[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www manual/allgnupkgs.af.html manual/allgnupkgs...
From: |
GNUN |
Subject: |
www manual/allgnupkgs.af.html manual/allgnupkgs... |
Date: |
Thu, 11 Apr 2019 03:00:42 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/04/11 03:00:38
Modified files:
manual : allgnupkgs.af.html allgnupkgs.ar.html
allgnupkgs.bg.html allgnupkgs.ca.html
allgnupkgs.cs.html allgnupkgs.da.html
allgnupkgs.de.html allgnupkgs.el.html
allgnupkgs.es.html allgnupkgs.fa.html
allgnupkgs.fr.html allgnupkgs.he.html
allgnupkgs.hr.html allgnupkgs.id.html
allgnupkgs.it.html allgnupkgs.ja.html
allgnupkgs.ko.html allgnupkgs.lt.html
allgnupkgs.ml.html allgnupkgs.nb.html
allgnupkgs.nl.html allgnupkgs.pl.html
allgnupkgs.pt-br.html allgnupkgs.ro.html
allgnupkgs.ru.html allgnupkgs.sk.html
allgnupkgs.sq.html allgnupkgs.sr.html
allgnupkgs.sv.html allgnupkgs.ta.html
allgnupkgs.te.html allgnupkgs.tr.html
allgnupkgs.uk.html allgnupkgs.zh-cn.html
allgnupkgs.zh-tw.html
manual/po : allgnupkgs.de.po allgnupkgs.fr.po
allgnupkgs.pot.opt allgnupkgs.pt-br.po
prep : ftp.de.html
prep/po : ftp.de.po ftp.pot
proprietary/po : de.po es.po fr.po it.po ja.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
server : home-pkgblurbs.af.html home-pkgblurbs.ar.html
home-pkgblurbs.bg.html home-pkgblurbs.ca.html
home-pkgblurbs.cs.html home-pkgblurbs.da.html
home-pkgblurbs.de.html home-pkgblurbs.el.html
home-pkgblurbs.es.html home-pkgblurbs.fa.html
home-pkgblurbs.fr.html home-pkgblurbs.he.html
home-pkgblurbs.hr.html home-pkgblurbs.id.html
home-pkgblurbs.it.html home-pkgblurbs.ja.html
home-pkgblurbs.ko.html home-pkgblurbs.lt.html
home-pkgblurbs.ml.html home-pkgblurbs.nb.html
home-pkgblurbs.nl.html home-pkgblurbs.pl.html
home-pkgblurbs.pt-br.html
home-pkgblurbs.ro.html home-pkgblurbs.ru.html
home-pkgblurbs.sk.html home-pkgblurbs.sq.html
home-pkgblurbs.sr.html home-pkgblurbs.sv.html
home-pkgblurbs.ta.html home-pkgblurbs.te.html
home-pkgblurbs.tr.html home-pkgblurbs.uk.html
home-pkgblurbs.zh-cn.html
home-pkgblurbs.zh-tw.html
server/po : home-pkgblurbs.de.po home-pkgblurbs.fr.po
home-pkgblurbs.ja.po home-pkgblurbs.pot.opt
home-pkgblurbs.pt-br.po home-pkgblurbs.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.af.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ar.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.bg.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ca.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.cs.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.da.html?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.de.html?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.el.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.es.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.fa.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.fr.html?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.he.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.hr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.id.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.it.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ja.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ko.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.lt.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ml.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.nb.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.nl.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.pl.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.pt-br.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ro.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ru.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.sk.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.sq.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.sr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.sv.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.ta.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.te.html?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.tr.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.uk.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.zh-cn.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.zh-tw.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.de.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.fr.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.pot.opt?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/po/allgnupkgs.pt-br.po?cvsroot=www&r1=1.5&r2=1.6
http://web.cvs.savannah.gnu.org/viewcvs/www/prep/ftp.de.html?cvsroot=www&r1=1.329&r2=1.330
http://web.cvs.savannah.gnu.org/viewcvs/www/prep/po/ftp.de.po?cvsroot=www&r1=1.368&r2=1.369
http://web.cvs.savannah.gnu.org/viewcvs/www/prep/po/ftp.pot?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.115&r2=1.116
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.af.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ar.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.bg.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ca.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.cs.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.da.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.de.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.el.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.es.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.fa.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.fr.html?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.he.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.hr.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.id.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.it.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ja.html?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ko.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.lt.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ml.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.nb.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.nl.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.pl.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.pt-br.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ro.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ru.html?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.sk.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.sq.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.sr.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.sv.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.ta.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.te.html?cvsroot=www&r1=1.4&r2=1.5
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.tr.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.uk.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.zh-cn.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.zh-tw.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.de.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.fr.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.ja.po?cvsroot=www&r1=1.200&r2=1.201
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.pot.opt?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.pt-br.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/server/po/home-pkgblurbs.ru.po?cvsroot=www&r1=1.207&r2=1.208
Patches:
Index: manual/allgnupkgs.af.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.af.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.af.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.af.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.ar.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ar.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ar.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.ar.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.bg.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.bg.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.bg.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.bg.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.ca.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ca.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ca.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.ca.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.cs.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.cs.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.cs.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.cs.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.da.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.da.html,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- manual/allgnupkgs.da.html 9 Mar 2019 17:02:53 -0000 1.49
+++ manual/allgnupkgs.da.html 11 Apr 2019 07:00:31 -0000 1.50
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.de.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.de.html,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- manual/allgnupkgs.de.html 9 Mar 2019 17:02:53 -0000 1.112
+++ manual/allgnupkgs.de.html 11 Apr 2019 07:00:31 -0000 1.113
@@ -1,5 +1,5 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a
href="#Archiving">Archivierung</a> | <a
@@ -750,9 +750,9 @@
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="https://directory.fsf.org/category/lc/"><big><b>Echtzeit-Kommunikation</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
- <td>Ein Privatsphäre respektierendes Kommunikationsprogramm. [<a
-href="/software/ring/">Ring</a>-Startseite]</td></tr>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
+ <td>A privacy-respecting communication program. [<a
+href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1970,4 +1970,4 @@
href="#Dictionaries">Wörterbücher</a>
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.el.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.el.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.el.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.el.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.es.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.es.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.es.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.es.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.fa.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.fa.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.fa.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.fa.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.fr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.fr.html,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- manual/allgnupkgs.fr.html 31 Mar 2019 12:23:51 -0000 1.120
+++ manual/allgnupkgs.fr.html 11 Apr 2019 07:00:31 -0000 1.121
@@ -1,5 +1,5 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archivage</a> - <a href="#Audio">Audio</a> - <a
href="#Business">Entreprise et productivité</a> - <a
@@ -780,9 +780,9 @@
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Communication
instantanée</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
- <td>Un programme de communication qui respecte la vie privée. [<a
-href="/software/ring/">ring â accueil</a>]</td></tr>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
+ <td>A privacy-respecting communication program. [<a
+href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -2007,4 +2007,4 @@
href="#Video">Vidéo</a> - <a href="#Web">Création web</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.he.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.he.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.he.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.he.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.hr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.hr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.hr.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.hr.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.id.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.id.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.id.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.id.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.it.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.it.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.it.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.it.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.ja.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ja.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ja.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.ja.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.ko.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ko.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ko.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.ko.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.lt.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.lt.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- manual/allgnupkgs.lt.html 9 Mar 2019 17:02:53 -0000 1.56
+++ manual/allgnupkgs.lt.html 11 Apr 2019 07:00:31 -0000 1.57
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.ml.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ml.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ml.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.ml.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.nb.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.nb.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.nb.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.nb.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.nl.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.nl.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.nl.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.nl.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.pl.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.pl.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.pl.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.pl.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.pt-br.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.pt-br.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- manual/allgnupkgs.pt-br.html 9 Mar 2019 17:02:53 -0000 1.71
+++ manual/allgnupkgs.pt-br.html 11 Apr 2019 07:00:31 -0000 1.72
@@ -1,5 +1,5 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Arquivamento</a> - <a href="#Audio">Ãudio</a> - <a
href="#Business">Negócios e produtividade</a> - <a
@@ -773,9 +773,9 @@
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Comunicação ao
vivo</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
- <td>Um programa de comunicação que respeita a privacidade. [<a
-href="/software/ring/">página do ring</a>]</td></tr>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
+ <td>A privacy-respecting communication program. [<a
+href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1998,4 +1998,4 @@
href="#Video">VÃdeo</a> - <a href="#Web">Autoria web</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.ro.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ro.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ro.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.ro.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.ru.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ru.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ru.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.ru.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.sk.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.sk.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.sk.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.sk.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.sq.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.sq.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.sq.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.sq.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.sr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.sr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.sr.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.sr.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.sv.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.sv.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.sv.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.sv.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.ta.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.ta.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.ta.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.ta.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.te.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.te.html,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- manual/allgnupkgs.te.html 9 Mar 2019 17:02:53 -0000 1.5
+++ manual/allgnupkgs.te.html 11 Apr 2019 07:00:31 -0000 1.6
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.tr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.tr.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.tr.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.tr.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.uk.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.uk.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.uk.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.uk.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.zh-cn.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.zh-cn.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.zh-cn.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.zh-cn.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/allgnupkgs.zh-tw.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.zh-tw.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- manual/allgnupkgs.zh-tw.html 9 Mar 2019 17:02:53 -0000 1.70
+++ manual/allgnupkgs.zh-tw.html 11 Apr 2019 07:00:31 -0000 1.71
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<p>
<a href="#Archiving">Archiving</a> -
<a href="#Audio">Audio</a> -
@@ -728,9 +728,9 @@
<tr>
<td id="Live" colspan="2" style="padding-top:.8em; padding-left:16%;"><a
href="http://directory.fsf.org/category/lc/"><big><b>Live
communications</b></big></a></td></tr>
-<tr id="ring"><td>* <a href="/software/ring/">Ring</a></td>
+<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
<td>A privacy-respecting communication program.
- [<a href="/software/ring/">ring home</a>]</td></tr>
+ [<a href="/software/jami/">jami home</a>]</td></tr>
<tr>
@@ -1903,4 +1903,4 @@
<a href="#Web">Web authoring</a> -
</p>
-<!-- End file generated by womb/gnumaint/gm lundi 21 janvier 2019, 08:49:56
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: manual/po/allgnupkgs.de.po
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.de.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- manual/po/allgnupkgs.de.po 9 Mar 2019 17:02:53 -0000 1.144
+++ manual/po/allgnupkgs.de.po 11 Apr 2019 07:00:32 -0000 1.145
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: allgnupkgs.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-09 16:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: 2018-07-10 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -2062,13 +2062,24 @@
"Kommunikation</b></big></a>"
#. type: Content of: <table><tr><td>
-msgid "* <a href=\"/software/ring/\">Ring</a>"
-msgstr "* <a href=\"/software/ring/\">Ring</a>"
+# | * <a [-href=\"/software/acm/\">Acm</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "* <a href=\"/software/acm/\">Acm</a>"
+msgid "* <a href=\"/software/jami/\">Jami</a>"
+msgstr "* <a href=\"/software/acm/\">ACM</a>"
#. type: Content of: <table><tr><td>
+# | A privacy-respecting communication program. [<a
+# | [-href=\"/software/ring/\">ring home</a>]-]
+# | {+href=\"/software/jami/\">jami home</a>]+}
+#, fuzzy
+#| msgid ""
+#| "A privacy-respecting communication program. [<a href=\"/software/ring/"
+#| "\">ring home</a>]"
msgid ""
-"A privacy-respecting communication program. [<a href=\"/software/ring/"
-"\">ring home</a>]"
+"A privacy-respecting communication program. [<a href=\"/software/jami/"
+"\">jami home</a>]"
msgstr ""
"Ein Privatsphäre respektierendes Kommunikationsprogramm. [<a href=\"/"
"software/ring/\">Ring</a>-Startseite]"
@@ -5469,6 +5480,9 @@
"Einfaches XML zur Definition und Umsetzung von Auszeichnungssprachen. [<a "
"href=\"/software/xmlat/\">XMLAT</a>-Startseite]"
+#~ msgid "* <a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "* <a href=\"/software/ring/\">Ring</a>"
+
#~ msgid ""
#~ "* <a href=\"http://gnuradio.org/redmine/projects/gnuradio/wiki\">Radio</a>"
#~ msgstr ""
Index: manual/po/allgnupkgs.fr.po
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.fr.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- manual/po/allgnupkgs.fr.po 31 Mar 2019 11:07:09 -0000 1.137
+++ manual/po/allgnupkgs.fr.po 11 Apr 2019 07:00:32 -0000 1.138
@@ -10,7 +10,7 @@
msgid ""
msgstr ""
"Project-Id-Version: allgnupkgs.html\n"
-"POT-Creation-Date: 2019-03-09 16:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: 2019-03-31 13:02+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -18,6 +18,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -2075,13 +2076,24 @@
"instantanée</b></big></a>"
#. type: Content of: <table><tr><td>
-msgid "* <a href=\"/software/ring/\">Ring</a>"
-msgstr "* <a href=\"/software/ring/\">Ring</a>"
+# | * <a [-href=\"/software/acm/\">Acm</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "* <a href=\"/software/acm/\">Acm</a>"
+msgid "* <a href=\"/software/jami/\">Jami</a>"
+msgstr "* <a href=\"/software/acm/\">Acm</a>"
#. type: Content of: <table><tr><td>
+# | A privacy-respecting communication program. [<a
+# | [-href=\"/software/ring/\">ring home</a>]-]
+# | {+href=\"/software/jami/\">jami home</a>]+}
+#, fuzzy
+#| msgid ""
+#| "A privacy-respecting communication program. [<a href=\"/software/ring/"
+#| "\">ring home</a>]"
msgid ""
-"A privacy-respecting communication program. [<a href=\"/software/ring/"
-"\">ring home</a>]"
+"A privacy-respecting communication program. [<a href=\"/software/jami/"
+"\">jami home</a>]"
msgstr ""
"Un programme de communication qui respecte la vie privée. [<a href=\"/"
"software/ring/\">ring â accueil</a>]"
@@ -5446,3 +5458,6 @@
msgstr ""
"XML simple pour la définition et l'implémentation de langages de balises. "
"[<a href=\"/software/xmlat/\">xmlat â accueil</a>]"
+
+#~ msgid "* <a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "* <a href=\"/software/ring/\">Ring</a>"
Index: manual/po/allgnupkgs.pot.opt
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.pot.opt,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- manual/po/allgnupkgs.pot.opt 9 Mar 2019 17:02:54 -0000 1.56
+++ manual/po/allgnupkgs.pot.opt 11 Apr 2019 07:00:32 -0000 1.57
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: allgnupkgs.html\n"
-"POT-Creation-Date: 2019-03-09 16:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1663,13 +1663,13 @@
msgstr ""
#. type: Content of: <table><tr><td>
-msgid "* <a href=\"/software/ring/\">Ring</a>"
+msgid "* <a href=\"/software/jami/\">Jami</a>"
msgstr ""
#. type: Content of: <table><tr><td>
msgid ""
"A privacy-respecting communication program. [<a "
-"href=\"/software/ring/\">ring home</a>]"
+"href=\"/software/jami/\">jami home</a>]"
msgstr ""
#. type: Content of: <table><tr><td>
Index: manual/po/allgnupkgs.pt-br.po
===================================================================
RCS file: /web/www/www/manual/po/allgnupkgs.pt-br.po,v
retrieving revision 1.5
retrieving revision 1.6
diff -u -b -r1.5 -r1.6
--- manual/po/allgnupkgs.pt-br.po 12 Mar 2019 14:31:28 -0000 1.5
+++ manual/po/allgnupkgs.pt-br.po 11 Apr 2019 07:00:32 -0000 1.6
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: allgnupkgs.html\n"
-"POT-Creation-Date: 2019-03-09 16:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: 2019-03-12 09:51-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -2067,13 +2068,19 @@
"vivo</b></big></a>"
#. type: Content of: <table><tr><td>
-msgid "* <a href=\"/software/ring/\">Ring</a>"
-msgstr "* <a href=\"/software/ring/\">Ring</a>"
+#, fuzzy
+#| msgid "* <a href=\"/software/acm/\">Acm</a>"
+msgid "* <a href=\"/software/jami/\">Jami</a>"
+msgstr "* <a href=\"/software/acm/\">Acm</a>"
#. type: Content of: <table><tr><td>
+#, fuzzy
+#| msgid ""
+#| "A privacy-respecting communication program. [<a href=\"/software/ring/"
+#| "\">ring home</a>]"
msgid ""
-"A privacy-respecting communication program. [<a href=\"/software/ring/"
-"\">ring home</a>]"
+"A privacy-respecting communication program. [<a href=\"/software/jami/"
+"\">jami home</a>]"
msgstr ""
"Um programa de comunicação que respeita a privacidade. [<a
href=\"/software/"
"ring/\">página do ring</a>]"
@@ -5444,6 +5451,9 @@
"XML simples para definição e implementação de linguages de marcação.
