[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www graphics/po/hurd_mf.de.po graphics/po/hurd_...
From: |
GNUN |
Subject: |
www graphics/po/hurd_mf.de.po graphics/po/hurd_... |
Date: |
Sun, 17 Mar 2019 06:32:46 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/03/17 06:32:42
Modified files:
graphics/po : hurd_mf.de.po hurd_mf.fr.po hurd_mf.pot
hurd_mf.ro.po
philosophy/po : software-patents.fr.po software-patents.pot
software-patents.ru.po
proprietary/po : de.po es.po fr.po it.po ja.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po
malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.ru.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-interference.de-diff.html
proprietary-interference.de.po
proprietary-interference.fr.po
proprietary-interference.ja-diff.html
proprietary-interference.ja.po
proprietary-interference.pot
proprietary-interference.ru.po
proprietary-jails.de-diff.html
proprietary-jails.de.po proprietary-jails.es.po
proprietary-jails.fr.po
proprietary-jails.it-diff.html
proprietary-jails.it.po
proprietary-jails.ja-diff.html
proprietary-jails.ja.po proprietary-jails.pot
proprietary-jails.ru.po
proprietary-sabotage.de-diff.html
proprietary-sabotage.de.po
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru.po
proprietary-subscriptions.de-diff.html
proprietary-subscriptions.de.po
proprietary-subscriptions.fr.po
proprietary-subscriptions.ja-diff.html
proprietary-subscriptions.ja.po
proprietary-subscriptions.pot
proprietary-subscriptions.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po pt-br.po ru.po
zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/hurd_mf.de.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/hurd_mf.fr.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/hurd_mf.pot?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/graphics/po/hurd_mf.ro.po?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/software-patents.fr.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/software-patents.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/software-patents.ru.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.1&r2=1.2
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.90&r2=1.91
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.de.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.fr.po?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ja.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.pot?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-interference.ru.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es.po?cvsroot=www&r1=1.48&r2=1.49
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it.po?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pot?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pot?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.269&r2=1.270
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.392&r2=1.393
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.282&r2=1.283
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.489&r2=1.490
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.49&r2=1.50
Patches:
Index: graphics/po/hurd_mf.de.po
===================================================================
RCS file: /web/www/www/graphics/po/hurd_mf.de.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- graphics/po/hurd_mf.de.po 9 Mar 2019 13:31:43 -0000 1.12
+++ graphics/po/hurd_mf.de.po 17 Mar 2019 10:32:38 -0000 1.13
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: hurd_mf.html\n"
-"POT-Creation-Date: 2019-03-09 13:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2014-04-14 22:00+0200\n"
"Last-Translator: Joerg Kohne <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -109,8 +109,9 @@
# | [-href=\"http://creativecommons.org/licenses/by-sa/3.0/us/\">Creative-]
# | {+href=\"/licenses/fdl.html\">GNU Free Documentation License</a>,
# | version 1.2 or any later version, or the <a rel=\"license\"
-# | href=\"https://creativecommons/licenses/by-sa/3.0/\">Creative+} Commons
-# | Attribution-ShareAlike 3.0 [-United States-] {+Unported+} License</a>.
+# | href=\"https://creativecommons.org/licenses/by-sa/3.0/\">Creative+}
+# | Commons Attribution-ShareAlike 3.0 [-United States-] {+Unported+}
+# | License</a>.
#, fuzzy
#| msgid ""
#| "This page is licensed under a <a rel=\"license\" href=\"http://"
@@ -119,9 +120,9 @@
msgid ""
"This image is available under the <a rel=\"license\" href=\"/licenses/fdl."
"html\">GNU Free Documentation License</a>, version 1.2 or any later "
-"version, or the <a rel=\"license\" href=\"https://creativecommons/licenses/"
-"by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported License</"
-"a>."
+"version, or the <a rel=\"license\" href=\"https://creativecommons.org/"
+"licenses/by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported "
+"License</a>."
msgstr ""
"Dieses Werk ist lizenziert unter einer <a rel=\"license\" href=\"//"
"creativecommons.org/licenses/by-sa/3.0/us/deed.de\">Creative Commons "
Index: graphics/po/hurd_mf.fr.po
===================================================================
RCS file: /web/www/www/graphics/po/hurd_mf.fr.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- graphics/po/hurd_mf.fr.po 9 Mar 2019 18:22:38 -0000 1.24
+++ graphics/po/hurd_mf.fr.po 17 Mar 2019 10:32:39 -0000 1.25
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: hurd_mf.html\n"
-"POT-Creation-Date: 2019-03-09 13:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-03-09 19:16+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -101,12 +102,25 @@
msgstr "Copyright © 1997 Stephen McCamant"
#. type: Content of: <div><div><p>
+# | This image is available under the <a rel=\"license\"
+# | href=\"/licenses/fdl.html\">GNU Free Documentation License</a>,
+# | version 1.2 or any later version, or the <a rel=\"license\"
+# | [-href=\"https://creativecommons/licenses/by-sa/3.0/\">Creative-]
+# | {+href=\"https://creativecommons.org/licenses/by-sa/3.0/\">Creative+}
+# | Commons Attribution-ShareAlike 3.0 Unported License</a>.
+#, fuzzy
+#| msgid ""
+#| "This image is available under the <a rel=\"license\" href=\"/licenses/fdl."
+#| "html\">GNU Free Documentation License</a>, version 1.2 or any later "
+#| "version, or the <a rel=\"license\" href=\"https://creativecommons/"
+#| "licenses/by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 "
+#| "Unported License</a>."
msgid ""
"This image is available under the <a rel=\"license\" href=\"/licenses/fdl."
"html\">GNU Free Documentation License</a>, version 1.2 or any later "
-"version, or the <a rel=\"license\" href=\"https://creativecommons/licenses/"
-"by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported License</"
-"a>."
+"version, or the <a rel=\"license\" href=\"https://creativecommons.org/"
+"licenses/by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported "
+"License</a>."
msgstr ""
"Cette image est disponible sous la <a rel=\"license\" href=\"/licenses/fdl."
"html\">licence GNU de documentation libre</a>, version 1.2 ou toute version "
Index: graphics/po/hurd_mf.pot
===================================================================
RCS file: /web/www/www/graphics/po/hurd_mf.pot,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- graphics/po/hurd_mf.pot 9 Mar 2019 13:31:43 -0000 1.11
+++ graphics/po/hurd_mf.pot 17 Mar 2019 10:32:39 -0000 1.12
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: hurd_mf.html\n"
-"POT-Creation-Date: 2019-03-09 13:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -89,7 +89,7 @@
"This image is available under the <a rel=\"license\" "
"href=\"/licenses/fdl.html\">GNU Free Documentation License</a>, "
"version 1.2 or any later version, or the <a rel=\"license\" "
-"href=\"https://creativecommons/licenses/by-sa/3.0/\">Creative Commons "
+"href=\"https://creativecommons.org/licenses/by-sa/3.0/\">Creative Commons "
"Attribution-ShareAlike 3.0 Unported License</a>."
msgstr ""
Index: graphics/po/hurd_mf.ro.po
===================================================================
RCS file: /web/www/www/graphics/po/hurd_mf.ro.po,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- graphics/po/hurd_mf.ro.po 9 Mar 2019 13:31:43 -0000 1.4
+++ graphics/po/hurd_mf.ro.po 17 Mar 2019 10:32:39 -0000 1.5
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: hurd_mf.html\n"
-"POT-Creation-Date: 2019-03-09 13:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: web-translators <address@hidden>\n"
@@ -104,9 +104,9 @@
msgid ""
"This image is available under the <a rel=\"license\" href=\"/licenses/fdl."
"html\">GNU Free Documentation License</a>, version 1.2 or any later "
-"version, or the <a rel=\"license\" href=\"https://creativecommons/licenses/"
-"by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported License</"
-"a>."
+"version, or the <a rel=\"license\" href=\"https://creativecommons.org/"
+"licenses/by-sa/3.0/\">Creative Commons Attribution-ShareAlike 3.0 Unported "
+"License</a>."
msgstr ""
"AceastÄ paginÄ este licenÈiatÄ sub licenÈa <a rel=\"license\"
href=\"http://"
"creativecommons.org/licenses/by-nd/3.0/us/\">Creative Commons Atribuire - "
Index: philosophy/po/software-patents.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/software-patents.fr.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- philosophy/po/software-patents.fr.po 9 Mar 2019 18:22:38 -0000
1.68
+++ philosophy/po/software-patents.fr.po 17 Mar 2019 10:32:39 -0000
1.69
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: software-patents.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-03-09 19:11+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -312,21 +313,40 @@
"même de le publier, sans savoir qu'il va y avoir un brevet et que vous allez
"
"être poursuivi."
-#. This link is dead and there is nothing on their site related to
-#. the patent or LZW at all, AFAICS. yavor, 18 Jul 2008
-#. <a href="http://www.unisys.com/unisys/lzw/default.asp">
-#. patent</a>
#. type: Content of: <p>
+# | This is not just academic. In 1984, the compress program was written, a
+# | program for data compression. At the time, there was no patent on the LZW
+# | compression algorithm which it used. Then in 1985, the US issued a
+# | [-patent-] {+<a
+# | href=\"https://patents.justia.com/patent/4558302\">patent</a>+} on this
+# | algorithm and over the next few years, those who distributed the compress
+# | program started getting threats. There was no way that the author of
+# | compress could have realized that he was likely to get sued. All he did
+# | was use an idea that he found in a journal just like programmers have
+# | always done. He hadn't realized that you could no longer safely use ideas
+# | that you found in a journal.
+#, fuzzy
+#| msgid ""
+#| "This is not just academic. In 1984, the compress program was written, a "
+#| "program for data compression. At the time, there was no patent on the "
+#| "LZW compression algorithm which it used. Then in 1985, the US issued a "
+#| "patent on this algorithm and over the next few years, those who "
+#| "distributed the compress program started getting threats. There was no "
+#| "way that the author of compress could have realized that he was likely to "
+#| "get sued. All he did was use an idea that he found in a journal just "
+#| "like programmers have always done. He hadn't realized that you could no "
+#| "longer safely use ideas that you found in a journal."
msgid ""
"This is not just academic. In 1984, the compress program was written, a "
"program for data compression. At the time, there was no patent on the LZW "
-"compression algorithm which it used. Then in 1985, the US issued a patent "
-"on this algorithm and over the next few years, those who distributed the "
-"compress program started getting threats. There was no way that the author "
-"of compress could have realized that he was likely to get sued. All he did "
-"was use an idea that he found in a journal just like programmers have always "
-"done. He hadn't realized that you could no longer safely use ideas that you "
-"found in a journal."
+"compression algorithm which it used. Then in 1985, the US issued a <a href="
+"\"https://patents.justia.com/patent/4558302\">patent</a> on this algorithm "
+"and over the next few years, those who distributed the compress program "
+"started getting threats. There was no way that the author of compress could "
+"have realized that he was likely to get sued. All he did was use an idea "
+"that he found in a journal just like programmers have always done. He "
+"hadn't realized that you could no longer safely use ideas that you found in "
+"a journal."
msgstr ""
"Ce n'est pas une hypothèse gratuite. En 1984, un programme de compression de
"
"données a été écrit : Compress. à l'époque, il n'y avait pas de brevet
sur "
@@ -451,18 +471,34 @@
"L'étude citait un ingénieur qui disait : « Je ne reconnais pas mes
propres "
"inventions dans ces brevets. »"
-#. Link apparently not useful anymore.
-#. <a
href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/search-bool.html&r=1&f=G&l=50&co1=AND&d=pall&s1=%274486857%27.WKU.&OS=PN/4486857&RS=PN/4486857">
-#. patents</a>.
#. type: Content of: <p>
+# | This is not just theoretical. Around 1990, a programmer named <a
+# | href=\"http://www.atarimagazines.com/startv2n3/hypercard.html\">Paul
+# | Heckel</a> sued Apple claiming that Hypercard infringed a couple of his
+# | [-patents.-] {+<a
+# | href=\"https://patents.justia.com/patent/4486857\">patents</a>.+} When he
+# | first saw Hypercard, he didn't think it had anything to do with his
+# | patent, with his “Inventions”. It didn't look similar. When
+# | his lawyer told him that you could read the patents as covering part of
+# | Hypercard, he decided to attack Apple.
+#, fuzzy
+#| msgid ""
+#| "This is not just theoretical. Around 1990, a programmer named <a href="
+#| "\"http://www.atarimagazines.com/startv2n3/hypercard.html\">Paul Heckel</"
+#| "a> sued Apple claiming that Hypercard infringed a couple of his patents. "
+#| "When he first saw Hypercard, he didn't think it had anything to do with "
+#| "his patent, with his “Inventions”. It didn't look similar. "
+#| "When his lawyer told him that you could read the patents as covering part "
+#| "of Hypercard, he decided to attack Apple."
msgid ""
"This is not just theoretical. Around 1990, a programmer named <a href="
"\"http://www.atarimagazines.com/startv2n3/hypercard.html\">Paul Heckel</a> "
-"sued Apple claiming that Hypercard infringed a couple of his patents. When "
-"he first saw Hypercard, he didn't think it had anything to do with his "
-"patent, with his “Inventions”. It didn't look similar. When "
-"his lawyer told him that you could read the patents as covering part of "
-"Hypercard, he decided to attack Apple."
+"sued Apple claiming that Hypercard infringed a couple of his <a href="
+"\"https://patents.justia.com/patent/4486857\">patents</a>. When he first "
+"saw Hypercard, he didn't think it had anything to do with his patent, with "
+"his “Inventions”. It didn't look similar. When his lawyer told "
+"him that you could read the patents as covering part of Hypercard, he "
+"decided to attack Apple."
msgstr ""
"Ce n'est pas seulement théorique. Aux environs de 1990, un programmeur du "
"nom de <a href=\"http://www.atarimagazines.com/startv2n3/hypercard.html"
@@ -607,15 +643,33 @@
"étroite, sur une fonctionnalité très spécifique."
#. type: Content of: <p>
-msgid ""
-"What do you do with the <a href=\"https://web.archive.org/web/20060115162715/"
-"http://www.delphion.com/details?pn=US04873662__\"> British Telecom patent</"
-"a> on traversing hyper links together with dial-up access? Traversing hyper "
-"links is absolutely essential to a major use of computers these days. Dial-"
-"up access is also essential. How do you do without this feature, which, by "
-"the way, isn't even one feature, it is really a combination of two just "
-"arbitrarily juxtaposed. It is rather like having a patent on a sofa and "
-"television in the same room."
+# | What do you do with the <a
+# |
[-href=\"https://web.archive.org/web/20060115162715/http://www.delphion.com/details?pn=US04873662__\">
+# | British-] {+href=\"https://patents.justia.com/patent/4873662\">British+}
+# | Telecom patent</a> on traversing hyper links together with dial-up access?
+# | Traversing hyper links is absolutely essential to a major use of computers
+# | these days. Dial-up access is also essential. How do you do without this
+# | feature, which, by the way, isn't even one feature, it is really a
+# | combination of two just arbitrarily juxtaposed. It is rather like having
+# | a patent on a sofa and television in the same room.
+#, fuzzy
+#| msgid ""
+#| "What do you do with the <a href=\"https://web.archive.org/"
+#| "web/20060115162715/http://www.delphion.com/details?pn=US04873662__\"> "
+#| "British Telecom patent</a> on traversing hyper links together with dial-"
+#| "up access? Traversing hyper links is absolutely essential to a major use "
+#| "of computers these days. Dial-up access is also essential. How do you "
+#| "do without this feature, which, by the way, isn't even one feature, it is "
+#| "really a combination of two just arbitrarily juxtaposed. It is rather "
+#| "like having a patent on a sofa and television in the same room."
+msgid ""
+"What do you do with the <a href=\"https://patents.justia.com/"
+"patent/4873662\">British Telecom patent</a> on traversing hyper links "
+"together with dial-up access? Traversing hyper links is absolutely essential "
+"to a major use of computers these days. Dial-up access is also essential. "
+"How do you do without this feature, which, by the way, isn't even one "
+"feature, it is really a combination of two just arbitrarily juxtaposed. It "
+"is rather like having a patent on a sofa and television in the same room."
msgstr ""
"Que faites-vous du <a href=\"https://web.archive.org/web/20060115162715/"
"http://www.delphion.com/details?pn=US04873662__\">brevet British Telecom</a> "
@@ -645,9 +699,28 @@
"disponibles, car les détenteurs du brevet les menaçaient."
#. type: Content of: <p>
+# | Then, one program got away. The program <a
+# | href=\"https://web.archive.org/web/20170315023711/http://www.pgpi.org/\">{+
+# | +}PGP</a>, which initially was released as free software. Apparently, the
+# | patent holders by the time they got around to attacking, realized they
+# | might get too much bad publicity. So they imposed restrictions making it
+# | for non-commercial use only, which meant it couldn't catch on too much.
+# | So they greatly limited the use of Public Key Encryption for a decade or
+# | more. There was no way around that patent. There was nothing else you
+# | could do like that.
+#, fuzzy
+#| msgid ""
+#| "Then, one program got away. The program <a href=\"https://web.archive."
+#| "org/web/20170315023711/http://www.pgpi.org/\">PGP</a>, which initially "
+#| "was released as free software. Apparently, the patent holders by the "
+#| "time they got around to attacking, realized they might get too much bad "
+#| "publicity. So they imposed restrictions making it for non-commercial use "
+#| "only, which meant it couldn't catch on too much. So they greatly limited "
+#| "the use of Public Key Encryption for a decade or more. There was no way "
+#| "around that patent. There was nothing else you could do like that."
msgid ""
"Then, one program got away. The program <a href=\"https://web.archive.org/"
-"web/20170315023711/http://www.pgpi.org/\">PGP</a>, which initially was "
+"web/20170315023711/http://www.pgpi.org/\"> PGP</a>, which initially was "
"released as free software. Apparently, the patent holders by the time they "
"got around to attacking, realized they might get too much bad publicity. So "
"they imposed restrictions making it for non-commercial use only, which meant "
@@ -1259,22 +1332,46 @@
"la technique, voir combien de terre on leur laissera confisquer dans "
"l'espace mental."
-#. Another dead link.
-#. <a href="http://people.qualcomm.com/karn/patents/patent-comments.html">
-#. obvious</a>!
#. type: Content of: <p>
+# | When programmers look at a lot of software patents, they say this is
+# | ridiculously [-obvious!-] {+<a
+# |
href=\"https://web.archive.org/web/20040604051644/http://people.qualcomm.com/karn/patents/patent-comments.html\">
+# | obvious</a>!+} Patent bureaucrats have all sorts of excuses to justify
+# | ignoring what programmers think. They say “Oh! But you have to
+# | consider it in terms of the way things were 10 or 20 years ago”.
+# | Then they discovered that if they talk something to death then you can
+# | eventually lose your bearings. Anything can look unobvious if you tear it
+# | apart enough, analyze it enough. You simply lose all standard of
+# | obviousness or at least lose the ability to justify any standard of
+# | obvious or unobvious. Then, of course, they describe the patent holders
+# | as brilliant inventors, all of them. Therefore we can't question their
+# | entitlement to power over what we can do.
+#, fuzzy
+#| msgid ""
+#| "When programmers look at a lot of software patents, they say this is "
+#| "ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
+#| "justify ignoring what programmers think. They say “Oh! But you "
+#| "have to consider it in terms of the way things were 10 or 20 years "
+#| "ago”. Then they discovered that if they talk something to death "
+#| "then you can eventually lose your bearings. Anything can look unobvious "
+#| "if you tear it apart enough, analyze it enough. You simply lose all "
+#| "standard of obviousness or at least lose the ability to justify any "
+#| "standard of obvious or unobvious. Then, of course, they describe the "
+#| "patent holders as brilliant inventors, all of them. Therefore we can't "
+#| "question their entitlement to power over what we can do."
msgid ""
"When programmers look at a lot of software patents, they say this is "
-"ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
-"justify ignoring what programmers think. They say “Oh! But you have "
-"to consider it in terms of the way things were 10 or 20 years ago”. "
-"Then they discovered that if they talk something to death then you can "
-"eventually lose your bearings. Anything can look unobvious if you tear it "
-"apart enough, analyze it enough. You simply lose all standard of "
-"obviousness or at least lose the ability to justify any standard of obvious "
-"or unobvious. Then, of course, they describe the patent holders as "
-"brilliant inventors, all of them. Therefore we can't question their "
-"entitlement to power over what we can do."
+"ridiculously <a href=\"https://web.archive.org/web/20040604051644/http://"
+"people.qualcomm.com/karn/patents/patent-comments.html\"> obvious</a>! Patent "
+"bureaucrats have all sorts of excuses to justify ignoring what programmers "
+"think. They say “Oh! But you have to consider it in terms of the way "
+"things were 10 or 20 years ago”. Then they discovered that if they "
+"talk something to death then you can eventually lose your bearings. "
+"Anything can look unobvious if you tear it apart enough, analyze it enough. "
+"You simply lose all standard of obviousness or at least lose the ability to "
+"justify any standard of obvious or unobvious. Then, of course, they "
+"describe the patent holders as brilliant inventors, all of them. Therefore "
+"we can't question their entitlement to power over what we can do."
msgstr ""
"Quand des programmeurs regardent des brevets, ils disent pour beaucoup "
"d'entre eux : « Mais c'est ridiculement évident ! » Les bureaucrates
des "
@@ -1321,18 +1418,44 @@
"historiques définissent si un brevet est valide."
#. type: Content of: <p>
-msgid ""
-"In fact, it is a weird thing that the <a href=\"http://www.delphion.com/"
-"details?pn=US04873662__\">British Telecom following hyper links together "
-"with telephone access patent</a>, I think, was applied for in 1975. I think "
-"it was in 1974 that I developed the info package for the first time. The "
-"info package allows you to traverse hyper links and people did use "
-"telephones to dial up and access the system. So in fact, I produced a piece "
-"of prior art for that patent. So that is the second patentable idea I have "
-"had in my life, but I don't think I have any proof of that. I didn't think "
-"this was interesting enough to publish it. After all, the idea of following "
-"hyper links I got from the demo of Engelbart's editor. He is the one who "
-"had an idea which was interesting to publish."
+# | In fact, it is a weird thing that the <a
+# | [-href=\"http://www.delphion.com/details?pn=US04873662__\">British-]
+# | {+href=\"https://patents.justia.com/patent/4873662\"> British+} Telecom
+# | following hyper links together with telephone access patent</a>, I think,
+# | was applied for in 1975. I think it was in 1974 that I developed the info
+# | package for the first time. The info package allows you to traverse hyper
+# | links and people did use telephones to dial up and access the system. So
+# | in fact, I produced a piece of prior art for that patent. So that is the
+# | second patentable idea I have had in my life, but I don't think I have any
+# | proof of that. I didn't think this was interesting enough to publish it.
+# | After all, the idea of following hyper links I got from the demo of
+# | Engelbart's editor. He is the one who had an idea which was interesting
+# | to publish.
+#, fuzzy
+#| msgid ""
+#| "In fact, it is a weird thing that the <a href=\"http://www.delphion.com/"
+#| "details?pn=US04873662__\">British Telecom following hyper links together "
+#| "with telephone access patent</a>, I think, was applied for in 1975. I "
+#| "think it was in 1974 that I developed the info package for the first "
+#| "time. The info package allows you to traverse hyper links and people did "
+#| "use telephones to dial up and access the system. So in fact, I produced "
+#| "a piece of prior art for that patent. So that is the second patentable "
+#| "idea I have had in my life, but I don't think I have any proof of that. "
+#| "I didn't think this was interesting enough to publish it. After all, the "
+#| "idea of following hyper links I got from the demo of Engelbart's editor. "
+#| "He is the one who had an idea which was interesting to publish."
+msgid ""
+"In fact, it is a weird thing that the <a href=\"https://patents.justia.com/"
+"patent/4873662\"> British Telecom following hyper links together with "
+"telephone access patent</a>, I think, was applied for in 1975. I think it "
+"was in 1974 that I developed the info package for the first time. The info "
+"package allows you to traverse hyper links and people did use telephones to "
+"dial up and access the system. So in fact, I produced a piece of prior art "
+"for that patent. So that is the second patentable idea I have had in my "
+"life, but I don't think I have any proof of that. I didn't think this was "
+"interesting enough to publish it. After all, the idea of following hyper "
+"links I got from the demo of Engelbart's editor. He is the one who had an "
+"idea which was interesting to publish."
msgstr ""
"En fait, c'est bizarre que le <a href=\"http://www.delphion.com/details?"
"pn=US04873662__\">brevet de British Telecom pour suivre les hyperliens avec "
Index: philosophy/po/software-patents.pot
===================================================================
RCS file: /web/www/www/philosophy/po/software-patents.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- philosophy/po/software-patents.pot 9 Mar 2019 17:02:55 -0000 1.29
+++ philosophy/po/software-patents.pot 17 Mar 2019 10:32:39 -0000 1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: software-patents.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -201,19 +201,16 @@
"that there is going to be a patent and you are going to get sued."
msgstr ""
-#. This link is dead and there is nothing on their site related to
-#. the patent or LZW at all, AFAICS. yavor, 18 Jul 2008
-#. <a href="http://www.unisys.com/unisys/lzw/default.asp">
-#. patent</a>
#. type: Content of: <p>
msgid ""
"This is not just academic. In 1984, the compress program was written, a "
"program for data compression. At the time, there was no patent on the LZW "
-"compression algorithm which it used. Then in 1985, the US issued a patent "
-"on this algorithm and over the next few years, those who distributed the "
-"compress program started getting threats. There was no way that the author "
-"of compress could have realized that he was likely to get sued. All he did "
-"was use an idea that he found in a journal just like programmers have always "
+"compression algorithm which it used. Then in 1985, the US issued a <a "
+"href=\"https://patents.justia.com/patent/4558302\">patent</a> on this "
+"algorithm and over the next few years, those who distributed the compress "
+"program started getting threats. There was no way that the author of "
+"compress could have realized that he was likely to get sued. All he did was "
+"use an idea that he found in a journal just like programmers have always "
"done. He hadn't realized that you could no longer safely use ideas that you "
"found in a journal."
msgstr ""
@@ -282,18 +279,16 @@
"saying “I can't recognize my own inventions in patenteese”."
msgstr ""
-#. Link apparently not useful anymore.
-#. <a
href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/search-bool.html&r=1&f=G&l=50&co1=AND&d=pall&s1=%274486857%27.WKU.&OS=PN/4486857&RS=PN/4486857">
-#. patents</a>.
#. type: Content of: <p>
msgid ""
"This is not just theoretical. Around 1990, a programmer named <a "
"href=\"http://www.atarimagazines.com/startv2n3/hypercard.html\">Paul "
-"Heckel</a> sued Apple claiming that Hypercard infringed a couple of his "
-"patents. When he first saw Hypercard, he didn't think it had anything to do "
-"with his patent, with his “Inventions”. It didn't look "
-"similar. When his lawyer told him that you could read the patents as "
-"covering part of Hypercard, he decided to attack Apple."
+"Heckel</a> sued Apple claiming that Hypercard infringed a couple of his <a "
+"href=\"https://patents.justia.com/patent/4486857\">patents</a>. When he "
+"first saw Hypercard, he didn't think it had anything to do with his patent, "
+"with his “Inventions”. It didn't look similar. When his lawyer "
+"told him that you could read the patents as covering part of Hypercard, he "
+"decided to attack Apple."
msgstr ""
#. type: Content of: <p>
@@ -388,13 +383,13 @@
#. type: Content of: <p>
msgid ""
"What do you do with the <a "
-"href=\"https://web.archive.org/web/20060115162715/http://www.delphion.com/details?pn=US04873662__\">
"
-"British Telecom patent</a> on traversing hyper links together with dial-up "
-"access? Traversing hyper links is absolutely essential to a major use of "
-"computers these days. Dial-up access is also essential. How do you do "
-"without this feature, which, by the way, isn't even one feature, it is "
-"really a combination of two just arbitrarily juxtaposed. It is rather like "
-"having a patent on a sofa and television in the same room."
+"href=\"https://patents.justia.com/patent/4873662\">British Telecom "
+"patent</a> on traversing hyper links together with dial-up access? "
+"Traversing hyper links is absolutely essential to a major use of computers "
+"these days. Dial-up access is also essential. How do you do without this "
+"feature, which, by the way, isn't even one feature, it is really a "
+"combination of two just arbitrarily juxtaposed. It is rather like having a "
+"patent on a sofa and television in the same room."
msgstr ""
#. type: Content of: <p>
@@ -410,10 +405,10 @@
#. type: Content of: <p>
msgid ""
"Then, one program got away. The program <a "
-"href=\"https://web.archive.org/web/20170315023711/http://www.pgpi.org/\">PGP</a>,
"
-"which initially was released as free software. Apparently, the patent "
-"holders by the time they got around to attacking, realized they might get "
-"too much bad publicity. So they imposed restrictions making it for "
+"href=\"https://web.archive.org/web/20170315023711/http://www.pgpi.org/\"> "
+"PGP</a>, which initially was released as free software. Apparently, the "
+"patent holders by the time they got around to attacking, realized they might "
+"get too much bad publicity. So they imposed restrictions making it for "
"non-commercial use only, which meant it couldn't catch on too much. So they "
"greatly limited the use of Public Key Encryption for a decade or more. "
"There was no way around that patent. There was nothing else you could do "
@@ -772,23 +767,21 @@
"mental space you can get away with."
msgstr ""
-#. Another dead link.
-#. <a href="http://people.qualcomm.com/karn/patents/patent-comments.html">
-#
-#. obvious</a>!
#. type: Content of: <p>
msgid ""
"When programmers look at a lot of software patents, they say this is "
-"ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
-"justify ignoring what programmers think. They say “Oh! But you have "
-"to consider it in terms of the way things were 10 or 20 years ago”. "
-"Then they discovered that if they talk something to death then you can "
-"eventually lose your bearings. Anything can look unobvious if you tear it "
-"apart enough, analyze it enough. You simply lose all standard of "
-"obviousness or at least lose the ability to justify any standard of obvious "
-"or unobvious. Then, of course, they describe the patent holders as "
-"brilliant inventors, all of them. Therefore we can't question their "
-"entitlement to power over what we can do."
+"ridiculously <a "
+"href=\"https://web.archive.org/web/20040604051644/http://people.qualcomm.com/karn/patents/patent-comments.html\">
"
+"obvious</a>! Patent bureaucrats have all sorts of excuses to justify "
+"ignoring what programmers think. They say “Oh! But you have to "
+"consider it in terms of the way things were 10 or 20 years ago”. Then "
+"they discovered that if they talk something to death then you can eventually "
+"lose your bearings. Anything can look unobvious if you tear it apart "
+"enough, analyze it enough. You simply lose all standard of obviousness or "
+"at least lose the ability to justify any standard of obvious or unobvious. "
+"Then, of course, they describe the patent holders as brilliant inventors, "
+"all of them. Therefore we can't question their entitlement to power over "
+"what we can do."
msgstr ""
#. type: Content of: <p>
@@ -813,7 +806,7 @@
#. type: Content of: <p>
msgid ""
"In fact, it is a weird thing that the <a "
-"href=\"http://www.delphion.com/details?pn=US04873662__\">British Telecom "
+"href=\"https://patents.justia.com/patent/4873662\"> British Telecom "
"following hyper links together with telephone access patent</a>, I think, "
"was applied for in 1975. I think it was in 1974 that I developed the info "
"package for the first time. The info package allows you to traverse hyper "
Index: philosophy/po/software-patents.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/software-patents.ru.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- philosophy/po/software-patents.ru.po 9 Mar 2019 18:05:20 -0000
1.41
+++ philosophy/po/software-patents.ru.po 17 Mar 2019 10:32:39 -0000
1.42
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: software-patents.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-03-09 17:00+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Software Patents - GNU Project - Free Software Foundation"
@@ -310,21 +311,40 @@
"пÑогÑÐ°Ð¼Ð¼Ñ Ð¸ даже вÑпÑÑÑиÑÑ ÐµÐµ, не знаÑ, ÑÑо
бÑÐ´ÐµÑ Ð²Ñдан паÑенÑ, а на Ð²Ð°Ñ "
"подадÑÑ Ð² ÑÑд."
