[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 18 May 2019 04:29:48 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/05/18 04:29:46
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.ru.po nl.po
pl.po pot proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary-jails.de-diff.html
proprietary-jails.de.po proprietary-jails.es.po
proprietary-jails.fr.po
proprietary-jails.it-diff.html
proprietary-jails.it.po
proprietary-jails.ja-diff.html
proprietary-jails.ja.po proprietary-jails.pot
proprietary-jails.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.103&r2=1.104
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.129&r2=1.130
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de-diff.html?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.de.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.es.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.fr.po?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.it.po?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ja.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.pot?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-jails.ru.po?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.111&r2=1.112
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.190&r2=1.191
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.87&r2=1.88
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- de.po 10 May 2019 17:02:54 -0000 1.87
+++ de.po 18 May 2019 08:29:44 -0000 1.88
@@ -1146,6 +1146,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -10889,17 +10903,6 @@
msgid "Latest additions"
msgstr "Letzte Ergänzungen"
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -12074,6 +12077,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- es.po 14 May 2019 10:29:47 -0000 1.116
+++ es.po 18 May 2019 08:29:44 -0000 1.117
@@ -976,6 +976,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -8891,42 +8905,6 @@
msgid "Latest additions"
msgstr "Añadidos recientes"
-# | As of April 2019, it is <a
-# |
href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk{+/+}\">no
-# | longer possible to disable an unscrupulous tracking anti-feature</a> that
-# | <a
-# |
href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing\">reports
-# | users when they follow ping links</a> in Apple Safari, Google Chrome,
-# | Opera, Microsoft Edge and also in the upcoming Microsoft Edge that going
-# | to be based on Chromium.
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-#| "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
-#| "risk\">no longer possible to disable an unscrupulous tracking anti-"
-#| "feature</a> that <a href=\"https://html.spec.whatwg.org/multipage/links."
-#| "html#hyperlink-auditing\">reports users when they follow ping links</a> "
-#| "in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the "
-#| "upcoming Microsoft Edge that going to be based on Chromium."
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-"Desde abril de 2019, ya <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
-"\">no es posible deshabilitar una descarada funcionalidad de rastreo</a> que "
-"<a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">revela la IP de los usuarios que siguen un enlace provisto del "
-"atributo <cite>ping</cite></a>. Esto sucede en Apple Safari, Google Chrome, "
-"Opera, Microsoft Edge y también en la próxima versión de Microsoft Edge
que "
-"estará basada en Chromium."
-
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -9791,6 +9769,42 @@
"proprietary”</a>, but the surveillance is an abuse all the same."
msgstr ""
+# | As of April 2019, it is <a
+# |
href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk{+/+}\">no
+# | longer possible to disable an unscrupulous tracking anti-feature</a> that
+# | <a
+# |
href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing\">reports
+# | users when they follow ping links</a> in Apple Safari, Google Chrome,
+# | Opera, Microsoft Edge and also in the upcoming Microsoft Edge that going
+# | to be based on Chromium.
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+#| "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
+#| "risk\">no longer possible to disable an unscrupulous tracking anti-"
+#| "feature</a> that <a href=\"https://html.spec.whatwg.org/multipage/links."
+#| "html#hyperlink-auditing\">reports users when they follow ping links</a> "
+#| "in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the "
+#| "upcoming Microsoft Edge that going to be based on Chromium."
+msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+"Desde abril de 2019, ya <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">no es posible deshabilitar una descarada funcionalidad de rastreo</a> que "
+"<a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">revela la IP de los usuarios que siguen un enlace provisto del "
+"atributo <cite>ping</cite></a>. Esto sucede en Apple Safari, Google Chrome, "
+"Opera, Microsoft Edge y también en la próxima versión de Microsoft Edge
que "
+"estará basada en Chromium."
+
# | Until 2015, any tweet that listed a geographical tag <a
# |
[-href=\"https://www.wired.com/story/twitter-location-data-gps-privacy/\">-]
# |
{+href=\"http://web-old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-location-data-gps-privacy/\">+}
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- fr.po 10 May 2019 17:59:15 -0000 1.151
+++ fr.po 18 May 2019 08:29:44 -0000 1.152
@@ -972,6 +972,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -9155,26 +9169,6 @@
msgid "Latest additions"
msgstr "Ajouts récents"
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-"Depuis avril 2019, il n'est <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">plus possible de désactiver le dispositif de pistage par <cite>ping</"
-"cite></a> dans Apple Safari, Google Chrome, Opera, Microsoft Edge, et aussi "
-"dans la prochaine version de Microsoft Edge qui sera basée sur Chromium. Ce "
-"dispositif peu scrupuleux <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
-"\">envoie les IPs des utilisateurs</a> qui suivent les liens munis de "
-"l'attribut <cite>ping</cite> à l'URL définie dans cet attribut."
-
#. type: Content of: <div><p>
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
@@ -10185,6 +10179,26 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+"Depuis avril 2019, il n'est <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">plus possible de désactiver le dispositif de pistage par <cite>ping</"
+"cite></a> dans Apple Safari, Google Chrome, Opera, Microsoft Edge, et aussi "
+"dans la prochaine version de Microsoft Edge qui sera basée sur Chromium. Ce "
+"dispositif peu scrupuleux <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">envoie les IPs des utilisateurs</a> qui suivent les liens munis de "
+"l'attribut <cite>ping</cite> à l'URL définie dans cet attribut."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- it.po 10 May 2019 17:02:55 -0000 1.87
+++ it.po 18 May 2019 08:29:44 -0000 1.88
@@ -1100,6 +1100,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -10134,17 +10148,6 @@
msgid "Latest additions"
msgstr "Ultime aggiunte"
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -11313,6 +11316,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- ja.po 10 May 2019 17:02:55 -0000 1.87
+++ ja.po 18 May 2019 08:29:44 -0000 1.88
@@ -986,6 +986,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -8689,17 +8703,6 @@
msgid "Latest additions"
msgstr "ææ°ã®è¿½å "
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
@@ -9742,6 +9745,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- malware-apple.de-diff.html 8 May 2019 15:01:36 -0000 1.33
+++ malware-apple.de-diff.html 18 May 2019 08:29:44 -0000 1.34
@@ -415,224 +415,230 @@
<p>There</strong></del></span> <span
class="inserted"><ins><em>prison walls, it</em></ins></span> is <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>not
big enough</em></ins></span> to <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active by default so it still
counts as a
- surveillance functionality.</p>
+ deactivate iCloud</a>, but it's active</strong></del></span> <span
class="inserted"><ins><em>mean that the iThings are no longer jails.</p>
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>mean that the iThings are no longer
jails.</p>
+<h4>Examples of censorship</em></ins></span> by <span
class="removed"><del><strong>default so it still counts as a
+ surveillance functionality.</p>
-<h4>Examples</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>censorship by Apple jails</h4>
+ <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>Apple jails</h4>
<ul class="blurbs">
- <li id="M201710130">
- <p>Apple is</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ <li id="M201905150">
+ <p>Users caught in the jail</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>an iMonster are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
nude photos</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship</em></ins></span> of <span
class="removed"><del><strong>many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>apps is
fundamentally unjust, and would be
+ inexcusable even if it didn't lead</em></ins></span> to <span
class="removed"><del><strong>break Apple's</strong></del></span> security <span
