[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www planetfeeds.ru.html po/planetfeeds.ru.po pr...
From: |
GNUN |
Subject: |
www planetfeeds.ru.html po/planetfeeds.ru.po pr... |
Date: |
Mon, 4 Feb 2019 02:31:26 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/02/04 02:31:24
Modified files:
. : planetfeeds.ru.html
po : planetfeeds.ru.po
proprietary : malware-amazon.es.html malware-amazon.fr.html
malware-amazon.ru.html malware-apple.es.html
malware-apple.fr.html malware-apple.ru.html
malware-appliances.fr.html
malware-appliances.ru.html malware-cars.fr.html
malware-cars.ru.html malware-microsoft.fr.html
malware-microsoft.ru.html
malware-mobiles.fr.html malware-mobiles.ru.html
malware-webpages.fr.html
malware-webpages.ru.html
proprietary-back-doors.fr.html
proprietary-back-doors.ru.html
proprietary-drm.fr.html proprietary-drm.ru.html
proprietary-insecurity.fr.html
proprietary-insecurity.ru.html
proprietary-sabotage.fr.html
proprietary-sabotage.ru.html
proprietary-subscriptions.fr.html
proprietary-subscriptions.ru.html
proprietary-surveillance.fr.html
proprietary-surveillance.ru.html
proprietary-tethers.fr.html
proprietary-tethers.ru.html
proprietary/po : malware-amazon.de-diff.html
malware-amazon.es-en.html
malware-amazon.fr-en.html
malware-amazon.it-diff.html
malware-amazon.ja-diff.html
malware-amazon.ru-en.html
malware-apple.de-diff.html
malware-apple.es-en.html
malware-apple.fr-en.html
malware-apple.it-diff.html
malware-apple.ja-diff.html
malware-apple.nl-diff.html
malware-apple.ru-en.html
malware-appliances.de-diff.html
malware-appliances.fr-en.html
malware-appliances.ru-en.html
malware-cars.de-diff.html
malware-cars.fr-en.html malware-cars.ru-en.html
malware-microsoft.de-diff.html
malware-microsoft.fr-en.html
malware-microsoft.it-diff.html
malware-microsoft.ja-diff.html
malware-microsoft.ru-en.html
malware-mobiles.de-diff.html
malware-mobiles.fr-en.html
malware-mobiles.it-diff.html
malware-mobiles.ja-diff.html
malware-mobiles.ru-en.html
malware-webpages.de-diff.html
malware-webpages.fr-en.html
malware-webpages.ru-en.html
proprietary-back-doors.de-diff.html
proprietary-back-doors.fr-en.html
proprietary-back-doors.it-diff.html
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ru-en.html
proprietary-drm.de-diff.html
proprietary-drm.fr-en.html
proprietary-drm.it-diff.html
proprietary-drm.ja-diff.html
proprietary-drm.ru-en.html
proprietary-insecurity.de-diff.html
proprietary-insecurity.fr-en.html
proprietary-insecurity.it-diff.html
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ru-en.html
proprietary-sabotage.de-diff.html
proprietary-sabotage.fr-en.html
proprietary-sabotage.it-diff.html
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ru-en.html
proprietary-subscriptions.de-diff.html
proprietary-subscriptions.fr-en.html
proprietary-subscriptions.ja-diff.html
proprietary-subscriptions.ru-en.html
proprietary-surveillance.de-diff.html
proprietary-surveillance.fr-en.html
proprietary-surveillance.it-diff.html
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ru-en.html
proprietary-tethers.de-diff.html
proprietary-tethers.fr-en.html
proprietary-tethers.ja-diff.html
proprietary-tethers.ru-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/planetfeeds.ru.html?cvsroot=www&r1=1.861&r2=1.862
http://web.cvs.savannah.gnu.org/viewcvs/www/po/planetfeeds.ru.po?cvsroot=www&r1=1.1278&r2=1.1279
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.es.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.fr.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-amazon.ru.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.fr.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.ru.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.fr.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-cars.ru.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.fr.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-microsoft.ru.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.fr.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.fr.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-webpages.ru.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.fr.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-back-doors.ru.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.fr.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-drm.ru.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.fr.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-sabotage.ru.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.fr.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-subscriptions.ru.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.fr.html?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.fr.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-tethers.ru.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru-en.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru-en.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr-en.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr-en.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru-en.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr-en.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.fr-en.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-webpages.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr-en.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru-en.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de-diff.html?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr-en.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr-en.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru-en.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr-en.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru-en.html?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr-en.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr-en.html?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru-en.html?cvsroot=www&r1=1.23&r2=1.24
Patches:
Index: planetfeeds.ru.html
===================================================================
RCS file: /web/www/www/planetfeeds.ru.html,v
retrieving revision 1.861
retrieving revision 1.862
diff -u -b -r1.861 -r1.862
--- planetfeeds.ru.html 4 Feb 2019 05:59:01 -0000 1.861
+++ planetfeeds.ru.html 4 Feb 2019 07:31:19 -0000 1.862
@@ -6,12 +6,11 @@
value="<a href='http://dustycloud.org/blog/samsung-stack-zero-grant/'>" -->
<!--#echo
encoding="none" var="link" -->
-I've been awarded the Samsung Stack Zero Grant<!--#echo encoding="none"
+Ðне пÑиÑÑдили пÑÐµÐ¼Ð¸Ñ Samsung Stack Zero<!--#echo
encoding="none"
var="a_close" -->
<!-- TRANSLATORS:
http://dustycloud.org/blog/samsung-stack-zero-grant/ -->
-: Good news everyone! I've been awarded the Samsung Stack Zero Grant.
-But why not quote them? Christopher Lemmer Webber is the co-editor...
+: ХоÑоÑÐ°Ñ Ð½Ð¾Ð²Ð¾ÑÑÑ! Ðне пÑиÑÑдили пÑемиÑ
Samsung Stack Zero...
</p>
<p>
<!--#set var="link"
Index: po/planetfeeds.ru.po
===================================================================
RCS file: /web/www/www/po/planetfeeds.ru.po,v
retrieving revision 1.1278
retrieving revision 1.1279
diff -u -b -r1.1278 -r1.1279
--- po/planetfeeds.ru.po 4 Feb 2019 07:06:46 -0000 1.1278
+++ po/planetfeeds.ru.po 4 Feb 2019 07:31:21 -0000 1.1279
@@ -14,7 +14,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-02-04 05:57+0000\n"
#. type: Content of: <p>
msgid "I've been awarded the Samsung Stack Zero Grant"
@@ -26,8 +25,7 @@
msgid ""
": Good news everyone! I've been awarded the Samsung Stack Zero Grant. "
"But why not quote them? Christopher Lemmer Webber is the co-editor..."
-msgstr ""
-": ХоÑоÑÐ°Ñ Ð½Ð¾Ð²Ð¾ÑÑÑ! Ðне пÑиÑÑдили пÑемиÑ
Samsung Stack Zero..."
+msgstr ": ХоÑоÑÐ°Ñ Ð½Ð¾Ð²Ð¾ÑÑÑ! Ðне пÑиÑÑдили
пÑÐµÐ¼Ð¸Ñ Samsung Stack Zero..."
#. type: Content of: <p>
msgid ""
Index: proprietary/malware-amazon.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.es.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/malware-amazon.es.html 18 Jan 2019 13:01:09 -0000 1.16
+++ proprietary/malware-amazon.es.html 4 Feb 2019 07:31:21 -0000 1.17
@@ -72,7 +72,7 @@
habÃan sido desbloqueados. </p>
</li>
- <li id="M201210221">
+ <li id="M201210220.1">
<p>El Kindle-Swindle de Amazon tiene una puerta trasera que ha sido usada
para
<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
@@ -97,7 +97,7 @@
<h4 id="surveillance">Vigilancia</h4>
<ul class="blurbs">
- <li id="M201212031">
+ <li id="M201212030.1">
<p>La <cite>Electronic Frontier Foundation</cite> ha examinado y
encontrado <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">diversos tipos de
vigilancia en el Swindle y otros lectores de libros electrónicos</a>.</p>
@@ -108,7 +108,7 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
- <li id="M201704131">
+ <li id="M201704130.1">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html"> El
Kindle
de Amazon tiene DRM</a>. Ese artÃculo es erróneo, ya que no trata el DRM
como una cuestión ética; da por hecho que todo lo que Amazon podrÃa hacer a
@@ -255,7 +255,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/01/18 13:01:09 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-amazon.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.fr.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/malware-amazon.fr.html 14 Jan 2019 07:59:32 -0000 1.21
+++ proprietary/malware-amazon.fr.html 4 Feb 2019 07:31:21 -0000 1.22
@@ -70,7 +70,7 @@
complètement de fonctionner.</p>
</li>
- <li id="M201210221">
+ <li id="M201210220.1">
<p>Le Kindle-Swindle d'Amazon a une porte dérobée qui a servi à <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">effacer
des livres à distance</a>. Un de ces livres était <cite>1984</cite>, de
@@ -95,7 +95,7 @@
<h4 id="surveillance">Surveillance</h4>
<ul class="blurbs">
- <li id="M201212031">
+ <li id="M201212030.1">
<p>L'<cite>Electronic Frontier Foundation</cite> a mis en évidence <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">différents
mécanismes de surveillance dans le Swindle et autres liseuses</a>.</p>
@@ -106,7 +106,7 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
- <li id="M201704131">
+ <li id="M201704130.1">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">Le
Kindle
d'Amazon a des menottes numériques</a>. Cet article a un défaut : il
néglige
la dimension éthique des DRM ; il prend pour acquis que tout ce qu'Amazon
@@ -252,7 +252,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-amazon.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-amazon.ru.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/malware-amazon.ru.html 14 Jan 2019 07:59:32 -0000 1.19
+++ proprietary/malware-amazon.ru.html 4 Feb 2019 07:31:21 -0000 1.20
@@ -70,7 +70,7 @@
ÑÑнкÑиониÑоваÑÑ Ð²Ð¾Ð¾Ð±Ñе.</p>
</li>
- <li id="M201210221">
+ <li id="M201210220.1">
<p>Ð Amazon Kindle еÑÑÑ ÑеÑнÑй Ñ
од, коÑоÑÑм
полÑзовалиÑÑ, ÑÑÐ¾Ð±Ñ <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
Ñдаленно ÑÑиÑаÑÑ ÐºÐ½Ð¸Ð³Ð¸</a>. Ðдной из ÑакиÑ
книг бÑл Ñоман ÐжоÑджа ÐÑÑÑлла
@@ -94,7 +94,7 @@
<h4 id="surveillance">Слежка</h4>
<ul class="blurbs">
- <li id="M201212031">
+ <li id="M201212030.1">
<p>Фонд ÑлекÑÑоннÑÑ
ÑÑбежей обÑледовал и
наÑел <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> Ñазного
Ñода
ÑÐ»ÐµÐ¶ÐºÑ Ð² Swindle и дÑÑгиÑ
ÑÑÑÑойÑÑваÑ
ÑÑениÑ
ÑлекÑÑоннÑÑ
книг</a>.</p>
@@ -105,7 +105,7 @@
<h4 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h4>
<ul class="blurbs">
- <li id="M201704131">
+ <li id="M201704130.1">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html"> Ð