[<a "
"href=\"/software/xmlat/\">página do xmlat</a>]"
+#~ msgid "* <a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "* <a href=\"/software/ring/\">Ring</a>"
+
# Nome do software, não traduzir
#~ msgid ""
#~ "* <a href=\"http://gnuradio.org/redmine/projects/gnuradio/wiki\">Radio</a>"
Index: prep/ftp.de.html
===================================================================
RCS file: /web/www/www/prep/ftp.de.html,v
retrieving revision 1.329
retrieving revision 1.330
diff -u -b -r1.329 -r1.330
--- prep/ftp.de.html 9 Apr 2019 13:00:46 -0000 1.329
+++ prep/ftp.de.html 11 Apr 2019 07:00:32 -0000 1.330
@@ -515,6 +515,10 @@
<li><a rel="nofollow"
href="http://ftp.thunix.net/gnu-ftp">http://ftp.thunix.net/gnu-ftp</a></li>
<li><a rel="nofollow"
+href="https://www.singleboersen.com/mirror/gnu/">https://www.singleboersen.com/mirror/gnu/</a></li>
+ <li><a rel="nofollow"
+href="http://www.singleboersen.com/mirror/gnu/">http://www.singleboersen.com/mirror/gnu/</a></li>
+ <li><a rel="nofollow"
href="https://mirror.bibleonline.ru/gnu/">https://mirror.bibleonline.ru/gnu/</a></li>
<li><a rel="nofollow"
href="http://mirror.bibleonline.ru/gnu/">http://mirror.bibleonline.ru/gnu/</a></li>
@@ -879,7 +883,7 @@
<p class="unprintable"><!-- timestamp start -->
Letzte Ãnderung:
-$Date: 2019/04/09 13:00:46 $
+$Date: 2019/04/11 07:00:32 $
<!-- timestamp end -->
</p>
Index: prep/po/ftp.de.po
===================================================================
RCS file: /web/www/www/prep/po/ftp.de.po,v
retrieving revision 1.368
retrieving revision 1.369
diff -u -b -r1.368 -r1.369
--- prep/po/ftp.de.po 9 Apr 2019 13:00:46 -0000 1.368
+++ prep/po/ftp.de.po 11 Apr 2019 07:00:32 -0000 1.369
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: ftp.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-09 12:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2018-08-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1459,6 +1459,22 @@
#. type: Content of: <ul><li><ul><li>
msgid ""
+"<a rel=\"nofollow\" href=\"https://www.singleboersen.com/mirror/gnu/"
+"\">https://www.singleboersen.com/mirror/gnu/</a>"
+msgstr ""
+"<a rel=\"nofollow\" href=\"https://www.singleboersen.com/mirror/gnu/"
+"\">https://www.singleboersen.com/mirror/gnu/</a>"
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"<a rel=\"nofollow\" href=\"http://www.singleboersen.com/mirror/gnu/\">http://"
+"www.singleboersen.com/mirror/gnu/</a>"
+msgstr ""
+"<a rel=\"nofollow\" href=\"http://www.singleboersen.com/mirror/gnu/\">http://"
+"www.singleboersen.com/mirror/gnu/</a>"
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
"<a rel=\"nofollow\" href=\"https://mirror.bibleonline.ru/gnu/\">https://"
"mirror.bibleonline.ru/gnu/</a>"
msgstr ""
@@ -2430,20 +2446,6 @@
msgid "Updated:"
msgstr "Letzte Ãnderung:"
-#~ msgid ""
-#~ "<a rel=\"nofollow\" href=\"https://www.singleboersen.com/mirror/gnu/"
-#~ "\">https://www.singleboersen.com/mirror/gnu/</a>"
-#~ msgstr ""
-#~ "<a rel=\"nofollow\" href=\"https://www.singleboersen.com/mirror/gnu/"
-#~ "\">https://www.singleboersen.com/mirror/gnu/</a>"
-
-#~ msgid ""
-#~ "<a rel=\"nofollow\" href=\"http://www.singleboersen.com/mirror/gnu/"
-#~ "\">http://www.singleboersen.com/mirror/gnu/</a>"
-#~ msgstr ""
-#~ "<a rel=\"nofollow\" href=\"http://www.singleboersen.com/mirror/gnu/"
-#~ "\">http://www.singleboersen.com/mirror/gnu/</a>"
-
#, fuzzy
#~| msgid "Finland"
#~ msgid "Thailand"
Index: prep/po/ftp.pot
===================================================================
RCS file: /web/www/www/prep/po/ftp.pot,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- prep/po/ftp.pot 9 Apr 2019 13:00:46 -0000 1.306
+++ prep/po/ftp.pot 11 Apr 2019 07:00:32 -0000 1.307
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: ftp.html\n"
-"POT-Creation-Date: 2019-04-09 12:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1077,6 +1077,18 @@
#. type: Content of: <ul><li><ul><li>
msgid ""
"<a rel=\"nofollow\" "
+"href=\"https://www.singleboersen.com/mirror/gnu/\">https://www.singleboersen.com/mirror/gnu/</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"<a rel=\"nofollow\" "
+"href=\"http://www.singleboersen.com/mirror/gnu/\">http://www.singleboersen.com/mirror/gnu/</a>"
+msgstr ""
+
+#. type: Content of: <ul><li><ul><li>
+msgid ""
+"<a rel=\"nofollow\" "
"href=\"https://mirror.bibleonline.ru/gnu/\">https://mirror.bibleonline.ru/gnu/</a>"
msgstr ""
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/de.po 11 Apr 2019 02:59:07 -0000 1.62
+++ proprietary/po/de.po 11 Apr 2019 07:00:32 -0000 1.63
@@ -2161,6 +2161,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary/po/es.po 11 Apr 2019 02:59:07 -0000 1.83
+++ proprietary/po/es.po 11 Apr 2019 07:00:32 -0000 1.84
@@ -1751,6 +1751,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/fr.po 11 Apr 2019 02:59:07 -0000 1.110
+++ proprietary/po/fr.po 11 Apr 2019 07:00:32 -0000 1.111
@@ -1730,6 +1730,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/it.po 11 Apr 2019 02:59:07 -0000 1.62
+++ proprietary/po/it.po 11 Apr 2019 07:00:32 -0000 1.63
@@ -2105,6 +2105,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/ja.po 11 Apr 2019 02:59:07 -0000 1.62
+++ proprietary/po/ja.po 11 Apr 2019 07:00:32 -0000 1.63
@@ -1782,6 +1782,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary/po/malware-appliances.de-diff.html 23 Mar 2019 10:31:41
-0000 1.41
+++ proprietary/po/malware-appliances.de-diff.html 11 Apr 2019 07:00:32
-0000 1.42
@@ -71,28 +71,42 @@
<li>
<p>Every “home security” camera, if its manufacturer can
communicate with it,
- is</strong></del></span> <span class="inserted"><ins><em>URL
of</em></ins></span> a <span class="removed"><del><strong>surveillance device.
<a
-href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
+ is</strong></del></span> <span class="inserted"><ins><em>URL
of</em></ins></span> a <span class="removed"><del><strong>surveillance
device.</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has</em></ins></span>
<a
+<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera is</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in</em></ins></span> an <span
class="removed"><del><strong>example</a>.</p>
+ <p>The article describes wrongdoing</strong></del></span> <span
class="inserted"><ins><em>earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done</em></ins></span> by the
<span class="removed"><del><strong>manufacturer, based on the fact
+ that the device is tethered</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> to <span
class="removed"><del><strong>a server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More
about</strong></del></span>
+ <span class="inserted"><ins><em>correct them. This means you can't rely
on</em></ins></span> proprietary <span
class="removed"><del><strong>tethering</a>.</p>
+ <p>But it also demonstrates</strong></del></span> <span
class="inserted"><ins><em>software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201902270">
- <p>The Ring (now Amazon) doorbell</em></ins></span> camera is <span
class="removed"><del><strong>an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer, based on
the fact</strong></del></span> <span class="inserted"><ins><em>designed
so</em></ins></span> that the <span class="removed"><del><strong>device is
tethered to a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But</strong></del></span>
- <span class="inserted"><ins><em>manufacturer (now Amazon) can watch all
the time. Now</em></ins></span> it <span class="removed"><del><strong>also
demonstrates</strong></del></span> <span class="inserted"><ins><em>turns
out</em></ins></span>
- that <span class="removed"><del><strong>the device gives the company
+ <p>The Ring (now Amazon) doorbell camera is designed
so</em></ins></span> that the <span class="removed"><del><strong>device
gives</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer (now Amazon) can watch
all</em></ins></span> the <span class="removed"><del><strong>company
surveillance capability.</p>
</li>
<li>
<p>A “smart” intravenous pump designed for
- hospitals</strong></del></span> <span class="inserted"><ins><em><a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ hospitals</strong></del></span> <span class="inserted"><ins><em>time. Now
it turns out
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>presumably
@@ -111,272 +125,247 @@
<span class="inserted"><ins><em><li id="M201902080"></em></ins></span>
<p>The <span class="removed"><del><strong>bad security in many
Internet of Stings devices
- allows</strong></del></span> <span
class="inserted"><ins><em>HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</strong></del></span>
+ allows</strong></del></span> <span
class="inserted"><ins><em>HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em>make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
+ “ink subscription” cartridges have DRM</em></ins></span> that
<span class="removed"><del><strong>use them</a>.</p>
+ <p>Don't be a sucker—reject all</strong></del></span> <span
class="inserted"><ins><em>constantly
+ communicates with HP servers</a> to make sure</em></ins></span> the
<span class="removed"><del><strong>stings.</p>
+ <p>It</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>unfortunate that</strong></del></span> <span
class="inserted"><ins><em>still
+ paying for</em></ins></span> the <span
class="removed"><del><strong>article uses</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
paid for.</p>
- <p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies</em></ins></span> on <span
class="inserted"><ins><em>users, and involves totally unacceptable
- restrictions in</em></ins></span> the <span
class="removed"><del><strong>people that</strong></del></span> use <span
class="removed"><del><strong>them</a>.</p>
- <p>Don't</strong></del></span> <span class="inserted"><ins><em>of ink
cartridges that would otherwise</em></ins></span> be <span
class="removed"><del><strong>a sucker—reject all</strong></del></span>
<span class="inserted"><ins><em>in
- working order.</p>
- </li>
-
- <li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span
class="removed"><del><strong>stings.</p>
- <p>It is unfortunate</strong></del></span> <span
class="inserted"><ins><em>video they capture to Amazon servers</a>, which
save it
- long-term.</p>
-
- <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
- passes by,</em></ins></span> the <span class="inserted"><ins><em>user's
front door.</p>
-
- <p>The</em></ins></span> article <span
class="removed"><del><strong>uses</strong></del></span> <span
class="inserted"><ins><em>focuses on how Ring used to let individual employees
look
- at</em></ins></span> the
+ <p>Even though</em></ins></span> the
<span class="removed"><del><strong>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li>
<p>Many models of Internet-connected cameras are tremendously insecure.
- They have login accounts with hard-coded passwords, which can't be
- changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way</strong></del></span> <span class="inserted"><ins><em>videos freely.
It appears Amazon has tried</em></ins></span> to
- <span class="removed"><del><strong>delete these accounts
either</a>.</p>
+ They have login accounts with hard-coded passwords, which
can't</strong></del></span> <span class="inserted"><ins><em>ink subscription
program may</em></ins></span> be
+ <span class="removed"><del><strong>changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way to
+ delete these accounts either</a>.</p>
</li>
<li>
-<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>prevent</em></ins></span> that <span
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+<p>The proprietary code that runs pacemakers, insulin
pumps,</strong></del></span> <span class="inserted"><ins><em>cheaper in some
+ specific cases, it spies on users,</em></ins></span> and <span
class="removed"><del><strong>other
medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>secondary abuse, but the primary
abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
+full</strong></del></span> <span class="inserted"><ins><em>involves totally
unacceptable
+ restrictions in the use</em></ins></span> of <span
class="removed"><del><strong>gross security
faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>ink cartridges that would otherwise be in
+ working order.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><p>Users are suing Bose
for</strong></del></span>
- <span class="inserted"><ins><em><li id="M201901070">
- <p>Vizio TVs</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201901100">
+ <p>Amazon Ring “security” devices</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>.
-Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the <span
class="removed"><del><strong>app would record</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in</em></ins></span> the
<span class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>own words</em></ins></span> of the <span
class="removed"><del><strong>audio files
-users listen</strong></del></span> <span class="inserted"><ins><em>company's
- CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
-</p>
-
-<p>The suit accuses that</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
- lower retail prices.</p>
+Specifically, the app would record the names of</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send</em></ins></span> the <span class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="removed"><del><strong>along
with</strong></del></span> <span class="inserted"><ins><em>Amazon
servers</a>, which save it
+ long-term.</p>
- <p>What is supposed to make</em></ins></span> this <span
class="removed"><del><strong>was done without the users' consent.
-If</strong></del></span> <span class="inserted"><ins><em>spying acceptable,
according to him,
- is that it is opt-in in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>fine print of</strong></del></span> <span
class="inserted"><ins><em>Vizio software is
- nonfree, we don't know what is actually happening behind</em></ins></span>
the <span class="removed"><del><strong>app said</strong></del></span> <span
class="inserted"><ins><em>scenes,
- and there is no guarantee</em></ins></span> that <span
class="removed"><del><strong>users gave consent</strong></del></span> <span
class="inserted"><ins><em>all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart
TV,</em></ins></span> for <span class="removed"><del><strong>this,
-would</strong></del></span> that
- <span class="inserted"><ins><em>matter), the easiest way
to</em></ins></span> make <span
class="inserted"><ins><em>sure</em></ins></span> it <span
class="removed"><del><strong>acceptable? No way! It should be flat out
-<a href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span> <span class="inserted"><ins><em>isn't spying on
you is</em></ins></span>
- to <span class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>disconnect it from</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>headphone's unique serial number.
</p>
-</li>
-<li id="anova">
- <p>Anova sabotaged users' cooking devices with</strong></del></span>
<span class="inserted"><ins><em>get your own router (which can
- be an old computer running completely free software), and set
up</em></ins></span> a <span class="removed"><del><strong>downgrade that
- tethered them</strong></del></span>
- <span class="inserted"><ins><em>firewall</em></ins></span> to <span
class="inserted"><ins><em>block connections to Vizio's servers. Or,
as</em></ins></span> a <span class="removed"><del><strong>remote
server.</strong></del></span> <span class="inserted"><ins><em>last resort,
- you can replace your TV with another model.</p>
+<p>The suit accuses</strong></del></span> <span
class="inserted"><ins><em>video shows everyone</em></ins></span> that <span
class="removed"><del><strong>this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span class="removed"><del><strong>fine
print of</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
+
+ <p>The article focuses on how Ring used to let individual employees
look
+ at</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
+would that make it acceptable? No way!</strong></del></span> <span
class="inserted"><ins><em>videos freely.</em></ins></span> It <span
class="removed"><del><strong>should be flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span class="inserted"><ins><em>appears Amazon
has tried</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>prevent that
+ secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon gets the
+ video—Amazon expects society</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>surrender
to.</p></em></ins></span>
</li>
- <li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer</em></ins></span> an <span
class="removed"><del><strong>account on Anova's servers, their
+ <li <span class="removed"><del><strong>id="anova">
+ <p>Anova sabotaged users' cooking devices with a downgrade that
+ tethered them to a remote server.</strong></del></span> <span
class="inserted"><ins><em>id="M201901070">
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
cookers won't function.</a></p>
</li>
<li>
-<p>When Miele's Internet</strong></del></span> <span
class="inserted"><ins><em>unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
<span class="inserted"><ins><em>everything they
- see</a>. “Home insecurity camera” would be a better
- name!</p>
-
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>Internet,
-its</strong></del></span> <span class="inserted"><ins><em>videos. That's
not</em></ins></span>
- security <span class="removed"><del><strong>is crap</a>.</p>
-<p>For example, a cracker can gain access</strong></del></span> <span
class="inserted"><ins><em>for your home. Security means making sure they don't
get</em></ins></span> to
- <span class="inserted"><ins><em>see through your camera.</p>
- </li>
-
- <li id="M201810150">
- <p>Printer manufacturers are very innovative—at
blocking</em></ins></span> the <span class="removed"><del><strong>dishwasher's
filesystem,
- infect it with malware,</strong></del></span>
- <span class="inserted"><ins><em>use of independent replacement ink
cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge DRM. <a
-
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP</em></ins></span> and <span
class="removed"><del><strong>force</strong></del></span> <span
class="inserted"><ins><em>Epson have done this</a>.</p>
- </li>
+<p>When Miele's Internet</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever the TV sees,”</a> in the own
words</em></ins></span> of <span class="removed"><del><strong>Stings hospital
disinfectant dishwasher is
+<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> the <span class="removed"><del><strong>Internet,
+its security</strong></del></span> <span class="inserted"><ins><em>company's
+ CTO, and this data</em></ins></span> is <span
class="removed"><del><strong>crap</a>.</p>
+<p>For example, a cracker can gain access</strong></del></span> <span
class="inserted"><ins><em>sold</em></ins></span> to <span
class="removed"><del><strong>the dishwasher's filesystem,
+ infect it with malware,</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
+ “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>force the
dishwasher</strong></del></span> <span class="inserted"><ins><em>slightly
+ lower retail prices.</p>
- <li id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through</em></ins></span> the <span
class="removed"><del><strong>dishwasher to launch attacks on
- other devices in</strong></del></span> <span
class="inserted"><ins><em>company's server. They have
- all</em></ins></span> the <span class="removed"><del><strong>network.
Since these dishwashers are used in hospitals,</strong></del></span> <span
class="inserted"><ins><em>nasty characteristics of</em></ins></span> such <span
class="removed"><del><strong>attacks could potentially put
hundreds</strong></del></span> <span class="inserted"><ins><em>devices: <a
-
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger</em></ins></span> of <span
class="removed"><del><strong>lives</strong></del></span> <span
class="inserted"><ins><em>sabotage</a> (of a specific user, or of
- all users</em></ins></span> at <span
class="removed"><del><strong>risk.</p>
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
+ other devices</strong></del></span> <span class="inserted"><ins><em>make this
spying acceptable, according to him,
+ is that it is opt-in</em></ins></span> in <span
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
+ such attacks could potentially put hundreds of lives at risk.</p>
</li>
-<li>
-<p>If</strong></del></span> <span class="inserted"><ins><em>once), as
well as the risk of an outage (which is what
- just happened).</p>
+<li></strong></del></span> <span class="inserted"><ins><em>Vizio
software is
+ nonfree, we don't know what is actually happening behind the scenes,
+ and there is no guarantee that all future updates will leave the
+ settings unchanged.</p></em></ins></span>
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat,</em></ins></span> you
<span class="removed"><del><strong>buy a used “smart” car, house,
TV, refrigerator,
+ <p>If you <span
class="removed"><del><strong>buy</strong></del></span> <span
class="inserted"><ins><em>already own</em></ins></span> a <span
class="removed"><del><strong>used “smart” car,
house,</strong></del></span> <span class="inserted"><ins><em>Vizio smart TV (or
any smart</em></ins></span> TV, <span class="removed"><del><strong>refrigerator,
etc.,
usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners</strong></del></span> can <span
class="removed"><del><strong>still remotely control
it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>do it
- using controls right on the thermostat.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li>
+previous owners can still remotely control it</a>.</p>
+</li>
+<li>
<p>Vizio
- “smart”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201809240">
- <p>Researchers have discovered how to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything</strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so</em></ins></span> that
<span class="removed"><del><strong>is viewed on</strong></del></span> <span
class="inserted"><ins><em>people cannot hear</em></ins></span>
- them, <span class="inserted"><ins><em>but Alexa</em></ins></span> and
<span class="removed"><del><strong>not just broadcasts
- and cable</a>. Even if</strong></del></span> <span
class="inserted"><ins><em>Siri can.</p>
- </li>
-
- <li id="M201807050">
- <p>The Jawbone fitness tracker was tethered to a proprietary phone
- app. In 2017,</em></ins></span> the <span
class="removed"><del><strong>image is coming from</strong></del></span> <span
class="inserted"><ins><em>company shut down and made</em></ins></span> the
<span class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>app stop
working. <a
-
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All</em></ins></span>
- the <span class="removed"><del><strong>TV reports what it is. The
existence of</strong></del></span> <span class="inserted"><ins><em>existing
trackers stopped working forever</a>.</p>
-
- <p>The article focuses on</em></ins></span> a <span
class="removed"><del><strong>way to
- disable</strong></del></span> <span class="inserted"><ins><em>further
nasty fillip, that sales of</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden
as</strong></del></span>
- <span class="inserted"><ins><em>broken devices continued. But I think that
is a secondary issue;</em></ins></span>
- it <span class="inserted"><ins><em>made the nasty consequences extend to
some additional people.
- The fundamental wrong</em></ins></span> was <span
class="removed"><del><strong>in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>to design</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>devices to depend on something
- else that didn't respect users' freedom.</p></em></ins></span>
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> that <span
class="removed"><del><strong>is viewed</strong></del></span>
+ <span class="inserted"><ins><em>matter), the easiest way to make sure it
isn't spying</em></ins></span> on <span
class="removed"><del><strong>them,</strong></del></span> <span
class="inserted"><ins><em>you is
+ to disconnect it from the Internet,</em></ins></span> and <span
class="inserted"><ins><em>use a terrestrial antenna
+ instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>just broadcasts
+ and cable</a>. Even</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,</em></ins></span>
+ if <span class="removed"><del><strong>the image</strong></del></span>
<span class="inserted"><ins><em>you are technically oriented,</em></ins></span>
is <span class="removed"><del><strong>coming from the
user's</strong></del></span> <span class="inserted"><ins><em>to get
your</em></ins></span> own
+ <span class="removed"><del><strong>computer, the TV reports what it is.
The existence of</strong></del></span> <span class="inserted"><ins><em>router
(which can
+ be an old computer running completely free software), and set
up</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
+ <span class="inserted"><ins><em>firewall</em></ins></span> to
+ <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden</strong></del></span> <span class="inserted"><ins><em>block
connections to Vizio's servers. Or,</em></ins></span> as <span
class="removed"><del><strong>it was in
+ these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span class="inserted"><ins><em>a
last resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>More or less all “smart” TVs</strong></del></span>
+<p>More or less</strong></del></span>
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops</em></ins></span> on
<span class="removed"><del><strong>their users</a>.</p>
+ <span class="inserted"><ins><em><li id="M201810300">
+ <p>Nearly</em></ins></span> all <span
class="removed"><del><strong>“smart” TVs</strong></del></span>
<span class="inserted"><ins><em>“home security
cameras”</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
-<p>The report was as of 2014, but we don't expect this has got
+<p>The report was as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
-<p>This shows that laws requiring products to get users' formal
+<p>This shows</strong></del></span> <span
class="inserted"><ins><em>everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span class="inserted"><ins><em>these
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>get users' formal
consent before collecting personal data are totally inadequate. And
-what happens if a</strong></del></span> <span
class="inserted"><ins><em>its</em></ins></span> user <span
class="removed"><del><strong>declines consent? Probably the TV will say,
-“Without your consent to tracking, the TV will not
+what happens if a user declines consent? Probably</strong></del></span> <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>TV will say,
+“Without</strong></del></span> <span class="inserted"><ins><em>videos.