class="removed"><del><strong>to get at them, but NSA can access any of them
through</strong></del></span> <span class="inserted"><ins><em>threats as
well.</p>
+ </li>
+
+ <li id="M201710130">
+ <p>Apple is</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ MacOS automatically sends to</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
censoring apps for the US government too</a>. Specifically, it is
deleting apps developed by Iranians.</p>
- <p>The root</em></ins></span> of <span
class="removed"><del><strong>many celebrities</a>. They needed to break
Apple's
- security</strong></del></span> <span class="inserted"><ins><em>these
wrongs are in Apple. If Apple had not designed
- the iMonsters</em></ins></span> to <span class="removed"><del><strong>get
at them, but NSA can access any</strong></del></span> <span
class="inserted"><ins><em>let Apple censor applications, Apple would not have
- had the power to stop users from installing whatever
kind</em></ins></span> of <span class="removed"><del><strong>them
through</strong></del></span> <span class="inserted"><ins><em>apps.</p>
+ <p>The root of these wrongs are in Apple. If</em></ins></span> Apple
<span class="removed"><del><strong>servers unsaved documents being
+ edited</a>. The <a
+
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
+ things you have</strong></del></span> <span
class="inserted"><ins><em>had</em></ins></span> not <span
class="removed"><del><strong>decided to save are even more sensitive
than</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span>
+ the
+ <span class="removed"><del><strong>things you</strong></del></span> <span
class="inserted"><ins><em>iMonsters to let Apple censor applications, Apple
would not</em></ins></span> have <span class="removed"><del><strong>stored in
files</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>had the power to stop users from
installing whatever kind of apps.</p></em></ins></span>
</li>
- <li id="M201707290">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
+ <span class="removed"><del><strong><li><p>Apple has made
various</strong></del></span>
- <li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- MacOS automatically sends</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201707290">
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
deleted several VPNs from its app store for China</a>, thus using its
- own censorship power</em></ins></span> to <span
class="removed"><del><strong>Apple servers unsaved documents being
- edited</a>. The</strong></del></span> <span
class="inserted"><ins><em>strengthen that of the Chinese government.</p>
+ own censorship power</em></ins></span> to <span
class="removed"><del><strong>Apple servers without asking permission</a>.
+ This exposes</strong></del></span> <span
class="inserted"><ins><em>strengthen that of</em></ins></span> the <span
class="removed"><del><strong>files to Big Brother and
perhaps</strong></del></span> <span class="inserted"><ins><em>Chinese
government.</p>
</li>
<li id="M201701064">
- <p>Apple used its censorship system to enforce Russian
surveillance</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
- things you have not decided</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ <p>Apple used its censorship system</em></ins></span> to <span
class="removed"><del><strong>other snoops.</p>
+
+ <p>It also demonstrates how you can't trust proprietary
software,</strong></del></span> <span class="inserted"><ins><em>enforce Russian
surveillance <a
+
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
- <p>This is ironic because LinkedIn is a surveillance system itself.
- While subjecting its users</em></ins></span> to <span
class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>its own surveillance, it tries to
- protect its users from Russian surveillance, and is therefore subject
+ <p>This is ironic</em></ins></span> because <span
class="removed"><del><strong>even if today's version doesn't
have</strong></del></span> <span class="inserted"><ins><em>LinkedIn
is</em></ins></span> a <span class="removed"><del><strong>malicious
+ functionality, tomorrow's version might add it. The developer won't
+ remove the malfeature unless many</strong></del></span> <span
class="inserted"><ins><em>surveillance system itself.
+ While subjecting its</em></ins></span> users <span
class="removed"><del><strong>push back hard,</strong></del></span> <span
class="inserted"><ins><em>to its own surveillance, it tries to
+ protect its users from Russian surveillance,</em></ins></span> and <span
class="inserted"><ins><em>is therefore subject
to Russian censorship.</p>
- <p>However, the point here is the wrong of Apple's censorship of
- apps.</p>
+ <p>However,</em></ins></span> the <span
class="removed"><del><strong>users
+ can't remove it themselves.</p></strong></del></span> <span
class="inserted"><ins><em>point here is the wrong of Apple's censorship of
+ apps.</p></em></ins></span>
</li>
- <li id="M201701050">
- <p>Apple used its censorship system to enforce China's censorship
<a
-
href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
- by blocking distribution of the New York Times app</a>.</p>
+ <span class="removed"><del><strong><li><p>Various operations
in</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201701050">
+ <p>Apple used its censorship system to enforce China's
censorship</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
+ by blocking distribution of</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send reports to Apple</a>
servers.</p></strong></del></span> <span class="inserted"><ins><em>New
York Times app</a>.</p></em></ins></span>
</li>
- <li id="M201605190">
- <p>Apple censors games, <a
-
href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
- banning some games from the cr…app store</a> because of which
- political points they suggest. Some political points</em></ins></span> are
<span class="removed"><del><strong>even more sensitive
than</strong></del></span> <span class="inserted"><ins><em>apparently
+ <span class="removed"><del><strong><li><p>Spyware in
MacOS:</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605190">
+ <p>Apple censors games,</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms to Apple.</p>
+ </li>
+
+ <li><p>Apple admits</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
+ banning some games from</em></ins></span> the <span
class="inserted"><ins><em>cr…app store</a> because of which
+ political points they suggest. Some political points are apparently
considered acceptable.</p>
</li>
<li id="M201509290">
- <p>Apple <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
- banned a program from</em></ins></span> the
- <span class="removed"><del><strong>things you have stored in
files</a>.</p></strong></del></span> <span
class="inserted"><ins><em>App Store</a> because its developers
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+ spying in a search facility</a>, but there's</strong></del></span>
<span
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+ banned</em></ins></span> a <span class="removed"><del><strong>lot
+ <a href="https://github.com/fix-macosx/yosemite-phone-home">
+ more snooping that Apple has not talked
about</a>.</p></strong></del></span> <span
class="inserted"><ins><em>program from the App Store</a> because its
developers
committed the enormity of disassembling some
iThings.</p></em></ins></span>
</li>
- <span
class="removed"><del><strong><li><p>Apple</strong></del></span>
+ <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span>
<span class="inserted"><ins><em><li id="M201509230">
- <p>As of 2015, Apple <a
-
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+ <p>As</em></ins></span> of <span class="removed"><del><strong>iOS
seem to exist for no possible
+ purpose other than surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>2015,
Apple</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
+
+ <li><p>The</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
systematically bans apps that endorse abortion rights or would help
women find abortions</a>.</p>
- <p>This particular political slant <a
-
href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects other Apple services</a>.</p>
+ <p>This particular political slant</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing is, and
+ get</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
+ affects</em></ins></span> other <span class="removed"><del><strong>info
too.</p></strong></del></span> <span class="inserted"><ins><em>Apple
services</a>.</p></em></ins></span>
</li>
- <li id="M201506250">
- <p>Apple</em></ins></span> has <span
class="removed"><del><strong>made various</strong></del></span> <span
class="inserted"><ins><em>banned iThing
- applications that show the confederate flag.</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
- MacOS programs send files</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506250">
+ <p>Apple has banned iThing
+ applications that show</em></ins></span> the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>confederate flag.</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
- Not only those that use it as a symbol of racism</a>, but even
- strategic games that use it</em></ins></span> to <span
class="removed"><del><strong>Apple servers without asking permission</a>.