Amazon
Kindle еÑÑÑ ÑиÑÑовое ÑпÑавление
огÑаниÑениÑми</a>. ÐедоÑÑаÑок ÑÑой
ÑÑаÑÑи — в Ñом, ÑÑо ÑиÑÑовое
ÑпÑавление огÑаниÑениÑми не
@@ -253,7 +253,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/malware-apple.es.html 18 Jan 2019 13:01:09 -0000 1.64
+++ proprietary/malware-apple.es.html 4 Feb 2019 07:31:21 -0000 1.65
@@ -138,7 +138,7 @@
<h3 id="drm">Gestión digital de restricciones en Apple</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>El DRM hace que el iPhone 7 sea prácticamente <a
href="#iphone7-sabotage">irreparable</a> por nadie que no sea Apple.</p>
</li>
@@ -640,7 +640,7 @@
técnica</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">La
herramienta de búsqueda <cite>Spotlight</cite></a> envÃa a Apple los
@@ -779,7 +779,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/01/18 13:01:09 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-apple.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.fr.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/malware-apple.fr.html 6 Jan 2019 09:59:17 -0000 1.74
+++ proprietary/malware-apple.fr.html 4 Feb 2019 07:31:21 -0000 1.75
@@ -137,7 +137,7 @@
<h3 id="drm">DRM</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>Un DRM rend l'iPhone7 presque <a
href="#iphone7-sabotage">irréparable</a>
par quelqu'un d'autre qu'Apple.</p>
</li>
@@ -643,7 +643,7 @@
technique</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">Le
moteur de recherche de fichiers <cite>Spotlight</cite></a> envoie à Apple
@@ -783,7 +783,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-apple.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.ru.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/malware-apple.ru.html 29 Jan 2019 09:01:20 -0000 1.68
+++ proprietary/malware-apple.ru.html 4 Feb 2019 07:31:21 -0000 1.69
@@ -133,7 +133,7 @@
<h3 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>ЦиÑÑовое ÑпÑавление огÑаниÑение
Ð´ÐµÐ»Ð°ÐµÑ iPhone 7 поÑÑи <a
href="#iphone7-sabotage">неÑемонÑопÑигоднÑм</a> длÑ
вÑеÑ
, кÑоме Apple.</p>
</li>
@@ -633,7 +633,7 @@
ÑеÑ
ниÑеÑкий доклад</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">ÑÑедÑÑво
поиÑка Spotlight</a> вÑÑÑÐ»Ð°ÐµÑ Ð·Ð°Ð¿ÑоÑÑ
полÑзоваÑÐµÐ»Ñ Ð² Apple.</p>
@@ -771,7 +771,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/29 09:01:20 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/malware-appliances.fr.html 3 Feb 2019 19:59:05 -0000
1.59
+++ proprietary/malware-appliances.fr.html 4 Feb 2019 07:31:21 -0000
1.60
@@ -374,7 +374,7 @@
pouvoir.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>Les jouets « intelligents » <cite>Mon amie Cayla</cite> et
<cite>i-Que</cite> peuvent être <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">contrôlés
@@ -648,7 +648,7 @@
données concernant l'utilisateur</a>.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">a
désactivé des fonctionnalités réseau</a> sur des téléviseurs
@@ -868,7 +868,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/02/03 19:59:05 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/malware-appliances.ru.html 13 Jan 2019 11:30:09 -0000
1.52
+++ proprietary/malware-appliances.ru.html 4 Feb 2019 07:31:21 -0000
1.53
@@ -371,7 +371,7 @@
ÑÐ°ÐºÐ°Ñ Ð²Ð»Ð°ÑÑÑ.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>“УмнÑе” игÑÑÑки “Ðой дÑÑг
Ðейла” и i-Que <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">можно
конÑÑолиÑоваÑÑ Ð¿Ð¾ ÑоÑÐ¾Ð²Ð¾Ð¼Ñ ÑелеÑонÑ</a>;
ÑизиÑеÑкий доÑÑÑп Ð´Ð»Ñ ÑÑого не
@@ -635,7 +635,7 @@
даннÑÑ
о полÑзоваÑеле</a>.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
оÑклÑÑала ÑеÑевÑе ÑÑнкÑии</a> в <em>кÑпленнÑÑ
до ÑÑого</em>
@@ -856,7 +856,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/13 11:30:09 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-cars.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.fr.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/malware-cars.fr.html 5 Jan 2019 11:31:31 -0000 1.18
+++ proprietary/malware-cars.fr.html 4 Feb 2019 07:31:21 -0000 1.19
@@ -97,7 +97,7 @@
à distance des airbags</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>Dans certaines voitures, Tesla a limité la fraction de batterie
utilisable
par ses clients au moyen d'un logiciel et a levé temporairement cette
limitation au moyen d'une <a
@@ -323,7 +323,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/01/05 11:31:31 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-cars.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-cars.ru.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/malware-cars.ru.html 5 Jan 2019 11:31:31 -0000 1.16
+++ proprietary/malware-cars.ru.html 4 Feb 2019 07:31:21 -0000 1.17
@@ -96,7 +96,7 @@
задейÑÑвоваÑÑ Ð¿Ð¾Ð´ÑÑки безопаÑноÑÑи по
ÑеÑи</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Tesla пÑогÑаммÑ, ÑÑобÑ
огÑаниÑиÑÑ ÐµÐ¼ÐºÐ¾ÑÑÑ Ð°ÐºÐºÑмÑлÑÑоÑов, коÑоÑÑÑ
могли иÑполÑзоваÑÑ ÐºÐ»Ð¸ÐµÐ½ÑÑ Ð² некоÑоÑÑÑ
моделÑÑ
, и <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -319,7 +319,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/05 11:31:31 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.fr.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/malware-microsoft.fr.html 3 Feb 2019 17:29:05 -0000
1.74
+++ proprietary/malware-microsoft.fr.html 4 Feb 2019 07:31:21 -0000
1.75
@@ -77,7 +77,7 @@
<h3 id="back-doors">Portes dérobées</h3>
<ul class="blurbs">
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft Windows a une porte dérobée universelle
qui permet <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">d'imposer
un changement aux utilisateurs, quel qu'il soit</a>.</p>
@@ -117,7 +117,7 @@
respectés en sécurité.</p>
</li>
- <li id="M201112081">
+ <li id="M201112080.1">
<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">WindowsÂ
8
a aussi une porte dérobée pour supprimer des applications Ã
distance</a>.</p>
@@ -134,7 +134,7 @@
<h3 id="drm">DRM</h3>
<ul class="blurbs">
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">Un DRM
dans
Windows</a>, introduit pour répondre aux besoins des disques <a
href="/proprietary/proprietary-drm.html#bluray">Blu-ray</a>. (L'article
@@ -408,7 +408,7 @@
distribue à une autre société.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>Afin d'élargir la base installée de Windows 10, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">manifeste
@@ -647,7 +647,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/02/03 17:29:05 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-microsoft.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-microsoft.ru.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/malware-microsoft.ru.html 3 Feb 2019 16:30:30 -0000
1.67
+++ proprietary/malware-microsoft.ru.html 4 Feb 2019 07:31:21 -0000
1.68
@@ -75,7 +75,7 @@
<h3 id="back-doors">Ðазейки</h3>
<ul class="blurbs">
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Ð Microsoft Windows еÑÑÑ
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, по коÑоÑÐ¾Ð¼Ñ <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
полÑзоваÑелÑм можно навÑзÑваÑÑ ÐºÐ°ÐºÐ¸Ðµ
Ñгодно изменениÑ</a>.</p>
@@ -115,7 +115,7 @@
безопаÑноÑÑи.</p>
</li>
- <li id="M201112081">
+ <li id="M201112080.1">
<p>Ð Windows 8 еÑÑÑ Ñакже лазейка Ð´Ð»Ñ <a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
ÑÐ´Ð°Ð»ÐµÐ½Ð¸Ñ Ð¿ÑогÑамм по ÑеÑи</a>.</p>
@@ -132,7 +132,7 @@
<h3 id="drm">ЦиÑÑовое ÑпÑавление
огÑаниÑениÑми</h3>
<ul class="blurbs">
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">ЦиÑÑовое
ÑпÑавление огÑаниÑениÑми в Windows</a> введено
в ÑÐ³Ð¾Ð´Ñ Ð´Ð¸Ñкам <a
href="/proprietary/proprietary-drm.html#bluray"> Bluray</a> (в ÑÑаÑÑе
@@ -402,7 +402,7 @@
вÑÐµÐ¼Ñ Microsoft пеÑÐµÐ´Ð°ÐµÑ Ð¸Ñ
дÑÑгой компании.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>Ð ÑелÑÑ
наÑаÑÐ¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑÑкой
Ð±Ð°Ð·Ñ Windows 10 Microsoft <a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
допÑÑÐºÐ°ÐµÑ Ð²Ð¾Ð¿Ð¸ÑÑие наÑÑÑÐµÐ½Ð¸Ñ Ð²ÑбоÑа
полÑзоваÑелей и иÑ
пÑиваÑноÑÑи</a>.</p>
@@ -641,7 +641,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/02/03 16:30:30 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.fr.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/malware-mobiles.fr.html 3 Feb 2019 19:59:05 -0000 1.62
+++ proprietary/malware-mobiles.fr.html 4 Feb 2019 07:31:21 -0000 1.63
@@ -83,7 +83,7 @@
données de localisation pendant des mois ou des années.</p>
</li>
- <li id="M201311121">
+ <li id="M201311120.1">
<p id="universal-back-door">
Le processeur de communication de chaque téléphone a une porte dérobée
universelle qui est <a
@@ -821,7 +821,7 @@
de Samsung</a> permet l'accès à n'importe quel fichier du système.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>Le clavier Simeji est une version pour smartphone de l'<a
href="/proprietary/proprietary-surveillance.html#baidu-ime">éditeur espion
de méthodes de saisie</a> de Baidu.</p>
@@ -970,7 +970,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/02/03 19:59:05 $
+$Date: 2019/02/04 07:31:21 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/malware-mobiles.ru.html 3 Feb 2019 16:30:30 -0000 1.55
+++ proprietary/malware-mobiles.ru.html 4 Feb 2019 07:31:22 -0000 1.56
@@ -80,7 +80,7 @@
меÑÑоположении в ÑеÑение меÑÑÑев или
леÑ.</p>
</li>
- <li id="M201311121">
+ <li id="M201311120.1">
<p id="universal-back-door">
РкоммÑникаÑионном пÑоÑеÑÑоÑе поÑÑи
лÑбого ÑелеÑона еÑÑÑ ÑнивеÑÑалÑнÑй
ÑеÑнÑй Ñ
од, коÑоÑÑй <a
@@ -806,7 +806,7 @@
Samsung</a> пÑедоÑÑавлÑÐµÑ Ð´Ð¾ÑÑÑп к лÑÐ±Ð¾Ð¼Ñ ÑайлÑ
в ÑиÑÑеме.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>ÐлавиаÑÑÑа Simeji — ÑмаÑÑÑоннаÑ
веÑÑÐ¸Ñ <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">ÑпионÑÑего
меÑода ввода</a> Baidu.</p>
@@ -957,7 +957,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/02/03 16:30:30 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-webpages.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.fr.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/malware-webpages.fr.html 5 Jan 2019 16:29:31 -0000
1.19
+++ proprietary/malware-webpages.fr.html 4 Feb 2019 07:31:22 -0000
1.20
@@ -139,7 +139,7 @@
interactions avec les serveurs, mais le logiciel privateur joue un rôle.</p>
</li>
- <li id="M201611161">
+ <li id="M201611160.1">
<p>Un <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">article
de recherche</a> a étudié 283 applis VPN pour Android du point de vue de la
@@ -294,7 +294,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/malware-webpages.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-webpages.ru.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/malware-webpages.ru.html 5 Jan 2019 11:31:31 -0000
1.17
+++ proprietary/malware-webpages.ru.html 4 Feb 2019 07:31:22 -0000
1.18
@@ -137,7 +137,7 @@
неÑвободнÑе пÑогÑÐ°Ð¼Ð¼Ñ Ð²Ð½Ð¾ÑÑÑ Ñвой вклад.</p>
</li>
- <li id="M201611161">
+ <li id="M201611160.1">
<p>Ð ÑÑаÑÑе Ñ Ð¸ÑÑледованием пÑиваÑноÑÑи и
заÑиÑенноÑÑи 283 пÑиложений Android
Ð´Ð»Ñ VPN Ñделан вÑвод, ÑÑо “неÑмоÑÑÑ Ð½Ð°
обеÑÐ°Ð½Ð¸Ñ Ð¿ÑиваÑноÑÑи,
заÑиÑенноÑÑи и анонимноÑÑи, коÑоÑое даÑÑ
болÑÑинÑÑво пÑиложений Ð´Ð»Ñ VPN, <a
@@ -292,7 +292,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/05 11:31:31 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.fr.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/proprietary-back-doors.fr.html 19 Jan 2019 10:30:55 -0000
1.64
+++ proprietary/proprietary-back-doors.fr.html 4 Feb 2019 07:31:22 -0000
1.65
@@ -61,7 +61,7 @@
<h3 id='spy'>Espionner</h3>
<ul class="blurbs">
