[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-appliances.ru.html prop...
From: |
GNUN |
Subject: |
www/proprietary malware-appliances.ru.html prop... |
Date: |
Mon, 25 Feb 2019 05:31:08 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/02/25 05:31:08
Modified files:
proprietary : malware-appliances.ru.html
proprietary-addictions.es.html
proprietary-surveillance.ru.html
proprietary.es.html
proprietary/po : de.po es.po fr.po it.po ja.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru-en.html
malware-appliances.ru.po nl.po pl.po pot
proprietary-addictions.es-en.html
proprietary-surveillance.de-diff.html
proprietary-surveillance.it-diff.html
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ru-en.html
proprietary.es-en.html pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.ru.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.es.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.es.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru-en.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.es-en.html?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es-en.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.81&r2=1.82
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.35&r2=1.36
Patches:
Index: malware-appliances.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.ru.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- malware-appliances.ru.html 25 Feb 2019 10:00:29 -0000 1.56
+++ malware-appliances.ru.html 25 Feb 2019 10:31:05 -0000 1.57
@@ -57,7 +57,16 @@
<p>УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring
<a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они
-ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð°Ð²Ñегда.</p>
+ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° длиÑелÑное вÑемÑ.</p>
+
+ <p>Ðо многиÑ
ÑлÑÑаÑÑ
видеозапиÑи
показÑваÑÑ Ð²ÑеÑ
, кÑо оказалÑÑ Ð²Ð±Ð»Ð¸Ð·Ð¸ или
+пÑоÑÑо пÑоÑ
Ð¾Ð´Ð¸Ñ Ð¼Ð¸Ð¼Ð¾ двеÑи полÑзоваÑелÑ.</p>
+
+ <p>ÐÑновное внимание ÑÑаÑÑÑ ÑделÑÐµÑ ÑомÑ,
как Ring позволÑл оÑделÑнÑм
+ÑабоÑникам Ñвободно заглÑдÑваÑÑ Ð²
видеозапиÑи. Ðак оказалоÑÑ, в Amazon
+пÑÑалиÑÑ Ð¿ÑедоÑвÑаÑиÑÑ ÑÑи вÑоÑиÑнÑе
злоÑпоÑÑеблениÑ, но пеÑвиÑное
+злоÑпоÑÑебление, ÑоÑÑоÑÑее в Ñом, ÑÑо Amazon
полÑÑÐ°ÐµÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи,—
+Amazon ÑÑиÑаеÑ, ÑÑо в ÑÑом обÑеÑÑво должно
ÑÑÑÑпиÑÑ.</p>
</li>
<li id="M201901070">
@@ -880,7 +889,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/02/25 10:00:29 $
+$Date: 2019/02/25 10:31:05 $
<!-- timestamp end -->
</p>
Index: proprietary-addictions.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.es.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary-addictions.es.html 21 Feb 2019 12:31:57 -0000 1.1
+++ proprietary-addictions.es.html 25 Feb 2019 10:31:05 -0000 1.2
@@ -46,6 +46,26 @@
<div class="column-limit" id="proprietary-addictions"></div>
<ul class="blurbs">
+ <li id="M201902220">
+ <p>Los servicios de juegos de apuestas en lÃnea (y sus programas cliente
no
+libres) están <a
+href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds">diseñados
+para ser adictivos</a>, más o menos como lo juegos de vÃdeo en lÃnea. Lo
+consiguen mediante diversos tipos de dis-funcionalidades, a menudo
+combinadas.</p>
+
+ <p>En muchas de estas dis-funcionaldades intervienen los programas cliente
y
+servidor a la vez. En algunos casos, no hay manera viable de que el programa
+cliente neutralice las artimañas del servidor; por ejemplo, cuando el
+servidor manipula las cantidades ganadas a fin de crear adicción en el
+usuario, la única manera en que el programa cliente podrÃa parar esto serÃa
+hacer como que no se produjo una ganancia, y los usuarios no querrÃan tal
+modificación.</p>
+
+ <p>No obstante, la modificación del programa cliente podrÃa impedir
algunos
+comportamientos adictivos sin que eso supusiera pérdidas para el usuario.</p>
+ </li>
+
<li id="M201612290">
<p>En el juego Fruit Pop, el jugador compra poderes con monedas para
obtener
una puntuación más alta. El jugador consigue monedas al final de cada juego,
@@ -138,7 +158,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/02/21 12:31:57 $
+$Date: 2019/02/25 10:31:05 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- proprietary-surveillance.ru.html 25 Feb 2019 10:00:30 -0000 1.173
+++ proprietary-surveillance.ru.html 25 Feb 2019 10:31:05 -0000 1.174
@@ -1604,8 +1604,10 @@
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они
ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° длиÑелÑное вÑемÑ.</p>
+
<p>Ðо многиÑ
ÑлÑÑаÑÑ
видеозапиÑи
показÑваÑÑ Ð²ÑеÑ
, кÑо оказалÑÑ Ð²Ð±Ð»Ð¸Ð·Ð¸ или
пÑоÑÑо пÑоÑ
Ð¾Ð´Ð¸Ñ Ð¼Ð¸Ð¼Ð¾ двеÑи полÑзоваÑелÑ.</p>
+
<p>ÐÑновное внимание ÑÑаÑÑÑ ÑделÑÐµÑ ÑомÑ,
как Ring позволÑл оÑделÑнÑм
ÑабоÑникам Ñвободно заглÑдÑваÑÑ Ð²
видеозапиÑи. Ðак оказалоÑÑ, в Amazon
пÑÑалиÑÑ Ð¿ÑедоÑвÑаÑиÑÑ ÑÑи вÑоÑиÑнÑе
злоÑпоÑÑеблениÑ, но пеÑвиÑное
@@ -2242,7 +2244,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/02/25 10:00:30 $
+$Date: 2019/02/25 10:31:05 $
<!-- timestamp end -->
</p>
Index: proprietary.es.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.es.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary.es.html 21 Feb 2019 12:31:57 -0000 1.38
+++ proprietary.es.html 25 Feb 2019 10:31:06 -0000 1.39
@@ -156,6 +156,56 @@
<h3 id="latest">Añadidos recientes</h3>
<ul class="blurbs">
+ <li id="M201902220">
+ <p>Los servicios de juegos de apuestas en lÃnea (y sus programas cliente
no
+libres) están <a
+href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds">diseñados
+para ser adictivos</a>, más o menos como lo juegos de vÃdeo en lÃnea. Lo
+consiguen mediante diversos tipos de dis-funcionalidades, a menudo
+combinadas.</p>
+
+ <p>En muchas de estas dis-funcionaldades intervienen los programas cliente
y
+servidor a la vez. En algunos casos, no hay manera viable de que el programa
+cliente neutralice las artimañas del servidor; por ejemplo, cuando el
+servidor manipula las cantidades ganadas a fin de crear adicción en el
+usuario, la única manera en que el programa cliente podrÃa parar esto serÃa
+hacer como que no se produjo una ganancia, y los usuarios no querrÃan tal
+modificación.</p>
+
+ <p>No obstante, la modificación del programa cliente podrÃa impedir
algunos
+comportamientos adictivos sin que eso supusiera pérdidas para el usuario.</p>
+ </li>
+
+ <li id="M201901070">
+ <p>Los televisores Vizio <a
+href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">registran
+«todo lo que se ve en el aparato»</a>, en palabras de la compañÃa CTO, y
+estos se venden a terceros. Esto se hace a cambio de un «mejor servicio»
+(¿más anuncios intrusivos, quizás?) y ligeras rebajas de precios.</p>
+
+ <p>Lo que se supone que hace este espionaje aceptable, según ellos, es
que es
+una opción en los nuevos modelos. Pero dado que el software de Vizio no es
+libre, no sabemos qué sucede exactamente por detrás, y no hay garantÃa de
+que en las actualizaciones futuras no modifiquen la configuración del
+usuario.</p>
+
+ <p>Si ya posee una <cite>smart»</cite> TV Vizio (o cualquier
+<cite>smart»</cite> TV, por cierto), la manera más sencilla de asegurarse de
+que no le están espiando consiste en desconectarla de Internet y utilizar
+una antena terrestre en su lugar. Otra opción, si tiene algunos
+conocimientos técnicos, es utilizar un enrutador propio (que podrÃa ser un
+viejo ordenador que utilizara únicamente software libre) y activar un
+cortafuegos que bloqueara las conexiones a los servidores de Vizio. O, como
+último recurso, sustituir su televisor por otro modelo.</p>
+ </li>
+
+ <li id="M201902200">
+ <p>Algunos dispositivos portátiles de vigilancia («teléfonos») tienen
ahora <a
+href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g">lectores
+de huella dactilar en la pantalla</a>. ¿Supone esto que podrÃan registrar la
+huella dactilar de cualquiera que opere en la pantalla táctil?</p>
+ </li>
+
<li id="M201902041">
<p>Ventinueve aplicaciones de retoque de fotos <cite>(beauty camera
apps)</cite> que solÃan estar en Google Play tenÃan una o más
@@ -180,26 +230,6 @@
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">registrar
todas las acciones del usuario</a> en su interacción con la aplicación.</p>
</li>
-
- <li id="M201902010">
- <p>En una investigación acerca de las 150 aplicaciones gratuitas de VPN
más
-populares incluidas en Google Play, se descubrió que <a
-href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">el 25 % no
-es capaz de proteger la privacidad de sus usuarios</a>debido a la filtración
-de los DNS. Además, el código fuente del 85 % de ellas contiene permisos o
-funciones intrusivas (a menudo utilizadas para enviar publicidad invasiva)
-que podrÃan utilizarse para espiar a los usuarios. Se encontraron también
-otros fallos técnicos.</p>
-
- <p>Más aún, en una investigación anterior se descubrió que <a
-href="https://www.top10vpn.com/free-vpn-app-investigation/">la mitad de las
-diez principales aplicaciones de VPN gratuitas tienen una polÃtica de
-privacidad deplorable</a>.</p>
-
- <p>Es una lástima que estos artÃculos hablen de «free apps». Estas
aplicaciones
-son gratuitas, pero <em>no</em> son <a
-href="/philosophy/free-sw.html">software libre</a>.</p>
- </li>
</ul>
@@ -279,7 +309,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2019/02/21 12:31:57 $
+$Date: 2019/02/25 10:31:06 $
<!-- timestamp end -->
</p>
Index: po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/de.po 24 Feb 2019 14:00:04 -0000 1.35
+++ po/de.po 25 Feb 2019 10:31:06 -0000 1.36
@@ -2125,7 +2125,21 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -11219,27 +11233,6 @@
"\">#SpywareInCameras</a>)</span>"
msgstr " "
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr ""
Index: po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- po/es.po 24 Feb 2019 14:00:04 -0000 1.45
+++ po/es.po 25 Feb 2019 10:31:06 -0000 1.46
@@ -1675,10 +1675,15 @@
msgstr ""
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
msgstr ""
"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www."
