[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 20 Apr 2019 03:31:43 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/04/20 03:31:42
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-cars.de-diff.html malware-cars.de.po
malware-cars.fr.po malware-cars.pot
malware-cars.ru.po nl.po pl.po pot
proprietary-deception.de-diff.html
proprietary-deception.de.po
proprietary-deception.es.po
proprietary-deception.fr.po
proprietary-deception.ja-diff.html
proprietary-deception.ja.po
proprietary-deception.pot
proprietary-deception.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.95&r2=1.96
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es.po?cvsroot=www&r1=1.3&r2=1.4
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.109&r2=1.110
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.97&r2=1.98
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.218&r2=1.219
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.80&r2=1.81
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.70&r2=1.71
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- de.po 18 Apr 2019 10:00:39 -0000 1.70
+++ de.po 20 Apr 2019 07:31:35 -0000 1.71
@@ -4007,6 +4007,56 @@
msgid "Some examples of malware in cars are listed below."
msgstr "Beispiele für Schadsoftware in Pkws:"
+# | [-<a
+# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">-]Volkswagen
+# | programmed its car engine computers to {+<a
+# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">+}
+# | detect the Environmental Protection Agency's emission tests</a>, and run
+# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
+# | standards by a factor of up to 35.+}
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#| "rest of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
+"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
+"der US-Umweltschutzbehörde âsaubereâ Emissionstests nachweisen zu
können</a> "
+"und fuhr ansonsten unsauber."
+
+# | Using free software would not have stopped Volkswagen from programming it
+# | this way, but would have made it harder to [-conceal.-] {+conceal, and
+# | given the users the possibility of correcting the deception.+}
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu
"
+"programmieren, hätte es aber erschwert es zu verbergen."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
#. type: Content of: <ul><li><p>
msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
@@ -4266,49 +4316,6 @@
"Has A Cunning Plan How To Deal With It, eroHedge.com 2015.\">Hintertür zur "
"Abschaltung des Motors via Fernzugriff</a> ausgestattet."
-# | [-<a
-# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">-]Volkswagen
-# | programmed its car engine computers to {+<a
-# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">+}
-# | detect the Environmental Protection Agency's emission tests</a>, and run
-# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
-# | standards by a factor of up to 35.+}
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
-#| "rest of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
-"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
-"der US-Umweltschutzbehörde âsaubereâ Emissionstests nachweisen zu
können</a> "
-"und fuhr ansonsten unsauber."
-
-# | Using free software would not have stopped Volkswagen from programming it
-# | this way, but would have made it harder to [-conceal.-] {+conceal, and
-# | given the users the possibility of correcting the deception.+}
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu
"
-"programmieren, hätte es aber erschwert es zu verbergen."
-
#. type: Content of: <ul><li><p>
msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.95
retrieving revision 1.96
diff -u -b -r1.95 -r1.96
--- es.po 19 Apr 2019 15:59:32 -0000 1.95
+++ es.po 20 Apr 2019 07:31:37 -0000 1.96
@@ -2837,6 +2837,38 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen programó los ordenadores que controlan el motor de sus coches "
+"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-"
+"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
+"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En
"
+"situaciones reales, los coches producÃan emisiones que llegaban a "
+"multiplicar por 35 los estándares permitidos."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"El uso de software libre no habrÃa impedido que Volkswagen lo programara de "
+"esa manera, pero lo habrÃa hecho más difÃcil de ocultar, y habrÃa dado a
los "
+"usuarios la posibilidad de corregir el engaño."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -3054,31 +3086,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen programó los ordenadores que controlan el motor de sus coches "
-"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-"
-"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
-"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En
"
-"situaciones reales, los coches producÃan emisiones que llegaban a "
-"multiplicar por 35 los estándares permitidos."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"El uso de software libre no habrÃa impedido que Volkswagen lo programara de "
-"esa manera, pero lo habrÃa hecho más difÃcil de ocultar, y habrÃa dado a
los "
-"usuarios la posibilidad de corregir el engaño."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- fr.po 18 Apr 2019 10:48:27 -0000 1.123
+++ fr.po 20 Apr 2019 07:31:37 -0000 1.124
@@ -3172,6 +3172,39 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
+"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-"
+"software-to-cheat-on-emissions\">détectent les essais antipollution de "
+"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
+"l'environnement des Ãtats-Unis)</a>… et polluent le reste du temps. "
+"En conditions réelles, les voitures excédaient les normes d'émission d'un "
+"facteur allant jusqu'Ã 35."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
+"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile
à "
+"cacher et les utilisateurs auraient eu une chance de la corriger."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -3414,32 +3447,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
-"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-"
-"software-to-cheat-on-emissions\">détectent les essais antipollution de "
-"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
-"l'environnement des Ãtats-Unis)</a>… et polluent le reste du temps. "
-"En conditions réelles, les voitures excédaient les normes d'émission d'un "
-"facteur allant jusqu'Ã 35."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
-"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile
à "
-"cacher et les utilisateurs auraient eu une chance de la corriger."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- it.po 18 Apr 2019 10:00:39 -0000 1.70
+++ it.po 20 Apr 2019 07:31:37 -0000 1.71
@@ -3774,6 +3774,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -3997,22 +4020,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- ja.po 18 Apr 2019 10:00:40 -0000 1.70
+++ ja.po 20 Apr 2019 07:31:37 -0000 1.71
@@ -3221,6 +3221,42 @@
msgstr "ãã¡ããã²ã¼ã ã®ãã«ã¦ã§ã¢ã®ä¾ã§ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests, and run dirty the rest "
+#| "of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ã¯è»ã®ã¨ã³ã¸ã³ã®ã³ã³ãã¥ã¼ã¿ãç°å¢ä¿è·å±ã®ææ°ãã¹ããæ¤åº"
+"ããããã«ããã°ã©ã
ãããã®ã»ãã®æã«ã¯æ±ãã¦èµ°ãããã«ãã¾ããã"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"èªç±ã½ããã¦ã§ã¢ã使ããã¨ã¯ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ããã®ããã«ãã¦ããã°ã©ã
ãã"
+"ãã¨ãæ¢ããããªãã£ãããããã¾ããããé
ããã¨ãå°é£ã«ã¯ããã§ãããã"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
@@ -3423,35 +3459,6 @@
"plan-how-deal-it\">ã¨ã³ã¸ã³ãæ¢ããããã¯ãã¢ä»ã§</a>æ¥ã¾ããã"
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests, and run dirty the rest "
-#| "of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ã¯è»ã®ã¨ã³ã¸ã³ã®ã³ã³ãã¥ã¼ã¿ãç°å¢ä¿è·å±ã®ææ°ãã¹ããæ¤åº"
-"ããããã«ããã°ã©ã
ãããã®ã»ãã®æã«ã¯æ±ãã¦èµ°ãããã«ãã¾ããã"
-
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"èªç±ã½ããã¦ã§ã¢ã使ããã¨ã¯ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ããã®ããã«ãã¦ããã°ã©ã
ãã"
-"ãã¨ãæ¢ããããªãã£ãããããã¾ããããé
ããã¨ãå°é£ã«ã¯ããã§ãããã"
-
-#. type: Content of: <ul><li><p>
msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-cars.de-diff.html 5 Apr 2019 10:32:23 -0000 1.27
+++ malware-cars.de-diff.html 20 Apr 2019 07:31:37 -0000 1.28
@@ -64,6 +64,22 @@
<div class="column-limit" id="malware-cars"></div>
<ul class="blurbs">
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to
<a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen have been <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ charged with this fraud</a> in Germany.</p>
+ </li>
+
<li id="M201903290"></em></ins></span>
<p>Tesla <span
class="removed"><del><strong>used</strong></del></span> <span
class="inserted"><ins><em>cars collect lots of personal data, and <a
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
@@ -156,26 +172,26 @@
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
Audi's proprietary software used a simple method to cheat on emissions
tests</a>: to activate a special low-emission gearshifting mode until
- the first time the car made a <span
class="removed"><del><strong>turn.</strong></del></span> <span
class="inserted"><ins><em>turn.</p></em></ins></span>
- </li>
+ the first time the car made a <span class="removed"><del><strong>turn.