- <li id="M201706202">
+ <li id="M201706200.2">
<p id="InternetCameraBackDoor">De nombreux modèles de caméras
connectées contiennent une porte dérobée
caractérisée. Elles ont des comptes utilisateurs avec des mots de passe
codés en dur, non modifiables, et qui <a
@@ -179,7 +179,7 @@
le même tactique.</p>
</li>
- <li id="M201403121">
+ <li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">Les
Galaxy de Samsung qui tournent sous des versions privatrices d'Android sont
@@ -351,7 +351,7 @@
abonnement obligatoire</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>Dans certaines voitures, Tesla a limité la fraction de batterie
utilisable
par ses clients au moyen d'un logiciel et a levé temporairement cette
limitation au moyen d'une <a
@@ -365,7 +365,7 @@
ou même de conduire son passager vers une prison de torture.</p>
</li>
- <li id="M201702061">
+ <li id="M201702060.1">
<p>Les téléviseurs « intelligents » Vizio <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">ont
une porte dérobée universelle</a>.</p>
@@ -382,7 +382,7 @@
existe dans le processeur du modem.</p>
</li>
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft Windows a une porte dérobée universelle
qui permet <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">d'imposer
un changement aux utilisateurs, quel qu'il soit</a>.</p>
@@ -434,7 +434,7 @@
des <abbr title="Contrat de Licence d'Utilisateur Final">CLUF</abbr></a>.</p>
</li>
- <li id="M200700001">
+ <li id="M200700000.1">
<p>En plus de son <a href="#swindle-eraser">effaceur de livre</a>, le
Kindle-Swindle a une <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">porte
@@ -603,7 +603,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/01/19 10:30:55 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-back-doors.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-back-doors.ru.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/proprietary-back-doors.ru.html 19 Jan 2019 10:00:16 -0000
1.58
+++ proprietary/proprietary-back-doors.ru.html 4 Feb 2019 07:31:22 -0000
1.59
@@ -59,7 +59,7 @@
<h3 id='spy'>Шпионаж</h3>
<ul class="blurbs">
- <li id="M201706202">
+ <li id="M201706200.2">
<p id="InternetCameraBackDoor">Ðо многиÑ
моделÑÑ
Ð²Ð¸Ð´ÐµÐ¾ÐºÐ°Ð¼ÐµÑ Ñ Ð¿Ð¾Ð´ÐºÐ»ÑÑением к ÐнÑеÑнеÑÑ ÐµÑÑÑ
ÑÑдовиÑнаÑ
лазейка — Ñ Ð½Ð¸Ñ
еÑÑÑ ÑÑеÑÐ½Ð°Ñ Ð·Ð°Ð¿Ð¸ÑÑ Ñ
неизменÑемÑм паÑолем, и <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">
@@ -172,7 +172,7 @@
в плаÑнÑÑ
игÑаÑ
.</p>
</li>
- <li id="M201403121">
+ <li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
УÑÑÑойÑÑва Samsung Galaxy под ÑпÑавлением
неÑвободнÑÑ
веÑÑий Android
@@ -340,7 +340,7 @@
подпиÑки</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Tesla пÑогÑаммÑ, ÑÑобÑ
огÑаниÑиÑÑ ÐµÐ¼ÐºÐ¾ÑÑÑ Ð°ÐºÐºÑмÑлÑÑоÑов, коÑоÑÑÑ
могли иÑполÑзоваÑÑ ÐºÐ»Ð¸ÐµÐ½ÑÑ Ð² некоÑоÑÑÑ
моделÑÑ
, и <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -354,7 +354,7 @@
вообÑе. Ðли, Ñкажем, довезÑи паÑÑажиÑа до
камеÑÑ Ð¿ÑÑок.</p>
</li>
- <li id="M201702061">
+ <li id="M201702060.1">
<p>Ð “ÑмнÑÑ
” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">ÑелевизоÑаÑ
Vizio еÑÑÑ ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од</a>.</p>
@@ -370,7 +370,7 @@
меÑÑÐ½Ð°Ñ ÑелеÑÐ¾Ð½Ð½Ð°Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ</a>.</p>
</li>
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Ð Microsoft Windows еÑÑÑ
ÑнивеÑÑалÑнÑй ÑеÑнÑй Ñ
од, по коÑоÑÐ¾Ð¼Ñ <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
полÑзоваÑелÑм можно навÑзÑваÑÑ ÐºÐ°ÐºÐ¸Ðµ
Ñгодно изменениÑ</a>.</p>
@@ -422,7 +422,7 @@
Ñазделе 4 лиÑензионного договоÑа
конеÑного полÑзоваÑелÑ</a>.</p>
</li>
- <li id="M200700001">
+ <li id="M200700000.1">
<p>Рдополнение к <a
href="#swindle-eraser">ÑниÑÑожиÑÐµÐ»Ñ ÐºÐ½Ð¸Ð³</a>, в Kindle
еÑÑÑ <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
@@ -590,7 +590,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/19 10:00:16 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-drm.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.fr.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/proprietary-drm.fr.html 5 Jan 2019 16:29:31 -0000 1.35
+++ proprietary/proprietary-drm.fr.html 4 Feb 2019 07:31:22 -0000 1.36
@@ -199,7 +199,7 @@
imposées par les studios de cinéma.</p>
</li>
- <li id="M201410081">
+ <li id="M201410080.1">
<p>Adobe a fait en sorte que « Digital Editions » (la liseuse
utilisée par la
plupart des bibliothèques aux Ãtats-Unis), espionne l'utilisateur <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">au
@@ -283,7 +283,7 @@
DRM du lecteur Flash</a>.</p>
</li>
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">Un DRM
dans
Windows</a>, introduit pour répondre aux besoins des disques <a
href="/proprietary/proprietary-drm.html#bluray">Blu-ray</a>. (L'article
@@ -378,7 +378,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-drm.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-drm.ru.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/proprietary-drm.ru.html 17 Jan 2019 06:30:30 -0000 1.31
+++ proprietary/proprietary-drm.ru.html 4 Feb 2019 07:31:22 -0000 1.32
@@ -202,7 +202,7 @@
коÑоÑÑе дикÑÑÑÑÑÑ ÐºÐ¸Ð½Ð¾ÑÑÑдиÑми.</p>
</li>
- <li id="M201410081">
+ <li id="M201410080.1">
<p>ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, пÑогÑамма
ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð² болÑÑинÑÑве
библиоÑек СШÐ, <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
@@ -289,7 +289,7 @@
ЦиÑÑовое ÑпÑавление огÑаниÑениÑми в Flash
Player</a>.</p>
</li>
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">ЦиÑÑовое
ÑпÑавление огÑаниÑениÑми в Windows</a> введено
в ÑÐ³Ð¾Ð´Ñ Ð´Ð¸Ñкам <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> (Ð ÑÑаÑÑе
@@ -386,7 +386,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/17 06:30:30 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- proprietary/proprietary-insecurity.fr.html 5 Jan 2019 16:29:31 -0000
1.81
+++ proprietary/proprietary-insecurity.fr.html 4 Feb 2019 07:31:22 -0000
1.82
@@ -149,7 +149,7 @@
href="/philosophy/words-to-avoid.html#Monetize">monétiser</a> ».</p>
</li>
- <li id="M201706201">
+ <li id="M201706200.1">
<p>De nombreux modèles de caméras connectées <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">ont
des portes dérobées</a>.</p>
@@ -264,7 +264,7 @@
programme n'est pas libre, nous ne pouvons pas le vérifier en l'étudiant.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>Les jouets « intelligents » <cite>Mon amie Cayla</cite> et
<cite>i-Que</cite> peuvent être <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">contrôlés
@@ -672,7 +672,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/proprietary-insecurity.ru.html 17 Jan 2019 06:30:30 -0000
1.68
+++ proprietary/proprietary-insecurity.ru.html 4 Feb 2019 07:31:22 -0000
1.69
@@ -150,7 +150,7 @@
“монеÑизиÑоваÑÑ”</a>.</p>
</li>
- <li id="M201706201">
+ <li id="M201706200.1">
<p>Ðо многиÑ
моделÑÑ
<a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
подклÑÑеннÑÑ
к ÐнÑеÑнеÑÑ ÐºÐ°Ð¼ÐµÑ ÐµÑÑÑ
лазейки</a>.</p>
@@ -259,7 +259,7 @@
ÑеÑнÑй Ñ
од? Раз пÑогÑамма неÑвободна, Ð¼Ñ Ð½Ðµ
можем пÑовеÑиÑÑ ÑÑо, изÑÑив ее.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>“УмнÑе” игÑÑÑки “Ðой дÑÑг
Ðейла” и i-Que <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">можно
конÑÑолиÑоваÑÑ Ð¿Ð¾ ÑоÑÐ¾Ð²Ð¾Ð¼Ñ ÑелеÑонÑ</a>;
ÑизиÑеÑкий доÑÑÑп Ð´Ð»Ñ ÑÑого не
@@ -657,7 +657,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/17 06:30:30 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.fr.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/proprietary-sabotage.fr.html 3 Feb 2019 17:29:05 -0000
1.68
+++ proprietary/proprietary-sabotage.fr.html 4 Feb 2019 07:31:22 -0000
1.69
@@ -128,7 +128,7 @@
Windows, ni même les anciennes versions de MacOS ne peuvent accéder.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>Le fabricant de Canary, un système domotique de vidéosurveillance, l'a
saboté en <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">inactivant
@@ -420,7 +420,7 @@
l'injustice est la seule raison possible pour imposer un CLUF.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">a
désactivé des fonctionnalités réseau</a> sur des téléviseurs
@@ -587,7 +587,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/02/03 17:29:05 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-sabotage.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-sabotage.ru.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/proprietary-sabotage.ru.html 2 Feb 2019 14:29:26 -0000
1.57
+++ proprietary/proprietary-sabotage.ru.html 4 Feb 2019 07:31:22 -0000
1.58
@@ -129,7 +129,7 @@
GNU/Linux, Windows или даже ÑÑаÑÑми веÑÑиÑми MacOS.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>ÐамеÑа домаÑнего наблÑÐ´ÐµÐ½Ð¸Ñ Canary
ÑабоÑиÑована ее изгоÑовиÑелем, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
вÑклÑÑаÑÑим многие ÑÑнкÑии, еÑли ÑолÑко
полÑзоваÑÐµÐ»Ñ Ð½Ðµ ÑÑÐ°Ð½ÐµÑ Ð¿Ð»Ð°ÑиÑÑ Ð·Ð°
@@ -413,7 +413,7 @@
пÑиÑиной навÑзÑÐ²Ð°Ð½Ð¸Ñ Ð»Ð¸Ñензии.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
оÑклÑÑала ÑеÑевÑе ÑÑнкÑии</a> в <em>кÑпленнÑÑ
до ÑÑого</em>
@@ -581,7 +581,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/02/02 14:29:26 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-subscriptions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.fr.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/proprietary-subscriptions.fr.html 5 Jan 2019 16:29:31
-0000 1.20
+++ proprietary/proprietary-subscriptions.fr.html 4 Feb 2019 07:31:22
-0000 1.21
@@ -54,7 +54,7 @@
abonnement obligatoire</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>Le fabricant de Canary, un système domotique de vidéosurveillance, l'a
saboté en <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">inactivant
@@ -167,7 +167,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-subscriptions.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-subscriptions.ru.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/proprietary-subscriptions.ru.html 17 Jan 2019 06:30:31
-0000 1.17
+++ proprietary/proprietary-subscriptions.ru.html 4 Feb 2019 07:31:22
-0000 1.18
@@ -53,7 +53,7 @@
подпиÑки</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>ÐамеÑа домаÑнего наблÑÐ´ÐµÐ½Ð¸Ñ Canary
ÑабоÑиÑована ее изгоÑовиÑелем, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
вÑклÑÑаÑÑим многие ÑÑнкÑии, еÑли ÑолÑко
полÑзоваÑÐµÐ»Ñ Ð½Ðµ ÑÑÐ°Ð½ÐµÑ Ð¿Ð»Ð°ÑиÑÑ Ð·Ð°
@@ -167,7 +167,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.fr.html,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary/proprietary-surveillance.fr.html 3 Feb 2019 19:59:05
-0000 1.158
+++ proprietary/proprietary-surveillance.fr.html 4 Feb 2019 07:31:22
-0000 1.159
@@ -234,7 +234,7 @@
distribue à une autre société.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>Afin d'élargir la base installée de Windows 10, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">manifeste
@@ -410,7 +410,7 @@
dernier MacOS</a> envoient des rapports aux serveurs d'Apple.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">Le
moteur de recherche de fichiers <cite>Spotlight</cite></a> envoie à Apple
@@ -1212,7 +1212,7 @@
aussi mal que ce que font les autres.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>Le clavier Simeji est une version pour smartphone de l'<a
href="/proprietary/proprietary-surveillance.html#baidu-ime">éditeur espion
de méthodes de saisie</a> de Baidu.</p>