"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
@@ -1687,6 +1692,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
@@ -1694,6 +1713,12 @@
"service” (meaning more intrusive ads?) and slightly lower retail "
"prices."
msgstr ""
+"Los televisores Vizio <a href=\"https://www.theverge.com/2019/1/7/18172397/"
+"airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-"
+"ces-2019\">registran «todo lo que se ve en el aparato»</a>, en palabras de "
+"la compañÃa CTO, y estos se venden a terceros. Esto se hace a cambio de un "
+"«mejor servicio» (¿más anuncios intrusivos, quizás?) y ligeras rebajas
de "
+"precios."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1702,6 +1727,11 @@
"don't know what is actually happening behind the scenes, and there is no "
"guarantee that all future updates will leave the settings unchanged."
msgstr ""
+"Lo que se supone que hace este espionaje aceptable, según ellos, es que es "
+"una opción en los nuevos modelos. Pero dado que el software de Vizio no es "
+"libre, no sabemos qué sucede exactamente por detrás, y no hay garantÃa de "
+"que en las actualizaciones futuras no modifiquen la configuración del "
+"usuario."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1713,6 +1743,14 @@
"software), and set up a firewall to block connections to Vizio's servers. "
"Or, as a last resort, you can replace your TV with another model."
msgstr ""
+"Si ya posee una <cite>smart»</cite> TV Vizio (o cualquier <cite>smart»</"
+"cite> TV, por cierto), la manera más sencilla de asegurarse de que no le "
+"están espiando consiste en desconectarla de Internet y utilizar una antena "
+"terrestre en su lugar. Otra opción, si tiene algunos conocimientos
técnicos, "
+"es utilizar un enrutador propio (que podrÃa ser un viejo ordenador que "
+"utilizara únicamente software libre) y activar un cortafuegos que bloqueara "
+"las conexiones a los servidores de Vizio. O, como último recurso, sustituir "
+"su televisor por otro modelo."
#. type: Content of: <ul><li><p>
msgid ""
@@ -6407,6 +6445,11 @@
"sensors in the display</a>. Does that imply they could take the fingerprint "
"of anyone who operates the touch screen?"
msgstr ""
+"Algunos dispositivos portátiles de vigilancia («teléfonos») tienen ahora
<a "
+"href=\"https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-"
+"launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g\">lectores de "
+"huella dactilar en la pantalla</a>. ¿Supone esto que podrÃan registrar la "
+"huella dactilar de cualquiera que opere en la pantalla táctil?"
#. type: Content of: <ul><li><p>
msgid ""
@@ -6487,6 +6530,11 @@
"on-line games. They achieve this with various different malfunctionalities, "
"often in combination."
msgstr ""
+"Los servicios de juegos de apuestas en lÃnea (y sus programas cliente no "
+"libres) están <a href=\"https://www.theguardian.com/society/2019/feb/22/"
+"gambling-apps-more-dangerous-than-fobts-study-finds\">diseñados para ser "
+"adictivos</a>, más o menos como lo juegos de vÃdeo en lÃnea. Lo consiguen "
+"mediante diversos tipos de dis-funcionalidades, a menudo combinadas."
#. type: Content of: <ul><li><p>
msgid ""
@@ -6497,12 +6545,21 @@
"way the client program could block that is to pretend the win did not "
"happen, and users would not want that modification."
msgstr ""
+"En muchas de estas dis-funcionaldades intervienen los programas cliente y "
+"servidor a la vez. En algunos casos, no hay manera viable de que el programa "
+"cliente neutralice las artimañas del servidor; por ejemplo, cuando el "
+"servidor manipula las cantidades ganadas a fin de crear adicción en el "
+"usuario, la única manera en que el programa cliente podrÃa parar esto
serÃa "
+"hacer como que no se produjo una ganancia, y los usuarios no querrÃan tal "
+"modificación."
#. type: Content of: <ul><li><p>
msgid ""
"However, modification of the client program could cover up some addictive "
"behaviors without losing the user anything."
msgstr ""
+"No obstante, la modificación del programa cliente podrÃa impedir algunos "
+"comportamientos adictivos sin que eso supusiera pérdidas para el usuario."
#. type: Content of: <div><p>
#, fuzzy
@@ -8321,36 +8378,6 @@
"\">#SpywareInCameras</a>)</span>"
msgstr ""
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
-#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
-#| "the video they capture to Amazon servers</a> which save it permanently."
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www."
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
-"\">envÃan la señal de vÃdeo que capturan a los servidores de Amazon</a>,
que "
-"la guardan de forma permanente."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr ""
@@ -8634,6 +8661,16 @@
"procesadores Intel incorporarán software tirano</a>."
#~ msgid ""
+#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Los dispositivos de «seguridad» Ring, de Amazon, <a href=\"https://www."
+#~ "engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+#~ "\">envÃan la señal de vÃdeo que capturan a los servidores de
Amazon</a>, "
+#~ "que la guardan de forma permanente."
+
+#~ msgid ""
#~ "Preloading crapware along with a nonfree operating system is common "
#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-"
Index: po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- po/fr.po 24 Feb 2019 14:00:04 -0000 1.62
+++ po/fr.po 25 Feb 2019 10:31:06 -0000 1.63
@@ -1673,11 +1673,20 @@
msgstr ""
"Voici quelques exemples de malveillance dans divers appareils et
équipements."
+# | Amazon Ring “security” devices <a
+# |
href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">
+# | send the video they capture to Amazon servers</a>{+,+} which save it
+# | [-permanently.-] {+long-term.+}
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
msgstr ""
"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
@@ -1686,6 +1695,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
@@ -9113,40 +9136,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInCameras"
"\">#SpywareInCameras</a>)</span>"
-# | Amazon Ring “security” devices <a
-# |
href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">
-# | send the video they capture to Amazon servers</a>{+,+} which save it
-# | [-permanently.-] {+long-term.+}
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
-#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
-#| "the video they capture to Amazon servers</a> which save it permanently."
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
-"leurs enregistrements vidéo aux serveurs d'Amazon</a> qui les sauvegardent "
-"de façon permanente."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr "Jouets"
@@ -9485,3 +9474,13 @@
msgstr ""
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">Les "
"processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid ""
+#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Les dispositifs de « sécurité » de Ring <a
href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+#~ "\">envoient leurs enregistrements vidéo aux serveurs d'Amazon</a> qui les
"
+#~ "sauvegardent de façon permanente."
Index: po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/it.po 24 Feb 2019 14:00:04 -0000 1.35
+++ po/it.po 25 Feb 2019 10:31:06 -0000 1.36
@@ -2069,7 +2069,21 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -10518,27 +10532,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInCameras"
"\">#SpywareInCameras</a>)</span>"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr ""
Index: po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/ja.po 24 Feb 2019 14:00:04 -0000 1.35
+++ po/ja.po 25 Feb 2019 10:31:06 -0000 1.36
@@ -1747,7 +1747,21 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -8966,27 +8980,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInCameras"
"\">#SpywareInCameras</a>)</span>"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr ""
Index: po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- po/malware-appliances.de-diff.html 22 Feb 2019 14:30:58 -0000 1.34
+++ po/malware-appliances.de-diff.html 25 Feb 2019 10:31:07 -0000 1.35
@@ -66,86 +66,94 @@
here, please write</em></ins></span>
to <span class="removed"><del><strong>make</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
of</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>conversation between</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference or</em></ins></span>
two <span
class="removed"><del><strong>users</a>.</p></strong></del></span>
-<span class="inserted"><ins><em>to serve as specific substantiation.</p>
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>conversation between two users</a>.</p>
+ </li>
+
+ <li>
+ <p>Every “home security” camera, if its manufacturer can
communicate with it,
+ is</strong></del></span> <span class="inserted"><ins><em>URL
of</em></ins></span> a <span class="removed"><del><strong>surveillance
device.</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
+to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,
- is a surveillance device.</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a
+ <p>Amazon Ring “security” devices</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in</em></ins></span> the
<span class="removed"><del><strong>fact
- that</strong></del></span> <span class="inserted"><ins><em>own words
of</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>company's
- CTO, and this data</em></ins></span> is <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>sold</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
+ <p>The article describes wrongdoing by the manufacturer, based on
the fact
+ that</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send</em></ins></span> the <span class="removed"><del><strong>device is
tethered</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="removed"><del><strong>a
server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that the device gives the company
+ <p>But</strong></del></span> <span class="inserted"><ins><em>Amazon
servers</a>, which save</em></ins></span> it <span
class="removed"><del><strong>also demonstrates that</strong></del></span>
+ <span class="inserted"><ins><em>long-term.</p>
+
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>video shows everyone that comes near, or merely
+ passes by,</em></ins></span> the <span class="removed"><del><strong>company
surveillance capability.</p>
</li>
<li>
- <p>A “smart” intravenous pump
designed</strong></del></span> <span class="inserted"><ins><em>third parties.