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>Caterpillar vehicles come with a <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
-back-door</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201608110">
- <p>Due</em></ins></span> to <span
class="removed"><del><strong>shutoff the engine</a> remotely.</p>
-</li>
+back-door to shutoff the engine</a>
remotely.</p></strong></del></span> <span
class="inserted"><ins><em>turn.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p><a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
-Volkswagen programmed its car engine computers</strong></del></span> <span
class="inserted"><ins><em>weak security, <a
+Volkswagen programmed its car engine computers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201608110">
+ <p>Due</em></ins></span> to <span
class="removed"><del><strong>detect the
+Environmental Protection Agency's emission tests</a>,
+and run dirty</strong></del></span> <span class="inserted"><ins><em>weak
security, <a
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
- is easy</em></ins></span> to <span
class="removed"><del><strong>detect</strong></del></span> <span
class="inserted"><ins><em>open</em></ins></span> the
-<span class="removed"><del><strong>Environmental Protection Agency's emission
tests</a>,
-and run dirty the rest</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> of <span
class="removed"><del><strong>the time.</p>
+ is easy to open</em></ins></span> the <span
class="removed"><del><strong>rest</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> of <span
class="removed"><del><strong>the time.</p>
<p>In real driving, the</strong></del></span> <span
class="inserted"><ins><em>100 million</em></ins></span> cars <span
class="removed"><del><strong>exceeded emissions standards</strong></del></span>
<span class="inserted"><ins><em>built</em></ins></span> by <span
class="removed"><del><strong>a factor
of up to 35.</p>
@@ -213,33 +229,20 @@
href="/philosophy/free-software-even-more-important.html">which means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to the car remotely, the <span
class="removed"><del><strong>cell phone modem
-enables</strong></del></span> <span class="inserted"><ins><em>cell phone modem
+ <p>Even if no one connects to the car remotely, the cell phone modem
enables the phone company to track the car's movements all the time;
- it is possible to physically remove the cell phone modem, though.</p>
+ it is possible to physically remove the cell phone <span
class="removed"><del><strong>modem</strong></del></span> <span
class="inserted"><ins><em>modem,</em></ins></span> though.</p>
</li>
- <li id="M201511194">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511194">
<p>Caterpillar vehicles come with <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
a back door to shutoff the engine</a> remotely.</p>
</li>
- <li id="M201509210">
- <p>Volkswagen programmed its car engine computers to <a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
- detect the Environmental Protection Agency's emission tests</a>, and
- run dirty</em></ins></span> the <span class="removed"><del><strong>phone
company to track</strong></del></span> <span class="inserted"><ins><em>rest
of</em></ins></span> the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>time. In real
driving,</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>cars exceeded
- emissions standards by a factor of up to 35.</p>
-
- <p>Using free software would not have stopped Volkswagen from
- programming</em></ins></span> it <span class="removed"><del><strong>is
possible</strong></del></span> <span class="inserted"><ins><em>this way, but
would have made it harder</em></ins></span> to <span
class="removed"><del><strong>physically remove</strong></del></span> <span
class="inserted"><ins><em>conceal,
- and given</em></ins></span> the <span class="removed"><del><strong>cell
phone modem though.</p></strong></del></span> <span
class="inserted"><ins><em>users the possibility of correcting the
deception.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201508120"></em></ins></span>
+ <li id="M201508120"></em></ins></span>
<p>Security researchers discovered a <a
href="http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text">
vulnerability in diagnostic dongles used for vehicle tracking and
@@ -389,7 +392,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/05 10:32:23 $
+$Date: 2019/04/20 07:31:37 $
<!-- timestamp end -->
</p>
</div>
Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-cars.de.po 5 Apr 2019 10:32:23 -0000 1.17
+++ malware-cars.de.po 20 Apr 2019 07:31:37 -0000 1.18
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-cars.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-05 10:26+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -106,6 +106,56 @@
"Einzelheiten aufzuzeigen."
#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">-]Volkswagen
+# | programmed its car engine computers to {+<a
+# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">+}
+# | detect the Environmental Protection Agency's emission tests</a>, and run
+# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
+# | standards by a factor of up to 35.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#| "rest of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
+"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
+"der US-Umweltschutzbehörde âsaubereâ Emissionstests nachweisen zu
können</a> "
+"und fuhr ansonsten unsauber."
+
+#. type: Content of: <ul><li><p>
+# | Using free software would not have stopped Volkswagen from programming it
+# | this way, but would have made it harder to [-conceal.-] {+conceal, and
+# | given the users the possibility of correcting the deception.+}
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu
"
+"programmieren, hätte es aber erschwert es zu verbergen."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
@@ -365,49 +415,6 @@
"Abschaltung des Motors via Fernzugriff</a> ausgestattet."
#. type: Content of: <ul><li><p>
-# | [-<a
-# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">-]Volkswagen
-# | programmed its car engine computers to {+<a
-# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">+}
-# | detect the Environmental Protection Agency's emission tests</a>, and run
-# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
-# | standards by a factor of up to 35.+}
-#, fuzzy
-#| msgid ""
-#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
-#| "rest of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
-"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
-"der US-Umweltschutzbehörde âsaubereâ Emissionstests nachweisen zu
können</a> "
-"und fuhr ansonsten unsauber."
-
-#. type: Content of: <ul><li><p>
-# | Using free software would not have stopped Volkswagen from programming it
-# | this way, but would have made it harder to [-conceal.-] {+conceal, and
-# | given the users the possibility of correcting the deception.+}
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu
"
-"programmieren, hätte es aber erschwert es zu verbergen."
-
-#. type: Content of: <ul><li><p>
msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-cars.fr.po 7 Apr 2019 14:11:19 -0000 1.27
+++ malware-cars.fr.po 20 Apr 2019 07:31:37 -0000 1.28
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-04-05 10:26+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2019-04-07 16:10+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -80,6 +81,39 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
+"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-"
+"software-to-cheat-on-emissions\">détectent les essais antipollution de "
+"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
+"l'environnement des Ãtats-Unis)</a>… et polluent le reste du temps. "
+"En conditions réelles, les voitures excédaient les normes d'émission d'un "
+"facteur allant jusqu'Ã 35."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
+"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile
à "
+"cacher et les utilisateurs auraient eu une chance de la corriger."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -322,32 +356,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
-"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-"
-"software-to-cheat-on-emissions\">détectent les essais antipollution de "
-"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
-"l'environnement des Ãtats-Unis)</a>… et polluent le reste du temps. "
-"En conditions réelles, les voitures excédaient les normes d'émission d'un "
-"facteur allant jusqu'Ã 35."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
-"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile
à "
-"cacher et les utilisateurs auraient eu une chance de la corriger."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-cars.pot 5 Apr 2019 10:32:23 -0000 1.12
+++ malware-cars.pot 20 Apr 2019 07:31:37 -0000 1.13
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-04-05 10:26+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a "
+"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">
"
+"detect the Environmental Protection Agency's emission tests</a>, and run "
+"dirty the rest of the time. In real driving, the cars exceeded emissions "
+"standards by a factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a "
+"href=\"https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison\">
"
+"charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a "
"href=\"https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html\">
"
"when they go to a junkyard the driver's personal data goes with them</a>."