@@ -2174,7 +2174,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/02/03 19:59:05 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/proprietary-surveillance.ru.html 3 Feb 2019 12:59:20
-0000 1.165
+++ proprietary/proprietary-surveillance.ru.html 4 Feb 2019 07:31:22
-0000 1.166
@@ -236,7 +236,7 @@
вÑÐµÐ¼Ñ Microsoft пеÑÐµÐ´Ð°ÐµÑ Ð¸Ñ
дÑÑгой компании.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>Ð ÑелÑÑ
наÑаÑÐ¸Ð²Ð°Ð½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑÑкой
Ð±Ð°Ð·Ñ Windows 10 Microsoft <a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
допÑÑÐºÐ°ÐµÑ Ð²Ð¾Ð¿Ð¸ÑÑие наÑÑÑÐµÐ½Ð¸Ñ Ð²ÑбоÑа
полÑзоваÑелей и иÑ
пÑиваÑноÑÑи</a>.</p>
@@ -410,7 +410,7 @@
поÑледнÑÑ Ð²ÐµÑÑÐ¸Ñ MacOS вÑÑÑÐ»Ð°ÐµÑ Ð¾ÑÑеÑÑ
ÑеÑвеÑам Apple</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">СÑедÑÑво
поиÑка Spotlight</a> вÑÑÑÐ»Ð°ÐµÑ Ð·Ð°Ð¿ÑоÑÑ
полÑзоваÑÐµÐ»Ñ Ð² Apple.</p>
@@ -1205,7 +1205,7 @@
Ñо, ÑÑо делаÑÑ Ð´ÑÑгие.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>ÐлавиаÑÑÑа Simeji — ÑмаÑÑÑоннаÑ
веÑÑÐ¸Ñ <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">ÑпионÑÑего
меÑода ввода</a> Baidu.</p>
@@ -2152,7 +2152,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/02/03 12:59:20 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tethers.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.fr.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/proprietary-tethers.fr.html 5 Jan 2019 16:29:31 -0000
1.31
+++ proprietary/proprietary-tethers.fr.html 4 Feb 2019 07:31:22 -0000
1.32
@@ -98,7 +98,7 @@
abonnement obligatoire</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>Le fabricant de Canary, un système domotique de vidéosurveillance, l'a
saboté en <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">inactivant
@@ -247,7 +247,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-tethers.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-tethers.ru.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/proprietary-tethers.ru.html 17 Jan 2019 06:30:31 -0000
1.23
+++ proprietary/proprietary-tethers.ru.html 4 Feb 2019 07:31:22 -0000
1.24
@@ -98,7 +98,7 @@
подпиÑки</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>ÐамеÑа домаÑнего наблÑÐ´ÐµÐ½Ð¸Ñ Canary
ÑабоÑиÑована ее изгоÑовиÑелем, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
вÑклÑÑаÑÑим многие ÑÑнкÑии, еÑли ÑолÑко
полÑзоваÑÐµÐ»Ñ Ð½Ðµ ÑÑÐ°Ð½ÐµÑ Ð¿Ð»Ð°ÑиÑÑ Ð·Ð°
@@ -246,7 +246,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/malware-amazon.de-diff.html 14 Jan 2019 07:59:32 -0000
1.17
+++ proprietary/po/malware-amazon.de-diff.html 4 Feb 2019 07:31:22 -0000
1.18
@@ -116,7 +116,7 @@
rooted would cease to function at all.</p>
</li>
- <li id="M201210221"></em></ins></span>
+ <li id="M201210220.1"></em></ins></span>
<p>The Amazon Kindle-Swindle has a back door that has been used to
<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was <span
class="removed"><del><strong>1984,</strong></del></span>
@@ -152,7 +152,7 @@
<span class="inserted"><ins><em><h4
id="surveillance">Surveillance</h4>
<ul class="blurbs">
- <li id="M201212031">
+ <li id="M201212030.1">
<p>The</em></ins></span> Electronic Frontier Foundation has examined
and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
kinds of surveillance in the Swindle and other <span
class="removed"><del><strong>e-readers</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>e-readers</a>.</p>
@@ -167,7 +167,7 @@
<span class="inserted"><ins><em><h4 id="drm">DRM</h4>
<ul class="blurbs">
- <li id="M201704131">
+ <li id="M201704130.1">
<p><a</em></ins></span>
href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
fails to treat DRM as an ethical question; it takes for granted that
@@ -301,7 +301,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-amazon.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-amazon.es-en.html 18 Jan 2019 13:01:09 -0000
1.16
+++ proprietary/po/malware-amazon.es-en.html 4 Feb 2019 07:31:22 -0000
1.17
@@ -62,7 +62,7 @@
rooted would cease to function at all.</p>
</li>
- <li id="M201210221">
+ <li id="M201210220.1">
<p>The Amazon Kindle-Swindle has a back door that has been used to <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
@@ -87,7 +87,7 @@
<h4 id="surveillance">Surveillance</h4>
<ul class="blurbs">
- <li id="M201212031">
+ <li id="M201212030.1">
<p>The Electronic Frontier Foundation has examined and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
kinds of surveillance in the Swindle and other e-readers</a>.</p>
@@ -98,7 +98,7 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
- <li id="M201704131">
+ <li id="M201704130.1">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
fails to treat DRM as an ethical question; it takes for granted that
@@ -224,7 +224,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/18 13:01:09 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-amazon.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/malware-amazon.fr-en.html 14 Jan 2019 07:59:32 -0000
1.18
+++ proprietary/po/malware-amazon.fr-en.html 4 Feb 2019 07:31:22 -0000
1.19
@@ -62,7 +62,7 @@
rooted would cease to function at all.</p>
</li>
- <li id="M201210221">
+ <li id="M201210220.1">
<p>The Amazon Kindle-Swindle has a back door that has been used to <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
@@ -87,7 +87,7 @@
<h4 id="surveillance">Surveillance</h4>
<ul class="blurbs">
- <li id="M201212031">
+ <li id="M201212030.1">
<p>The Electronic Frontier Foundation has examined and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
kinds of surveillance in the Swindle and other e-readers</a>.</p>
@@ -98,7 +98,7 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
- <li id="M201704131">
+ <li id="M201704130.1">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
fails to treat DRM as an ethical question; it takes for granted that
@@ -224,7 +224,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/malware-amazon.it-diff.html 14 Jan 2019 07:59:32 -0000
1.30
+++ proprietary/po/malware-amazon.it-diff.html 4 Feb 2019 07:31:22 -0000
1.31
@@ -116,7 +116,7 @@
rooted would cease to function at all.</p>
</li>
- <li id="M201210221"></em></ins></span>
+ <li id="M201210220.1"></em></ins></span>
<p>The Amazon Kindle-Swindle has a back door that has been used to
<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was <span
class="removed"><del><strong>1984,</strong></del></span>
@@ -152,7 +152,7 @@
<span class="inserted"><ins><em><h4
id="surveillance">Surveillance</h4>
<ul class="blurbs">
- <li id="M201212031">
+ <li id="M201212030.1">
<p>The</em></ins></span> Electronic Frontier Foundation has examined
and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
kinds of surveillance in the Swindle and other <span
class="removed"><del><strong>e-readers</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>e-readers</a>.</p>
@@ -167,7 +167,7 @@
<span class="inserted"><ins><em><h4 id="drm">DRM</h4>
<ul class="blurbs">
- <li id="M201704131">
+ <li id="M201704130.1">
<p><a</em></ins></span>
href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
fails to treat DRM as an ethical question; it takes for granted that
@@ -301,7 +301,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary/po/malware-amazon.ja-diff.html 14 Jan 2019 07:59:32 -0000
1.28
+++ proprietary/po/malware-amazon.ja-diff.html 4 Feb 2019 07:31:22 -0000
1.29
@@ -111,7 +111,7 @@
rooted would cease to function at all.</p>
</li>
- <li id="M201210221"></em></ins></span>
+ <li id="M201210220.1"></em></ins></span>
<p>The Amazon Kindle-Swindle has a back door that has been used to
<a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was <span
class="removed"><del><strong>1984,</strong></del></span>
@@ -147,7 +147,7 @@
<span class="inserted"><ins><em><h4
id="surveillance">Surveillance</h4>
<ul class="blurbs">
- <li id="M201212031">
+ <li id="M201212030.1">
<p>The</em></ins></span> Electronic Frontier Foundation has examined
and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
kinds of surveillance in the Swindle and other <span
class="removed"><del><strong>e-readers</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>e-readers</a>.</p>
@@ -162,7 +162,7 @@
<span class="inserted"><ins><em><h4 id="drm">DRM</h4>
<ul class="blurbs">
- <li id="M201704131">
+ <li id="M201704130.1">
<p><a</em></ins></span>
href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
fails to treat DRM as an ethical question; it takes for granted that
@@ -290,7 +290,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-amazon.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru-en.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/malware-amazon.ru-en.html 14 Jan 2019 07:59:32 -0000
1.19
+++ proprietary/po/malware-amazon.ru-en.html 4 Feb 2019 07:31:22 -0000
1.20
@@ -62,7 +62,7 @@
rooted would cease to function at all.</p>
</li>
- <li id="M201210221">
+ <li id="M201210220.1">
<p>The Amazon Kindle-Swindle has a back door that has been used to <a
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
@@ -87,7 +87,7 @@
<h4 id="surveillance">Surveillance</h4>
<ul class="blurbs">
- <li id="M201212031">
+ <li id="M201212030.1">
<p>The Electronic Frontier Foundation has examined and found <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">various
kinds of surveillance in the Swindle and other e-readers</a>.</p>
@@ -98,7 +98,7 @@
<h4 id="drm">DRM</h4>
<ul class="blurbs">
- <li id="M201704131">
+ <li id="M201704130.1">
<p><a href="http://techin.oureverydaylife.com/kindle-drm-17841.html">
The Amazon Kindle has DRM</a>. That article is flawed in that it
fails to treat DRM as an ethical question; it takes for granted that
@@ -224,7 +224,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/14 07:59:32 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/malware-apple.de-diff.html 6 Jan 2019 09:59:17 -0000
1.29
+++ proprietary/po/malware-apple.de-diff.html 4 Feb 2019 07:31:22 -0000
1.30
@@ -172,7 +172,7 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>DRM makes</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
app</strong></del></span> <span class="inserted"><ins><em>iPhone 7
nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
a malicious web site</strong></del></span>
@@ -999,7 +999,7 @@
<span class="removed"><del><strong><li>
<p>Apple used this censorship power in 2014</strong></del></span>
- <span class="inserted"><ins><em><li id="M201401101">
+ <span class="inserted"><ins><em><li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="inserted"><ins><em>Apple.</p>
@@ -1148,7 +1148,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/malware-apple.es-en.html 18 Jan 2019 13:01:09 -0000
1.59
+++ proprietary/po/malware-apple.es-en.html 4 Feb 2019 07:31:22 -0000
1.60
@@ -126,7 +126,7 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
</li>
@@ -623,7 +623,7 @@
Technical presentation</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
@@ -743,7 +743,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/18 13:01:09 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/po/malware-apple.fr-en.html 6 Jan 2019 09:59:17 -0000
1.67
+++ proprietary/po/malware-apple.fr-en.html 4 Feb 2019 07:31:22 -0000
1.68
@@ -126,7 +126,7 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
</li>
@@ -623,7 +623,7 @@
Technical presentation</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
@@ -743,7 +743,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-apple.it-diff.html 6 Jan 2019 09:59:17 -0000
1.36
+++ proprietary/po/malware-apple.it-diff.html 4 Feb 2019 07:31:22 -0000
1.37