That's not
+ security for</em></ins></span> your <span
class="removed"><del><strong>consent</strong></del></span> <span
class="inserted"><ins><em>home. Security means making sure they don't
get</em></ins></span> to <span class="removed"><del><strong>tracking, the TV
will not
work.”</p>
-<p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span class="inserted"><ins><em>by
- sending usage data back over</em></ins></span> the
-<span class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
+<p>Proper laws would say that TVs</strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201804010"></em></ins></span>
- <p>Some <span class="removed"><del><strong>LG
-TVs <a href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
-tyrants</a>.</p>
+ <li id="M201810150">
+ <p>Printer manufacturers</em></ins></span> are <span
class="removed"><del><strong>not allowed to report what</strong></del></span>
<span class="inserted"><ins><em>very innovative—at
blocking</em></ins></span> the
+<span class="removed"><del><strong>user watches — no
exceptions!</p>
</li>
+<li>
+<p>Some LG
+TVs</strong></del></span>
+ <span class="inserted"><ins><em>use of independent replacement ink
cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge
DRM.</em></ins></span> <a <span
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
+tyrants</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p></em></ins></span>
+ </li>
-<li><a
+<span class="removed"><del><strong><li><a
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
-Samsung</strong></del></span> “Smart” TVs <span
class="removed"><del><strong>have turned Linux into the base
-for</strong></del></span> <span class="inserted"><ins><em>automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>tyrant system</a> so as to impose DRM.
-What enables Samsung</strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
+Samsung “Smart” TVs</strong></del></span>
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>do this</strong></del></span> <span
class="inserted"><ins><em>the article for the facts it presents.
It</em></ins></span>
- is <span class="inserted"><ins><em>too bad</em></ins></span> that <span
class="removed"><del><strong>Linux is released under
-GNU GPL version 2, <a href="/licenses/rms-why-gplv3.html">not version
3</a>,
-together with a weak interpretation</strong></del></span> <span
class="inserted"><ins><em>the article finishes by advocating the
- moral weakness</em></ins></span> of <span class="removed"><del><strong>GPL
version 2.</strong></del></span> <span class="inserted"><ins><em>surrendering
to Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>A company that makes internet-controlled
vibrators</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201809260">
+ <p>Honeywell's “smart” thermostats communicate
+ only through the company's server. They</em></ins></span> have <span
class="removed"><del><strong>turned Linux into</strong></del></span>
+ <span class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>base
+for a tyrant system</a> so as to impose DRM.
+What enables Samsung to do this is that Linux is released under
+GNU GPL version 2,</strong></del></span> <span class="inserted"><ins><em>nasty
characteristics of such devices:</em></ins></span> <a <span
class="removed"><del><strong>href="/licenses/rms-why-gplv3.html">not version
3</a>,
+together with</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
+ surveillance, and danger of sabotage</a> (of</em></ins></span> a
<span class="removed"><del><strong>weak interpretation</strong></del></span>
<span class="inserted"><ins><em>specific user, or</em></ins></span> of <span
class="removed"><del><strong>GPL version 2.
+</li>
- <span class="inserted"><ins><em><li id="M201802120">
- <p>Apple devices lock users in</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is</strong></del></span>
- <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely to Apple services</a> by</em></ins></span> being <span
class="removed"><del><strong>sued for collecting lots of personal information
about how
+<li>
+<p>A company that makes internet-controlled vibrators
+<a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+being sued for collecting lots</strong></del></span>
+ <span class="inserted"><ins><em>all users at once), as well as the
risk</em></ins></span> of <span class="removed"><del><strong>personal
information about how
people use it</a>.</p>
-<p>The company's statement that it anonymizes the data may be true,
-but it doesn't really matter. If it sells the data</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="removed"><del><strong>a data broker,</strong></del></span> <span
class="inserted"><ins><em>be incompatible
- with all other options, ethical or unethical.</p>
+<p>The company's statement that it anonymizes</strong></del></span>
<span class="inserted"><ins><em>an outage (which is what
+ just happened).</p>
+
+ <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>data may be true,
+but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can
do</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span>
+ <span class="inserted"><ins><em>using controls right on</em></ins></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>thermostat.</p>
</li>
- <li id="M201712240">
- <p>One of</em></ins></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>dangers
of</em></ins></span> the <span class="removed"><del><strong>user is.</p>
+ <li id="M201809240">
+ <p>Researchers have discovered how to <a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so that people cannot hear
+ them, but Alexa and Siri can.</p>
+ </li>
+
+ <li id="M201807050">
+ <p>The Jawbone fitness tracker was tethered</em></ins></span> to a
<span class="removed"><del><strong>data broker,</strong></del></span> <span
class="inserted"><ins><em>proprietary phone
+ app. In 2017,</em></ins></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>company shut down and
made</em></ins></span> the <span class="removed"><del><strong>user is.</p>
</li>
<li>
-<p>Google/Alphabet</strong></del></span> <span
class="inserted"><ins><em>“internet of stings”
- is that, if you lose your internet service, you also</em></ins></span>
<a
+<p>Google/Alphabet</strong></del></span> <span
class="inserted"><ins><em>app stop working.</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
-intentionally broke Revolv home automatic</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose</em></ins></span> control <span class="removed"><del><strong>products
that depended on
-a server</a> to function. The lesson is,</strong></del></span> <span
class="inserted"><ins><em>of your house and appliances</a>.</p>
+intentionally broke Revolv home automatic control products that
depended</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
+ the existing trackers stopped working forever</a>.</p>
+
+ <p>The article focuses</em></ins></span> on a <span
class="removed"><del><strong>server</a></strong></del></span> <span
class="inserted"><ins><em>further nasty fillip, that sales of the
+ broken devices continued. But I think that is a secondary issue;
+ it made the nasty consequences extend</em></ins></span> to <span
class="removed"><del><strong>function.</strong></del></span> <span
class="inserted"><ins><em>some additional people.</em></ins></span>
+ The <span class="removed"><del><strong>lesson is, don't stand for that!
Insist</strong></del></span> <span class="inserted"><ins><em>fundamental wrong
was to design the devices to depend</em></ins></span> on <span
class="removed"><del><strong>self-contained computers</strong></del></span>
<span class="inserted"><ins><em>something
+ else</em></ins></span> that <span class="removed"><del><strong>run free
software!</p></strong></del></span> <span
class="inserted"><ins><em>didn't respect users'
freedom.</p></em></ins></span>
+ </li>
- <p>For your safety,</em></ins></span> don't <span
class="removed"><del><strong>stand for that! Insist
-on self-contained computers that run free software!</p>
-</li>
+<span class="removed"><del><strong><li>
+<p>ARRIS cable modem has a</strong></del></span>
-<li>
-<p>ARRIS cable modem has</strong></del></span> <span
class="inserted"><ins><em>use any appliance with</em></ins></span> a <span
class="removed"><del><strong><a
-href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-backdoor in</strong></del></span> <span class="inserted"><ins><em>connection
to</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>real internet.</p></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201804140">
+ <p>A medical insurance company</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+backdoor in</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ offers a gratis electronic toothbrush that snoops on its user by
+ sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>HP “storage appliances” that use the proprietary
-“Left Hand” operating system have back doors that give HP
+<p>HP “storage appliances”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804010">
+ <p>Some “Smart” TVs automatically <a
+
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
+
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>proprietary
+“Left Hand” operating system have back doors</strong></del></span>
<span class="inserted"><ins><em>article for the facts it presents. It
+ is too bad</em></ins></span> that <span class="removed"><del><strong>give
HP
<a
href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
remote login access</a> to them. HP claims that this does not give HP
-access</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711200">
- <p>Amazon recently invited consumers</em></ins></span> to <span
class="removed"><del><strong>the customer's data, but if the back door allows
-installation of software changes, a change could</strong></del></span> be
<span class="removed"><del><strong>installed that
-would give access</strong></del></span> <span
class="inserted"><ins><em>suckers and <a
-
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff</em></ins></span> to <span
class="inserted"><ins><em>open their front doors</a>. Wouldn't you know
- it,</em></ins></span> the <span class="removed"><del><strong>customer's
data.
+access to</strong></del></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>article finishes by
advocating</em></ins></span> the <span class="removed"><del><strong>back door
allows
+installation</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness</em></ins></span> of <span
class="removed"><del><strong>software changes, a change could be installed that
+would give access</strong></del></span> <span
class="inserted"><ins><em>surrendering</em></ins></span> to <span
class="removed"><del><strong>the customer's data.
</p>
</li>
@@ -392,73 +381,59 @@
</li>
<li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
-The TP-Link router</strong></del></span> <span
class="inserted"><ins><em>system</em></ins></span> has a <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>grave security
flaw.</p></em></ins></span>
+<p><a
href="http://sekurak.pl/tp-link-httptftp-backdoor/"></strong></del></span>
<span class="inserted"><ins><em>Netflix.</em></ins></span> The <span
class="removed"><del><strong>TP-Link router has a
backdoor</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711100">
- <p>A remote-control sex toy</em></ins></span> was <span
class="removed"><del><strong>designed with DRM</a>: it won't accept
-third-party printing materials. It is the Keurig</strong></del></span> <span
class="inserted"><ins><em>found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings</em></ins></span> of <span
class="removed"><del><strong>printers. Now it is
-being discontinued, which means that eventually authorized materials won't
-be available and</strong></del></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
-
-<p>With a</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
- </li>
-
- <li id="M201711080">
- <p>Logitech will sabotage
- all Harmony Link household control devices by</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off</em></ins></span> the <span
class="removed"><del><strong>Respects Your
Freedom</a>,</strong></del></span> <span class="inserted"><ins><em>server
through which the products' supposed owners
- communicate with them</a>.</p>
-
- <p>The owners suspect</em></ins></span> this <span
class="removed"><del><strong>problem would not
-even be</strong></del></span> <span class="inserted"><ins><em>is to pressure
them to buy</em></ins></span> a <span class="removed"><del><strong>remote
possibility.</p>
+<p>The</strong></del></span>
-<p>How pitiful that the author of</strong></del></span> <span
class="inserted"><ins><em>newer model. If
- they are wise, they will learn, rather, to distrust any
product</em></ins></span> that
- <span class="inserted"><ins><em>requires users to talk with them through
some specialized service.</p>
+ <span class="inserted"><ins><em><li id="M201802120">
+ <p>Apple devices lock users in</em></ins></span> <a <span
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+“Cube” 3D printer was</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by being</em></ins></span> designed
<span class="inserted"><ins><em>to be incompatible</em></ins></span>
+ with <span class="removed"><del><strong>DRM</a>: it won't accept
+third-party printing materials. It is the Keurig</strong></del></span> <span
class="inserted"><ins><em>all other options, ethical or unethical.</p>
</li>
- <li id="M201710040">
- <p>Every “home security” camera, if its
- manufacturer can communicate with it, is a surveillance device. <a
-
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
-
- <p>The</em></ins></span> article <span
class="removed"><del><strong>says</strong></del></span> <span
class="inserted"><ins><em>describes wrongdoing by the manufacturer, based on
- the fact</em></ins></span> that <span class="removed"><del><strong>there
was
-“nothing wrong” with designing</strong></del></span> the device
<span class="inserted"><ins><em>is tethered</em></ins></span> to <span
class="removed"><del><strong>restrict users in
-the first place. This is like putting</strong></del></span> a <span
class="removed"><del><strong>“cheat me and mistreat me”
-sign on your chest. We should know better: we should condemn all companies
-that take advantage of people like him. Indeed,</strong></del></span> <span
class="inserted"><ins><em>server.</p>
-
- <p><a href="/proprietary/proprietary-tethers.html">More about
- proprietary tethering</a>.</p>
+ <li id="M201712240">
+ <p>One</em></ins></span> of <span
class="removed"><del><strong>printers. Now it is
+being discontinued, which means that eventually authorized materials won't
+be available and the printers may become unusable.</p>
- <p>But</em></ins></span> it <span class="removed"><del><strong>is
the acceptance of
-their unjust practice</strong></del></span> <span
class="inserted"><ins><em>also demonstrates</em></ins></span> that <span
class="removed"><del><strong>teaches people to be
doormats.</p></strong></del></span> <span class="inserted"><ins><em>the
device gives the company
- surveillance capability.</p></em></ins></span>
+<p>With a <a
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer that gets the Respects Your Freedom</a>, this problem would not
+even be a remote possibility.</p>
+
+<p>How pitiful that</strong></del></span> the <span
class="removed"><del><strong>author</strong></del></span> <span
class="inserted"><ins><em>dangers</em></ins></span> of <span
class="removed"><del><strong>that article says that there was
+“nothing wrong” with designing the device to restrict users
in</strong></del></span> the <span class="removed"><del><strong>first place.
This</strong></del></span> <span class="inserted"><ins><em>“internet of
stings”</em></ins></span>
+ is <span class="removed"><del><strong>like putting a “cheat me and
mistreat me”
+sign on</strong></del></span> <span class="inserted"><ins><em>that, if you
lose</em></ins></span> your <span class="removed"><del><strong>chest. We
should know better: we should condemn all companies
+that take advantage</strong></del></span> <span
class="inserted"><ins><em>internet service, you also <a
+
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control</em></ins></span> of <span
class="removed"><del><strong>people like him. Indeed, it
is</strong></del></span> <span class="inserted"><ins><em>your house and
appliances</a>.</p>
+
+ <p>For your safety, don't use any appliance with a connection
to</em></ins></span> the <span class="removed"><del><strong>acceptance of
+their unjust practice that teaches people</strong></del></span>
+ <span class="inserted"><ins><em>real internet.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Philips</strong></del></span>
+ <li id="M201711200">
+ <p>Amazon recently invited consumers</em></ins></span> to be <span
class="removed"><del><strong>doormats.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201709200">
- <p>A</em></ins></span> “smart” <span
class="removed"><del><strong>lightbulbs <a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
-have been</strong></del></span> <span class="inserted"><ins><em>intravenous
pump</em></ins></span>
- designed <span class="removed"><del><strong>not to interact with other
companies' smart
+<li>
+<p>Philips “smart” lightbulbs</strong></del></span> <span
class="inserted"><ins><em>suckers and</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+have been designed not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff</em></ins></span> to <span
class="removed"><del><strong>interact with other companies' smart
lightbulbs</a>.</p>
-<p>If a product is “smart”, and you didn't build it, it is
+<p>If a product is “smart”, and</strong></del></span> <span
class="inserted"><ins><em>open their front doors</a>.
Wouldn't</em></ins></span> you <span class="removed"><del><strong>didn't
build</strong></del></span> <span
class="inserted"><ins><em>know</em></ins></span>
+ it, <span class="removed"><del><strong>it is
cleverly serving its manufacturer <em>against you</em>.</p>
</li>
@@ -473,101 +448,233 @@
digital “rights” management</a>
and <a
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
and it claims that “artists” (rather than companies) are
-primarily responsible</strong></del></span> for <span
class="removed"><del><strong>putting digital restrictions management into
-these disks. Nonetheless, it</strong></del></span> <span
class="inserted"><ins><em>hospitals</em></ins></span> is <span
class="removed"><del><strong>a reference for</strong></del></span> <span
class="inserted"><ins><em>connected to</em></ins></span> the <span
class="removed"><del><strong>facts.
+primarily responsible for putting digital restrictions management into
+these disks. Nonetheless, it is a reference for</strong></del></span> the
<span class="removed"><del><strong>facts.
</p>
-<p>Every Bluray disk (with few, rare exceptions) has DRM—so
-don't use Bluray disks!</p>
+<p>Every Bluray disk (with few, rare exceptions)</strong></del></span>
<span class="inserted"><ins><em>system</em></ins></span> has <span
class="removed"><del><strong>DRM—so
+don't use Bluray disks!</p></strong></del></span> <span
class="inserted"><ins><em>a grave security flaw.</p></em></ins></span>
+ </li>
+
+ <li <span class="removed"><del><strong>id="cameras-bugs">
+<p>Over 70 brands</strong></del></span> <span
class="inserted"><ins><em>id="M201711100">
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings</em></ins></span> of <span
class="removed"><del><strong>network-connected surveillance cameras
have</strong></del></span> <span class="inserted"><ins><em>the conversation
between two users</a>.</p>
+ </li>
+
+ <li id="M201711080">
+ <p>Logitech will sabotage
+ all Harmony Link household control devices by</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+security bugs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off the server through which the products' supposed owners
+ communicate with them</a>.</p>
+
+ <p>The owners suspect this is to pressure them to buy a newer model.
If
+ they are wise, they will learn, rather, to distrust any
product</em></ins></span> that <span class="removed"><del><strong>allow
anyone</strong></del></span>
+ <span class="inserted"><ins><em>requires users</em></ins></span> to <span
class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em>talk with them</em></ins></span> through <span
class="removed"><del><strong>them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>some specialized
service.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>Samsung's “Smart Home” has</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201710040">
+ <p>Every “home security” camera, if its
+ manufacturer can communicate with it, is</em></ins></span> a <span
class="removed"><del><strong>big security hole;</strong></del></span> <span
class="inserted"><ins><em>surveillance device.</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+unauthorized people can remotely control it</a>.</p>
+
+<p>Samsung claims that this</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera</em></ins></span> is an <span
class="removed"><del><strong>“open” platform
so</strong></del></span> <span
class="inserted"><ins><em>example</a>.</p>
+
+ <p>The article describes wrongdoing by</em></ins></span> the
+<span class="removed"><del><strong>problem is partly</strong></del></span>
<span class="inserted"><ins><em>manufacturer, based on</em></ins></span>
+ the <span class="removed"><del><strong>fault of app developers. That is
clearly true if</strong></del></span> <span class="inserted"><ins><em>fact
that</em></ins></span> the <span class="removed"><del><strong>apps are
proprietary software.</p>
+
+<p>Anything whose name is “Smart”</strong></del></span>
<span class="inserted"><ins><em>device</em></ins></span> is <span
class="removed"><del><strong>most likely going</strong></del></span> <span
class="inserted"><ins><em>tethered</em></ins></span> to
+<span class="removed"><del><strong>screw you.</p></strong></del></span>
<span class="inserted"><ins><em>a server.</p>
+
+ <p><a href="/proprietary/proprietary-tethers.html">More about
+ proprietary tethering</a>.</p>
+
+ <p>But it also demonstrates that the device gives the company
+ surveillance capability.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>
+Malware found on <a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+security cameras available through Amazon</a>.
+</p></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709200"></em></ins></span>
+ <p>A <span class="removed"><del><strong>camera that records locally
on physical media, and has no network
+connection, does not threaten people with surveillance—neither
+by watching people through the camera, nor through malware
in</strong></del></span> <span class="inserted"><ins><em>“smart”
intravenous pump
+ designed for hospitals is connected to</em></ins></span> the
+<span class="removed"><del><strong>camera.</p>
</li>
-<li id="cameras-bugs">
-<p>Over 70 brands of network-connected surveillance cameras
have</strong></del></span> <span class="inserted"><ins><em>internet.
Naturally</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"></strong></del></span>
+<li>
+<p></strong></del></span> <span class="inserted"><ins><em>internet.