This is in return</em></ins></span> for
- <span class="removed"><del><strong>hospitals</strong></del></span>
- <span class="inserted"><ins><em>“better service” (meaning more
intrusive ads?) and slightly
- lower retail prices.</p>
+ <p>A “smart” intravenous pump designed for
+ hospitals is connected</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
- <p>What</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>supposed</em></ins></span> to <span
class="removed"><del><strong>the internet. Naturally <a
+ <p>The article focuses on how Ring used</em></ins></span> to <span
class="inserted"><ins><em>let individual employees look
+ at</em></ins></span> the <span class="removed"><del><strong>internet.
Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its security has been cracked</a>.</p>
- <p>Note that</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> this <span
class="removed"><del><strong>article misuses the term <a
+ its security</strong></del></span> <span class="inserted"><ins><em>videos
freely. It appears Amazon</em></ins></span> has <span
class="removed"><del><strong>been cracked</a>.</p>
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>tried to
prevent</em></ins></span> that <span class="removed"><del><strong>this article
misuses</strong></del></span>
+ <span class="inserted"><ins><em>secondary abuse, but</em></ins></span> the
<span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p>
-</li>
+ referring</strong></del></span> <span class="inserted"><ins><em>primary
abuse—that Amazon gets the
+ video—Amazon expects society</em></ins></span> to <span
class="removed"><del><strong>crackers.</p></strong></del></span> <span
class="inserted"><ins><em>surrender to.</p></em></ins></span>
+ </li>
-<li>
- <p>The bad security in many Internet of Stings devices
- allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</strong></del></span>
<span class="inserted"><ins><em>spying acceptable, according</em></ins></span>
to <span class="removed"><del><strong>snoop on the people that use
them</a>.</p>
- <p>Don't be a sucker—reject all the stings.</p>
- <p>It</strong></del></span> <span
class="inserted"><ins><em>him,</em></ins></span>
- is <span class="removed"><del><strong>unfortunate</strong></del></span>
that <span class="inserted"><ins><em>it is opt-in in newer models. But
since</em></ins></span> the <span class="removed"><del><strong>article
uses</strong></del></span> <span class="inserted"><ins><em>Vizio software is
- nonfree, we don't know what is actually happening behind</em></ins></span>
the
- <span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
-</li>
+<span class="removed"><del><strong><li>
+ <p>The bad security</strong></del></span>
-<li>
- <p>Many models of Internet-connected cameras are tremendously insecure.
- They have login accounts with hard-coded passwords, which can't be
- changed,</strong></del></span> <span
class="inserted"><ins><em>scenes,</em></ins></span>
- and <span class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</strong></del></span>
<span class="inserted"><ins><em>there</em></ins></span> is no <span
class="inserted"><ins><em>guarantee that all future updates will leave the
- settings unchanged.</p>
+ <span class="inserted"><ins><em><li id="M201901070">
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a></em></ins></span> in
<span class="removed"><del><strong>many Internet</strong></del></span> <span
class="inserted"><ins><em>the own words</em></ins></span> of <span
class="removed"><del><strong>Stings devices
+ allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on</strong></del></span> the <span
class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>company's
+ CTO, and this data is sold to third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
+ lower retail prices.</p>
+
+ <p>What is supposed to make this spying acceptable, according to him,
+ is</em></ins></span> that <span class="removed"><del><strong>use
them</a>.</p>
+ <p>Don't be a sucker—reject all</strong></del></span> <span
class="inserted"><ins><em>it is opt-in in newer models. But
since</em></ins></span> the <span class="removed"><del><strong>stings.</p>
+ <p>It</strong></del></span> <span class="inserted"><ins><em>Vizio
software</em></ins></span> is <span
class="removed"><del><strong>unfortunate</strong></del></span>
+ <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind the scenes,
+ and there is no guarantee</em></ins></span> that <span
class="inserted"><ins><em>all future updates will leave</em></ins></span> the
<span class="removed"><del><strong>article uses</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
<p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest</em></ins></span> way to
- <span class="removed"><del><strong>delete these accounts
either</a>.</p>
+ matter),</em></ins></span> the
+ <span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li>
-<p>The proprietary code that runs pacemakers, insulin
pumps,</strong></del></span> <span class="inserted"><ins><em>make sure it isn't
spying on you is
- to disconnect it from the Internet,</em></ins></span> and <span
class="removed"><del><strong>other
-medical devices</strong></del></span> <span class="inserted"><ins><em>use a
terrestrial antenna
- instead. Unfortunately, this</em></ins></span> is <span
class="inserted"><ins><em>not always possible. Another option,
- if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
+ <p>Many models of Internet-connected cameras</strong></del></span>
<span class="inserted"><ins><em>easiest way to make sure it isn't spying on you
is
+ to disconnect it from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
+ if you</em></ins></span> are <span
class="removed"><del><strong>tremendously insecure.
+ They have login accounts with hard-coded passwords, which
can't</strong></del></span> <span class="inserted"><ins><em>technically
oriented, is to get your own router (which can</em></ins></span>
+ be
+ <span class="removed"><del><strong>changed,</strong></del></span> <span
class="inserted"><ins><em>an old computer running completely free
software),</em></ins></span> and <span class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way</strong></del></span> <span class="inserted"><ins><em>set up a
+ firewall</em></ins></span> to
+ <span class="removed"><del><strong>delete these accounts
either</a>.</p></strong></del></span> <span
class="inserted"><ins><em>block connections to Vizio's servers. Or, as a last
resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
- <li id="M201810300">
+<span class="removed"><del><strong><li>
+<p>The proprietary code that runs pacemakers, insulin pumps, and other
+medical devices is</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810300">
<p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
full</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
@@ -178,100 +186,102 @@
all</em></ins></span> the <span
class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>nasty characteristics</em></ins></span> of <span
class="removed"><del><strong>the audio files</strong></del></span> <span
class="inserted"><ins><em>such devices: <a
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
surveillance, and danger of sabotage</a> (of a specific user, or of
- all</em></ins></span> users <span class="removed"><del><strong>listen to
along with the headphone's unique serial number.
+ all</em></ins></span> users <span class="removed"><del><strong>listen to
along with</strong></del></span> <span class="inserted"><ins><em>at once), as
well as</em></ins></span> the <span class="removed"><del><strong>headphone's
unique serial number.
</p>
-<p>The suit accuses that this was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>at once), as well
as</em></ins></span> the <span class="removed"><del><strong>fine
print</strong></del></span> <span
class="inserted"><ins><em>risk</em></ins></span> of <span
class="inserted"><ins><em>an outage (which is what
+<p>The suit accuses</strong></del></span> <span
class="inserted"><ins><em>risk of an outage (which is what
just happened).</p>
- <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>app said that users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>desired
temperature requires running
- nonfree software. With an old-fashioned thermostat, you can
do</em></ins></span> it <span class="removed"><del><strong>acceptable? No way!
It should be flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal to design</strong></del></span>
- <span class="inserted"><ins><em>using controls right on</em></ins></span>
the <span class="removed"><del><strong>app to snoop at all</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>thermostat.</p></em></ins></span>
+ <p>In addition, setting the desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can do it
+ using controls right on the thermostat.</p>
</li>
- <li <span class="removed"><del><strong>id="anova">
- <p>Anova sabotaged users' cooking devices with a
downgrade</strong></del></span> <span
class="inserted"><ins><em>id="M201809240">
+ <li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so</em></ins></span> that
<span class="inserted"><ins><em>people cannot hear
+ hide voice commands in other audio</a>, so</em></ins></span> that
<span class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>people cannot hear
them, but Alexa and Siri can.</p>
</li>
<li id="M201807050">
- <p>The Jawbone fitness tracker was</em></ins></span> tethered <span
class="removed"><del><strong>them</strong></del></span> to a <span
class="removed"><del><strong>remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account</strong></del></span> <span
class="inserted"><ins><em>proprietary phone
- app. In 2017, the company shut down and made the app stop working. <a
+ <p>The Jawbone fitness tracker</em></ins></span> was <span
class="removed"><del><strong>done without</strong></del></span> <span
class="inserted"><ins><em>tethered to a proprietary phone
+ app. In 2017,</em></ins></span> the <span
class="removed"><del><strong>users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>company shut down and
made</em></ins></span> the <span class="removed"><del><strong>fine
print</strong></del></span> <span class="inserted"><ins><em>app stop working.
