassiano Reinert Novais dos Santos <a
+href="mailto:address@hidden"><address@hidden></a>, 2018.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Ãltima atualização:
+
+$Date: 2019/02/02 13:31:26 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: manual/po/manual.pt-br-en.html
===================================================================
RCS file: manual/po/manual.pt-br-en.html
diff -N manual/po/manual.pt-br-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ manual/po/manual.pt-br-en.html 2 Feb 2019 13:31:26 -0000 1.1
@@ -0,0 +1,97 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.86 -->
+<title>GNU Manuals Online
+- GNU Project - Free Software Foundation</title>
+<!--#include virtual="/manual/po/manual.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>GNU Manuals Online</h2>
+
+<p id="topinfo">This table lists <a
+href="/software/software.html">official GNU packages</a> with links to
+their primary documentation, where available. When a package has
+several associated manuals, they are all listed. If a package has no
+specific manual online, the link just goes to the package's home page
+(which is also linked to explicitly).</p>
+
+<p>Many packages could be listed in any of several categories, but for
+the table here just one has to be chosen, usually following the <a
+href="https://directory.fsf.org/">Free Software Directory</a>.</p>
+
+<p>Bug reports: for any discussion about specific manuals, please
+contact the package maintainers. For discussion about this page in
+particular (for example, if you are a GNU maintainer and want to correct
+or discuss your entry), contact <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><a href="/doc/doc.html">More GNU Project documentation</a>.</p>
+
+<!-- regenerate this when official list changes, via
+ gm generate manuals html
+ in the womb/gnumaint CVS source directory on savannah. -->
+<!--#include virtual="/manual/allgnupkgs.html" -->
+
+<p>See <a href="#topinfo">info about this list at top</a>.</p>
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent to
+<a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2014, 2018 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/02/02 13:31:26 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: philosophy/phone-anonymous-payment.pt-br.html
===================================================================
RCS file: philosophy/phone-anonymous-payment.pt-br.html
diff -N philosophy/phone-anonymous-payment.pt-br.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ philosophy/phone-anonymous-payment.pt-br.html 2 Feb 2019 13:31:26
-0000 1.1
@@ -0,0 +1,117 @@
+<!--#set var="ENGLISH_PAGE"
value="/philosophy/phone-anonymous-payment.en.html" -->
+
+<!--#include virtual="/server/header.pt-br.html" -->
+<!-- Parent-Version: 1.86 -->
+
+<!-- This file is automatically generated by GNUnited Nations! -->
+<title>Pagamento anônimo por telefone - Projeto GNU - Free Software
Foundation</title>
+
+<!--#include virtual="/philosophy/po/phone-anonymous-payment.translist" -->
+<!--#include virtual="/server/banner.pt-br.html" -->
+<h2>Pagamento anônimo por telefone</h2>
+
+<p>por Richard Stallman</p>
+
+<p>Aqui está uma ideia para um sistema de pagamento anônimo que seria útil
para
+alguns aplicativos.</p>
+
+<ul>
+<li>O vendedor configura um número de telefone que cobra N dólares por minuto
+para qualquer chamador.</li>
+
+<li>O cliente escolhe um código, chama esse número (que exige pagar N
dólares) e
+insere o código. Um sistema de geração de voz fala o código de volta para
+que o cliente possa confirmá-lo.</li>
+
+<li>Esse código representa um pagamento de N dólares. O cliente entra em um
site
+ou quiosque e constitui um pagamento por qualquer coisa.</li>
+</ul>
+
+<p>Deveria ser possÃvel fazer isso usando um cartão telefônico em um
telefone
+público ou no telefone de outra pessoa.</p>
+
+<div class="translators-notes">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.-->
+ </div>
+</div>
+
+<!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.pt-br.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Envie perguntas em geral sobre a FSF e o GNU para <a
+href="mailto:address@hidden"><address@hidden></a>. Também existem <a
+href="/contact/">outros meios de contatar</a> a FSF. Links quebrados e
+outras correções ou sugestões podem ser enviadas para <a
+href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p>
+<!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+A equipe de traduções para o português brasileiro se esforça para oferecer
+traduções acuradas e de boa qualidade, mas não estamos isentos de erros. Por
+favor, envie seus comentários e sugestões em geral sobre as traduções para
+<a
+href="mailto:address@hidden"><address@hidden></a>.