@@ -224,22 +247,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a "
-"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">
"
-"detect the Environmental Protection Agency's emission tests</a>, and run "
-"dirty the rest of the time. In real driving, the cars exceeded emissions "
-"standards by a factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a "
"href=\"http://www.theguardian.com/technology/2015/aug/12/hack-car-brakes-sms-text\">
"
"vulnerability in diagnostic dongles used for vehicle tracking and "
Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-cars.ru.po 5 Apr 2019 18:59:55 -0000 1.33
+++ malware-cars.ru.po 20 Apr 2019 07:31:37 -0000 1.34
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-04-05 10:26+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2018-09-27 04:21-0500\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -82,6 +83,37 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по "
+"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. "
+"ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ "
+"компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ, и Ñ Ð¿Ð¾Ð»ÑзоваÑелей "
+"бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¸ÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -319,30 +351,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
-"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по "
-"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. "
-"ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ "
-"компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ, и Ñ Ð¿Ð¾Ð»ÑзоваÑелей "
-"бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¸ÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- nl.po 18 Apr 2019 10:00:40 -0000 1.70
+++ nl.po 20 Apr 2019 07:31:37 -0000 1.71
@@ -2708,6 +2708,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2865,22 +2888,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- pl.po 18 Apr 2019 10:00:40 -0000 1.70
+++ pl.po 20 Apr 2019 07:31:37 -0000 1.71
@@ -2275,6 +2275,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2432,22 +2455,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- pot 18 Apr 2019 10:00:40 -0000 1.70
+++ pot 20 Apr 2019 07:31:38 -0000 1.71
@@ -2130,6 +2130,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2287,22 +2310,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
Index: proprietary-deception.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-deception.de-diff.html 17 Apr 2019 10:00:17 -0000 1.26
+++ proprietary-deception.de-diff.html 20 Apr 2019 07:31:38 -0000 1.27
@@ -49,22 +49,38 @@
<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to
<a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>possibility
of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen have been <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ charged with this fraud</a> in Germany.</p>
+ </li>
+
<li id="M201903281">
- <p>OfficeMax cheated customers by <a
-
href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/">
+ <p>OfficeMax cheated customers by</em></ins></span> <a
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/">
using proprietary “PC Health Check” software</a> rigged
to give false results, deceiving the customer into thinking per
- computer was infected and buy unneeded support services
from</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li></strong></del></span>
- <span class="inserted"><ins><em>company.</p>
+ computer was infected and buy unneeded support services from the
+ company.</p>
</li>
<li id="M201902041.2">
<p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos instead of “beautifying” them</a>,
pushing unwanted and often malicious ads on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
@@ -97,46 +113,19 @@
<p>The</em></ins></span> proprietor of the Pokémon Go game <a
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business">
invites restaurants and other businesses to pay to have the game lure
- people <span class="removed"><del><strong>there</a>.
- </li>
- <li>
- <p>“Dark patterns”
- are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed to mislead users, or make option settings
- hard to find</a>.</p>
-
- <p>This allows a company such as Apple to say, “We allow
- users to turn this off” while ensuring that few will
- understand how to actually turn it off.</p></strong></del></span>
<span class="inserted"><ins><em>there</a>.</p></em></ins></span>
+ people <span
class="removed"><del><strong>there</a>.</strong></del></span> <span
class="inserted"><ins><em>there</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201511110"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201511110">
<p>A top-ranking proprietary Instagram client promising
to tell users who's been watching their pictures was in reality <a
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords">stealing
their credentials</a>, advertising itself on their feed, and posting
images without their consent.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201509210"></em></ins></span>
- <p>Volkswagen programmed its car engine computers to <span
class="inserted"><ins><em><a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"></em></ins></span>
- detect the Environmental Protection Agency's emission <span
class="removed"><del><strong>tests,</strong></del></span> <span
class="inserted"><ins><em>tests</a>,</em></ins></span> and
- run dirty the rest of the <span
class="removed"><del><strong>time.</p>
-
- <p><a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions</a>.</p>
-
- <p>In</strong></del></span> <span class="inserted"><ins><em>time.
In</em></ins></span> real driving, the cars exceeded
- emissions standards by a factor of up to 35.</p>
-
- <p>Using free software would not have stopped Volkswagen from
- programming it this way, but would have made it harder to conceal,
- and given the users the possibility of correcting the deception.</p>
- </li>
-
- <span class="inserted"><ins><em><li id="M201308290">
+ <li id="M201308290"></em></ins></span>
<p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
interfaces designed to mislead users, or make option settings hard
@@ -145,7 +134,29 @@
<p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
to actually turn it off.</p>
- </li></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li>
+ <p>A top-ranking proprietary Instagram client promising to tell
+ users who's been watching their pictures was in reality
+ <a
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords">stealing
their credentials</a>,
+ advertising itself on their feed, and posting images without
+ their consent.</p>
+ </li>
+ <li>
+ <p>Volkswagen programmed its car engine computers to detect the
+ Environmental Protection Agency's emission tests,
+ and run dirty the rest of the time.</p>
+
+ <p><a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions</a>.</p>
+
+ <p>In real driving, the cars exceeded emissions standards by a
+ factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to
+ conceal, and given the users the possibility of correcting the
+ deception.</p>
+ </li></strong></del></span>
</ul>
@@ -206,7 +217,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/20 07:31:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-deception.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-deception.de.po 17 Apr 2019 10:00:17 -0000 1.38
+++ proprietary-deception.de.po 20 Apr 2019 07:31:38 -0000 1.39
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:43+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -84,6 +84,47 @@
"Einzelheiten aufzuzeigen."
#. type: Content of: <ul><li><p>
+# | Volkswagen programmed its car engine computers to {+<a
+# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">+}
+# | detect the Environmental Protection Agency's emission [-tests,-]
+# | {+tests</a>,+} and run dirty the rest of the time. {+In real driving, the
+# | cars exceeded emissions standards by a factor of up to 35.+}
+#, fuzzy
+#| msgid ""
+#| "Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests, and run dirty the rest "
+#| "of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
+"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
+"der US-Umweltschutzbehörde âsaubereâ Emissionstests nachweisen zu
können</a> "
+"und fuhr ansonsten unsauber."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu
"
+"programmieren, hätte aber erschwert es zu verschleiern und Nutzern die "
+"Möglichkeit gegeben, diese Unehrlichkeit zu korrigieren."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
msgid ""
"OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-"
"policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
@@ -178,40 +219,6 @@
"und veröffentlichte Bilder ohne deren Zustimmung."
#. type: Content of: <ul><li><p>
-# | Volkswagen programmed its car engine computers to {+<a
-# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">+}
-# | detect the Environmental Protection Agency's emission [-tests,-]
-# | {+tests</a>,+} and run dirty the rest of the time. {+In real driving, the
-# | cars exceeded emissions standards by a factor of up to 35.+}
-#, fuzzy
-#| msgid ""
-#| "Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests, and run dirty the rest "
-#| "of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
-"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
-"der US-Umweltschutzbehörde âsaubereâ Emissionstests nachweisen zu
können</a> "
-"und fuhr ansonsten unsauber."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu
"
-"programmieren, hätte aber erschwert es zu verschleiern und Nutzern die "
-"Möglichkeit gegeben, diese Unehrlichkeit zu korrigieren."
-
-#. type: Content of: <ul><li><p>
msgid ""
"“Dark patterns” are <a href=\"http://www.theverge."
"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
Index: proprietary-deception.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es.po,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -b -r1.3 -r1.4
--- proprietary-deception.es.po 18 Apr 2019 10:29:55 -0000 1.3
+++ proprietary-deception.es.po 20 Apr 2019 07:31:38 -0000 1.4
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2019-04-18 12:05+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -72,6 +73,38 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen programó los ordenadores que controlan el motor de sus coches "
+"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-"
+"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
+"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En
"
+"situaciones reales, los coches producÃan emisiones que llegaban a "
+"multiplicar por 35 los estándares permitidos."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"El uso de software libre no habrÃa impedido que Volkswagen lo programara de "
+"esa manera, pero lo habrÃa hecho más difÃcil de ocultar, y habrÃa dado a
los "
+"usuarios la posibilidad de corregir el engaño."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-"
"policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
"virus-scans/\"> using proprietary “PC Health Check” software</a> "
@@ -168,31 +201,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen programó los ordenadores que controlan el motor de sus coches "
-"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-"
-"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
-"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En
"
-"situaciones reales, los coches producÃan emisiones que llegaban a "
-"multiplicar por 35 los estándares permitidos."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"El uso de software libre no habrÃa impedido que Volkswagen lo programara de "
-"esa manera, pero lo habrÃa hecho más difÃcil de ocultar, y habrÃa dado a
los "
-"usuarios la posibilidad de corregir el engaño."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"“Dark patterns” are <a href=\"http://www.theverge."
