[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www home.fr.html manual/allgnupkgs.fr.html po/h...
From: |
GNUN |
Subject: |
www home.fr.html manual/allgnupkgs.fr.html po/h... |
Date: |
Thu, 11 Apr 2019 04:30:18 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/04/11 04:30:18
Modified files:
. : home.fr.html
manual : allgnupkgs.fr.html
po : home.fr-en.html home.fr.po
proprietary : malware-appliances.fr.html
proprietary-addictions.fr.html
proprietary-insecurity.fr.html
proprietary.fr.html
proprietary/po : malware-appliances.fr-en.html
proprietary-addictions.fr-en.html
proprietary-insecurity.fr-en.html
proprietary.fr-en.html
server : home-pkgblurbs.fr.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/home.fr.html?cvsroot=www&r1=1.385&r2=1.386
http://web.cvs.savannah.gnu.org/viewcvs/www/manual/allgnupkgs.fr.html?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.fr-en.html?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/po/home.fr.po?cvsroot=www&r1=1.496&r2=1.497
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-appliances.fr.html?cvsroot=www&r1=1.67&r2=1.68
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-addictions.fr.html?cvsroot=www&r1=1.8&r2=1.9
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.fr.html?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.fr.html?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr-en.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-addictions.fr-en.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr-en.html?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr-en.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/server/home-pkgblurbs.fr.html?cvsroot=www&r1=1.136&r2=1.137
Patches:
Index: home.fr.html
===================================================================
RCS file: /web/www/www/home.fr.html,v
retrieving revision 1.385
retrieving revision 1.386
diff -u -b -r1.385 -r1.386
--- home.fr.html 10 Apr 2019 02:01:13 -0000 1.385
+++ home.fr.html 11 Apr 2019 08:30:16 -0000 1.386
@@ -303,16 +303,16 @@
des <a href="/philosophy/free-sw.html">quatre libertés essentielles</a> :</p>
<ul>
-<li>la liberté d'exécuter le programme comme il le souhaite, pour n'importe
quel
-usage (liberté 0) ;</li>
-<li>The freedom to study how the program works, and change it so it does your
-computing as you wish (freedom 1). Access to the source code is a
-precondition for this.</li>
-<li>The freedom to redistribute copies so you can help others (freedom 2).</li>
-<li>The freedom to distribute copies of your modified versions to others
-(freedom 3). By doing this you can give the whole community a chance to
-benefit from your changes. Access to the source code is a precondition for
-this.</li>
+<li>la liberté de aire fonctionner le programme comme il le souhaite, pour
+n'importe quel usage (liberté 0) ;</li>
+<li>la liberté d'étudier le fonctionnement du programme et de le modifier
pour
+qu'il fasse les opérations informatiques que vous souhaitez (liberté 1) ;
+une condition préalable est d'accéder au code source ;</li>
+<li>la liberté d'en redistribuer des copies pour aider les autres (libertéÂ
2)Â ;</li>
+<li>la liberté de distribuer des copies de vos versions modifiées aux autres
+(liberté 3) ; ce faisant, vous donnez à l'ensemble de la communauté une
+chance de beneficier de vos modifications ; une condition préalable est
+d'accéder au code source.</li>
</ul>
<p>Les développements de l'usage de la technologie et du réseau ont rendu ces
@@ -538,7 +538,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/04/10 02:01:13 $
+$Date: 2019/04/11 08:30:16 $
<!-- timestamp end -->
</p>
Index: manual/allgnupkgs.fr.html
===================================================================
RCS file: /web/www/www/manual/allgnupkgs.fr.html,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- manual/allgnupkgs.fr.html 11 Apr 2019 07:00:31 -0000 1.121
+++ manual/allgnupkgs.fr.html 11 Apr 2019 08:30:16 -0000 1.122
@@ -781,8 +781,8 @@
instantanée</b></big></a></td></tr>
<tr id="jami"><td>* <a href="/software/jami/">Jami</a></td>
- <td>A privacy-respecting communication program. [<a
-href="/software/jami/">jami home</a>]</td></tr>
+ <td>Un programme de communication qui respecte la vie privée. [<a
+href="/software/jami/">jami â accueil</a>]</td></tr>