-#. This link is dead and there is nothing on their site related to
-#. the patent or LZW at all, AFAICS. yavor, 18 Jul 2008
-#. <a href="http://www.unisys.com/unisys/lzw/default.asp">
-#. patent</a>
#. type: Content of: <p>
+# | This is not just academic. In 1984, the compress program was written, a
+# | program for data compression. At the time, there was no patent on the LZW
+# | compression algorithm which it used. Then in 1985, the US issued a
+# | [-patent-] {+<a
+# | href=\"https://patents.justia.com/patent/4558302\">patent</a>+} on this
+# | algorithm and over the next few years, those who distributed the compress
+# | program started getting threats. There was no way that the author of
+# | compress could have realized that he was likely to get sued. All he did
+# | was use an idea that he found in a journal just like programmers have
+# | always done. He hadn't realized that you could no longer safely use ideas
+# | that you found in a journal.
+#, fuzzy
+#| msgid ""
+#| "This is not just academic. In 1984, the compress program was written, a "
+#| "program for data compression. At the time, there was no patent on the "
+#| "LZW compression algorithm which it used. Then in 1985, the US issued a "
+#| "patent on this algorithm and over the next few years, those who "
+#| "distributed the compress program started getting threats. There was no "
+#| "way that the author of compress could have realized that he was likely to "
+#| "get sued. All he did was use an idea that he found in a journal just "
+#| "like programmers have always done. He hadn't realized that you could no "
+#| "longer safely use ideas that you found in a journal."
msgid ""
"This is not just academic. In 1984, the compress program was written, a "
"program for data compression. At the time, there was no patent on the LZW "
-"compression algorithm which it used. Then in 1985, the US issued a patent "
-"on this algorithm and over the next few years, those who distributed the "
-"compress program started getting threats. There was no way that the author "
-"of compress could have realized that he was likely to get sued. All he did "
-"was use an idea that he found in a journal just like programmers have always "
-"done. He hadn't realized that you could no longer safely use ideas that you "
-"found in a journal."
+"compression algorithm which it used. Then in 1985, the US issued a <a href="
+"\"https://patents.justia.com/patent/4558302\">patent</a> on this algorithm "
+"and over the next few years, those who distributed the compress program "
+"started getting threats. There was no way that the author of compress could "
+"have realized that he was likely to get sued. All he did was use an idea "
+"that he found in a journal just like programmers have always done. He "
+"hadn't realized that you could no longer safely use ideas that you found in "
+"a journal."
msgstr ""
"ÐÑо не пÑоÑÑо ÑеоÑеÑиÑеÑÐºÐ°Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ.
Ð 1984 Ð³Ð¾Ð´Ñ Ð±Ñла напиÑана "
"пÑогÑамма compress, пÑогÑамма Ð´Ð»Ñ ÑжаÑиÑ
даннÑÑ
. Ð Ñо вÑÐµÐ¼Ñ Ð°Ð»Ð³Ð¾ÑиÑм LZW, "
@@ -445,18 +465,34 @@
"ÑлиÑком ÑÑÑдно. Ðо вÑÑÐ°Ð¶ÐµÐ½Ð¸Ñ Ð¾Ð´Ð½Ð¾Ð³Ð¾
инженеÑа, “в ÑÑиÑ
дебÑÑÑ
Ñ Ð½Ðµ "
"ÑÐ·Ð½Ð°Ñ ÑвоиÑ
ÑобÑÑвеннÑÑ
изобÑеÑений”."
-#. Link apparently not useful anymore.
-#. <a
href="http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=/netahtml/search-bool.html&r=1&f=G&l=50&co1=AND&d=pall&s1=%274486857%27.WKU.&OS=PN/4486857&RS=PN/4486857">
-#. patents</a>.
#. type: Content of: <p>
+# | This is not just theoretical. Around 1990, a programmer named <a
+# | href=\"http://www.atarimagazines.com/startv2n3/hypercard.html\">Paul
+# | Heckel</a> sued Apple claiming that Hypercard infringed a couple of his
+# | [-patents.-] {+<a
+# | href=\"https://patents.justia.com/patent/4486857\">patents</a>.+} When he
+# | first saw Hypercard, he didn't think it had anything to do with his
+# | patent, with his “Inventions”. It didn't look similar. When
+# | his lawyer told him that you could read the patents as covering part of
+# | Hypercard, he decided to attack Apple.
+#, fuzzy
+#| msgid ""
+#| "This is not just theoretical. Around 1990, a programmer named <a href="
+#| "\"http://www.atarimagazines.com/startv2n3/hypercard.html\">Paul Heckel</"
+#| "a> sued Apple claiming that Hypercard infringed a couple of his patents. "
+#| "When he first saw Hypercard, he didn't think it had anything to do with "
+#| "his patent, with his “Inventions”. It didn't look similar. "
+#| "When his lawyer told him that you could read the patents as covering part "
+#| "of Hypercard, he decided to attack Apple."
msgid ""
"This is not just theoretical. Around 1990, a programmer named <a href="
"\"http://www.atarimagazines.com/startv2n3/hypercard.html\">Paul Heckel</a> "
-"sued Apple claiming that Hypercard infringed a couple of his patents. When "
-"he first saw Hypercard, he didn't think it had anything to do with his "
-"patent, with his “Inventions”. It didn't look similar. When "
-"his lawyer told him that you could read the patents as covering part of "
-"Hypercard, he decided to attack Apple."
+"sued Apple claiming that Hypercard infringed a couple of his <a href="
+"\"https://patents.justia.com/patent/4486857\">patents</a>. When he first "
+"saw Hypercard, he didn't think it had anything to do with his patent, with "
+"his “Inventions”. It didn't look similar. When his lawyer told "
+"him that you could read the patents as covering part of Hypercard, he "
+"decided to attack Apple."
msgstr ""
"ÐÑо не пÑоÑÑо абÑÑÑакÑÐ½Ð°Ñ ÑеоÑиÑ. Ðде-Ñо в
1990 Ð³Ð¾Ð´Ñ Ð¿ÑогÑаммиÑÑ Ð¿Ð¾ "
"имени <a
href=\"http://www.atarimagazines.com/startv2n3/hypercard.html\"> "
@@ -596,15 +632,33 @@
"ÐÑо доволÑно Ñзкий паÑÐµÐ½Ñ Ð½Ð° оÑенÑ
ÑпеÑиÑиÑеÑкÑÑ ÑÑнкÑиÑ."
#. type: Content of: <p>
-msgid ""
-"What do you do with the <a href=\"https://web.archive.org/web/20060115162715/"
-"http://www.delphion.com/details?pn=US04873662__\"> British Telecom patent</"
-"a> on traversing hyper links together with dial-up access? Traversing hyper "
-"links is absolutely essential to a major use of computers these days. Dial-"
-"up access is also essential. How do you do without this feature, which, by "
-"the way, isn't even one feature, it is really a combination of two just "
-"arbitrarily juxtaposed. It is rather like having a patent on a sofa and "
-"television in the same room."
+# | What do you do with the <a
+# |
[-href=\"https://web.archive.org/web/20060115162715/http://www.delphion.com/details?pn=US04873662__\">
+# | British-] {+href=\"https://patents.justia.com/patent/4873662\">British+}
+# | Telecom patent</a> on traversing hyper links together with dial-up access?
+# | Traversing hyper links is absolutely essential to a major use of computers
+# | these days. Dial-up access is also essential. How do you do without this
+# | feature, which, by the way, isn't even one feature, it is really a
+# | combination of two just arbitrarily juxtaposed. It is rather like having
+# | a patent on a sofa and television in the same room.
+#, fuzzy
+#| msgid ""
+#| "What do you do with the <a href=\"https://web.archive.org/"
+#| "web/20060115162715/http://www.delphion.com/details?pn=US04873662__\"> "
+#| "British Telecom patent</a> on traversing hyper links together with dial-"
+#| "up access? Traversing hyper links is absolutely essential to a major use "
+#| "of computers these days. Dial-up access is also essential. How do you "
+#| "do without this feature, which, by the way, isn't even one feature, it is "
+#| "really a combination of two just arbitrarily juxtaposed. It is rather "
+#| "like having a patent on a sofa and television in the same room."
+msgid ""
+"What do you do with the <a href=\"https://patents.justia.com/"
+"patent/4873662\">British Telecom patent</a> on traversing hyper links "
+"together with dial-up access? Traversing hyper links is absolutely essential "
+"to a major use of computers these days. Dial-up access is also essential. "
+"How do you do without this feature, which, by the way, isn't even one "
+"feature, it is really a combination of two just arbitrarily juxtaposed. It "
+"is rather like having a patent on a sofa and television in the same room."
msgstr ""
"Ð ÑÑо делаÑÑ Ñ <a
href=\"https://web.archive.org/web/20060115162715/http://"
"www.delphion.com/details?pn=US04873662__\"> паÑенÑом British
Telecom</a> на "
@@ -634,9 +688,28 @@
"ÑгÑозами."
#. type: Content of: <p>
+# | Then, one program got away. The program <a
+# | href=\"https://web.archive.org/web/20170315023711/http://www.pgpi.org/\">{+
+# | +}PGP</a>, which initially was released as free software. Apparently, the
+# | patent holders by the time they got around to attacking, realized they
+# | might get too much bad publicity. So they imposed restrictions making it
+# | for non-commercial use only, which meant it couldn't catch on too much.
+# | So they greatly limited the use of Public Key Encryption for a decade or
+# | more. There was no way around that patent. There was nothing else you
+# | could do like that.
+#, fuzzy
+#| msgid ""
+#| "Then, one program got away. The program <a href=\"https://web.archive."
+#| "org/web/20170315023711/http://www.pgpi.org/\">PGP</a>, which initially "
+#| "was released as free software. Apparently, the patent holders by the "
+#| "time they got around to attacking, realized they might get too much bad "
+#| "publicity. So they imposed restrictions making it for non-commercial use "
+#| "only, which meant it couldn't catch on too much. So they greatly limited "
+#| "the use of Public Key Encryption for a decade or more. There was no way "
+#| "around that patent. There was nothing else you could do like that."
msgid ""
"Then, one program got away. The program <a href=\"https://web.archive.org/"
-"web/20170315023711/http://www.pgpi.org/\">PGP</a>, which initially was "
+"web/20170315023711/http://www.pgpi.org/\"> PGP</a>, which initially was "
"released as free software. Apparently, the patent holders by the time they "
"got around to attacking, realized they might get too much bad publicity. So "
"they imposed restrictions making it for non-commercial use only, which meant "
@@ -1235,22 +1308,46 @@
"заÑ
ваÑиÑÑ Ð¿Ñи Ñаком подÑ
оде."
#
-#. Another dead link.
-#. <a href="http://people.qualcomm.com/karn/patents/patent-comments.html">
-#. obvious</a>!
#. type: Content of: <p>
+# | When programmers look at a lot of software patents, they say this is
+# | ridiculously [-obvious!-] {+<a
+# |
href=\"https://web.archive.org/web/20040604051644/http://people.qualcomm.com/karn/patents/patent-comments.html\">
+# | obvious</a>!+} Patent bureaucrats have all sorts of excuses to justify
+# | ignoring what programmers think. They say “Oh! But you have to
+# | consider it in terms of the way things were 10 or 20 years ago”.
+# | Then they discovered that if they talk something to death then you can
+# | eventually lose your bearings. Anything can look unobvious if you tear it
+# | apart enough, analyze it enough. You simply lose all standard of
+# | obviousness or at least lose the ability to justify any standard of
+# | obvious or unobvious. Then, of course, they describe the patent holders
+# | as brilliant inventors, all of them. Therefore we can't question their
+# | entitlement to power over what we can do.
+#, fuzzy
+#| msgid ""
+#| "When programmers look at a lot of software patents, they say this is "
+#| "ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
+#| "justify ignoring what programmers think. They say “Oh! But you "
+#| "have to consider it in terms of the way things were 10 or 20 years "
+#| "ago”. Then they discovered that if they talk something to death "
+#| "then you can eventually lose your bearings. Anything can look unobvious "
+#| "if you tear it apart enough, analyze it enough. You simply lose all "
+#| "standard of obviousness or at least lose the ability to justify any "
+#| "standard of obvious or unobvious. Then, of course, they describe the "
+#| "patent holders as brilliant inventors, all of them. Therefore we can't "
+#| "question their entitlement to power over what we can do."
msgid ""
"When programmers look at a lot of software patents, they say this is "
-"ridiculously obvious! Patent bureaucrats have all sorts of excuses to "
-"justify ignoring what programmers think. They say “Oh! But you have "
-"to consider it in terms of the way things were 10 or 20 years ago”. "
-"Then they discovered that if they talk something to death then you can "
-"eventually lose your bearings. Anything can look unobvious if you tear it "
-"apart enough, analyze it enough. You simply lose all standard of "
-"obviousness or at least lose the ability to justify any standard of obvious "
-"or unobvious. Then, of course, they describe the patent holders as "
-"brilliant inventors, all of them. Therefore we can't question their "
-"entitlement to power over what we can do."
+"ridiculously <a href=\"https://web.archive.org/web/20040604051644/http://"
+"people.qualcomm.com/karn/patents/patent-comments.html\"> obvious</a>! Patent "
+"bureaucrats have all sorts of excuses to justify ignoring what programmers "
+"think. They say “Oh! But you have to consider it in terms of the way "
+"things were 10 or 20 years ago”. Then they discovered that if they "
+"talk something to death then you can eventually lose your bearings. "
+"Anything can look unobvious if you tear it apart enough, analyze it enough. "
+"You simply lose all standard of obviousness or at least lose the ability to "
+"justify any standard of obvious or unobvious. Then, of course, they "
+"describe the patent holders as brilliant inventors, all of them. Therefore "
+"we can't question their entitlement to power over what we can do."
msgstr ""
"Ðогда пÑогÑаммиÑÑÑ Ð·Ð°Ð³Ð»ÑдÑваÑÑ Ð² паÑенÑÑ
на пÑогÑаммÑ, они ÑаÑÑо говоÑÑÑ, "
"ÑÑо ÑÑо оÑевидно до ÑмеÑного. У паÑенÑнÑÑ
бÑÑокÑаÑов еÑÑÑ Ð²ÑевозможнÑе "
@@ -1297,18 +1394,44 @@
"иÑÑоÑиÑеÑкиÑ
ÑлÑÑайноÑÑей опÑеделÑеÑ,
дейÑÑвиÑелен ли паÑенÑ."
#. type: Content of: <p>
-msgid ""
-"In fact, it is a weird thing that the <a href=\"http://www.delphion.com/"
-"details?pn=US04873662__\">British Telecom following hyper links together "
-"with telephone access patent</a>, I think, was applied for in 1975. I think "
-"it was in 1974 that I developed the info package for the first time. The "
-"info package allows you to traverse hyper links and people did use "
-"telephones to dial up and access the system. So in fact, I produced a piece "
-"of prior art for that patent. So that is the second patentable idea I have "
-"had in my life, but I don't think I have any proof of that. I didn't think "
-"this was interesting enough to publish it. After all, the idea of following "
-"hyper links I got from the demo of Engelbart's editor. He is the one who "
-"had an idea which was interesting to publish."
+# | In fact, it is a weird thing that the <a
+# | [-href=\"http://www.delphion.com/details?pn=US04873662__\">British-]
+# | {+href=\"https://patents.justia.com/patent/4873662\"> British+} Telecom
+# | following hyper links together with telephone access patent</a>, I think,
+# | was applied for in 1975. I think it was in 1974 that I developed the info
+# | package for the first time. The info package allows you to traverse hyper
+# | links and people did use telephones to dial up and access the system. So
+# | in fact, I produced a piece of prior art for that patent. So that is the
+# | second patentable idea I have had in my life, but I don't think I have any
+# | proof of that. I didn't think this was interesting enough to publish it.
+# | After all, the idea of following hyper links I got from the demo of
+# | Engelbart's editor. He is the one who had an idea which was interesting
+# | to publish.
+#, fuzzy
+#| msgid ""
+#| "In fact, it is a weird thing that the <a href=\"http://www.delphion.com/"
+#| "details?pn=US04873662__\">British Telecom following hyper links together "
+#| "with telephone access patent</a>, I think, was applied for in 1975. I "
+#| "think it was in 1974 that I developed the info package for the first "
+#| "time. The info package allows you to traverse hyper links and people did "
+#| "use telephones to dial up and access the system. So in fact, I produced "
+#| "a piece of prior art for that patent. So that is the second patentable "
+#| "idea I have had in my life, but I don't think I have any proof of that. "
+#| "I didn't think this was interesting enough to publish it. After all, the "
+#| "idea of following hyper links I got from the demo of Engelbart's editor. "
+#| "He is the one who had an idea which was interesting to publish."
+msgid ""
+"In fact, it is a weird thing that the <a href=\"https://patents.justia.com/"
+"patent/4873662\"> British Telecom following hyper links together with "
+"telephone access patent</a>, I think, was applied for in 1975. I think it "
+"was in 1974 that I developed the info package for the first time. The info "
+"package allows you to traverse hyper links and people did use telephones to "
+"dial up and access the system. So in fact, I produced a piece of prior art "
+"for that patent. So that is the second patentable idea I have had in my "
+"life, but I don't think I have any proof of that. I didn't think this was "
+"interesting enough to publish it. After all, the idea of following hyper "
+"links I got from the demo of Engelbart's editor. He is the one who had an "
+"idea which was interesting to publish."
msgstr ""
"Ðа Ñамом деле доволÑно ÑÑÑанно, ÑÑо заÑвка
на <a href=\"http://www.delphion."
"com/details?pn=US04873662__\"> паÑÐµÐ½Ñ British Telecom на пеÑеÑ
од по "
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/de.po 13 Mar 2019 11:00:58 -0000 1.49
+++ proprietary/po/de.po 17 Mar 2019 10:32:39 -0000 1.50
@@ -3107,11 +3107,21 @@
"Ist ein Produkt âsmartâ und wurde nicht von einem selbst konstruieren, "
"scheint es geschickt dem Hersteller zu dienen ‑ gegen einen."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"Einige <a href=\"//www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\" title=\"Backdoor found in D-Link "
@@ -4962,7 +4972,8 @@
"termsofservice.html\">Abschnitt 4 der EULA</a>."
# | In Android, <a
-# |
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
# | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
# | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
# | which seems since then to have been merged into Google Play.)+}
@@ -4974,9 +4985,9 @@
#| "has a back door to remotely delete apps.</a> (It is in a program called "
#| "GTalkService)."
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"Google hat in <a href=\"//www.computerworld.com/article/2506557/security0/"
@@ -5761,7 +5772,7 @@
# | [-<a
# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]Windows
# | 8 also has a back door for {+<a
-# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# |
href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
# | remotely deleting apps</a>.
#. type: Content of: <ul><li><p>
#, fuzzy
@@ -5770,9 +5781,9 @@
#| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
#| "has a back door for remotely deleting apps</a>."
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"<a href=\"https://www.computerworld.com/article/2500036/desktop-apps/"
"microsoft--we-can-remotely-delete-windows-8-apps.html\" title=\"Microsoft: "
@@ -5942,12 +5953,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -6267,12 +6278,22 @@
msgid "Microsoft Subscriptions"
msgstr "Abonnements"
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office erzwingt ein <a href=\"https://www.computerworld.com/"
"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
@@ -6656,7 +6677,7 @@
# |
href=\"http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
# |
[-href=\"https://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\">-]
-# |
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
# | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
# | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\">
# | secret NSA key in Windows</a>, whose functions we don't know.
@@ -6673,11 +6694,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Spähprogramm in Windows: <a href=\"http://www.theregister.co.uk/2003/02/28/"
"windows_update_keeps_tabs/\" title=\"Windows Update keeps tabs on all system "
@@ -6721,11 +6742,20 @@
"\">S Modus</a>. Hauptunterschied zu Windows 10 S ist eine einfache "
"Möglichkeit, den S-Modus auszuschalten."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"https://www.itworld.com/article/2832657/operating-systems/"
"microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app store "
@@ -10577,15 +10607,33 @@
"cars-in-florida-to-help-people-evacuate/ 2017.\">nur einen begrenzten Teil "
"der Batterie in einigen Autos nutzen konnten</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"//www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\" "
@@ -10635,8 +10683,9 @@
"lediglich als sachbezogene Referenz dienen."
# | In 2014, <a
-# |
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">{+
-# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+# |
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">Oracle-]
+# |
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\">
+# | Oracle+} insisted on continuing this [-practice.</a>-] {+practice</a>.+}
#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
@@ -10644,9 +10693,9 @@
#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
#| "\">Oracle insisted on continuing this practice.</a>"
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"201<ins>3</ins> <a href=\"//www.computerworld.com/article/2494794/malware-"
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\" "
@@ -11767,6 +11816,166 @@
"id=\"tn01-ref\" class=\"transnote\">[1]</a>."
#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "Einige <a href=\"//www.itworld.com/article/2705284/data-protection/"
+#~ "backdoor-found-in-d-link-router-firmware-code.html\" title=\"Backdoor "
+#~ "found in D-Link router firmware code, unter: itworld.com 2013.\">D-Link "
+#~ "Router haben Hintertür</a> zum Ãndern von Einstellungen.<a
href=\"#tn03\" "
+#~ "id=\"tn03-ref\" class=\"transnote\">[3]</a>"
+
+# | In Android, <a
+# |
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
+# | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
+# | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
+# | which seems since then to have been merged into Google Play.)+}
+#, fuzzy
+#~| msgid ""
+#~| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~| "has a back door to remotely delete apps.</a> (It is in a program called "
+#~| "GTalkService)."
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "Google hat in <a href=\"//www.computerworld.com/article/2506557/security0/"
+#~ "google-throws--kill-switch--on-android-phones.html\" title=\"Google "
+#~ "throws 'kill switch' on Android phones, unter: computerworld.com 2011."
+#~ "\">Android eine Hintertür, um Applikationen aus der Ferne zu löschen</a>
"
+#~ "(sie befindet sich in einem Programm namens <em>GTalkService</em> <ins>"
+#~ "[das über den Dienst <em>Google Play</em> aufgerufen wird, A. d. Ã.]</"
+#~ "ins>).<!--a href=\"#tn02\" id=\"tn02-ref\" class=\"transnote\">[2]</a -->"
+
+# | [-<a
+# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]Windows
+# | 8 also has a back door for {+<a
+# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
+#~| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
+#~| "has a back door for remotely deleting apps</a>."
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.computerworld.com/article/2500036/desktop-apps/"
+#~ "microsoft--we-can-remotely-delete-windows-8-apps.html\" title="
+#~ "\"Microsoft: We can remotely delete Windows 8 apps, unter: computerworld."
+#~ "com 2011.\">Windows 8 hat ebenfalls eine Hintertür zum rechnerfernen "
+#~ "löschen von Anwendungssoftware</a>."
+
+#~ msgid ""
+#~ "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#~ "Office 365 to be able to create/edit documents</a>."
+#~ msgstr ""
+#~ "Microsoft Office erzwingt ein <a href=\"https://www.computerworld.com/"
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\" title=\"Office for "
+#~ "Windows 10 will require Office 365 subscription on PCs, larger tablets, "
+#~ "IDG Communications 2018.\">Office 365-Abo</a> um Dokumente erstellen bzw. "
+#~ "bearbeiten zu können."
+
+# (fix) http_s_://www.infoworld.com â¦
+# | Spyware in {+older versions of+} Windows: <a
+# |
href=\"http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
+# |
[-href=\"https://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
+# | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\">
+# | secret NSA key in Windows</a>, whose functions we don't know.
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Windows: <a href=\"http://www.theregister.co.uk/2003/02/28/"
+#~| "windows_update_keeps_tabs/\"> Windows Update snoops on the user.</a> <a "
+#~| "href=\"https://www.infoworld.com/t/microsoft-windows/look-the-black-"
+#~| "underbelly-of-windows-81-blue-222175\"> Windows 8.1 snoops on local "
+#~| "searches.</a> And there's a <a href=\"http://www.marketoracle.co.uk/"
+#~| "Article40836.html\"> secret NSA key in Windows</a>, whose functions we "
+#~| "don't know."
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "Spähprogramm in Windows: <a href=\"http://www.theregister.co."
+#~ "uk/2003/02/28/windows_update_keeps_tabs/\" title=\"Windows Update keeps "
+#~ "tabs on all system software, unter: theregister.co.uk 2003\">Windows "
+#~ "Update schnüffelt dem Benutzer hinterher</a>. <a href=\"http://www."
+#~ "infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-"
+#~ "blue-222175\" title=\"A look at the black underbelly of Windows 8.1 "
+#~ "'Blue', unter: infoworld.com 2013.\">Windows 8.1 schnüffelt in lokaler "
+#~ "Suche herum</a>. Und es gibt einen <a href=\"http://www.marketoracle.co."
+#~ "uk/Article40836.html\" title=\"NSA Built Back Door In All Microsoft "
+#~ "Windows Software Since 1999, unter: marketoracle.co.uk 2013\">geheimen "
+#~ "NSA-Schlüssel in Windows</a>, dessen Funktionen wir nicht kennen."
+
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#~ "devices” (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"https://www.itworld.com/article/2832657/operating-systems/"
+#~ "microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app "
+#~ "store lock down, IDG Communications 2018.\">Windows 8 auf "
+#~ "âMobilgerätenâ <em>war</em> ein Gefängnis.</a>"
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs. Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a “clean” Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "<a href=\"//www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\" "
+#~ "title=\"Lenovo collects usage data on ThinkPad, ThinkCentre and "
+#~ "ThinkStation PCs, unter: computerworld.com 2015.\">Lenovo installiert(e) "
+#~ "heimlich <i>unerwünschte vorinstallierte Software</i> (âCrapwareâ)
via "
+#~ "BIOS</a> auf Windows-Installationen. <em>Beachten Sie</em>, dass diese "
+#~ "konkrete von Lenovo verwendete <strong>Sabotage-Methode keinerlei "
+#~ "Einfluss auf GNU-Systeme</strong> (mit Linux-Kern) hatte; auch ist eine "
+#~ "âsaubereâ Windows-Installation nicht wirklich sauber, da <a href=\"/"
+#~ "proprietary/malware-microsoft\">Microsoft eigene Schadprogramme einbaut</"
+#~ "a>."
+
+# | In 2014, <a
+# |
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">{+
+# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+#, fuzzy
+#~| msgid ""
+#~| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~| "\">Oracle insisted on continuing this practice.</a>"
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "201<ins>3</ins> <a href=\"//www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\" title=\"Oracle will continue to bundle âcrapwareâ with Java, unter:
"
+#~ "computerworld.com 2013.\">bestand Oracle darauf, diese Praxis "
+#~ "fortzusetzen</a>."
+
+#~ msgid ""
#~ "Apps that include <a href=\"http://techaeris.com/2016/01/13/symphony-"
#~ "advanced-media-software-tracks-your-digital-life-through-your-smartphone-"
#~ "mic/\"> Symphony surveillance software snoop on what radio and TV "
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary/po/es.po 14 Mar 2019 11:30:41 -0000 1.66
+++ proprietary/po/es.po 17 Mar 2019 10:32:39 -0000 1.67
@@ -2335,9 +2335,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3530,25 +3530,31 @@
"en la <a href=\"https://www.google.com/intl/en/chromebook/termsofservice.html"
"\">sección 4 del Acuerdo de Licencia de Usuario Final</a>."
+# | In Android, <a
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
-#| "has a back door to remotely delete apps.</a> (It was in a program called "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
#| "GTalkService, which seems since then to have been merged into Google "
#| "Play.)"
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"En Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\">Google tiene una puerta "
-"trasera para eliminar aplicaciones de forma remota</a>. (Estaba en un "
-"programa llamado GTalkService, que posteriormente parece haber sido "
-"integrado en Google Play)."
+"google-throws--kill-switch--on-android-phones.html\"> Google ha dispuesto "
+"una puerta trasera para borrar aplicaciones de forma remota</a>. (Esto lo "
+"hacÃa con un programa llamado GTalkService, al parecer integrado en Google "
+"Play desde entonces)."
#. type: Content of: <ul><li><p>
#, fuzzy
@@ -4241,11 +4247,20 @@
"reprogramable para microprocesadores Intel y AMD</a> puede ser un medio para "
"que la NSA acceda a los ordenadores con la ayuda de Microsoft."
+# | Windows 8 also has a back door for <a
+# |
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# | remotely deleting apps</a>.
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"Windows 8 también tiene una puerta trasera para <a href=\"http://www."
"computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-"
@@ -4391,16 +4406,39 @@
"tab=AllReplies#tabs\">reduce drásticamente el rendimiento de los ordenadores
"
"con Windows 10</a>, y no puede deshabilitarse con facilidad."
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# |
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">+}
+# | repeatedly switched on a flag that urged users to “upgrade” to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no. To do this, Microsoft used <a
+# |
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\">
+# | malware techniques</a>.
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to “upgrade” to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no. To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co."
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
"Tras <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -4660,12 +4698,22 @@
msgid "Microsoft Subscriptions"
msgstr "Suscripciones de Microsoft"
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office obliga a los usuarios a <a href=\"https://www.computerworld."
"com/article/2948755/windows-apps/office-for-windows-10-will-require-"
@@ -4925,15 +4973,32 @@
"www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data"
"\"> especÃficamente para espiar</a>."
+# | Spyware in older versions of Windows: <a
+# |
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the user</a>. <a
+# |
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key
+# | in Windows</a>, whose functions we don't know.
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Código espÃÂa en versiones antiguas de Windows: <a href=\"https://www."
"theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"><i>Windows Update</"
@@ -4971,11 +5036,20 @@
"principal diferencia con Windows 10 S es que existe una manera sencilla de "
"salir del modo S."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\">Windows 8 para «dispositivos móviles» (ya
"
@@ -8141,13 +8215,13 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -8174,9 +8248,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
#. type: Content of: <title>
@@ -9026,6 +9100,97 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\"> Los "
"procesadores Intel incorporarán software tirano</a>."
+#, fuzzy
+#~| msgid ""
+#~| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~| "has a back door to remotely delete apps.</a> (It was in a program called "
+#~| "GTalkService, which seems since then to have been merged into Google "
+#~| "Play.)"
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "En Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\">Google "
+#~ "tiene una puerta trasera para eliminar aplicaciones de forma remota</a>. "
+#~ "(Estaba en un programa llamado GTalkService, que posteriormente parece "
+#~ "haber sido integrado en Google Play)."
+
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "Windows 8 también tiene una puerta trasera para <a href=\"http://www."
+#~ "computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-"
+#~ "delete-windows-8-apps.html\">cancelar aplicaciones de forma remota</a>."
+
+#~ msgid ""
+#~ "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">forcing the download of Windows 10</a> on computers that were running "
+#~ "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#~ "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#~ "urged users to “upgrade” to Windows 10</a> when they had "
+#~ "turned it off, in the hope that some day they would fail to say no. To "
+#~ "do this, Microsoft used <a href=\"https://www.theregister.co."
+#~ "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#~ "techniques</a>."
+#~ msgstr ""
+#~ "Tras <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">forzar la descarga de Windows 10</a> en ordenadores que funcionaban "
+#~ "con Windows 7 y 8, Microsoft <a href=\"http://www.computerworld.com/"
+#~ "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\">hacÃa reaparecer reiteradamente una "
+#~ "indicación que instaba a los usuarios a «actualizar» a Windows 10</a>, "
+#~ "aunque estos ya lo hubieran rechazado con anterioridad, con la esperanza "
+#~ "de que alguna vez erraran. Para hacerlo, Microsoft utilizó <a href="
+#~ "\"https://www.theregister.co.uk/2016/03/17/"
+#~ "microsoft_windows_10_upgrade_gwx_vs_humanity/\">técnicas de "
+#~ "<cite>malware</cite> techniques</a>."