"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
"you\">user interfaces designed to mislead users, or make option settings "
Index: proprietary-deception.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-deception.fr.po 17 Apr 2019 10:46:13 -0000 1.42
+++ proprietary-deception.fr.po 20 Apr 2019 07:31:38 -0000 1.43
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2019-04-17 12:45+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: fr <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -70,6 +71,39 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
+"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-"
+"software-to-cheat-on-emissions\">détectent les essais antipollution de "
+"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
+"l'environnement des Ãtats-Unis)</a>… et polluent le reste du temps. "
+"En conditions réelles, les voitures excédaient les normes d'émission d'un "
+"facteur allant jusqu'Ã 35."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
+"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile
à "
+"cacher et les utilisateurs auraient eu une chance de la corriger."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-"
"policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
"virus-scans/\"> using proprietary “PC Health Check” software</a> "
@@ -168,32 +202,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
-"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-"
-"software-to-cheat-on-emissions\">détectent les essais antipollution de "
-"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
-"l'environnement des Ãtats-Unis)</a>… et polluent le reste du temps. "
-"En conditions réelles, les voitures excédaient les normes d'émission d'un "
-"facteur allant jusqu'Ã 35."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
-"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile
à "
-"cacher et les utilisateurs auraient eu une chance de la corriger."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"“Dark patterns” are <a href=\"http://www.theverge."
"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
"you\">user interfaces designed to mislead users, or make option settings "
Index: proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-deception.ja-diff.html 17 Apr 2019 10:00:17 -0000 1.29
+++ proprietary-deception.ja-diff.html 20 Apr 2019 07:31:38 -0000 1.30
@@ -44,7 +44,7 @@
<span class="inserted"><ins><em><div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
-to <a href="mailto:address@hidden"><address@hidden></a>
+to</em></ins></span> <a <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
to serve as specific substantiation.</p>
</div>
@@ -52,6 +52,22 @@
<div class="column-limit" id="proprietary-deception"></div>
<ul class="blurbs">
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to
<a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen have been <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ charged with this fraud</a> in Germany.</p>
+ </li>
+
<li id="M201903281">
<p>OfficeMax cheated customers by <a
href="https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/">
@@ -63,8 +79,8 @@
<li id="M201902041.2">
<p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos instead of “beautifying” them</a>,
pushing unwanted and often malicious ads on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
@@ -99,45 +115,17 @@
invites restaurants and other businesses to pay to have the game lure
people <span
class="removed"><del><strong>there</a>.</strong></del></span> <span
class="inserted"><ins><em>there</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>“Dark patterns”
- are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed to mislead users, or make option settings
- hard to find</a>.</p>
-
- <p>This allows a company such as Apple to say, “We allow
- users to turn this off” while ensuring that few will
- understand how to actually turn it off.</p>
- </li>
- <li></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201511110"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201511110">
<p>A top-ranking proprietary Instagram client promising
to tell users who's been watching their pictures was in reality <a
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords">stealing
their credentials</a>, advertising itself on their feed, and posting
images without their consent.</p>
</li>
- <span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201509210"></em></ins></span>
- <p>Volkswagen programmed its car engine computers to <span
class="inserted"><ins><em><a
-
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions"></em></ins></span>
- detect the Environmental Protection Agency's emission <span
class="removed"><del><strong>tests,</strong></del></span> <span
class="inserted"><ins><em>tests</a>,</em></ins></span> and
- run dirty the rest of the <span
class="removed"><del><strong>time.</p>
-
- <p><a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions</a>.</p>
-
- <p>In</strong></del></span> <span class="inserted"><ins><em>time.
In</em></ins></span> real driving, the cars exceeded
- emissions standards by a factor of up to 35.</p>
-
- <p>Using free software would not have stopped Volkswagen from
- programming it this way, but would have made it harder to
- <span
class="removed"><del><strong>conceal.</p></strong></del></span> <span
class="inserted"><ins><em>conceal,
- and given the users the possibility of correcting the deception.</p>
- </li>
- <li id="M201308290">
+ <li id="M201308290"></em></ins></span>
<p>“Dark patterns” are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
interfaces designed to mislead users, or make option settings hard
@@ -145,8 +133,29 @@
<p>This allows a company such as Apple to say, “We allow users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to actually turn it off.</p>
</li>
+ <span class="removed"><del><strong><li>
+ <p>A top-ranking proprietary Instagram client promising to tell
+ users who's been watching their pictures was in reality
+ <a
href="http://www.theguardian.com/technology/2015/nov/11/top-ranking-free-app-stole-instagram-passwords">stealing
their credentials</a>,
+ advertising itself on their feed, and posting images without
+ their consent.</p>
+ </li>
+ <li>
+ <p>Volkswagen programmed its car engine computers to detect the
+ Environmental Protection Agency's emission tests,
+ and run dirty the rest of the time.</p>
+
+ <p><a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions</a>.</p>
+
+ <p>In real driving, the cars exceeded emissions standards by a
+ factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to
+ conceal.</p>
+ </li></strong></del></span>
</ul>
@@ -208,7 +217,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/17 10:00:17 $
+$Date: 2019/04/20 07:31:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-deception.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-deception.ja.po 17 Apr 2019 10:00:17 -0000 1.37
+++ proprietary-deception.ja.po 20 Apr 2019 07:31:38 -0000 1.38
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2016-11-18 13:31+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -66,6 +66,42 @@
msgstr ""
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests, and run dirty the rest "
+#| "of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ã¯è»ã®ã¨ã³ã¸ã³ã®ã³ã³ãã¥ã¼ã¿ãç°å¢ä¿è·å±ã®ææ°ãã¹ããæ¤åº"
+"ããããã«ããã°ã©ã
ãããã®ã»ãã®æã«ã¯æ±ãã¦èµ°ãããã«ãã¾ããã"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"èªç±ã½ããã¦ã§ã¢ã使ããã¨ã¯ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ããã®ããã«ãã¦ããã°ã©ã
ãã"
+"ãã¨ãæ¢ããããªãã£ãããããã¾ããããé
ããã¨ãå°é£ã«ã¯ããã§ãããã"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
msgid ""
"OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-"
"policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
@@ -149,35 +185,6 @@
"ãã¦ã¼ã¶ã®ãã£ã¼ãã«åºåããåæãªãã«ç»åãæ稿ããã®ã§ãã"
#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Volkswagen programmed its car engine computers to detect the "
-#| "Environmental Protection Agency's emission tests, and run dirty the rest "
-#| "of the time."
-msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ã¯è»ã®ã¨ã³ã¸ã³ã®ã³ã³ãã¥ã¼ã¿ãç°å¢ä¿è·å±ã®ææ°ãã¹ããæ¤åº"
-"ããããã«ããã°ã©ã
ãããã®ã»ãã®æã«ã¯æ±ãã¦èµ°ãããã«ãã¾ããã"
-
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "Using free software would not have stopped Volkswagen from programming it "
-#| "this way, but would have made it harder to conceal."
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"èªç±ã½ããã¦ã§ã¢ã使ããã¨ã¯ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ããã®ããã«ãã¦ããã°ã©ã
ãã"
-"ãã¨ãæ¢ããããªãã£ãããããã¾ããããé
ããã¨ãå°é£ã«ã¯ããã§ãããã"
-
-#. type: Content of: <ul><li><p>
msgid ""
"“Dark patterns” are <a href=\"http://www.theverge."