Naturally</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+FitBit fitness trackers have a Bluetooth
vulnerability</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its</em></ins></span> security <span
class="removed"><del><strong>bugs</strong></del></span> <span
class="inserted"><ins><em>has been cracked</a>.</p>
+ its security has been cracked</a>.</p>
- <p>Note</em></ins></span> that <span
class="removed"><del><strong>allow anyone</strong></del></span> <span
class="inserted"><ins><em>this article misuses the term <a
+ <p>Note</em></ins></span> that <span
class="removed"><del><strong>allows
+attackers to send malware to</strong></del></span> <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>devices, which can subsequently
+spread</strong></del></span> <span class="inserted"><ins><em>term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</em></ins></span> to <span class="removed"><del><strong>watch
through them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
+ referring</em></ins></span> to <span
class="removed"><del><strong>computers and other FitBit trackers that interact
with
+them.</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>Samsung's “Smart Home” has a big</strong></del></span>
+<p> “Self-encrypting” disk drives do the encryption with
+proprietary firmware so you can't trust it. Western
Digital's</strong></del></span>
<span class="inserted"><ins><em><li id="M201708280">
- <p>The bad</em></ins></span> security <span
class="removed"><del><strong>hole;</strong></del></span> <span
class="inserted"><ins><em>in many Internet of Stings devices
allows</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
-unauthorized</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the</em></ins></span> people <span
class="removed"><del><strong>can remotely control it</a>.</p>
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+“My Passport” drives have a back door</a>.</p>
+</li>
-<p>Samsung claims</strong></del></span> that <span
class="removed"><del><strong>this is an “open” platform
so</strong></del></span> <span class="inserted"><ins><em>use
them</a>.</p>
+<li>
+<p>
+Hospira infusion pumps, which are used to administer
drugs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to
+<span class="removed"><del><strong>a patient, were rated “<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
+least secure IP device I've ever seen</a>” by a security
+researcher.</p>
+
+<p>Depending</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>what drug</strong></del></span> <span
class="inserted"><ins><em>the people that use them</a>.</p>
- <p>Don't be a sucker—reject all</em></ins></span> the
-<span class="removed"><del><strong>problem</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
- <p>It</em></ins></span> is <span
class="removed"><del><strong>partly</strong></del></span> <span
class="inserted"><ins><em>unfortunate that the article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>It</em></ins></span> is <span class="removed"><del><strong>being
infused,</strong></del></span> <span class="inserted"><ins><em>unfortunate
that</em></ins></span> the <span class="removed"><del><strong>insecurity could
+open</strong></del></span> <span class="inserted"><ins><em>article
uses</em></ins></span> the <span class="removed"><del><strong>door to
murder.</p>
+</li>
+
+<li>
+<p>Due to bad security in a drug pump, crackers could use it
to</strong></del></span> <span class="inserted"><ins><em>term</em></ins></span>
<a
+<span
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
+kill patients</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
</li>
- <li id="M201708230">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+“Smart homes”</a> turn out</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708230">
<p>Sonos <a
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
- told all its customers, “Agree”
- to snooping or the product will stop working</a>. <a
+ told all its customers, “Agree”</em></ins></span>
+ to <span class="inserted"><ins><em>snooping or the product will stop
working</a>. <a
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
Another article</a> says they won't forcibly change the software, but
- people won't be able to get any upgrades and eventually it will
- stop working.</p>
+ people won't</em></ins></span> be <span
class="removed"><del><strong>stupidly vulnerable</strong></del></span> <span
class="inserted"><ins><em>able</em></ins></span> to
+<span class="removed"><del><strong>intrusion.</p></strong></del></span>
<span class="inserted"><ins><em>get any upgrades and eventually it will
+ stop working.</p></em></ins></span>
</li>
- <li id="M201708040">
- <p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+<span class="removed"><del><strong><li>
+<p>The <a
+href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+FTC punished</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708040">
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>company for making webcams with bad
security</a> so
+that it was easy for anyone</strong></del></span> <span
class="inserted"><ins><em>DJI drone</em></ins></span>
+ to <span class="removed"><del><strong>watch them.</p>
+</li>
+
+<li>
+<p>It</strong></del></span> <span class="inserted"><ins><em>snoop on
other people, DJI</em></ins></span> is <span
class="removed"><del><strong>possible to</strong></del></span> <span
class="inserted"><ins><em>in many cases</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+kill people by taking control</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
<li id="M201706200">
- <p>Many models of Internet-connected cameras
+ <p>Many models</em></ins></span> of <span
class="removed"><del><strong>medical implants by radio</a>. More
+information in <a
+href="http://www.bbc.co.uk/news/technology-17631838">BBC
News</a></strong></del></span> <span
class="inserted"><ins><em>Internet-connected cameras
are tremendously insecure. They have login
- accounts with hard-coded passwords, which can't be changed, and <a
-
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
- is no way to delete these accounts either</a>.</p>
+ accounts with hard-coded passwords, which can't be
changed,</em></ins></span> and <a
+<span
class="removed"><del><strong>href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+IOActive Labs Research blog</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
+ is no way to delete these accounts
either</a>.</p></em></ins></span>
</li>
- <li id="M201705250">
+<span class="removed"><del><strong><li>
+<p>Lots of <a
+href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+hospital equipment has lousy security</a>,</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705250">
<p>The proprietary code that runs pacemakers,
- insulin pumps, and other medical devices is <a
+ insulin pumps,</em></ins></span> and <span class="removed"><del><strong>it
can be fatal.</p></strong></del></span> <span
class="inserted"><ins><em>other medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
- security faults</a>.</p>
+ security faults</a>.</p></em></ins></span>
</li>
- <li id="M201705180">
- <p>Bird and rabbit pets were implemented for Second
+<span class="removed"><del><strong><li>
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows were taken
over</a></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705180">
+ <p>Bird</em></ins></span> and <span
class="removed"><del><strong>turned
+into a botnet</strong></del></span> <span class="inserted"><ins><em>rabbit
pets were implemented</em></ins></span> for <span
class="inserted"><ins><em>Second
Life by a company that tethered their food to a server. <a
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down the server and the pets more or less died</a>.</p>
+ It shut down</em></ins></span> the <span
class="removed"><del><strong>purpose of collecting customers' credit card
+numbers.</p></strong></del></span> <span
class="inserted"><ins><em>server and the pets more or less
died</a>.</p></em></ins></span>
</li>
- <li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
+ <li <span class="removed"><del><strong>id="vizio-snoop">
+<p>Vizio</strong></del></span> <span
class="inserted"><ins><em>id="M201704190">
+ <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+used</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing</em></ins></span> a <span
class="removed"><del><strong>firmware “upgrade” to
make</strong></del></span> <span class="inserted"><ins><em>spyware app
for</em></ins></span> its <span class="removed"><del><strong>TVs snoop on
what</strong></del></span> <span
class="inserted"><ins><em>headphones</a>. Specifically,
+ the app would record the names of the audio files</em></ins></span> users
<span class="removed"><del><strong>watch</a>. The TVs did not
do</strong></del></span> <span class="inserted"><ins><em>listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses that this was done without the users' consent.
+ <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>when first sold.</p>
+</li>
+
+<li>
+<p>LG <a
+href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+disabled network features</a> on <em>previously
purchased</em>
+“smart” TVs, unless</strong></del></span> <span
class="inserted"><ins><em>this was done without</em></ins></span> the <span
class="removed"><del><strong>purchasers agreed</strong></del></span> <span
class="inserted"><ins><em>users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>let LG
+begin</strong></del></span> <span class="inserted"><ins><em>design
+ the app</em></ins></span> to snoop <span class="removed"><del><strong>on
them and distribute their personal data.</p></strong></del></span> <span
class="inserted"><ins><em>at all</a>.</p></em></ins></span>
</li>
- <li id="M201704120">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
+Barbie is going</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704120">
<p>Anova sabotaged users' cooking devices
- with a downgrade that tethered them to a remote server. <a
+ with a downgrade that tethered them</em></ins></span> to <span
class="removed"><del><strong>spy</a> on children and
adults.</p></strong></del></span> <span class="inserted"><ins><em>a
remote server. <a
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless
users create an account on Anova's servers, their cookers won't
function</a>.</p>
@@ -813,10 +920,15 @@
are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
- cross-device tracking</a>.</p>
+ cross-device tracking</a>.</p></em></ins></span>
</li>
- <li id="M201511060">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+Cisco TNP</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511060">
<p>Vizio goes a step further than other TV
manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
@@ -830,145 +942,69 @@
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million households
- to</em></ins></span> the <span class="removed"><del><strong>fault of app
developers. That is clearly true if</strong></del></span> <span
class="inserted"><ins><em>600 millions social media profiles</em></ins></span>
the <span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>company
- already monitors. Tivo customers</em></ins></span> are <span
class="removed"><del><strong>proprietary software.</p>
-
-<p>Anything whose name is “Smart” is most likely going to
-screw you.</p>
-</li>
-
-<li>
-<p>
-Malware found on</strong></del></span> <span class="inserted"><ins><em>unaware
they're
+ to the 600 millions social media profiles the company
+ already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
- information with online social media participation, Tivo can
now</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
-security cameras available through Amazon</a>.
-</p>
-
-<p>A camera that records locally on physical media, and has no network
-connection, does not threaten people</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
- correlate TV advertisement</em></ins></span> with <span
class="removed"><del><strong>surveillance—neither</strong></del></span>
<span class="inserted"><ins><em>online purchases</a>, exposing all
- users to new combined surveillance</em></ins></span> by <span
class="removed"><del><strong>watching people through the camera, nor through
malware in the
-camera.</p></strong></del></span> <span
class="inserted"><ins><em>default.</p></em></ins></span>
+ information with online social media participation, Tivo can now <a
+ href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+ correlate TV advertisement with online purchases</a>, exposing all
+ users to new combined surveillance by default.</p>
</li>
-<span class="removed"><del><strong><li>
-<p> <a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-FitBit</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510210">
- <p>FitBit</em></ins></span> fitness trackers have a <span
class="inserted"><ins><em><a
-
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></em></ins></span>
+ <li id="M201510210">
+ <p>FitBit fitness trackers have a <a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
Bluetooth vulnerability</a> that allows attackers to send malware
to the devices, which can subsequently spread to computers and other
FitBit trackers that interact with them.</p>
</li>
-<span class="removed"><del><strong><li>
-<p> “Self-encrypting”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510200">
- <p>“Self-encrypting”</em></ins></span> disk drives
+ <li id="M201510200">
+ <p>“Self-encrypting” disk drives
do the encryption with proprietary firmware so you
- can't trust it. Western Digital's <span class="removed"><del><strong><a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"></strong></del></span>
“My Passport” drives <span class="inserted"><ins><em><a
-
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption"></em></ins></span>
+ can't trust it. Western Digital's “My Passport” drives <a
+
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
have a back door</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>
-Hospira infusion pumps, which</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507240">
+ <li id="M201507240">
<p>Vizio “smart” TVs recognize and <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people</em></ins></span> are <span class="removed"><del><strong>used
to administer drugs to
-a patient, were rated “<a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
-least secure IP device I've ever seen</a>”
by</strong></del></span> <span class="inserted"><ins><em>watching</a>,
even if it isn't</em></ins></span> a <span class="removed"><del><strong>security
-researcher.</p>
-
-<p>Depending on what drug is being infused, the insecurity could
-open the door to murder.</p></strong></del></span> <span
class="inserted"><ins><em>TV channel.</p></em></ins></span>
+ what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506080"></em></ins></span>
+ <li id="M201506080">
<p>Due to bad security in a drug pump, crackers could use it to <a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
kill patients</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“Smart homes”</a> turn out to be stupidly vulnerable to
-intrusion.</p>
-</li>
-
-<li>
-<p>The <a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-FTC punished a company for making webcams with bad security</a> so
-that it was easy for anyone to watch them.</p>
-</li>
-
-<li>
-<p>It is possible to <a
-href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-kill people by taking control of medical implants by radio</a>. More
-information in <a
-href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
-<a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p>
-</li>
-
-<li>
-<p>Lots of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505290">
- <p>Verizon cable TV</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
-hospital equipment has lousy security</a>,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops on what programs people watch,</em></ins></span> and <span
class="removed"><del><strong>it can be fatal.</p></strong></del></span>
<span class="inserted"><ins><em>even what they wanted to
- record</a>.</p></em></ins></span>
+ <li id="M201505290">
+ <p>Verizon cable TV <a
+
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505050">
+ <li id="M201505050">
<p>Hospira infusion pumps, which are used
- to administer drugs to a patient,</em></ins></span> were <span
class="removed"><del><strong>taken over</a> and turned
-into</strong></del></span> <span class="inserted"><ins><em>rated “<a
+ to administer drugs to a patient, were rated “<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
- secure IP device I've ever seen</a>” by</em></ins></span> a
<span class="removed"><del><strong>botnet for</strong></del></span> <span
class="inserted"><ins><em>security
+ secure</em></ins></span> IP <span
class="removed"><del><strong>phones</strong></del></span> <span
class="inserted"><ins><em>device I've ever seen</a>” by a security
researcher.</p>
- <p>Depending on what drug is being infused,</em></ins></span> the
<span class="removed"><del><strong>purpose of collecting customers' credit card
-numbers.</p></strong></del></span> <span
class="inserted"><ins><em>insecurity could open
- the door to murder.</p></em></ins></span>
+ <p>Depending on what drug is being infused, the insecurity could open
+ the door to murder.</p>
</li>
- <li <span
class="removed"><del><strong>id="vizio-snoop"></strong></del></span> <span
class="inserted"><ins><em>id="M201504300"></em></ins></span>
+ <li id="M201504300">
<p>Vizio <a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
used a firmware “upgrade” to make its TVs snoop on what
users watch</a>. The TVs did not do that when first sold.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201502180">
+ <li id="M201502180">
<p>Barbie <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p>
@@ -1005,7 +1041,7 @@
better.</p>
<p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>spying
devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
And what happens if a user declines consent? Probably the TV will
say, “Without your consent to tracking, the TV will not
work.”</p>
@@ -1017,75 +1053,48 @@
<li id="M201407170">
<p id="nest-thermometers">Nest thermometers send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
- data about the user</a>.</p>
- </li>
-
- <li id="M201405200.1"></em></ins></span>
- <p>LG <a
-
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- disabled network features</a> on <em>previously
purchased</em>
- “smart” TVs, unless the purchasers agreed to let LG begin
- to snoop on them and distribute their personal data.</p>
+ data about the user</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p><a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
-Barbie is going to spy</a> on children</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
- <p>Lots of <a
- href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>,</em></ins></span> and
<span class="removed"><del><strong>adults.</p></strong></del></span>
<span class="inserted"><ins><em>it can be fatal.</p></em></ins></span>
- </li>
+<p>The</strong></del></span>
-<span class="removed"><del><strong><li></strong></del></span>
+ <span class="inserted"><ins><em><li id="M201405200.1">
+ <p>LG</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">Nest
Cam
+“smart” camera is always watching</a>, even when the
+“owner” switches it “off.”</p>
- <span class="inserted"><ins><em><li id="M201312290"></em></ins></span>
- <p><a
-<span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-Cisco TNP IP phones are spying devices</a>.</p>
+<p>A</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ disabled network features</a> on <em>previously
purchased</em></em></ins></span>
+ “smart” <span class="removed"><del><strong>device
means</strong></del></span> <span class="inserted"><ins><em>TVs,
unless</em></ins></span> the <span class="removed"><del><strong>manufacturer is
using it</strong></del></span> <span class="inserted"><ins><em>purchasers
agreed</em></ins></span> to <span class="removed"><del><strong>outsmart
+you.</p>
</li>
<li>
-<p>The <a
-href="http://www.bbc.com/news/technology-34922712">Nest Cam
-“smart” camera is always watching</a>, even when the
-“owner” switches</strong></del></span> <span
class="inserted"><ins><em>href="http://www.bunniestudios.com/blog/?p=3554">
Some flash
- memories have modifiable software</a>, which makes them vulnerable
- to viruses.</p>
-
- <p>We don't call this a “back door”
because</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
-
-<p>A “smart” device means the
manufacturer</strong></del></span> is <span class="removed"><del><strong>using
it</strong></del></span> <span class="inserted"><ins><em>normal
- that you can install a new system in a computer, given physical
access</em></ins></span>
- to <span class="removed"><del><strong>outsmart
-you.</p></strong></del></span> <span class="inserted"><ins><em>it.