@@ -180,7 +180,7 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but
Apple.</p>
</li>
@@ -862,7 +862,7 @@
Technical presentation</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="removed"><del><strong>jail</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
@@ -1014,7 +1014,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/malware-apple.ja-diff.html 6 Jan 2019 09:59:17 -0000
1.48
+++ proprietary/po/malware-apple.ja-diff.html 4 Feb 2019 07:31:22 -0000
1.49
@@ -204,7 +204,7 @@
to</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>DRM makes the iPhone 7 nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
malacious code from any application which</strong></del></span>
<span
class="inserted"><ins><em>href="#iphone7-sabotage">unrepairable</a> by
anyone else but Apple.</p>
@@ -826,7 +826,7 @@
Technical presentation</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="removed"><del><strong>jail</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
@@ -978,7 +978,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/malware-apple.nl-diff.html 6 Jan 2019 09:59:17 -0000
1.54
+++ proprietary/po/malware-apple.nl-diff.html 4 Feb 2019 07:31:22 -0000
1.55
@@ -204,7 +204,7 @@
to</strong></del></span> <span class="inserted"><ins><em>id="drm">Apple
DRM</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>DRM makes the iPhone 7 nearly</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
malacious code from any application which</strong></del></span>
<span
class="inserted"><ins><em>href="#iphone7-sabotage">unrepairable</a> by
anyone else but Apple.</p>
@@ -826,7 +826,7 @@
Technical presentation</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="removed"><del><strong>jail</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
@@ -978,7 +978,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-apple.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru-en.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/po/malware-apple.ru-en.html 6 Jan 2019 09:59:17 -0000
1.67
+++ proprietary/po/malware-apple.ru-en.html 4 Feb 2019 07:31:22 -0000
1.68
@@ -126,7 +126,7 @@
<h3 id="drm">Apple DRM</h3>
<ul class="blurbs">
- <li id="M201704071">
+ <li id="M201704070.1">
<p>DRM makes the iPhone 7 nearly <a
href="#iphone7-sabotage">unrepairable</a> by anyone else but Apple.</p>
</li>
@@ -623,7 +623,7 @@
Technical presentation</a>.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
@@ -743,7 +743,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/06 09:59:17 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/malware-appliances.de-diff.html 13 Jan 2019 09:29:35
-0000 1.30
+++ proprietary/po/malware-appliances.de-diff.html 4 Feb 2019 07:31:22
-0000 1.31
@@ -598,7 +598,7 @@
power.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>The “smart” toys My Friend Cayla and i-Que can be
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access is not
@@ -938,7 +938,7 @@
data about the user</a>.</p>
</li>
- <li id="M201405201"></em></ins></span>
+ <li id="M201405200.1"></em></ins></span>
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously
purchased</em>
@@ -1228,7 +1228,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/13 09:29:35 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/malware-appliances.fr-en.html 13 Jan 2019 09:59:04
-0000 1.53
+++ proprietary/po/malware-appliances.fr-en.html 4 Feb 2019 07:31:22
-0000 1.54
@@ -366,7 +366,7 @@
power.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>The “smart” toys My Friend Cayla and i-Que can be <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access is not
@@ -630,7 +630,7 @@
data about the user</a>.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously purchased</em>
@@ -826,7 +826,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/13 09:59:04 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/malware-appliances.ru-en.html 13 Jan 2019 11:30:09
-0000 1.54
+++ proprietary/po/malware-appliances.ru-en.html 4 Feb 2019 07:31:22
-0000 1.55
@@ -366,7 +366,7 @@
power.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>The “smart” toys My Friend Cayla and i-Que can be <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access is not
@@ -630,7 +630,7 @@
data about the user</a>.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously purchased</em>
@@ -826,7 +826,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/13 11:30:09 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/malware-cars.de-diff.html 5 Jan 2019 11:31:33 -0000
1.24
+++ proprietary/po/malware-cars.de-diff.html 4 Feb 2019 07:31:22 -0000
1.25
@@ -107,7 +107,7 @@
remotely activate the airbags</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>Tesla used software to limit the</em></ins></span> part of the
battery <span class="removed"><del><strong>of</strong></del></span>
<span class="inserted"><ins><em>that was available to customers
in</em></ins></span> some <span
class="removed"><del><strong>cars</a>.</p></strong></del></span>
<span class="inserted"><ins><em>cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -372,7 +372,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-cars.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr-en.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/malware-cars.fr-en.html 5 Jan 2019 11:31:33 -0000
1.15
+++ proprietary/po/malware-cars.fr-en.html 4 Feb 2019 07:31:22 -0000
1.16
@@ -88,7 +88,7 @@
remotely activate the airbags</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>Tesla used software to limit the part of the battery
that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -291,7 +291,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-cars.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-cars.ru-en.html 5 Jan 2019 11:31:33 -0000
1.16
+++ proprietary/po/malware-cars.ru-en.html 4 Feb 2019 07:31:22 -0000
1.17
@@ -88,7 +88,7 @@
remotely activate the airbags</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>Tesla used software to limit the part of the battery
that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -291,7 +291,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary/po/malware-microsoft.de-diff.html 3 Feb 2019 15:59:41
-0000 1.34
+++ proprietary/po/malware-microsoft.de-diff.html 4 Feb 2019 07:31:22
-0000 1.35
@@ -92,7 +92,7 @@
<li><p>Microsoft</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft</em></ins></span>
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -138,7 +138,7 @@
say respected security experts.</p>
</li>
- <li id="M201112081">
+ <li id="M201112080.1">
<p>Windows 8</em></ins></span> also has a back door for <span
class="inserted"><ins><em><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
remotely deleting apps</a>.</p>
@@ -164,7 +164,7 @@
Microsoft was forcing them to replace Windows 7 and 8 with all-spying
Windows 10</a>.</p>
- <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>id="M200708131">
+ <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>id="M200708130.1">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM</em></ins></span>
in <span class="removed"><del><strong>fact <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
@@ -583,7 +583,7 @@
<li>It</strong></del></span> <span
class="inserted"><ins><em>company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
@@ -870,7 +870,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr-en.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/malware-microsoft.fr-en.html 3 Feb 2019 17:29:06 -0000
1.69
+++ proprietary/po/malware-microsoft.fr-en.html 4 Feb 2019 07:31:22 -0000
1.70
@@ -69,7 +69,7 @@
<h3 id="back-doors">Microsoft Back Doors</h3>
<ul class="blurbs">
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -110,7 +110,7 @@
say respected security experts.</p>
</li>
- <li id="M201112081">
+ <li id="M201112080.1">
<p>Windows 8 also has a back door for <a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
@@ -127,7 +127,7 @@
<h3 id="drm">Microsoft DRM</h3>
<ul class="blurbs">
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
@@ -400,7 +400,7 @@
now distributes them to another company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
@@ -616,7 +616,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 17:29:06 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary/po/malware-microsoft.it-diff.html 3 Feb 2019 15:59:41
-0000 1.33
+++ proprietary/po/malware-microsoft.it-diff.html 4 Feb 2019 07:31:22
-0000 1.34
@@ -91,7 +91,7 @@
<li><p>Microsoft</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft</em></ins></span>
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -137,7 +137,7 @@
say respected security experts.</p>
</li>
- <li id="M201112081">
+ <li id="M201112080.1">
<p>Windows 8</em></ins></span> also has a back door for <span
class="inserted"><ins><em><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
remotely deleting apps</a>.</p>
@@ -163,7 +163,7 @@
Microsoft was forcing them to replace Windows 7 and 8 with all-spying
Windows 10</a>.</p>
- <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>id="M200708131">
+ <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>id="M200708130.1">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM</em></ins></span>
in <span class="removed"><del><strong>fact <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
@@ -573,7 +573,7 @@
<li>It</strong></del></span> <span
class="inserted"><ins><em>company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
@@ -860,7 +860,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/malware-microsoft.ja-diff.html 3 Feb 2019 15:59:41
-0000 1.43
+++ proprietary/po/malware-microsoft.ja-diff.html 4 Feb 2019 07:31:22
-0000 1.44
@@ -99,7 +99,7 @@
<li><p>Microsoft</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft</em></ins></span>
Windows has a universal back door through which <a <span
class="removed"><del><strong>href="http://www.informationweek.com/news/showArticle.jhtml?articleID=201806263"></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183"></em></ins></span>
@@ -145,7 +145,7 @@
say respected security experts.</p>
</li>
- <li id="M201112081">
+ <li id="M201112080.1">
<p>Windows 8</em></ins></span> also has a back door for <span
class="inserted"><ins><em><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
remotely deleting apps</a>.</p>
@@ -173,7 +173,7 @@
<h3 id="drm">Microsoft DRM</h3>
<ul class="blurbs">
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM</em></ins></span>
in <span class="removed"><del><strong>fact <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
@@ -551,7 +551,7 @@
<li>It</strong></del></span> <span
class="inserted"><ins><em>company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
@@ -834,7 +834,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru-en.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/malware-microsoft.ru-en.html 3 Feb 2019 16:30:30 -0000
1.68
+++ proprietary/po/malware-microsoft.ru-en.html 4 Feb 2019 07:31:22 -0000
1.69
@@ -69,7 +69,7 @@
<h3 id="back-doors">Microsoft Back Doors</h3>
<ul class="blurbs">
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -110,7 +110,7 @@
say respected security experts.</p>
</li>
- <li id="M201112081">
+ <li id="M201112080.1">
<p>Windows 8 also has a back door for <a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
@@ -127,7 +127,7 @@
<h3 id="drm">Microsoft DRM</h3>
<ul class="blurbs">
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
@@ -400,7 +400,7 @@