<tr>
Index: po/home.fr-en.html
===================================================================
RCS file: /web/www/www/po/home.fr-en.html,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- po/home.fr-en.html 16 Feb 2019 18:59:16 -0000 1.167
+++ po/home.fr-en.html 11 Apr 2019 08:30:17 -0000 1.168
@@ -281,13 +281,15 @@
<ul>
<li>The freedom to run the program as you wish,
for any purpose (freedom 0).</li>
-<li>The freedom to study how the program works, and adapt it to your needs
- (freedom 1). Access to the source code is a precondition for this.</li>
-<li>The freedom to redistribute copies so you can help your neighbor
+<li>The freedom to study how the program works, and change it so it
+ does your computing as you wish (freedom 1). Access to the source
+ code is a precondition for this.</li>
+<li>The freedom to redistribute copies so you can help others
(freedom 2).</li>
-<li>The freedom to improve the program, and release your improvements
- to the public, so that the whole community benefits
- (freedom 3). Access to the source code is a precondition for this.</li>
+<li>The freedom to distribute copies of your modified versions
+ to others (freedom 3). By doing this you can give the whole
+ community a chance to benefit from your changes.
+ Access to the source code is a precondition for this.</li>
</ul>
<p>Developments in technology and network use have made these freedoms
@@ -493,7 +495,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/02/16 18:59:16 $
+$Date: 2019/04/11 08:30:17 $
<!-- timestamp end -->
</p>
</div>
Index: po/home.fr.po
===================================================================
RCS file: /web/www/www/po/home.fr.po,v
retrieving revision 1.496
retrieving revision 1.497
diff -u -b -r1.496 -r1.497
--- po/home.fr.po 11 Apr 2019 08:20:43 -0000 1.496
+++ po/home.fr.po 11 Apr 2019 08:30:17 -0000 1.497
@@ -18,7 +18,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-04-10 01:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
Index: proprietary/malware-appliances.fr.html
===================================================================
RCS file: /web/www/www/proprietary/malware-appliances.fr.html,v
retrieving revision 1.67
retrieving revision 1.68
diff -u -b -r1.67 -r1.68
--- proprietary/malware-appliances.fr.html 23 Mar 2019 11:39:11 -0000
1.67
+++ proprietary/malware-appliances.fr.html 11 Apr 2019 08:30:17 -0000
1.68
@@ -55,6 +55,18 @@
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>Le protocole « Conexus » de télémétrie, conçu par Medtronics,
contient <a
+href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">deux
+vulnérabilités qui affectent plusieurs modèles de défibrillateurs
+implantables</a> et les appareils auxquels ils se connectent.</p>
+
+ <p>Ce protocole existe depuis 2006 et des vulnérabilités similaires ont
été
+découvertes en 2008 dans un protocole de communication plus ancien de
+Medtronics. Cela montre qu'on ne peut pas faire confiance aux développeurs
+de logiciel privateur pour corriger les bogues de leurs programmes.</p>
+ </li>
+
<li id="M201902270">
<p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
Amazon) puisse regarder en permanence. En fait, il se trouve que <a
@@ -937,7 +949,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/03/23 11:39:11 $
+$Date: 2019/04/11 08:30:17 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-addictions.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-addictions.fr.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -b -r1.8 -r1.9
--- proprietary/proprietary-addictions.fr.html 10 Mar 2019 19:30:07 -0000
1.8
+++ proprietary/proprietary-addictions.fr.html 11 Apr 2019 08:30:17 -0000
1.9
@@ -29,9 +29,12 @@
de base</a>. Les développeurs exercent souvent ce pouvoir au détriment des
utilisateurs qu'ils devraient servir.</p>
-<p>Voici des exemples de programmes privateurs qui leur ajoutent des
-fonctionnalités addictives pour amener les gens à les utiliser en
-permanence.</p>
+<p>Voici plusieurs exemples de logiciels privateurs qui contiennent des
+fonctionnalités addictives, ajoutées dans le but d'inciter les gens à les
+utiliser indéfiniment. Certains de ces programmes <a
+href="https://www.intelligenteconomist.com/economics-of-microtransactions">piègent