However, memory sticks and cards should not be modifiable in
- this way.</p></em></ins></span>
+<p>Vizio goes a step further than other TV manufacturers in
spying</strong></del></span> <span class="inserted"><ins><em>let LG begin
+ to snoop</em></ins></span> on <span class="inserted"><ins><em>them and
distribute</em></ins></span> their <span class="removed"><del><strong>users:
their</strong></del></span> <span class="inserted"><ins><em>personal
data.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Vizio goes</strong></del></span>
+ <li id="M201404250">
+ <p>Lots of</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
+“smart” TVs analyze your viewing habits in
detail</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+ hospital equipment has lousy security</a>,</em></ins></span> and
+<span class="removed"><del><strong>link them your IP address</a> so that
advertisers</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> can <span
class="removed"><del><strong>track you
+across devices.</p>
- <span class="inserted"><ins><em><li id="M201312040">
- <p><a
-
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
- Point-of-sale terminals running Windows were taken over</a> and
- turned into</em></ins></span> a <span class="removed"><del><strong>step
further than other TV manufacturers</strong></del></span> <span
class="inserted"><ins><em>botnet for the purpose of collecting customers' credit
- card numbers.</p>
+<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>be fatal.</p>
</li>
- <li id="M201311210">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>spying on
-their users: their <a
-href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>LG</em></ins></span> “smart” TVs
<span class="removed"><del><strong>analyze your viewing habits in
detail</strong></del></span> <span class="inserted"><ins><em><a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and
-<span class="removed"><del><strong>link them your IP address</a> so that
advertisers can track you
-across devices.</p>
+ <li id="M201312290">
+ <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
+ memories have modifiable software</a>, which makes them
vulnerable</em></ins></span>
+ to <span class="removed"><del><strong>turn</strong></del></span> <span
class="inserted"><ins><em>viruses.</p>
-<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the switch</em></ins></span> to turn this <span
class="removed"><del><strong>off, but having it enabled by default
-is an injustice already.</p>
+ <p>We don't call</em></ins></span> this <span
class="removed"><del><strong>off, but having</strong></del></span> <span
class="inserted"><ins><em>a “back door” because</em></ins></span>
it <span class="removed"><del><strong>enabled by default</strong></del></span>
is <span class="removed"><del><strong>an injustice already.</p>
</li>
<li>
@@ -1093,15 +1102,32 @@
millions social media profiles the company already monitors. Tivo
customers are unaware they're being watched by advertisers. By
combining TV viewing information with online social media
-participation, Tivo can now <a
+participation, Tivo</strong></del></span> <span
class="inserted"><ins><em>normal
+ that you</em></ins></span> can <span class="removed"><del><strong>now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
-users to new combined surveillance by default.</p>
+users to</strong></del></span> <span class="inserted"><ins><em>install
a</em></ins></span> new <span class="removed"><del><strong>combined
surveillance by default.</p>
</li>
<li>
-<p>Some web and TV advertisements play inaudible sounds to be picked
-up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>off has
+<p>Some web and TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>system in a
computer, given physical access</em></ins></span>
+ to <span class="inserted"><ins><em>it. However, memory sticks and cards
should not</em></ins></span> be <span class="removed"><del><strong>picked
+up by proprietary malware</strong></del></span> <span
class="inserted"><ins><em>modifiable in
+ this way.</p>
+ </li>
+
+ <li id="M201312040">
+ <p><a
+
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+ Point-of-sale terminals</em></ins></span> running <span
class="inserted"><ins><em>Windows were taken over</a> and
+ turned into a botnet for the purpose of collecting customers' credit
+ card numbers.</p>
+ </li>
+
+ <li id="M201311210">
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
@@ -1310,7 +1336,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/04/11 07:00:32 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary/po/malware-appliances.de.po 23 Mar 2019 10:31:41 -0000
1.75
+++ proprietary/po/malware-appliances.de.po 11 Apr 2019 07:00:32 -0000
1.76
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -108,6 +108,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
Index: proprietary/po/malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary/po/malware-appliances.fr.po 23 Mar 2019 10:52:11 -0000
1.120
+++ proprietary/po/malware-appliances.fr.po 11 Apr 2019 07:00:33 -0000
1.121
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2019-03-23 11:51+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -82,6 +83,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
Index: proprietary/po/malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary/po/malware-appliances.pot 23 Mar 2019 10:31:41 -0000
1.60
+++ proprietary/po/malware-appliances.pot 11 Apr 2019 07:00:33 -0000
1.61
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a "
+"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\">
"
+"two vulnerabilities that affect several models of implantable "
+"defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in "
+"2008. Apparently, nothing was done by the company to correct them. This "
+"means you can't rely on proprietary software developers to fix bugs in their "
+"products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a "
"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone "
Index: proprietary/po/malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary/po/malware-appliances.ru.po 23 Mar 2019 17:32:01 -0000
1.154
+++ proprietary/po/malware-appliances.ru.po 11 Apr 2019 07:00:33 -0000
1.155
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/nl.po 11 Apr 2019 02:59:08 -0000 1.62
+++ proprietary/po/nl.po 11 Apr 2019 07:00:33 -0000 1.63
@@ -1756,6 +1756,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/pl.po 11 Apr 2019 02:59:08 -0000 1.62
+++ proprietary/po/pl.po 11 Apr 2019 07:00:33 -0000 1.63
@@ -1322,6 +1322,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/pot 11 Apr 2019 02:59:08 -0000 1.62
+++ proprietary/po/pot 11 Apr 2019 07:00:33 -0000 1.63
@@ -1192,6 +1192,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary/po/proprietary-insecurity.de-diff.html 23 Mar 2019 10:31:41
-0000 1.25
+++ proprietary/po/proprietary-insecurity.de-diff.html 11 Apr 2019 07:00:33
-0000 1.26
@@ -69,6 +69,19 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
@@ -276,19 +289,14 @@
<li id="M201703270">
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to the Internet, its</em></ins></span> security
- <span class="removed"><del><strong>vulnerability for 10
years</a>.</p>
-
- <p>The vulnerability allowed</strong></del></span> <span
class="inserted"><ins><em>is crap</a>.</p>
+ Stings hospital disinfectant dishwasher is</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
+ vulnerability for 10 years</a>.</p>
- <p>For example,</em></ins></span> a cracker <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>can gain</em></ins></span> access <span
class="inserted"><ins><em>to</em></ins></span> the <span
class="removed"><del><strong>computer's Intel Active
+ <p>The vulnerability allowed a cracker to access the computer's Intel
Active
Management Technology
(AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
- web interface</strong></del></span> <span
class="inserted"><ins><em>dishwasher's
- filesystem, infect it</em></ins></span> with <span
class="removed"><del><strong>an empty password</strong></del></span> <span
class="inserted"><ins><em>malware,</em></ins></span> and <span
class="removed"><del><strong>gave administrative
- access</a> to access</strong></del></span> <span
class="inserted"><ins><em>force</em></ins></span> the <span
class="removed"><del><strong>computer's keyboard, mouse, monitor
+ web interface with an empty password and gave administrative
+ access</a> to access the computer's keyboard, mouse, monitor
among other privileges.</p>
<p>It does not help that in newer Intel processors, it is
impossible
@@ -307,11 +315,13 @@
<li>
<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
<a
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
-connected to the Internet, its security is crap</a>.</p>
+connected to the Internet, its</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to the Internet, its</em></ins></span> security is
crap</a>.</p>
-<p>For example, a cracker can gain access to the dishwasher's
filesystem,
-infect it with malware, and force the dishwasher to launch attacks
on</strong></del></span> <span class="inserted"><ins><em>dishwasher to launch
- attacks on</em></ins></span> other devices in the network. Since these
dishwashers are
+ <p>For example, a cracker can gain access to the dishwasher's
+ filesystem, infect it with malware, and force the dishwasher to launch
+ attacks on other devices in the network. Since these dishwashers are
used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
</li>
@@ -380,10 +390,7 @@
<span class="removed"><del><strong><li>
<p>The mobile apps for
-communicating</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201610230">
- <p>4G LTE phone networks are drastically insecure. They can
be</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
+communicating <a
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
<p>This is in addition to the fact that the car contains a cellular
@@ -406,9 +413,10 @@
ransomware</a>.</p>
</li>
-<li>
-<p>4G LTE phone networks are drastically insecure. They can be
-<a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"></strong></del></span>
+<li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201610230"></em></ins></span>
+ <p>4G LTE phone networks are drastically insecure. They can be <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/"></em></ins></span>
taken over by third parties and used for man-in-the-middle
attacks</a>.</p>
@@ -561,7 +569,10 @@
<span class="removed"><del><strong><li>
<p>
Malware found
-on <a
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
+on</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510210">
+ <p>FitBit fitness trackers have a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
cameras available through Amazon</a>.
</p>
@@ -589,13 +600,10 @@
<li>
<p>
-FitBit fitness trackers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510210">
- <p>FitBit fitness trackers have a</em></ins></span> <a
-
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-<span class="removed"><del><strong>have a</strong></del></span>
- Bluetooth vulnerability</a> that allows attackers to send malware
+FitBit fitness trackers <a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+have a Bluetooth vulnerability</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+ Bluetooth vulnerability</a></em></ins></span> that allows attackers
to send malware
to the devices, which can subsequently spread to computers and other
FitBit trackers that interact with <span class="removed"><del><strong>them.
</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
@@ -772,11 +780,13 @@
</p>
</li>
-<li></strong></del></span>
+<li>
+<p>An app to prevent “identity theft” (access to personal
data)
+by storing users'</strong></del></span>
- <span class="inserted"><ins><em><li id="M201405190"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201405190">
<p>An app to prevent “identity theft”
- (access to personal data) by storing users' data on a special server <a
+ (access to personal data) by storing users'</em></ins></span> data on a
special server <a
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
deactivated by its developer</a> which had discovered a security
<span class="removed"><del><strong>flaw.
</p>
@@ -971,7 +981,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/04/11 07:00:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary/po/proprietary-insecurity.de.po 23 Mar 2019 10:31:41 -0000
1.128
+++ proprietary/po/proprietary-insecurity.de.po 11 Apr 2019 07:00:33 -0000
1.129
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -139,6 +139,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
Index: proprietary/po/proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary/po/proprietary-insecurity.fr.po 23 Mar 2019 10:52:11 -0000
1.162
+++ proprietary/po/proprietary-insecurity.fr.po 11 Apr 2019 07:00:33 -0000
1.163
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2019-03-23 11:51+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -110,6 +111,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
Index: proprietary/po/proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary/po/proprietary-insecurity.it-diff.html 23 Mar 2019 10:31:41
-0000 1.40
+++ proprietary/po/proprietary-insecurity.it-diff.html 11 Apr 2019 07:00:33
-0000 1.41
@@ -58,32 +58,81 @@
<li id="break-security-smarttv">
<p><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</strong></del></span>
+ Crackers found a way to break security on a “smart”
TV</a> and use its camera
+ to watch the people who are watching TV.</p>
+</li>
+<li>
+ <p>Many models</strong></del></span>
+
+<span class="inserted"><ins><em><p>This page lists clearly established
cases</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras <a
+ href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
+ have backdoors</a>.</p>
+
+ <p>That is a malicious functionality, but</strong></del></span> <span
class="inserted"><ins><em>insecurity</em></ins></span> in <span
class="removed"><del><strong>addition it</strong></del></span>
+<span class="inserted"><ins><em>proprietary software that has grave
consequences or</em></ins></span> is <span class="removed"><del><strong>a gross
+ insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into
+ users' cameras</a>.</p>
+
+</li>
-<span class="inserted"><ins><em><p>This page lists clearly established
cases of insecurity in
-proprietary software that has grave consequences or is otherwise
+<li>
+ <p>
+ Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+ pre-installed on 28 models</strong></del></span> <span
class="inserted"><ins><em>otherwise
noteworthy.</p>
<div class="important">
-<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>break security on</strong></del></span> <span
class="inserted"><ins><em>be in this page but isn't
-here, please write
-to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>“smart” TV</a> and use its
camera</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two</em></ins></span>
-to <span class="inserted"><ins><em>serve as specific substantiation.</p>
+<p>If you know</em></ins></span> of <span
class="removed"><del><strong>HP laptops logged the user's
+ keystroke</strong></del></span> <span class="inserted"><ins><em>an example
that ought</em></ins></span> to <span class="removed"><del><strong>a
file</strong></del></span> <span class="inserted"><ins><em>be</em></ins></span>
in <span class="removed"><del><strong>the filesystem. Any process with access to
+ the filesystem or the MapViewOfFile API could gain
access</strong></del></span> <span class="inserted"><ins><em>this page but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>the
+ log. Furthermore,</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
+ to modzero</a> the “information-leak via Covert Storage
+ Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a></em></ins></span>
+to <span class="removed"><del><strong>capture keystrokes without
+ taking</strong></del></span> <span class="inserted"><ins><em>inform us.
Please include</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>being classified</strong></del></span> <span
class="inserted"><ins><em>a trustworthy reference or two
+to serve</em></ins></span> as <span class="removed"><del><strong>malicious
task by AV
+ heuristics”.
+ </p>
+</li>
+<li></strong></del></span> <span class="inserted"><ins><em>specific
substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201903210"></em></ins></span>
+ <p>The <span class="removed"><del><strong>proprietary code that runs
pacemakers, insulin pumps, and other
+medical devices is</strong></del></span> <span
class="inserted"><ins><em>Medtronics Conexus Telemetry Protocol
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross security faults</a>.</p>
+</li>
+
+
+<li>
+ <p>Exploits</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models</em></ins></span> of <span
class="removed"><del><strong>bugs in Windows, which were developed
by</strong></del></span> <span class="inserted"><ins><em>implantable
+ defibrillators</a> and</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>devices they connect to.</p>
+
+ <p>This protocol has been around since 2006,</em></ins></span> and
<span class="removed"><del><strong>then leaked</strong></del></span> <span
class="inserted"><ins><em>similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done</em></ins></span> by the
<span class="removed"><del><strong>Shadowbrokers group, are now being
used</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers</strong></del></span>
+ <span class="inserted"><ins><em>correct them. This means you can't rely on
proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
- manufacturer (now Amazon) can</em></ins></span> watch <span
class="inserted"><ins><em>all the time. Now it turns out
+ manufacturer (now Amazon) can watch all the time. Now it turns out
that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
unintentional and I suppose Amazon will fix it. I
- do not expect Amazon to change</em></ins></span> the <span
class="inserted"><ins><em>design that <a
+ do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
</li>
@@ -91,45 +140,27 @@
<li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that</em></ins></span>
people <span class="removed"><del><strong>who are watching
TV.</p></strong></del></span> <span class="inserted"><ins><em>cannot hear
- them, but Alexa and Siri can.</p></em></ins></span>
+ hide voice commands in other audio</a>, so that people cannot hear
+ them, but Alexa and Siri can.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Many models</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201808120">
- <p>Crackers found a way to break the security</em></ins></span> of
<span class="removed"><del><strong>Internet-connected
cameras</strong></del></span> <span class="inserted"><ins><em>an Amazon device,
- and</em></ins></span> <a
- <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
- have backdoors</a>.</p>
-
- <p>That is a malicious functionality, but in
addition</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn</em></ins></span> it <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> a <span
class="removed"><del><strong>gross
- insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use</strong></del></span> <span
class="inserted"><ins><em>listening device</a> for them.</p>
-
- <p>It was very difficult for</em></ins></span> them to <span
class="removed"><del><strong>get into
- users' cameras</a>.</p>
-</li>
-
-<li>
- <p>
- Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models of HP laptops logged</strong></del></span>
<span class="inserted"><ins><em>do this. The job would be much
- easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>user's
- keystroke</strong></del></span> <span class="inserted"><ins><em>US
- told Amazon</em></ins></span> to <span class="removed"><del><strong>a file
in the filesystem. Any process with access</strong></del></span> <span
class="inserted"><ins><em>do this, or cease</em></ins></span> to <span
class="inserted"><ins><em>sell</em></ins></span> the <span
class="removed"><del><strong>filesystem or</strong></del></span> <span
class="inserted"><ins><em>product in that country,
- do you think Amazon would have</em></ins></span> the <span
class="removed"><del><strong>MapViewOfFile API could gain
access</strong></del></span> <span class="inserted"><ins><em>moral
fiber</em></ins></span> to <span class="removed"><del><strong>the
- log. Furthermore,</strong></del></span> <span
class="inserted"><ins><em>say no?</p>
-
- <p>These crackers are probably hackers too, but
please</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according</strong></del></span>
- <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
- “hacking”</em></ins></span> to <span
class="removed"><del><strong>modzero</a></strong></del></span> <span
class="inserted"><ins><em>mean “breaking
security”</a>.</p>
+ <li id="M201808120">
+ <p>Crackers found a way to break the security of an Amazon device,
+ and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ turn it into a listening device</a> for them.</p>
+
+ <p>It was very difficult for them to do this. The job would be much
+ easier for Amazon. And if some government such as China or the US
+ told Amazon to do this, or cease to sell the product in that country,
+ do you think Amazon would have the moral fiber to say no?</p>
+
+ <p>These crackers are probably hackers too, but please <a
+ href="https://stallman.org/articles/on-hacking.html"> don't use
+ “hacking” to mean “breaking
security”</a>.</p>
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all</em></ins></span> the <span
class="removed"><del><strong>“information-leak via Covert Storage
- Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>other voice-control systems can be <a
+ <p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -138,23 +169,17 @@
<li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos</em></ins></span> to <span class="removed"><del><strong>capture
keystrokes without
- taking</strong></del></span> <span class="inserted"><ins><em>people
in</em></ins></span> the <span class="removed"><del><strong>risk of being
classified as malicious task by AV
- heuristics”.
- </p></strong></del></span> <span class="inserted"><ins><em>owner's
contact list</a>.</p></em></ins></span>
+ photos to people in the owner's contact list</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices</strong></del></span>
- <span class="inserted"><ins><em><li id="M201712240">
- <p>One of the dangers of the “internet of
stings”</em></ins></span>
- is <span class="inserted"><ins><em>that, if you lose your internet
service, you also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
-full</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control</em></ins></span> of <span
class="removed"><del><strong>gross</strong></del></span> <span
class="inserted"><ins><em>your house and appliances</a>.</p>
+ <li id="M201712240">
+ <p>One of the dangers of the “internet of stings”
+ is that, if you lose your internet service, you also <a
+
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control of your house and appliances</a>.</p>
- <p>For your safety, don't use any appliance with a connection to the
+ <p>For your safety, don't use any appliance</em></ins></span> with
<span class="removed"><del><strong>ransomware</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>a
connection to the
real internet.</p>
</li>
@@ -168,45 +193,39 @@
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
allow delivery staff to open their front doors</a>. Wouldn't you know
- it, the system has a grave</em></ins></span> security <span
class="removed"><del><strong>faults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>flaw.</p></em></ins></span>
+ it, the system has a grave security flaw.</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>Exploits of bugs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709290">
- <p>Bad security</em></ins></span> in <span
class="removed"><del><strong>Windows, which were developed
by</strong></del></span> <span class="inserted"><ins><em>some cars makes it
possible to <a
+ <li id="M201709290">
+ <p>Bad security in some cars makes it possible to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
- remotely activate</em></ins></span> the <span
class="removed"><del><strong>NSA
- and then leaked by</strong></del></span> <span
class="inserted"><ins><em>airbags</a>.</p>
+ remotely activate the airbags</a>.</p>
</li>
<li id="M201709200">
<p>A “smart” intravenous pump
- designed for hospitals is connected to</em></ins></span> the <span
class="removed"><del><strong>Shadowbrokers group, are now being
used</strong></del></span> <span class="inserted"><ins><em>internet. Naturally
<a
+ designed for hospitals is connected to the internet. Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
<p>Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</em></ins></span> to <span
class="inserted"><ins><em>crackers.</p>
+ referring to crackers.</p>
</li>
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
to snoop on the people that use them</a>.</p>
- <p>Don't be</em></ins></span> a <span
class="removed"><del><strong>great number</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all the stings.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
<p>It is unfortunate that the article uses the term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li id="M201706200.1">
- <p>Many models</em></ins></span> of <span
class="removed"><del><strong>Windows computers with ransomware</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>Internet-connected cameras <a
+ <p>Many models of Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
@@ -236,14 +255,12 @@
besides using machines that don't come with the backdoor.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Many Android</strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201705250">
<p>The proprietary code that runs pacemakers,
- insulin pumps, and other medical</em></ins></span> devices <span
class="inserted"><ins><em>is</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full of gross
+ insulin pumps, and other medical devices is <a
+ href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
security faults</a>.</p>
</li>
@@ -265,10 +282,10 @@
a great number of Windows computers with ransomware</a>.</p>
</li>
- <li id="M201704050">
+ <li id="M201704050"></em></ins></span>
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be</em></ins></span> hijacked through their Wi-Fi chips</a>
because of a bug in
+ can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
</li>
@@ -276,9 +293,10 @@
<span class="inserted"><ins><em><li id="M201703270"></em></ins></span>
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected</em></ins></span> to the Internet, its security is
crap</a>.</p>
+ Stings hospital disinfectant dishwasher is
+<span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
<span class="inserted"><ins><em><a
+
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to the Internet, its security is crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
filesystem, infect it with malware, and force the dishwasher to launch
@@ -286,9 +304,8 @@
used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
</li>
-<span
class="removed"><del><strong><li><p>WhatsApp</strong></del></span>
- <span class="inserted"><ins><em><li id="M201702200">
+ <li id="M201702200">
<p>If you buy a used “smart”
car, house, TV, refrigerator, etc., usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
@@ -300,17 +317,23 @@
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
- <p>This is in addition to the fact that the car contains a cellular
- modem that tells big brother all the time where it is. If you own
- such a car, it would be wise to disconnect the modem so as to turn
- off the tracking.</p>
+ <p>This is in addition</em></ins></span> to the <span
class="removed"><del><strong>Internet,
+its security is crap</a>.</p>
+
+<p>For example,</strong></del></span> <span
class="inserted"><ins><em>fact that the car contains</em></ins></span> a <span
class="removed"><del><strong>cracker can gain access to</strong></del></span>
<span class="inserted"><ins><em>cellular
+ modem that tells big brother all</em></ins></span> the <span
class="removed"><del><strong>dishwasher's filesystem,
+infect</strong></del></span> <span class="inserted"><ins><em>time
where</em></ins></span> it <span class="removed"><del><strong>with malware, and
force</strong></del></span> <span class="inserted"><ins><em>is. If you own
+ such a car, it would be wise to disconnect</em></ins></span> the <span
class="removed"><del><strong>dishwasher</strong></del></span> <span
class="inserted"><ins><em>modem so as</em></ins></span> to <span
class="removed"><del><strong>launch attacks on other
+devices in</strong></del></span> <span class="inserted"><ins><em>turn
+ off</em></ins></span> the <span class="removed"><del><strong>network.
Since these dishwashers</strong></del></span> <span
class="inserted"><ins><em>tracking.</p>
</li>
<li id="M201701271">
<p>A cracker would be able to <a
href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
turn the Oculus Rift sensors into spy cameras</a> after breaking into
- the computer they are connected to.</p>
+ the computer they</em></ins></span> are <span
class="removed"><del><strong>used in hospitals, such
+attacks could potentially put hundreds of lives at
risk.</p></strong></del></span> <span class="inserted"><ins><em>connected
to.</p>
<p>Unfortunately, the article <a
href="/philosophy/words-to-avoid.html#Hacker">improperly refers to
crackers
@@ -321,10 +344,11 @@
<p>Samsung phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
- ransomware</a>.</p>
+ ransomware</a>.</p></em></ins></span>
</li>
+<span
class="removed"><del><strong><li><p>WhatsApp</strong></del></span>
- <li id="M201701130">
+ <span class="inserted"><ins><em><li id="M201701130">
<p>WhatsApp</em></ins></span> has a feature that <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
has been described as a “back door”</a> because it would
@@ -444,18 +468,19 @@
<span class="inserted"><ins><em><li id="M201606290"></em></ins></span>
<p>Antivirus programs have so many errors that <a
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
- may make security worse</a>.</p>
-
- <p>GNU/Linux does not need antivirus software.</p>
- </li>
+ may <span class="removed"><del><strong>make security
worse</a>.</p>
+<p>GNU/Linux does not need antivirus software.</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>Over 70 brands of network-connected surveillance
cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
-security bugs that allow anyone to watch through them</a>.</p>
-</li>
+security bugs that allow anyone to watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>make security worse</a>.</p>
-<li>
+ <p>GNU/Linux does not need antivirus
software.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
Samsung's</strong></del></span>
@@ -531,10 +556,7 @@
<span class="removed"><del><strong><li>
<p>
Malware found
-on</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510210">
- <p>FitBit fitness trackers have a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
+on <a
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
cameras available through Amazon</a>.