- This exposes</strong></del></span> <span class="inserted"><ins><em>represent
confederate army units
- fighting in the Civil War.</p>
+ Not only those that use it</em></ins></span> as <span
class="removed"><del><strong>Apple claims</a>.</p>
+ </li>
+</ul>
+
+
+<h3 id="incompatibility">Apple Incompatibility</h3>
- <p>This ludicrous rigidity illustrates</em></ins></span> the <span
class="removed"><del><strong>files to Big Brother and
perhaps</strong></del></span> <span class="inserted"><ins><em>point that Apple
should
- not be allowed</em></ins></span> to <span
class="removed"><del><strong>other snoops.</p>
+<p>In this section, we list characteristics</strong></del></span> <span
class="inserted"><ins><em>a symbol</em></ins></span> of <span
class="removed"><del><strong>Apple programs</strong></del></span> <span
class="inserted"><ins><em>racism</a>, but even
+ strategic games</em></ins></span> that <span
class="removed"><del><strong>block or
+hinder users from switching</strong></del></span> <span
class="inserted"><ins><em>use it</em></ins></span> to <span
class="removed"><del><strong>any alternative
program—and,</strong></del></span> <span
class="inserted"><ins><em>represent confederate army units
+ fighting</em></ins></span> in
+<span class="removed"><del><strong>particular, from switching to free software
which can liberate</strong></del></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>Civil War.</p>
- <p>It also demonstrates how you can't trust proprietary software,
- because even</strong></del></span> <span class="inserted"><ins><em>censor
apps. Even</em></ins></span> if <span class="removed"><del><strong>today's
version doesn't</strong></del></span> <span class="inserted"><ins><em>Apple
carried out this act of
+ <p>This ludicrous rigidity illustrates</em></ins></span> the <span
class="removed"><del><strong>software runs on.</p>
+
+<ul>
+<li>
+<p>Apple devices lock users in <a
+href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+solely to</strong></del></span> <span class="inserted"><ins><em>point
that</em></ins></span> Apple <span
class="removed"><del><strong>services</a> by being designed
to</strong></del></span> <span class="inserted"><ins><em>should
+ not</em></ins></span> be <span class="removed"><del><strong>incompatible
with all
+other options, ethical</strong></del></span> <span
class="inserted"><ins><em>allowed to censor apps. Even if Apple carried out
this act of
censorship with some care, it would still be wrong. Whether racism
is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not</em></ins></span> have <span
class="removed"><del><strong>a malicious
- functionality, tomorrow's version might add it. The developer won't
- remove</strong></del></span> the <span
class="removed"><del><strong>malfeature unless many users push back
hard,</strong></del></span> <span class="inserted"><ins><em>power to impose its
views
- about either of these questions, or any other.</p>
+ the real issue. Apple should not have the power to impose its views
+ about either of these questions,</em></ins></span> or <span
class="removed"><del><strong>unethical.</p></strong></del></span> <span
class="inserted"><ins><em>any other.</p></em></ins></span>
</li>
- <li id="M201412110">
+<span class="removed"><del><strong><li>
+<p>iWork (office software that runs on MacOS, iOS and iCloud) uses secret
+formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no
means</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary</em></ins></span> and <span
class="removed"><del><strong>the users
- can't remove it themselves.</p></strong></del></span> <span
class="inserted"><ins><em>inconsistent
censorship</a>.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Various
operations</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201405250">
- <p>Apple used this censorship power</em></ins></span> in
- <span class="removed"><del><strong><a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
- the latest MacOS send reports</strong></del></span> <span
class="inserted"><ins><em>2014</em></ins></span> to <span
class="removed"><del><strong>Apple</a> servers.</p>
+ More examples</em></ins></span> of <span
class="removed"><del><strong>converting them</strong></del></span> <span
class="inserted"><ins><em>Apple's arbitrary and inconsistent
censorship</a>.</p>
</li>
- <li><p>Spyware in MacOS:</strong></del></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms to Apple.</p>
- </li>
-
- <li><p>Apple admits</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for</em></ins></span> the
- <span class="removed"><del><strong><a
href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying in a search facility</a>, but there's</strong></del></span>
<span class="inserted"><ins><em>iThings for</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>time. It also</em></ins></span> <a <span
class="removed"><del><strong>href="https://github.com/fix-macosx/yosemite-phone-home">
- more snooping that</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+ <li id="M201405250">
+ <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>or from Open Document Formats</a>.
iWork formats
+have changed several times since they were first introduced. This may have
+had</strong></del></span> <span class="inserted"><ins><em><a
+
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>iThings for a time. It also <a
+
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
- about other crimes such as killing people. Perhaps</em></ins></span>
Apple <span class="removed"><del><strong>has not talked
about</a>.</p></strong></del></span> <span
class="inserted"><ins><em>considers
- killing more acceptable than marijuana.</p></em></ins></span>
+ about other crimes such as killing people. Perhaps Apple considers
+ killing more acceptable than marijuana.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201402070">
+ <li id="M201402070">
<p>Apple rejected an app that displayed the
locations</em></ins></span>
- of <span class="removed"><del><strong>iOS seem to exist for no possible
- purpose other than surveillance</a>. Here is</strong></del></span>
<span class="inserted"><ins><em>US drone assassinations, giving various
excuses. Each
- time</em></ins></span> the <span class="removed"><del><strong><a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
-
- <li><p>The <a class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</strong></del></span>
<span class="inserted"><ins><em>developers fixed one “problem”,
Apple
- complained about another. After</em></ins></span> the <span
class="removed"><del><strong>iThing is, and
- get other info too.</p>
- </li>
+ of <span class="removed"><del><strong>thwarting</strong></del></span>
<span class="inserted"><ins><em>US drone assassinations, giving various
excuses. Each
+ time the developers fixed one “problem”, Apple
+ complained about another. After the fifth rejection,
Apple</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://github.com/obriensp/iWorkFileFormat">reverse
engineering
+efforts</a>, thus preventing free software from fully supporting
them.</p>
- <li><p>Apple can, and regularly does,</strong></del></span>
<span class="inserted"><ins><em>fifth rejection, Apple</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span>
+<p>iWork formats</strong></del></span>
<span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but
- <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>app based on the subject
matter</a>.</p></em></ins></span>
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="incompatibility">Apple
Incompatibility</h3>
-
-<p>In this section, we list characteristics of Apple programs that
block</strong></del></span> <span
class="inserted"><ins><em>id="manipulation">Apple Manipulation</h3>
+<h3 id="manipulation">Apple Manipulation</h3>
<ul class="blurbs">
<li id="M201308290">
- <p>“Dark patterns” are <a
-
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed to mislead users,</em></ins></span> or
-<span class="removed"><del><strong>hinder users from
switching</strong></del></span> <span class="inserted"><ins><em>make option
settings hard</em></ins></span>
- to <span class="removed"><del><strong>any alternative program—and, in
-particular, from switching</strong></del></span> <span
class="inserted"><ins><em>find</a>.</p>
-
- <p>This allows a company such as Apple</em></ins></span> to <span