<a
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
the existing trackers stopped working forever</a>.</p>
- <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>Anova's servers, their
- cookers won't function.</a></p>
-</li>
-
-<li>
-<p>When Miele's Internet</strong></del></span> <span
class="inserted"><ins><em>a further nasty fillip, that sales</em></ins></span>
of <span class="removed"><del><strong>Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> the <span class="removed"><del><strong>Internet,
-its security</strong></del></span>
- <span class="inserted"><ins><em>broken devices continued. But I think
that</em></ins></span> is <span
class="removed"><del><strong>crap</a>.</p>
-<p>For example,</strong></del></span> a <span
class="removed"><del><strong>cracker can gain access to the dishwasher's
filesystem,
- infect</strong></del></span> <span class="inserted"><ins><em>secondary
issue;</em></ins></span>
- it <span class="removed"><del><strong>with malware, and
force</strong></del></span> <span
class="inserted"><ins><em>made</em></ins></span> the <span
class="removed"><del><strong>dishwasher</strong></del></span> <span
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
- other devices in</strong></del></span> <span class="inserted"><ins><em>some
additional people.
- The fundamental wrong was to design</em></ins></span> the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
- such attacks could potentially put hundreds of lives at
risk.</p></strong></del></span> <span class="inserted"><ins><em>devices
to depend on something
+ <p>The article focuses on a further nasty fillip, that
sales</em></ins></span> of the <span class="removed"><del><strong>app
said</strong></del></span>
+ <span class="inserted"><ins><em>broken devices continued. But I
think</em></ins></span> that <span class="removed"><del><strong>users gave
consent for this,
+would that make</strong></del></span> <span class="inserted"><ins><em>is a
secondary issue;</em></ins></span>
+ it <span class="removed"><del><strong>acceptable? No way! It should be
flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span class="inserted"><ins><em>made the nasty
consequences extend to some additional people.
+ The fundamental wrong was</em></ins></span> to design the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>devices</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>depend on
something
else that didn't respect users' freedom.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
-<p>If you buy a used “smart” car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners can still remotely control
it</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
+ <li <span class="removed"><del><strong>id="anova">
+ <p>Anova sabotaged users' cooking devices with</strong></del></span>
<span class="inserted"><ins><em>id="M201804140">
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers</em></ins></span> a <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush</em></ins></span> that
+ <span class="removed"><del><strong>tethered them to a remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account</strong></del></span> <span
class="inserted"><ins><em>snoops</em></ins></span> on <span
class="removed"><del><strong>Anova's servers, their
+ cookers won't function.</a></p></strong></del></span> <span
class="inserted"><ins><em>its user by
sending usage data back over the
Internet</a>.</p></em></ins></span>
</li>
+
<span class="removed"><del><strong><li>
- <p>Vizio
- “smart”</strong></del></span>
+<p>When Miele's Internet of Stings hospital disinfectant dishwasher
is</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to the Internet,
+its security is crap</a>.</p>
+<p>For example,</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>is viewed on them, and not just broadcasts
- and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
+ load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>cracker can gain access</strong></del></span>
<span class="inserted"><ins><em>surveillance app</a>.</p>
- <p>We link to</em></ins></span> the <span
class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>article for the facts it presents.
It</em></ins></span>
- is <span class="removed"><del><strong>coming from</strong></del></span>
<span class="inserted"><ins><em>too bad that</em></ins></span> the <span
class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>article
finishes by advocating</em></ins></span> the <span
class="removed"><del><strong>TV reports what it is. The
existence</strong></del></span>
- <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>surrendering</em></ins></span> to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>Netflix. The Netflix app <a
+ <p>We link</em></ins></span> to the <span
class="removed"><del><strong>dishwasher's filesystem,
+ infect</strong></del></span> <span class="inserted"><ins><em>article for the
facts</em></ins></span> it <span class="removed"><del><strong>with malware, and
force</strong></del></span> <span class="inserted"><ins><em>presents. It
+ is too bad that</em></ins></span> the <span
class="removed"><del><strong>dishwasher</strong></del></span> <span
class="inserted"><ins><em>article finishes by advocating the
+ moral weakness of surrendering</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
+ other</strong></del></span> <span class="inserted"><ins><em>Netflix. The
Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201802120">
- <p>Apple devices lock users in <a
+ <p>Apple</em></ins></span> devices <span
class="inserted"><ins><em>lock users</em></ins></span> in <span
class="inserted"><ins><em><a
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
solely to Apple services</a> by being designed to be incompatible
with all other options, ethical or unethical.</p>
</li>
<li id="M201712240">
- <p>One of</em></ins></span> the <span
class="removed"><del><strong>surveillance, even</strong></del></span> <span
class="inserted"><ins><em>dangers of the “internet of stings”
- is that,</em></ins></span> if <span class="removed"><del><strong>it were
not hidden as it was in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>you lose your internet service, you also <a
-
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house and appliances</a>.</p>
+ <p>One of</em></ins></span> the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
+ such attacks could potentially put hundreds</strong></del></span> <span
class="inserted"><ins><em>dangers</em></ins></span> of <span
class="removed"><del><strong>lives at risk.</p>
- <p>For your safety, don't use any appliance with a connection
to</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
+</li>
+<li>
+<p>If</strong></del></span> <span class="inserted"><ins><em>the
“internet of stings”
+ is that, if</em></ins></span> you <span class="removed"><del><strong>buy a
used “smart” car, house, TV, refrigerator,
+etc.,
+usually</strong></del></span> <span class="inserted"><ins><em>lose your
internet service, you also</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+previous owners can still remotely</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose</em></ins></span> control <span
class="removed"><del><strong>it</a>.</p>
+</li>
+<li>
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything that is viewed on them, and not just broadcasts
+ and cable</a>. Even if the image is coming from the user's own
+ computer, the TV reports what it is. The existence</strong></del></span>
of <span class="inserted"><ins><em>your house and
appliances</a>.</p>
+
+ <p>For your safety, don't use any appliance with</em></ins></span> a
<span class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>connection</em></ins></span> to
+ <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden as it was in
+ these TVs, does not legitimize</strong></del></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>real internet.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -437,37 +447,38 @@
<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
“Cube” 3D printer was designed</strong></del></span> <span
class="inserted"><ins><em>login
accounts</em></ins></span> with <span
class="removed"><del><strong>DRM</a>: it won't accept
-third-party printing materials. It is the Keurig of printers. Now it is
-being discontinued,</strong></del></span> <span
class="inserted"><ins><em>hard-coded passwords,</em></ins></span> which <span
class="removed"><del><strong>means that eventually authorized materials
won't</strong></del></span> <span
class="inserted"><ins><em>can't</em></ins></span> be <span
class="removed"><del><strong>available</strong></del></span> <span
class="inserted"><ins><em>changed,</em></ins></span> and <span
class="removed"><del><strong>the printers may become unusable.</p>
-
-<p>With a</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
- is no way to delete these accounts either</a>.</p>
+third-party printing materials. It</strong></del></span> <span
class="inserted"><ins><em>hard-coded passwords, which can't be changed, and
<a
+
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</em></ins></span>
+ is <span class="removed"><del><strong>the Keurig of printers. Now
it</strong></del></span> <span class="inserted"><ins><em>no way to delete these
accounts either</a>.</p>
</li>
<li id="M201705250">
- <p>The proprietary code</em></ins></span> that <span
class="removed"><del><strong>gets the Respects Your Freedom</a>, this
problem would not
-even be</strong></del></span> <span class="inserted"><ins><em>runs pacemakers,
- insulin pumps, and other medical devices is <a
+ <p>The proprietary code that runs pacemakers,
+ insulin pumps, and other medical devices</em></ins></span> is
+<span class="removed"><del><strong>being discontinued, which
means</strong></del></span> <span class="inserted"><ins><em><a
href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
security faults</a>.</p>
</li>
<li id="M201705180">
<p>Bird and rabbit pets were implemented for Second
- Life by</em></ins></span> a <span class="removed"><del><strong>remote
possibility.</p>
-
-<p>How pitiful</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> that <span
class="inserted"><ins><em>tethered their food to a server. <a
+ Life by a company</em></ins></span> that <span
class="removed"><del><strong>eventually authorized materials won't
+be available</strong></del></span> <span class="inserted"><ins><em>tethered
their food to a server. <a
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down</em></ins></span> the <span
class="removed"><del><strong>author</strong></del></span> <span
class="inserted"><ins><em>server and the pets more or less
died</a>.</p>
+ It shut down the server</em></ins></span> and the <span
class="removed"><del><strong>printers may become unusable.</p>
+
+<p>With a</strong></del></span> <span class="inserted"><ins><em>pets
more or less died</a>.</p>
</li>
<li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names</em></ins></span> of <span
class="removed"><del><strong>that article says that there was
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer that gets</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>.
Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>Respects Your Freedom</a>,
this problem</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> would <span
class="removed"><del><strong>not
+even be a remote possibility.</p>
+
+<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>record</em></ins></span> the <span
class="removed"><del><strong>author</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of <span
class="removed"><del><strong>that article says that there was
“nothing wrong” with designing</strong></del></span> the <span
class="removed"><del><strong>device to restrict</strong></del></span> <span
class="inserted"><ins><em>audio files</em></ins></span> users <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>listen to
along with</em></ins></span> the <span class="removed"><del><strong>first
place. This is like putting a “cheat me and mistreat me”
sign on your chest. We should know better: we should condemn all
companies</strong></del></span> <span class="inserted"><ins><em>headphone's
unique serial number.</p>
@@ -492,32 +503,20 @@
lightbulbs</a>.</p>
<p>If</strong></del></span> a <span class="removed"><del><strong>product
is “smart”, and you didn't build it, it is
-cleverly serving its manufacturer <em>against you</em>.</p>
-</li>
-
-<li>
-<p><a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
-DVDs and Bluray disks have DRM</a>.