now distributes them to another company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
@@ -616,7 +616,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 16:30:30 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-mobiles.de-diff.html 3 Feb 2019 15:59:41 -0000
1.36
+++ proprietary/po/malware-mobiles.de-diff.html 4 Feb 2019 07:31:22 -0000
1.37
@@ -90,7 +90,7 @@
</li>
<span class="removed"><del><strong><li><p
id="universal-back-door">Almost</strong></del></span>
- <span class="inserted"><ins><em><li id="M201311121">
+ <span class="inserted"><ins><em><li id="M201311120.1">
<p id="universal-back-door">
Almost</em></ins></span> every phone's communication processor has
a universal back door which is <a
@@ -997,7 +997,7 @@
Samsung's back door</a> provides access to</em></ins></span> any
<span class="inserted"><ins><em>file on the system.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -1205,7 +1205,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr-en.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary/po/malware-mobiles.fr-en.html 3 Feb 2019 17:29:06 -0000
1.52
+++ proprietary/po/malware-mobiles.fr-en.html 4 Feb 2019 07:31:23 -0000
1.53
@@ -74,7 +74,7 @@
these location data for months or years.</p>
</li>
- <li id="M201311121">
+ <li id="M201311120.1">
<p id="universal-back-door">
Almost every phone's communication processor has
a universal back door which is <a
@@ -786,7 +786,7 @@
Samsung's back door</a> provides access to any file on the system.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -914,7 +914,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 17:29:06 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/malware-mobiles.it-diff.html 3 Feb 2019 15:59:41 -0000
1.41
+++ proprietary/po/malware-mobiles.it-diff.html 4 Feb 2019 07:31:23 -0000
1.42
@@ -143,7 +143,7 @@
these location data for months or years.</p>
</li>
- <li id="M201311121">
+ <li id="M201311120.1">
<p id="universal-back-door">
Almost every phone's communication processor has</em></ins></span>
a universal back <span class="removed"><del><strong>door. </p>
@@ -1094,7 +1094,7 @@
<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201401151"></em></ins></span>
+ <span class="inserted"><ins><em><li
id="M201401150.1"></em></ins></span>
<p>The <span class="removed"><del><strong>iPhone 7 contains DRM
specifically designed</strong></del></span> <span
class="inserted"><ins><em>Simeji keyboard is a smartphone version of Baidu's
<a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -1241,7 +1241,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/malware-mobiles.ja-diff.html 3 Feb 2019 15:59:41 -0000
1.55
+++ proprietary/po/malware-mobiles.ja-diff.html 4 Feb 2019 07:31:23 -0000
1.56
@@ -123,7 +123,7 @@
<span class="removed"><del><strong><li><p>Most mobile phones
have</strong></del></span>
- <span class="inserted"><ins><em><li id="M201311121">
+ <span class="inserted"><ins><em><li id="M201311120.1">
<p id="universal-back-door">
Almost every phone's communication processor has</em></ins></span>
a universal back <span
class="removed"><del><strong>door,</strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span> which <span
class="removed"><del><strong>has been</strong></del></span> <span
class="inserted"><ins><em>is <a
@@ -904,7 +904,7 @@
Samsung's back door</a> provides access to any file on the
system.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -1081,7 +1081,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 15:59:41 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/malware-mobiles.ru-en.html 3 Feb 2019 16:30:30 -0000
1.55
+++ proprietary/po/malware-mobiles.ru-en.html 4 Feb 2019 07:31:23 -0000
1.56
@@ -74,7 +74,7 @@
these location data for months or years.</p>
</li>
- <li id="M201311121">
+ <li id="M201311120.1">
<p id="universal-back-door">
Almost every phone's communication processor has
a universal back door which is <a
@@ -786,7 +786,7 @@
Samsung's back door</a> provides access to any file on the system.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -914,7 +914,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 16:30:30 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-webpages.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/malware-webpages.de-diff.html 5 Jan 2019 11:31:33
-0000 1.25
+++ proprietary/po/malware-webpages.de-diff.html 4 Feb 2019 07:31:23
-0000 1.26
@@ -151,7 +151,7 @@
proprietary software contributes.</p>
</li>
- <li id="M201611161"></em></ins></span>
+ <li id="M201611160.1"></em></ins></span>
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -289,7 +289,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-webpages.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.fr-en.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/malware-webpages.fr-en.html 5 Jan 2019 16:29:31 -0000
1.16
+++ proprietary/po/malware-webpages.fr-en.html 4 Feb 2019 07:31:23 -0000
1.17
@@ -128,7 +128,7 @@
proprietary software contributes.</p>
</li>
- <li id="M201611161">
+ <li id="M201611160.1">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -261,7 +261,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 16:29:31 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-webpages.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-webpages.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/malware-webpages.ru-en.html 5 Jan 2019 11:31:33 -0000
1.17
+++ proprietary/po/malware-webpages.ru-en.html 4 Feb 2019 07:31:23 -0000
1.18
@@ -128,7 +128,7 @@
proprietary software contributes.</p>
</li>
- <li id="M201611161">
+ <li id="M201611160.1">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -261,7 +261,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:33 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary/po/proprietary-back-doors.de-diff.html 19 Jan 2019 09:30:12
-0000 1.20
+++ proprietary/po/proprietary-back-doors.de-diff.html 4 Feb 2019 07:31:23
-0000 1.21
@@ -74,7 +74,7 @@
<li></strong></del></span> <span
class="inserted"><ins><em>id='spy'>Spying</h3>
<ul class="blurbs">
- <li id="M201706202"></em></ins></span>
+ <li id="M201706200.2"></em></ins></span>
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login
accounts with hard-coded passwords, which can't be changed, and <a
@@ -232,7 +232,7 @@
<span class="removed"><del><strong><li>
<p><a id="samsung"</strong></del></span>
- <span class="inserted"><ins><em><li id="M201403121">
+ <span class="inserted"><ins><em><li id="M201403120.1">
<p id="samsung"><a</em></ins></span>
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come with
@@ -446,7 +446,7 @@
<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201709091"></em></ins></span>
+ <span class="inserted"><ins><em><li
id="M201709090.1"></em></ins></span>
<p>Tesla <span class="removed"><del><strong>cars have
a</strong></del></span> <span class="inserted"><ins><em>used software to limit
the part of the battery
that was available to customers in some cars, and</em></ins></span> <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -462,7 +462,7 @@
<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201702061"></em></ins></span>
+ <span class="inserted"><ins><em><li
id="M201702060.1"></em></ins></span>
<p>Vizio “smart” TVs <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
have a universal back door</a>.</p>
@@ -493,7 +493,7 @@
<span class="removed"><del><strong><li>
<p>Microsoft</strong></del></span>
- <span class="inserted"><ins><em><li id="M201608172">
+ <span class="inserted"><ins><em><li id="M201608171">
<p id="windows-update">Microsoft</em></ins></span>
Windows has a universal back door through which <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"></strong></del></span>
@@ -555,7 +555,7 @@
section 4 of the EULA</a>.</p>
</li>
- <li id="M200700001">
+ <li id="M200700000.1">
<p>In addition to its <a href="#swindle-eraser">book
eraser</a>, the Kindle-Swindle has a <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
@@ -756,7 +756,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/19 09:30:12 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr-en.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/proprietary-back-doors.fr-en.html 19 Jan 2019 10:30:55
-0000 1.57
+++ proprietary/po/proprietary-back-doors.fr-en.html 4 Feb 2019 07:31:23
-0000 1.58
@@ -52,7 +52,7 @@
<h3 id='spy'>Spying</h3>
<ul class="blurbs">
- <li id="M201706202">
+ <li id="M201706200.2">
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login
accounts with hard-coded passwords, which can't be changed, and <a
@@ -168,7 +168,7 @@
can use the same tactics.</p>
</li>
- <li id="M201403121">
+ <li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come with
@@ -339,7 +339,7 @@
a subscription</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>Tesla used software to limit the part of the battery
that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -353,7 +353,7 @@
perhaps to drive its passenger to a torture prison.</p>
</li>
- <li id="M201702061">
+ <li id="M201702060.1">
<p>Vizio “smart” TVs <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
have a universal back door</a>.</p>
@@ -370,7 +370,7 @@
company can use</a>.</p>
</li>
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -422,7 +422,7 @@
section 4 of the EULA</a>.</p>
</li>
- <li id="M200700001">
+ <li id="M200700000.1">
<p>In addition to its <a href="#swindle-eraser">book
eraser</a>, the Kindle-Swindle has a <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
@@ -568,7 +568,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/19 10:30:55 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- proprietary/po/proprietary-back-doors.it-diff.html 19 Jan 2019 09:30:12
-0000 1.46
+++ proprietary/po/proprietary-back-doors.it-diff.html 4 Feb 2019 07:31:23
-0000 1.47
@@ -68,7 +68,7 @@
<h3 id='spy'>Spying</h3>
<ul class="blurbs">
- <li id="M201706202"></em></ins></span>
+ <li id="M201706200.2"></em></ins></span>
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring <span
class="removed"><del><strong>backdoor—they</strong></del></span> <span
class="inserted"><ins><em>back door—they</em></ins></span> have login
accounts with hard-coded passwords, which can't be changed, and <a
@@ -235,7 +235,7 @@
<span class="removed"><del><strong><li>
<p>Dell computers, shipped</strong></del></span>
- <span class="inserted"><ins><em><li id="M201403121">
+ <span class="inserted"><ins><em><li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions
come</em></ins></span> with <span class="removed"><del><strong>Windows,
had</strong></del></span>
@@ -529,7 +529,7 @@
a subscription</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>Tesla used software to limit the part of the battery
that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -543,7 +543,7 @@
perhaps to drive its passenger to a torture prison.</p>
</li>
- <li id="M201702061">
+ <li id="M201702060.1">
<p>Vizio “smart” TVs <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
have a universal back door</a>.</p>
@@ -560,7 +560,7 @@
company can use</a>.</p>
</li>
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -631,7 +631,7 @@
<p>Amazon responded</strong></del></span> <span
class="inserted"><ins><em>EULA</a>.</p>
</li>
- <li id="M200700001">
+ <li id="M200700000.1">
<p>In addition</em></ins></span> to <span
class="removed"><del><strong>criticism by saying it would delete books only
following orders from the state. However, that policy didn't last.