"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
Index: proprietary-deception.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-deception.pot 17 Apr 2019 10:00:17 -0000 1.23
+++ proprietary-deception.pot 20 Apr 2019 07:31:38 -0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -57,6 +57,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a "
+"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">
"
+"detect the Environmental Protection Agency's emission tests</a>, and run "
+"dirty the rest of the time. In real driving, the cars exceeded emissions "
+"standards by a factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a "
+"href=\"https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison\">
"
+"charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"OfficeMax cheated customers by <a "
"href=\"https://arstechnica.com/tech-policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-virus-scans/\">
"
"using proprietary “PC Health Check” software</a> rigged to give "
@@ -118,22 +141,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a "
-"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">
"
-"detect the Environmental Protection Agency's emission tests</a>, and run "
-"dirty the rest of the time. In real driving, the cars exceeded emissions "
-"standards by a factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"“Dark patterns” are <a "
"href=\"http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you\">user
"
"interfaces designed to mislead users, or make option settings hard to "
Index: proprietary-deception.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary-deception.ru.po 17 Apr 2019 10:00:17 -0000 1.53
+++ proprietary-deception.ru.po 20 Apr 2019 07:31:38 -0000 1.54
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-04-17 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2018-09-27 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -71,6 +72,37 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по "
+"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. "
+"ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ "
+"компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ, и Ñ Ð¿Ð¾Ð»ÑзоваÑелей "
+"бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¸ÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"OfficeMax cheated customers by <a href=\"https://arstechnica.com/tech-"
"policy/2019/03/office-depot-tricked-people-into-buying-pc-support-with-fake-"
"virus-scans/\"> using proprietary “PC Health Check” software</a> "
@@ -168,30 +200,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
-"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по "
-"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. "
-"ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ "
-"компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ, и Ñ Ð¿Ð¾Ð»ÑзоваÑелей "
-"бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¸ÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"“Dark patterns” are <a href=\"http://www.theverge."
"com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-"
"you\">user interfaces designed to mislead users, or make option settings "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- proprietary.de-diff.html 18 Apr 2019 10:00:40 -0000 1.79
+++ proprietary.de-diff.html 20 Apr 2019 07:31:38 -0000 1.80
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
@@ -102,17 +102,17 @@
<td></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
@@ -127,9 +127,9 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to
<a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen have been <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ charged with this fraud</a> in Germany.</p>
+ </li>
+
<li id="M201904130">
<p>Google tracks the movements of Android phones, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
@@ -223,19 +239,6 @@
computer was infected and buy unneeded support services from the
company.</p>
</li>
-
- <li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models of implantable
- defibrillators</a> and the devices they connect to.</p>
-
- <p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p>
- </li>
</ul></em></ins></span>
@@ -296,7 +299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/18 10:00:40 $
+$Date: 2019/04/20 07:31:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary.de.po 18 Apr 2019 10:00:40 -0000 1.121
+++ proprietary.de.po 20 Apr 2019 07:31:38 -0000 1.122
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -430,6 +430,56 @@
msgstr "Letzte Ergänzungen"
#. type: Content of: <ul><li><p>
+# | [-<a
+# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">-]Volkswagen
+# | programmed its car engine computers to {+<a
+# |
href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">+}
+# | detect the Environmental Protection Agency's emission tests</a>, and run
+# | dirty the rest of the time. {+In real driving, the cars exceeded emissions
+# | standards by a factor of up to 35.+}
+#, fuzzy
+#| msgid ""
+#| "<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+#| "emissions\"> Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests</a>, and run dirty the "
+#| "rest of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"<a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"emissions\" title=\"Volkswagen Used Software to Cheat on Emissions, unter: "
+"Petri.com 2015.\">Volkswagen programmierte seine Fahrzeug-Bordrechner, um "
+"der US-Umweltschutzbehörde âsaubereâ Emissionstests nachweisen zu
können</a> "
+"und fuhr ansonsten unsauber."
+
+#. type: Content of: <ul><li><p>
+# | Using free software would not have stopped Volkswagen from programming it
+# | this way, but would have made it harder to [-conceal.-] {+conceal, and
+# | given the users the possibility of correcting the deception.+}
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"Freie Software hätte Volkswagen nicht davon abgehalten es auf diese Weise zu
"
+"programmieren, hätte es aber erschwert es zu verbergen."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
@@ -477,22 +527,6 @@
"computer was infected and buy unneeded support services from the company."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.es.po 19 Apr 2019 15:53:55 -0000 1.146
+++ proprietary.es.po 20 Apr 2019 07:31:38 -0000 1.147
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -298,6 +299,38 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen programó los ordenadores que controlan el motor de sus coches "
+"para que <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-"
+"on-emissions\">detectaran las pruebas de emisiones de la Agencia de "
+"Protección Medioambiental</a>, y seguir contaminando el resto del tiempo. En
"
+"situaciones reales, los coches producÃan emisiones que llegaban a "
+"multiplicar por 35 los estándares permitidos."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"El uso de software libre no habrÃa impedido que Volkswagen lo programara de "
+"esa manera, pero lo habrÃa hecho más difÃcil de ocultar, y habrÃa dado a
los "
+"usuarios la posibilidad de corregir el engaño."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
"police.html\"> saves the data for years</a>."
@@ -369,31 +402,6 @@
"infectado y asà este contratara sin necesidad servicios de mantenimiento de "
"la compañÃa."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-"El protocolo de telemetrÃa Conexus, de Medtronics, tiene <a href=\"http://"
-"www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\">dos vulnerabilidades que afectan a varios modelos de "
-"desfibriladores implantables</a> y a los dispositivos a los que se conectan."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-"Este protocolo se ha estado utilizando aproximadamente desde 2006, y en 2008 "
-"se descubrieron vulnerabilidades similares en un protocolo de comunicaciones "
-"anterior de Medtronics. Es obvio que la compañÃa no hizo nada por "
-"solucionarlo. Esto significa que no se puede confiar en que los "
-"desarrolladores de software privativo arreglen los fallos de sus productos."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -473,6 +481,32 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> two vulnerabilities that affect several models of "
+#~ "implantable defibrillators</a> and the devices they connect to."
+#~ msgstr ""
+#~ "El protocolo de telemetrÃa Conexus, de Medtronics, tiene <a
href=\"http://"
+#~ "www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\">dos vulnerabilidades que afectan a varios modelos de "
+#~ "desfibriladores implantables</a> y a los dispositivos a los que se "
+#~ "conectan."
+
+#~ msgid ""
+#~ "This protocol has been around since 2006, and similar vulnerabilities "
+#~ "were discovered in an earlier Medtronics communication protocol in 2008. "
+#~ "Apparently, nothing was done by the company to correct them. This means "
+#~ "you can't rely on proprietary software developers to fix bugs in their "
+#~ "products."
+#~ msgstr ""
+#~ "Este protocolo se ha estado utilizando aproximadamente desde 2006, y en "
+#~ "2008 se descubrieron vulnerabilidades similares en un protocolo de "
+#~ "comunicaciones anterior de Medtronics. Es obvio que la compañÃa no hizo "
+#~ "nada por solucionarlo. Esto significa que no se puede confiar en que los "
+#~ "desarrolladores de software privativo arreglen los fallos de sus "
+#~ "productos."
+
+#~ msgid ""
#~ "Car companies are coming up with a list of clever reasons why <a href="
#~ "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
#~ "privacy.html\"> they “have to” put cameras and microphones in "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary.fr.po 18 Apr 2019 10:48:27 -0000 1.178
+++ proprietary.fr.po 20 Apr 2019 07:31:38 -0000 1.179
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2019-04-18 12:46+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -294,6 +295,39 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"Volkswagen a programmé les ordinateurs contrôlant les moteurs de ses "
+"véhicules pour qu'ils <a href=\"https://www.petri.com/volkswagen-used-"
+"software-to-cheat-on-emissions\">détectent les essais antipollution de "
+"l'<cite>Environmental Protection Agency</cite> (agence de protection de "
+"l'environnement des Ãtats-Unis)</a>… et polluent le reste du temps. "
+"En conditions réelles, les voitures excédaient les normes d'émission d'un "
+"facteur allant jusqu'Ã 35."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"L'utilisation de logiciel libre n'aurait pas empêché Volkswagen de "
+"programmer ainsi ses ordinateurs, mais la fraude aurait été plus difficile
à "
+"cacher et les utilisateurs auraient eu une chance de la corriger."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
"police.html\"> saves the data for years</a>."