-</p>
-
-<p>That page uses spin terms</strong></del></span> <span
class="inserted"><ins><em>downgrade</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
-including</strong></del></span> <span class="inserted"><ins><em>tethered them
to a remote server.</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital “rights” management</a>
-and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless
+cleverly serving</strong></del></span> <span
class="inserted"><ins><em>downgrade that tethered them to a remote server. <a
+
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless
users create an account on Anova's servers, their cookers won't
function</a>.</p>
</li>
<li id="M201703270">
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ Stings hospital disinfectant dishwasher is <a
+
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
connected to the Internet, its security is crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
- filesystem, infect it with malware,</em></ins></span> and <span
class="inserted"><ins><em>force the dishwasher to launch
+ filesystem, infect it with malware, and force the dishwasher to launch
attacks on other devices in the network. Since these dishwashers are
used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
@@ -526,21 +525,20 @@
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping on</em></ins></span> its <span
class="inserted"><ins><em>users through the proprietary control
app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether</em></ins></span> it <span
class="removed"><del><strong>claims that “artists”
(rather</strong></del></span> <span class="inserted"><ins><em>was surrounded by
a person's
+ minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
- products, rather</em></ins></span> than <span
class="removed"><del><strong>companies) are
-primarily responsible</strong></del></span> <span
class="inserted"><ins><em>free software which users could have checked
+ products, rather than free software which users could have checked
and changed.</p>
<p>The company that made the vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued</em></ins></span> for <span class="removed"><del><strong>putting
digital restrictions management into</strong></del></span> <span
class="inserted"><ins><em>collecting lots of personal information about how
people
+ was sued for collecting lots of personal information about how people
used it</a>.</p>
<p>The company's statement that it was anonymizing the data may be
@@ -562,11 +560,16 @@
Crackers found a way to access the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen
to</em></ins></span> these <span class="removed"><del><strong>disks.
Nonetheless,</strong></del></span>
- <span class="inserted"><ins><em>conversations was unacceptable by
itself.</p>
+ <p>That the</em></ins></span> manufacturer <span
class="removed"><del><strong><em>against
you</em>.</p></strong></del></span> <span
class="inserted"><ins><em>and the FBI could listen to these
+ conversations was unacceptable by itself.</p></em></ins></span>
</li>
- <li id="M201702200">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+DVDs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702200">
<p>If you buy a used “smart”
car, house, TV, refrigerator, etc., usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
@@ -650,7 +653,7 @@
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
security cameras available through Amazon</a>.</p>
- <p>A camera that records locally on physical media, and has no
network
+ <p>A camera that records locally on physical
media,</em></ins></span> and <span class="removed"><del><strong>Bluray
disks</strong></del></span> <span class="inserted"><ins><em>has no network
connection, does not threaten people with surveillance—neither
by watching people through the camera, nor through malware in the
camera.</p>
@@ -666,31 +669,38 @@
</li>
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
+ <p>Over 70 brands of network-connected surveillance
cameras</em></ins></span> have <span class="removed"><del><strong>DRM</a>.
+</p>
+
+<p>That page uses spin terms</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
+ security bugs</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>allow anyone
to watch through them</a>.</p>
</li>
<li id="M201601100">
- <p>The <a
- href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+ <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+digital “rights” management</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
“Cube” 3D printer was designed with DRM</a>: it
won't accept third-party printing materials. It is the Keurig of
printers. Now it is being discontinued, which means that eventually
- authorized materials won't be available and the printers may become
+ authorized materials won't be available</em></ins></span> and <span
class="inserted"><ins><em>the printers may become
unusable.</p>
- <p>With a <a
- href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+ <p>With a</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
printer that gets the Respects Your Freedom</a>, this problem would
not even be a remote possibility.</p>
<p>How pitiful that the author of that article says that there was
“nothing wrong” with designing the device to restrict
- users in the first place. This is like putting a “cheat me and
- mistreat me” sign on your chest. We should know better: we
+ users in the first place. This is like putting a “cheat
me</em></ins></span> and
+ <span class="inserted"><ins><em>mistreat me” sign on your chest. We
should know better: we
should condemn all companies that take advantage of people like him.
- Indeed, it is the acceptance of their unjust practice that teaches
+ Indeed,</em></ins></span> it <span
class="removed"><del><strong>claims</strong></del></span> <span
class="inserted"><ins><em>is the acceptance of their unjust
practice</em></ins></span> that <span
class="removed"><del><strong>“artists” (rather than companies) are
+primarily responsible for putting digital restrictions management into
+these disks. Nonetheless,</strong></del></span> <span
class="inserted"><ins><em>teaches
people to be doormats.</p>
</li>
@@ -1255,7 +1265,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 14:30:58 $
+$Date: 2019/02/25 10:31:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- po/malware-appliances.de.po 22 Feb 2019 14:30:58 -0000 1.68
+++ po/malware-appliances.de.po 25 Feb 2019 10:31:07 -0000 1.69
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-22 14:26+0000\n"
+"POT-Creation-Date: 2019-02-25 10:27+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -110,7 +110,21 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
msgstr ""
#. type: Content of: <ul><li><p>
Index: po/malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- po/malware-appliances.fr.po 22 Feb 2019 15:50:31 -0000 1.108
+++ po/malware-appliances.fr.po 25 Feb 2019 10:31:07 -0000 1.109
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-22 14:26+0000\n"
+"POT-Creation-Date: 2019-02-25 10:27+0000\n"
"PO-Revision-Date: 2019-02-22 16:46+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-02-25 10:27+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -81,10 +82,19 @@
"pour l'étayer."
#. type: Content of: <ul><li><p>
+# | Amazon Ring “security” devices <a
+# |
href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">
+# | send the video they capture to Amazon servers</a>{+,+} which save it
+# | [-permanently.-] {+long-term.+}
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
msgstr ""
"Les dispositifs de « sécurité » de Ring <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">envoient "
@@ -93,6 +103,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
Index: po/malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- po/malware-appliances.pot 22 Feb 2019 14:30:58 -0000 1.53
+++ po/malware-appliances.pot 25 Feb 2019 10:31:07 -0000 1.54
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-22 14:26+0000\n"
+"POT-Creation-Date: 2019-02-25 10:27+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -66,7 +66,21 @@
msgid ""
"Amazon Ring “security” devices <a "
"href=\"https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\">
"
-"send the video they capture to Amazon servers</a> which save it permanently."
+"send the video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
msgstr ""
#. type: Content of: <ul><li><p>
Index: po/malware-appliances.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru-en.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- po/malware-appliances.ru-en.html 22 Feb 2019 14:59:54 -0000 1.57
+++ po/malware-appliances.ru-en.html 25 Feb 2019 10:31:07 -0000 1.58
@@ -50,8 +50,16 @@
<li id="M201901100">
<p>Amazon Ring “security” devices <a
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a> which save it
- permanently.</p>
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video shows everyone that comes near, or merely
+ passes by, the user's front door.</p>
+
+ <p>The article focuses on how Ring used to let individual employees look
+ at the videos freely. It appears Amazon has tried to prevent that
+ secondary abuse, but the primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender to.</p>
</li>
<li id="M201901070">
@@ -850,7 +858,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/22 14:59:54 $
+$Date: 2019/02/25 10:31:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- po/malware-appliances.ru.po 25 Feb 2019 09:37:05 -0000 1.141
+++ po/malware-appliances.ru.po 25 Feb 2019 10:31:07 -0000 1.142
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-02-22 14:26+0000\n"
+"POT-Creation-Date: 2019-02-25 10:27+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -85,12 +85,33 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
msgstr ""
"УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
"оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они "
-"ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð°Ð²Ñегда."