+l'utilisateur pour lui faire payer avec de l'argent réel</a> le
+déverrouillage de fonctions prétendument intéressantes.</p>
<div class="important">
<p>Si vous avez connaissance d'un exemple qui devrait se trouver sur cette page
@@ -222,7 +225,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/03/10 19:30:07 $
+$Date: 2019/04/11 08:30:17 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary-insecurity.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.fr.html,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- proprietary/proprietary-insecurity.fr.html 23 Mar 2019 11:39:11 -0000
1.84
+++ proprietary/proprietary-insecurity.fr.html 11 Apr 2019 08:30:17 -0000
1.85
@@ -61,6 +61,18 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>Le protocole « Conexus » de télémétrie, conçu par Medtronics,
contient <a
+href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">deux
+vulnérabilités qui affectent plusieurs modèles de défibrillateurs
+implantables</a> et les appareils auxquels ils se connectent.</p>
+
+ <p>Ce protocole existe depuis 2006 et des vulnérabilités similaires ont
été
+découvertes en 2008 dans un protocole de communication plus ancien de
+Medtronics. Cela montre qu'on ne peut pas faire confiance aux développeurs
+de logiciel privateur pour corriger les bogues de leurs programmes.</p>
+ </li>
+
<li id="M201902270">
<p>La sonnette vidéo de Ring est conçue pour que le fabricant (maintenant
Amazon) puisse regarder en permanence. En fait, il se trouve que <a
@@ -697,7 +709,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/03/23 11:39:11 $
+$Date: 2019/04/11 08:30:17 $
<!-- timestamp end -->
</p>
Index: proprietary/proprietary.fr.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.fr.html,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary/proprietary.fr.html 9 Apr 2019 18:00:20 -0000 1.85
+++ proprietary/proprietary.fr.html 11 Apr 2019 08:30:17 -0000 1.86
@@ -156,6 +156,18 @@
<h3 id="latest">Ajouts récents</h3>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>Le protocole « Conexus » de télémétrie, conçu par Medtronics,
contient <a
+href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">deux
+vulnérabilités qui affectent plusieurs modèles de défibrillateurs
+implantables</a> et les appareils auxquels ils se connectent.</p>
+
+ <p>Ce protocole existe depuis 2006 et des vulnérabilités similaires ont
été
+découvertes en 2008 dans un protocole de communication plus ancien de
+Medtronics. Cela montre qu'on ne peut pas faire confiance aux développeurs
+de logiciel privateur pour corriger les bogues de leurs programmes.</p>
+ </li>
+
<li id="M201903280">
<p>Les constructeurs automobiles ont sorti une liste de raisons astucieuses
pour lesquelles ils sont <a
@@ -196,19 +208,6 @@
d'offrir ce service pour les modèles anciens</a>, de sorte que si on essaie
de réinstaller les réglages par défaut, la tablette devient
inutilisable.</p>
</li>
-
- <li id="M201903201">
- <p>Une étude portant sur 24 applis « santé » a montré que 19
d'entre elles <a
-href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">envoient
-des données personnelles sensibles à des tiers</a>, qui peuvent les utiliser
-à des fins de publicité intrusive ou de discrimination contre les personnes
-qui ont des problèmes médicaux.</p>
-
- <p>Lorsque l'utilisateur doit donner son « consentement », ce dernier
est
-enfoui dans des conditions d'utilisation à rallonge, presque
-incompréhensibles. De toute façon, « consentir » à l'espionnage ne le
-légitime pas.</p>
- </li>
</ul>
@@ -288,7 +287,7 @@
<p class="unprintable"><!-- timestamp start -->
Dernière mise à jour :
-$Date: 2019/04/09 18:00:20 $
+$Date: 2019/04/11 08:30:17 $
<!-- timestamp end -->
</p>
Index: proprietary/po/malware-appliances.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr-en.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary/po/malware-appliances.fr-en.html 23 Mar 2019 11:39:11
-0000 1.61
+++ proprietary/po/malware-appliances.fr-en.html 11 Apr 2019 08:30:17
-0000 1.62
@@ -47,6 +47,19 @@
<div class="column-limit" id="malware-appliances"></div>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
@@ -896,7 +909,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 11:39:11 $