</p>
@@ -562,10 +584,12 @@
<li>
<p>
-FitBit fitness trackers <a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-have a Bluetooth vulnerability</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
- Bluetooth vulnerability</a></em></ins></span> that allows attackers
to send malware
+FitBit</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510210">
+ <p>FitBit</em></ins></span> fitness trackers <span
class="removed"><del><strong><a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></strong></del></span>
have a <span class="inserted"><ins><em><a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></em></ins></span>
+ Bluetooth vulnerability</a> that allows attackers to send malware
to the devices, which can subsequently spread to computers and other
FitBit trackers that interact with <span class="removed"><del><strong>them.
</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
@@ -578,9 +602,9 @@
<span class="inserted"><ins><em><li id="M201510200">
<p>“Self-encrypting”</em></ins></span> disk drives
do the encryption with proprietary firmware so you
- can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
- have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
+ can't trust it. <span class="removed"><del><strong>Western Digital's
“My Passport”
+drives
+<a
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
</p>
</li>
@@ -590,7 +614,9 @@
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+</p></strong></del></span> <span class="inserted"><ins><em>Western
Digital's “My Passport” drives <a
+
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ have a back door</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -626,58 +652,34 @@
<p>If</em></ins></span> I ever own a car, and it contains a portable
phone, I will
deactivate <span class="removed"><del><strong>that.
-</p></strong></del></span> <span
class="inserted"><ins><em>that.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
-Hospira</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506080">
- <p>Due to bad security in a drug pump, crackers could use it to <a
-
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
- kill patients</a>.</p>
- </li>
-
- <li id="M201505294">
- <p><a
-
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
- Many smartphone apps use insecure authentication methods when storing
- your personal data on remote servers</a>. This leaves personal
- information like email addresses, passwords, and health information
- vulnerable. Because many of these apps are proprietary it makes it
- hard to impossible to know which apps are at risk.</p>
- </li>
-
- <li id="M201505050">
- <p>Hospira</em></ins></span> infusion pumps, which are used
- to administer drugs to a patient, were rated “<a
-
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
- secure IP device I've ever seen</a>” by a security <span
class="removed"><del><strong>researcher.
+Hospira infusion pumps, which are used to administer drugs to
+a patient, were rated
+“<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+secure IP device I've ever seen</a>”
+by a security researcher.
</p>
<p>
-Depending</strong></del></span>
- <span class="inserted"><ins><em>researcher.</p>
-
- <p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
- the door to <span class="removed"><del><strong>murder.
-</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+Depending on what drug is being infused, the insecurity could
+open the door to murder.
+</p></strong></del></span> <span
class="inserted"><ins><em>that.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>
-Due to bad security in a drug pump, crackers</strong></del></span>
+Due</strong></del></span>
- <span class="inserted"><ins><em><li id="M201504090">
- <p>Mac OS X had an <a
-
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
- intentional local back door for 4 years</a>, which</em></ins></span>
could <span class="removed"><del><strong>use it</strong></del></span> <span
class="inserted"><ins><em>be exploited
- by attackers</em></ins></span> to
-<span class="removed"><del><strong><a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>gain root
privileges.</p></em></ins></span>
- </li>
+ <span class="inserted"><ins><em><li id="M201506080">
+ <p>Due</em></ins></span> to bad security in a drug pump, crackers
could use it to <a <span
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
<a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones, Android, and
@@ -721,27 +723,55 @@
<li>
<p><a
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-It is possible to kill people by taking control of medical implants by
+It is possible to</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"></em></ins></span>
+ kill <span class="removed"><del><strong>people by taking control of
medical implants by
radio</a>. Here
is <a href="http://www.bbc.co.uk/news/technology-17631838">more
information</a>. And <a
href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>patients</a>.</p></em></ins></span>
+ </li>
-<li>
-<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>, and it can be fatal.
-</p>
-</li>
+<span class="removed"><del><strong><li>
+<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>,</strong></del></span>
-<li>
+ <span class="inserted"><ins><em><li id="M201505294">
+ <p><a
+
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+ Many smartphone apps use insecure authentication methods when storing
+ your personal data on remote servers</a>. This leaves personal
+ information like email addresses, passwords,</em></ins></span> and <span
class="inserted"><ins><em>health information
+ vulnerable. Because many of these apps are proprietary</em></ins></span>
it <span class="removed"><del><strong>can be fatal.
+</p></strong></del></span> <span class="inserted"><ins><em>makes it
+ hard to impossible to know which apps are at
risk.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken over and turned
-into a botnet for the purpose of collecting customers' credit card
+Point-of-sale terminals running Windows</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505050">
+ <p>Hospira infusion pumps, which are used
+ to administer drugs to a patient,</em></ins></span> were <span
class="removed"><del><strong>taken over and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated “<a
+
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+ secure IP device I've ever seen</a>” by</em></ins></span> a
<span class="removed"><del><strong>botnet for</strong></del></span> <span
class="inserted"><ins><em>security
+ researcher.</p>
+
+ <p>Depending on what drug is being infused,</em></ins></span> the
<span class="removed"><del><strong>purpose of collecting customers' credit card
numbers</a>.
-</p>
-</li>
+</p></strong></del></span> <span class="inserted"><ins><em>insecurity
could open
+ the door to murder.</p>
+ </li>
-<li></strong></del></span>
+ <li id="M201504090">
+ <p>Mac OS X had an <a
+
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ intentional local back door for 4 years</a>, which could be exploited
+ by attackers to gain root privileges.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201405190"></em></ins></span>
<p>An app to prevent “identity theft”
@@ -941,7 +971,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/04/11 07:00:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary/po/proprietary-insecurity.it.po 23 Mar 2019 10:31:41 -0000
1.145
+++ proprietary/po/proprietary-insecurity.it.po 11 Apr 2019 07:00:33 -0000
1.146
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
Index: proprietary/po/proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- proprietary/po/proprietary-insecurity.ja-diff.html 23 Mar 2019 10:31:41
-0000 1.57
+++ proprietary/po/proprietary-insecurity.ja-diff.html 11 Apr 2019 07:00:33
-0000 1.58
@@ -75,62 +75,57 @@
here, please write</em></ins></span>
to <span class="removed"><del><strong>weak security,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
is easy</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a></em></ins></span>
-to <span class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>doors</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>100 million cars built by
Volkswagen</a>.</p>
-</li>
-
-<li>
-<p>Ransomware <a
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
-been developed for</strong></del></span> a <span
class="removed"><del><strong>thermostat</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two
+to <span class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>doors</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>100 million cars built</strong></del></span> <span
class="inserted"><ins><em>a trustworthy reference or two
to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M201902270">
- <p>The Ring (now Amazon) doorbell camera is designed so that the
- manufacturer (now Amazon) can watch all the time. Now it turns
out</em></ins></span>
- that <span class="removed"><del><strong>uses proprietary
software</a>.</p>
-</li>
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done</em></ins></span> by <span
class="removed"><del><strong>Volkswagen</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p></em></ins></span>
+ </li>
-<li>
-<p>A</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
-Internet Explorer</strong></del></span> <span
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
- anyone else can also watch,</em></ins></span> and <span
class="removed"><del><strong>Edge</a> allows an attacker to retrieve
-Microsoft account credentials, if the user</strong></del></span> <span
class="inserted"><ins><em>fake videos too</a>.</p>
+<span class="removed"><del><strong><li>
+<p>Ransomware</strong></del></span>
- <p>The third party vulnerability</em></ins></span> is <span
class="removed"><del><strong>tricked into visiting a
-malicious link.</p>
-</li>
+ <span class="inserted"><ins><em><li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
+been developed for a thermostat</strong></del></span> <span
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
-<li>
-<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
-WhatsApp messages are</strong></del></span> <span
class="inserted"><ins><em>presumably
+ <p>The third party vulnerability is presumably
unintentional and I suppose Amazon will fix it. I
- do</em></ins></span> not <span class="removed"><del><strong>entirely
deleted</a>. They can be recovered
-in various ways.
-</p>
-</li>
-
-<li>
-<p>A vulnerability in Apple's Image I/O API allowed an
attacker</strong></del></span> <span class="inserted"><ins><em>expect
Amazon</em></ins></span> to <span class="inserted"><ins><em>change the design
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application which uses this API</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
- Amazon</em></ins></span> to <span class="removed"><del><strong>render a
- certain kind of image file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>.</p></em></ins></span>
+ do not expect Amazon to change the design</em></ins></span> that <span
class="removed"><del><strong>uses proprietary
software</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p></em></ins></span>
</li>
+
<span class="removed"><del><strong><li>
-<p>A bug</strong></del></span>
+<p>A</strong></del></span>
<span class="inserted"><ins><em><li id="M201809240">
- <p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands</em></ins></span> in <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p>
+ <p>Researchers have discovered how to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands</em></ins></span> in
+<span class="removed"><del><strong>Internet Explorer</strong></del></span>
<span class="inserted"><ins><em>other audio</a>, so that people cannot
hear
+ them, but Alexa</em></ins></span> and <span
class="removed"><del><strong>Edge</a> allows an
attacker</strong></del></span> <span class="inserted"><ins><em>Siri
can.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
+ <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>retrieve
+Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>user is tricked</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
@@ -367,26 +362,33 @@
<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a> allows an attacker to retrieve
- Microsoft account credentials, if the user is tricked into visiting
+ Microsoft account credentials, if the user is tricked</em></ins></span>
into visiting
a malicious link.</p>
</li>
- <li id="M201607290">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607290"></em></ins></span>
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
WhatsApp messages are not entirely deleted</a>. They can be recovered
- in various ways.</p>
+ in various <span class="removed"><del><strong>ways.
+</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p></em></ins></span>
</li>
- <li id="M201607220">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607220"></em></ins></span>
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malicious code from any application which uses this API to render a
+ <span class="removed"><del><strong>malacious</strong></del></span>
+ <span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
certain kind of image file</a>.</p>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li id="M201607190">
- <p>A bug in a</em></ins></span> proprietary ASN.1 library, used
+ <span class="inserted"><ins><em><li id="M201607190"></em></ins></span>
+ <p>A bug in a proprietary ASN.1 library, used
in cell phone towers as well as cell phones and routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
taking control of those systems</a>.</p>
@@ -901,7 +903,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 10:31:41 $
+$Date: 2019/04/11 07:00:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/proprietary-insecurity.ja.po 23 Mar 2019 10:31:41 -0000
1.115
+++ proprietary/po/proprietary-insecurity.ja.po 11 Apr 2019 07:00:33 -0000
1.116
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -102,6 +102,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
Index: proprietary/po/proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/po/proprietary-insecurity.pot 23 Mar 2019 10:31:41 -0000
1.84
+++ proprietary/po/proprietary-insecurity.pot 11 Apr 2019 07:00:33 -0000
1.85
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a "
+"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\">
"
+"two vulnerabilities that affect several models of implantable "
+"defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in "
+"2008. Apparently, nothing was done by the company to correct them. This "
+"means you can't rely on proprietary software developers to fix bugs in their "
+"products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a "
"href=\"https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone "
Index: proprietary/po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- proprietary/po/proprietary-insecurity.ru.po 23 Mar 2019 17:32:01 -0000
1.213
+++ proprietary/po/proprietary-insecurity.ru.po 11 Apr 2019 07:00:33 -0000
1.214
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-03-23 10:27+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2018-12-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Ring (now Amazon) doorbell camera is designed so that the manufacturer "
"(now Amazon) can watch all the time. Now it turns out that <a href=\"https://"
"dojo.bullguard.com/dojo-by-bullguard/blog/ring/\"> anyone else can also "
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary.de-diff.html 9 Apr 2019 09:00:37 -0000
1.73
+++ proprietary/po/proprietary.de-diff.html 11 Apr 2019 07:00:33 -0000
1.74
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -126,9 +126,9 @@
<td></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201903280">
<p>Car companies are coming up with a list of clever reasons why
<a
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html">
@@ -223,18 +236,6 @@
turned off the server for old models</a>, so now if you try to
reinstall the default settings, it bricks them instead.</p>
</li>
-
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
-
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
- </li>
</ul></em></ins></span>
@@ -295,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.115
retrieving revision 1.116
diff -u -b -r1.115 -r1.116
--- proprietary/po/proprietary.de.po 9 Apr 2019 09:00:37 -0000 1.115
+++ proprietary/po/proprietary.de.po 11 Apr 2019 07:00:33 -0000 1.116
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -431,6 +431,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -474,22 +490,6 @@
"default settings, it bricks them instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary/po/proprietary.es.po 9 Apr 2019 09:00:37 -0000 1.137
+++ proprietary/po/proprietary.es.po 11 Apr 2019 07:00:33 -0000 1.138
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -299,6 +299,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -352,30 +368,6 @@
"modelos</a>, de modo que si alguien trata ahora de restaurar las "
"Preferencias por defecto, la tableta se vuelve inutilizable."
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-"Un estudio sobre 24 aplicaciones de «salud» descubrió que 19 de ellas <a "
-"href=\" https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-"
-"share-your-data-everywhere-new-study-shows\">envÃan datos sensibles a "
-"terceras partes</a>, que pueden luego utilizarlos para enviar publicidad "
-"intrusiva o discriminar a las personas en malas condiciones médicas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-"Cuando se solicita el «consentimiento» del usuario, se esconde en unos "
-"extensos Términos del servicio difÃciles de entender. En cualquier caso, el
"
-"«consentimiento» no es suficiente para legitimar el espionaje."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -455,6 +447,28 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "A study of 24 “health” apps found that 19 of them <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
+#~ "your-data-everywhere-new-study-shows\"> send sensitive personal data to "
+#~ "third parties</a>, which can use it for invasive advertising or "
+#~ "discriminating against people in poor medical condition."
+#~ msgstr ""
+#~ "Un estudio sobre 24 aplicaciones de «salud» descubrió que 19 de ellas
<a "
+#~ "href=\" https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-"
+#~ "share-your-data-everywhere-new-study-shows\">envÃan datos sensibles a "
+#~ "terceras partes</a>, que pueden luego utilizarlos para enviar publicidad "
+#~ "intrusiva o discriminar a las personas en malas condiciones médicas."
+
+#~ msgid ""
+#~ "Whenever user “consent” is sought, it is buried in lengthy "
+#~ "terms of service that are difficult to understand. In any case, “"
+#~ "consent” is not sufficient to legitimize snooping."
+#~ msgstr ""
+#~ "Cuando se solicita el «consentimiento» del usuario, se esconde en unos "
+#~ "extensos Términos del servicio difÃciles de entender. En cualquier caso,
"
+#~ "el «consentimiento» no es suficiente para legitimar el espionaje."
+
+#~ msgid ""
#~ "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
#~ "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
#~ "cameras inside cars</a> to monitor the driver for signs of impairment "
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary/po/proprietary.fr.po 9 Apr 2019 17:33:06 -0000 1.168
+++ proprietary/po/proprietary.fr.po 11 Apr 2019 07:00:33 -0000 1.169
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2019-04-09 19:31+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -365,32 +382,6 @@
"anciens</a>, de sorte que si on essaie de réinstaller les réglages par "
"défaut, la tablette devient inutilisable."
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-"Une étude portant sur 24 applis « santé » a montré que 19 d'entre
elles <a "
-"href=\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-"
-"share-your-data-everywhere-new-study-shows\">envoient des données "
-"personnelles sensibles à des tiers</a>, qui peuvent les utiliser à des fins
"
-"de publicité intrusive ou de discrimination contre les personnes qui ont des
"
-"problèmes médicaux."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-"Lorsque l'utilisateur doit donner son « consentement », ce dernier est "
-"enfoui dans des conditions d'utilisation à rallonge, presque "
-"incompréhensibles. De toute façon, « consentir » à l'espionnage ne le "
-"légitime pas."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -464,3 +455,27 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "A study of 24 “health” apps found that 19 of them <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
+#~ "your-data-everywhere-new-study-shows\"> send sensitive personal data to "
+#~ "third parties</a>, which can use it for invasive advertising or "
+#~ "discriminating against people in poor medical condition."
+#~ msgstr ""
+#~ "Une étude portant sur 24 applis « santé » a montré que 19 d'entre
elles "
+#~ "<a href=\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-"
+#~ "can-share-your-data-everywhere-new-study-shows\">envoient des données "
+#~ "personnelles sensibles à des tiers</a>, qui peuvent les utiliser à des "
+#~ "fins de publicité intrusive ou de discrimination contre les personnes qui
"
+#~ "ont des problèmes médicaux."
+
+#~ msgid ""
+#~ "Whenever user “consent” is sought, it is buried in lengthy "
+#~ "terms of service that are difficult to understand. In any case, “"
+#~ "consent” is not sufficient to legitimize snooping."
+#~ msgstr ""
+#~ "Lorsque l'utilisateur doit donner son « consentement », ce dernier est
"
+#~ "enfoui dans des conditions d'utilisation à rallonge, presque "
+#~ "incompréhensibles. De toute façon, « consentir » à l'espionnage ne
le "
+#~ "légitime pas."
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/proprietary.it-diff.html 9 Apr 2019 09:00:37 -0000
1.85
+++ proprietary/po/proprietary.it-diff.html 11 Apr 2019 07:00:33 -0000
1.86
@@ -184,6 +184,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201903280">
<p>Car companies are coming up with a list of clever reasons why
<a
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html">
@@ -222,18 +235,6 @@
turned off the server for old models</a>, so now if you try to
reinstall the default settings, it bricks them instead.</p>
</li>
-
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
-
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
- </li>
</ul></em></ins></span>
@@ -294,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary/po/proprietary.it.po 9 Apr 2019 09:00:37 -0000 1.124
+++ proprietary/po/proprietary.it.po 11 Apr 2019 07:00:33 -0000 1.125
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -478,22 +494,6 @@
"default settings, it bricks them instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- proprietary/po/proprietary.ja-diff.html 9 Apr 2019 09:00:37 -0000
1.86
+++ proprietary/po/proprietary.ja-diff.html 11 Apr 2019 07:00:33 -0000
1.87
@@ -181,6 +181,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201903280">
<p>Car companies are coming up with a list of clever reasons why
<a
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html">
@@ -219,18 +232,6 @@
turned off the server for old models</a>, so now if you try to
reinstall the default settings, it bricks them instead.</p>
</li>
-
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
-
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
- </li>
</ul></em></ins></span>
@@ -291,7 +292,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary/po/proprietary.ja.po 9 Apr 2019 09:00:37 -0000 1.107
+++ proprietary/po/proprietary.ja.po 11 Apr 2019 07:00:33 -0000 1.108
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -398,22 +414,6 @@
"default settings, it bricks them instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/po/proprietary.nl-diff.html 9 Apr 2019 09:00:37 -0000
1.85
+++ proprietary/po/proprietary.nl-diff.html 11 Apr 2019 07:00:33 -0000
1.86
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201903280">
<p>Car companies are coming up with a list of clever reasons why
<a
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html">
@@ -222,18 +235,6 @@
turned off the server for old models</a>, so now if you try to
reinstall the default settings, it bricks them instead.</p>
</li>
-
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
-
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
- </li>
</ul></em></ins></span>
@@ -294,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary/po/proprietary.nl.po 9 Apr 2019 09:00:37 -0000 1.96
+++ proprietary/po/proprietary.nl.po 11 Apr 2019 07:00:33 -0000 1.97
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -471,22 +487,6 @@
"default settings, it bricks them instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- proprietary/po/proprietary.pl-diff.html 9 Apr 2019 09:00:37 -0000
1.103
+++ proprietary/po/proprietary.pl-diff.html 11 Apr 2019 07:00:33 -0000
1.104
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 400
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>April, 2019, the pages in this directory list
around 400
+instances of malicious functionalities (with more than 400 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -127,16 +127,16 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -182,6 +182,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201903280">
<p>Car companies are coming up with a list of clever reasons why
<a
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html">
@@ -220,18 +233,6 @@
turned off the server for old models</a>, so now if you try to
reinstall the default settings, it bricks them instead.</p>
</li>
-
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
-
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
- </li>
</ul></em></ins></span>
@@ -292,7 +293,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary/po/proprietary.pl.po 9 Apr 2019 09:00:37 -0000 1.91
+++ proprietary/po/proprietary.pl.po 11 Apr 2019 07:00:33 -0000 1.92
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -553,22 +569,6 @@
"default settings, it bricks them instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- proprietary/po/proprietary.pot 9 Apr 2019 09:00:37 -0000 1.88
+++ proprietary/po/proprietary.pot 11 Apr 2019 07:00:33 -0000 1.89
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a "
+"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\">
"
+"two vulnerabilities that affect several models of implantable "
+"defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in "
+"2008. Apparently, nothing was done by the company to correct them. This "
+"means you can't rely on proprietary software developers to fix bugs in their "
+"products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a "
"href=\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html\">
"
"they “have to” put cameras and microphones in the car</a>."