class="removed"><del><strong>free software which can liberate the device
-the software runs on.</p>
-
-<ul>
-<li>
-<p>Apple devices lock</strong></del></span> <span
class="inserted"><ins><em>say, “We allow</em></ins></span> users <span
class="removed"><del><strong>in <a
-href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
-solely</strong></del></span>
- to <span class="removed"><del><strong>Apple services</a> by being
designed</strong></del></span> <span class="inserted"><ins><em>turn this
off” while ensuring that few will understand how</em></ins></span>
- to <span class="removed"><del><strong>be incompatible with all
-other options, ethical or unethical.</p></strong></del></span> <span
class="inserted"><ins><em>actually turn it off.</p></em></ins></span>
+ <p>“Dark patterns”</em></ins></span> are <span
class="removed"><del><strong>considered</strong></del></span> <a
+<span
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
+unfit for document preservation</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
+ interfaces designed to mislead users, or make option settings hard
+ to find</a>.</p>
+
+ <p>This allows a company such as Apple to say, “We allow users
+ to turn this off” while ensuring that few will understand how
+ to actually turn it off.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>iWork (office software that runs on MacOS, iOS and iCloud) uses secret
-formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no
means</strong></del></span>
+<p>In MacOS and iOS,</strong></del></span>
<span class="inserted"><ins><em></ul>
<h3 id="pressuring">Apple Pressuring</h3>
-<p>Proprietary companies can take advantage</em></ins></span> of <span
class="removed"><del><strong>converting them</strong></del></span> <span
class="inserted"><ins><em>their customers by imposing arbitrary
limits</em></ins></span> to <span class="removed"><del><strong>or from Open
Document Formats</a>. iWork formats
-have changed several times since they were first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em>their use
of</em></ins></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>software. This section reports
examples</em></ins></span> of <span class="removed"><del><strong>thwarting <a
-href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
-efforts</a>, thus preventing free software from fully supporting
them.</p>
-
-<p>iWork formats are considered <a
-href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
-unfit for document preservation</a>.</p>
-</li>
-
-<li>
-<p>In MacOS</strong></del></span> <span class="inserted"><ins><em>hard
sell</em></ins></span> and <span class="removed"><del><strong>iOS, the
procedure for</strong></del></span> <span class="inserted"><ins><em>other
unjust commercial tactics by Apple.</p>
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of</em></ins></span> the <span
class="removed"><del><strong>procedure for</strong></del></span> <span
class="inserted"><ins><em>software. This section reports examples of hard sell
and other unjust commercial tactics by Apple.</p>
<ul class="blurbs">
<li id="M201510270">
@@ -1152,7 +1158,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:36 $
+$Date: 2019/05/18 08:29:44 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- malware-apple.de.po 8 May 2019 15:01:36 -0000 1.128
+++ malware-apple.de.po 18 May 2019 08:29:44 -0000 1.129
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -539,6 +539,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-apple.es.po 9 May 2019 10:08:08 -0000 1.133
+++ malware-apple.es.po 18 May 2019 08:29:44 -0000 1.134
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -458,6 +459,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- malware-apple.fr.po 8 May 2019 16:35:29 -0000 1.140
+++ malware-apple.fr.po 18 May 2019 08:29:44 -0000 1.141
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2019-05-08 18:16+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -456,6 +457,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- malware-apple.it-diff.html 8 May 2019 15:01:36 -0000 1.41
+++ malware-apple.it-diff.html 18 May 2019 08:29:44 -0000 1.42
@@ -306,6 +306,16 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -419,41 +429,40 @@
<ul>
<li>
- <p>A vulnerability in</strong></del></span> <span
class="inserted"><ins><em>the power to impose its views
- about either of these questions, or any other.</p>
+ <p>A vulnerability in Apple's Image I/O API allowed an
attacker</strong></del></span> <span class="inserted"><ins><em>the
power</em></ins></span> to <span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from</strong></del></span> <span
class="inserted"><ins><em>impose its views
+ about either of these questions, or</em></ins></span> any <span
class="removed"><del><strong>application which uses</strong></del></span> <span
class="inserted"><ins><em>other.</p>
</li>
<li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of</em></ins></span> Apple's <span
class="removed"><del><strong>Image I/O API allowed an
attacker</strong></del></span> <span class="inserted"><ins><em>arbitrary and
inconsistent censorship</a>.</p>
+ More examples of Apple's arbitrary and inconsistent
censorship</a>.</p>
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014</em></ins></span> to
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application which uses this API to render
- a certain kind of image file</a>.</p>
- </li>
-
- <li>
- <p>A bug in</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for the iThings for a time. It also <a
+ <p>Apple used</em></ins></span> this <span
class="removed"><del><strong>API</strong></del></span> <span
class="inserted"><ins><em>censorship power in 2014</em></ins></span> to <span
class="removed"><del><strong>render</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ ban all bitcoin apps</a> for the iThings for</em></ins></span> a
<span class="removed"><del><strong>certain kind of image
file</a>.</p></strong></del></span> <span
class="inserted"><ins><em>time. It also <a
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
- killing more acceptable than marijuana.</p>
+ killing more acceptable than marijuana.</p></em></ins></span>
</li>
- <li id="M201402070">
+ <span class="removed"><del><strong><li>
+ <p>A bug in</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201402070">
<p>Apple rejected an app that displayed the locations
of US drone assassinations, giving various excuses. Each
- time the developers fixed one “problem”, Apple
- complained about another. After the fifth rejection, Apple <a
- href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>iThings Messages</strong></del></span> app <span
class="removed"><del><strong><a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
- a malicious web site to extract all</strong></del></span> <span
class="inserted"><ins><em>based on</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>subject
matter</a>.</p></em></ins></span>
+ time</em></ins></span> the <span class="removed"><del><strong>iThings
Messages
+ app</strong></del></span> <span class="inserted"><ins><em>developers
fixed one “problem”, Apple
+ complained about another. After the fifth rejection,
Apple</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
+ a malicious web site to extract all</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ admitted it was censoring</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>app based
on the subject matter</a>.</p></em></ins></span>
</li>
</ul>
@@ -503,40 +512,40 @@
<span class="removed"><del><strong><p>The wrongs in this
section</strong></del></span>
<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>which Apple employs its power over users
-to directly intervene in ways</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
+not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way that hurts the user.
+But they are a lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> Apple
+<span class="removed"><del><strong>actions</strong></del></span> <span
class="inserted"><ins><em>employs its power over users
+to directly intervene in ways</em></ins></span> that harm <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>them or block their work.</p>
<ul class="blurbs">
<li id="M201810240">
<p>Apple and Samsung deliberately <a
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
- the <span class="removed"><del><strong>user.