+
+#~ msgid ""
+#~ "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#~ "Office 365 to be able to create/edit documents</a>."
+#~ msgstr ""
+#~ "Microsoft Office obliga a los usuarios a <a href=\"https://www."
+#~ "computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
+#~ "require-office-365-subscription-on-pcs-larger-tablets.html\">suscribirse "
+#~ "a Office 365 para poder crear o editar documentos</a>."
+
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "Código espÃÂa en versiones antiguas de Windows: <a href=\"https://www."
+#~ "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"><i>Windows "
+#~ "Update</i> husmea en las actividades del usuario</a>. <a href=\"https://"
+#~ "www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-"
+#~ "underbelly-of-windows-8-1--blue-.html\">Windows 8.1 rastrea las búsquedas
"
+#~ "locales</a>, y <a href=\"http://www.marketoracle.co.uk/Article40836.html"
+#~ "\"> Windows contiene una clave secreta de la <abbr title=\"National "
+#~ "Security Agency\">NSA</abbr></a> cuyas funciones desconocemos."
+
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#~ "devices” (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#~ "microsoft-metro-app-store-lock-down.html\">Windows 8 para «dispositivos "
+#~ "móviles» (ya desaparecido) era una prisión</a>."
+
#~ msgid ""
#~ "Apps that include <a href=\"http://techaeris.com/2016/01/13/symphony-"
#~ "advanced-media-software-tracks-your-digital-life-through-your-smartphone-"
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary/po/fr.po 13 Mar 2019 13:14:42 -0000 1.87
+++ proprietary/po/fr.po 17 Mar 2019 10:32:39 -0000 1.88
@@ -2565,11 +2565,21 @@
"utilise son intelligence pour servir son fabricant <em>à votre détriment</"
"em>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\">Certains routeurs D-Link</a> ont "
@@ -4039,11 +4049,24 @@
"\">l'article 4 des <abbr title=\"Contrat de Licence d'Utilisateur Final"
"\">CLUF</abbr></a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"Dans Android, <a href=\"http://www.computerworld.com/article/2506557/"
@@ -4671,11 +4694,20 @@
"pourrait fournir à la NSA un moyen d'envahir les ordinateurs, disent des "
"experts respectés en sécurité."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# |
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# | remotely deleting apps</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
"microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 a aussi "
@@ -4820,16 +4852,39 @@
"tab=AllReplies#tabs\">réduit considérablement les performances des machines
"
"sous Windows 10</a> et ne peut pas être désactivé facilement."
-#. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# |
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">+}
+# | repeatedly switched on a flag that urged users to “upgrade” to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no. To do this, Microsoft used <a
+# |
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\">
+# | malware techniques</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to “upgrade” to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no. To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co."
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
"Après avoir <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -5089,12 +5144,22 @@
msgid "Microsoft Subscriptions"
msgstr "Abonnements"
-#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office force ses utilisateurs <a href=\"https://www.computerworld."
"com/article/2948755/windows-apps/office-for-windows-10-will-require-"
@@ -5355,15 +5420,32 @@
"\"http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-"
"user-data\">dans un but précis d'espionnage</a>."
-#. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# |
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the user</a>. <a
+# |
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Espions dans les anciennes versions de Windows : <a href=\"https://www."
"theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows Update "
@@ -5401,11 +5483,20 @@
"différence principale avec Windows 10 est qu'on peut facilement sortir du "
"mode S."
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\">Feu Windows 8 pour « appareils mobilesÂ
» "
@@ -8740,15 +8831,33 @@
"cars-in-florida-to-help-people-evacuate/\">limite l'utilisation de la "
"batterie</a> par le client à une partie seulement de sa capacité."
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"
@@ -8795,11 +8904,20 @@
"Nous ne sommes pas d'accord avec ce que dit l'article sur ces questions, "
"mais nous le proposons comme référence factuelle."
-#. type: Content of: <ul><li><p>
-msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+# | In 2014, <a
+# |
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\">+}
+# | Oracle insisted on continuing this practice</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#| "\"> Oracle insisted on continuing this practice</a>."
+msgid ""
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"En 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
@@ -9772,6 +9890,127 @@
"processeurs Intel vont avoir un tyran logiciel intégré</a>."
#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#~ "found-in-d-link-router-firmware-code.html\">Certains routeurs D-Link</a> "
+#~ "ont une porte dérobée pour changer les réglages."
+
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "Dans Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\">Google a "
+#~ "une porte dérobée qui lui permet de supprimer des applications à "
+#~ "distance</a> (elle est dans un programme appelé GTalkService qui semble, "
+#~ "depuis la parution de cet article, avoir été intégré à Google Play)."
+
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
+#~ "microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 a aussi
"
+#~ "une porte dérobée pour supprimer des applications à distance</a>."
+
+#~ msgid ""
+#~ "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">forcing the download of Windows 10</a> on computers that were running "
+#~ "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#~ "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#~ "urged users to “upgrade” to Windows 10</a> when they had "
+#~ "turned it off, in the hope that some day they would fail to say no. To "
+#~ "do this, Microsoft used <a href=\"https://www.theregister.co."
+#~ "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#~ "techniques</a>."
+#~ msgstr ""
+#~ "Après avoir <a href=\"/proprietary/malware-microsoft.html#windows10-"
+#~ "forcing\">forcé le téléchargement de Windows 10</a> sur les
ordinateurs "
+#~ "exécutant Windows 7 ou 8, Microsoft a <a
href=\"http://www.computerworld."
+#~ "com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\">continué à afficher un panneau "
+#~ "exhortant les utilisateurs à faire la « mise à niveau »</a>, même "
+#~ "lorsqu'ils avaient refusé de nombreuses fois, dans l'espoir qu'un jour ou
"
+#~ "l'autre ils oublieraient de dire non. Pour ce faire, Microsoft a utilisé "
+#~ "des <a href=\"https://www.theregister.co.uk/2016/03/17/"
+#~ "microsoft_windows_10_upgrade_gwx_vs_humanity/\">techniques classiques "
+#~ "dans l'industrie du malware</a>."
+
+#~ msgid ""
+#~ "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#~ "Office 365 to be able to create/edit documents</a>."
+#~ msgstr ""
+#~ "Microsoft Office force ses utilisateurs <a href=\"https://www."
+#~ "computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
+#~ "require-office-365-subscription-on-pcs-larger-tablets.html\">Ã s'abonner "
+#~ "à Office 365 pour pouvoir créer ou éditer des documents</a>."
+
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "Espions dans les anciennes versions de Windows : <a href=\"https://www."
+#~ "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows Update "
+#~ "espionne l'utilisateur</a>. <a href=\"https://www.infoworld.com/"
+#~ "article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-"
+#~ "windows-8-1--blue-.html\">Windows 8.1 espionne les recherches locales</"
+#~ "a>. Et il existe, toujours dans Windows, <a href=\"http://www."
+#~ "marketoracle.co.uk/Article40836.html\">une clé secrète de la NSA</a>
dont "
+#~ "nous ne connaissons pas la fonction."
+
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#~ "devices” (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#~ "microsoft-metro-app-store-lock-down.html\">Feu Windows 8 pour «Â
appareils "
+#~ "mobiles » était une prison</a> : il censurait le choix de
l'utilisateur "
+#~ "en matière de programmes d'application."
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs. Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a “clean” Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"
+#~ "\">Lenovo a installé furtivement des logiciels promotionnels et espions "
+#~ "via le BIOS</a>, sur des installations de Windows. Notez que la méthode "
+#~ "particulière de sabotage utilisée par Lenovo n'a pas affecté GNU/LinuxÂ
; "
+#~ "par ailleurs, une installation « propre » de Windows n'est pas
vraiment "
+#~ "propre puisque <a href=\"/proprietary/malware-microsoft.html\">Microsoft "
+#~ "y ajoute ses propres logiciels malveillants</a>."
+
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "En 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\">Oracle a insisté pour continuer cette pratique</a>."
+
+#~ msgid ""
#~ "The German government <a href=\"http://drleonardcoldwell.com/leaked-"
#~ "german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"
#~ "\">veers away from Windows 8 computers with TPM 2.0</a>, due to potential "
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/it.po 13 Mar 2019 11:00:59 -0000 1.49
+++ proprietary/po/it.po 17 Mar 2019 10:32:39 -0000 1.50
@@ -2904,11 +2904,21 @@
"il prodotto sta furbescamente facendo gli interessi del suo produttore "
"<em>contro di voi</em>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\"> Alcuni router D-Link</a> hanno "
@@ -4662,7 +4672,8 @@
msgstr ""
# | In Android, <a
-# |
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
# | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
# | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
# | which seems since then to have been merged into Google Play.)+}
@@ -4674,9 +4685,9 @@
#| "has a back door to remotely delete apps.</a> (It is in a program called "
#| "GTalkService)."
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
@@ -5398,7 +5409,7 @@
# | [-<a
# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]Windows
# | 8 also has a back door for {+<a
-# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# |
href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
# | remotely deleting apps</a>.
#. type: Content of: <ul><li><p>
#, fuzzy
@@ -5407,9 +5418,9 @@
#| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
#| "has a back door for remotely deleting apps</a>."
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
"microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 ha anche "
@@ -5565,12 +5576,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -5884,9 +5895,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <h3>
@@ -6260,7 +6271,7 @@
# |
{+href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">+}
# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
# |
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\">-]
-# |
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
# | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
# | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\">
# | secret NSA key in Windows</a>, whose functions we don't know.
@@ -6278,11 +6289,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Spyware in Windows 8: <a href=\"https://web.archive.org/web/20160313105805/"
"http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows "
@@ -6311,7 +6322,7 @@
# | <a
# |
[-href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown\">-]
-# |
{+href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">+}
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
# | Windows 8 on “mobile devices” [-is-] {+(now defunct) was+} a
# | [-jail</a>: it censors the user's choice of application programs.-]
# | {+jail</a>.+}
@@ -6322,9 +6333,9 @@
#| "app-store-lockdown\"> Windows 8 on “mobile devices” is a "
#| "jail</a>: it censors the user's choice of application programs."
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
"app-store-lockdown\">Windows 8 sui “dispositivi mobili” è una "
@@ -9865,15 +9876,33 @@
"a>."
msgstr ""
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -9918,8 +9947,9 @@
"in ogni caso come riferimento fattuale."
# | In 2014, <a
-# |
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">{+
-# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+# |
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">Oracle-]
+# |
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\">
+# | Oracle+} insisted on continuing this [-practice.</a>-] {+practice</a>.+}
#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
@@ -9927,9 +9957,9 @@
#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
#| "\">Oracle insisted on continuing this practice.</a>"
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"Nel 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
@@ -11068,6 +11098,149 @@
"processori Intel avranno del software tiranno preinstallato</a>."
#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#~ "found-in-d-link-router-firmware-code.html\"> Alcuni router D-Link</a> "
+#~ "hanno una backdoor per cambiare le impostazioni immediatamente."
+
+# | In Android, <a
+# |
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
+# | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
+# | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
+# | which seems since then to have been merged into Google Play.)+}
+#, fuzzy
+#~| msgid ""
+#~| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~| "has a back door to remotely delete apps.</a> (It is in a program called "
+#~| "GTalkService)."
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\">Google ha "
+#~ "una backdoor per disinstallare applicazioni a distanza</a>. (Si trova "
+#~ "all'interno di un programma chiamato GTalkService)."
+
+# | [-<a
+# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]Windows
+# | 8 also has a back door for {+<a
+# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
+#~| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
+#~| "has a back door for remotely deleting apps</a>."
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
+#~ "microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 ha "
+#~ "anche una backdoor per disinstallare programmi a distanza</a>."
+
+# | Spyware in [-Windows 8:-] {+older versions of Windows:+} <a
+# |
[-href=\"https://web.archive.org/web/20160313105805/http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">-]
+# |
{+href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">+}
+# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
+# |
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
+# | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\">
+# | secret NSA key in Windows</a>, whose functions we don't know.
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Windows 8: <a href=\"https://web.archive.org/"
+#~| "web/20160313105805/http://www.theregister.co.uk/2003/02/28/"
+#~| "windows_update_keeps_tabs/\"> Windows Update snoops on the user.</a> <a "
+#~| "href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-"
+#~| "underbelly-of-windows-81-blue-222175\"> Windows 8.1 snoops on local "
+#~| "searches.</a> And there's a <a href=\"http://www.marketoracle.co.uk/"
+#~| "Article40836.html\"> secret NSA key in Windows</a>, whose functions we "
+#~| "don't know."
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "Spyware in Windows 8: <a href=\"https://web.archive.org/"
+#~ "web/20160313105805/http://www.theregister.co.uk/2003/02/28/"
+#~ "windows_update_keeps_tabs/\">Windows Update spia l'utente</a>. <a href="
+#~ "\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-"
+#~ "of-windows-81-blue-222175\">Windows 8.1 curiosa nelle ricerche locali</"
+#~ "a>. E c'è una <a href=\"http://www.marketoracle.co.uk/Article40836.html"
+#~ "\">chiave segreta dell'NSA in Windows</a>, le cui funzioni sono a noi "
+#~ "ignote."
+
+# | <a
+# |
[-href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown\">-]
+# |
{+href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” [-is-] {+(now defunct) was+} a
+# | [-jail</a>: it censors the user's choice of application programs.-]
+# | {+jail</a>.+}
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-"
+#~| "metro-app-store-lockdown\"> Windows 8 on “mobile devices” is "
+#~| "a jail</a>: it censors the user's choice of application programs."
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#~ "devices” (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
+#~ "app-store-lockdown\">Windows 8 sui “dispositivi mobili” è una
"
+#~ "prigione</a>: censura la scelta delle applicazioni da parte dell'utente."
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs. Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a “clean” Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo ha installato di nascosto software indesiderato tramite il BIOS</"
+#~ "a> sui suoi dispositivi Windows. Lo specifico metodo usato da Lenovo non "
+#~ "aveva conseguenze per chi eseguiva GNU/Linux; tra l'altro, "
+#~ "un'installazione “pulita” di Windows non è mai davvero pulita
"
+#~ "a causa del <a href=\"/proprietary/malware-microsoft.html\">malware "
+#~ "preinstallato da Microsoft</a>."
+
+# | In 2014, <a
+# |
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">{+
+# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+#, fuzzy
+#~| msgid ""
+#~| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~| "\">Oracle insisted on continuing this practice.</a>"
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "Nel 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\">ha continuato a perpetrare questa pratica.</a>"
+
+#~ msgid ""
#~ "Apps that include <a href=\"http://techaeris.com/2016/01/13/symphony-"
#~ "advanced-media-software-tracks-your-digital-life-through-your-smartphone-"
#~ "mic/\"> Symphony surveillance software snoop on what radio and TV "
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/ja.po 13 Mar 2019 11:00:59 -0000 1.49
+++ proprietary/po/ja.po 17 Mar 2019 10:32:39 -0000 1.50
@@ -2486,10 +2486,15 @@
"é æ¥è
ã«ä»ãã¦<em>ããªãã«åãã</em>ã®ã§ãã"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/darticle/2705284/data-protection/backdoor-"
"found-d-link-router-firmware-code.html\">ããã¤ãã®D-Linkã®ã«ã¼ã¿</a>ã¯ããã¯"
@@ -4035,9 +4040,9 @@
#| "has a back door to remotely delete apps.</a> (It is in a program called "
#| "GTalkService)."
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"ã¢ã³ããã¤ãã§ã¯<a
href=\"http://www.computerworld.com/article/2506557/"
@@ -4655,9 +4660,9 @@
#| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
#| "has a back door for remotely deleting apps</a>."
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
"microsoft--we-can-remotely-delete-windows-8-apps.html\">ã¦ã£ã³ãã¦ãº8ãé
éæ"
@@ -4788,12 +4793,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -5056,9 +5061,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <h3>
@@ -5351,11 +5356,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"ã¦ã£ã³ãã¦ãº8ã®ã¹ãã¤ã¦ã§ã¢: <a href=\"https://web.archive.org/"
"web/20160313105805/http://www.theregister.co.uk/2003/02/28/"
@@ -5390,9 +5395,9 @@
#| "app-store-lockdown\"> Windows 8 on “mobile devices” is a "
#| "jail</a>: it censors the user's choice of application programs."
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
"app-store-lockdown\">ãã¢ãã¤ã«ããã¤ã¹ãã®ã¦ã£ã³ãã¦ãº8ã¯ç¢çã§ã</a>:
ã¦ã¼"
@@ -8414,14 +8419,23 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"ã¦ã£ã³ãã¦ãºã®ã¤ã³ã¹ãã¼ã«ã§<a
href=\"http://www.computerworld.com/"
"article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-"
@@ -8471,9 +8485,9 @@
#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
#| "\">Oracle insisted on continuing this practice.</a>"
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"2014å¹´ã<a href=\"http://www.computerworld.com/article/2494794/malware-"
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">ãª"
@@ -9494,6 +9508,121 @@
"ããã»ããµã«ã¯æ´åã½ããã¦ã§ã¢ãçµã¿è¾¼ã¾ããããã«ãªãã¾ã</a>ã"
#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/darticle/2705284/data-protection/"
+#~
"backdoor-found-d-link-router-firmware-code.html\">ããã¤ãã®D-Linkã®ã«ã¼ã¿"
+#~
"</a>ã¯ããã¯ãã¢ãæããç¬æã«(è±èªåæã§ã¯dlinkã«ãããã·ã£ã¬)è¨å®ãå¤æ´"
+#~ "ãããã¨ãã§ãã¾ãã"
+
+#, fuzzy
+#~| msgid ""
+#~| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~| "has a back door to remotely delete apps.</a> (It is in a program called "
+#~| "GTalkService)."
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "ã¢ã³ããã¤ãã§ã¯<a
href=\"http://www.computerworld.com/article/2506557/"
+#~
"security0/google-throws--kill-switch--on-android-phones.html\">ã°ã¼ã°ã«ã"
+#~ "é éã§ã¢ããªãåé¤ããããã¯ãã¢ãããã¾ãã</a>
(GTalkServiceã¨å¼ã°ããã"
+#~ "ãã°ã©ã ã§ã)ã"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
+#~| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
+#~| "has a back door for remotely deleting apps</a>."
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
+#~
"microsoft--we-can-remotely-delete-windows-8-apps.html\">ã¦ã£ã³ãã¦ãº8ãé
"
+#~
"éæä½ã§ã¢ããªãåé¤ããããã®ããã¯ãã¢ãæãã¾ã</a>ã"
+
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Windows 8: <a href=\"https://web.archive.org/"
+#~| "web/20160313105805/http://www.theregister.co.uk/2003/02/28/"
+#~| "windows_update_keeps_tabs/\"> Windows Update snoops on the user.</a> <a "
+#~| "href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-"
+#~| "underbelly-of-windows-81-blue-222175\"> Windows 8.1 snoops on local "
+#~| "searches.</a> And there's a <a href=\"http://www.marketoracle.co.uk/"
+#~| "Article40836.html\"> secret NSA key in Windows</a>, whose functions we "
+#~| "don't know."
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "ã¦ã£ã³ãã¦ãº8ã®ã¹ãã¤ã¦ã§ã¢: <a
href=\"https://web.archive.org/"
+#~ "web/20160313105805/http://www.theregister.co.uk/2003/02/28/"
+#~
"windows_update_keeps_tabs/\">ã¦ã£ã³ãã¦ãºã»ã¢ãããã¼ãã¯ã¦ã¼ã¶ãè¦ãè¦ã¾"
+#~ "ãã</a> <a
href=\"http://www.infoworld.com/t/microsoft-windows/look-the-"
+#~
"black-underbelly-of-windows-81-blue-222175\">ã¦ã£ã³ãã¦ãº8.1ã¯ãã¼ã«ã«ã®æ¤"
+#~ "ç´¢ãè¦ãè¦ãã¾ãã</a> ããã¦<a
href=\"http://www.marketoracle.co.uk/"
+#~ "Article40836.html\">
ç§å¯ã®NSAéµãã¦ã£ã³ãã¦ãºã«ã¯ãã</a>ããã®æ©è½ã¯ãã"
+#~ "ããã¡ã«ã¯ãããã¾ããã"
+
+#, fuzzy
+#~| msgid ""
+#~| "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-"
+#~| "metro-app-store-lockdown\"> Windows 8 on “mobile devices” is "
+#~| "a jail</a>: it censors the user's choice of application programs."
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#~ "devices” (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
+#~
"app-store-lockdown\">ãã¢ãã¤ã«ããã¤ã¹ãã®ã¦ã£ã³ãã¦ãº8ã¯ç¢çã§ã</a>:
"
+#~ "ã¦ã¼ã¶ã®ã¢ããªã±ã¼ã·ã§ã³ããã°ã©ã
ã®é¸æãæ¤é²ãã¾ãã"
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs. Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a “clean” Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "ã¦ã£ã³ãã¦ãºã®ã¤ã³ã¹ãã¼ã«ã§<a
href=\"http://www.computerworld.com/"
+#~ "article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-"
+#~
"thinkcentre-and-thinkstation-pcs.html\">ã¬ããã¯BIOSãéãã¦ã¯ã©ããã¦ã§ã¢"
+#~
"ããã£ããã¤ã³ã¹ãã¼ã«ãã¾ãã</a>ãã¬ããã使ã£ããã®ç¹å®ã®å¦¨å®³ã®æ¹æ³ã¯"
+#~
"GNU/Linuxã«ã¯é¢ä¿ãã¾ãããã¾ãããã¯ãªã¼ã³ãã¦ã£ã³ãã¦ãºã¤ã³ã¹ãã¼ã«ã¯å®"
+#~ "éã«ã¯ã¯ãªã¼ã³ã§ã¯ããã¾ããã<a
href=\"/proprietary/malware-microsoft."
+#~ "html\">ãã¤ã¯ãã½ããã¯ããèªèº«ã®ãã«ã¦ã§ã¢ãå
¥ãã</a>ããã§ãã"
+
+#, fuzzy
+#~| msgid ""
+#~| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~| "\">Oracle insisted on continuing this practice.</a>"
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "2014å¹´ã<a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\">ãªã©ã¯ã«ã¯ãã®æ
£ç¿ãç¶ãããã¨ã主張ãã¦ãã¾ãã</a>"
+
+#~ msgid ""
#~ "Apps that include <a href=\"http://techaeris.com/2016/01/13/symphony-"
#~ "advanced-media-software-tracks-your-digital-life-through-your-smartphone-"
#~ "mic/\"> Symphony surveillance software snoop on what radio and TV "
Index: proprietary/po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary/po/malware-appliances.de-diff.html 4 Mar 2019 09:00:10
-0000 1.38
+++ proprietary/po/malware-appliances.de-diff.html 17 Mar 2019 10:32:39
-0000 1.39
@@ -769,7 +769,7 @@
<li id="M201512074">
<p><a
-
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a back door for changing settings in a
dlink of an eye.</p>
@@ -1299,7 +1299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/04 09:00:10 $
+$Date: 2019/03/17 10:32:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary/po/malware-appliances.de.po 4 Mar 2019 09:00:10 -0000
1.72
+++ proprietary/po/malware-appliances.de.po 17 Mar 2019 10:32:40 -0000
1.73
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1120,10 +1120,20 @@
"scheint es geschickt dem Hersteller zu dienen ‑ gegen einen."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"Einige <a href=\"//www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\" title=\"Backdoor found in D-Link "
Index: proprietary/po/malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/malware-appliances.fr.po 4 Mar 2019 20:20:41 -0000
1.115
+++ proprietary/po/malware-appliances.fr.po 17 Mar 2019 10:32:40 -0000
1.116
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-03-04 21:09+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -996,10 +997,20 @@
"em>."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\">Certains routeurs D-Link</a> ont "
Index: proprietary/po/malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-appliances.pot 4 Mar 2019 09:00:10 -0000
1.57
+++ proprietary/po/malware-appliances.pot 17 Mar 2019 10:32:40 -0000
1.58
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -660,7 +660,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"<a "
-"href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">
"
+"href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">
"
"Some D-Link routers</a> have a back door for changing settings in a dlink of "
"an eye."
msgstr ""
Index: proprietary/po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- proprietary/po/malware-appliances.ru.po 4 Mar 2019 09:29:52 -0000
1.149
+++ proprietary/po/malware-appliances.ru.po 17 Mar 2019 10:32:40 -0000
1.150
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-04 08:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -986,10 +987,20 @@
"ÑлÑÐ¶Ð¸Ñ ÑÐ²Ð¾ÐµÐ¼Ñ Ð¿ÑоизводиÑÐµÐ»Ñ <em>пÑоÑив
ваÑ</em>."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\">РнекоÑоÑÑÑ
маÑÑÑÑÑизаÑоÑаÑ
D-"
Index: proprietary/po/malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/malware-google.de-diff.html 9 Feb 2019 23:00:28 -0000
1.21
+++ proprietary/po/malware-google.de-diff.html 17 Mar 2019 10:32:40 -0000
1.22
@@ -108,7 +108,8 @@
<span class="inserted"><ins><em><li id="M201103070"></em></ins></span>
<p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"></em></ins></span>
Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> in a
program called <span
class="removed"><del><strong>GTalkService).</p></strong></del></span>
<span class="inserted"><ins><em>GTalkService, which seems since then to have
been
merged into Google Play.)</p></em></ins></span>
@@ -576,7 +577,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/09 23:00:28 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-google.de.po 9 Feb 2019 23:00:28 -0000 1.36
+++ proprietary/po/malware-google.de.po 17 Mar 2019 10:32:40 -0000 1.37
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -188,7 +188,8 @@
#. type: Content of: <ul><li><p>
# | In Android, <a
-# |
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
# | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
# | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
# | which seems since then to have been merged into Google Play.)+}
@@ -199,9 +200,9 @@
#| "has a back door to remotely delete apps.</a> (It is in a program called "
#| "GTalkService)."
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"Google hat in <a href=\"//www.computerworld.com/article/2506557/security0/"
Index: proprietary/po/malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -b -r1.1 -r1.2
--- proprietary/po/malware-google.es.po 18 Feb 2019 10:52:39 -0000 1.1
+++ proprietary/po/malware-google.es.po 17 Mar 2019 10:32:40 -0000 1.2
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-02-18 11:40+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -157,10 +158,23 @@
"\">sección 4 del Acuerdo de Licencia de Usuario Final</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"En Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
Index: proprietary/po/malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/malware-google.fr.po 10 Feb 2019 15:42:57 -0000 1.57
+++ proprietary/po/malware-google.fr.po 17 Mar 2019 10:32:40 -0000 1.58
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-02-10 16:42+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -159,10 +160,23 @@
"\">CLUF</abbr></a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"Dans Android, <a href=\"http://www.computerworld.com/article/2506557/"
Index: proprietary/po/malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary/po/malware-google.pot 9 Feb 2019 23:00:28 -0000 1.32
+++ proprietary/po/malware-google.pot 17 Mar 2019 10:32:40 -0000 1.33
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -127,7 +127,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"In Android, <a "
-"href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
"
+"href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">
"
"Google has a back door to remotely delete apps</a>. (It was in a program "
"called GTalkService, which seems since then to have been merged into Google "
"Play.)"
Index: proprietary/po/malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary/po/malware-google.ru.po 25 Feb 2019 09:37:05 -0000 1.77
+++ proprietary/po/malware-google.ru.po 17 Mar 2019 10:32:40 -0000 1.78
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-02-09 22:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-10-05 09:03+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -158,10 +159,23 @@
"полÑзоваÑелÑ</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"Ð Android <a href=\"http://www.computerworld.com/article/2506557/security0/"
Index: proprietary/po/malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-microsoft.de-diff.html 6 Mar 2019 09:30:53
-0000 1.36
+++ proprietary/po/malware-microsoft.de-diff.html 17 Mar 2019 10:32:40
-0000 1.37
@@ -142,7 +142,7 @@
<li id="M201112080.1">
<p>Windows 8</em></ins></span> also has a back door for <span
class="inserted"><ins><em><a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
@@ -179,8 +179,8 @@
<span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html#bluray">Bluray</a>
disks.
(The article talks about</em></ins></span> how <span
class="removed"><del><strong>to permanently reject</strong></del></span> the
<span class="removed"><del><strong>downgrade to Windows 10</a>.</p>
- <p>This seems to involve use of a back door</strong></del></span>
<span class="inserted"><ins><em>same malware would later be
- introduced</em></ins></span> in <span class="removed"><del><strong>Windows
7 and 8.</p></strong></del></span> <span class="inserted"><ins><em>MacOS.
That had not been done at the time, but it was
+ <p>This seems to involve use of a back door in Windows 7 and
8.</p></strong></del></span> <span class="inserted"><ins><em>same malware
would later be
+ introduced in MacOS. That had not been done at the time, but it was
done subsequently.)</p></em></ins></span>
</li>
</ul>
@@ -236,96 +236,94 @@
<p>This</em></ins></span> section <span class="removed"><del><strong>are
not precisely malware, since they do
not involve making</strong></del></span> <span class="inserted"><ins><em>gives
examples of Microsoft software harassing or annoying</em></ins></span>
the <span class="removed"><del><strong>program that runs in a way that
hurts</strong></del></span> <span class="inserted"><ins><em>user, or causing
trouble for</em></ins></span> the user.