@@ -286,22 +303,6 @@
"default settings, it bricks them instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a "
-"href=\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows\">
"
-"send sensitive personal data to third parties</a>, which can use it for "
-"invasive advertising or discriminating against people in poor medical "
-"condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, "
-"“consent” is not sufficient to legitimize snooping."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary/po/proprietary.pt-br.po 9 Apr 2019 09:00:37 -0000 1.130
+++ proprietary/po/proprietary.pt-br.po 11 Apr 2019 07:00:33 -0000 1.131
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2019-04-07 09:35-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -293,6 +293,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -345,30 +361,6 @@
"kill-fix\"> desligou o servidor para modelos antigos</a>, então, agora, se "
"você tentar reinstalar as configurações padrão, eles serão inutilizados."
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-"Um estudo de 24 aplicativos de âsaúdeâ descobriu que 19 deles <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> enviam dados pessoais confidenciais "
-"para terceiros</a>, que podem usá-los para publicidade invasiva ou "
-"discriminar pessoas em más condições de médicas."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-"Sempre que o âconsentimentoâ do usuário é solicitado, ele é soterrado
com "
-"longos termos de serviço que são difÃceis de entender. Em qualquer caso, "
-"âconsentirâ não é suficiente para legitimar a bisbilhotice."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -444,6 +436,28 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "A study of 24 “health” apps found that 19 of them <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
+#~ "your-data-everywhere-new-study-shows\"> send sensitive personal data to "
+#~ "third parties</a>, which can use it for invasive advertising or "
+#~ "discriminating against people in poor medical condition."
+#~ msgstr ""
+#~ "Um estudo de 24 aplicativos de âsaúdeâ descobriu que 19 deles <a
href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
+#~ "your-data-everywhere-new-study-shows\"> enviam dados pessoais "
+#~ "confidenciais para terceiros</a>, que podem usá-los para publicidade "
+#~ "invasiva ou discriminar pessoas em más condições de médicas."
+
+#~ msgid ""
+#~ "Whenever user “consent” is sought, it is buried in lengthy "
+#~ "terms of service that are difficult to understand. In any case, “"
+#~ "consent” is not sufficient to legitimize snooping."
+#~ msgstr ""
+#~ "Sempre que o âconsentimentoâ do usuário é solicitado, ele é
soterrado com "
+#~ "longos termos de serviço que são difÃceis de entender. Em qualquer
caso, "
+#~ "âconsentirâ não é suficiente para legitimar a bisbilhotice."
+
+#~ msgid ""
#~ "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
#~ "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
#~ "cameras inside cars</a> to monitor the driver for signs of impairment "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary/po/proprietary.ru.po 9 Apr 2019 09:30:43 -0000 1.207
+++ proprietary/po/proprietary.ru.po 11 Apr 2019 07:00:33 -0000 1.208
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -368,31 +385,6 @@
"пÑÑаеÑÑÑÑ Ð¿ÐµÑеÑÑÑановиÑÑ Ð¸ÑÑ
однÑе
наÑÑÑойки, Ñо вмеÑÑо ÑÑого планÑÐµÑ Ð²ÑÑ
Ð¾Ð´Ð¸Ñ "
"из ÑÑÑоÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-"ÐÑÑледование показало, ÑÑо 19 из 24
медиÑинÑкиÑ
пÑиложений <a href=\"https://"
-"motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-"
-"everywhere-new-study-shows\"> оÑÑÑлаÑÑ
конÑиденÑиалÑнÑе пеÑÑоналÑнÑе даннÑе "
-"ÑÑеÑÑим ÑÑоÑонам</a>, коÑоÑÑе могÑÑ
пÑименÑÑÑ Ð¸Ñ
Ð´Ð»Ñ Ð½Ð°Ð²ÑзÑивой ÑÐµÐºÐ»Ð°Ð¼Ñ Ð¸Ð»Ð¸ "
-"диÑкÑиминаÑии лÑдей Ñ Ð¿Ð»Ð¾Ñ
им ÑоÑÑоÑнием
здоÑовÑÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-"ÐÑÑкий Ñаз, когда пÑогÑамма запÑаÑиваеÑ
“ÑазÑеÑениє "
-"полÑзоваÑелÑ, оно заÑÑÑо в ÑÑловиÑÑ
полÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ ÑлÑжбой, коÑоÑÑе нелегко "
-"понÑÑÑ. РлÑбом ÑлÑÑае, “ÑоглаÑиє
недоÑÑаÑоÑно, ÑÑÐ¾Ð±Ñ Ð¾Ð¿ÑавдаÑÑ "
-"ÑлежкÑ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -472,6 +464,29 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "A study of 24 “health” apps found that 19 of them <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
+#~ "your-data-everywhere-new-study-shows\"> send sensitive personal data to "
+#~ "third parties</a>, which can use it for invasive advertising or "
+#~ "discriminating against people in poor medical condition."
+#~ msgstr ""
+#~ "ÐÑÑледование показало, ÑÑо 19 из 24
медиÑинÑкиÑ
пÑиложений <a href="
+#~ "\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
+#~ "your-data-everywhere-new-study-shows\"> оÑÑÑлаÑÑ
конÑиденÑиалÑнÑе "
+#~ "пеÑÑоналÑнÑе даннÑе ÑÑеÑÑим ÑÑоÑонам</a>,
коÑоÑÑе могÑÑ Ð¿ÑименÑÑÑ Ð¸Ñ
Ð´Ð»Ñ "
+#~ "навÑзÑивой ÑÐµÐºÐ»Ð°Ð¼Ñ Ð¸Ð»Ð¸ диÑкÑиминаÑии
лÑдей Ñ Ð¿Ð»Ð¾Ñ
им ÑоÑÑоÑнием здоÑовÑÑ."
+
+#~ msgid ""
+#~ "Whenever user “consent” is sought, it is buried in lengthy "
+#~ "terms of service that are difficult to understand. In any case, “"
+#~ "consent” is not sufficient to legitimize snooping."
+#~ msgstr ""
+#~ "ÐÑÑкий Ñаз, когда пÑогÑамма запÑаÑиваеÑ
“ÑазÑеÑениє "
+#~ "полÑзоваÑелÑ, оно заÑÑÑо в ÑÑловиÑÑ
полÑÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ ÑлÑжбой, коÑоÑÑе нелегко "
+#~ "понÑÑÑ. РлÑбом ÑлÑÑае, “ÑоглаÑиє
недоÑÑаÑоÑно, ÑÑÐ¾Ð±Ñ "
+#~ "опÑавдаÑÑ ÑлежкÑ."
+
+#~ msgid ""
#~ "Volvo plans to <a href=\"https://www.theguardian.com/business/2019/mar/20/"
#~ "volvo-to-install-cameras-in-new-cars-to-reduce-road-deaths\"> install "
#~ "cameras inside cars</a> to monitor the driver for signs of impairment "
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary.zh-tw-diff.html 9 Apr 2019 09:00:37 -0000
1.63
+++ proprietary/po/proprietary.zh-tw-diff.html 11 Apr 2019 07:00:33 -0000
1.64
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -126,9 +126,9 @@
<td></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
-<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201903280">
<p>Car companies are coming up with a list of clever reasons why
<a
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html">
@@ -223,18 +236,6 @@
turned off the server for old models</a>, so now if you try to
reinstall the default settings, it bricks them instead.</p>
</li>
-
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them
<a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
-
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
- </li>
</ul></em></ins></span>
@@ -295,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 09:00:37 $
+$Date: 2019/04/11 07:00:33 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary/po/proprietary.zh-tw.po 9 Apr 2019 09:00:37 -0000 1.74
+++ proprietary/po/proprietary.zh-tw.po 11 Apr 2019 07:00:33 -0000 1.75
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-09 08:56+0000\n"
+"POT-Creation-Date: 2019-04-11 06:56+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Car companies are coming up with a list of clever reasons why <a href="
"\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
"privacy.html\"> they “have to” put cameras and microphones in "
@@ -387,22 +403,6 @@
"default settings, it bricks them instead."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"A study of 24 “health” apps found that 19 of them <a href="
-"\"https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-"
-"your-data-everywhere-new-study-shows\"> send sensitive personal data to "
-"third parties</a>, which can use it for invasive advertising or "
-"discriminating against people in poor medical condition."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Whenever user “consent” is sought, it is buried in lengthy terms "
-"of service that are difficult to understand. In any case, “"
-"consent” is not sufficient to legitimize snooping."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- proprietary/po/pt-br.po 11 Apr 2019 02:59:08 -0000 1.82
+++ proprietary/po/pt-br.po 11 Apr 2019 07:00:33 -0000 1.83
@@ -1306,6 +1306,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary/po/ru.po 11 Apr 2019 02:59:08 -0000 1.140
+++ proprietary/po/ru.po 11 Apr 2019 07:00:33 -0000 1.141
@@ -1740,6 +1740,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary/po/zh-tw.po 11 Apr 2019 02:59:08 -0000 1.62
+++ proprietary/po/zh-tw.po 11 Apr 2019 07:00:33 -0000 1.63
@@ -1285,6 +1285,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+"hacking/507470932/\"> two vulnerabilities that affect several models of "
+"implantable defibrillators</a> and the devices they connect to."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"This protocol has been around since 2006, and similar vulnerabilities were "
+"discovered in an earlier Medtronics communication protocol in 2008. "
+"Apparently, nothing was done by the company to correct them. This means you "
+"can't rely on proprietary software developers to fix bugs in their products."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The HP <a href=\"https://boingboing.net/2019/02/08/inkjet-dystopias.html\"> "
"“ink subscription” cartridges have DRM that constantly "
"communicates with HP servers</a> to make sure the user is still paying for "
Index: server/home-pkgblurbs.af.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.af.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.af.html 10 Dec 2018 11:59:53 -0000 1.73
+++ server/home-pkgblurbs.af.html 11 Apr 2019 07:00:34 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.ar.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ar.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ar.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.ar.html 11 Apr 2019 07:00:34 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.bg.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.bg.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.bg.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.bg.html 11 Apr 2019 07:00:34 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.ca.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ca.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ca.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.ca.html 11 Apr 2019 07:00:34 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.cs.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.cs.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.cs.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.cs.html 11 Apr 2019 07:00:34 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.da.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.da.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- server/home-pkgblurbs.da.html 10 Dec 2018 11:59:54 -0000 1.46
+++ server/home-pkgblurbs.da.html 11 Apr 2019 07:00:34 -0000 1.47
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.de.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.de.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- server/home-pkgblurbs.de.html 30 Jan 2019 12:29:02 -0000 1.146
+++ server/home-pkgblurbs.de.html 11 Apr 2019 07:00:34 -0000 1.147
@@ -1,6 +1,6 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf">
<!-- TRANSLATORS: stale -->
@@ -2460,6 +2460,16 @@
Matrizen. <small>(<a href="/manual/#jacal">Handbuch</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data. <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-Getopt</a></h4><p>
@@ -3522,17 +3532,6 @@
href="/manual/#remotecontrol">Handbuch</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-<b>GNU Ring</b> ist ein Programm für die universelle Kommunikation, das die
-Freiheiten und die Privatsphäre der Nutzer respektiert. Ring verwendet
-verteilte Hash-Tabellen für den Aufbau der Kommunikation. Dies vermeidet die
-Aufbewahrung zentraler Register von Nutzern und die Speicherung
-personenbezogener Daten. <small>(<a
-href="/manual/#ring">Handbuch</a>)</small></p>
-
-<!--#endif -->
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rot[t]log</a></h4><p>
@@ -4233,4 +4232,4 @@
Funktionsumfang. <small>(<a href="/manual/#zile">Handbuch</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.el.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.el.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.el.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.el.html 11 Apr 2019 07:00:35 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.es.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.es.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.es.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.es.html 11 Apr 2019 07:00:35 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.fa.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.fa.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.fa.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.fa.html 11 Apr 2019 07:00:35 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.fr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.fr.html,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- server/home-pkgblurbs.fr.html 10 Dec 2018 11:59:54 -0000 1.135
+++ server/home-pkgblurbs.fr.html 11 Apr 2019 07:00:35 -0000 1.136
@@ -1,6 +1,6 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf">
<!-- TRANSLATORS: stale -->
@@ -2492,6 +2492,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data. <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3575,16 +3585,6 @@
href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring est un logiciel de communication universelle qui respecte les libertés
-et la vie privée de ses utilisateurs. Il utilise des tables de hachage
-distribuées pour établir la communication. Cela évite les registres
-centralisés d'utilisateurs et le stockage des données
-personnelles. <small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-
-<!--#endif -->
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -4292,4 +4292,4 @@
href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.he.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.he.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.he.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.he.html 11 Apr 2019 07:00:36 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.hr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.hr.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.hr.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.hr.html 11 Apr 2019 07:00:36 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.id.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.id.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.id.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.id.html 11 Apr 2019 07:00:36 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.it.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.it.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.it.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.it.html 11 Apr 2019 07:00:36 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.ja.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ja.html,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- server/home-pkgblurbs.ja.html 10 Dec 2018 11:59:54 -0000 1.144
+++ server/home-pkgblurbs.ja.html 11 Apr 2019 07:00:36 -0000 1.145
@@ -1,6 +1,6 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf">
<!-- TRANSLATORS: stale -->
@@ -1854,6 +1854,16 @@
href="/manual/manual.html#jacal">ããã¥ã¡ã³ã</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data. <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -2681,13 +2691,6 @@
href="/manual/manual.html#remotecontrol">ããã¥ã¡ã³ã</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ringã¯ã¦ã¼ã¶ã®èªç±ã¨ãã©ã¤ãã·ãå°éããæ®éçãªéä¿¡ã®ããã°ã©ã
ã§ããRingã¯éä¿¡ã確ç«ããããã«åæ£ããã·ã¥ãã¼ãã«ãç¨ãã¾ããããã§ãä¸å¿çãªã¦ã¼ã¶ã®ã¬ã¸ã¹ããªãä¿æããå人ãã¼ã¿ãä¿ç®¡ãããã¨ãé¿ãã¾ãã<small>(<a
-href="/manual/manual.html#ring">ããã¥ã¡ã³ã</a>)</small></p>
-
-<!--#endif -->
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3231,4 +3234,4 @@
href="/manual/manual.html#zile">ããã¥ã¡ã³ã</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.ko.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ko.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ko.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.ko.html 11 Apr 2019 07:00:37 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.lt.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.lt.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- server/home-pkgblurbs.lt.html 10 Dec 2018 11:59:54 -0000 1.52
+++ server/home-pkgblurbs.lt.html 11 Apr 2019 07:00:37 -0000 1.53
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.ml.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ml.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ml.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.ml.html 11 Apr 2019 07:00:37 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.nb.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.nb.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.nb.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.nb.html 11 Apr 2019 07:00:37 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.nl.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.nl.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.nl.html 10 Dec 2018 11:59:54 -0000 1.73
+++ server/home-pkgblurbs.nl.html 11 Apr 2019 07:00:37 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.pl.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.pl.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.pl.html 10 Dec 2018 11:59:55 -0000 1.73
+++ server/home-pkgblurbs.pl.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.pt-br.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.pt-br.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- server/home-pkgblurbs.pt-br.html 26 Dec 2018 10:03:27 -0000 1.79
+++ server/home-pkgblurbs.pt-br.html 11 Apr 2019 07:00:38 -0000 1.80
@@ -1,6 +1,6 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf">
<!-- TRANSLATORS: stale -->
@@ -2366,6 +2366,16 @@
href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data. <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3406,16 +3416,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring é um programa de comunicação universal que respeita as liberdades e a
-privacidade de seus usuários. Ring usa tabelas de hash distribuÃdas para
-estabelecer comunicação. Isso evita manter registros centralizados de
-usuários e armazenar dados pessoais. <small>(<a
-href="/manual/manual.html#ring">doc</a>)</small></p>
-
-<!--#endif -->
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -4092,4 +4092,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.ro.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ro.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ro.html 10 Dec 2018 11:59:55 -0000 1.73
+++ server/home-pkgblurbs.ro.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.ru.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ru.html,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- server/home-pkgblurbs.ru.html 29 Jan 2019 09:01:20 -0000 1.149
+++ server/home-pkgblurbs.ru.html 11 Apr 2019 07:00:38 -0000 1.150
@@ -1,6 +1,6 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf">
<!-- TRANSLATORS: stale -->
@@ -2378,6 +2378,16 @@
href="/manual/manual.html#jacal">док</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data. <small>(<a
+href="/manual/manual.html#jami">doc</a>)</small></p>
+
+<!--#endif -->
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3411,16 +3421,6 @@
href="/manual/manual.html#remotecontrol">док</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring — ÑнивеÑÑалÑÐ½Ð°Ñ Ð¿ÑогÑамма длÑ
ÑвÑзи, ÑважаÑÑÐ°Ñ ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¸
-непÑикоÑновенноÑÑÑ Ð»Ð¸Ñной жизни
полÑзоваÑелей. Ring ÑÑÑÐ°Ð½Ð°Ð²Ð»Ð¸Ð²Ð°ÐµÑ ÑвÑÐ·Ñ Ñ
-помоÑÑÑ ÑаÑпÑеделеннÑÑ
ÑÐ°Ð±Ð»Ð¸Ñ Ñ
еÑей. ÐÑо
позволÑÐµÑ Ð¸Ð·Ð±ÐµÐ¶Ð°ÑÑ ÑенÑÑализованной
-ÑегиÑÑÑаÑии полÑзоваÑелей и Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¸Ñ
пеÑÑоналÑнÑÑ
даннÑÑ
. <small>(<a
-href="/manual/manual.html#ring">док</a>)</small></p>
-
-<!--#endif -->
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -4110,4 +4110,4 @@
менÑÑе ÑÑнкÑий. <small>(<a
href="/manual/manual.html#zile">док</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.sk.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.sk.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.sk.html 10 Dec 2018 11:59:55 -0000 1.73
+++ server/home-pkgblurbs.sk.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.sq.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.sq.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.sq.html 10 Dec 2018 11:59:56 -0000 1.73
+++ server/home-pkgblurbs.sq.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.sr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.sr.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.sr.html 10 Dec 2018 11:59:56 -0000 1.73
+++ server/home-pkgblurbs.sr.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.sv.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.sv.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.sv.html 10 Dec 2018 11:59:56 -0000 1.73
+++ server/home-pkgblurbs.sv.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.ta.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.ta.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.ta.html 10 Dec 2018 11:59:56 -0000 1.73
+++ server/home-pkgblurbs.ta.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.te.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.te.html,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -b -r1.4 -r1.5
--- server/home-pkgblurbs.te.html 10 Dec 2018 11:59:56 -0000 1.4
+++ server/home-pkgblurbs.te.html 11 Apr 2019 07:00:38 -0000 1.5
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.tr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.tr.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.tr.html 10 Dec 2018 11:59:56 -0000 1.73
+++ server/home-pkgblurbs.tr.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.uk.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.uk.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.uk.html 10 Dec 2018 11:59:56 -0000 1.73
+++ server/home-pkgblurbs.uk.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.zh-cn.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.zh-cn.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.zh-cn.html 10 Dec 2018 11:59:56 -0000 1.73
+++ server/home-pkgblurbs.zh-cn.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/home-pkgblurbs.zh-tw.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.zh-tw.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- server/home-pkgblurbs.zh-tw.html 10 Dec 2018 11:59:56 -0000 1.73
+++ server/home-pkgblurbs.zh-tw.html 11 Apr 2019 07:00:38 -0000 1.74
@@ -1,4 +1,4 @@
-<!-- File generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- File generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
<!--#if expr="$pkg_selection = /:(3dldf|ALL):/" -->
<h4 id="pkg_3dldf"><!-- TRANSLATORS: stale -->
@@ -2228,6 +2228,16 @@
<small>(<a href="/manual/manual.html#jacal">doc</a>)</small></p>
<!--#endif -->
+<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
+<h4 id="jami">
+ <a href="/software/jami/">Jami</a></h4><p>
+Jami is a program for universal communication which respects freedoms and
+privacy of its users. Jami uses distributed hash tables for establishing
+communication. This avoids keeping centralized registries of users and
+storing personal data.