-But they are</strong></del></span> <span class="inserted"><ins><em>performance
of older phones to force users to buy their newer
+ the <span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>performance</em></ins></span> of <span
class="removed"><del><strong>specific</strong></del></span> <span
class="inserted"><ins><em>older phones to force users to buy their newer
phones</a>.</p>
</li>
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>month</a>.</p>
+ Telegram from upgrading its app for a month</a>.</p>
- <p>This evidently has to do with Russia's command
to</em></ins></span> Apple
-<span class="removed"><del><strong>actions that harm</strong></del></span> to
<span class="inserted"><ins><em>block
+ <p>This evidently has to do with Russia's command
to</em></ins></span> Apple <span class="inserted"><ins><em>to block
Telegram in Russia.</p>
<p>The Telegram client is free software on other platforms, but not
on
iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>, they don't permit any app to be free
software.</p>
- </li>
+ are jails</a>, they don't permit any app to be
free</em></ins></span> software.</p>
+
+<span class="removed"><del><strong><ul>
+ <li></strong></del></span>
+ <span class="inserted"><ins><em></li>
<li id="M201710044">
<p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
- changes</em></ins></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>file system from HFS+ to APFS</a>, which
cannot be
- accessed from GNU/Linux, Windows or even older versions</em></ins></span>
of <span class="removed"><del><strong>specific Apple software.</p>
-
-<ul>
- <li></strong></del></span> <span
class="inserted"><ins><em>MacOS.</p>
+ changes the file system from HFS+ to APFS</a>, which cannot be
+ accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
<li id="M201706060"></em></ins></span>
@@ -742,26 +751,24 @@
<p>It also demonstrates how you can't trust proprietary software,
because even if today's version doesn't have a malicious functionality,
tomorrow's version might add it. The developer won't remove the
- malfeature unless many users push back hard, and the <span
class="removed"><del><strong>users
- can't remove it themselves.</p>
+ malfeature unless many users push back hard, and the users can't
+ remove it themselves.</p>
</li>
- <li><p>Various operations in
- <a
href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
- the latest MacOS send reports to Apple</a>
servers.</p></strong></del></span> <span class="inserted"><ins><em>users
can't
- remove it themselves.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Spyware in
MacOS:</strong></del></span>
+ <span class="removed"><del><strong><li><p>Various operations
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201410300">
- <p> MacOS automatically</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/"></em></ins></span>
- sends <span class="removed"><del><strong>users' search
terms</strong></del></span> to <span
class="removed"><del><strong>Apple.</p></strong></del></span> <span
class="inserted"><ins><em>Apple servers unsaved documents being
edited</a>. The
+ <p> MacOS automatically</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170831144456/https://www.washingtonpost.com/news/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
+ sends to Apple servers unsaved documents being edited</a>. The
things you have not decided to save are <a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter/">
- even more sensitive</a> than the things you have stored in
files.</p></em></ins></span>
+ even more sensitive</a> than</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send reports to Apple</a>
servers.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>things you have stored</em></ins></span> in <span
class="removed"><del><strong>MacOS:
+ <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms to
Apple.</p></strong></del></span> <span
class="inserted"><ins><em>files.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Apple</strong></del></span>
@@ -813,104 +820,107 @@
<li><p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
illegal to study how iOS cr...apps spy on users</a>, because this
- would require circumventing the</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201407230">
- <p><a
-
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of</em></ins></span> iOS <span
class="removed"><del><strong>DRM.</p>
+ would require circumventing the iOS DRM.</p>
</li>
<li><p><a
href="http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017">
- Apple uses DRM software</strong></del></span> <span
class="inserted"><ins><em>seem</em></ins></span> to <span
class="removed"><del><strong>prevent people from charging an iThing with a
+ Apple uses DRM software to prevent people from charging an iThing with a
generic USB cable</a>.</p></li>
<li><p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on the fact that a new model of Macbook introduced a
requirement</strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
- for <span class="removed"><del><strong>monitors to have malicious
hardware, but DRM software in MacOS</strong></del></span> <span
class="inserted"><ins><em>no possible purpose other than
surveillance</a>. Here</em></ins></span> is
- <span class="removed"><del><strong>involved in
activating</strong></del></span> the <span
class="removed"><del><strong>hardware. The software for accessing iTunes
- is also responsible.</p></strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></em></ins></span>
+ focuses on the fact that a new model of Macbook introduced a requirement
+ for monitors to have malicious hardware, but DRM software in MacOS is
+ involved in activating the hardware. The software for accessing iTunes
+ is also responsible.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters</strong></del></span>
+ <li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM that caters to Bluray disks</a>. (The article focused on Windows
+ and said that MacOS would do the same thing
subsequently.)</p></li>
+</ul>
+
+<h3 id="jails">Apple Jails</h3>
+<ul>
+ <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
+ iOS, the operating system of the Apple iThings, is a jail for
+ users.</a> That means it imposes censorship of application
programs.</p>
+
+ <p>Apple has used this power to
+ <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ censor all bitcoin apps</a> for the iThings.</p>
+
+ <p>Apple, in the iThings, pioneered the practice</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407230">
+ <p><a
+
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</em></ins></span> of <span
class="removed"><del><strong>general purpose
+ computers that are jails, and the term comes from iThing users, who
+ referred to escaping from the censorship as
“jailbreaking.”</p>
+
+ <p>Here</strong></del></span> <span class="inserted"><ins><em>iOS seem
to exist
+ for no possible purpose other than surveillance</a>.
Here</em></ins></span> is <span class="removed"><del><strong>an article
about</strong></del></span> the <a
+ <span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+ code signing</a> that the iThings use</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201401100.1">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="removed"><del><strong>Bluray disks</a>. (The article
focused on Windows
- and said that MacOS would do</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
+ Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="removed"><del><strong>jail</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
</li>
<li id="M201401100">
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>same thing
subsequently.)</p></li>
-</ul>
+ iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>user.</p>
-<h3 id="jails">Apple Jails</h3>
-<ul>
- <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
- iOS,</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+ <p>Curiously,</strong></del></span> <span
class="inserted"><ins><em>iThing is, and
get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>operating system of</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="inserted"><ins><em>data in an iThing, or it
+ Either</em></ins></span> Apple <span class="removed"><del><strong>is
beginning to allow limited passage through the
+ walls of</strong></del></span> <span
class="inserted"><ins><em>helps</em></ins></span> the <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="inserted"><ins><em>data in an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also <a
+ <p>The</em></ins></span> iThing <span
class="removed"><del><strong>jail: users</strong></del></span> <span
class="inserted"><ins><em>also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</em></ins></span> Apple <span
class="removed"><del><strong>iThings,</strong></del></span> <span
class="inserted"><ins><em>its geolocation</a> by default, though that can
be
+ tells Apple its geolocation</a> by default, though
that</em></ins></span> can <span class="removed"><del><strong>now install apps
built from
+ source code, provided the source code</strong></del></span> <span
class="inserted"><ins><em>be
turned off.</p>
</li>
<li id="M201210170">
- <p>There</em></ins></span> is <span
class="inserted"><ins><em>also</em></ins></span> a <span
class="removed"><del><strong>jail</strong></del></span> <span
class="inserted"><ins><em>feature</em></ins></span> for
- <span class="removed"><del><strong>users.</a> That means it imposes
censorship of application programs.</p>
-
- <p>Apple has used this power</strong></del></span> <span
class="inserted"><ins><em>web sites</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- censor all bitcoin apps</a> for the iThings.</p>
-
- <p>Apple, in the iThings, pioneered the practice of general purpose
- computers that are jails, and the term comes from
iThing</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> users, <span
class="removed"><del><strong>who
- referred to escaping from the censorship as
“jailbreaking.”</p>
+ <p>There</em></ins></span> is <span
class="removed"><del><strong>written in Swift. Users
+ cannot do this freely because they are required</strong></del></span> <span
class="inserted"><ins><em>also a feature for web sites</em></ins></span> to
<span class="removed"><del><strong>identify themselves.