@@ -365,31 +399,6 @@
"de faux résultats</a> leur faisant croire que leur ordinateur était
infecté, "
"afin de leur vendre des services de maintenance inutiles."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-"Le protocole « Conexus » de télémétrie, conçu par Medtronics,
contient <a "
-"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-"
-"vulnerable-to-hacking/507470932/\">deux vulnérabilités qui affectent "
-"plusieurs modèles de défibrillateurs implantables</a> et les appareils "
-"auxquels ils se connectent."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-"Ce protocole existe depuis 2006 et des vulnérabilités similaires ont été "
-"découvertes en 2008 dans un protocole de communication plus ancien de "
-"Medtronics. Cela montre qu'on ne peut pas faire confiance aux développeurs "
-"de logiciel privateur pour corriger les bogues de leurs programmes."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -463,3 +472,28 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> two vulnerabilities that affect several models of "
+#~ "implantable defibrillators</a> and the devices they connect to."
+#~ msgstr ""
+#~ "Le protocole « Conexus » de télémétrie, conçu par Medtronics,
contient <a "
+#~ "href=\"http://www.startribune.com/750-000-medtronic-defibrillators-"
+#~ "vulnerable-to-hacking/507470932/\">deux vulnérabilités qui affectent "
+#~ "plusieurs modèles de défibrillateurs implantables</a> et les appareils "
+#~ "auxquels ils se connectent."
+
+#~ msgid ""
+#~ "This protocol has been around since 2006, and similar vulnerabilities "
+#~ "were discovered in an earlier Medtronics communication protocol in 2008. "
+#~ "Apparently, nothing was done by the company to correct them. This means "
+#~ "you can't rely on proprietary software developers to fix bugs in their "
+#~ "products."
+#~ msgstr ""
+#~ "Ce protocole existe depuis 2006 et des vulnérabilités similaires ont
été "
+#~ "découvertes en 2008 dans un protocole de communication plus ancien de "
+#~ "Medtronics. Cela montre qu'on ne peut pas faire confiance aux "
+#~ "développeurs de logiciel privateur pour corriger les bogues de leurs "
+#~ "programmes."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary.it-diff.html 18 Apr 2019 10:00:40 -0000 1.91
+++ proprietary.it-diff.html 20 Apr 2019 07:31:39 -0000 1.92
@@ -40,15 +40,15 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -101,18 +101,18 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to
<a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen have been <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ charged with this fraud</a> in Germany.</p>
+ </li>
+
<li id="M201904130">
<p>Google tracks the movements of Android phones, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
@@ -222,19 +238,6 @@
computer was infected and buy unneeded support services from the
company.</p>
</li>
-
- <li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models of implantable
- defibrillators</a> and the devices they connect to.</p>
-
- <p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p>
- </li>
</ul></em></ins></span>
@@ -295,7 +298,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/18 10:00:40 $
+$Date: 2019/04/20 07:31:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.it.po 18 Apr 2019 10:00:40 -0000 1.130
+++ proprietary.it.po 20 Apr 2019 07:31:39 -0000 1.131
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -435,6 +435,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
"police.html\"> saves the data for years</a>."
@@ -481,22 +504,6 @@
"computer was infected and buy unneeded support services from the company."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- proprietary.ja-diff.html 18 Apr 2019 10:00:41 -0000 1.92
+++ proprietary.ja-diff.html 20 Apr 2019 07:31:39 -0000 1.93
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -181,6 +181,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to
<a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen have been <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ charged with this fraud</a> in Germany.</p>
+ </li>
+
<li id="M201904130">
<p>Google tracks the movements of Android phones, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
@@ -219,19 +235,6 @@
computer was infected and buy unneeded support services from the
company.</p>
</li>
-
- <li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models of implantable
- defibrillators</a> and the devices they connect to.</p>
-
- <p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p>
- </li>
</ul></em></ins></span>
@@ -292,7 +295,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/18 10:00:41 $
+$Date: 2019/04/20 07:31:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary.ja.po 18 Apr 2019 10:00:41 -0000 1.113
+++ proprietary.ja.po 20 Apr 2019 07:31:39 -0000 1.114
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -354,6 +354,42 @@
msgstr "ææ°ã®è¿½å "
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Volkswagen programmed its car engine computers to detect the "
+#| "Environmental Protection Agency's emission tests, and run dirty the rest "
+#| "of the time."
+msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ã¯è»ã®ã¨ã³ã¸ã³ã®ã³ã³ãã¥ã¼ã¿ãç°å¢ä¿è·å±ã®ææ°ãã¹ããæ¤åº"
+"ããããã«ããã°ã©ã
ãããã®ã»ãã®æã«ã¯æ±ãã¦èµ°ãããã«ãã¾ããã"
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Using free software would not have stopped Volkswagen from programming it "
+#| "this way, but would have made it harder to conceal."
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"èªç±ã½ããã¦ã§ã¢ã使ããã¨ã¯ãã©ã«ã¯ã¹ã¯ã¼ã²ã³ããã®ããã«ãã¦ããã°ã©ã
ãã"
+"ãã¨ãæ¢ããããªãã£ãããããã¾ããããé
ããã¨ãå°é£ã«ã¯ããã§ãããã"
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
@@ -401,22 +437,6 @@
"computer was infected and buy unneeded support services from the company."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary.nl-diff.html 18 Apr 2019 10:00:41 -0000 1.91
+++ proprietary.nl-diff.html 20 Apr 2019 07:31:39 -0000 1.92
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -184,6 +184,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to
<a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen have been <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ charged with this fraud</a> in Germany.</p>
+ </li>
+
<li id="M201904130">
<p>Google tracks the movements of Android phones, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
@@ -222,19 +238,6 @@
computer was infected and buy unneeded support services from the
company.</p>
</li>
-
- <li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models of implantable
- defibrillators</a> and the devices they connect to.</p>
-
- <p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p>
- </li>
</ul></em></ins></span>
@@ -295,7 +298,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/18 10:00:41 $
+$Date: 2019/04/20 07:31:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary.nl.po 18 Apr 2019 10:00:41 -0000 1.102
+++ proprietary.nl.po 20 Apr 2019 07:31:39 -0000 1.103
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -428,6 +428,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
"police.html\"> saves the data for years</a>."
@@ -474,22 +497,6 @@
"computer was infected and buy unneeded support services from the company."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.109
retrieving revision 1.110
diff -u -b -r1.109 -r1.110
--- proprietary.pl-diff.html 18 Apr 2019 10:00:41 -0000 1.109
+++ proprietary.pl-diff.html 20 Apr 2019 07:31:39 -0000 1.110
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>April, 2019, the pages in this directory list
around 400
-instances of malicious functionalities (with more than 450 references to
+<p>As of April, 2019, the pages in this directory list around 400
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 450
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -126,18 +126,18 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
+ <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -182,6 +182,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to
<a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen have been <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ charged with this fraud</a> in Germany.</p>
+ </li>
+
<li id="M201904130">
<p>Google tracks the movements of Android phones, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
@@ -220,19 +236,6 @@
computer was infected and buy unneeded support services from the
company.</p>
</li>
-
- <li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models of implantable
- defibrillators</a> and the devices they connect to.</p>
-
- <p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p>
- </li>
</ul></em></ins></span>
@@ -293,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/18 10:00:41 $
+$Date: 2019/04/20 07:31:39 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.97
retrieving revision 1.98
diff -u -b -r1.97 -r1.98
--- proprietary.pl.po 18 Apr 2019 10:00:41 -0000 1.97
+++ proprietary.pl.po 20 Apr 2019 07:31:39 -0000 1.98
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -510,6 +510,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
"police.html\"> saves the data for years</a>."