+<small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
+<!--#endif -->
+
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
<h4 id="java-getopt">
<a href="/software/java-getopt/">Java-getopt</a></h4><p>
@@ -3201,16 +3211,6 @@
<small>(<a href="/manual/manual.html#remotecontrol">doc</a>)</small></p>
<!--#endif -->
-<!--#if expr="$pkg_selection = /:(ring|ALL):/" -->
-<h4 id="ring">
- <a href="/software/ring/">Ring</a></h4><p>
-Ring is a program for universal communication which respects freedoms and
-privacy of its users. Ring uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data.
-<small>(<a href="/manual/manual.html#ring">doc</a>)</small></p>
-<!--#endif -->
-
<!--#if expr="$pkg_selection = /:(rottlog|ALL):/" -->
<h4 id="rottlog">
<a href="/software/rottlog/">Rottlog</a></h4><p>
@@ -3857,4 +3857,4 @@
<small>(<a href="/manual/manual.html#zile">doc</a>)</small></p>
<!--#endif -->
-<!-- End file generated by womb/gnumaint/gm lundi 10 décembre 2018, 12:22:10
(UTC+0100) -->
+<!-- End file generated by womb/gnumaint/gm vendredi 22 mars 2019, 23:12:31
(UTC+0100) -->
Index: server/po/home-pkgblurbs.de.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.de.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- server/po/home-pkgblurbs.de.po 30 Jan 2019 12:29:03 -0000 1.207
+++ server/po/home-pkgblurbs.de.po 11 Apr 2019 07:00:38 -0000 1.208
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: home-pkgblurbs.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2018-12-10 11:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: 2018-11-10 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
#. type: Attribute 'alt' of: <h4><img>
msgid "logo for 3dldf"
@@ -4133,6 +4134,42 @@
"Matrizen. <small>(<a href=\"/manual/#jacal\">Handbuch</a>)</small>"
#. type: Content of: <h4>
+# | <a [-href=\"/software/gama/\">Gama</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+# | [-Ring-]{+Jami+} is a program for universal communication which respects
+# | freedoms and privacy of its users. [-Ring-] {+Jami+} uses distributed hash
+# | tables for establishing communication. This avoids keeping centralized
+# | registries of users and storing personal data. <small>(<a
+# | [-href=\"/manual/manual.html#ring\">doc</a>)</small>-]
+# | {+href=\"/manual/manual.html#jami\">doc</a>)</small>+}
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data. <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"<b>GNU Ring</b> ist ein Programm für die universelle Kommunikation, das die "
+"Freiheiten und die Privatsphäre der Nutzer respektiert. Ring verwendet "
+"verteilte Hash-Tabellen für den Aufbau der Kommunikation. Dies vermeidet die
"
+"Aufbewahrung zentraler Register von Nutzern und die Speicherung "
+"personenbezogener Daten. <small>(<a href=\"/manual/#ring\">Handbuch</a>)</"
+"small>"
+
+#. type: Content of: <h4>
msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
msgstr "<a href=\"/software/java-getopt/\">Java-Getopt</a>"
@@ -5924,25 +5961,6 @@
"a>)</small>"
#. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"<b>GNU Ring</b> ist ein Programm für die universelle Kommunikation, das die "
-"Freiheiten und die Privatsphäre der Nutzer respektiert. Ring verwendet "
-"verteilte Hash-Tabellen für den Aufbau der Kommunikation. Dies vermeidet die
"
-"Aufbewahrung zentraler Register von Nutzern und die Speicherung "
-"personenbezogener Daten. <small>(<a href=\"/manual/#ring\">Handbuch</a>)</"
-"small>"
-
-#. type: Content of: <h4>
msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
msgstr "<a href=\"/software/rottlog/\">Rot[t]log</a>"
@@ -7119,6 +7137,9 @@
"ähnlich der Standard-Emacs-Konfiguration, hat aber ein viel einfacheren "
"Funktionsumfang. <small>(<a href=\"/manual/#zile\">Handbuch</a>)</small>"
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"
+
#~ msgid ""
#~ "GNU gleem is a library for Java and C++ offering a set of 3D widgets that "
#~ "support direct user interaction with a 3D scene. These widgets are used "
Index: server/po/home-pkgblurbs.fr.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.fr.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- server/po/home-pkgblurbs.fr.po 12 Nov 2018 08:46:32 -0000 1.160
+++ server/po/home-pkgblurbs.fr.po 11 Apr 2019 07:00:38 -0000 1.161
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-11-11 17:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: 2018-11-12 09:43+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -4165,6 +4166,41 @@
"(<a href=\"/manual/manual.html#jacal\">doc</a>)</small>"
#. type: Content of: <h4>
+# | <a [-href=\"/software/gama/\">Gama</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+# | [-Ring-]{+Jami+} is a program for universal communication which respects
+# | freedoms and privacy of its users. [-Ring-] {+Jami+} uses distributed hash
+# | tables for establishing communication. This avoids keeping centralized
+# | registries of users and storing personal data. <small>(<a
+# | [-href=\"/manual/manual.html#ring\">doc</a>)</small>-]
+# | {+href=\"/manual/manual.html#jami\">doc</a>)</small>+}
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data. <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"Ring est un logiciel de communication universelle qui respecte les libertés "
+"et la vie privée de ses utilisateurs. Il utilise des tables de hachage "
+"distribuées pour établir la communication. Cela évite les registres "
+"centralisés d'utilisateurs et le stockage des données personnelles. <small>"
+"(<a href=\"/manual/manual.html#ring\">doc</a>)</small>"
+
+#. type: Content of: <h4>
msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
msgstr "<a href=\"/software/java-getopt/\">Java-getopt</a>"
@@ -5976,24 +6012,6 @@
"\">doc</a>)</small>"
#. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"Ring est un logiciel de communication universelle qui respecte les libertés "
-"et la vie privée de ses utilisateurs. Il utilise des tables de hachage "
-"distribuées pour établir la communication. Cela évite les registres "
-"centralisés d'utilisateurs et le stockage des données personnelles. <small>"
-"(<a href=\"/manual/manual.html#ring\">doc</a>)</small>"
-
-#. type: Content of: <h4>
msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
msgstr "<a href=\"/software/rottlog/\">Rottlog</a>"
@@ -7176,3 +7194,6 @@
"GNU Zile est un clone léger d'Emacs. Il s'utilise comme la configuration par
"
"défaut d'Emacs mais possède un moindre choix de fonctionnalités.
<small>(<a "
"href=\"/manual/manual.html#zile\">doc</a>)</small>"
+
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"
Index: server/po/home-pkgblurbs.ja.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.ja.po,v
retrieving revision 1.200
retrieving revision 1.201
diff -u -b -r1.200 -r1.201
--- server/po/home-pkgblurbs.ja.po 11 Nov 2018 18:00:25 -0000 1.200
+++ server/po/home-pkgblurbs.ja.po 11 Apr 2019 07:00:38 -0000 1.201
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-11-11 17:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: 2016-11-18 11:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3891,6 +3891,32 @@
"manual/manual.html#jacal\">ããã¥ã¡ã³ã</a>)</small>"
#. type: Content of: <h4>
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data. <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"Ringã¯ã¦ã¼ã¶ã®èªç±ã¨ãã©ã¤ãã·ãå°éããæ®éçãªéä¿¡ã®ããã°ã©ã
ã§ããRingã¯"
+"éä¿¡ã確ç«ããããã«åæ£ããã·ã¥ãã¼ãã«ãç¨ãã¾ããããã§ãä¸å¿çãªã¦ã¼ã¶ã®"
+"ã¬ã¸ã¹ããªãä¿æããå人ãã¼ã¿ãä¿ç®¡ãããã¨ãé¿ãã¾ãã<small>(<a
href=\"/"
+"manual/manual.html#ring\">ããã¥ã¡ã³ã</a>)</small>"
+
+#. type: Content of: <h4>
msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
msgstr "<a href=\"/software/java-getopt/\">Java-getopt</a>"
@@ -5590,23 +5616,6 @@
"ã</a>)</small>"
#. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"Ringã¯ã¦ã¼ã¶ã®èªç±ã¨ãã©ã¤ãã·ãå°éããæ®éçãªéä¿¡ã®ããã°ã©ã
ã§ããRingã¯"
-"éä¿¡ã確ç«ããããã«åæ£ããã·ã¥ãã¼ãã«ãç¨ãã¾ããããã§ãä¸å¿çãªã¦ã¼ã¶ã®"
-"ã¬ã¸ã¹ããªãä¿æããå人ãã¼ã¿ãä¿ç®¡ãããã¨ãé¿ãã¾ãã<small>(<a
href=\"/"
-"manual/manual.html#ring\">ããã¥ã¡ã³ã</a>)</small>"
-
-#. type: Content of: <h4>
msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
msgstr "<a href=\"/software/rottlog/\">Rottlog</a>"
@@ -6721,6 +6730,9 @@
"ã¨åæ§ã®ä½¿ãæ¹ãã§ãã¾ããæ©è½ã¯ã
ãã¶è»½ããã®ã§ãã<small>(<a href=\"/"
"manual/manual.html#zile\">ããã¥ã¡ã³ã</a>)</small>"
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"
+
#~ msgid ""
#~ "See <a href=\"#sipwitch\">sipwitch</a>. <small>(<a href=\"/manual/manual."
#~ "html#gnucomm\">doc</a>)</small>"
Index: server/po/home-pkgblurbs.pot.opt
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.pot.opt,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- server/po/home-pkgblurbs.pot.opt 10 Dec 2018 11:59:56 -0000 1.64
+++ server/po/home-pkgblurbs.pot.opt 11 Apr 2019 07:00:38 -0000 1.65
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-12-10 11:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Attribute 'alt' of: <h4><img>
@@ -2944,6 +2944,19 @@
msgstr ""
#. type: Content of: <h4>
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr ""
+
+#. type: Content of: <p>
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data. <small>(<a "
+"href=\"/manual/manual.html#jami\">doc</a>)</small>"
+msgstr ""
+
+#. type: Content of: <h4>
msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
msgstr ""
@@ -4230,19 +4243,6 @@
msgstr ""
#. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr ""
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data. <small>(<a "
-"href=\"/manual/manual.html#ring\">doc</a>)</small>"
-msgstr ""
-
-#. type: Content of: <h4>
msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
msgstr ""
Index: server/po/home-pkgblurbs.pt-br.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.pt-br.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- server/po/home-pkgblurbs.pt-br.po 26 Dec 2018 10:03:28 -0000 1.15
+++ server/po/home-pkgblurbs.pt-br.po 11 Apr 2019 07:00:38 -0000 1.16
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-12-10 11:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: 2018-12-13 07:23-0200\n"
"Last-Translator: André N Batista <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -4032,6 +4033,33 @@
"html#jacal\">doc</a>)</small>"
#. type: Content of: <h4>
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data. <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"Ring é um programa de comunicação universal que respeita as liberdades e a
"
+"privacidade de seus usuários. Ring usa tabelas de hash distribuÃdas para "
+"estabelecer comunicação. Isso evita manter registros centralizados de "
+"usuários e armazenar dados pessoais. <small>(<a href=\"/manual/manual."
+"html#ring\">doc</a>)</small>"
+
+#. type: Content of: <h4>
msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
msgstr "<a href=\"/software/java-getopt/\">Java-getopt</a>"
@@ -5798,24 +5826,6 @@
"<small>(<a href=\"/manual/manual.html#remotecontrol\">doc</a>)</small>"
#. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"Ring é um programa de comunicação universal que respeita as liberdades e a
"
-"privacidade de seus usuários. Ring usa tabelas de hash distribuÃdas para "
-"estabelecer comunicação. Isso evita manter registros centralizados de "
-"usuários e armazenar dados pessoais. <small>(<a href=\"/manual/manual."
-"html#ring\">doc</a>)</small>"
-
-#. type: Content of: <h4>
msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
msgstr "<a href=\"/software/rottlog/\">Rottlog</a>"
@@ -6968,6 +6978,9 @@
"padrão do Emacs, mas carrega um conjunto de recursos muito mais leve. "
"<small>(<a href=\"/manual/manual.html#zile\">doc</a>)</small>"
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"
+
#~ msgid ""
#~ "See <a href=\"#sipwitch\">sipwitch</a>. <small>(<a href=\"/manual/manual."
#~ "html#gnucomm\">doc</a>)</small>"
Index: server/po/home-pkgblurbs.ru.po
===================================================================
RCS file: /web/www/www/server/po/home-pkgblurbs.ru.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- server/po/home-pkgblurbs.ru.po 29 Jan 2019 09:01:20 -0000 1.207
+++ server/po/home-pkgblurbs.ru.po 11 Apr 2019 07:00:38 -0000 1.208
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: home-pkgblurbs.html\n"
-"POT-Creation-Date: 2018-12-10 11:58+0000\n"
+"POT-Creation-Date: 2019-04-11 06:57+0000\n"
"PO-Revision-Date: 2019-01-29 17:34+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-11 06:57+0000\n"
#. type: Attribute 'alt' of: <h4><img>
msgid "logo for 3dldf"
@@ -4038,6 +4039,41 @@
"manual.html#jacal\">док</a>)</small>"
#. type: Content of: <h4>
+# | <a [-href=\"/software/gama/\">Gama</a>-]
+# | {+href=\"/software/jami/\">Jami</a>+}
+#, fuzzy
+#| msgid "<a href=\"/software/gama/\">Gama</a>"
+msgid "<a href=\"/software/jami/\">Jami</a>"
+msgstr "<a href=\"/software/gama/\">Gama</a>"
+
+#. type: Content of: <p>
+# | [-Ring-]{+Jami+} is a program for universal communication which respects
+# | freedoms and privacy of its users. [-Ring-] {+Jami+} uses distributed hash
+# | tables for establishing communication. This avoids keeping centralized
+# | registries of users and storing personal data. <small>(<a
+# | [-href=\"/manual/manual.html#ring\">doc</a>)</small>-]
+# | {+href=\"/manual/manual.html#jami\">doc</a>)</small>+}
+#, fuzzy
+#| msgid ""
+#| "Ring is a program for universal communication which respects freedoms and "
+#| "privacy of its users. Ring uses distributed hash tables for establishing "
+#| "communication. This avoids keeping centralized registries of users and "
+#| "storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</"
+#| "a>)</small>"
+msgid ""
+"Jami is a program for universal communication which respects freedoms and "
+"privacy of its users. Jami uses distributed hash tables for establishing "
+"communication. This avoids keeping centralized registries of users and "
+"storing personal data. <small>(<a href=\"/manual/manual.html#jami\">doc</a>)"
+"</small>"
+msgstr ""
+"Ring — ÑнивеÑÑалÑÐ½Ð°Ñ Ð¿ÑогÑамма длÑ
ÑвÑзи, ÑважаÑÑÐ°Ñ ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¸ "
+"непÑикоÑновенноÑÑÑ Ð»Ð¸Ñной жизни
полÑзоваÑелей. Ring ÑÑÑÐ°Ð½Ð°Ð²Ð»Ð¸Ð²Ð°ÐµÑ ÑвÑÐ·Ñ Ñ "
+"помоÑÑÑ ÑаÑпÑеделеннÑÑ
ÑÐ°Ð±Ð»Ð¸Ñ Ñ
еÑей. ÐÑо
позволÑÐµÑ Ð¸Ð·Ð±ÐµÐ¶Ð°ÑÑ ÑенÑÑализованной "
+"ÑегиÑÑÑаÑии полÑзоваÑелей и Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¸Ñ
пеÑÑоналÑнÑÑ
даннÑÑ
. <small>(<a href="
+"\"/manual/manual.html#ring\">док</a>)</small>"
+
+#. type: Content of: <h4>
msgid "<a href=\"/software/java-getopt/\">Java-getopt</a>"
msgstr "<a href=\"/software/java-getopt/\">Java-getopt</a>"
@@ -5792,24 +5828,6 @@
"\">док</a>)</small>"
#. type: Content of: <h4>
-msgid "<a href=\"/software/ring/\">Ring</a>"
-msgstr "<a href=\"/software/ring/\">Ring</a>"
-
-#. type: Content of: <p>
-msgid ""
-"Ring is a program for universal communication which respects freedoms and "
-"privacy of its users. Ring uses distributed hash tables for establishing "
-"communication. This avoids keeping centralized registries of users and "
-"storing personal data. <small>(<a href=\"/manual/manual.html#ring\">doc</a>)"
-"</small>"
-msgstr ""
-"Ring — ÑнивеÑÑалÑÐ½Ð°Ñ Ð¿ÑогÑамма длÑ
ÑвÑзи, ÑважаÑÑÐ°Ñ ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¸ "
-"непÑикоÑновенноÑÑÑ Ð»Ð¸Ñной жизни
полÑзоваÑелей. Ring ÑÑÑÐ°Ð½Ð°Ð²Ð»Ð¸Ð²Ð°ÐµÑ ÑвÑÐ·Ñ Ñ "
-"помоÑÑÑ ÑаÑпÑеделеннÑÑ
ÑÐ°Ð±Ð»Ð¸Ñ Ñ
еÑей. ÐÑо
позволÑÐµÑ Ð¸Ð·Ð±ÐµÐ¶Ð°ÑÑ ÑенÑÑализованной "
-"ÑегиÑÑÑаÑии полÑзоваÑелей и Ñ
ÑÐ°Ð½ÐµÐ½Ð¸Ñ Ð¸Ñ
пеÑÑоналÑнÑÑ
даннÑÑ
. <small>(<a href="
-"\"/manual/manual.html#ring\">док</a>)</small>"
-
-#. type: Content of: <h4>
msgid "<a href=\"/software/rottlog/\">Rottlog</a>"
msgstr "<a href=\"/software/rottlog/\">Rottlog</a>"
@@ -6973,6 +6991,9 @@
"полÑзÑÑÑÑÑ Ð¿ÑимеÑно как Emacs в иÑÑ
одной
конÑигÑÑаÑии, но в Zile гоÑаздо "
"менÑÑе ÑÑнкÑий. <small>(<a
href=\"/manual/manual.html#zile\">док</a>)</small>"
+#~ msgid "<a href=\"/software/ring/\">Ring</a>"
+#~ msgstr "<a href=\"/software/ring/\">Ring</a>"
+
#~ msgid ""
#~ "GNU gleem is a library for Java and C++ offering a set of 3D widgets that "
#~ "support direct user interaction with a 3D scene. These widgets are used "
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www manual/allgnupkgs.af.html manual/allgnupkgs...,
GNUN <=