+ <a href="https://developer.apple.com/xcode/">Here are
details.</a></p>
- <p>Here</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> is <span
class="removed"><del><strong>an</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>While this</strong></del></span> <span
class="inserted"><ins><em>track users, which</em></ins></span> is <span
class="removed"><del><strong>a crack in the prison walls,</strong></del></span>
<span class="inserted"><ins><em><a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</em></ins></span> article <span
class="inserted"><ins><em>talks</em></ins></span> about <span
class="removed"><del><strong>the <a
- href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the iThings use to jail the user.</p>
-
- <p>Curiously, Apple is beginning to allow limited passage through the
- walls of the the iThing jail: users can now install apps built from
- source code, provided the source code</strong></del></span> <span
class="inserted"><ins><em>iOS 6, but it</em></ins></span> is <span
class="removed"><del><strong>written</strong></del></span>
- <span class="inserted"><ins><em>still true</em></ins></span> in <span
class="removed"><del><strong>Swift. Users</strong></del></span> <span
class="inserted"><ins><em>iOS 7.)</p>
+ enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it is <span class="removed"><del><strong>not big
enough</strong></del></span>
+ <span class="inserted"><ins><em>still true in iOS 7.)</p>
</li>
<li id="M201204280">
- <p>Users</em></ins></span> cannot <span
class="removed"><del><strong>do this freely because they are
required</strong></del></span> <span class="inserted"><ins><em>make an Apple ID
(<a
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>identify themselves.
- <a href="https://developer.apple.com/xcode/">Here are
details.</a></p>
-
- <p>While this is</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without
giving</em></ins></span> a <span class="removed"><del><strong>crack
in</strong></del></span> <span class="inserted"><ins><em>valid
- email address and receiving</em></ins></span> the <span
class="removed"><del><strong>prison walls, it is not big
enough</strong></del></span> <span class="inserted"><ins><em>verification code
Apple sends</em></ins></span>
to
<span class="removed"><del><strong>mean that the iThings are no longer
jails.</p></li>
<li><p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent
censorship</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ More examples of Apple's arbitrary</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>inconsistent
censorship</a>.</p></strong></del></span> <span
class="inserted"><ins><em>receiving the verification code Apple sends
+ to it.</p></em></ins></span>
</li>
</ul>
@@ -1011,7 +1021,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:36 $
+$Date: 2019/05/18 08:29:44 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- malware-apple.it.po 8 May 2019 15:01:36 -0000 1.122
+++ malware-apple.it.po 18 May 2019 08:29:44 -0000 1.123
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -542,6 +542,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- malware-apple.ja-diff.html 8 May 2019 15:01:36 -0000 1.52
+++ malware-apple.ja-diff.html 18 May 2019 08:29:44 -0000 1.53
@@ -333,6 +333,16 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -476,28 +486,30 @@
<span class="removed"><del><strong><p>The wrongs in this
section</strong></del></span>
-<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since
they</strong></del></span> <span class="inserted"><ins><em>situations in which
Apple employs its power over users
-to directly intervene in ways that harm them or block their work.</p>
+<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since they do
+not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>which Apple employs its power over users
+to directly intervene in ways</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
<ul class="blurbs">
<li id="M201810240">
<p>Apple and Samsung deliberately <a
-
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
- the performance of older phones to force users to buy their newer
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
+ the <span class="removed"><del><strong>user.
+But they are</strong></del></span> <span class="inserted"><ins><em>performance
of older phones to force users to buy their newer
phones</a>.</p>
</li>
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for a month</a>.</p>
+ Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>lot like malware, since they</strong></del></span>
<span class="inserted"><ins><em>month</a>.</p>
- <p>This evidently has to</em></ins></span> do <span
class="inserted"><ins><em>with Russia's command to Apple to block
+ <p>This evidently has to do with Russia's command to Apple to block
Telegram in Russia.</p>
- <p>The Telegram client is free software on other platforms,
but</em></ins></span> not <span class="removed"><del><strong>involve
making</strong></del></span> <span class="inserted"><ins><em>on
- iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>, they don't permit any app to be free
software.</p>
+ <p>The Telegram client is free software on other platforms, but not
on
+ iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they</em></ins></span>
+ are <span class="removed"><del><strong>technical</strong></del></span>
<span class="inserted"><ins><em>jails</a>, they don't permit any app to
be free software.</p>
</li>
<li id="M201710044">
@@ -512,7 +524,8 @@
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
- <p>Meanwhile, Apple stops people from fixing problems themselves;
+ <p>Meanwhile,</em></ins></span> Apple
+<span class="removed"><del><strong>actions that harm</strong></del></span>
<span class="inserted"><ins><em>stops people from fixing problems themselves;
that's the nature of proprietary software.</p>
</li>
@@ -523,10 +536,8 @@
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The article uses</em></ins></span> the <span
class="removed"><del><strong>program that runs in a way that
hurts</strong></del></span> <span class="inserted"><ins><em>term
“lock”
- to describe</em></ins></span> the <span class="removed"><del><strong>user.