In 2012
@@ -831,7 +831,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/19 09:30:12 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-back-doors.ja-diff.html 19 Jan 2019 09:30:12
-0000 1.43
+++ proprietary/po/proprietary-back-doors.ja-diff.html 4 Feb 2019 07:31:23
-0000 1.44
@@ -78,7 +78,7 @@
<h3 id='spy'>Spying</h3>
<ul class="blurbs">
- <li id="M201706202">
+ <li id="M201706200.2">
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login
accounts with hard-coded passwords, which can't be changed,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed</strong></del></span>
@@ -212,7 +212,7 @@
<span class="removed"><del><strong><li>
<p>Dell computers, shipped</strong></del></span>
- <span class="inserted"><ins><em><li id="M201403121">
+ <span class="inserted"><ins><em><li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions
come</em></ins></span> with <span class="removed"><del><strong>Windows,
had</strong></del></span>
@@ -487,7 +487,7 @@
a subscription</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>Tesla used software to limit</em></ins></span> the <span
class="removed"><del><strong>programs, and you
should have</strong></del></span> <span class="inserted"><ins><em>part
of</em></ins></span> the <span class="removed"><del><strong>right to decide who
(if anyone)</strong></del></span> <span class="inserted"><ins><em>battery
that was available</em></ins></span> to <span
class="removed"><del><strong>trust</strong></del></span> <span
class="inserted"><ins><em>customers in some cars, and <a
@@ -510,7 +510,7 @@
<span class="removed"><del><strong><li>
<p>In Android,</strong></del></span>
- <span class="inserted"><ins><em><li id="M201702061">
+ <span class="inserted"><ins><em><li id="M201702060.1">
<p>Vizio “smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
Google has</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
@@ -528,7 +528,7 @@
company can use</a>.</p>
</li>
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft
Windows has</em></ins></span> a <span class="removed"><del><strong>program
called GTalkService).
@@ -612,7 +612,7 @@
<p>Amazon responded</strong></del></span> <span
class="inserted"><ins><em>EULA</a>.</p>
</li>
- <li id="M200700001">
+ <li id="M200700000.1">
<p>In addition</em></ins></span> to <span
class="removed"><del><strong>criticism by saying it would delete books only
following orders from the state. However, that policy didn't last.
In 2012
@@ -812,7 +812,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/19 09:30:12 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru-en.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/proprietary-back-doors.ru-en.html 19 Jan 2019 10:00:16
-0000 1.60
+++ proprietary/po/proprietary-back-doors.ru-en.html 4 Feb 2019 07:31:23
-0000 1.61
@@ -52,7 +52,7 @@
<h3 id='spy'>Spying</h3>
<ul class="blurbs">
- <li id="M201706202">
+ <li id="M201706200.2">
<p id="InternetCameraBackDoor">Many models of Internet-connected
cameras contain a glaring back door—they have login
accounts with hard-coded passwords, which can't be changed, and <a
@@ -168,7 +168,7 @@
can use the same tactics.</p>
</li>
- <li id="M201403121">
+ <li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
Samsung Galaxy devices running proprietary Android versions come with
@@ -339,7 +339,7 @@
a subscription</a>.</p>
</li>
- <li id="M201709091">
+ <li id="M201709090.1">
<p>Tesla used software to limit the part of the battery
that was available to customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
@@ -353,7 +353,7 @@
perhaps to drive its passenger to a torture prison.</p>
</li>
- <li id="M201702061">
+ <li id="M201702060.1">
<p>Vizio “smart” TVs <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
have a universal back door</a>.</p>
@@ -370,7 +370,7 @@
company can use</a>.</p>
</li>
- <li id="M201608172">
+ <li id="M201608171">
<p id="windows-update">Microsoft
Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
@@ -422,7 +422,7 @@
section 4 of the EULA</a>.</p>
</li>
- <li id="M200700001">
+ <li id="M200700000.1">
<p>In addition to its <a href="#swindle-eraser">book
eraser</a>, the Kindle-Swindle has a <a
href="http://www.amazon.com/gp/help/customer/display.html?nodeId=200774090">
@@ -568,7 +568,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/19 10:00:16 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de-diff.html,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- proprietary/po/proprietary-drm.de-diff.html 5 Jan 2019 11:31:34 -0000
1.19
+++ proprietary/po/proprietary-drm.de-diff.html 4 Feb 2019 07:31:23 -0000
1.20
@@ -272,7 +272,7 @@
movie studios.</p>
</li>
- <li id="M201410081">
+ <li id="M201410080.1">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries, spy on the user <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for
@@ -373,7 +373,7 @@
<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M200708131"></em></ins></span>
+ <span class="inserted"><ins><em><li
id="M200708130.1"></em></ins></span>
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a <span
class="removed"><del><strong>href="#bluray">Bluray</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray">Bluray</a></em></ins></span>
disks.
@@ -483,7 +483,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr-en.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-drm.fr-en.html 5 Jan 2019 16:29:32 -0000
1.31
+++ proprietary/po/proprietary-drm.fr-en.html 4 Feb 2019 07:31:23 -0000
1.32
@@ -191,7 +191,7 @@
movie studios.</p>
</li>
- <li id="M201410081">
+ <li id="M201410080.1">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries, spy on the user <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for
@@ -273,7 +273,7 @@
DRM in Flash Player</a>.</p>
</li>
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
@@ -347,7 +347,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 16:29:32 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-drm.it-diff.html 5 Jan 2019 11:31:34 -0000
1.32
+++ proprietary/po/proprietary-drm.it-diff.html 4 Feb 2019 07:31:23 -0000
1.33
@@ -280,7 +280,7 @@
<span
class="removed"><del><strong><li><p>Adobe</strong></del></span>
- <span class="inserted"><ins><em><li id="M201410081">
+ <span class="inserted"><ins><em><li id="M201410080.1">
<p>Adobe</em></ins></span> made “Digital Editions,”
the e-reader used by most US libraries, spy on the user <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for
@@ -370,7 +370,7 @@
DRM in Flash Player</a>.</p>
</li>
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
@@ -445,7 +445,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-drm.ja-diff.html 5 Jan 2019 11:31:34 -0000
1.32
+++ proprietary/po/proprietary-drm.ja-diff.html 4 Feb 2019 07:31:23 -0000
1.33
@@ -273,7 +273,7 @@
<span
class="removed"><del><strong><li><p>Adobe</strong></del></span>
- <span class="inserted"><ins><em><li id="M201410081">
+ <span class="inserted"><ins><em><li id="M201410080.1">
<p>Adobe</em></ins></span> made “Digital Editions,”
the e-reader used by most US libraries, spy on the user <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for
@@ -363,7 +363,7 @@
DRM in Flash Player</a>.</p>
</li>
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
@@ -438,7 +438,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-drm.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/proprietary-drm.ru-en.html 17 Jan 2019 06:30:31 -0000
1.32
+++ proprietary/po/proprietary-drm.ru-en.html 4 Feb 2019 07:31:23 -0000
1.33
@@ -191,7 +191,7 @@
movie studios.</p>
</li>
- <li id="M201410081">
+ <li id="M201410080.1">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries, spy on the user <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for
@@ -273,7 +273,7 @@
DRM in Flash Player</a>.</p>
</li>
- <li id="M200708131">
+ <li id="M200708130.1">
<p><a href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">DRM
in Windows</a>, introduced to cater to <a
href="/proprietary/proprietary-drm.html#bluray">Bluray</a> disks.
@@ -347,7 +347,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-insecurity.de-diff.html 5 Jan 2019 11:31:34
-0000 1.21
+++ proprietary/po/proprietary-insecurity.de-diff.html 4 Feb 2019 07:31:23
-0000 1.22
@@ -183,7 +183,7 @@
Crackers found a way to break security on a “smart”
TV</a> and use its camera
to watch the people who are watching TV.</p>
</li>
-<li></strong></del></span> <span
class="inserted"><ins><em>id="M201706201"></em></ins></span>
+<li></strong></del></span> <span
class="inserted"><ins><em>id="M201706200.1"></em></ins></span>
<p>Many models of Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
@@ -333,7 +333,7 @@
<li></strong></del></span> <span class="inserted"><ins><em>it.</p>
</li>
- <li id="M201612061"></em></ins></span>
+ <li id="M201612060.1"></em></ins></span>
<p>The “smart” toys My Friend Cayla and i-Que can be
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access is not
@@ -933,7 +933,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary/po/proprietary-insecurity.fr-en.html 5 Jan 2019 16:29:32
-0000 1.70
+++ proprietary/po/proprietary-insecurity.fr-en.html 4 Feb 2019 07:31:23
-0000 1.71
@@ -139,7 +139,7 @@
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
- <li id="M201706201">
+ <li id="M201706200.1">
<p>Many models of Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
@@ -251,7 +251,7 @@
studying it.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>The “smart” toys My Friend Cayla and i-Que can be <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access is not
@@ -631,7 +631,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 16:29:32 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/proprietary-insecurity.it-diff.html 5 Jan 2019 11:31:34
-0000 1.35
+++ proprietary/po/proprietary-insecurity.it-diff.html 4 Feb 2019 07:31:23
-0000 1.36
@@ -192,7 +192,7 @@
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
- <li id="M201706201">
+ <li id="M201706200.1">
<p>Many models</em></ins></span> of <span
class="removed"><del><strong>Windows computers with ransomware</a>.