+"ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° длиÑелÑное вÑемÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Ðо многиÑ
ÑлÑÑаÑÑ
видеозапиÑи показÑваÑÑ
вÑеÑ
, кÑо оказалÑÑ Ð²Ð±Ð»Ð¸Ð·Ð¸ или "
+"пÑоÑÑо пÑоÑ
Ð¾Ð´Ð¸Ñ Ð¼Ð¸Ð¼Ð¾ двеÑи полÑзоваÑелÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+"ÐÑновное внимание ÑÑаÑÑÑ ÑделÑÐµÑ ÑомÑ,
как Ring позволÑл оÑделÑнÑм "
+"ÑабоÑникам Ñвободно заглÑдÑваÑÑ Ð²
видеозапиÑи. Ðак оказалоÑÑ, в Amazon "
+"пÑÑалиÑÑ Ð¿ÑедоÑвÑаÑиÑÑ ÑÑи вÑоÑиÑнÑе
злоÑпоÑÑеблениÑ, но пеÑвиÑное "
+"злоÑпоÑÑебление, ÑоÑÑоÑÑее в Ñом, ÑÑо Amazon
полÑÑÐ°ÐµÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи,— "
+"Amazon ÑÑиÑаеÑ, ÑÑо в ÑÑом обÑеÑÑво должно
ÑÑÑÑпиÑÑ."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/nl.po 24 Feb 2019 14:00:04 -0000 1.35
+++ po/nl.po 25 Feb 2019 10:31:07 -0000 1.36
@@ -1720,7 +1720,21 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -7298,27 +7312,6 @@
"\">#SpywareInCameras</a>)</span>"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr ""
Index: po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/pl.po 24 Feb 2019 14:00:04 -0000 1.35
+++ po/pl.po 25 Feb 2019 10:31:07 -0000 1.36
@@ -1287,7 +1287,21 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6800,27 +6814,6 @@
"\">#SpywareInCameras</a>)</span>"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr ""
Index: po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/pot 24 Feb 2019 14:00:04 -0000 1.35
+++ po/pot 25 Feb 2019 10:31:07 -0000 1.36
@@ -1157,7 +1157,21 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6216,27 +6230,6 @@
"\">#SpywareInCameras</a>)</span>"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr ""
Index: po/proprietary-addictions.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.es-en.html,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- po/proprietary-addictions.es-en.html 21 Feb 2019 12:31:57 -0000
1.1
+++ po/proprietary-addictions.es-en.html 25 Feb 2019 10:31:07 -0000
1.2
@@ -37,6 +37,24 @@
<div class="column-limit" id="proprietary-addictions"></div>
<ul class="blurbs">
+ <li id="M201902220">
+ <p>On-line gambling services (and their nonfree
+ client programs) are <a
+
href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds">
+ designed to be addictive</a>, much like on-line games. They achieve
+ this with various different malfunctionalities, often in combination.</p>
+
+ <p>Many of these malfunctionalities are implemented by the server and
+ the client program together. In some cases, there is no honest way that
+ the client program could counteract the nastiness—for instance,
+ when the server manipulates amounts won in order to get the user
+ addicted, the only way the client program could block that is to pretend
+ the win did not happen, and users would not want that modification.</p>
+
+ <p>However, modification of the client program could cover up some
+ addictive behaviors without losing the user anything.</p>
+ </li>
+
<li id="M201612290">
<p>In the game Fruit Pop, the player buys boosts with coins to get
a high score. The player gets coins at the end of each game, and can
@@ -111,7 +129,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/21 12:31:57 $
+$Date: 2019/02/25 10:31:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- po/proprietary-surveillance.de-diff.html 24 Feb 2019 14:00:05 -0000
1.47
+++ po/proprietary-surveillance.de-diff.html 25 Feb 2019 10:31:07 -0000
1.48
@@ -2363,10 +2363,12 @@
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture</em></ins></span> to <span
class="inserted"><ins><em>Amazon servers</a>, which save it
long-term.</p>
+
<p>In many cases, the video shows</em></ins></span> everyone <span
class="removed"><del><strong>in</strong></del></span> <span
class="inserted"><ins><em>that comes near, or merely
passes by,</em></ins></span> the <span
class="removed"><del><strong>house,</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees
look at
- the videos freely. It appears Amazon has tried to prevent that
+
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
@@ -3244,7 +3246,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/24 14:00:05 $
+$Date: 2019/02/25 10:31:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- po/proprietary-surveillance.it-diff.html 24 Feb 2019 14:00:05 -0000
1.114
+++ po/proprietary-surveillance.it-diff.html 25 Feb 2019 10:31:07 -0000
1.115
@@ -2115,14 +2115,16 @@
send</em></ins></span> the
<span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"></strong></del></span>
<span class="inserted"><ins><em>video</em></ins></span> they <span
class="removed"><del><strong>report even</strong></del></span> <span
class="inserted"><ins><em>capture to Amazon
servers</a>,</em></ins></span> which <span
class="removed"><del><strong>page</strong></del></span> <span
class="inserted"><ins><em>save it
long-term.</p>
+
<p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>user reads at what time</a>.</p>
</li>
<li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>video
shows everyone that comes near, or merely
passes by,</em></ins></span> the <span
class="removed"><del><strong>e-reader</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
+
<p>The article focuses on how Ring</em></ins></span> used
- <span class="removed"><del><strong>by most US
libraries,</strong></del></span> <span class="inserted"><ins><em>to let
individual employees look at
- the videos freely. It appears Amazon has tried to prevent that
+ <span class="removed"><del><strong>by most US
libraries,</strong></del></span> <span class="inserted"><ins><em>to let
individual employees look
+ at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
@@ -3009,7 +3011,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/24 14:00:05 $
+$Date: 2019/02/25 10:31:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- po/proprietary-surveillance.ja-diff.html 24 Feb 2019 14:00:05 -0000
1.124
+++ po/proprietary-surveillance.ja-diff.html 25 Feb 2019 10:31:07 -0000
1.125
@@ -1950,10 +1950,12 @@
<span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
+
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees
look at
- the videos freely. It appears Amazon has tried to prevent that
+
+ <p>The article focuses on how Ring used to let individual employees
look
+ at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
@@ -2821,7 +2823,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/24 14:00:05 $
+$Date: 2019/02/25 10:31:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- po/proprietary-surveillance.ru-en.html 24 Feb 2019 14:30:04 -0000
1.155
+++ po/proprietary-surveillance.ru-en.html 25 Feb 2019 10:31:07 -0000
1.156
@@ -1548,10 +1548,12 @@
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
+
<p>In many cases, the video shows everyone that comes near, or merely
passes by, the user's front door.</p>
- <p>The article focuses on how Ring used to let individual employees look at
- the videos freely. It appears Amazon has tried to prevent that
+
+ <p>The article focuses on how Ring used to let individual employees look
+ at the videos freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
@@ -2149,7 +2151,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/24 14:30:04 $
+$Date: 2019/02/25 10:31:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es-en.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- po/proprietary.es-en.html 21 Feb 2019 12:31:57 -0000 1.32
+++ po/proprietary.es-en.html 25 Feb 2019 10:31:07 -0000 1.33
@@ -146,6 +146,56 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201902220">
+ <p>On-line gambling services (and their nonfree
+ client programs) are <a
+
href="https://www.theguardian.com/society/2019/feb/22/gambling-apps-more-dangerous-than-fobts-study-finds">
+ designed to be addictive</a>, much like on-line games. They achieve
+ this with various different malfunctionalities, often in combination.</p>
+
+ <p>Many of these malfunctionalities are implemented by the server and
+ the client program together. In some cases, there is no honest way that
+ the client program could counteract the nastiness—for instance,
+ when the server manipulates amounts won in order to get the user
+ addicted, the only way the client program could block that is to pretend
+ the win did not happen, and users would not want that modification.</p>
+
+ <p>However, modification of the client program could cover up some
+ addictive behaviors without losing the user anything.</p>
+ </li>
+
+ <li id="M201901070">
+ <p>Vizio TVs <a
+
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own words of the
company's
+ CTO, and this data is sold to third parties. This is in return for
+ “better service” (meaning more intrusive ads?) and slightly
+ lower retail prices.</p>
+
+ <p>What is supposed to make this spying acceptable, according to him,
+ is that it is opt-in in newer models. But since the Vizio software is
+ nonfree, we don't know what is actually happening behind the scenes,
+ and there is no guarantee that all future updates will leave the
+ settings unchanged.</p>
+
+ <p>If you already own a Vizio smart TV (or any smart TV, for that
+ matter), the easiest way to make sure it isn't spying on you is
+ to disconnect it from the Internet, and use a terrestrial antenna
+ instead. Unfortunately, this is not always possible. Another option,
+ if you are technically oriented, is to get your own router (which can
+ be an old computer running completely free software), and set up a
+ firewall to block connections to Vizio's servers. Or, as a last resort,
+ you can replace your TV with another model.</p>
+ </li>
+
+ <li id="M201902200">
+ <p>Some portable surveillance
+ devices (“phones”) now have <a
+
href="https://www.theguardian.com/technology/2019/feb/20/samsung-galaxy-s10-launch-triple-cameras-ultrasonic-fingerprint-sensors-and-5g">
+ fingerprint sensors in the display</a>. Does that imply they could
+ take the fingerprint of anyone who operates the touch screen?</p>
+ </li>
+
<li id="M201902041">
<p>Twenty nine “beauty camera” apps that used to be
on Google Play had one or more malicious functionalities, such
@@ -167,25 +217,6 @@
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
recording all the users' actions</a> in interacting with the app.</p>
</li>
-
- <li id="M201902010">
- <p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that <a
- href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
- addition, 85% feature intrusive permissions or functions in their
- source code—often used for invasive advertising—that could
- potentially also be used to spy on users. Other technical flaws were
- found as well.</p>
-
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
-
- <p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em> <a
- href="/philosophy/free-sw.html">free software</a>.</p>
- </li>
</ul>
@@ -246,7 +277,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/21 12:31:57 $
+$Date: 2019/02/25 10:31:07 $
<!-- timestamp end -->
</p>
</div>
Index: po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- po/pt-br.po 24 Feb 2019 21:01:08 -0000 1.49
+++ po/pt-br.po 25 Feb 2019 10:31:07 -0000 1.50
@@ -1251,10 +1251,15 @@
msgstr ""
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#| "the video they capture to Amazon servers</a> which save it permanently."
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
msgstr ""
"Os dispositivos de âsegurançaâ Amazon Ring <a
href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam o "
@@ -1263,6 +1268,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Vizio TVs <a href=\"https://www.theverge.com/2019/1/7/18172397/airplay-2-"
"homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019\"> collect “"
"whatever the TV sees,”</a> in the own words of the company's CTO, and "
@@ -6776,36 +6795,6 @@
"\">#SpywareInCameras</a>)</span>"
msgstr ""
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Amazon Ring “security” devices <a href=\"https://www.engadget."
-#| "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
-#| "the video they capture to Amazon servers</a> which save it permanently."
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"Os dispositivos de âsegurançaâ Amazon Ring <a
href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam o "
-"vÃdeo que eles capturam para os servidores da Amazon</a>, os quais
armazenam-"
-"o permanentemente."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr ""
@@ -7068,6 +7057,16 @@
"processors will have tyrant software built in</a>."
msgstr ""
+#~ msgid ""
+#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "Os dispositivos de âsegurançaâ Amazon Ring <a
href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> enviam "
+#~ "o vÃdeo que eles capturam para os servidores da Amazon</a>, os quais "
+#~ "armazenam-o permanentemente."