-<span class="removed"><del><strong>But they</strong></del></span> <span
class="inserted"><ins><em>These actions</em></ins></span> are <span
class="removed"><del><strong>a lot</strong></del></span> like <span
class="removed"><del><strong>malware, since they are technical Microsoft
-actions that harm to</strong></del></span>
-<span class="inserted"><ins><em>sabotage but</em></ins></span> the <span
class="inserted"><ins><em>word “sabotage” is too strong for
them.</p>
+<span class="removed"><del><strong>But they</strong></del></span> <span
class="inserted"><ins><em>These actions</em></ins></span> are <span
class="removed"><del><strong>a lot</strong></del></span> like <span
class="removed"><del><strong>malware, since</strong></del></span>
+<span class="inserted"><ins><em>sabotage but the word “sabotage”
is too strong for them.</p>
<ul class="blurbs">
<li id="M201809120">
<p>One version of Windows 10 <a
href="https://www.ghacks.net/2018/09/12/microsoft-intercepting-firefox-chrome-installation-on-windows-10/">
- harangues</em></ins></span> users <span class="inserted"><ins><em>if they
try to install Firefox (or Chrome)</a>.</p>
+ harangues users if</em></ins></span> they <span
class="removed"><del><strong>are technical</strong></del></span> <span
class="inserted"><ins><em>try to install Firefox (or
Chrome)</a>.</p>
</li>
<li id="M201803190">
<p>Microsoft is planning to make Windows <a
href="https://www.theguardian.com/technology/2018/mar/19/windows-10-microsoft-force-people-edge-browser-windows-mail-chrome-firefox">
- impose use</em></ins></span> of <span
class="removed"><del><strong>specific Microsoft software.</p>
-
-<ul>
- <li><p></strong></del></span> <span
class="inserted"><ins><em>its browser, Edge, in certain
circumstances</a>.</p>
+ impose use of its browser, Edge, in certain
circumstances</a>.</p>
- <p>The reason</em></ins></span> Microsoft <span
class="inserted"><ins><em>can force things on users is that Windows
+ <p>The reason</em></ins></span> Microsoft
+<span class="removed"><del><strong>actions</strong></del></span> <span
class="inserted"><ins><em>can force things on users is</em></ins></span> that
<span class="removed"><del><strong>harm to</strong></del></span> <span
class="inserted"><ins><em>Windows
is nonfree.</p>
</li>
<li id="M201703170">
- <p>Windows displays</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
- has dropped support</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
- intrusive ads</em></ins></span> for <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>Microsoft products</em></ins></span> and <span
class="removed"><del><strong>8 on recent processors</a>
- in</strong></del></span> <span class="inserted"><ins><em>its partners'
+ <p>Windows displays <a
+
href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
+ intrusive ads for Microsoft products and its partners'
products</a>.</p>
- <p>The article's author starts from the premise that Microsoft
has</em></ins></span>
- a <span class="removed"><del><strong>big hurry.</p>
- <p>It makes no difference</strong></del></span> <span
class="inserted"><ins><em>right to control</em></ins></span> what <span
class="removed"><del><strong>legitimate reasons Microsoft might
- have for not doing work</strong></del></span> <span
class="inserted"><ins><em>Windows does</em></ins></span> to <span
class="removed"><del><strong>support them. If</strong></del></span> <span
class="inserted"><ins><em>users, as long as</em></ins></span> it doesn't <span
class="removed"><del><strong>want to
- do this work, it should let users do</strong></del></span>
- <span class="inserted"><ins><em>go “too far”. We
disagree.</p>
+ <p>The article's author starts from</em></ins></span> the <span
class="removed"><del><strong>users of specific</strong></del></span> <span
class="inserted"><ins><em>premise that</em></ins></span> Microsoft <span
class="removed"><del><strong>software.</p>
+
+<ul>
+ <li><p></strong></del></span> <span class="inserted"><ins><em>has
+ a right to control what Windows does to users, as long as it doesn't
+ go “too far”. We disagree.</p>
</li>
<li id="M201612140">
- <p>The Microsoft Telemetry Compatibility service <a
-
href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
- drastically reduces</em></ins></span> the <span
class="removed"><del><strong>work.</p></strong></del></span> <span
class="inserted"><ins><em>performances of machines running
- Windows 10</a>, and can't be disabled
easily.</p></em></ins></span>
+ <p>The</em></ins></span> Microsoft <span
class="inserted"><ins><em>Telemetry Compatibility service</em></ins></span>
<a <span
class="removed"><del><strong>href="https://arstechnica.com/information-technology/2017/04/new-processors-are-now-blocked-from-receiving-updates-on-old-windows/">
+ has dropped support for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://answers.microsoft.com/en-us/windows/forum/windows_10-performance/microsoft-telemetry-compatibility/cefa7c8e-49c9-4965-aef6-2d5f01bb38f2?tab=AllReplies#tabs">
+ drastically reduces the performances of machines running
+ Windows 10</a>, and can't be disabled easily.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Microsoft has made</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201608170">
+ <li id="M201608170">
<p> After <a
href="/proprietary/malware-microsoft.html#windows10-forcing">forcing the
download of Windows 10</a>
- on computers that were running</em></ins></span> Windows 7 and <span
class="removed"><del><strong>8 cease to function on certain
- new computers,</strong></del></span> <span class="inserted"><ins><em>8,
Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
- forcing their owners</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- repeatedly switched on a flag that urged users</em></ins></span> to <span
class="removed"><del><strong>switch</strong></del></span>
- <span class="inserted"><ins><em>“upgrade”</em></ins></span> to
Windows <span class="removed"><del><strong>10</a>.</p>
- </li>
-
- <li><p>Once Microsoft has tricked a user into accepting
installation
- of Windows
- 10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find</strong></del></span> <span class="inserted"><ins><em>10</a>
when they had turned
- it off, in the hope</em></ins></span> that <span
class="inserted"><ins><em>some day</em></ins></span> they <span
class="removed"><del><strong>are denied</strong></del></span> <span
class="inserted"><ins><em>would fail to say no.
- To do this, Microsoft used <a
+ on computers that were running</em></ins></span> Windows 7 and <span
class="removed"><del><strong>8</strong></del></span> <span
class="inserted"><ins><em>8, Microsoft <a
+
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ repeatedly switched</em></ins></span> on <span
class="removed"><del><strong>recent processors</a>
+ in</strong></del></span> a <span class="removed"><del><strong>big
hurry.</p>
+ <p>It makes no difference what legitimate reasons Microsoft might
+ have for not doing work</strong></del></span> <span
class="inserted"><ins><em>flag that urged users</em></ins></span> to <span
class="removed"><del><strong>support them. If it doesn't
want</strong></del></span>
+ <span class="inserted"><ins><em>“upgrade”</em></ins></span> to
+ <span class="removed"><del><strong>do this work,</strong></del></span>
<span class="inserted"><ins><em>Windows 10</a> when they had
turned</em></ins></span>
+ it <span class="removed"><del><strong>should let
users</strong></del></span> <span class="inserted"><ins><em>off, in the hope
that some day they would fail to say no.
+ To</em></ins></span> do <span class="inserted"><ins><em>this, Microsoft
used <a
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
<p>A detailed <a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
- analysis of Microsoft's scheme</a> is available on</em></ins></span>
the <span class="removed"><del><strong>option</strong></del></span> <span
class="inserted"><ins><em>Electronic
- Frontier Foundation's website.</p>
+ analysis of Microsoft's scheme</a> is available on</em></ins></span>
the <span class="removed"><del><strong>work.</p></strong></del></span>
<span class="inserted"><ins><em>Electronic
+ Frontier Foundation's website.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201603090"></em></ins></span>
+ <p>Microsoft has made <span
class="inserted"><ins><em>companies'</em></ins></span>
+ Windows <span class="removed"><del><strong>7 and 8 cease to function on
certain
+ new computers,</strong></del></span> <span
class="inserted"><ins><em>machines managed by the company's
sysadmins</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
+ forcing their owners</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+ users</em></ins></span> to <span
class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>complain to the sysadmins about not
“upgrading”</em></ins></span>
+ to Windows 10</a>.</p>
</li>
- <li id="M201603090">
- <p>Microsoft has made companies'
- Windows machines managed by the company's sysadmins <a
-
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
- users to complain</em></ins></span> to <span
class="removed"><del><strong>cancel or even postpone</strong></del></span> the
- <span class="removed"><del><strong>imposed date of installation</a>.
+ <span class="removed"><del><strong><li><p>Once Microsoft has
tricked a user into accepting installation
+ of Windows
+ 10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
+ find that they are denied the option to cancel or even postpone the
+ imposed date of installation</a>.
</p>
<p>This demonstrates what we've said for years: using proprietary
software means letting someone have power over you, and you're
- going</strong></del></span> <span class="inserted"><ins><em>sysadmins about
not “upgrading”</em></ins></span>
- to <span class="removed"><del><strong>get screwed sooner or
later.</p></li>
+ going to get screwed sooner or later.</p></li>
- <li><p>Microsoft</strong></del></span> <span
class="inserted"><ins><em>Windows 10</a>.</p>
- </li>
+ <li><p>Microsoft</strong></del></span>
- <li id="M201601160">
+ <span class="inserted"><ins><em><li id="M201601160">
<p>Microsoft</em></ins></span> has <a
href="http://www.theverge.com/2016/1/16/10780876/microsoft-windows-support-policy-new-processors-skylake">desupported
all future Intel CPUs for Windows 7 and 8</a>. Those
@@ -492,8 +490,8 @@
href="https://www.theguardian.com/technology/2017/mar/10/windows-10-users-complain-new-microsoft-subscription-onedrive-adverts">
annoying advertisements inside of</strong></del></span> <span
class="inserted"><ins><em>work on a particular
program; the wrong here is Microsoft does this after having
made</em></ins></span> the <span class="removed"><del><strong>File
Explorer</a> to nag</strong></del></span>
- users <span class="inserted"><ins><em>dependent on Microsoft, because they
are not free</em></ins></span> to <span class="removed"><del><strong>buy
subscriptions</strong></del></span> <span class="inserted"><ins><em>ask anyone
- else to work on the program</em></ins></span> for <span
class="inserted"><ins><em>them.</p>
+ users <span class="inserted"><ins><em>dependent on Microsoft, because they
are not free to ask anyone
+ else</em></ins></span> to <span class="removed"><del><strong>buy
subscriptions</strong></del></span> <span class="inserted"><ins><em>work on the
program</em></ins></span> for <span class="inserted"><ins><em>them.</p>
</li>
<li id="M201306220">
@@ -521,15 +519,15 @@
<li><p>Microsoft
<a
href="http://news.softpedia.com/news/windows-10-upgrade-reportedly-starting-automatically-on-windows-7-pcs-501651.shtml">is
tricking
- users</a></strong></del></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
+ users</a> <a
+href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
into replacing Windows 7 with Windows 10</a>.</p></li>
<li><p>Microsoft has made companies' Windows machines managed by
the
company's
-sysadmins <a
href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
+sysadmins</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
subscribe</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>Office 365</em></ins></span> to <span
class="removed"><del><strong>the sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>be able</em></ins></span> to <span
class="removed"><del><strong>Windows
10</a>.</p></li></strong></del></span> <span
class="inserted"><ins><em>create/edit documents</a>.</p>
</li></em></ins></span>
@@ -738,7 +736,7 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on</em></ins></span> the <span
class="removed"><del><strong>same malware would later be
introduced</strong></del></span> <span
class="inserted"><ins><em>user</a>. <a
-
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches</a>. And there's a <a
href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA
key</em></ins></span> in <span
class="removed"><del><strong>MacOS.)</p></li></strong></del></span>
<span class="inserted"><ins><em>Windows</a>, whose functions we don't
know.</p>
@@ -767,8 +765,8 @@
</li>
<li id="M201210080"></em></ins></span>
- <p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
+ <p><a <span
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"></em></ins></span>
Windows 8 on “mobile devices” (now defunct) was a
<span
class="removed"><del><strong>jail</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>jail</a>.</p>
@@ -872,7 +870,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/06 09:30:53 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary/po/malware-microsoft.de.po 6 Mar 2019 09:30:53 -0000
1.132
+++ proprietary/po/malware-microsoft.de.po 17 Mar 2019 10:32:40 -0000
1.133
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -279,7 +279,7 @@
# | [-<a
# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]Windows
# | 8 also has a back door for {+<a
-# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# |
href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
# | remotely deleting apps</a>.
#, fuzzy
#| msgid ""
@@ -287,9 +287,9 @@
#| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
#| "has a back door for remotely deleting apps</a>."
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"<a href=\"https://www.computerworld.com/article/2500036/desktop-apps/"
"microsoft--we-can-remotely-delete-windows-8-apps.html\" title=\"Microsoft: "
@@ -486,12 +486,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -812,11 +812,21 @@
msgstr "Abonnements"
#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office erzwingt ein <a href=\"https://www.computerworld.com/"
"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
@@ -1201,7 +1211,7 @@
# |
href=\"http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
# |
[-href=\"https://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\">-]
-# |
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
# | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
# | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\">
# | secret NSA key in Windows</a>, whose functions we don't know.
@@ -1217,11 +1227,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Spähprogramm in Windows: <a href=\"http://www.theregister.co.uk/2003/02/28/"
"windows_update_keeps_tabs/\" title=\"Windows Update keeps tabs on all system "
@@ -1266,10 +1276,19 @@
"Möglichkeit, den S-Modus auszuschalten."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"https://www.itworld.com/article/2832657/operating-systems/"
"microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app store "
Index: proprietary/po/malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary/po/malware-microsoft.es.po 11 Mar 2019 10:12:09 -0000
1.135
+++ proprietary/po/malware-microsoft.es.po 17 Mar 2019 10:32:40 -0000
1.136
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"X-Generator: Poedit 1.8.11\n"
#. type: Content of: <title>
@@ -221,10 +222,19 @@
"que la NSA acceda a los ordenadores con la ayuda de Microsoft."
#. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# |
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"Windows 8 también tiene una puerta trasera para <a href=\"http://www."
"computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-"
@@ -395,15 +405,38 @@
"con Windows 10</a>, y no puede deshabilitarse con facilidad."
#. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# |
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">+}
+# | repeatedly switched on a flag that urged users to “upgrade” to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no. To do this, Microsoft used <a
+# |
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\">
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to “upgrade” to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no. To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co."
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
"Tras <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -664,11 +697,21 @@
msgstr "Suscripciones"
#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office obliga a los usuarios a <a href=\"https://www.computerworld."
"com/article/2948755/windows-apps/office-for-windows-10-will-require-"
@@ -929,14 +972,31 @@
"\"> especÃficamente para espiar</a>."
#. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# |
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the user</a>. <a
+# |
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Código espÃÂa en versiones antiguas de Windows: <a href=\"https://www."
"theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"><i>Windows Update</"
@@ -975,10 +1035,19 @@
"salir del modo S."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\">Windows 8 para «dispositivos móviles» (ya
"
Index: proprietary/po/malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary/po/malware-microsoft.fr.po 6 Mar 2019 10:29:15 -0000
1.153
+++ proprietary/po/malware-microsoft.fr.po 17 Mar 2019 10:32:40 -0000
1.154
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-03-06 11:28+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -221,10 +222,19 @@
"experts respectés en sécurité."
#. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# |
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
"microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 a aussi "
@@ -393,15 +403,38 @@
"sous Windows 10</a> et ne peut pas être désactivé facilement."
#. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# |
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">+}
+# | repeatedly switched on a flag that urged users to “upgrade” to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no. To do this, Microsoft used <a
+# |
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\">
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to “upgrade” to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no. To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co."
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
"Après avoir <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -662,11 +695,21 @@
msgstr "Abonnements"
#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office force ses utilisateurs <a href=\"https://www.computerworld."
"com/article/2948755/windows-apps/office-for-windows-10-will-require-"
@@ -928,14 +971,31 @@
"user-data\">dans un but précis d'espionnage</a>."
#. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# |
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the user</a>. <a
+# |
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Espions dans les anciennes versions de Windows : <a href=\"https://www."
"theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows Update "
@@ -974,10 +1034,19 @@
"mode S."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\">Feu Windows 8 pour « appareils mobilesÂ
» "
Index: proprietary/po/malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary/po/malware-microsoft.it-diff.html 6 Mar 2019 09:30:54
-0000 1.36
+++ proprietary/po/malware-microsoft.it-diff.html 17 Mar 2019 10:32:40
-0000 1.37
@@ -141,7 +141,7 @@
<li id="M201112080.1">
<p>Windows 8</em></ins></span> also has a back door for <span
class="inserted"><ins><em><a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
@@ -289,7 +289,7 @@
on computers that were running</em></ins></span> Windows 7 and <span
class="removed"><del><strong>8 cease to function on certain
new computers,</strong></del></span> <span class="inserted"><ins><em>8,
Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.microsoft.com/en-us/help/4012982/discusses-an-issue-in-which-you-receive-a-your-pc-uses-a-processor-tha">effectively
forcing their owners</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
repeatedly switched on a flag that urged users</em></ins></span> to <span
class="removed"><del><strong>switch</strong></del></span>
<span class="inserted"><ins><em>“upgrade”</em></ins></span> to
Windows <span class="removed"><del><strong>10</a>.</p>
</li>
@@ -297,9 +297,9 @@
<li><p>Once Microsoft has tricked a user into accepting
installation
of Windows
10, <a
href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
- find that</strong></del></span> <span
class="inserted"><ins><em>10</a> when</em></ins></span> they <span
class="removed"><del><strong>are denied</strong></del></span> <span
class="inserted"><ins><em>had turned
- it off, in</em></ins></span> the <span
class="removed"><del><strong>option</strong></del></span> <span
class="inserted"><ins><em>hope that some day they would fail</em></ins></span>
to <span class="removed"><del><strong>cancel or even postpone the
- imposed date</strong></del></span> <span class="inserted"><ins><em>say no.
+ find that</strong></del></span> <span
class="inserted"><ins><em>10</a> when</em></ins></span> they <span
class="removed"><del><strong>are denied the option to cancel or even
postpone</strong></del></span> <span class="inserted"><ins><em>had turned
+ it off, in</em></ins></span> the
+ <span class="removed"><del><strong>imposed date</strong></del></span> <span
class="inserted"><ins><em>hope that some day they would fail to say no.
To do this, Microsoft used <a
href="https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
malware techniques</a>.</p>
@@ -519,7 +519,7 @@
company's
sysadmins</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.infoworld.com/article/3042397/microsoft-windows/admins-beware-domain-attached-pcs-are-sprouting-get-windows-10-ads.html">harangue
users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
subscribe</em></ins></span> to <span
class="removed"><del><strong>complain</strong></del></span> <span
class="inserted"><ins><em>Office 365</em></ins></span> to <span
class="removed"><del><strong>the sysadmins about not
“upgrading”</strong></del></span> <span
class="inserted"><ins><em>be able</em></ins></span> to <span
class="removed"><del><strong>Windows
10</a>.</p></li></strong></del></span> <span
class="inserted"><ins><em>create/edit documents</a>.</p>
</li></em></ins></span>
@@ -733,7 +733,7 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on</em></ins></span> the <span
class="removed"><del><strong>same malware would later be
introduced</strong></del></span> <span
class="inserted"><ins><em>user</a>. <a
-
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches</a>. And there's a <a
href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA
key</em></ins></span> in <span
class="removed"><del><strong>MacOS.)</p></li></strong></del></span>
<span class="inserted"><ins><em>Windows</a>, whose functions we don't
know.</p>
@@ -767,7 +767,7 @@
<span class="inserted"><ins><em><li id="M201210080">
<p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></em></ins></span>
+
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"></em></ins></span>
Windows 8 on “mobile devices” <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span
class="removed"><del><strong>jail</a>: it censors the
user's choice of application
programs.</p></li></strong></del></span>
<span class="inserted"><ins><em>jail</a>.</p>
@@ -862,7 +862,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary/po/malware-microsoft.it.po 6 Mar 2019 09:30:54 -0000
1.138
+++ proprietary/po/malware-microsoft.it.po 17 Mar 2019 10:32:40 -0000
1.139
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -261,7 +261,7 @@
# | [-<a
# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]Windows
# | 8 also has a back door for {+<a
-# |
href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# |
href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
# | remotely deleting apps</a>.
#, fuzzy
#| msgid ""
@@ -269,9 +269,9 @@
#| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
#| "has a back door for remotely deleting apps</a>."
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
"microsoft--we-can-remotely-delete-windows-8-apps.html\">Windows 8 ha anche "
@@ -461,12 +461,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -780,9 +780,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <h3>
@@ -1157,7 +1157,7 @@
# |
{+href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">+}
# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
# |
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\">-]
-# |
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
# | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
# | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\">
# | secret NSA key in Windows</a>, whose functions we don't know.
@@ -1174,11 +1174,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Spyware in Windows 8: <a href=\"https://web.archive.org/web/20160313105805/"
"http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows "
@@ -1208,7 +1208,7 @@
#. type: Content of: <ul><li><p>
# | <a
# |
[-href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-app-store-lockdown\">-]
-# |
{+href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">+}
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
# | Windows 8 on “mobile devices” [-is-] {+(now defunct) was+} a
# | [-jail</a>: it censors the user's choice of application programs.-]
# | {+jail</a>.+}
@@ -1218,9 +1218,9 @@
#| "app-store-lockdown\"> Windows 8 on “mobile devices” is a "
#| "jail</a>: it censors the user's choice of application programs."
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
"app-store-lockdown\">Windows 8 sui “dispositivi mobili” è una "
Index: proprietary/po/malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/malware-microsoft.ja-diff.html 6 Mar 2019 09:30:54
-0000 1.45
+++ proprietary/po/malware-microsoft.ja-diff.html 17 Mar 2019 10:32:40
-0000 1.46
@@ -149,7 +149,7 @@
<li id="M201112080.1">
<p>Windows 8</em></ins></span> also has a back door for <span
class="inserted"><ins><em><a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
@@ -198,7 +198,7 @@
<h3 id="insecurity">Microsoft Insecurity</h3>
<span class="removed"><del><strong><ul>
- <li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet</strong></del></span>
+ <li><p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a></strong></del></span>
<span class="inserted"><ins><em><p>These bugs are/were not intentional,
so unlike the rest of the file
they do not count as malware. We mention them to refute the
@@ -216,7 +216,7 @@
<li id="M201608020">
<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
- in Internet</em></ins></span> Explorer and Edge</a> allows an
attacker to retrieve
+ in Internet Explorer and Edge</a></em></ins></span> allows an
attacker to retrieve
Microsoft account credentials, if the user is tricked into visiting
a malicious link.</p>
</li>
@@ -287,7 +287,7 @@
<span class="removed"><del><strong>10,</strong></del></span> <span
class="inserted"><ins><em>10</a>
on computers that were running Windows 7 and 8,
Microsoft</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theregister.co.uk/2016/06/01/windows_10_nagware_no_way_out/">they
find</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
repeatedly switched on a flag</em></ins></span> that <span
class="inserted"><ins><em>urged users to
“upgrade” to Windows 10</a> when</em></ins></span> they
<span class="removed"><del><strong>are denied</strong></del></span> <span
class="inserted"><ins><em>had turned
it off, in</em></ins></span> the <span
class="removed"><del><strong>option</strong></del></span> <span
class="inserted"><ins><em>hope that some day they would fail</em></ins></span>
to <span class="removed"><del><strong>cancel or even postpone the
@@ -476,7 +476,7 @@
<ul class="blurbs">
<li id="M201507150">
<p>Microsoft Office forces users <a
-
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
subscribe</em></ins></span> to <span class="removed"><del><strong>qualify
for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Microsoft committing
interference.</p>
@@ -712,7 +712,7 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on</em></ins></span> the <span
class="removed"><del><strong>same malware would later be
introduced</strong></del></span> <span
class="inserted"><ins><em>user</a>. <a
-
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html">
Windows 8.1 snoops on local searches</a>. And there's a <a
href="http://www.marketoracle.co.uk/Article40836.html"> secret NSA
key</em></ins></span> in <span
class="removed"><del><strong>MacOS.)</p></li></strong></del></span>
<span class="inserted"><ins><em>Windows</a>, whose functions we don't
know.</p>
@@ -740,7 +740,7 @@
<li id="M201210080">
<p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></em></ins></span>
+
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"></em></ins></span>
Windows 8 on “mobile devices” <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span
class="removed"><del><strong>jail</a>: it censors the
user's choice of application
programs.</p></li></strong></del></span>
<span class="inserted"><ins><em>jail</a>.</p>
@@ -836,7 +836,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary/po/malware-microsoft.ja.po 6 Mar 2019 09:30:54 -0000
1.112
+++ proprietary/po/malware-microsoft.ja.po 17 Mar 2019 10:32:40 -0000
1.113
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -237,9 +237,9 @@
#| "microsoft--we-can-remotely-delete-windows-8-apps.html\"> Windows 8 also "
#| "has a back door for remotely deleting apps</a>."
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2500036/desktop-apps/"
"microsoft--we-can-remotely-delete-windows-8-apps.html\">ã¦ã£ã³ãã¦ãº8ãé
éæ"
@@ -395,12 +395,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -663,9 +663,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <h3>
@@ -958,11 +958,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"ã¦ã£ã³ãã¦ãº8ã®ã¹ãã¤ã¦ã§ã¢: <a href=\"https://web.archive.org/"
"web/20160313105805/http://www.theregister.co.uk/2003/02/28/"
@@ -997,9 +997,9 @@
#| "app-store-lockdown\"> Windows 8 on “mobile devices” is a "
#| "jail</a>: it censors the user's choice of application programs."
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
"app-store-lockdown\">ãã¢ãã¤ã«ããã¤ã¹ãã®ã¦ã£ã³ãã¦ãº8ã¯ç¢çã§ã</a>:
ã¦ã¼"
Index: proprietary/po/malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/malware-microsoft.pot 6 Mar 2019 09:30:54 -0000
1.76
+++ proprietary/po/malware-microsoft.pot 17 Mar 2019 10:32:40 -0000
1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -164,7 +164,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"Windows 8 also has a back door for <a "
-"href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">
"
+"href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">
"
"remotely deleting apps</a>."
msgstr ""
@@ -281,7 +281,7 @@
"href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the "
"download of Windows 10</a> on computers that were running Windows 7 and 8, "
"Microsoft <a "
-"href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">
"
+"href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">
"
"repeatedly switched on a flag that urged users to “upgrade” to "
"Windows 10</a> when they had turned it off, in the hope that some day they "
"would fail to say no. To do this, Microsoft used <a "
@@ -454,7 +454,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a "
-"href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to
"
+"href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to
"
"subscribe to Office 365 to be able to create/edit documents</a>."
msgstr ""
@@ -631,7 +631,7 @@
"Spyware in older versions of Windows: <a "
"href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
"
"Windows Update snoops on the user</a>. <a "
-"href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">
"
+"href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">
"
"Windows 8.1 snoops on local searches</a>. And there's a <a "
"href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
"Windows</a>, whose functions we don't know."
@@ -658,7 +658,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"<a "
-"href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">
"
+"href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">
"
"Windows 8 on “mobile devices” (now defunct) was a jail</a>."
msgstr ""
Index: proprietary/po/malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary/po/malware-microsoft.ru.po 6 Mar 2019 16:59:37 -0000
1.198
+++ proprietary/po/malware-microsoft.ru.po 17 Mar 2019 10:32:40 -0000
1.199
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-11-20 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -218,10 +219,19 @@
"пÑизнаннÑе ÑкÑпеÑÑÑ Ð¿Ð¾ безопаÑноÑÑи."
#. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# |
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# | remotely deleting apps</a>.
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"Ð Windows 8 еÑÑÑ Ñакже лазейка Ð´Ð»Ñ <a
href=\"http://www.computerworld.com/"
"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
@@ -389,15 +399,38 @@
"ее непÑоÑÑо."
#. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# |
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">+}
+# | repeatedly switched on a flag that urged users to “upgrade” to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no. To do this, Microsoft used <a
+# |
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\">
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to “upgrade” to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no. To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co."
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
"ÐоÑле <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -655,11 +688,21 @@
msgstr "ÐодпиÑка"
#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href=\"https://www."
"computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
@@ -919,14 +962,31 @@
"user-data\"> ÑпеÑиалÑно Ð´Ð»Ñ Ñого, ÑÑобÑ
ÑпиониÑÑ</a>."
#. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# |
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the user</a>. <a
+# |
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² ÑÑаÑÑÑ
веÑÑиÑÑ
Windows: <a
href=\"https://www.theregister."
"co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update
подглÑдÑÐ²Ð°ÐµÑ "
@@ -963,10 +1023,19 @@
"ÑоÑÑÐ¾Ð¸Ñ Ð² Ñом, ÑÑо еÑÑÑ Ð¿ÑоÑÑой ÑпоÑоб
вÑйÑи из Ñежима S."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
"app-store-lockdown\"> Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
” (нÑне "
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/malware-mobiles.de-diff.html 9 Mar 2019 17:02:55 -0000
1.45
+++ proprietary/po/malware-mobiles.de-diff.html 17 Mar 2019 10:32:40 -0000
1.46
@@ -1214,7 +1214,7 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201210080">
<p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></em></ins></span>
+
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"></em></ins></span>
Windows 8 <span class="removed"><del><strong>are tyrants</a>. <a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows
8</strong></del></span> on “mobile devices” <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span
class="removed"><del><strong>jail.</a></p></strong></del></span>
@@ -1295,7 +1295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/09 17:02:55 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.de.po 9 Mar 2019 17:02:55 -0000
1.102
+++ proprietary/po/malware-mobiles.de.po 17 Mar 2019 10:32:40 -0000
1.103
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1979,10 +1979,19 @@
msgstr "Smartphone-Gefängnisse"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"https://www.itworld.com/article/2832657/operating-systems/"
"microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app store "
Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/malware-mobiles.es.po 11 Mar 2019 10:12:20 -0000
1.110
+++ proprietary/po/malware-mobiles.es.po 17 Mar 2019 10:32:40 -0000
1.111
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -1745,10 +1746,19 @@
msgstr "Los móviles como prisiones"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\">Windows 8 en los «dispositivos móviles»
(ya "
Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/po/malware-mobiles.fr.po 9 Mar 2019 18:22:39 -0000
1.131
+++ proprietary/po/malware-mobiles.fr.po 17 Mar 2019 10:32:40 -0000
1.132
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-03-09 19:11+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -1747,10 +1748,19 @@
msgstr "Prisons"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\">Feu Windows 8 pour « appareils mobilesÂ
» "
Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/malware-mobiles.it-diff.html 9 Mar 2019 17:02:55 -0000
1.50
+++ proprietary/po/malware-mobiles.it-diff.html 17 Mar 2019 10:32:40 -0000
1.51
@@ -1241,7 +1241,7 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201210080">
<p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></em></ins></span>
+
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"></em></ins></span>
Windows 8 <span class="removed"><del><strong>are tyrants</a>. <a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows
8</strong></del></span> on “mobile devices” <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span
class="removed"><del><strong>jail.</a></p></strong></del></span>
@@ -1322,7 +1322,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/09 17:02:55 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary/po/malware-mobiles.it.po 9 Mar 2019 17:02:55 -0000
1.102
+++ proprietary/po/malware-mobiles.it.po 17 Mar 2019 10:32:40 -0000
1.103
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1827,7 +1827,7 @@
# | <a
# | [-href=\"https://fsf.org/campaigns/secure-boot-vs-restricted-boot/\">Mobile
# | devices that come with-]
-# |
{+href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">+}
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
# | Windows 8 [-are tyrants</a>. <a
# |
href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">Windows
# | 8-] on “mobile devices” [-is-] {+(now defunct) was+} a
@@ -1840,9 +1840,9 @@
#| "metro-app-store-lock-down.html\">Windows 8 on “mobile "
#| "devices” is a jail.</a>"
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"https://fsf.org/campaigns/secure-boot-vs-restricted-boot/\">I "
"dispositivi mobili che hanno Windows 8 preinstallato sono tiranni</a>. <a "
Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/malware-mobiles.ja-diff.html 9 Mar 2019 17:02:55 -0000
1.64
+++ proprietary/po/malware-mobiles.ja-diff.html 17 Mar 2019 10:32:40 -0000
1.65
@@ -1086,7 +1086,7 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201210080">
<p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></em></ins></span>
+
href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"></em></ins></span>
Windows 8 <span class="removed"><del><strong>are tyrants</a>. <a
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows
8</strong></del></span> on “mobile devices” <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span
class="removed"><del><strong>jail.</a></p></strong></del></span>
@@ -1167,7 +1167,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/09 17:02:55 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.90
retrieving revision 1.91
diff -u -b -r1.90 -r1.91
--- proprietary/po/malware-mobiles.ja.po 9 Mar 2019 17:02:55 -0000
1.90
+++ proprietary/po/malware-mobiles.ja.po 17 Mar 2019 10:32:40 -0000
1.91
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1497,9 +1497,9 @@
#| "metro-app-store-lock-down.html\">Windows 8 on “mobile "
#| "devices” is a jail.</a>"
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a
href=\"https://fsf.org/campaigns/secure-boot-vs-restricted-boot/\">ã¦ã£ã³"
"ãã¦ãº8ã¨ä¸ç·ã«æ¥ãã¢ãã¤ã«ã»ããã¤ã¹ã¯æ´åã§ã</a>ã<a
href=\"http://www."
Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary/po/malware-mobiles.pot 9 Mar 2019 17:02:55 -0000 1.68
+++ proprietary/po/malware-mobiles.pot 17 Mar 2019 10:32:40 -0000 1.69
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1168,7 +1168,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"<a "
-"href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">
"
+"href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">
"
"Windows 8 on “mobile devices” (now defunct) was a jail</a>."
msgstr ""
Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/malware-mobiles.ru.po 9 Mar 2019 18:05:21 -0000
1.165
+++ proprietary/po/malware-mobiles.ru.po 17 Mar 2019 10:32:40 -0000
1.166
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-03-09 16:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -1729,10 +1730,19 @@
msgstr "ТÑÑÑмÑ"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
"app-store-lockdown\"> Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
” (нÑне "
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/nl.po 13 Mar 2019 11:00:59 -0000 1.49
+++ proprietary/po/nl.po 17 Mar 2019 10:32:40 -0000 1.50
@@ -2301,9 +2301,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3327,9 +3327,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
@@ -3803,9 +3803,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3931,12 +3931,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -4112,9 +4112,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <h3>
@@ -4288,11 +4288,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
#. type: Content of: <h3>
@@ -4314,9 +4314,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
#. type: Content of: <h3>
@@ -6887,13 +6887,13 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6920,9 +6920,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
#. type: Content of: <title>
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/pl.po 13 Mar 2019 11:00:59 -0000 1.49
+++ proprietary/po/pl.po 17 Mar 2019 10:32:40 -0000 1.50
@@ -1870,9 +1870,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2874,9 +2874,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
@@ -3305,9 +3305,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3410,12 +3410,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -3580,9 +3580,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <h3>
@@ -3754,11 +3754,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
#. type: Content of: <h3>
@@ -3780,9 +3780,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
#. type: Content of: <h3>
@@ -6396,13 +6396,13 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6429,9 +6429,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
#. type: Content of: <title>
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/pot 13 Mar 2019 11:00:59 -0000 1.49
+++ proprietary/po/pot 17 Mar 2019 10:32:40 -0000 1.50
@@ -1732,9 +1732,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2710,9 +2710,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
@@ -3131,9 +3131,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3236,12 +3236,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -3406,9 +3406,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <h3>
@@ -3580,11 +3580,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
#. type: Content of: <h3>
@@ -3606,9 +3606,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
#. type: Content of: <h3>
@@ -5886,13 +5886,13 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -5919,9 +5919,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
#. type: Content of: <title>
Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-back-doors.de-diff.html 6 Mar 2019 09:30:54
-0000 1.22
+++ proprietary/po/proprietary-back-doors.de-diff.html 17 Mar 2019 10:32:40
-0000 1.23
@@ -164,7 +164,7 @@
<span class="inserted"><ins><em><li id="M201512074">
<p><a
-
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a back door</em></ins></span> for <span
class="removed"><del><strong>Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
takes control</strong></del></span> <span
class="inserted"><ins><em>changing settings in a
@@ -363,7 +363,8 @@
<li id="M201103070"></em></ins></span>
<p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"></em></ins></span>
Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It was in a
program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
@@ -758,7 +759,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/proprietary-back-doors.de.po 6 Mar 2019 09:30:54 -0000
1.121
+++ proprietary/po/proprietary-back-doors.de.po 17 Mar 2019 10:32:40 -0000
1.122
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -274,10 +274,20 @@
"Smartphone und in Server-Konten ausschnüffeln, sondern auch ändern</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"//www.itworld.com/article/2705284/data-protection/backdoor-found-"
"in-d-link-router-firmware-code.html\">Einige D-Link Router</a> haben eine "
@@ -610,7 +620,8 @@
# <a href="#tn02" id="tn02-ref" class="transnote">[2]</a>
#. type: Content of: <ul><li><p>
# | In Android, <a
-# |
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
# | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
# | was in a program called GTalkService, which seems since then to have been
# | merged into Google Play.)
@@ -622,9 +633,9 @@
#| "GTalkService, which seems since then to have been merged into Google "
#| "Play.)"
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"Google hat in <a href=\"//www.computerworld.com/article/2506557/security0/"
Index: proprietary/po/proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/proprietary-back-doors.fr.po 6 Mar 2019 10:29:15 -0000
1.121
+++ proprietary/po/proprietary-back-doors.fr.po 17 Mar 2019 10:32:40 -0000
1.122
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-03-06 11:28+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -232,10 +233,20 @@
"security\">mais aussi les altérer</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\">Certains routeurs D-Link</a> ont "
@@ -534,10 +545,23 @@
"quelqu'un pour cela, et à qui."
#. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"Dans Android, <a href=\"http://www.computerworld.com/article/2506557/"
Index: proprietary/po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/proprietary-back-doors.it-diff.html 6 Mar 2019 09:30:54
-0000 1.49
+++ proprietary/po/proprietary-back-doors.it-diff.html 17 Mar 2019 10:32:40
-0000 1.50
@@ -168,7 +168,7 @@
<span class="inserted"><ins><em><li id="M201512074">
<p><a
-
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a</em></ins></span> back door <span
class="removed"><del><strong>in the application
processor,</strong></del></span> for
<span class="removed"><del><strong>Xiaomi's use</a>.</p>
@@ -292,136 +292,135 @@
<p>This seems to involve use of</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
- wiped</em></ins></span> a <span class="inserted"><ins><em>user's
Kindle-Swindle and deleted her account</a>, then
- offered her kafkaesque “explanations.”</p>
-
- <p>Do other ebook readers have</em></ins></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
- don't know,</em></ins></span> and <span
class="removed"><del><strong>8.</p>
+ wiped</em></ins></span> a <span class="removed"><del><strong>back door in
Windows 7</strong></del></span> <span class="inserted"><ins><em>user's
Kindle-Swindle</em></ins></span> and <span
class="removed"><del><strong>8.</p>
</li>
<li>
-<p>Most mobile phones</strong></del></span> <span
class="inserted"><ins><em>we</em></ins></span> have <span
class="inserted"><ins><em>no way to find out. There is no reason to
- assume that they don't.</p>
- </li>
-
- <li id="M201011220">
- <p>The iPhone has</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door, which has been used to</strong></del></span>
<span class="inserted"><ins><em>door for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+<p>Most mobile phones have a universal back door, which has been used to
+<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.
-</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
- remote wipe</a>. It's not always enabled, but users are led into
- enabling it without understanding.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android</strong></del></span>
-<span class="inserted"><ins><em></ul>
-
-
-<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
-
-<ul class="blurbs">
- <li id="M201811100">
- <p>Corel Paintshop Pro</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
- back <span class="removed"><del><strong>door</a>. Nearly all
-models</strong></del></span> <span class="inserted"><ins><em>door that can
make it cease to function</a>.</p>
-
- <p>The article is full</em></ins></span> of <span
class="removed"><del><strong>mobile phones</strong></del></span> <span
class="inserted"><ins><em>confusions, errors and biases that
we</em></ins></span> have
- <span class="inserted"><ins><em>an obligation to expose, given that we are
making</em></ins></span> a <span class="removed"><del><strong>universal back
door</strong></del></span> <span class="inserted"><ins><em>link to
them.</p>
+A Chinese version of Android has a universal back door</a>. Nearly all
+models of mobile phones</strong></del></span> <span
class="inserted"><ins><em>deleted her account</a>, then
+ offered her kafkaesque “explanations.”</p>
- <ul>
- <li>Getting a patent does not “enable” a company to do
- any particular thing</em></ins></span> in <span
class="inserted"><ins><em>its products. What it does enable</em></ins></span>
the <span class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
- to <span class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span>
is <span class="removed"><del><strong>controlled
+ <p>Do other ebook readers</em></ins></span> have <span
class="removed"><del><strong>a universal</strong></del></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> in <span
class="removed"><del><strong>the modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
+ don't know, and we have no way</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this one is controlled
by Coolpad.
</p>
</li>
<li>
-<p>Microsoft Windows has</strong></del></span> <span
class="inserted"><ins><em>sue other companies if they do some particular thing
in
- their products.</li>
-
- <li>A company's policies about when to attack users
through</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back
- door <span class="removed"><del><strong>through which
+<p>Microsoft Windows has a universal back door through which
<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on</strong></del></span> <span
class="inserted"><ins><em>are beside</em></ins></span> the <span
class="removed"><del><strong>users</a>.
+any change whatsoever can be imposed on the users</a>.
</p>
<p>More information on when
<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
this was used</a>.
</p>
-<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span
class="removed"><del><strong>universal</strong></del></span> back door is <span
class="removed"><del><strong>no longer hidden; all
+<p>In Windows 10, the universal back door</strong></del></span> <span
class="inserted"><ins><em>find out. There</em></ins></span> is no <span
class="removed"><del><strong>longer hidden; all
“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>wrong in the
- first place,</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
+and immediately imposed</a>.
</p>
</li>
<li><p>German government <a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
-away from Windows 8 computers with TPM 2.0 due to potential back
-door capabilities of</strong></del></span> <span
class="inserted"><ins><em>using</em></ins></span> the <span
class="removed"><del><strong>TPM 2.0 chip</a>.</p>
+away from Windows 8 computers with TPM 2.0 due</strong></del></span> <span
class="inserted"><ins><em>reason</em></ins></span> to <span
class="removed"><del><strong>potential back
+door capabilities of the TPM 2.0 chip</a>.</p>
</li>
<li>
-<p>The iPhone has a</strong></del></span> back door
-<span class="removed"><del><strong><a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
<span class="inserted"><ins><em>is always wrong too. No software
- developer should have</em></ins></span> that <span
class="removed"><del><strong>allows Apple</strong></del></span> <span
class="inserted"><ins><em>power over users.</li>
+<p>The iPhone has a back door
+<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
+ <span class="inserted"><ins><em>assume</em></ins></span> that <span
class="removed"><del><strong>allows Apple to remotely delete apps</a>
which Apple considers
+“inappropriate”. Jobs said it's ok for Apple to have this power
+because of course we can trust Apple.
+</p></strong></del></span> <span class="inserted"><ins><em>they
don't.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201011220"></em></ins></span>
+ <p>The iPhone has a back door for <a
+
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ remote wipe</a>. It's not always enabled, but users are led into
+ enabling it without <span class="removed"><del><strong>understanding.
+</p></strong></del></span> <span
class="inserted"><ins><em>understanding.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+ <p>Apple can, and regularly does,</strong></del></span>
+<span class="inserted"><ins><em></ul>
+
+
+<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
+
+<ul class="blurbs">
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease to function</a>.</p>
+
+ <p>The article is full of confusions, errors and biases that we have
+ an obligation to expose, given that we are making a link to them.</p>
+
+ <ul>
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing in its products. What it does enable the company
+ to do is sue other companies if they do</em></ins></span> some <span
class="removed"><del><strong>data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>particular thing in
+ their products.</li>
+
+ <li>A company's policies about when to attack users through a back
+ door are beside</em></ins></span> the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may</strong></del></span> <span
class="inserted"><ins><em>point. Inserting the back door is wrong in the
+ first place, and using the back door is always wrong too. No software
+ developer should</em></ins></span> have <span
class="removed"><del><strong>improved</strong></del></span> <span
class="inserted"><ins><em>that power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
-“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span
class="inserted"><ins><em>refer</em></ins></span> to <span
class="removed"><del><strong>have this power
-because</strong></del></span> <span class="inserted"><ins><em>sharing copies
is a smear;
+ attacking ships. Using that word to refer to sharing copies is a smear;
please don't smear sharing.</li>
- <li><p>The idea</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
-</p>
-</li>
-
-<li>
-<p>The iPhone has</strong></del></span> <span
class="inserted"><ins><em>“protecting our IP” is
- total confusion. The term “IP” itself is</em></ins></span> a
<span class="removed"><del><strong>back door for</strong></del></span> <a
<span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
-remote wipe</a>.</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/not-ipr.html">bogus
generalization about things
+ <li><p>The idea of “protecting our IP” is
+ total confusion. The term “IP” itself is a <a
+ href="/philosophy/not-ipr.html">bogus generalization about things
that have nothing in common</a>.</p>
<p>In addition, to speak of “protecting” that bogus
- generalization is a separate absurdity.</em></ins></span> It's <span
class="removed"><del><strong>not always enabled, but
users</strong></del></span> <span class="inserted"><ins><em>like calling the
cops
- because neighbors' kids</em></ins></span> are <span
class="removed"><del><strong>led into enabling</strong></del></span> <span
class="inserted"><ins><em>playing on your front yard, and saying
+ generalization is a separate absurdity. It's like calling the cops
+ because neighbors' kids are playing on your front yard, and saying
that you're “protecting the boundary line”. The kids can't do
harm
- to the boundary line, not even with a jackhammer,
because</em></ins></span> it <span class="removed"><del><strong>without
understanding.
-</p>
-</li>
-
-<li>
- <p>Apple can,</strong></del></span> <span class="inserted"><ins><em>is
an
- abstraction</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <span
class="inserted"><ins><em>can't be affected by physical
action.</p></li>
+ to the boundary line, not even</em></ins></span> with <span
class="inserted"><ins><em>a jackhammer, because it is an
+ abstraction and can't be affected by physical action.</p></li>
</ul>
</li>
<li id="M201804010">
- <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may have improved with</strong></del></span> <span
class="inserted"><ins><em>facts it presents. It
+ <p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span>
+ moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
apps</a>.</p>
@@ -458,36 +457,28 @@
<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201103070"></em></ins></span>
- <p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ <p>In Android, <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"></em></ins></span>
Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> in a
program called <span class="removed"><del><strong>GTalkService).
</p>
-<p>
-Google can also
-<a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-forcibly and remotely install apps</a> through GTalkService (which
-seems,</strong></del></span> <span class="inserted"><ins><em>GTalkService,
which seems</em></ins></span> since <span class="removed"><del><strong>that
article,</strong></del></span> <span
class="inserted"><ins><em>then</em></ins></span> to have been
- merged into Google <span
class="removed"><del><strong>Play).</strong></del></span> <span
class="inserted"><ins><em>Play.)</p>
+<p></strong></del></span> <span class="inserted"><ins><em>GTalkService,
which seems since then to have been
+ merged into</em></ins></span> Google <span
class="inserted"><ins><em>Play.)</p>
- <p>Google can also <a
+ <p>Google</em></ins></span> can also <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through
GTalkService.</em></ins></span> This is
- not equivalent to a universal back <span
class="removed"><del><strong>door, but permits various
-dirty tricks.
-</p>
-
-<p>
-Although Google's <em>exercise</em></strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
+ forcibly and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which
+seems, since</strong></del></span> <span
class="inserted"><ins><em>GTalkService. This is
+ not equivalent to a universal back door, but permits various dirty
tricks.</p>
<p>Although Google's <em>exercise</em> of this power has
not been
- malicious so far, the point is that nobody should have such power,
+ malicious so far, the point is</em></ins></span> that <span
class="removed"><del><strong>article,</strong></del></span> <span
class="inserted"><ins><em>nobody should have such power,
which could also be used maliciously. You might well decide to
let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for allowing it to
- <em>delete</em> the programs, and you should have the right to
decide
+ it considers malicious. But there is no excuse for allowing
it</em></ins></span> to
+ <span class="inserted"><ins><em><em>delete</em> the programs,
and you should</em></ins></span> have <span class="removed"><del><strong>been
merged</strong></del></span> <span class="inserted"><ins><em>the right to decide
who (if anyone) to trust in this way.</p>
</li>
@@ -518,8 +509,9 @@
<p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
+ listening device, remote changes to the code could surely convert
it</em></ins></span>
+ into <span class="removed"><del><strong>Google Play).
+This is</strong></del></span> <span class="inserted"><ins><em>one.</p>
</li>
<li id="M201711010">
@@ -537,9 +529,9 @@
this limit.</p>
<p>While remotely allowing car “owners” to use the
- whole battery capacity did not do them any harm, the same back
+ whole battery capacity did</em></ins></span> not <span
class="removed"><del><strong>equivalent</strong></del></span> <span
class="inserted"><ins><em>do them any harm, the same back
door would permit Tesla (perhaps under the command of some
- government) to remotely order the car to use none of its battery. Or
+ government) to remotely order the car</em></ins></span> to <span
class="inserted"><ins><em>use none of its battery. Or
perhaps to drive its passenger to a torture prison.</p>
</li>
@@ -592,7 +584,12 @@
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>. Nearly
+ A Chinese version of Android has</em></ins></span> a universal back <span
class="removed"><del><strong>door, but permits various
+dirty tricks.
+</p>
+
+<p>
+Although Google's <em>exercise</em></strong></del></span> <span
class="inserted"><ins><em>door</a>. Nearly
all models</em></ins></span> of <span class="removed"><del><strong>this
power has not been
malicious so far, the point is that nobody should</strong></del></span> <span
class="inserted"><ins><em>mobile phones</em></ins></span> have <span
class="removed"><del><strong>such power,
which could also be used maliciously. You might well decide to
let</strong></del></span> a
@@ -688,8 +685,8 @@
<p>Dell computers, shipped with
Windows, had a bogus root certificate</em></ins></span> that <span
class="removed"><del><strong>would give access</strong></del></span> <span
class="inserted"><ins><em><a
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">
- allowed anyone (not just Dell)</em></ins></span> to <span
class="inserted"><ins><em>remotely authorize any software to
- run</a> on</em></ins></span> the
+ allowed anyone (not just Dell) to remotely authorize any
software</em></ins></span> to
+ <span class="inserted"><ins><em>run</a> on</em></ins></span> the
<span class="removed"><del><strong>customer's data.
</p></strong></del></span> <span
class="inserted"><ins><em>computer.</p></em></ins></span>
</li>
@@ -833,7 +830,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- proprietary/po/proprietary-back-doors.it.po 6 Mar 2019 09:30:54 -0000
1.114
+++ proprietary/po/proprietary-back-doors.it.po 17 Mar 2019 10:32:40 -0000
1.115
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -269,10 +269,20 @@
"modificare</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\"> Alcuni router D-Link</a> hanno "
@@ -611,7 +621,8 @@
#. type: Content of: <ul><li><p>
# | In Android, <a
-# |
href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
# | Google has a back door to remotely delete [-apps.</a>-] {+apps</a>.+} (It
# | [-is-] {+was+} in a program called [-GTalkService).-] {+GTalkService,
# | which seems since then to have been merged into Google Play.)+}
@@ -622,9 +633,9 @@
#| "has a back door to remotely delete apps.</a> (It is in a program called "
#| "GTalkService)."
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
Index: proprietary/po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary/po/proprietary-back-doors.ja-diff.html 6 Mar 2019 09:30:54
-0000 1.45
+++ proprietary/po/proprietary-back-doors.ja-diff.html 17 Mar 2019 10:32:40
-0000 1.46
@@ -167,7 +167,7 @@
<li id="M201512074">
<p><a
-
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
Some D-Link routers</a> have a back door for changing settings in a
dlink of an eye.</p>
@@ -240,240 +240,197 @@
remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
</li>
<li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>books erased
was
+ <cite>1984</cite>, by George Orwell.</p>
+
+ <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>criticism by saying it
+ would delete books only following orders from</em></ins></span> the <span
class="removed"><del><strong>engine</a>
remotely.</p>
</li>
<li><p>
-Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local back door for 4 years</a>.
-</p></li>
-
-<li><p>Users reported that <a
-
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft</strong></del></span> <span class="inserted"><ins><em>books
erased</em></ins></span> was <span class="removed"><del><strong>forcing
them</strong></del></span>
- <span class="inserted"><ins><em><cite>1984</cite>, by George
Orwell.</p>
-
- <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7 and 8 with all-spying
- Windows 10</a>.</p>
-
- <p>Microsoft was in fact <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7 and 8</a>, switching on a
flag</strong></del></span> <span class="inserted"><ins><em>criticism by saying
it
- would delete books only following orders from the
- state. However,</em></ins></span> that <span
class="removed"><del><strong>said whether to “upgrade” to Windows
10 when users
- had turned</strong></del></span> <span class="inserted"><ins><em>policy
didn't last. In 2012</em></ins></span> it <span
class="removed"><del><strong>off.</p>
-
- <p>Later on, Microsoft published instructions
on</strong></del></span> <a
- <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject the downgrade to Windows 10</a>.</p>
-
- <p>This seems to involve use of</strong></del></span>
+Mac OS X had an</strong></del></span>
+ <span class="inserted"><ins><em>state. However, that policy didn't last.
In 2012 it</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local</strong></del></span>
<span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
- wiped</em></ins></span> a <span class="inserted"><ins><em>user's
Kindle-Swindle and deleted her account</a>, then
+ wiped a user's Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
- <p>Do other ebook readers have</em></ins></span> back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
- don't know,</em></ins></span> and <span
class="removed"><del><strong>8.</p>
-</li>
-
-<li>
-<p>Most mobile phones</strong></del></span> <span
class="inserted"><ins><em>we</em></ins></span> have <span
class="inserted"><ins><em>no way to find out. There is no reason to
+ <p>Do other ebook readers have back doors in their nonfree software?
We
+ don't know, and we have no way to find out. There is no reason to
assume that they don't.</p>
</li>
<li id="M201011220">
- <p>The iPhone has</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door, which has been used to</strong></del></span>
<span class="inserted"><ins><em>door for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p></strong></del></span>
+ <p>The iPhone has a</em></ins></span> back door for <span
class="removed"><del><strong>4 years</a>.
+</p></li>
+
+<li><p>Users reported that</strong></del></span> <a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them to replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
- enabling it without understanding.</p></em></ins></span>
+ enabling it without understanding.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
<ul class="blurbs">
<li id="M201811100">
- <p>Corel Paintshop Pro</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
- back <span class="removed"><del><strong>door</a>. Nearly all
-models</strong></del></span> <span class="inserted"><ins><em>door that can
make it cease to function</a>.</p>
-
- <p>The article is full</em></ins></span> of <span
class="removed"><del><strong>mobile phones</strong></del></span> <span
class="inserted"><ins><em>confusions, errors and biases that
we</em></ins></span> have
- <span class="inserted"><ins><em>an obligation to expose, given that we are
making</em></ins></span> a <span class="removed"><del><strong>universal back
door</strong></del></span> <span class="inserted"><ins><em>link to
them.</p>
+ <p>Corel Paintshop Pro has a</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door</em></ins></span> that <span class="removed"><del><strong>run
Windows 7</strong></del></span> <span class="inserted"><ins><em>can make it
cease to function</a>.</p>
+
+ <p>The article is full of confusions, errors</em></ins></span> and
<span class="removed"><del><strong>8</a>, switching on a
flag</strong></del></span> <span
class="inserted"><ins><em>biases</em></ins></span> that <span
class="removed"><del><strong>said whether</strong></del></span> <span
class="inserted"><ins><em>we have
+ an obligation</em></ins></span> to <span
class="removed"><del><strong>“upgrade”</strong></del></span> <span
class="inserted"><ins><em>expose, given that we are making a
link</em></ins></span> to <span class="removed"><del><strong>Windows 10 when
users
+ had turned it off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how</strong></del></span> <span class="inserted"><ins><em>them.</p>
<ul>
- <li>Getting a patent does not “enable” a company to do
- any particular thing</em></ins></span> in <span
class="inserted"><ins><em>its products. What it does enable</em></ins></span>
the <span class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
- to <span class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>do</em></ins></span>
is <span class="removed"><del><strong>controlled
-by Coolpad.
-</p>
-</li>
+ <li>Getting a patent does not “enable” a
company</em></ins></span> to <span class="removed"><del><strong>permanently
reject</strong></del></span> <span class="inserted"><ins><em>do
+ any particular thing in its products. What it does
enable</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
+ to <span class="removed"><del><strong>Windows 10</a>.</p>
-<li>
-<p>Microsoft Windows has</strong></del></span> <span
class="inserted"><ins><em>sue other companies if they do some particular thing
in
+ <p>This seems</strong></del></span> <span
class="inserted"><ins><em>do is sue other companies if they do some particular
thing in
their products.</li>
- <li>A company's policies about when to attack users
through</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back
- door <span class="removed"><del><strong>through which
-<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on</strong></del></span> <span
class="inserted"><ins><em>are beside</em></ins></span> the <span
class="removed"><del><strong>users</a>.
-</p>
-<p>More information on when
-<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
-this was used</a>.
-</p>
-<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>point. Inserting</em></ins></span> the <span
class="removed"><del><strong>universal</strong></del></span> back door is <span
class="removed"><del><strong>no longer hidden; all
-“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>wrong in the
- first place,</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
-</p>
+ <li>A company's policies about when</em></ins></span> to <span
class="removed"><del><strong>involve use of</strong></del></span> <span
class="inserted"><ins><em>attack users through</em></ins></span> a back
+ door <span class="inserted"><ins><em>are beside the point. Inserting the
back door is wrong</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>the
+ first place,</em></ins></span> and <span
class="removed"><del><strong>8.</p>
</li>
<li>
-<p>Windows 8's</strong></del></span> <span
class="inserted"><ins><em>using the</em></ins></span> back <span
class="removed"><del><strong>doors are so gaping</strong></del></span> <span
class="inserted"><ins><em>door is always wrong too. No software
- developer should have</em></ins></span> that <span
class="inserted"><ins><em>power over users.</li>
+<p>Most mobile phones have a universal</strong></del></span> <span
class="inserted"><ins><em>using the</em></ins></span> back <span
class="removed"><del><strong>door, which has been used</strong></del></span>
<span class="inserted"><ins><em>door is always wrong too. No software
+ developer should have that power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word to refer to sharing copies is a smear;
+ attacking ships. Using that word</em></ins></span> to <span
class="inserted"><ins><em>refer to sharing copies is a smear;
please don't smear sharing.</li>
<li><p>The idea of “protecting our IP” is
- total confusion. The term “IP” itself is a</em></ins></span>
<a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
+ total confusion. The term “IP” itself is a</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
+</p></strong></del></span>
<span class="inserted"><ins><em>href="/philosophy/not-ipr.html">bogus
generalization about things
that have nothing in common</a>.</p>
<p>In addition, to speak of “protecting” that bogus
- generalization is a separate absurdity. It's like
calling</em></ins></span> the <span class="removed"><del><strong>German
government has decided</strong></del></span> <span
class="inserted"><ins><em>cops
+ generalization is a separate absurdity. It's like calling the cops
because neighbors' kids are playing on your front yard, and saying
that you're “protecting the boundary line”. The kids can't do
harm
- to the boundary line, not even with a jackhammer,
because</em></ins></span> it <span class="inserted"><ins><em>is an
- abstraction and</em></ins></span> can't be <span
class="removed"><del><strong>trusted</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>affected by
physical action.</p></li>
+ to the boundary line, not even with a jackhammer, because it is an
+ abstraction and can't be affected by physical action.</p></li>
</ul></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>The iPhone has a back door
-<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
+<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A Chinese version</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>allows Apple</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
+ load downgrades that install a surveillance app</a>.</p>
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
-“inappropriate”. Jobs said it's ok</strong></del></span> <span
class="inserted"><ins><em>the article</em></ins></span> for <span
class="removed"><del><strong>Apple to have this power
-because</strong></del></span> <span class="inserted"><ins><em>the facts it
presents. It
+ <p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
-</p></strong></del></span> <span class="inserted"><ins><em>surrendering
to Netflix. The Netflix app <a
+ moral weakness</em></ins></span> of <span
class="inserted"><ins><em>surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ malware too</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>The iPhone</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus,</em></ins></span>
has a back door <span class="removed"><del><strong>for
-<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
-remote wipe</a>. It's not always enabled, but users are led into
enabling
-it without understanding.
-</p>
-</li>
-
-<li>
- <p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the state</a>.
- </p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
+ <li id="M201511090">
+ <p>Baidu's proprietary</em></ins></span> Android <span
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door</a>. Nearly all
+models of mobile phones have</strong></del></span> <span
class="inserted"><ins><em>door that <a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload files” as well as forcibly install
apps</a>.</p>
- <p>It is used by 14,000 Android
applications.</p></em></ins></span>
+ <p>It is used by 14,000 Android applications.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201112080">
+ <li id="M201112080">
<p> In addition to its <a href="#windows-update">universal back
- door</a>,</em></ins></span> Windows 8 <span
class="removed"><del><strong>also</strong></del></span> has a back door for
<span class="inserted"><ins><em><a
-
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
- remotely deleting <span class="removed"><del><strong>apps</a>.
-</p>
+ door</a>, Windows 8 has</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>for <a
+
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ remotely deleting apps</a>.</p>
-<p>
-You</strong></del></span> <span
class="inserted"><ins><em>apps</a>.</p>
-
- <p>You</em></ins></span> might well decide to let a security service
that you trust
+ <p>You might well decide</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>let a security
service that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
- But there is no excuse for <em>deleting</em> the programs, and
you
- should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.
-</p>
-
-<p>
-As these pages show, if you do want to clean your computer of malware,
-the first software to delete is Windows or iOS.
-</p></strong></del></span>
- <span class="inserted"><ins><em>way.</p></em></ins></span>
+ But there</em></ins></span> is <span
class="removed"><del><strong>controlled
+by Coolpad.
+</p></strong></del></span> <span class="inserted"><ins><em>no excuse for
<em>deleting</em> the programs, and you
+ should have the right to decide whom (if anyone) to trust in this
+ way.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<span class="removed"><del><strong><li>
+<p>Microsoft Windows</strong></del></span>
- <span class="inserted"><ins><em><li id="M201103070"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201103070">
<p>In Android, <a
-
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> in a
- program called <span class="removed"><del><strong>GTalkService).
-</p>
+
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
+ Google</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>through</strong></del></span> <span
class="inserted"><ins><em>to remotely delete apps</a>. (It was in a
+ program called GTalkService,</em></ins></span> which
+<span class="removed"><del><strong><a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever</strong></del></span> <span
class="inserted"><ins><em>seems since then to have been
+ merged into Google Play.)</p>
-<p></strong></del></span> <span class="inserted"><ins><em>GTalkService,
which seems since then to have been
- merged into</em></ins></span> Google <span
class="inserted"><ins><em>Play.)</p>
-
- <p>Google</em></ins></span> can also <a
-
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which
-seems, since that article, to have been merged into Google
Play).</strong></del></span> <span
class="inserted"><ins><em>GTalkService.</em></ins></span> This is
- not equivalent to a universal back door, but permits various dirty <span
class="removed"><del><strong>tricks.
+ <p>Google</em></ins></span> can <span
class="removed"><del><strong>be imposed on the users</a>.
</p>
+<p>More information on when</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+this was used</a>.
+</p>
+<p>In Windows 10, the</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through GTalkService. This is
+ not equivalent to a</em></ins></span> universal back <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
+ tricks.</p>
+
+ <p>Although Google's <em>exercise</em> of this power has
not been
+ malicious so far, the point</em></ins></span> is <span
class="removed"><del><strong>no longer hidden; all
+“upgrades” will</strong></del></span> <span
class="inserted"><ins><em>that nobody should have such power,
+ which could also</em></ins></span> be <span
class="removed"><del><strong><a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
+and immediately imposed</a>.
+</p>
+</li>
-<p>
-Although</strong></del></span>
- <span class="inserted"><ins><em>tricks.</p>
-
- <p>Although</em></ins></span> Google's <em>exercise</em>
of this power has not been
- malicious so far, the point is that nobody should have such power,
- which could also be used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for allowing it to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
- <span class="inserted"><ins><em><em>delete</em> the programs,
and you should have the right to decide
- who (if anyone) to trust in this way.</p>
+<li>
+<p>Windows 8's back doors are so gaping</strong></del></span> <span
class="inserted"><ins><em>used maliciously. You might well decide to
+ let a security service remotely <em>deactivate</em>
programs</em></ins></span> that
+<span class="removed"><del><strong><a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
+the German government has decided</strong></del></span>
+ it <span class="removed"><del><strong>can't be trusted</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>considers
malicious. But there is no excuse for allowing it to
+ <em>delete</em> the programs, and you should have the right to
decide
+ who (if anyone) to trust in this way.</p></em></ins></span>
</li>
- <li id="M200808110">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
<p>The iPhone has a back door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have
- this power because of course we can trust Apple.</p>
+ “inappropriate”. Jobs said it's <span
class="removed"><del><strong>ok</strong></del></span> <span
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
+ this power because of course we can trust <span
class="removed"><del><strong>Apple.
+</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li>
+<p>The iPhone has</strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id='universal'>Full control</h3>
@@ -482,82 +439,136 @@
<li id="M201812300">
<p>New GM cars <a
href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
+ offer the feature of</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door for
+<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
enabling
+it without understanding.