-But they are a lot like malware, since they are technical Apple
-actions that harm</strong></del></span> <span class="inserted"><ins><em>DRM,
but we prefer</em></ins></span> to <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="inserted"><ins><em>term <a
+ <p>The article uses the term “lock”
+ to describe the DRM, but we prefer</em></ins></span> to <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="inserted"><ins><em>term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
handcuffs</a>.</p>
</li>
@@ -685,11 +696,11 @@
<li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
MacOS automatically sends to Apple servers unsaved documents being
- edited</a>. The</strong></del></span> <span
class="inserted"><ins><em>of them through</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
+ edited</a>. The <a
+
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
things you have not decided to save are even more sensitive than the
- things you have stored in files</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Apple</strong></del></span>
@@ -779,93 +790,96 @@
<li><p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on the fact that a new model</strong></del></span>
+ focuses on the fact that a new model of Macbook introduced a requirement
+ for monitors to have malicious hardware, but DRM software in MacOS is
+ involved in activating the hardware. The software for accessing iTunes
+ is also responsible.</p>
+ </li>
+
+ <li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM that caters to Bluray disks</a>. (The article focused on Windows
+ and said that MacOS would do the same thing
subsequently.)</p></li>
+</ul>
+
+<h3 id="jails">Apple Jails</h3>
+<ul>
+ <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
+ iOS, the operating system of the Apple iThings, is a jail for
+ users.</a> That means it imposes censorship of application
programs.</p>
+
+ <p>Apple has used this power to
+ <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ censor all bitcoin apps</a> for the iThings.</p>
+
+ <p>Apple, in the iThings, pioneered the practice</strong></del></span>
<span class="inserted"><ins><em><li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</em></ins></span> of <span
class="removed"><del><strong>Macbook introduced a requirement
- for monitors</strong></del></span> <span class="inserted"><ins><em>iOS
seem</em></ins></span> to <span class="removed"><del><strong>have malicious
hardware, but DRM software in MacOS is
- involved in activating the hardware. The software</strong></del></span>
<span class="inserted"><ins><em>exist</em></ins></span>
- for <span class="removed"><del><strong>accessing
iTunes</strong></del></span> <span class="inserted"><ins><em>no possible
purpose other than surveillance</a>. Here</em></ins></span> is <span
class="removed"><del><strong>also responsible.</p></strong></del></span>
<span class="inserted"><ins><em>the <a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></em></ins></span>
- </li>
+ Several “features”</em></ins></span> of <span
class="removed"><del><strong>general purpose
+ computers that are jails, and the term comes from iThing users, who
+ referred to escaping from the censorship as
“jailbreaking.”</p>
- <span class="removed"><del><strong><li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters</strong></del></span>
+ <p>Here</strong></del></span> <span class="inserted"><ins><em>iOS seem
to exist
+ for no possible purpose other than surveillance</a>.
Here</em></ins></span> is <span class="removed"><del><strong>an article
about</strong></del></span> the <a
+ <span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+ code signing</a> that the iThings use</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201401100.1">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="removed"><del><strong>Bluray disks</a>. (The article
focused on Windows
- and said that MacOS would do</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
+ Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="removed"><del><strong>jail</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
</li>
<li id="M201401100">
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>same thing
subsequently.)</p></li>
-</ul>
+ iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>user.</p>
-<h3 id="jails">Apple Jails</h3>
-<ul>
- <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
- iOS,</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+ <p>Curiously,</strong></del></span> <span
class="inserted"><ins><em>iThing is, and
get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>operating system of</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="inserted"><ins><em>data in an iThing, or it
+ Either</em></ins></span> Apple <span class="removed"><del><strong>is
beginning to allow limited passage through the
+ walls of</strong></del></span> <span
class="inserted"><ins><em>helps</em></ins></span> the <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="inserted"><ins><em>data in an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also <a
+ <p>The</em></ins></span> iThing <span
class="removed"><del><strong>jail: users</strong></del></span> <span
class="inserted"><ins><em>also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</em></ins></span> Apple <span
class="removed"><del><strong>iThings,</strong></del></span> <span
class="inserted"><ins><em>its geolocation</a> by default, though that can
be
+ tells Apple its geolocation</a> by default, though
that</em></ins></span> can <span class="removed"><del><strong>now install apps
built from
+ source code, provided the source code</strong></del></span> <span
class="inserted"><ins><em>be
turned off.</p>
</li>
<li id="M201210170">
- <p>There</em></ins></span> is <span
class="inserted"><ins><em>also</em></ins></span> a <span
class="removed"><del><strong>jail</strong></del></span> <span
class="inserted"><ins><em>feature</em></ins></span> for
- <span class="removed"><del><strong>users.</a> That means it imposes
censorship of application programs.</p>
-
- <p>Apple has used this power</strong></del></span> <span
class="inserted"><ins><em>web sites</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- censor all bitcoin apps</a> for the iThings.</p>
-
- <p>Apple, in the iThings, pioneered the practice of general purpose
- computers that are jails, and the term comes from
iThing</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> users, <span
class="removed"><del><strong>who
- referred to escaping from the censorship as
“jailbreaking.”</p>
+ <p>There</em></ins></span> is <span
class="removed"><del><strong>written in Swift. Users
+ cannot do this freely because they are required</strong></del></span> <span
class="inserted"><ins><em>also a feature for web sites</em></ins></span> to
<span class="removed"><del><strong>identify themselves.
+ <a href="https://developer.apple.com/xcode/">Here are
details.</a></p>
- <p>Here</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> is <span
class="removed"><del><strong>an</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>While this</strong></del></span> <span
class="inserted"><ins><em>track users, which</em></ins></span> is <span
class="removed"><del><strong>a crack in the prison walls,</strong></del></span>
<span class="inserted"><ins><em><a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</em></ins></span> article <span
class="inserted"><ins><em>talks</em></ins></span> about <span
class="removed"><del><strong>the <a
- href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the iThings use to jail the user.</p>
-
- <p>Curiously, Apple is beginning to allow limited passage through the
- walls of the the iThing jail: users can now install apps built from
- source code, provided the source code</strong></del></span> <span
class="inserted"><ins><em>iOS 6, but it</em></ins></span> is <span
class="removed"><del><strong>written</strong></del></span>
- <span class="inserted"><ins><em>still true</em></ins></span> in <span
class="removed"><del><strong>Swift. Users</strong></del></span> <span
class="inserted"><ins><em>iOS 7.)</p>
+ enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it is <span class="removed"><del><strong>not big
enough</strong></del></span>
+ <span class="inserted"><ins><em>still true in iOS 7.)</p>
</li>
<li id="M201204280">
- <p>Users</em></ins></span> cannot <span
class="removed"><del><strong>do this freely because they are
required</strong></del></span> <span class="inserted"><ins><em>make an Apple ID
(<a
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>identify themselves.
- <a href="https://developer.apple.com/xcode/">Here are
details.</a></p>
-
- <p>While this is</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without
giving</em></ins></span> a <span class="removed"><del><strong>crack
in</strong></del></span> <span class="inserted"><ins><em>valid
- email address and receiving</em></ins></span> the <span
class="removed"><del><strong>prison walls, it is not big
enough</strong></del></span> <span class="inserted"><ins><em>verification code
Apple sends</em></ins></span>
to
<span class="removed"><del><strong>mean that the iThings are no longer
jails.</p></li>
<li><p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent
censorship</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ More examples of Apple's arbitrary</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>inconsistent
censorship</a>.</p></strong></del></span> <span
class="inserted"><ins><em>receiving the verification code Apple sends
+ to it.</p></em></ins></span>
</li>
</ul>
@@ -966,7 +980,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:36 $
+$Date: 2019/05/18 08:29:44 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.103
retrieving revision 1.104
diff -u -b -r1.103 -r1.104
--- malware-apple.ja.po 8 May 2019 15:01:36 -0000 1.103
+++ malware-apple.ja.po 18 May 2019 08:29:44 -0000 1.104
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -468,6 +468,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-apple.nl-diff.html 8 May 2019 15:01:36 -0000 1.58
+++ malware-apple.nl-diff.html 18 May 2019 08:29:44 -0000 1.59
@@ -333,6 +333,16 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -476,28 +486,30 @@
<span class="removed"><del><strong><p>The wrongs in this
section</strong></del></span>
-<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since
they</strong></del></span> <span class="inserted"><ins><em>situations in which
Apple employs its power over users
-to directly intervene in ways that harm them or block their work.</p>
+<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since they do
+not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>which Apple employs its power over users
+to directly intervene in ways</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
<ul class="blurbs">
<li id="M201810240">
<p>Apple and Samsung deliberately <a
-
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade
- the performance of older phones to force users to buy their newer
+
href="https://www.theguardian.com/technology/2018/oct/24/apple-samsung-fined-for-slowing-down-phones">degrade</em></ins></span>
+ the <span class="removed"><del><strong>user.