+
#, fuzzy
#~| msgid ""
#~| "Until 2015, any tweet that listed a geographical tag <a href=\"http://"
Index: po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.81
retrieving revision 1.82
diff -u -b -r1.81 -r1.82
--- po/ru.po 25 Feb 2019 09:37:05 -0000 1.81
+++ po/ru.po 25 Feb 2019 10:31:07 -0000 1.82
@@ -704,9 +704,10 @@
"<a href=\"https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-"
"video-drm\"> ÐеÑ
Ð°Ð½Ð¸Ð·Ð¼Ñ ÑиÑÑового огÑаниÑÐµÐ½Ð¸Ñ Ð²
MacOS</a>. Ð ÑÑой ÑÑаÑÑе "
"главное внимание ÑделÑеÑÑÑ ÑÐ¾Ð¼Ñ ÑакÑÑ,
ÑÑо в новой модели Macbook введено "
-"ÑÑебование к мониÑоÑам — в ниÑ
должна бÑÑÑ Ð²ÑедоноÑÐ½Ð°Ñ Ð°Ð¿Ð¿Ð°ÑаÑÑÑа,— но
в MacOS "
-"Ð´Ð»Ñ Ð°ÐºÑиваÑии ÑÑой аппаÑаÑÑÑÑ
пÑивлекаÑÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ ÑиÑÑового
ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ "
-"огÑаниÑениÑми. Ð ÑÑом ÑÑаÑÑвÑÑÑ Ñакже
пÑогÑÐ°Ð¼Ð¼Ñ Ð´Ð¾ÑÑÑпа к iTunes."
+"ÑÑебование к мониÑоÑам — в ниÑ
должна бÑÑÑ Ð²ÑедоноÑÐ½Ð°Ñ Ð°Ð¿Ð¿Ð°ÑаÑÑÑа,"
+"— но в MacOS Ð´Ð»Ñ Ð°ÐºÑиваÑии ÑÑой аппаÑаÑÑÑÑ
пÑивлекаÑÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ "
+"ÑиÑÑового ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми. Ð
ÑÑом ÑÑаÑÑвÑÑÑ Ñакже пÑогÑÐ°Ð¼Ð¼Ñ Ð´Ð¾ÑÑÑпа "
+"к iTunes."
#. type: Content of: <ul><li><p>
msgid ""
@@ -894,11 +895,11 @@
"walls, it is not big enough to mean that the iThings are no longer jails."
msgstr ""
"ÐанÑÑно, ÑÑо Apple наÑÐ¸Ð½Ð°ÐµÑ ÑазÑеÑаÑÑ
огÑаниÑеннÑй пÑоÑ
од ÑÐºÐ²Ð¾Ð·Ñ ÑÑÐµÐ½Ñ "
-"ÑÑÑÑÐ¼Ñ Ð°Ð¹-ÑÑÑÑек — полÑзоваÑели
могÑÑ ÑепеÑÑ ÑÑÑанавливаÑÑ Ð¿ÑиложениÑ, "
-"ÑобÑаннÑе из иÑÑ
однÑÑ
ÑекÑÑов, пÑи
ÑÑловии, ÑÑо иÑÑ
однÑй ÑекÑÑ Ð±Ñл напиÑан "
-"на Swift. ÐолÑзоваÑели не могÑÑ Ð´ÐµÐ»Ð°ÑÑ ÑÑо
Ñвободно, поÑÐ¾Ð¼Ñ ÑÑо Ð¾Ñ Ð½Ð¸Ñ
"
-"ÑÑебÑеÑÑÑ <a
href=\"https://developer.apple.com/xcode/\">иденÑиÑиÑиÑоваÑÑ "
-"ÑебÑ</a>."
+"ÑÑÑÑÐ¼Ñ Ð°Ð¹-ÑÑÑÑек — полÑзоваÑели
могÑÑ ÑепеÑÑ ÑÑÑанавливаÑÑ "
+"пÑиложениÑ, ÑобÑаннÑе из иÑÑ
однÑÑ
ÑекÑÑов, пÑи ÑÑловии, ÑÑо иÑÑ
однÑй ÑекÑÑ "
+"бÑл напиÑан на Swift. ÐолÑзоваÑели не могÑÑ
делаÑÑ ÑÑо Ñвободно, поÑÐ¾Ð¼Ñ ÑÑо "
+"Ð¾Ñ Ð½Ð¸Ñ
ÑÑебÑеÑÑÑ <a href=\"https://developer.apple.com/xcode/"
+"\">иденÑиÑиÑиÑоваÑÑ ÑебÑ</a>."
#. type: Content of: <h4>
msgid "Examples of censorship by Apple jails"
@@ -911,9 +912,9 @@
"Specifically, it is deleting apps developed by Iranians."
msgstr ""
"Apple Ñакже <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-"
-"hardliners-want-isolated-internet\"> подвеÑгаеÑ
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑензÑÑе в инÑеÑеÑаÑ
"
-"оÑганов СШÐ</a>. Ð ÑаÑÑноÑÑи, компаниÑ
ÑдалÑÐµÑ Ð¿ÑиложениÑ, ÑазÑабоÑаннÑе "
-"иÑанÑами."
+"hardliners-want-isolated-internet\"> подвеÑгаеÑ
пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ ÑензÑÑе в "
+"инÑеÑеÑаÑ
оÑганов СШÐ</a>. Ð ÑаÑÑноÑÑи,
ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ ÑдалÑÐµÑ Ð¿ÑиложениÑ, "
+"ÑазÑабоÑаннÑе иÑанÑами."
#. type: Content of: <ul><li><p>
msgid ""
@@ -957,8 +958,8 @@
"from Russian surveillance, and is therefore subject to Russian censorship."
msgstr ""
"ÐÑо паÑадокÑалÑно, Ð²ÐµÐ´Ñ LinkedIn Ñама
пÑедÑÑавлÑÐµÑ ÑиÑÑÐµÐ¼Ñ Ñлежки. Ðна "
-"подвеÑÐ³Ð°ÐµÑ ÑвоиÑ
полÑзоваÑелей Ñвоей
ÑобÑÑвенной Ñлежке и в Ñо же вÑÐµÐ¼Ñ Ð¿ÑÑаеÑÑÑ
"
-"заÑиÑиÑÑ Ð¸Ñ
Ð¾Ñ ÑоÑÑийÑкой Ñлежки, ÑÑо
Ð´ÐµÐ»Ð°ÐµÑ LinkedIn обÑекÑом "
+"подвеÑÐ³Ð°ÐµÑ ÑвоиÑ
полÑзоваÑелей Ñвоей
ÑобÑÑвенной Ñлежке и в Ñо же вÑÐµÐ¼Ñ "
+"пÑÑаеÑÑÑ Ð·Ð°ÑиÑиÑÑ Ð¸Ñ
Ð¾Ñ ÑоÑÑийÑкой
Ñлежки, ÑÑо Ð´ÐµÐ»Ð°ÐµÑ LinkedIn обÑекÑом "
"ÑензÑÑÑ Ñо ÑÑоÑÐ¾Ð½Ñ Ð Ð¾ÑÑии."
#. type: Content of: <ul><li><p>
@@ -1343,9 +1344,9 @@
"РпоÑледней ÑиÑÑеме ай-ÑÑÑÑек
“вÑклÑÑение” WiFi и Bluetooth "
"оÑевиднÑм ÑпоÑобом <a
href=\"https://www.theguardian.com/technology/2017/"
"sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-"
-"off\">на Ñамом деле не вÑклÑÑÐ°ÐµÑ Ð¸Ñ
</a>.
Ðо-наÑÑоÑÑемÑ-Ñо иÑ
вÑклÑÑиÑÑ Ð¼Ð¾Ð¶Ð½Ð¾, более "
-"замÑÑловаÑÑм ÑпоÑобом — ÑолÑко до
пÑÑи ÑаÑов ÑÑÑа. ÐÐ¾Ñ Ð²Ð°Ð¼ "
-"Apple: “Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, Ð²Ñ Ñ
оÑиÑе, ÑÑÐ¾Ð±Ñ Ð·Ð° вами
Ñпионили”."
+"off\">на Ñамом деле не вÑклÑÑÐ°ÐµÑ Ð¸Ñ
</a>.
Ðо-наÑÑоÑÑемÑ-Ñо иÑ
вÑклÑÑиÑÑ "
+"можно, более замÑÑловаÑÑм ÑпоÑобом —
ÑолÑко до пÑÑи ÑаÑов ÑÑÑа. "
+"ÐÐ¾Ñ Ð²Ð°Ð¼ Apple: “Ð¼Ñ Ð·Ð½Ð°ÐµÐ¼, Ð²Ñ Ñ
оÑиÑе, ÑÑобÑ
за вами Ñпионили”."
#. type: Content of: <ul><li><p>
msgid ""
@@ -1678,12 +1679,33 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
msgstr ""
"УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
"оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они "
-"ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð°Ð²Ñегда."
+"ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° длиÑелÑное вÑемÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+"Ðо многиÑ
ÑлÑÑаÑÑ
видеозапиÑи показÑваÑÑ
вÑеÑ
, кÑо оказалÑÑ Ð²Ð±Ð»Ð¸Ð·Ð¸ или "
+"пÑоÑÑо пÑоÑ
Ð¾Ð´Ð¸Ñ Ð¼Ð¸Ð¼Ð¾ двеÑи полÑзоваÑелÑ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
+msgstr ""
+"ÐÑновное внимание ÑÑаÑÑÑ ÑделÑÐµÑ ÑомÑ,
как Ring позволÑл оÑделÑнÑм "
+"ÑабоÑникам Ñвободно заглÑдÑваÑÑ Ð²
видеозапиÑи. Ðак оказалоÑÑ, в Amazon "
+"пÑÑалиÑÑ Ð¿ÑедоÑвÑаÑиÑÑ ÑÑи вÑоÑиÑнÑе
злоÑпоÑÑеблениÑ, но пеÑвиÑное "
+"злоÑпоÑÑебление, ÑоÑÑоÑÑее в Ñом, ÑÑо Amazon
полÑÑÐ°ÐµÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи,— "
+"Amazon ÑÑиÑаеÑ, ÑÑо в ÑÑом обÑеÑÑво должно
ÑÑÑÑпиÑÑ."