+</p>
+</li>
- <p>Every nonfree program offers the user zero security against its
+<li>
+ <p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>door</a>.</p>
+
+ <p>Every nonfree program offers</em></ins></span> the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8</strong></del></span> <span class="inserted"><ins><em>user
zero</em></ins></span> security <span
class="removed"><del><strong>improvements</a>; but</strong></del></span>
<span class="inserted"><ins><em>against its
developer. With this malfeature, GM has explicitly made things even
worse.</p>
</li>
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If the product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
listening device, remote changes to the code could surely convert it
- into one.</p>
+ into one.</p></em></ins></span>
</li>
- <li id="M201711010">
- <p>Sony has brought back its robotic pet Aibo, this time <a
+
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+Windows 8 also</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711010">
+ <p>Sony</em></ins></span> has <span
class="inserted"><ins><em>brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with a universal back door, and tethered to a server that requires
+ with</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door for remotely deleting apps</a>.
+</p>
+
+<p>
+You might well decide</strong></del></span> <span
class="inserted"><ins><em>door, and tethered</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> a <span
class="removed"><del><strong>security service that you trust
+remotely <em>deactivate</em> programs</strong></del></span> <span
class="inserted"><ins><em>server</em></ins></span> that <span
class="removed"><del><strong>it considers malicious.
+But there is no excuse for <em>deleting</em></strong></del></span>
<span class="inserted"><ins><em>requires
a subscription</a>.</p>
</li>
<li id="M201709090.1">
- <p>Tesla used software to limit the part of the battery
- that was available to customers in some cars, and <a
+ <p>Tesla used software to limit</em></ins></span> the <span
class="removed"><del><strong>programs, and you
+should have</strong></del></span> <span class="inserted"><ins><em>part
of</em></ins></span> the <span class="removed"><del><strong>right to decide who
(if anyone)</strong></del></span> <span class="inserted"><ins><em>battery
+ that was available</em></ins></span> to <span
class="removed"><del><strong>trust</strong></del></span> <span
class="inserted"><ins><em>customers in some cars, and <a
href="https://techcrunch.com/2017/09/09/tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-people-evacuate/">
- a universal back door in the software</a> to temporarily increase
- this limit.</p>
+ a universal back door</em></ins></span> in <span
class="inserted"><ins><em>the software</a> to temporarily
increase</em></ins></span>
+ this <span class="removed"><del><strong>way.
+</p>
- <p>While remotely allowing car “owners” to use the
+<p>
+As these pages show, if you do want</strong></del></span> <span
class="inserted"><ins><em>limit.</p>
+
+ <p>While remotely allowing car
“owners”</em></ins></span> to <span
class="removed"><del><strong>clean your computer</strong></del></span> <span
class="inserted"><ins><em>use the
whole battery capacity did not do them any harm, the same back
- door would permit Tesla (perhaps under the command of some
- government) to remotely order the car to use none of its battery. Or
- perhaps to drive its passenger to a torture prison.</p>
+ door would permit Tesla (perhaps under the command</em></ins></span> of
<span class="removed"><del><strong>malware,</strong></del></span> <span
class="inserted"><ins><em>some
+ government) to remotely order</em></ins></span> the <span
class="removed"><del><strong>first software</strong></del></span> <span
class="inserted"><ins><em>car</em></ins></span> to <span
class="removed"><del><strong>delete is Windows or iOS.
+</p></strong></del></span> <span class="inserted"><ins><em>use none of
its battery. Or
+ perhaps to drive its passenger to a torture
prison.</p></em></ins></span>
</li>
- <li id="M201702060.1">
- <p>Vizio “smart” TVs <a
-
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
- have a universal back door</a>.</p>
+<span class="removed"><del><strong><li>
+<p>In Android,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702060.1">
+ <p>Vizio “smart” TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+Google has</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">
+ have</em></ins></span> a <span class="inserted"><ins><em>universal back
door</a>.</p>
</li>
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">
- a universal back door in the application processor, for Xiaomi's
+ a universal</em></ins></span> back door <span
class="removed"><del><strong>to remotely delete apps.</a>
(It</strong></del></span> <span class="inserted"><ins><em>in the application
processor, for Xiaomi's
use</a>.</p>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor that the local phone
+ <p>This</em></ins></span> is <span
class="inserted"><ins><em>separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door</em></ins></span> in <span
class="inserted"><ins><em>the modem processor that the local phone
company can use</a>.</p>
</li>
<li id="M201608171">
<p id="windows-update">Microsoft
- Windows has a universal back door through which <a
+ Windows has</em></ins></span> a <span class="removed"><del><strong>program
+called GTalkService).
+</p>
+
+<p>
+Google</strong></del></span> <span class="inserted"><ins><em>universal back
door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
- any change whatsoever can be imposed on the users</a>.</p>
+ any change whatsoever</em></ins></span> can <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>be imposed on the users</a>.</p>
- <p>This was <a
- href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- reported in 2007</a> for XP and Vista, and it seems
- that Microsoft used the same method to push the <a
+ <p>This was</em></ins></span> <a <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+forcibly</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ reported in 2007</a> for XP</em></ins></span> and <span
class="removed"><del><strong>remotely install apps</a> through
GTalkService (which
+seems, since</strong></del></span> <span class="inserted"><ins><em>Vista, and
it seems</em></ins></span>
+ that <span class="removed"><del><strong>article,</strong></del></span>
<span class="inserted"><ins><em>Microsoft used the same
method</em></ins></span> to <span class="removed"><del><strong>have been merged
into Google Play).
+This is not equivalent</strong></del></span> <span
class="inserted"><ins><em>push the <a
href="/proprietary/malware-microsoft.html#windows10-forcing">
- Windows 10 downgrade</a> to computers running Windows 7 and
8.</p>
+ Windows 10 downgrade</a></em></ins></span> to <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>computers running Windows 7 and 8.</p>
- <p>In Windows 10,</em></ins></span> the <span
class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>universal back door
- is no longer hidden; all “upgrades” will be <a
+ <p>In Windows 10, the</em></ins></span> universal back <span
class="removed"><del><strong>door, but permits various
+dirty tricks.
+</p>
+
+<p>
+Although Google's <em>exercise</em> of this power has not been
+malicious so far, the point</strong></del></span> <span
class="inserted"><ins><em>door</em></ins></span>
+ is <span class="removed"><del><strong>that nobody should have such power,
+which could also</strong></del></span> <span class="inserted"><ins><em>no
longer hidden; all “upgrades” will</em></ins></span> be <span
class="removed"><del><strong>used maliciously. You might well
decide</strong></del></span> <span class="inserted"><ins><em><a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
- forcibly</em></ins></span> and <span class="removed"><del><strong>you
should</strong></del></span> <span class="inserted"><ins><em>immediately
imposed</a>.</p>
+ forcibly and immediately imposed</a>.</p>
</li>
<li id="M201606060">
- <p>The Amazon Echo appears to have a universal back door, since <a
- href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
- it installs “updates” automatically</a>.</p>
+ <p>The Amazon Echo appears</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>have</em></ins></span> a
+<span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs that it
+considers malicious. But there is no excuse for
allowing</strong></del></span> <span class="inserted"><ins><em>universal back
door, since <a
+
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates"></em></ins></span>
+ it
+<span class="removed"><del><strong>to <em>delete</em> the
programs, and you should</strong></del></span> <span
class="inserted"><ins><em>installs “updates”
automatically</a>.</p>
<p>We</em></ins></span> have <span class="inserted"><ins><em>found
nothing explicitly documenting</em></ins></span> the <span
class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>lack of any way</em></ins></span>
to
@@ -658,8 +669,8 @@
<p>Dell computers, shipped with
Windows, had a bogus root certificate</em></ins></span> that <span
class="removed"><del><strong>would give access</strong></del></span> <span
class="inserted"><ins><em><a
href="http://fossforce.com/2015/11/dell-comcast-intel-who-knows-who-else-are-out-to-get-you/">
- allowed anyone (not just Dell)</em></ins></span> to <span
class="inserted"><ins><em>remotely authorize any software to
- run</a> on</em></ins></span> the
+ allowed anyone (not just Dell) to remotely authorize any
software</em></ins></span> to
+ <span class="inserted"><ins><em>run</a> on</em></ins></span> the
<span class="removed"><del><strong>customer's data.
</p></strong></del></span> <span
class="inserted"><ins><em>computer.</p></em></ins></span>
</li>
@@ -803,7 +814,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/06 09:30:54 $
+$Date: 2019/03/17 10:32:40 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary/po/proprietary-back-doors.ja.po 6 Mar 2019 09:30:54 -0000
1.93
+++ proprietary/po/proprietary-back-doors.ja.po 17 Mar 2019 10:32:40 -0000
1.94
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -197,10 +197,15 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/darticle/2705284/data-protection/backdoor-"
"found-d-link-router-firmware-code.html\">ããã¤ãã®D-Linkã®ã«ã¼ã¿</a>ã¯ããã¯"
@@ -510,9 +515,9 @@
#| "has a back door to remotely delete apps.</a> (It is in a program called "
#| "GTalkService)."
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"ã¢ã³ããã¤ãã§ã¯<a
href=\"http://www.computerworld.com/article/2506557/"
Index: proprietary/po/proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary-back-doors.pot 6 Mar 2019 09:30:54 -0000
1.63
+++ proprietary/po/proprietary-back-doors.pot 17 Mar 2019 10:32:40 -0000
1.64
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -168,7 +168,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"<a "
-"href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">
"
+"href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">
"
"Some D-Link routers</a> have a back door for changing settings in a dlink of "
"an eye."
msgstr ""
@@ -370,7 +370,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"In Android, <a "
-"href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">
"
+"href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">
"
"Google has a back door to remotely delete apps</a>. (It was in a program "
"called GTalkService, which seems since then to have been merged into Google "
"Play.)"
Index: proprietary/po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary/po/proprietary-back-doors.ru.po 6 Mar 2019 16:59:37 -0000
1.168
+++ proprietary/po/proprietary-back-doors.ru.po 17 Mar 2019 10:32:41 -0000
1.169
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-03-06 09:27+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -226,10 +227,20 @@
"в ÑÑеÑнÑÑ
запиÑÑÑ
ÑеÑвеÑа, оно Ð¼Ð¾Ð¶ÐµÑ Ð¸
подменÑÑÑ Ð¸Ñ
</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\">РнекоÑоÑÑÑ
маÑÑÑÑÑизаÑоÑаÑ
D-"
@@ -521,10 +532,23 @@
"вообÑе)."
#. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"Ð Android <a href=\"http://www.computerworld.com/article/2506557/security0/"
Index: proprietary/po/proprietary-interference.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- proprietary/po/proprietary-interference.de-diff.html 11 Feb 2019
12:59:22 -0000 1.21
+++ proprietary/po/proprietary-interference.de-diff.html 17 Mar 2019
10:32:41 -0000 1.22
@@ -188,7 +188,7 @@
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">
nagging users obnoxiously</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html#windows10-forcing">forcing
the download of Windows 10</a>
on computers that were running Windows 7</em></ins></span> and <span
class="inserted"><ins><em>8, Microsoft <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"></em></ins></span>
+
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html"></em></ins></span>
repeatedly <span class="inserted"><ins><em>switched on a flag that urged
users to
“upgrade”</em></ins></span> to <span
class="removed"><del><strong>install</strong></del></span> Windows <span
class="removed"><del><strong>10</a>.</p>
</li>
@@ -338,7 +338,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/11 12:59:22 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-interference.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.de.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary/po/proprietary-interference.de.po 11 Feb 2019 12:59:22
-0000 1.59
+++ proprietary/po/proprietary-interference.de.po 17 Mar 2019 10:32:41
-0000 1.60
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -254,12 +254,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
Index: proprietary/po/proprietary-interference.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.fr.po,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-interference.fr.po 12 Feb 2019 10:46:00
-0000 1.73
+++ proprietary/po/proprietary-interference.fr.po 17 Mar 2019 10:32:41
-0000 1.74
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-02-11 19:48+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"Plural-Forms: \n"
#. type: Content of: <title>
@@ -267,15 +268,38 @@
"sous Windows 10</a> et ne peut pas être désactivé facilement."
#. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# |
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">+}
+# | repeatedly switched on a flag that urged users to “upgrade” to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no. To do this, Microsoft used <a
+# |
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\">
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to “upgrade” to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no. To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co."
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
"Après avoir <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
Index: proprietary/po/proprietary-interference.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-interference.ja-diff.html 11 Feb 2019
12:59:23 -0000 1.30
+++ proprietary/po/proprietary-interference.ja-diff.html 17 Mar 2019
10:32:41 -0000 1.31
@@ -179,7 +179,7 @@
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
into replacing</strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html#windows10-forcing">forcing
the download of Windows 10</a>
on computers that were running</em></ins></span> Windows 7 <span
class="removed"><del><strong>with</strong></del></span> <span
class="inserted"><ins><em>and 8, Microsoft <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+
href="https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
repeatedly switched on a flag that urged users to
“upgrade” to</em></ins></span> Windows <span
class="removed"><del><strong>10</a>.</p></li>
@@ -324,7 +324,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/11 12:59:23 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-interference.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ja.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-interference.ja.po 11 Feb 2019 12:59:23
-0000 1.54
+++ proprietary/po/proprietary-interference.ja.po 17 Mar 2019 10:32:41
-0000 1.55
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2016-10-31 12:53+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -201,12 +201,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
Index: proprietary/po/proprietary-interference.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.pot,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary/po/proprietary-interference.pot 11 Feb 2019 12:59:23 -0000
1.35
+++ proprietary/po/proprietary-interference.pot 17 Mar 2019 10:32:41 -0000
1.36
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -187,7 +187,7 @@
"href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the "
"download of Windows 10</a> on computers that were running Windows 7 and 8, "
"Microsoft <a "
-"href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">
"
+"href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">
"
"repeatedly switched on a flag that urged users to “upgrade” to "
"Windows 10</a> when they had turned it off, in the hope that some day they "
"would fail to say no. To do this, Microsoft used <a "
Index: proprietary/po/proprietary-interference.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-interference.ru.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary/po/proprietary-interference.ru.po 25 Feb 2019 09:37:05
-0000 1.92
+++ proprietary/po/proprietary-interference.ru.po 17 Mar 2019 10:32:41
-0000 1.93
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-interference.html\n"
-"POT-Creation-Date: 2019-02-11 12:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-10-14 06:11+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Interference - GNU Project - Free Software Foundation"
@@ -269,15 +270,38 @@
"ее непÑоÑÑо."
#. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# |
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">+}
+# | repeatedly switched on a flag that urged users to “upgrade” to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no. To do this, Microsoft used <a
+# |
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\">
+# | malware techniques</a>.
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to “upgrade” to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no. To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co."
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
"ÐоÑле <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
Index: proprietary/po/proprietary-jails.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-jails.de-diff.html 5 Jan 2019 11:31:35
-0000 1.22
+++ proprietary/po/proprietary-jails.de-diff.html 17 Mar 2019 10:32:41
-0000 1.23
@@ -255,8 +255,8 @@
</li>
<li id="M201210080"></em></ins></span>
- <p><a
-
href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
+ <p><a <span
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html"></em></ins></span>
Windows 8 on “mobile devices” (now defunct) was a
<span
class="removed"><del><strong>jail</a>.</p></li></strong></del></span>
<span class="inserted"><ins><em>jail</a>.</p>
@@ -328,7 +328,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary/po/proprietary-jails.de.po 5 Jan 2019 11:31:35 -0000
1.50
+++ proprietary/po/proprietary-jails.de.po 17 Mar 2019 10:32:41 -0000
1.51
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -391,10 +391,19 @@
"Möglichkeit, den S-Modus auszuschalten."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"https://www.itworld.com/article/2832657/operating-systems/"
"microsoft-metro-app-store-lock-down.html\" title=\"Microsoft Metro app store "
Index: proprietary/po/proprietary-jails.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es.po,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -b -r1.48 -r1.49
--- proprietary/po/proprietary-jails.es.po 18 Jan 2019 12:43:25 -0000
1.48
+++ proprietary/po/proprietary-jails.es.po 17 Mar 2019 10:32:41 -0000
1.49
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-01-18 13:37+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -365,10 +366,19 @@
"salir del modo S."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\">Windows 8 para «dispositivos móviles» (ya
"
Index: proprietary/po/proprietary-jails.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary/po/proprietary-jails.fr.po 5 Jan 2019 16:13:44 -0000
1.55
+++ proprietary/po/proprietary-jails.fr.po 17 Mar 2019 10:32:41 -0000
1.56
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-01-05 17:13+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
#. type: Content of: <title>
@@ -359,10 +360,19 @@
"mode S."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\">Feu Windows 8 pour « appareils mobilesÂ
» "
Index: proprietary/po/proprietary-jails.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-jails.it-diff.html 5 Jan 2019 11:31:35
-0000 1.30
+++ proprietary/po/proprietary-jails.it-diff.html 17 Mar 2019 10:32:41
-0000 1.31
@@ -322,7 +322,7 @@
<span class="inserted"><ins><em><li id="M201210080"></em></ins></span>
<p><a
<span
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
+ <span
class="inserted"><ins><em>href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html">
Windows</em></ins></span> 8 on “mobile devices” <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span
class="removed"><del><strong>jail.</a></p></strong></del></span>
<span class="inserted"><ins><em>jail</a>.</p></em></ins></span>
</li>
@@ -401,7 +401,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it.po,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-jails.it.po 5 Jan 2019 11:31:35 -0000
1.54
+++ proprietary/po/proprietary-jails.it.po 17 Mar 2019 10:32:41 -0000
1.55
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:15+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -462,8 +462,9 @@
#. type: Content of: <ul><li><p>
# | <a
-# |
href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">{+
-# | +}Windows 8 on “mobile devices” [-is-] {+(now defunct) was+} a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">Windows-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">
+# | Windows+} 8 on “mobile devices” [-is-] {+(now defunct) was+} a
# | [-jail.</a>-] {+jail</a>.+}
#, fuzzy
#| msgid ""
@@ -471,9 +472,9 @@
#| "microsoft-metro-app-store-lock-down.html\">Windows 8 on “mobile "
#| "devices” is a jail.</a>"
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lock-down.html\">Windows 8 sui “dispositivi "
Index: proprietary/po/proprietary-jails.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary/po/proprietary-jails.ja-diff.html 5 Jan 2019 11:31:35
-0000 1.29
+++ proprietary/po/proprietary-jails.ja-diff.html 17 Mar 2019 10:32:41
-0000 1.30
@@ -233,7 +233,7 @@
<li id="M201210080"></em></ins></span>
<p><a
<span
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">
+ <span
class="inserted"><ins><em>href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html">
Windows</em></ins></span> 8 on “mobile devices” <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>(now defunct) was</em></ins></span> a <span
class="removed"><del><strong>jail.</a></p></strong></del></span>
<span class="inserted"><ins><em>jail</a>.</p></em></ins></span>
</li>
@@ -312,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/01/05 11:31:35 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-jails.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary/po/proprietary-jails.ja.po 5 Jan 2019 11:31:35 -0000
1.42
+++ proprietary/po/proprietary-jails.ja.po 17 Mar 2019 10:32:41 -0000
1.43
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:28+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -369,9 +369,9 @@
#| "microsoft-metro-app-store-lock-down.html\">Windows 8 on “mobile "
#| "devices” is a jail.</a>"
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
"metro-app-store-lockdown\">ãã¢ãã¤ã«ã»ããã¤ã¹ãä¸ã®ã¦ã£ã³ãã¦ãº8ã¯ç¢çã§"
Index: proprietary/po/proprietary-jails.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.pot,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary/po/proprietary-jails.pot 5 Jan 2019 11:31:35 -0000
1.26
+++ proprietary/po/proprietary-jails.pot 17 Mar 2019 10:32:41 -0000
1.27
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -251,7 +251,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"<a "
-"href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">
"
+"href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">
"
"Windows 8 on “mobile devices” (now defunct) was a jail</a>."
msgstr ""
Index: proprietary/po/proprietary-jails.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary-jails.ru.po 25 Feb 2019 09:37:05 -0000
1.74
+++ proprietary/po/proprietary-jails.ru.po 17 Mar 2019 10:32:41 -0000
1.75
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-01-05 11:26+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-01-29 19:55+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Jails - GNU Project - Free Software Foundation"
@@ -357,10 +358,19 @@
"ÑоÑÑÐ¾Ð¸Ñ Ð² Ñом, ÑÑо еÑÑÑ Ð¿ÑоÑÑой ÑпоÑоб
вÑйÑи из Ñежима S."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
"app-store-lockdown\"> Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
” (нÑне "
Index: proprietary/po/proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-sabotage.de-diff.html 20 Feb 2019 15:30:47
-0000 1.30
+++ proprietary/po/proprietary-sabotage.de-diff.html 17 Mar 2019 10:32:41
-0000 1.31
@@ -462,7 +462,7 @@
<p>Apple forced millions</em></ins></span> of <span
class="removed"><del><strong>a back door in Windows 7 and 8.
</p></li>
-<li><p></strong></del></span> <span
class="inserted"><ins><em>iThings to</em></ins></span> <a
+<li><p></strong></del></span> <span
class="inserted"><ins><em>iThings to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"></strong></del></span>
<span
class="inserted"><ins><em>href="https://discussions.apple.com/thread/7256669?tstart=0">download
a system upgrade without asking the users</a>. Apple did not
forcibly install the upgrade but the downloading alone caused lots
@@ -470,8 +470,8 @@
</li>
<li id="M201509220">
- <p><a</em></ins></span>
-
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+ <p><a
+
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"></em></ins></span>
Lenovo stealthily installed crapware and spyware via
BIOS</a> on Windows installs. Note that the specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -677,7 +677,7 @@
<p>In 2014, <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">Oracle</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html">
Oracle</em></ins></span> insisted on continuing this <span
class="removed"><del><strong>practice.</a></p></strong></del></span>
<span class="inserted"><ins><em>practice</a>.</p>
</li>
@@ -764,7 +764,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/20 15:30:47 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary/po/proprietary-sabotage.de.po 20 Feb 2019 15:30:47 -0000
1.112
+++ proprietary/po/proprietary-sabotage.de.po 17 Mar 2019 10:32:41 -0000
1.113
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -798,14 +798,32 @@
"Reihe von Problemen."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"//www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\" "
@@ -1113,17 +1131,18 @@
#. type: Content of: <ul><li><p>
# | In 2014, <a
-# |
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">{+
-# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+# |
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">Oracle-]
+# |
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\">
+# | Oracle+} insisted on continuing this [-practice.</a>-] {+practice</a>.+}
#, fuzzy
#| msgid ""
#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
#| "\">Oracle insisted on continuing this practice.</a>"
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"201<ins>3</ins> <a href=\"//www.computerworld.com/article/2494794/malware-"
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\" "
Index: proprietary/po/proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/po/proprietary-sabotage.fr.po 21 Feb 2019 11:13:30 -0000
1.131
+++ proprietary/po/proprietary-sabotage.fr.po 17 Mar 2019 10:32:41 -0000
1.132
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-02-21 12:12+0100\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -676,14 +677,32 @@
"force, mais le téléchargement lui-même a causé pas mal de problèmes."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"
@@ -910,10 +929,19 @@
"mais nous le proposons comme référence factuelle."
#. type: Content of: <ul><li><p>
-msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+# | In 2014, <a
+# |
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\">+}
+# | Oracle insisted on continuing this practice</a>.
+#, fuzzy
+#| msgid ""
+#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#| "\"> Oracle insisted on continuing this practice</a>."
+msgid ""
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"En 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
Index: proprietary/po/proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/proprietary-sabotage.it-diff.html 20 Feb 2019 15:30:48
-0000 1.41
+++ proprietary/po/proprietary-sabotage.it-diff.html 17 Mar 2019 10:32:41
-0000 1.42
@@ -436,12 +436,12 @@
</p></li>
<li><p>
-<a</strong></del></span> <span class="inserted"><ins><em>trouble.</p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"></strong></del></span>
<span class="inserted"><ins><em>trouble.</p>
</li>
<li id="M201509220">
- <p><a</em></ins></span>
-
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+ <p><a
+
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"></em></ins></span>
Lenovo stealthily installed crapware and spyware via
BIOS</a> on Windows installs. Note that the specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -647,7 +647,7 @@
<p>In 2014, <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">Oracle</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html">
Oracle</em></ins></span> insisted on continuing this <span
class="removed"><del><strong>practice.</a></p></strong></del></span>
<span class="inserted"><ins><em>practice</a>.</p>
</li>
@@ -735,7 +735,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/20 15:30:48 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary/po/proprietary-sabotage.it.po 20 Feb 2019 15:30:48 -0000
1.106
+++ proprietary/po/proprietary-sabotage.it.po 17 Mar 2019 10:32:41 -0000
1.107
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -650,14 +650,32 @@
"avviso ha causato parecchi problemi."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -978,17 +996,18 @@
#. type: Content of: <ul><li><p>
# | In 2014, <a
-# |
href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">{+
-# | +}Oracle insisted on continuing this [-practice.</a>-] {+practice</a>.+}
+# |
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">Oracle-]
+# |
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\">
+# | Oracle+} insisted on continuing this [-practice.</a>-] {+practice</a>.+}
#, fuzzy
#| msgid ""
#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
#| "\">Oracle insisted on continuing this practice.</a>"
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"Nel 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
Index: proprietary/po/proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary/po/proprietary-sabotage.ja-diff.html 20 Feb 2019 15:30:48
-0000 1.43
+++ proprietary/po/proprietary-sabotage.ja-diff.html 17 Mar 2019 10:32:41
-0000 1.44
@@ -416,12 +416,12 @@
</p></li>
<li><p>
-<a</strong></del></span> <span class="inserted"><ins><em>trouble.</p>
+<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"></strong></del></span>
<span class="inserted"><ins><em>trouble.</p>
</li>
<li id="M201509220">
- <p><a</em></ins></span>
-
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+ <p><a
+
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"></em></ins></span>
Lenovo stealthily installed crapware and spyware via
BIOS</a> on Windows installs. Note that the specific
sabotage method Lenovo used did not affect GNU/Linux; also, a
@@ -627,7 +627,7 @@
<p>In 2014, <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">Oracle</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html">
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html">
Oracle</em></ins></span> insisted on continuing this <span
class="removed"><del><strong>practice.</a></p></strong></del></span>
<span class="inserted"><ins><em>practice</a>.</p>
</li>
@@ -715,7 +715,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/20 15:30:48 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary/po/proprietary-sabotage.ja.po 20 Feb 2019 15:30:48 -0000
1.97
+++ proprietary/po/proprietary-sabotage.ja.po 17 Mar 2019 10:32:41 -0000
1.98
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -561,14 +561,23 @@
"ãå¼·å¶ãã¾ããã§ãããããã¦ã³ãã¼ãã
ãã§å¤ãã®åé¡ãå¼ãèµ·ããã¾ããã"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"ã¦ã£ã³ãã¦ãºã®ã¤ã³ã¹ãã¼ã«ã§<a
href=\"http://www.computerworld.com/"
"article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-"
@@ -831,9 +840,9 @@
#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
#| "\">Oracle insisted on continuing this practice.</a>"
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"2014å¹´ã<a href=\"http://www.computerworld.com/article/2494794/malware-"
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">ãª"
Index: proprietary/po/proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/proprietary-sabotage.pot 20 Feb 2019 15:30:48 -0000
1.64
+++ proprietary/po/proprietary-sabotage.pot 17 Mar 2019 10:32:41 -0000
1.65
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -447,7 +447,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"<a "
-"href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">
"
+"href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">
"
"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
"installs. Note that the specific sabotage method Lenovo used did not affect "
"GNU/Linux; also, a “clean” Windows install is not really clean "
@@ -599,7 +599,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"In 2014, <a "
-"href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">
"
+"href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\">
"
"Oracle insisted on continuing this practice</a>."
msgstr ""
Index: proprietary/po/proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary/po/proprietary-sabotage.ru.po 25 Feb 2019 09:37:05 -0000
1.170
+++ proprietary/po/proprietary-sabotage.ru.po 17 Mar 2019 10:32:41 -0000
1.171
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-02-20 15:24+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-12-10 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -664,14 +665,32 @@
"Ñже Ñама загÑÑзка вÑзвала маÑÑÑ Ð¿Ñоблем."
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -894,10 +913,19 @@
"ÑÑÑлаемÑÑ Ð½Ð° нее как на ÑвидеÑелÑÑÑво о
ÑакÑе."
#. type: Content of: <ul><li><p>
-msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+# | In 2014, <a
+# |
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\">+}
+# | Oracle insisted on continuing this practice</a>.
+#, fuzzy
+#| msgid ""
+#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#| "\"> Oracle insisted on continuing this practice</a>."
+msgid ""
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"Ð 2014 Ð³Ð¾Ð´Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
href=\"http://www.computerworld.com/article/2494794/"
"malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java."
Index: proprietary/po/proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- proprietary/po/proprietary-subscriptions.de-diff.html 28 Feb 2019
22:00:38 -0000 1.18
+++ proprietary/po/proprietary-subscriptions.de-diff.html 17 Mar 2019
10:32:41 -0000 1.19
@@ -91,7 +91,8 @@
<li</em></ins></span> id="M201507150">
<p>Microsoft Office forces users <a
-
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+ <span
class="removed"><del><strong>href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to</em></ins></span>
subscribe to Office 365 to be able to create/edit
documents</a>.</p>
</li>
@@ -170,7 +171,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:38 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary/po/proprietary-subscriptions.de.po 28 Feb 2019 22:00:38
-0000 1.22
+++ proprietary/po/proprietary-subscriptions.de.po 17 Mar 2019 10:32:41
-0000 1.23
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -147,11 +147,21 @@
"stellt eine Versuchung dar, Sabotage zu begehen."
#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office erzwingt ein <a href=\"https://www.computerworld.com/"
"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
Index: proprietary/po/proprietary-subscriptions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-subscriptions.fr.po 28 Feb 2019 22:17:16
-0000 1.30
+++ proprietary/po/proprietary-subscriptions.fr.po 17 Mar 2019 10:32:41
-0000 1.31
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-02-28 23:15+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -138,11 +139,21 @@
"produits est une invitation au sabotage."
#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office force ses utilisateurs <a href=\"https://www.computerworld."
"com/article/2948755/windows-apps/office-for-windows-10-will-require-"
Index: proprietary/po/proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-subscriptions.ja-diff.html 28 Feb 2019
22:00:38 -0000 1.25
+++ proprietary/po/proprietary-subscriptions.ja-diff.html 17 Mar 2019
10:32:41 -0000 1.26
@@ -93,7 +93,7 @@
<li id="M201507150">
<p>Microsoft Office forces users <a
-
href="https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
+
href="https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html">to
subscribe to Office 365 to be able to create/edit
documents</a>.</p>
</li>
@@ -173,7 +173,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/28 22:00:38 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-subscriptions.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/proprietary-subscriptions.ja.po 28 Feb 2019 22:00:39
-0000 1.16
+++ proprietary/po/proprietary-subscriptions.ja.po 17 Mar 2019 10:32:41
-0000 1.17
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2016-09-16 09:36+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -116,9 +116,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary/po/proprietary-subscriptions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.pot,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary/po/proprietary-subscriptions.pot 28 Feb 2019 22:00:39
-0000 1.16
+++ proprietary/po/proprietary-subscriptions.pot 17 Mar 2019 10:32:41
-0000 1.17
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -104,7 +104,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a "
-"href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to
"
+"href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to
"
"subscribe to Office 365 to be able to create/edit documents</a>."
msgstr ""
Index: proprietary/po/proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-subscriptions.ru.po 1 Mar 2019 05:29:26
-0000 1.37
+++ proprietary/po/proprietary-subscriptions.ru.po 17 Mar 2019 10:32:41
-0000 1.38
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-02-28 21:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-06-23 09:13+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -138,11 +139,21 @@
"ÑовеÑÑиÑÑ ÑабоÑаж."
#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href=\"https://www."
"computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
Index: proprietary/po/proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary/po/proprietary-surveillance.de-diff.html 13 Mar 2019
11:00:59 -0000 1.54
+++ proprietary/po/proprietary-surveillance.de-diff.html 17 Mar 2019
10:32:41 -0000 1.55
@@ -413,7 +413,7 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user</a>. <a
-
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"></em></ins></span>
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"></em></ins></span>
Windows 8.1 snoops on local <span
class="removed"><del><strong>searches.</a>.</p>
</li>
@@ -531,7 +531,7 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201509220">
<p><a
-
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>emails to
snoopers</a>.</p>
@@ -706,7 +706,7 @@
requested.</dd>
<dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into</strong></del></span>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span>
<span class="inserted"><ins><em>startup of iOS</a>. The term
“cloud” means “please
don't ask where.”</p>
@@ -853,33 +853,24 @@
<li id="M201307250">
<p>A Motorola phone <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="removed"><del><strong>HTML pages returned to</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ listens for voice all the time</a>.</p>
</li>
<li id="M201302150">
<p>Google Play intentionally sends app developers <a
-
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the
- <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span class="inserted"><ins><em>personal
details</em></ins></span> of <span class="inserted"><ins><em>users that
install</em></ins></span> the <span class="removed"><del><strong>JS injection
is to display
- ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span
class="inserted"><ins><em>app</a>.</p>
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
- <p>Merely asking</em></ins></span> the
- <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses
- roughly 5 tracking libraries. Developers</strong></del></span> <span
class="inserted"><ins><em>“consent”</em></ins></span> of <span
class="inserted"><ins><em>users is not enough to
- legitimize actions like this. At</em></ins></span> this <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>point, most users</em></ins></span> have
- <span class="removed"><del><strong>confirmed</strong></del></span> <span
class="inserted"><ins><em>stopped
- reading the “Terms and Conditions”</em></ins></span> that
<span class="inserted"><ins><em>spell out what
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
they are “consenting” to. Google should clearly and
- honestly identify</em></ins></span> the <span
class="removed"><del><strong>non-premium version</strong></del></span> <span
class="inserted"><ins><em>information it collects on users,
instead</em></ins></span> of
- <span class="inserted"><ins><em>hiding it in an obscurely worded
EULA.</p>
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
<p>However, to truly protect people's privacy, we must prevent Google
- and other companies from getting this personal information
in</em></ins></span> the <span class="removed"><del><strong>app
does</strong></del></span>
- <span class="inserted"><ins><em>first place!</p>
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
<li id="M201111170">
@@ -897,15 +888,12 @@
<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain</em></ins></span> JavaScript <span
class="removed"><del><strong>injection for tracking</strong></del></span> <span
class="inserted"><ins><em>code,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
- </dl></strong></del></span> <span class="inserted"><ins><em><a
+ <p>E-books can contain JavaScript code, and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ sometimes this code snoops on readers</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study</strong></del></span>
- <span class="inserted"><ins><em><li id="M201410080">
+ <li id="M201410080">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries, <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
@@ -914,7 +902,7 @@
</li>
<li id="M201212030">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>2015</a> found</strong></del></span> <span
class="inserted"><ins><em>many e-readers—not only the Kindle: <a
+ <p>Spyware in many e-readers—not only the Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
report even which page the user reads at what time</a>.</p>
</li>
@@ -940,25 +928,14 @@
reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact</em></ins></span> that <span
class="removed"><del><strong>90%</strong></del></span> <span
class="inserted"><ins><em>this is used for repression</em></ins></span> of
<span class="removed"><del><strong>the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps,</strong></del></span> <span
class="inserted"><ins><em>forbidden sharing
- makes</em></ins></span> it <span class="removed"><del><strong>was only
60%.</p>
+ <p>The fact that this is used for repression of forbidden sharing
+ makes it even more vicious.</p>
- <p>The article confusingly describes gratis apps as “free”,
- but most</strong></del></span> <span class="inserted"><ins><em>even more
vicious.</p>
-
- <p>This illustrates that making unauthorized
copies</em></ins></span> of <span class="removed"><del><strong>them
are</strong></del></span> <span class="inserted"><ins><em>nonfree software
- is</em></ins></span> not <span class="removed"><del><strong>in fact
- <a href="/philosophy/free-sw.html">free software</a>.
- It also uses</strong></del></span> <span class="inserted"><ins><em>a cure
for</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement</strong></del></span> <span
class="inserted"><ins><em>injustice of nonfree software. It may avoid
- paying</em></ins></span> for <span class="removed"><del><strong>that word
is “exploit”; nearly always that will fit
- perfectly.</p></strong></del></span> <span
class="inserted"><ins><em>the nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>Apps</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<div class="big-subsection">
<h4 id="SpywareInMobileApps">Mobile Apps</h4>
@@ -968,116 +945,142 @@
<ul class="blurbs">
<li id="M201902230">
<p>Facebook offered a convenient proprietary
- library</em></ins></span> for <span class="removed"><del><strong>BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
- <p>With free software</strong></del></span> <span
class="inserted"><ins><em>building mobile</em></ins></span> apps, <span
class="removed"><del><strong>users could <em>make
sure</em></strong></del></span> <span class="inserted"><ins><em>which
also <a
+ library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built apps that
- way and released them, apparently not realizing</em></ins></span> that
<span class="inserted"><ins><em>all the personal
- data</em></ins></span> they <span class="removed"><del><strong>don't
snoop.</p>
- <p>With proprietary apps,</strong></del></span> <span
class="inserted"><ins><em>collected would go to Facebook as well.</p>
-
- <p>It shows that no</em></ins></span> one can <span
class="removed"><del><strong>only hope that they
don't.</p></strong></del></span> <span class="inserted"><ins><em>trust a
nonfree program, not even the
- developers of other nonfree programs.</p></em></ins></span>
- </li>
+ sent personal data</em></ins></span> to <span
class="removed"><del><strong>the
+ users. The stated purpose</strong></del></span> <span
class="inserted"><ins><em>Facebook</a>. Lots</em></ins></span> of <span
class="inserted"><ins><em>companies built apps that
+ way and released them, apparently not realizing that all</em></ins></span>
the <span class="removed"><del><strong>JS injection is</strong></del></span>
<span class="inserted"><ins><em>personal
+ data they collected would go</em></ins></span> to <span
class="removed"><del><strong>display
+ ads. Uses roughly 5 tracking libraries. Also, it
redirects</strong></del></span> <span class="inserted"><ins><em>Facebook as
well.</p>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
+ <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the
+ <span class="removed"><del><strong>user's traffic through valueclick.com
(an advertising
+ website).</dd>
-</li>
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages,</strong></del></span>
+ <span class="inserted"><ins><em>developers of other nonfree
programs.</p>
+ </li>
-<li>
- <p>Pairs of</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi">
how</em></ins></span> Android apps <span class="removed"><del><strong>can
collude to transmit</strong></del></span> <span class="inserted"><ins><em>use
and
- misuse</em></ins></span> users' personal
- <span class="removed"><del><strong>data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens</strong></del></span> <span
class="inserted"><ins><em>data</a>. As</em></ins></span> of <span
class="removed"><del><strong>thousands</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
- 78,000 have been analyzed,</em></ins></span> of <span
class="removed"><del><strong>pairs that collude</a>.</p>
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps
use</em></ins></span> and <span class="removed"><del><strong>also uses
+ roughly 5 tracking libraries. Developers</strong></del></span>
+ <span class="inserted"><ins><em>misuse users' personal data</a>.
As</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>March 2019, nearly
+ 78,000</em></ins></span> have
+ <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>been
analyzed,</em></ins></span> of <span class="inserted"><ins><em>which 24,000
(31%) transmit</em></ins></span> the <span class="removed"><del><strong>app does
+ JavaScript injection for tracking</strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201812290">
+ Advertising ID</a> to other companies,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl>
</li>
-
<li>
-<p>Google Play intentionally sends app developers</strong></del></span>
<span class="inserted"><ins><em>which 24,000 (31%) transmit
the</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a> to other companies, and <a
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90%</strong></del></span> <span
class="inserted"><ins><em><a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>personal details</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
- so that users cannot escape tracking by resetting it.</p>
+ 18,000 (23%</em></ins></span> of the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable</strong></del></span> <span
class="inserted"><ins><em>total) link this ID to hardware identifiers</a>,
+ so that users cannot escape</em></ins></span> tracking <span
class="removed"><del><strong>libraries. For
+ the paid proprietary apps,</strong></del></span> <span
class="inserted"><ins><em>by resetting it.</p>
+
+ <p>Collecting hardware identifiers is in apparent violation of
+ Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
+ and, once informed,</em></ins></span> was <span
class="removed"><del><strong>only 60%.</p>
- <p>Collecting hardware identifiers is in apparent
violation</em></ins></span> of <span
class="removed"><del><strong>users</strong></del></span>
- <span class="inserted"><ins><em>Google's policies. But it
seems</em></ins></span> that <span class="removed"><del><strong>install the
app</a>.</p>
+ <p>The article confusingly describes gratis apps as “free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>in no hurry
to take action. This proves
+ that the policies</em></ins></span> of <span
class="removed"><del><strong>them</strong></del></span> <span
class="inserted"><ins><em>a development platform</em></ins></span> are <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>ineffective at
+ preventing nonfree software developers from including
malware</em></ins></span> in <span class="removed"><del><strong>fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses the ugly word “monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span class="inserted"><ins><em>their programs.</p></em></ins></span>
+ </li>
-<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>Google wasn't aware</em></ins></span> of <span
class="removed"><del><strong>users is not enough</strong></del></span> <span
class="inserted"><ins><em>it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users</strong></del></span> <span class="inserted"><ins><em>take action. This
proves
- that the policies of a development platform are ineffective at
- preventing nonfree software developers from including malware in
- their programs.</p>
- </li>
-
- <li id="M201902060">
- <p>Many nonfree apps</em></ins></span> have
-<span class="removed"><del><strong>stopped reading</strong></del></span> <span
class="inserted"><ins><em>a surveillance feature for <a
-
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>users'
actions</a> in interacting with the app.</p>
- </li>
-
- <li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps</em></ins></span>
that <span class="removed"><del><strong>spell out
-what they are “consenting” to.</strong></del></span> <span
class="inserted"><ins><em>used to
- be on</em></ins></span> Google <span class="removed"><del><strong>should
clearly</strong></del></span> <span class="inserted"><ins><em>Play had one or
more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
- stealing users' photos</a> instead of “beautifying” them,
- pushing unwanted</em></ins></span> and <span
class="removed"><del><strong>honestly identify the information it
collects</strong></del></span> <span class="inserted"><ins><em>often malicious
ads</em></ins></span> on users, <span
class="removed"><del><strong>instead</strong></del></span> <span
class="inserted"><ins><em>and redirecting
- them to phishing sites that stole their credentials. Furthermore,
- the user interface</em></ins></span> of <span
class="removed"><del><strong>hiding it in an obscurely worded EULA.</p>
+<span class="removed"><del><strong><li>
+ <p>Apps</strong></del></span>
-<p>However,</strong></del></span> <span class="inserted"><ins><em>most
of them was designed</em></ins></span> to <span
class="removed"><del><strong>truly protect people's privacy, we must prevent
Google
-and other companies</strong></del></span> <span class="inserted"><ins><em>make
uninstallation
+ <span class="inserted"><ins><em><li id="M201902060">
+ <p>Many nonfree apps have a surveillance feature</em></ins></span>
for <span class="removed"><del><strong>BART</strong></del></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop
on users</a>.</p>
+ <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
+ <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+ <p>A study found 234 Android</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902041.1">
+ <p>Twenty nine “beauty camera”</em></ins></span> apps
that <span class="removed"><del><strong>track users by</strong></del></span>
<span class="inserted"><ins><em>used to
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ stealing users' photos</a> instead of “beautifying” them,
+ pushing unwanted and often malicious ads on users, and redirecting
+ them</em></ins></span> to <span
class="removed"><del><strong>ultrasound</strong></del></span> <span
class="inserted"><ins><em>phishing sites that stole their credentials.
Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
- haven't yet, but they should also stay away</em></ins></span> from <span
class="removed"><del><strong>getting this personal
information</strong></del></span> <span class="inserted"><ins><em>nonfree
apps</em></ins></span> in <span class="removed"><del><strong>the first
-place!</p></strong></del></span>
+ haven't yet, but they should also stay away</em></ins></span> from <span
class="removed"><del><strong>beacons placed</strong></del></span> <span
class="inserted"><ins><em>nonfree apps</em></ins></span> in <span
class="removed"><del><strong>stores or played by TV programs</a>.
+ </p></strong></del></span>
<span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
there is no easy way of knowing what they really
do.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>Google Play (a component</strong></del></span>
+<span class="removed"><del><strong><li>
+ <p>Pairs</strong></del></span>
<span class="inserted"><ins><em><li id="M201902010">
- <p>An investigation</em></ins></span> of <span
class="removed"><del><strong>Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</strong></del></span> the <span class="removed"><del><strong>users'
movements without their permission</a>.</p>
-
- <p>Even if you disable Google Maps and location tracking, you must
- disable</strong></del></span> <span class="inserted"><ins><em>150 most
popular
- gratis VPN apps in</em></ins></span> Google Play <span
class="removed"><del><strong>itself</strong></del></span> <span
class="inserted"><ins><em>found that <a
+ <p>An investigation</em></ins></span> of <span
class="removed"><del><strong>Android</strong></del></span> <span
class="inserted"><ins><em>the 150 most popular
+ gratis VPN</em></ins></span> apps <span class="removed"><del><strong>can
collude</strong></del></span> <span class="inserted"><ins><em>in Google Play
found that <a
href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
- 25% fail to protect their usersâ privacy</a> due to DNS leaks. In
+ 25% fail</em></ins></span> to <span class="removed"><del><strong>transmit
users' personal
+ data</strong></del></span> <span class="inserted"><ins><em>protect
their usersâ privacy</a> due</em></ins></span> to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study</strong></del></span> <span class="inserted"><ins><em>DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
potentially also be used to spy on users. Other technical flaws were
found as well.</p>
- <p>Moreover, a previous investigation had found that <a
- href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
-
- <p>It is unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are <em>not</em>
<a
- href="/philosophy/free-sw.html">free software</a>.</p>
+ <p>Moreover, a previous investigation had</em></ins></span> found
+ <span class="removed"><del><strong>tens of thousands of
pairs</strong></del></span> that <span
class="removed"><del><strong>collude</a>.</p>
+</li>
+
+<li>
+<p>Google Play intentionally sends app developers</strong></del></span>
<a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>users that install the
app</a>.</p>
+
+<p>Merely asking</strong></del></span>
+ the <span class="removed"><del><strong>“consent” of users is
not enough
+to legitimize actions like this. At this point, most
users</strong></del></span> <span class="inserted"><ins><em>top 10 gratis VPN
apps</em></ins></span> have
+<span class="removed"><del><strong>stopped reading the “Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>lousy
privacy policies</a>.</p>
+
+ <p>It is unfortunate</em></ins></span> that <span
class="removed"><del><strong>spell out
+what</strong></del></span> <span class="inserted"><ins><em>these articles talk
about “free
+ apps.” These apps are gratis, but</em></ins></span> they are <span
class="removed"><del><strong>“consenting” to. Google should clearly
+and honestly identify the information it collects on users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent Google
+and other companies from getting this personal information in the first
+place!</p></strong></del></span> <span
class="inserted"><ins><em><em>not</em> <a
+ href="/philosophy/free-sw.html">free
software</a>.</p></em></ins></span>
</li>
- <li id="M201901050">
- <p>The Weather Channel app <a
-
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The
company</em></ins></span> is
+ <span class="removed"><del><strong><li>
+ <p>Google Play (a component of Android)</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901050">
+ <p>The Weather Channel app</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
+ stored</em></ins></span> users' <span
class="removed"><del><strong>movements without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>locations</em></ins></span> to <span
class="removed"><del><strong>completely stop</strong></del></span> the <span
class="removed"><del><strong>tracking. This</strong></del></span> <span
class="inserted"><ins><em>company's server</a>. The
company</em></ins></span> is
<span class="removed"><del><strong>yet another
example</strong></del></span>
<span class="inserted"><ins><em>being sued, demanding that it notify the
users</em></ins></span> of <span class="removed"><del><strong>nonfree software
pretending to obey</strong></del></span> <span class="inserted"><ins><em>what
it will do
with</em></ins></span> the <span class="removed"><del><strong>user,
@@ -1117,107 +1120,110 @@
<span class="removed"><del><strong>“zero price” is
“gratis.”</p>
<p>The article takes for granted</strong></del></span> that the <span
class="removed"><del><strong>usual analytics tools are
- legitimate, but</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is
- <span class="inserted"><ins><em>using</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers have no right to
- analyze what users are doing or how. “Analytics”
tools</strong></del></span> <span class="inserted"><ins><em>app,
but</em></ins></span> that <span class="removed"><del><strong>snoop are
- just as wrong as any other snooping.</p></strong></del></span> <span
class="inserted"><ins><em>alone is often quite informative.</p>
+ legitimate,</strong></del></span> <span class="inserted"><ins><em>user is
+ using that app,</em></ins></span> but <span class="inserted"><ins><em>that
alone</em></ins></span> is <span class="inserted"><ins><em>often quite
informative.</p>
<p>This spying occurs regardless of whether the user has a Facebook
- account.</p></em></ins></span>
+ account.</p>
</li>
- <span
class="removed"><del><strong><li><p>Gratis</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some</em></ins></span> Android apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
- connect to 100</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
and advertising</a> URLs,
- on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present in some Android devices when they are
sold.
- Some Motorola</strong></del></span> phones <span
class="removed"><del><strong>modify</strong></del></span> <span
class="inserted"><ins><em>of users that have deleted them</a>.</p>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users</em></ins></span> that <span
class="removed"><del><strong>valid? Software developers</strong></del></span>
have <span class="removed"><del><strong>no right to
+ analyze what</strong></del></span> <span class="inserted"><ins><em>deleted
them</a>.</p>
</li>
<li id="M201808030">
- <p>Some Google apps on</em></ins></span> Android <span
class="removed"><del><strong>to</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
- record the user's location even when users disable “location
+ <p>Some Google apps on Android <a
+
href="https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile">
+ record the user's location even when</em></ins></span> users <span
class="removed"><del><strong>are doing or how. “Analytics” tools
that snoop are
+ just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>disable “location
tracking”</a>.</p>
- <p>There are other ways</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>turn off the other kinds of location
- tracking, but most users will be tricked by the misleading
control.</p></em></ins></span>
+ <p>There are</em></ins></span> other <span
class="removed"><del><strong>snooping.</p>
+ </li>
+ <li><p>Gratis Android apps (but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect</strong></del></span> <span
class="inserted"><ins><em>ways</em></ins></span> to <span
class="removed"><del><strong>100</strong></del></span> <span
class="inserted"><ins><em>turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
+ </li>
+
+ <li id="M201806110">
+ <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>listens
through</em></ins></span> the <span
class="removed"><del><strong>average.</p>
+ </li>
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+
+ <p>This makes them act as spies for licensing enforcement.</p>
+
+ <p>I expect it implements DRM, too—that
there</em></ins></span> is <span class="removed"><del><strong>present in some
Android devices when they are sold.
+ Some Motorola phones modify Android</strong></del></span> <span
class="inserted"><ins><em>no way</em></ins></span> to
+ <span class="removed"><del><strong><a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data</strong></del></span> <span
class="inserted"><ins><em>save
+ a recording. But I can't be sure from the article.</p>
+
+ <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>Motorola</a>.</p></strong></del></span>
<span class="inserted"><ins><em>care much less about sports, you will benefit
in
+ many ways. This is one more.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
- <span class="inserted"><ins><em><li id="M201806110">
- <p>The Spanish football streaming app</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ <span class="inserted"><ins><em><li id="M201804160">
+ <p>More than</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
hidden general surveillance package such as Carrier
IQ.</a></p>
</li>
<li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access to any file
on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>system.</p>
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>any file
on</strong></del></span> <span class="inserted"><ins><em>snoop
+ and collect information about its users</a>. 40%
of</em></ins></span> the <span class="removed"><del><strong>system.</p>
</li>
</ul>
<!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>apps were
+ found</em></ins></span> to <span class="removed"><del><strong>place new
items on top under each subsection -->
<div class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <h3 id="SpywareOnMobiles">Spyware</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="removed"><del><strong>Mobiles</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
+ <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
+ detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>iThings</h4>
<span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
</div>
<ul>
- <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>user's movements</em></ins></span> and <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make</strong></del></span>
<span class="inserted"><ins><em>microphone</a>.</p>
-
- <p>This makes them act as spies for licensing enforcement.</p>
-
- <p>I expect</em></ins></span> it <span
class="removed"><del><strong><a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span> <span class="inserted"><ins><em>implements
DRM, too—that there is no way</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
- would require circumventing</strong></del></span> <span
class="inserted"><ins><em>save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p></strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <li><p>The DMCA</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
- <p>If you learn to care much less about sports, you will benefit in
- many ways. This is one more.</p></em></ins></span>
+ <p>This is evidence that proprietary apps generally work against
+ their users. To protect their privacy</em></ins></span> and <span
class="inserted"><ins><em>freedom, Android users
+ need to get rid of</em></ins></span> the <span
class="removed"><del><strong>EU Copyright Directive make
it</strong></del></span> <span class="inserted"><ins><em>proprietary
software—both proprietary
+ Android by</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span> <span
class="inserted"><ins><em>href="https://replicant.us">switching</em></ins></span>
to <span class="removed"><del><strong>study how iOS cr...apps spy on
users</a>, because this
+ would require circumventing the iOS DRM.</p>
</li>
- <span
class="removed"><del><strong><li><p>In</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804160">
- <p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span class="removed"><del><strong>latest iThings
system, “turning off” WiFi</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to snoop</em></ins></span>
- and <span class="removed"><del><strong>Bluetooth</strong></del></span>
<span class="inserted"><ins><em>collect information about its users</a>.
40% of</em></ins></span> the
- <span class="removed"><del><strong>obvious way <a
-
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ <li><p>In the latest iThings system, “turning off”
WiFi</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,</em></ins></span>
+ and <span class="removed"><del><strong>Bluetooth</strong></del></span> the
+ <span class="removed"><del><strong>obvious way</strong></del></span>
<span class="inserted"><ins><em>proprietary apps by getting apps from the free
software
+ only</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
doesn't really turn them off</a>.
A more advanced way really does turn them off—only until 5am.
- That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em>apps were
- found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
- source code they cannot look at. The other apps might be snooping
- in other ways.</p>
-
- <p>This is evidence that proprietary apps generally work against
- their users. To protect their privacy and freedom, Android users
- need</em></ins></span> to <span class="removed"><del><strong>be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>get
rid of the proprietary software—both proprietary
- Android by <a href="https://replicant.us">switching to
Replicant</a>,
- and the proprietary apps by getting apps from the free software
- only <a href="https://f-droid.org/">F-Droid store</a> that
<a
+ That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span> <span
class="inserted"><ins><em>href="https://f-droid.org/">F-Droid
store</a> that <a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
the user if an app contains
anti-features</a>.</p></em></ins></span>
</li>
@@ -1333,78 +1339,84 @@
Google</em></ins></span> to
<span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos</strong></del></span> <span
class="inserted"><ins><em>protect us. We must demand release</em></ins></span>
of <span class="removed"><del><strong>many celebrities</a>. They needed
to break Apple's
- security</strong></del></span> <span class="inserted"><ins><em>source
code</em></ins></span> to <span class="removed"><del><strong>get at them, but
NSA can access any of them through
- <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:
- the <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span> the <span class="removed"><del><strong>iThing is,
- and get other info too.</p></strong></del></span>
- <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
+ security</strong></del></span> <span class="inserted"><ins><em>source
code</em></ins></span> to <span class="removed"><del><strong>get at them, but
NSA</strong></del></span> <span class="inserted"><ins><em>the
+ public, so we</em></ins></span> can <span
class="removed"><del><strong>access any of them through</strong></del></span>
<span class="inserted"><ins><em>depend on each other.</p>
</li>
- <span class="removed"><del><strong><li><p>There is also a
feature</strong></del></span>
+ <li id="M201705230">
+ <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps</em></ins></span> for <span class="removed"><del><strong>web
sites to track users, which is</strong></del></span> <span
class="inserted"><ins><em>BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it
- is still true in iOS 7.)</p></strong></del></span>
+ <li><p>Spyware in iThings:
+ the</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
snoop on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></em></ins></span>
+ <p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705040">
- <p>A study found 234 Android apps that track users
by</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a></strong></del></span>
+ <li id="M201705040">
+ <p>A study found 234 Android apps that track users
by</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played</em></ins></span> by
<span class="removed"><del><strong>default, though that can be
- turned off.</p></strong></del></span> <span
class="inserted"><ins><em>TV
+ to ultrasound from beacons placed in</em></ins></span> stores <span
class="removed"><del><strong>determine exactly where the iThing is,
+ and get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>or played by TV
programs</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
+ <span class="removed"><del><strong><li><p>There is also a
feature for web sites</strong></del></span>
<span class="inserted"><ins><em><li id="M201704260">
- <p>Faceapp appears to do lots of surveillance, judging
by</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal</em></ins></span> data <span
class="removed"><del><strong>from iPhones for</strong></del></span> <span
class="inserted"><ins><em>in</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>device</a>.</p></em></ins></span>
+ <p>Faceapp appears</em></ins></span> to <span
class="removed"><del><strong>track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled</strong></del></span> <span class="inserted"><ins><em>do lots of
surveillance, judging</em></ins></span> by <span
class="removed"><del><strong>default</a>. (That article talks about iOS
6, but</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access</em></ins></span> it
+ <span class="removed"><del><strong>is still true</strong></del></span>
<span class="inserted"><ins><em>demands to personal data</em></ins></span> in
<span class="removed"><del><strong>iOS 7.)</p></strong></del></span>
<span class="inserted"><ins><em>the
device</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
+ <span class="removed"><del><strong><li><p>The iThing
also</strong></del></span>
<span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>.
Specifically,</em></ins></span>
- the <span class="removed"><del><strong>NSA snoop on
all</strong></del></span> <span class="inserted"><ins><em>app would
record</em></ins></span> the <span class="removed"><del><strong>data in an
iThing,
- or it is totally incompetent.</a></p>
+ <p>Users are suing Bose for</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for</em></ins></span> its <span
class="removed"><del><strong>geolocation</a> by default,
though</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
+ along with the headphone's unique serial number.</p>
+
+ <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>can</strong></del></span> <span
class="inserted"><ins><em>this was done without the users' consent.
+ If the fine print of the app said that users gave consent for this,
+ would that make it acceptable? No way! It should</em></ins></span> be
+ <span class="removed"><del><strong>turned off.</p>
</li>
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span> <span
class="inserted"><ins><em>names</em></ins></span> of <span
class="removed"><del><strong>iOS seem</strong></del></span> <span
class="inserted"><ins><em>the audio files users listen</em></ins></span> to
<span class="removed"><del><strong>exist for no
- possible purpose other than surveillance</a>. Here
is</strong></del></span>
- <span class="inserted"><ins><em>along with the headphone's unique serial
number.</p>
+ <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>flat out</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the
state</a>.</p>
+ </li>
- <p>The suit accuses that this was done without the users' consent.
- If the fine print of</em></ins></span> the <span
class="inserted"><ins><em>app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design
- the app to snoop at all</a>.</p></em></ins></span>
+ <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal to design</em></ins></span>
+ the <span class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>app to</em></ins></span> snoop <span
class="removed"><del><strong>on all the data in an iThing,
+ or it is totally incompetent.</a></p></strong></del></span>
<span class="inserted"><ins><em>at all</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
+
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074">
+ <p>Pairs</em></ins></span> of <span class="removed"><del><strong>iOS
seem to exist for no
+ possible purpose other than surveillance</a>. Here is the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+</ul>
<div class="big-subsection">
@@ -1413,10 +1425,7 @@
</div>
<ul>
- <li><p>Tracking software in popular</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs of</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
+ <li><p>Tracking software in popular</strong></del></span>
Android apps <span class="removed"><del><strong>is pervasive and
sometimes very clever. Some trackers</strong></del></span> can <span
class="inserted"><ins><em>collude
to transmit users' personal data to servers.</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
@@ -1985,8 +1994,8 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day</em></ins></span> a
- <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span class="inserted"><ins><em>woman came
up</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>me and
+<p>Emo Phillips made</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span class="inserted"><ins><em>joke: The
other day a woman came up</em></ins></span> to <span
class="removed"><del><strong>figure</strong></del></span> <span
class="inserted"><ins><em>me and
said, “Didn't I see you on television?” I said, “I
don't know. You can't see</em></ins></span> out
<span class="removed"><del><strong>who</strong></del></span> the <span
class="removed"><del><strong>user was.</p>
@@ -3290,7 +3299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/13 11:00:59 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.269
retrieving revision 1.270
diff -u -b -r1.269 -r1.270
--- proprietary/po/proprietary-surveillance.de.po 13 Mar 2019 11:00:59
-0000 1.269
+++ proprietary/po/proprietary-surveillance.de.po 17 Mar 2019 10:32:41
-0000 1.270
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -852,7 +852,7 @@
# |
href=\"http{+s+}://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
# |
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\">-]
-# |
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
# | Windows 8.1 snoops on local searches[-.-]</a>. And there's a <a
# | href=\"http://www.marketoracle.co.uk/Article40836.html\">{+ +}secret NSA
# | key in Windows</a>, whose functions we don't know.
@@ -868,11 +868,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Spionageprogramme in Windows: <a href=\"http://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\" title=\"Windows Update keeps tabs "
@@ -1049,14 +1049,32 @@
msgstr " "
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"https://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\" "
Index: proprietary/po/proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.392
retrieving revision 1.393
diff -u -b -r1.392 -r1.393
--- proprietary/po/proprietary-surveillance.fr.po 13 Mar 2019 13:14:42
-0000 1.392
+++ proprietary/po/proprietary-surveillance.fr.po 17 Mar 2019 10:32:41
-0000 1.393
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-03-13 14:13+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -617,14 +618,31 @@
"a>."
#. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# |
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the user</a>. <a
+# |
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Espions dans les anciennes versions de Windows : <a href=\"https://www."
"theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows Update "
@@ -773,14 +791,32 @@
"\">#SpywareInBIOS</a>)</span>"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html"
Index: proprietary/po/proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary/po/proprietary-surveillance.it-diff.html 13 Mar 2019
11:00:59 -0000 1.121
+++ proprietary/po/proprietary-surveillance.it-diff.html 17 Mar 2019
10:32:41 -0000 1.122
@@ -410,7 +410,7 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user</a>. <a
-
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"></em></ins></span>
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"></em></ins></span>
Windows 8.1 snoops on local <span
class="removed"><del><strong>searches.</a>.</p>
</li>
@@ -517,11 +517,10 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201509220"></em></ins></span>
<p><a <span
class="removed"><del><strong>href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via
- BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of</strong></del></span> the <span
class="removed"><del><strong>top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
+ BIOS</a> on Windows installs. Note</em></ins></span> that <span
class="removed"><del><strong>90% of the top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> the <span class="removed"><del><strong>paid
proprietary apps, it was only 60%.</p>
<p>The article confusingly describes gratis apps as “free”,
but most of them are</strong></del></span> <span
class="inserted"><ins><em>specific
@@ -1993,22 +1992,22 @@
was sued for collecting lots of personal information about how
people used it</a>.</p>
- <p>The company's statement that it was
anonymizing</strong></del></span>
+ <p>The company's statement</strong></del></span>
<span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span class="removed"><del><strong>data
may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>user watches, and</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>switch</em></ins></span> to <span
class="inserted"><ins><em>turn this off has
- no effect</a>. (The fact that the transmission
reports</em></ins></span> a
- <span class="removed"><del><strong>data broker,</strong></del></span>
<span class="inserted"><ins><em>404 error
- really means nothing;</em></ins></span> the <span
class="inserted"><ins><em>server could save that</em></ins></span> data <span
class="removed"><del><strong>broker would have been able to figure out
- who</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
+ reports what the user watches, and the switch to turn this off has
+ no effect</a>. (The fact</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing</strong></del></span> the <span
class="inserted"><ins><em>transmission reports a 404 error
+ really means nothing; the server could save that</em></ins></span> data
<span class="removed"><del><strong>may be
+ true, but</strong></del></span> <span
class="inserted"><ins><em>anyway.)</p>
- <p>Even worse, it <a
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>doesn't really matter. If</strong></del></span>
<span class="inserted"><ins><em><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on</em></ins></span> the <span
class="removed"><del><strong>user was.</p>
+ snoops on other devices on the user's local network</a>.</p>
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>user's local network</a>.</p>
+ <p>LG later said</em></ins></span> it had <span
class="removed"><del><strong>sold the data to</strong></del></span> <span
class="inserted"><ins><em>installed</em></ins></span> a
+ <span class="removed"><del><strong>data broker, the data broker would
have been able</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>figure out
+ who the user was.</p>
- <p>LG later said it had installed a patch to stop this, but any
+ <p>Following</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
product could spy</em></ins></span> this <span
class="removed"><del><strong>lawsuit,</strong></del></span> <span
class="inserted"><ins><em>way.</p>
<p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
@@ -3050,7 +3049,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/13 11:00:59 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.282
retrieving revision 1.283
diff -u -b -r1.282 -r1.283
--- proprietary/po/proprietary-surveillance.it.po 13 Mar 2019 11:00:59
-0000 1.282
+++ proprietary/po/proprietary-surveillance.it.po 17 Mar 2019 10:32:41
-0000 1.283
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -855,7 +855,7 @@
# |
{+href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">+}
# | Windows Update snoops on the [-user.</a>-] {+user</a>.+} <a
# |
[-href=\"http://www.infoworld.com/t/microsoft-windows/look-the-black-underbelly-of-windows-81-blue-222175\">-]
-# |
{+href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
# | Windows 8.1 snoops on local [-searches.</a>-] {+searches</a>.+} And
# | there's a <a href=\"http://www.marketoracle.co.uk/Article40836.html\">
# | secret NSA key in Windows</a>, whose functions we don't know.
@@ -872,11 +872,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"Spyware in Windows 8: <a href=\"https://web.archive.org/web/20160313105805/"
"http://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">Windows "
@@ -1038,14 +1038,32 @@
"\">#SpywareInBIOS</a>)</span>"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
Index: proprietary/po/proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary/po/proprietary-surveillance.ja-diff.html 13 Mar 2019
11:00:59 -0000 1.131
+++ proprietary/po/proprietary-surveillance.ja-diff.html 17 Mar 2019
10:32:41 -0000 1.132
@@ -409,7 +409,7 @@
<p>Spyware in older versions of Windows: <a
href="https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/">
Windows Update snoops on the user</a>. <a
-
href="https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"></em></ins></span>
+
href="https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html"></em></ins></span>
Windows 8.1 snoops on local <span
class="removed"><del><strong>searches.</a>.</p>
</li>
@@ -517,7 +517,7 @@
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201509220">
<p><a
-
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+
href="https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware</em></ins></span> and <span
class="removed"><del><strong>location information</a> of their users with
third parties.</p>
</li>
@@ -2877,7 +2877,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/13 11:00:59 $
+$Date: 2019/03/17 10:32:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- proprietary/po/proprietary-surveillance.ja.po 13 Mar 2019 11:00:59
-0000 1.255
+++ proprietary/po/proprietary-surveillance.ja.po 17 Mar 2019 10:32:42
-0000 1.256
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -688,11 +688,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"ã¦ã£ã³ãã¦ãº8ã®ã¹ãã¤ã¦ã§ã¢: <a href=\"https://web.archive.org/"
"web/20160313105805/http://www.theregister.co.uk/2003/02/28/"
@@ -843,14 +843,23 @@
"\">#SpywareInBIOS</a>)</span>"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"ã¦ã£ã³ãã¦ãºã®ã¤ã³ã¹ãã¼ã«ã®éã<a
href=\"http://www.computerworld.com/"
"article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-"
Index: proprietary/po/proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary/po/proprietary-surveillance.pot 13 Mar 2019 11:00:59 -0000
1.203
+++ proprietary/po/proprietary-surveillance.pot 17 Mar 2019 10:32:42 -0000
1.204
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -472,7 +472,7 @@
"Spyware in older versions of Windows: <a "
"href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
"
"Windows Update snoops on the user</a>. <a "
-"href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">
"
+"href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">
"
"Windows 8.1 snoops on local searches</a>. And there's a <a "
"href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
"Windows</a>, whose functions we don't know."
@@ -573,7 +573,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"<a "
-"href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">
"
+"href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">
"
"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
"installs. Note that the specific sabotage method Lenovo used did not affect "
"GNU/Linux; also, a “clean” Windows install is not really clean "
Index: proprietary/po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.489
retrieving revision 1.490
diff -u -b -r1.489 -r1.490
--- proprietary/po/proprietary-surveillance.ru.po 13 Mar 2019 15:30:27
-0000 1.489
+++ proprietary/po/proprietary-surveillance.ru.po 17 Mar 2019 10:32:42
-0000 1.490
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-03-13 10:56+0000\n"
+"POT-Creation-Date: 2019-03-17 10:26+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-03-17 10:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -609,14 +610,31 @@
"ÑпонÑкого и киÑайÑкого ÑекÑÑа Baidu ÑпионÑÑ
за Ñвоими полÑзоваÑелÑми</a>."
#. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# |
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the user</a>. <a
+# |
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² ÑÑаÑÑÑ
веÑÑиÑÑ
Windows: <a
href=\"https://www.theregister."
"co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update
подглÑдÑÐ²Ð°ÐµÑ "
@@ -761,14 +779,32 @@
"\">#SpywareInBIOS</a>)</span>"
#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary/po/pt-br.po 14 Mar 2019 14:02:15 -0000 1.65
+++ proprietary/po/pt-br.po 17 Mar 2019 10:32:42 -0000 1.66
@@ -1892,9 +1892,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2995,9 +2995,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
@@ -3439,9 +3439,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3552,12 +3552,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -3722,9 +3722,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <h3>
@@ -3896,11 +3896,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
#. type: Content of: <h3>
@@ -3922,9 +3922,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
#. type: Content of: <h3>
@@ -6504,13 +6504,13 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6537,9 +6537,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
#. type: Content of: <title>
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary/po/ru.po 13 Mar 2019 15:13:00 -0000 1.111
+++ proprietary/po/ru.po 17 Mar 2019 10:32:42 -0000 1.112
@@ -2555,11 +2555,21 @@
"ÐÑли пÑодÑÐºÑ “инÑеллекÑÑален” и его
Ñделали не вÑ, он иÑкÑÑно "
"ÑлÑÐ¶Ð¸Ñ ÑÐ²Ð¾ÐµÐ¼Ñ Ð¿ÑоизводиÑÐµÐ»Ñ <em>пÑоÑив
ваÑ</em>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html\">-]
+# |
{+href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html\">+}
+# | Some D-Link routers</a> have a back door for changing settings in a dlink
+# | of an eye.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#| "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#| "a back door for changing settings in a dlink of an eye."
+msgid ""
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
"found-in-d-link-router-firmware-code.html\">РнекоÑоÑÑÑ
маÑÑÑÑÑизаÑоÑаÑ
D-"
@@ -3133,12 +3143,13 @@
"html#car-spying\"> manufacturers collect this data</a> as part of their own "
"spying, then forward it to the government-run platform."
msgstr ""
-"Ð ÐиÑае ÑлекÑÑомобили обÑзаÑелÑно должнÑ
бÑÑÑ Ð¾Ð±Ð¾ÑÑÐ´Ð¾Ð²Ð°Ð½Ñ ÑеÑминалом, коÑоÑÑй "
-" <a href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca\"> "
-"пеÑÐµÐ´Ð°ÐµÑ ÑеÑ
ниÑеÑкие даннÑе, в Ñом ÑиÑле и
меÑÑоположение маÑинÑ, на плаÑÑоÑмÑ, "
-"пÑедоÑÑавленнÑÑ Ð³Ð¾ÑÑдаÑÑÑвом</a>. Ðа
пÑакÑике <a href=\"/proprietary/proprietary-surveillance."
-"html#car-spying\"> изгоÑовиÑели ÑобиÑаÑÑ ÑÑи
даннÑе</a> в пÑоÑеÑÑе ÑобÑÑвенного "
-"Ñпионажа, а заÑем пеÑедаÑÑ Ð¸Ñ
на
плаÑÑоÑмÑ, пÑедоÑÑавленнÑÑ Ð³Ð¾ÑÑдаÑÑÑвом."
+"Ð ÐиÑае ÑлекÑÑомобили обÑзаÑелÑно должнÑ
бÑÑÑ Ð¾Ð±Ð¾ÑÑÐ´Ð¾Ð²Ð°Ð½Ñ ÑеÑминалом, "
+"коÑоÑÑй <a
href=\"https://www.apnews.com/4a749a4211904784826b45e812cff4ca"
+"\"> пеÑÐµÐ´Ð°ÐµÑ ÑеÑ
ниÑеÑкие даннÑе, в Ñом
ÑиÑле и меÑÑоположение маÑинÑ, на "
+"плаÑÑоÑмÑ, пÑедоÑÑавленнÑÑ
гоÑÑдаÑÑÑвом</a>. Ðа пÑакÑике <a href=\"/"
+"proprietary/proprietary-surveillance.html#car-spying\">
изгоÑовиÑели "
+"ÑобиÑаÑÑ ÑÑи даннÑе</a> в пÑоÑеÑÑе
ÑобÑÑвенного Ñпионажа, а заÑем пеÑедаÑÑ "
+"иÑ
на плаÑÑоÑмÑ, пÑедоÑÑавленнÑÑ
гоÑÑдаÑÑÑвом."
#. type: Content of: <ul><li><p>
msgid ""
@@ -4008,11 +4019,24 @@
"termsofservice.html\"> в Ñазделе 4 лиÑензионного
договоÑа конеÑного "
"полÑзоваÑелÑ</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+# | In Android, <a
+# |
[-href=\"http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html\">+}
+# | Google has a back door to remotely delete apps</a>. (It was in a program
+# | called GTalkService, which seems since then to have been merged into
+# | Google Play.)
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#| "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#| "has a back door to remotely delete apps</a>. (It was in a program called "
+#| "GTalkService, which seems since then to have been merged into Google "
+#| "Play.)"
+msgid ""
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
"Ð Android <a href=\"http://www.computerworld.com/article/2506557/security0/"
@@ -4640,11 +4664,20 @@
"меÑ
анизмом внедÑÐµÐ½Ð¸Ñ Ð² компÑÑÑеÑÑ Ñ
помоÑÑÑ Microsoft, как ÑÑвеÑждаÑÑ "
"пÑизнаннÑе ÑкÑпеÑÑÑ Ð¿Ð¾ безопаÑноÑÑи."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+# | Windows 8 also has a back door for <a
+# |
[-href=\"http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\">+}
+# | remotely deleting apps</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#| "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#| "apps.html\"> remotely deleting apps</a>."
+msgid ""
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
"Ð Windows 8 еÑÑÑ Ñакже лазейка Ð´Ð»Ñ <a
href=\"http://www.computerworld.com/"
"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
@@ -4789,16 +4822,39 @@
"ÑадикалÑно ÑÐ½Ð¸Ð¶Ð°ÐµÑ Ð±ÑÑÑÑодейÑÑвие маÑин
под Windows 10</a>, а оÑклÑÑиÑÑ "
"ее непÑоÑÑо."
-#. type: Content of: <ul><li><p>
+# | After <a
+# | href=\"/proprietary/malware-microsoft.html#windows10-forcing\">forcing the
+# | download of Windows 10</a> on computers that were running Windows 7 and 8,
+# | Microsoft <a
+# |
[-href=\"http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html\">+}
+# | repeatedly switched on a flag that urged users to “upgrade” to
+# | Windows 10</a> when they had turned it off, in the hope that some day they
+# | would fail to say no. To do this, Microsoft used <a
+# |
href=\"https://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\">
+# | malware techniques</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#| "\">forcing the download of Windows 10</a> on computers that were running "
+#| "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#| "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#| "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#| "urged users to “upgrade” to Windows 10</a> when they had "
+#| "turned it off, in the hope that some day they would fail to say no. To "
+#| "do this, Microsoft used <a href=\"https://www.theregister.co."
+#| "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#| "techniques</a>."
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
"ÐоÑле <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
@@ -5055,12 +5111,22 @@
msgid "Microsoft Subscriptions"
msgstr "ÐодпиÑка"
-#. type: Content of: <ul><li><p>
+# | Microsoft Office forces users <a
+# |
[-href=\"https://www.computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to-]
+# |
{+href=\"https://www.computerworld.com/article/2948755/office-for-windows-10-will-require-office-365-subscription-on-pcs-larger-tablets.html\">to+}
+# | subscribe to Office 365 to be able to create/edit documents</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#| "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#| "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#| "Office 365 to be able to create/edit documents</a>."
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
"Microsoft Office пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href=\"https://www."
"computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
@@ -5319,15 +5385,32 @@
"\"http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-"
"user-data\"> ÑпеÑиалÑно Ð´Ð»Ñ Ñого, ÑÑобÑ
ÑпиониÑÑ</a>."
-#. type: Content of: <ul><li><p>
+# | Spyware in older versions of Windows: <a
+# |
href=\"https://www.theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\">
+# | Windows Update snoops on the user</a>. <a
+# |
[-href=\"https://www.infoworld.com/article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">-]
+# |
{+href=\"https://www.infoworld.com/article/2611451/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\">+}
+# | Windows 8.1 snoops on local searches</a>. And there's a <a
+# | href=\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key
+# | in Windows</a>, whose functions we don't know.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#| "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#| "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#| "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#| "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#| "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#| "Windows</a>, whose functions we don't know."
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
"ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² ÑÑаÑÑÑ
веÑÑиÑÑ
Windows: <a
href=\"https://www.theregister."
"co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update
подглÑдÑÐ²Ð°ÐµÑ "
@@ -5363,11 +5446,20 @@
"windows-10-in-s-mode-faq\">Ñежимом S</a>. Ðажное оÑлиÑие
Ð¾Ñ Windows 10 S "
"ÑоÑÑÐ¾Ð¸Ñ Ð² Ñом, ÑÑо еÑÑÑ Ð¿ÑоÑÑой ÑпоÑоб
вÑйÑи из Ñежима S."
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+# | <a
+# |
[-href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html\">-]
+# |
{+href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html\">+}
+# | Windows 8 on “mobile devices” (now defunct) was a jail</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#| "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#| "devices” (now defunct) was a jail</a>."
+msgid ""
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
"<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
"app-store-lockdown\"> Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
” (нÑне "
@@ -8701,15 +8793,33 @@
"tesla-flips-a-switch-to-increase-the-range-of-some-cars-in-florida-to-help-"
"people-evacuate/\"> могли задейÑÑвоваÑÑ ÑолÑко
ÑаÑÑÑ Ð°ÐºÐºÑмÑлÑÑоÑов</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+# | <a
+# |
[-href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2984889/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\">+}
+# | Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
+# | installs. Note that the specific sabotage method Lenovo used did not
+# | affect GNU/Linux; also, a “clean” Windows install is not
+# | really clean since <a
+# | href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own
+# | malware</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#| "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#| "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#| "installs. Note that the specific sabotage method Lenovo used did not "
+#| "affect GNU/Linux; also, a “clean” Windows install is not "
+#| "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#| "\">Microsoft puts in its own malware</a>."
+msgid ""
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
@@ -8754,11 +8864,20 @@
"ÐÑ Ð½Ðµ ÑоглаÑÐ½Ñ Ñ ÑоÑкой зÑÐµÐ½Ð¸Ñ Ð°Ð²ÑоÑа ÑÑой
ÑÑаÑÑи по ÑÑим вопÑоÑам, но Ð¼Ñ "
"ÑÑÑлаемÑÑ Ð½Ð° нее как на ÑвидеÑелÑÑÑво о
ÑакÑе."
-#. type: Content of: <ul><li><p>
-msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+# | In 2014, <a
+# |
[-href=\"http://www.computerworld.com/article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\">-]
+# |
{+href=\"https://www.computerworld.com/article/2494794/oracle-will-continue-to-bundle--crapware--with-java.html\">+}
+# | Oracle insisted on continuing this practice</a>.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#| "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#| "\"> Oracle insisted on continuing this practice</a>."
+msgid ""
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
"Ð 2014 Ð³Ð¾Ð´Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a
href=\"http://www.computerworld.com/article/2494794/"
"malware-vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java."
@@ -9727,6 +9846,126 @@
"пÑоÑеÑÑоÑаÑ
Intel бÑдÑÑ Ð²ÑÑÑоеннÑе
неÑвободнÑе пÑогÑаммÑ-ÑиÑанÑ</a>."
#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#~ "found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have "
+#~ "a back door for changing settings in a dlink of an eye."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
+#~ "found-in-d-link-router-firmware-code.html\">РнекоÑоÑÑÑ
маÑÑÑÑÑизаÑоÑаÑ
D-"
+#~ "Link</a> еÑÑÑ ÑеÑнÑй Ñ
од Ð´Ð»Ñ Ð¼Ð¾Ð¼ÐµÐ½ÑалÑного
Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð½Ð°ÑÑÑоек."
+
+#~ msgid ""
+#~ "In Android, <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Google "
+#~ "has a back door to remotely delete apps</a>. (It was in a program called "
+#~ "GTalkService, which seems since then to have been merged into Google "
+#~ "Play.)"
+#~ msgstr ""
+#~ "Ð Android <a href=\"http://www.computerworld.com/article/2506557/"
+#~ "security0/google-throws--kill-switch--on-android-phones.html\"> Ñ Google "
+#~ "еÑÑÑ ÑеÑнÑй Ñ
од Ð´Ð»Ñ ÑÐ´Ð°Ð»ÐµÐ½Ð¸Ñ Ð¿ÑогÑамм по
ÑеÑи</a> (он бÑл в пÑогÑамме под "
+#~ "названием GTalkService, коÑоÑÑÑ, видимо,
вклÑÑили в ÑоÑÑав Google Play)."
+
+#~ msgid ""
+#~ "Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> remotely deleting apps</a>."
+#~ msgstr ""
+#~ "Ð Windows 8 еÑÑÑ Ñакже лазейка Ð´Ð»Ñ <a
href=\"http://www.computerworld.com/"
+#~ "article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
+#~ "apps.html\"> ÑÐ´Ð°Ð»ÐµÐ½Ð¸Ñ Ð¿ÑогÑамм по ÑеÑи</a>."
+
+#~ msgid ""
+#~ "After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">forcing the download of Windows 10</a> on computers that were running "
+#~ "Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
+#~ "article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
+#~ "windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that "
+#~ "urged users to “upgrade” to Windows 10</a> when they had "
+#~ "turned it off, in the hope that some day they would fail to say no. To "
+#~ "do this, Microsoft used <a href=\"https://www.theregister.co."
+#~ "uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware "
+#~ "techniques</a>."
+#~ msgstr ""
+#~ "ÐоÑле <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
+#~ "\">пÑинÑдиÑелÑной загÑÑзки Windows 10</a> на
компÑÑÑеÑаÑ
, коÑоÑÑе "
+#~ "ÑабоÑали под Windows 7 и 8 ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Microsoft <a
href=\"http://www."
+#~ "computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-"
+#~ "for-massive-windows-10-upgrade-strategy.html\"> неоднокÑаÑно
вклÑÑала "
+#~ "пÑизнак, коÑоÑÑй побÑждал полÑзоваÑелей
“обновиÑÑÑÑ” до "
+#~ "Windows 10</a>, когда они вÑклÑÑали его,
надеÑÑÑ Ð½Ð° Ñо, ÑÑо когда-нибÑÐ´Ñ "
+#~ "они не оÑкажÑÑÑÑ. ÐÐ»Ñ ÑÑого Microsoft
пÑименÑла <a href=\"https://www."
+#~ "theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/"
+#~ "\"> ÑеÑ
Ð½Ð¸ÐºÑ Ð²ÑедоноÑнÑÑ
пÑогÑамм</a>."
+
+#~ msgid ""
+#~ "Microsoft Office forces users <a href=\"https://www.computerworld.com/"
+#~ "article/2948755/windows-apps/office-for-windows-10-will-require-"
+#~ "office-365-subscription-on-pcs-larger-tablets.html\">to subscribe to "
+#~ "Office 365 to be able to create/edit documents</a>."
+#~ msgstr ""
+#~ "Microsoft Office пÑинÑÐ¶Ð´Ð°ÐµÑ Ð¿Ð¾Ð»ÑзоваÑелей <a
href=\"https://www."
+#~ "computerworld.com/article/2948755/windows-apps/office-for-windows-10-will-"
+#~ "require-office-365-subscription-on-pcs-larger-tablets.html"
+#~ "\">подпиÑÑваÑÑÑÑ Ð½Ð° Office 365, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑÑиÑÑ
возможноÑÑÑ ÑедакÑиÑоваÑÑ "
+#~ "докÑменÑÑ</a>."
+
+#~ msgid ""
+#~ "Spyware in older versions of Windows: <a href=\"https://www.theregister."
+#~ "co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on "
+#~ "the user</a>. <a href=\"https://www.infoworld.com/article/2611451/"
+#~ "microsoft-windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-."
+#~ "html\"> Windows 8.1 snoops on local searches</a>. And there's a <a href="
+#~ "\"http://www.marketoracle.co.uk/Article40836.html\"> secret NSA key in "
+#~ "Windows</a>, whose functions we don't know."
+#~ msgstr ""
+#~ "ÐÑогÑаммÑ-ÑÐ¿Ð¸Ð¾Ð½Ñ Ð² ÑÑаÑÑÑ
веÑÑиÑÑ
Windows: <a
href=\"https://www."
+#~ "theregister.co.uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update "
+#~ "подглÑдÑÐ²Ð°ÐµÑ Ð·Ð° полÑзоваÑелем</a>. <a
href=\"https://www.infoworld.com/"
+#~ "article/2611451/microsoft-windows/a-look-at-the-black-underbelly-of-"
+#~ "windows-8-1--blue-.html\">Windows 8.1 подглÑдÑÐ²Ð°ÐµÑ Ð·Ð°
поиÑком по "
+#~ "компÑÑÑеÑÑ</a>. РеÑе <a
href=\"http://www.marketoracle.co.uk/"
+#~ "Article40836.html\"> в Windows еÑÑÑ ÑекÑеÑнÑй клÑÑ
ÐÐÐ</a>, ÑÑнкÑии "
+#~ "коÑоÑого нам неизвеÑÑнÑ."
+
+#~ msgid ""
+#~ "<a href=\"http://www.itworld.com/article/2832657/operating-systems/"
+#~ "microsoft-metro-app-store-lock-down.html\"> Windows 8 on “mobile "
+#~ "devices” (now defunct) was a jail</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.itworld.com/operating-systems/301057/microsoft-metro-"
+#~ "app-store-lockdown\"> Windows 8 на “мобилÑнÑÑ
ÑÑÑÑойÑÑваÑ
” "
+#~ "(нÑне покойнаÑ) бÑла ÑÑÑÑмой</a>."
+
+#~ msgid ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
+#~ "installs. Note that the specific sabotage method Lenovo used did not "
+#~ "affect GNU/Linux; also, a “clean” Windows install is not "
+#~ "really clean since <a href=\"/proprietary/malware-microsoft.html"
+#~ "\">Microsoft puts in its own malware</a>."
+#~ msgstr ""
+#~ "<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
+#~ "collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
+#~ "Lenovo ÑкÑÑÑно ÑÑÑанавливала пÑогÑаммнÑй Ñ
лам ÑеÑез BIOS</a> пÑи "
+#~ "ÑÑÑановке Windows. СледÑÐµÑ Ð·Ð°Ð¼ÐµÑиÑÑ, ÑÑо ÑоÑ
конкÑеÑнÑй меÑод ÑабоÑажа, "
+#~ "коÑоÑÑй пÑименили в Lenovo, непÑименим длÑ
GNU/Linux; кÑоме Ñого, “"
+#~ "ÑиÑÑає ÑÑÑановка Windows Ñ Ð½ÑÐ»Ñ Ð½Ð° Ñамом
деле не ÑиÑÑа, поÑколÑÐºÑ "
+#~ "<a href=\"/proprietary/malware-microsoft.html\">Microsoft
ÑÑÑÐ°Ð½Ð°Ð²Ð»Ð¸Ð²Ð°ÐµÑ "
+#~ "пÑи ÑÑом Ñвои ÑобÑÑвеннÑе вÑедоноÑнÑе
пÑогÑаммÑ</a>."
+
+#~ msgid ""
+#~ "In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
+#~ "vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
+#~ "\"> Oracle insisted on continuing this practice</a>."
+#~ msgstr ""
+#~ "Ð 2014 Ð³Ð¾Ð´Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ <a href=\"http://www.computerworld.com/"
+#~ "article/2494794/malware-vulnerabilities/oracle-will-continue-to-bundle--"
+#~ "crapware--with-java.html\"> Oracle ÑпоÑно пÑодолжала
ÑледоваÑÑ ÑÑой "
+#~ "пÑакÑике</a>."
+
+#~ msgid ""
#~ "Gamers' behavior can be “shaped” by making cycles (progress "
#~ "from one level to the next) slower and slower, designing complex tasks "
#~ "that are difficult to get out of (e.g. World of Warkraft), or conversely "
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- proprietary/po/zh-tw.po 13 Mar 2019 11:01:00 -0000 1.49
+++ proprietary/po/zh-tw.po 17 Mar 2019 10:32:42 -0000 1.50
@@ -1827,9 +1827,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2705284/data-protection/backdoor-"
-"found-in-d-link-router-firmware-code.html\"> Some D-Link routers</a> have a "
-"back door for changing settings in a dlink of an eye."
+"<a href=\"http://www.itworld.com/article/2705284/backdoor-found-in-d-link-"
+"router-firmware-code.html\"> Some D-Link routers</a> have a back door for "
+"changing settings in a dlink of an eye."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2830,9 +2830,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In Android, <a href=\"http://www.computerworld.com/article/2506557/security0/"
-"google-throws--kill-switch--on-android-phones.html\"> Google has a back door "
-"to remotely delete apps</a>. (It was in a program called GTalkService, which "
+"In Android, <a href=\"https://www.computerworld.com/article/2506557/google-"
+"throws--kill-switch--on-android-phones.html\"> Google has a back door to "
+"remotely delete apps</a>. (It was in a program called GTalkService, which "
"seems since then to have been merged into Google Play.)"
msgstr ""
@@ -3258,9 +3258,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Windows 8 also has a back door for <a href=\"http://www.computerworld.com/"
-"article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-"
-"apps.html\"> remotely deleting apps</a>."
+"Windows 8 also has a back door for <a href=\"https://www.computerworld.com/"
+"article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html\"> "
+"remotely deleting apps</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3363,12 +3363,12 @@
msgid ""
"After <a href=\"/proprietary/malware-microsoft.html#windows10-forcing"
"\">forcing the download of Windows 10</a> on computers that were running "
-"Windows 7 and 8, Microsoft <a href=\"http://www.computerworld.com/"
-"article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-"
-"windows-10-upgrade-strategy.html\"> repeatedly switched on a flag that urged "
-"users to “upgrade” to Windows 10</a> when they had turned it "
-"off, in the hope that some day they would fail to say no. To do this, "
-"Microsoft used <a href=\"https://www.theregister.co.uk/2016/03/17/"
+"Windows 7 and 8, Microsoft <a href=\"https://www.computerworld.com/"
+"article/3012278/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy."
+"html\"> repeatedly switched on a flag that urged users to “"
+"upgrade” to Windows 10</a> when they had turned it off, in the hope "
+"that some day they would fail to say no. To do this, Microsoft used <a href="
+"\"https://www.theregister.co.uk/2016/03/17/"
"microsoft_windows_10_upgrade_gwx_vs_humanity/\"> malware techniques</a>."
msgstr ""
@@ -3533,9 +3533,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft Office forces users <a href=\"https://www.computerworld.com/"
-"article/2948755/windows-apps/office-for-windows-10-will-require-office-365-"
-"subscription-on-pcs-larger-tablets.html\">to subscribe to Office 365 to be "
-"able to create/edit documents</a>."
+"article/2948755/office-for-windows-10-will-require-office-365-subscription-"
+"on-pcs-larger-tablets.html\">to subscribe to Office 365 to be able to create/"
+"edit documents</a>."
msgstr ""
#. type: Content of: <h3>
@@ -3707,11 +3707,11 @@
msgid ""
"Spyware in older versions of Windows: <a href=\"https://www.theregister.co."
"uk/2003/02/28/windows_update_keeps_tabs/\"> Windows Update snoops on the "
-"user</a>. <a href=\"https://www.infoworld.com/article/2611451/microsoft-"
-"windows/a-look-at-the-black-underbelly-of-windows-8-1--blue-.html\"> Windows "
-"8.1 snoops on local searches</a>. And there's a <a href=\"http://www."
-"marketoracle.co.uk/Article40836.html\"> secret NSA key in Windows</a>, whose "
-"functions we don't know."
+"user</a>. <a href=\"https://www.infoworld.com/article/2611451/a-look-at-the-"
+"black-underbelly-of-windows-8-1--blue-.html\"> Windows 8.1 snoops on local "
+"searches</a>. And there's a <a href=\"http://www.marketoracle.co.uk/"
+"Article40836.html\"> secret NSA key in Windows</a>, whose functions we don't "
+"know."
msgstr ""
#. type: Content of: <h3>
@@ -3733,9 +3733,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.itworld.com/article/2832657/operating-systems/microsoft-"
-"metro-app-store-lock-down.html\"> Windows 8 on “mobile devices” "
-"(now defunct) was a jail</a>."
+"<a href=\"https://www.itworld.com/article/2832657/microsoft-metro-app-store-"
+"lock-down.html\"> Windows 8 on “mobile devices” (now defunct) "
+"was a jail</a>."
msgstr ""
#. type: Content of: <h3>
@@ -6173,13 +6173,13 @@
#. type: Content of: <ul><li><p>
msgid ""
-"<a href=\"http://www.computerworld.com/article/2984889/windows-pcs/lenovo-"
-"collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> "
-"Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows "
-"installs. Note that the specific sabotage method Lenovo used did not affect "
-"GNU/Linux; also, a “clean” Windows install is not really clean "
-"since <a href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its "
-"own malware</a>."
+"<a href=\"https://www.computerworld.com/article/2984889/lenovo-collects-"
+"usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html\"> Lenovo "
+"stealthily installed crapware and spyware via BIOS</a> on Windows installs. "
+"Note that the specific sabotage method Lenovo used did not affect GNU/Linux; "
+"also, a “clean” Windows install is not really clean since <a "
+"href=\"/proprietary/malware-microsoft.html\">Microsoft puts in its own "
+"malware</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6206,9 +6206,9 @@
#. type: Content of: <ul><li><p>
msgid ""
-"In 2014, <a href=\"http://www.computerworld.com/article/2494794/malware-"
-"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html\"> "
-"Oracle insisted on continuing this practice</a>."
+"In 2014, <a href=\"https://www.computerworld.com/article/2494794/oracle-will-"
+"continue-to-bundle--crapware--with-java.html\"> Oracle insisted on "
+"continuing this practice</a>."
msgstr ""
#. type: Content of: <title>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www graphics/po/hurd_mf.de.po graphics/po/hurd_...,
GNUN <=