@@ -556,22 +579,6 @@
"computer was infected and buy unneeded support services from the company."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.pot 18 Apr 2019 10:00:41 -0000 1.94
+++ proprietary.pot 20 Apr 2019 07:31:39 -0000 1.95
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -245,6 +245,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a "
+"href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions\">
"
+"detect the Environmental Protection Agency's emission tests</a>, and run "
+"dirty the rest of the time. In real driving, the cars exceeded emissions "
+"standards by a factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a "
+"href=\"https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison\">
"
+"charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google tracks the movements of Android phones, and sometimes <a "
"href=\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html\">
"
"saves the data for years</a>."
@@ -290,23 +313,6 @@
"infected and buy unneeded support services from the company."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a "
-"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\">
"
-"two vulnerabilities that affect several models of implantable "
-"defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in "
-"2008. Apparently, nothing was done by the company to correct them. This "
-"means you can't rely on proprietary software developers to fix bugs in their "
-"products."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.pt-br.po 18 Apr 2019 10:00:41 -0000 1.140
+++ proprietary.pt-br.po 20 Apr 2019 07:31:39 -0000 1.141
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2019-04-16 00:31-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -298,6 +298,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
"police.html\"> saves the data for years</a>."
@@ -350,32 +373,6 @@
"pensar que o computador estava infectado e comprar serviços de suporte "
"desnecessários da empresa."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-"O Protocolo de Telemetria da Medtronics Conexus tem <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> duas vulnerabilidades que afetam vários modelos de "
-"desfibriladores implantáveis </a> e os dispositivos aos quais eles se "
-"conectam."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-"Esse protocolo existe desde 2006, e vulnerabilidades semelhantes foram "
-"descobertas em um protocolo de comunicação anterior da Medtronics em 2008. "
-"Aparentemente, nada foi feito pela empresa para corrigi-las. Isso significa "
-"que você não pode confiar em desenvolvedores de software proprietários
para "
-"corrigir erros em seus produtos."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -451,6 +448,31 @@
msgstr "Ãltima atualização: "
#~ msgid ""
+#~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> two vulnerabilities that affect several models of "
+#~ "implantable defibrillators</a> and the devices they connect to."
+#~ msgstr ""
+#~ "O Protocolo de Telemetria da Medtronics Conexus tem <a href=\"http://www."
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> duas vulnerabilidades que afetam vários modelos de "
+#~ "desfibriladores implantáveis </a> e os dispositivos aos quais eles se "
+#~ "conectam."
+
+#~ msgid ""
+#~ "This protocol has been around since 2006, and similar vulnerabilities "
+#~ "were discovered in an earlier Medtronics communication protocol in 2008. "
+#~ "Apparently, nothing was done by the company to correct them. This means "
+#~ "you can't rely on proprietary software developers to fix bugs in their "
+#~ "products."
+#~ msgstr ""
+#~ "Esse protocolo existe desde 2006, e vulnerabilidades semelhantes foram "
+#~ "descobertas em um protocolo de comunicação anterior da Medtronics em "
+#~ "2008. Aparentemente, nada foi feito pela empresa para corrigi-las. Isso "
+#~ "significa que você não pode confiar em desenvolvedores de software "
+#~ "proprietários para corrigir erros em seus produtos."
+
+#~ msgid ""
#~ "Car companies are coming up with a list of clever reasons why <a href="
#~ "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
#~ "privacy.html\"> they “have to” put cameras and microphones in "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.218
retrieving revision 1.219
diff -u -b -r1.218 -r1.219
--- proprietary.ru.po 18 Apr 2019 12:29:50 -0000 1.218
+++ proprietary.ru.po 20 Apr 2019 07:31:39 -0000 1.219
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-04-20 07:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -298,6 +299,37 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по "
+"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. "
+"ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ "
+"компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ, и Ñ Ð¿Ð¾Ð»ÑзоваÑелей "
+"бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¸ÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
"police.html\"> saves the data for years</a>."
@@ -370,31 +402,6 @@
"на мÑÑлÑ, ÑÑо иÑ
компÑÑÑÐµÑ Ð·Ð°Ñажен, и они
покÑпали Ñ ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ð¸ ненÑжнÑе "
"ÑÑлÑги поддеÑжки."
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-"РпÑоÑоколе ÑелемеÑÑии Medtronics Conexus еÑÑÑ <a
href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> две ÑÑзвимоÑÑи, коÑоÑÑм
подвеÑÐ¶ÐµÐ½Ñ Ð½ÐµÑколÑко моделей "
-"импланÑиÑÑемÑÑ
деÑибÑиллÑÑоÑов</a> и
ÑÑÑÑойÑÑв, Ñ ÐºÐ¾ÑоÑÑми они ÑоединÑÑÑÑÑ."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-"ÐÑÐ¾Ñ Ð¿ÑоÑокол пÑименÑеÑÑÑ Ñ 2006 года, и ÑÑ
однÑе ÑÑзвимоÑÑи бÑли обнаÑÑÐ¶ÐµÐ½Ñ "
-"в более Ñаннем пÑоÑоколе Medtronics
в 2008 годÑ. ÐÑевидно, "
-"ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð½Ð¸Ñего не пÑедпÑинимала Ð´Ð»Ñ Ð¸Ñ
ÑÑÑÑанениÑ. ÐÑо знаÑиÑ, ÑÑо нелÑÐ·Ñ "
-"ÑаÑÑÑиÑÑваÑÑ, ÑÑо ÑазÑабоÑÑики
неÑвободнÑÑ
пÑогÑамм бÑдÑÑ ÑÑÑÑанÑÑÑ
оÑибки в "
-"ÑвоиÑ
пÑодÑкÑаÑ
."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -474,6 +481,31 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> two vulnerabilities that affect several models of "
+#~ "implantable defibrillators</a> and the devices they connect to."
+#~ msgstr ""
+#~ "РпÑоÑоколе ÑелемеÑÑии Medtronics Conexus еÑÑÑ <a
href=\"http://www."
+#~ "startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
+#~ "hacking/507470932/\"> две ÑÑзвимоÑÑи, коÑоÑÑм
подвеÑÐ¶ÐµÐ½Ñ Ð½ÐµÑколÑко "
+#~ "моделей импланÑиÑÑемÑÑ
деÑибÑиллÑÑоÑов</a> и ÑÑÑÑойÑÑв, Ñ ÐºÐ¾ÑоÑÑми
они "
+#~ "ÑоединÑÑÑÑÑ."
+
+#~ msgid ""
+#~ "This protocol has been around since 2006, and similar vulnerabilities "
+#~ "were discovered in an earlier Medtronics communication protocol in 2008. "
+#~ "Apparently, nothing was done by the company to correct them. This means "
+#~ "you can't rely on proprietary software developers to fix bugs in their "
+#~ "products."
+#~ msgstr ""
+#~ "ÐÑÐ¾Ñ Ð¿ÑоÑокол пÑименÑеÑÑÑ Ñ 2006 года, и ÑÑ
однÑе ÑÑзвимоÑÑи бÑли "
+#~ "обнаÑÑÐ¶ÐµÐ½Ñ Ð² более Ñаннем пÑоÑоколе
Medtronics в 2008 годÑ. "
+#~ "ÐÑевидно, ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð½Ð¸Ñего не
пÑедпÑинимала Ð´Ð»Ñ Ð¸Ñ
ÑÑÑÑанениÑ. ÐÑо
знаÑиÑ, "
+#~ "ÑÑо нелÑÐ·Ñ ÑаÑÑÑиÑÑваÑÑ, ÑÑо
ÑазÑабоÑÑики неÑвободнÑÑ
пÑогÑамм бÑдÑÑ "
+#~ "ÑÑÑÑанÑÑÑ Ð¾Ñибки в ÑвоиÑ
пÑодÑкÑаÑ
."