#. type: Content of: <ul><li><p>
msgid ""
@@ -3439,8 +3461,8 @@
"guild-wars-2-banwave\"> to snoop on all open processes running on its user's "
"computer</a>."
msgstr ""
-"ArenaNet Ñайком ÑÑÑанавливала
пÑогÑаммÑ-Ñпион вмеÑÑе Ñ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸ÐµÐ¼ "
-"игÑÑ Ð´Ð»Ñ Ð±Ð¾Ð»ÑÑого колиÑеÑÑва игÑоков Guild
War 2. ÐÑогÑамма-Ñпион позволÑла "
+"ArenaNet Ñайком ÑÑÑанавливала
пÑогÑаммÑ-Ñпион вмеÑÑе Ñ Ð¾Ð±Ð½Ð¾Ð²Ð»ÐµÐ½Ð¸ÐµÐ¼ игÑÑ
Ð´Ð»Ñ "
+"болÑÑого колиÑеÑÑва игÑоков Guild War 2.
ÐÑогÑамма-Ñпион позволÑла "
"ArpaNet <a href=\"https://techraptor.net/content/arenanet-used-spyware-anti-"
"cheat-for-guild-wars-2-banwave\"> подглÑдÑваÑÑ Ð·Ð° вÑеми
оÑкÑÑÑÑми "
"пÑоÑеÑÑами, ÑабоÑаÑÑими на компÑÑÑеÑе
полÑзоваÑелÑ</a>."
@@ -4442,8 +4464,8 @@
"<a
href=\"http://arstechnica.com/apple/2007/08/aacs-tentacles/\">ЦиÑÑовое "
"ÑпÑавление огÑаниÑениÑми в Windows</a> введено
в ÑÐ³Ð¾Ð´Ñ Ð´Ð¸Ñкам <a href=\"/"
"proprietary/proprietary-drm.html#bluray\"> Bluray</a> (в ÑÑаÑÑе
говоÑиÑÑÑ "
-"Ñакже о Ñом, ÑÑо Ñе же вÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð²Ð²ÐµÐ´ÑÑ Ð² MacOS. Ð Ñо "
-"вÑÐµÐ¼Ñ ÑÑого еÑе не бÑло, но впоÑледÑÑвии
ÑÑо Ñделали.)"
+"Ñакже о Ñом, ÑÑо Ñе же вÑедоноÑнÑе
пÑогÑÐ°Ð¼Ð¼Ñ Ð²Ð²ÐµÐ´ÑÑ Ð² MacOS. Ð Ñо вÑÐµÐ¼Ñ "
+"ÑÑого еÑе не бÑло, но впоÑледÑÑвии ÑÑо
Ñделали.)"
#. type: Content of: <h3>
msgid "Microsoft Insecurity"
@@ -6294,11 +6316,12 @@
"people are listening to or watching</a>. In addition, it may be analyzing "
"people's conversations to serve them with targeted advertisements."
msgstr ""
-"ÐÑиложение Facebook поÑÑоÑнно подÑлÑÑиваеÑ,
ÑÑÐ¾Ð±Ñ <a href=\"http://www.independent."
-"co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-"
-"listen-in-on-what-they-re-saying-claims-professor-a7057526.html\">ÑледиÑÑ
за "
-"Ñем, ÑÑо лÑди ÑлÑÑаÑÑ Ð¸Ð»Ð¸ ÑмоÑÑÑÑ</a>. ÐÑоме
Ñого, оно, возможно, "
-"анализиÑÑÐµÑ Ð¿ÐµÑеговоÑÑ Ð¿Ð¾Ð»ÑзоваÑелей,
ÑÑÐ¾Ð±Ñ Ð´Ð¾ÑÑавлÑÑÑ Ð¸Ð¼ наÑеленнÑÑ ÑекламÑ."
+"ÐÑиложение Facebook поÑÑоÑнно подÑлÑÑиваеÑ,
ÑÑÐ¾Ð±Ñ <a href=\"http://www."
+"independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-"
+"phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html"
+"\">ÑледиÑÑ Ð·Ð° Ñем, ÑÑо лÑди ÑлÑÑаÑÑ Ð¸Ð»Ð¸
ÑмоÑÑÑÑ</a>. ÐÑоме Ñого, оно, "
+"возможно, анализиÑÑÐµÑ Ð¿ÐµÑеговоÑÑ
полÑзоваÑелей, ÑÑÐ¾Ð±Ñ Ð´Ð¾ÑÑавлÑÑÑ Ð¸Ð¼ "
+"наÑеленнÑÑ ÑекламÑ."
#. type: Content of: <ul><li><p>
msgid ""
@@ -9070,38 +9093,6 @@
"<span class=\"anchor-reference-id\">(<a href=\"#SpywareInCameras"
"\">#SpywareInCameras</a>)</span>"
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-"УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
-"engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> "
-"оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, где они "
-"ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð° длиÑелÑное вÑемÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-"Ðо многиÑ
ÑлÑÑаÑÑ
видеозапиÑи показÑваÑÑ
вÑеÑ
, кÑо оказалÑÑ Ð²Ð±Ð»Ð¸Ð·Ð¸ или "
-"пÑоÑÑо пÑоÑ
Ð¾Ð´Ð¸Ñ Ð¼Ð¸Ð¼Ð¾ двеÑи полÑзоваÑелÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-"ÐÑновное внимание ÑÑаÑÑÑ ÑделÑÐµÑ ÑомÑ,
как Ring позволÑл оÑделÑнÑм "
-"ÑабоÑникам Ñвободно заглÑдÑваÑÑ Ð²
видеозапиÑи. Ðак оказалоÑÑ, в Amazon "
-"пÑÑалиÑÑ Ð¿ÑедоÑвÑаÑиÑÑ ÑÑи вÑоÑиÑнÑе
злоÑпоÑÑеблениÑ, но пеÑвиÑное "
-"злоÑпоÑÑебление, ÑоÑÑоÑÑее в Ñом, ÑÑо Amazon
полÑÑÐ°ÐµÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи,— "
-"Amazon ÑÑиÑаеÑ, ÑÑо в ÑÑом обÑеÑÑво должно
ÑÑÑÑпиÑÑ."
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr "ÐгÑÑÑки"
@@ -9441,6 +9432,16 @@
"пÑоÑеÑÑоÑаÑ
Intel бÑдÑÑ Ð²ÑÑÑоеннÑе
неÑвободнÑе пÑогÑаммÑ-ÑиÑанÑ</a>."
#~ msgid ""
+#~ "Amazon Ring “security” devices <a href=\"https://www.engadget."
+#~ "com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send "
+#~ "the video they capture to Amazon servers</a> which save it permanently."
+#~ msgstr ""
+#~ "УÑÑÑойÑÑва “безопаÑноÑÑи” Amazon Ring <a
href=\"https://www."
+#~ "engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/"
+#~ "\"> оÑÑÑлаÑÑ Ð²Ð¸Ð´ÐµÐ¾Ð·Ð°Ð¿Ð¸Ñи, коÑоÑÑе они
ÑобиÑаÑÑ, на ÑеÑвеÑÑ Amazon</a>, "
+#~ "где они ÑоÑ
ÑанÑÑÑÑÑ Ð½Ð°Ð²Ñегда."
+
+#~ msgid ""
#~ "Preloading crapware along with a nonfree operating system is common "
#~ "practice, but by making the crapware undeletable, Facebook and Samsung "
#~ "(<a href=\"https://www.bloomberg.com/news/articles/2019-01-08/samsung-"
Index: po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- po/zh-tw.po 24 Feb 2019 14:00:05 -0000 1.35
+++ po/zh-tw.po 25 Feb 2019 10:31:07 -0000 1.36
@@ -1250,7 +1250,21 @@
msgid ""
"Amazon Ring “security” devices <a href=\"https://www.engadget."
"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a> which save it permanently."
+"video they capture to Amazon servers</a>, which save it long-term."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"In many cases, the video shows everyone that comes near, or merely passes "
+"by, the user's front door."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The article focuses on how Ring used to let individual employees look at the "
+"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
+"but the primary abuse—that Amazon gets the video—Amazon expects "
+"society to surrender to."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6541,27 +6555,6 @@
"\">#SpywareInCameras</a>)</span>"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Amazon Ring “security” devices <a href=\"https://www.engadget."
-"com/2019/01/10/ring-gave-employees-access-customer-video-feeds/\"> send the "
-"video they capture to Amazon servers</a>, which save it long-term."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"In many cases, the video shows everyone that comes near, or merely passes "
-"by, the user's front door."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article focuses on how Ring used to let individual employees look at the "
-"videos freely. It appears Amazon has tried to prevent that secondary abuse, "
-"but the primary abuse—that Amazon gets the video—Amazon expects "
-"society to surrender to."
-msgstr ""
-
#. type: Content of: <div><h4>
msgid "Toys"
msgstr ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-appliances.ru.html prop...,
GNUN <=