+$Date: 2019/04/11 08:30:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-addictions.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-addictions.fr-en.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary/po/proprietary-addictions.fr-en.html 10 Mar 2019 19:30:07
-0000 1.7
+++ proprietary/po/proprietary-addictions.fr-en.html 11 Apr 2019 08:30:17
-0000 1.8
@@ -24,7 +24,11 @@
detriment of the users they ought to serve.</p>
<p>Here are instances of proprietary programs that add addictive
-functionality to lure users into using it perpetually.</p>
+functionality to lure users into using it perpetually. Some of these
+programs also <a
+href="https://www.intelligenteconomist.com/economics-of-microtransactions">trick
+users into paying real money</a> for unlocking features of alleged
+value.</p>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -194,7 +198,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/10 19:30:07 $
+$Date: 2019/04/11 08:30:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-insecurity.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr-en.html,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- proprietary/po/proprietary-insecurity.fr-en.html 23 Mar 2019 11:39:11
-0000 1.73
+++ proprietary/po/proprietary-insecurity.fr-en.html 11 Apr 2019 08:30:17
-0000 1.74
@@ -53,6 +53,19 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
@@ -655,7 +668,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/23 11:39:11 $
+$Date: 2019/04/11 08:30:17 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.fr-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr-en.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/proprietary.fr-en.html 9 Apr 2019 18:00:20 -0000
1.76
+++ proprietary/po/proprietary.fr-en.html 11 Apr 2019 08:30:17 -0000
1.77
@@ -146,6 +146,19 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models of implantable
+ defibrillators</a> and the devices they connect to.</p>
+
+ <p>This protocol has been around since 2006, and similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
<li id="M201903280">
<p>Car companies are coming up with a list of clever reasons why <a
href="https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-privacy.html">
@@ -184,18 +197,6 @@
turned off the server for old models</a>, so now if you try to
reinstall the default settings, it bricks them instead.</p>
</li>
-
- <li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of them <a
-
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can use it
- for invasive advertising or discriminating against people in poor
- medical condition.</p>
-
- <p>Whenever user “consent” is sought, it is buried in
- lengthy terms of service that are difficult to understand. In any case,
- “consent” is not sufficient to legitimize snooping.</p>
- </li>
</ul>
@@ -256,7 +257,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/09 18:00:20 $
+$Date: 2019/04/11 08:30:17 $
<!-- timestamp end -->
</p>
</div>
Index: server/home-pkgblurbs.fr.html
===================================================================
RCS file: /web/www/www/server/home-pkgblurbs.fr.html,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- server/home-pkgblurbs.fr.html 11 Apr 2019 07:00:35 -0000 1.136
+++ server/home-pkgblurbs.fr.html 11 Apr 2019 08:30:17 -0000 1.137
@@ -2495,11 +2495,11 @@
<!--#if expr="$pkg_selection = /:(jami|ALL):/" -->
<h4 id="jami">
<a href="/software/jami/">Jami</a></h4><p>
-Jami is a program for universal communication which respects freedoms and
-privacy of its users. Jami uses distributed hash tables for establishing
-communication. This avoids keeping centralized registries of users and
-storing personal data. <small>(<a
-href="/manual/manual.html#jami">doc</a>)</small></p>
+Jami est un logiciel de communication universelle qui respecte les libertés
+et la vie privée de ses utilisateurs. Il utilise des tables de hachage
+distribuées pour établir la communication. Cela évite les registres
+centralisés d'utilisateurs et le stockage des données
+personnelles. <small>(<a href="/manual/manual.html#jami">doc</a>)</small></p>
<!--#endif -->
<!--#if expr="$pkg_selection = /:(java-getopt|ALL):/" -->
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www home.fr.html manual/allgnupkgs.fr.html po/h...,
GNUN <=