+
+#~ msgid ""
#~ "Car companies are coming up with a list of clever reasons why <a href="
#~ "\"https://www.nytimes.com/2019/03/28/business/autonomous-cars-technology-"
#~ "privacy.html\"> they “have to” put cameras and microphones in "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- proprietary.zh-tw-diff.html 18 Apr 2019 10:00:41 -0000 1.69
+++ proprietary.zh-tw-diff.html 20 Apr 2019 07:31:41 -0000 1.70
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
@@ -102,17 +102,17 @@
<td></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
- <li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li>
<li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
@@ -127,9 +127,9 @@
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
-<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
+<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,22 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201904150">
+ <p id="M201509210">Volkswagen programmed its car engine computers to
<a
+
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
+ detect the Environmental Protection Agency's emission tests</a>, and
+ run dirty the rest of the time. In real driving, the cars exceeded
+ emissions standards by a factor of up to 35.</p>
+
+ <p>Using free software would not have stopped Volkswagen from
+ programming it this way, but would have made it harder to conceal,
+ and given the users the possibility of correcting the deception.</p>
+
+ <p>Former executives of Volkswagen have been <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ charged with this fraud</a> in Germany.</p>
+ </li>
+
<li id="M201904130">
<p>Google tracks the movements of Android phones, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
@@ -223,19 +239,6 @@
computer was infected and buy unneeded support services from the
company.</p>
</li>
-
- <li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models of implantable
- defibrillators</a> and the devices they connect to.</p>
-
- <p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p>
- </li>
</ul></em></ins></span>
@@ -296,7 +299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/18 10:00:41 $
+$Date: 2019/04/20 07:31:41 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.80
retrieving revision 1.81
diff -u -b -r1.80 -r1.81
--- proprietary.zh-tw.po 18 Apr 2019 10:00:41 -0000 1.80
+++ proprietary.zh-tw.po 20 Apr 2019 07:31:42 -0000 1.81
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-18 09:56+0000\n"
+"POT-Creation-Date: 2019-04-20 07:26+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -344,6 +344,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Google tracks the movements of Android phones, and sometimes <a href="
"\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-"
"police.html\"> saves the data for years</a>."
@@ -390,22 +413,6 @@
"computer was infected and buy unneeded support services from the company."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
-"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
-"hacking/507470932/\"> two vulnerabilities that affect several models of "
-"implantable defibrillators</a> and the devices they connect to."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This protocol has been around since 2006, and similar vulnerabilities were "
-"discovered in an earlier Medtronics communication protocol in 2008. "
-"Apparently, nothing was done by the company to correct them. This means you "
-"can't rely on proprietary software developers to fix bugs in their products."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- pt-br.po 18 Apr 2019 10:00:41 -0000 1.92
+++ pt-br.po 20 Apr 2019 07:31:42 -0000 1.93
@@ -2313,6 +2313,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2499,22 +2522,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- ru.po 18 Apr 2019 12:02:32 -0000 1.157
+++ ru.po 20 Apr 2019 07:31:42 -0000 1.158
@@ -3164,6 +3164,37 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
+"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
+"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по "
+"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. "
+"ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+"ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ "
+"компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ, и Ñ Ð¿Ð¾Ð»ÑзоваÑелей "
+"бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¸ÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½."
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -3401,30 +3432,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-"РФолÑкÑвагене запÑогÑаммиÑовали
компÑÑÑеÑÑ Ð² двигаÑелÑÑ
ÑвоиÑ
авÑомобилей "
-"на <a href=\"https://www.petri.com/volkswagen-used-software-to-cheat-on-"
-"emissions\">обнаÑÑжение ÑеÑÑов вÑÑ
лопнÑÑ
газов, пÑоводимÑÑ
ÐгенÑÑÑвом по "
-"оÑ
Ñане окÑÑжаÑÑей ÑÑедÑ</a> СШÐ, и
загÑÑзнÑÑÑ Ð²Ð¾Ð·Ð´ÑÑ
вÑе оÑÑалÑное вÑемÑ. "
-"ÐÑи движении в ÑеалÑнÑÑ
ÑÑловиÑÑ
авÑомобили пÑевÑÑали ноÑÐ¼Ñ Ð²ÑÑ
лопа в 35 Ñаз."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-"ÐÑименение ÑвободнÑÑ
пÑогÑамм не
помеÑало Ð±Ñ Ð¤Ð¾Ð»ÑкÑвагенÑ
запÑогÑаммиÑоваÑÑ "
-"компÑÑÑÐµÑ Ñаким обÑазом, но ÑÑо бÑло бÑ
ÑÑÑднее ÑкÑÑÑÑ, и Ñ Ð¿Ð¾Ð»ÑзоваÑелей "
-"бÑла Ð±Ñ Ð²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾ÑÑÑ Ð¸ÑпÑавиÑÑ Ð¾Ð±Ð¼Ð°Ð½."
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
@@ -4401,8 +4408,8 @@
"airplane-mode-turned-on/\"> it saved up the data, and sent them all later</"
"a>."
msgstr ""
-"ÐÑло обнаÑÑжено, ÑÑо ÑелеÑон на базе Android
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¼ÐµÑÑоположение "
-"даже в Ñежиме полеÑа. Ð ÑÑом Ñежиме даннÑе
Ð¾Ñ Ð½Ðµ оÑÑÑлал. ÐмеÑÑо ÑÑого <a href="
+"ÐÑло обнаÑÑжено, ÑÑо ÑелеÑон на базе Android
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°ÐµÑ Ð¼ÐµÑÑоположение даже "
+"в Ñежиме полеÑа. Ð ÑÑом Ñежиме даннÑе Ð¾Ñ Ð½Ðµ
оÑÑÑлал. ÐмеÑÑо ÑÑого <a href="
"\"https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-"
"airplane-mode-turned-on/\"> Ð¾Ñ ÑоÑ
ÑанÑл даннÑе и
оÑÑÑлал иÑ
впоÑледÑÑвии</a>."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- zh-tw.po 18 Apr 2019 10:00:41 -0000 1.70
+++ zh-tw.po 20 Apr 2019 07:31:42 -0000 1.71
@@ -2233,6 +2233,29 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Volkswagen programmed its car engine computers to <a href=\"https://www."
+"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
+"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
+"of the time. In real driving, the cars exceeded emissions standards by a "
+"factor of up to 35."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Using free software would not have stopped Volkswagen from programming it "
+"this way, but would have made it harder to conceal, and given the users the "
+"possibility of correcting the deception."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Former executives of Volkswagen have been <a href=\"https://www.theguardian."
+"com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-"
+"prison\"> charged with this fraud</a> in Germany."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Tesla cars collect lots of personal data, and <a href=\"https://www.cnbc."
"com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-"
"contacts.html\"> when they go to a junkyard the driver's personal data goes "
@@ -2390,22 +2413,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Volkswagen programmed its car engine computers to <a href=\"https://www."
-"petri.com/volkswagen-used-software-to-cheat-on-emissions\"> detect the "
-"Environmental Protection Agency's emission tests</a>, and run dirty the rest "
-"of the time. In real driving, the cars exceeded emissions standards by a "
-"factor of up to 35."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"Using free software would not have stopped Volkswagen from programming it "
-"this way, but would have made it harder to conceal, and given the users the "
-"possibility of correcting the deception."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"Security researchers discovered a <a href=\"http://www.theguardian.com/"
"technology/2015/aug/12/hack-car-brakes-sms-text\"> vulnerability in "
"diagnostic dongles used for vehicle tracking and insurance</a> that let them "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/01
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/05
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/09
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/09
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/17
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/18
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/18
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/20
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/26
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/04/27