</p></strong></del></span> <span
class="inserted"><ins><em>Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
@@ -318,7 +318,7 @@
<li></strong></del></span> <span class="inserted"><ins><em>it.</p>
</li>
- <li id="M201612061"></em></ins></span>
+ <li id="M201612060.1"></em></ins></span>
<p>The “smart” toys My Friend Cayla and i-Que can be
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access is not
@@ -923,7 +923,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary/po/proprietary-insecurity.ja-diff.html 5 Jan 2019 11:31:34
-0000 1.53
+++ proprietary/po/proprietary-insecurity.ja-diff.html 4 Feb 2019 07:31:23
-0000 1.54
@@ -189,7 +189,7 @@
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
- <li id="M201706201">
+ <li id="M201706200.1">
<p>Many models of Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
@@ -301,7 +301,7 @@
studying it.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>The “smart” toys My Friend Cayla and i-Que can be
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access is not
@@ -867,7 +867,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:34 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary/po/proprietary-insecurity.ru-en.html 17 Jan 2019 06:30:31
-0000 1.69
+++ proprietary/po/proprietary-insecurity.ru-en.html 4 Feb 2019 07:31:23
-0000 1.70
@@ -139,7 +139,7 @@
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
- <li id="M201706201">
+ <li id="M201706200.1">
<p>Many models of Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
@@ -251,7 +251,7 @@
studying it.</p>
</li>
- <li id="M201612061">
+ <li id="M201612060.1">
<p>The “smart” toys My Friend Cayla and i-Que can be <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">remotely
controlled with a mobile phone</a>; physical access is not
@@ -631,7 +631,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary/po/proprietary-sabotage.de-diff.html 2 Feb 2019 13:31:31
-0000 1.27
+++ proprietary/po/proprietary-sabotage.de-diff.html 4 Feb 2019 07:31:23
-0000 1.28
@@ -154,7 +154,7 @@
accessed from GNU/Linux, Windows</em></ins></span> or <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>even older versions of MacOS.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -566,7 +566,7 @@
only motive for imposing an EULA.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously
purchased</em>
@@ -756,7 +756,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/02 13:31:31 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr-en.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary-sabotage.fr-en.html 3 Feb 2019 17:29:06
-0000 1.59
+++ proprietary/po/proprietary-sabotage.fr-en.html 4 Feb 2019 07:31:23
-0000 1.60
@@ -117,7 +117,7 @@
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -406,7 +406,7 @@
only motive for imposing an EULA.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously purchased</em>
@@ -550,7 +550,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 17:29:06 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-sabotage.it-diff.html 2 Feb 2019 13:31:31
-0000 1.37
+++ proprietary/po/proprietary-sabotage.it-diff.html 4 Feb 2019 07:31:23
-0000 1.38
@@ -132,7 +132,7 @@
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -528,7 +528,7 @@
only motive for imposing an EULA.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously
purchased</em>
@@ -719,7 +719,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/02 13:31:31 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-sabotage.ja-diff.html 2 Feb 2019 13:31:31
-0000 1.40
+++ proprietary/po/proprietary-sabotage.ja-diff.html 4 Feb 2019 07:31:23
-0000 1.41
@@ -133,7 +133,7 @@
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -508,7 +508,7 @@
only motive for imposing an EULA.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously
purchased</em>
@@ -699,7 +699,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/02 13:31:31 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru-en.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary/po/proprietary-sabotage.ru-en.html 2 Feb 2019 14:29:26
-0000 1.58
+++ proprietary/po/proprietary-sabotage.ru-en.html 4 Feb 2019 07:31:23
-0000 1.59
@@ -117,7 +117,7 @@
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -406,7 +406,7 @@
only motive for imposing an EULA.</p>
</li>
- <li id="M201405201">
+ <li id="M201405200.1">
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously purchased</em>
@@ -550,7 +550,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/02 14:29:26 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary/po/proprietary-subscriptions.de-diff.html 5 Jan 2019
11:31:35 -0000 1.15
+++ proprietary/po/proprietary-subscriptions.de-diff.html 4 Feb 2019
07:31:23 -0000 1.16
@@ -61,7 +61,7 @@
a subscription</a>.</p>
</li>
- <li <span class="inserted"><ins><em>id="M201710041">
+ <li <span class="inserted"><ins><em>id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -156,7 +156,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr-en.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-subscriptions.fr-en.html 5 Jan 2019 16:29:32
-0000 1.18
+++ proprietary/po/proprietary-subscriptions.fr-en.html 4 Feb 2019 07:31:23
-0000 1.19
@@ -48,7 +48,7 @@
a subscription</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -143,7 +143,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 16:29:32 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-subscriptions.ja-diff.html 5 Jan 2019
11:31:35 -0000 1.22
+++ proprietary/po/proprietary-subscriptions.ja-diff.html 4 Feb 2019
07:31:23 -0000 1.23
@@ -63,7 +63,7 @@
a subscription</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -159,7 +159,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru-en.html,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- proprietary/po/proprietary-subscriptions.ru-en.html 17 Jan 2019 06:30:31
-0000 1.17
+++ proprietary/po/proprietary-subscriptions.ru-en.html 4 Feb 2019 07:31:23
-0000 1.18
@@ -48,7 +48,7 @@
a subscription</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -143,7 +143,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 06:30:31 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/proprietary-surveillance.de-diff.html 3 Feb 2019
11:31:32 -0000 1.38
+++ proprietary/po/proprietary-surveillance.de-diff.html 4 Feb 2019
07:31:23 -0000 1.39
@@ -281,7 +281,7 @@
<li>In</strong></del></span> <span
class="inserted"><ins><em>company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In</em></ins></span> order to increase Windows 10's install base,
Microsoft <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>privacy</a>.</p></em></ins></span>
@@ -498,7 +498,7 @@
the latest MacOS send reports to Apple</a> servers.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a</em></ins></span>
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
@@ -1675,7 +1675,7 @@
as bad as what the others do.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -3090,7 +3090,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 11:31:32 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr-en.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary/po/proprietary-surveillance.fr-en.html 3 Feb 2019 17:29:06
-0000 1.144
+++ proprietary/po/proprietary-surveillance.fr-en.html 4 Feb 2019 07:31:23
-0000 1.145
@@ -229,7 +229,7 @@
now distributes them to another company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
@@ -398,7 +398,7 @@
the latest MacOS send reports to Apple</a> servers.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
@@ -1167,7 +1167,7 @@
as bad as what the others do.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -2066,7 +2066,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 17:29:06 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary/po/proprietary-surveillance.it-diff.html 3 Feb 2019
11:31:32 -0000 1.105
+++ proprietary/po/proprietary-surveillance.it-diff.html 4 Feb 2019
07:31:23 -0000 1.106
@@ -280,7 +280,7 @@
<li>In</strong></del></span> <span
class="inserted"><ins><em>company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In</em></ins></span> order to increase Windows 10's install base,
Microsoft <a <span
class="inserted"><ins><em>class="not-a-duplicate"</em></ins></span>
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>privacy</a>.</p></em></ins></span>
@@ -493,7 +493,7 @@
the latest MacOS send reports to Apple</a> servers.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms</em></ins></span> to
Apple.</p>
@@ -1684,7 +1684,7 @@
as bad as what the others do.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -2916,7 +2916,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 11:31:32 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/proprietary-surveillance.ja-diff.html 3 Feb 2019
11:31:32 -0000 1.115
+++ proprietary/po/proprietary-surveillance.ja-diff.html 4 Feb 2019
07:31:23 -0000 1.116
@@ -279,7 +279,7 @@
now distributes them to another company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user</em></ins></span> choice and <span
class="removed"><del><strong>privacy</a>.</strong></del></span> <span
class="inserted"><ins><em>privacy</a>.</p></em></ins></span>
@@ -491,7 +491,7 @@
the latest MacOS send reports to Apple</a> servers.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a</em></ins></span>
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
@@ -1588,7 +1588,7 @@
as bad as what the others do.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -2762,7 +2762,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 11:31:32 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary/po/proprietary-surveillance.ru-en.html 3 Feb 2019 12:59:20
-0000 1.148
+++ proprietary/po/proprietary-surveillance.ru-en.html 4 Feb 2019 07:31:23
-0000 1.149
@@ -229,7 +229,7 @@
now distributes them to another company.</p>
</li>
- <li id="M201608171">
+ <li id="M201608170.1">
<p>In order to increase Windows 10's install base, Microsoft <a
class="not-a-duplicate"
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
blatantly disregards user choice and privacy</a>.</p>
@@ -398,7 +398,7 @@
the latest MacOS send reports to Apple</a> servers.</p>
</li>
- <li id="M201401101">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
Spotlight search</a> sends users' search terms to Apple.</p>
@@ -1167,7 +1167,7 @@
as bad as what the others do.</p>
</li>
- <li id="M201401151">
+ <li id="M201401150.1">
<p>The Simeji keyboard is a smartphone version of Baidu's <a
href="/proprietary/proprietary-surveillance.html#baidu-ime">spying <abbr
title="Input Method Editor">IME</abbr></a>.</p>
@@ -2066,7 +2066,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/03 12:59:20 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary/po/proprietary-tethers.de-diff.html 5 Jan 2019 11:31:36
-0000 1.14
+++ proprietary/po/proprietary-tethers.de-diff.html 4 Feb 2019 07:31:23
-0000 1.15
@@ -119,7 +119,7 @@
<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201710041"></em></ins></span>
+ <span class="inserted"><ins><em><li
id="M201710040.1"></em></ins></span>
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -265,7 +265,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:36 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr-en.html,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary/po/proprietary-tethers.fr-en.html 5 Jan 2019 16:29:32
-0000 1.24
+++ proprietary/po/proprietary-tethers.fr-en.html 4 Feb 2019 07:31:23
-0000 1.25
@@ -91,7 +91,7 @@
a subscription</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -220,7 +220,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 16:29:32 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary/po/proprietary-tethers.ja-diff.html 5 Jan 2019 11:31:36
-0000 1.31
+++ proprietary/po/proprietary-tethers.ja-diff.html 4 Feb 2019 07:31:23
-0000 1.32
@@ -105,7 +105,7 @@
a subscription</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -249,7 +249,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:36 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-tethers.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary/po/proprietary-tethers.ru-en.html 17 Jan 2019 06:30:32
-0000 1.23
+++ proprietary/po/proprietary-tethers.ru-en.html 4 Feb 2019 07:31:23
-0000 1.24
@@ -91,7 +91,7 @@
a subscription</a>.</p>
</li>
- <li id="M201710041">
+ <li id="M201710040.1">
<p>The Canary home surveillance
camera has been sabotaged by its manufacturer, <a
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
@@ -220,7 +220,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/17 06:30:32 $
+$Date: 2019/02/04 07:31:23 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www planetfeeds.ru.html po/planetfeeds.ru.po pr...,
GNUN <=