+</p><p>Consulte o <a href="/server/standards/README.translations.html">Guia
+para as traduções</a> para mais informações sobre a coordenação e o
envio de
+traduções das páginas desse site.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+<p>Copyright © 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>Esta página está licenciada sob uma licença <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/deed.pt_BR">Creative
+Commons Atribuição-SemDerivações 4.0 Internacional</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.pt-br.html" -->
+<div class="translators-credits">
+
+<!--TRANSLATORS: Use space (SPC) as msgstr if you don't want credits.-->
+Traduzido por: Rafael Fontenelle <a
+href="mailto:address@hidden"><address@hidden></a>, 2019.<br/>
+Revisado por: Cassiano Reinert Novais dos Santos <a
+href="mailto:address@hidden"><address@hidden></a>, 2019.</div>
+
+<p class="unprintable"><!-- timestamp start -->
+Ãltima atualização:
+
+$Date: 2019/02/02 13:31:26 $
+
+<!-- timestamp end -->
+</p>
+</div>
+</div>
+<!-- for class="inner", starts in the banner include -->
+</body>
+</html>
Index: philosophy/po/phone-anonymous-payment.pt-br-en.html
===================================================================
RCS file: philosophy/po/phone-anonymous-payment.pt-br-en.html
diff -N philosophy/po/phone-anonymous-payment.pt-br-en.html
--- /dev/null 1 Jan 1970 00:00:00 -0000
+++ philosophy/po/phone-anonymous-payment.pt-br-en.html 2 Feb 2019 13:31:27
-0000 1.1
@@ -0,0 +1,92 @@
+<!--#include virtual="/server/header.html" -->
+<!-- Parent-Version: 1.86 -->
+<title>Anonymous Payment by Phone
+- GNU Project - Free Software Foundation</title>
+ <!--#include virtual="/philosophy/po/phone-anonymous-payment.translist" -->
+<!--#include virtual="/server/banner.html" -->
+<h2>Anonymous Payment by Phone</h2>
+
+<p>by Richard Stallman</p>
+
+<p>Here is an idea for an anonymous payment system that would be useful
+for some applications.</p>
+
+<ul>
+<li>The seller sets up a phone number that charges N dollars per minute to
+any caller.</li>
+
+<li>The customer chooses a code, calls that number (which requires paying
+N dollars), and enters the code. A voice-generation system speaks the
+code back so the customer can confirm it.</li>
+
+<li>That code represents a payment of N dollars. The customer enters it
+in a web site, or a kiosk, and it constitutes payment for whatever.</li>
+</ul>
+
+<p>It should be possible to do this using a phone card on a payphone
+or anyone else's telephone.</p>
+
+</div><!-- for id="content", starts in the include above -->
+<!--#include virtual="/server/footer.html" -->
+<div id="footer">
+<div class="unprintable">
+
+<p>Please send general FSF & GNU inquiries to
+<a href="mailto:address@hidden"><address@hidden></a>.
+There are also <a href="/contact/">other ways to contact</a>
+the FSF. Broken links and other corrections or suggestions can be sent
+to <a href="mailto:address@hidden"><address@hidden></a>.</p>
+
+<p><!-- TRANSLATORS: Ignore the original text in this paragraph,
+ replace it with the translation of these two:
+
+ We work hard and do our best to provide accurate, good quality
+ translations. However, we are not exempt from imperfection.
+ Please send your comments and general suggestions in this regard
+ to <a href="mailto:address@hidden">
+ <address@hidden></a>.</p>
+
+ <p>For information on coordinating and submitting translations of
+ our web pages, see <a
+ href="/server/standards/README.translations.html">Translations
+ README</a>. -->
+Please see the <a
+href="/server/standards/README.translations.html">Translations
+README</a> for information on coordinating and submitting translations
+of this article.</p>
+</div>
+
+<!-- Regarding copyright, in general, standalone pages (as opposed to
+ files generated as part of manuals) on the GNU web server should
+ be under CC BY-ND 4.0. Please do NOT change or remove this
+ without talking with the webmasters or licensing team first.
+ Please make sure the copyright date is consistent with the
+ document. For web pages, it is ok to list just the latest year the
+ document was modified, or published.
+
+ If you wish to list earlier years, that is ok too.
+ Either "2001, 2002, 2003" or "2001-2003" are ok for specifying
+ years, as long as each year in the range is in fact a copyrightable
+ year, i.e., a year in which the document was published (including
+ being publicly visible on the web or in a revision control system).
+
+ There is more detail about copyright years in the GNU Maintainers
+ Information document, www.gnu.org/prep/maintain. -->
+
+<p>Copyright © 2018, 2019 Free Software Foundation, Inc.</p>
+
+<p>This page is licensed under a <a rel="license"
+href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
+Commons Attribution-NoDerivatives 4.0 International License</a>.</p>
+
+<!--#include virtual="/server/bottom-notes.html" -->
+
+<p class="unprintable">Updated:
+<!-- timestamp start -->
+$Date: 2019/02/02 13:31:27 $
+<!-- timestamp end -->
+</p>
+</div>
+</div><!-- for class="inner", starts in the banner include -->
+</body>
+</html>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www manual/allgnupkgs.pt-br.html manual/po/allg...,
GNUN <=