+But they are</strong></del></span> <span class="inserted"><ins><em>performance
of older phones to force users to buy their newer
phones</a>.</p>
</li>
<li id="M201805310">
<p>Apple has <a
href="https://www.theverge.com/2018/5/31/17412396/telegram-apple-app-store-app-updates-russia">blocked
- Telegram from upgrading its app for a month</a>.</p>
+ Telegram from upgrading its app for</em></ins></span> a <span
class="removed"><del><strong>lot like malware, since they</strong></del></span>
<span class="inserted"><ins><em>month</a>.</p>
- <p>This evidently has to</em></ins></span> do <span
class="inserted"><ins><em>with Russia's command to Apple to block
+ <p>This evidently has to do with Russia's command to Apple to block
Telegram in Russia.</p>
- <p>The Telegram client is free software on other platforms,
but</em></ins></span> not <span class="removed"><del><strong>involve
making</strong></del></span> <span class="inserted"><ins><em>on
- iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
- are jails</a>, they don't permit any app to be free
software.</p>
+ <p>The Telegram client is free software on other platforms, but not
on
+ iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they</em></ins></span>
+ are <span class="removed"><del><strong>technical</strong></del></span>
<span class="inserted"><ins><em>jails</a>, they don't permit any app to
be free software.</p>
</li>
<li id="M201710044">
@@ -512,7 +524,8 @@
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older model iThings</a>.</p>
- <p>Meanwhile, Apple stops people from fixing problems themselves;
+ <p>Meanwhile,</em></ins></span> Apple
+<span class="removed"><del><strong>actions that harm</strong></del></span>
<span class="inserted"><ins><em>stops people from fixing problems themselves;
that's the nature of proprietary software.</p>
</li>
@@ -523,10 +536,8 @@
brick it if an “unauthorized” repair shop fixes it</a>.
“Unauthorized” essentially means anyone besides
Apple.</p>
- <p>The article uses</em></ins></span> the <span
class="removed"><del><strong>program that runs in a way that
hurts</strong></del></span> <span class="inserted"><ins><em>term
“lock”
- to describe</em></ins></span> the <span class="removed"><del><strong>user.
-But they are a lot like malware, since they are technical Apple
-actions that harm</strong></del></span> <span class="inserted"><ins><em>DRM,
but we prefer</em></ins></span> to <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="inserted"><ins><em>term <a
+ <p>The article uses the term “lock”
+ to describe the DRM, but we prefer</em></ins></span> to <span
class="inserted"><ins><em>use</em></ins></span> the <span
class="inserted"><ins><em>term <a
href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
handcuffs</a>.</p>
</li>
@@ -685,11 +696,11 @@
<li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
MacOS automatically sends to Apple servers unsaved documents being
- edited</a>. The</strong></del></span> <span
class="inserted"><ins><em>of them through</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
+ edited</a>. The <a
+
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
things you have not decided to save are even more sensitive than the
- things you have stored in files</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
+ things you have stored in files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p></em></ins></span>
</li>
<span
class="removed"><del><strong><li><p>Apple</strong></del></span>
@@ -779,93 +790,96 @@
<li><p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
DRM (digital restrictions mechanisms) in MacOS</a>. This article
- focuses on the fact that a new model</strong></del></span>
+ focuses on the fact that a new model of Macbook introduced a requirement
+ for monitors to have malicious hardware, but DRM software in MacOS is
+ involved in activating the hardware. The software for accessing iTunes
+ is also responsible.</p>
+ </li>
+
+ <li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
+ DRM that caters to Bluray disks</a>. (The article focused on Windows
+ and said that MacOS would do the same thing
subsequently.)</p></li>
+</ul>
+
+<h3 id="jails">Apple Jails</h3>
+<ul>
+ <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
+ iOS, the operating system of the Apple iThings, is a jail for
+ users.</a> That means it imposes censorship of application
programs.</p>
+
+ <p>Apple has used this power to
+ <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
+ censor all bitcoin apps</a> for the iThings.</p>
+
+ <p>Apple, in the iThings, pioneered the practice</strong></del></span>
<span class="inserted"><ins><em><li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</em></ins></span> of <span
class="removed"><del><strong>Macbook introduced a requirement
- for monitors</strong></del></span> <span class="inserted"><ins><em>iOS
seem</em></ins></span> to <span class="removed"><del><strong>have malicious
hardware, but DRM software in MacOS is
- involved in activating the hardware. The software</strong></del></span>
<span class="inserted"><ins><em>exist</em></ins></span>
- for <span class="removed"><del><strong>accessing
iTunes</strong></del></span> <span class="inserted"><ins><em>no possible
purpose other than surveillance</a>. Here</em></ins></span> is <span
class="removed"><del><strong>also responsible.</p></strong></del></span>
<span class="inserted"><ins><em>the <a
-
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></em></ins></span>
- </li>
+ Several “features”</em></ins></span> of <span
class="removed"><del><strong>general purpose
+ computers that are jails, and the term comes from iThing users, who
+ referred to escaping from the censorship as
“jailbreaking.”</p>
- <span class="removed"><del><strong><li><p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters</strong></del></span>
+ <p>Here</strong></del></span> <span class="inserted"><ins><em>iOS seem
to exist
+ for no possible purpose other than surveillance</a>.
Here</em></ins></span> is <span class="removed"><del><strong>an article
about</strong></del></span> the <a
+ <span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+ code signing</a> that the iThings use</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201401100.1">
+ <li id="M201401100.1">
<p><a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="removed"><del><strong>Bluray disks</a>. (The article
focused on Windows
- and said that MacOS would do</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
+ Spotlight search</a> sends users' search terms</em></ins></span> to
<span class="removed"><del><strong>jail</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
</li>
<li id="M201401100">
<p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>same thing
subsequently.)</p></li>
-</ul>
+ iBeacon</a> lets stores determine exactly where</em></ins></span>
the <span class="removed"><del><strong>user.</p>
-<h3 id="jails">Apple Jails</h3>
-<ul>
- <li><p><a
href="http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html">
- iOS,</strong></del></span> <span class="inserted"><ins><em>iThing is, and
+ <p>Curiously,</strong></del></span> <span
class="inserted"><ins><em>iThing is, and
get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</em></ins></span> the <span
class="removed"><del><strong>operating system of</strong></del></span> <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="inserted"><ins><em>data in an iThing, or it
+ Either</em></ins></span> Apple <span class="removed"><del><strong>is
beginning to allow limited passage through the
+ walls of</strong></del></span> <span
class="inserted"><ins><em>helps</em></ins></span> the <span
class="inserted"><ins><em>NSA snoop on all</em></ins></span> the <span
class="inserted"><ins><em>data in an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also <a
+ <p>The</em></ins></span> iThing <span
class="removed"><del><strong>jail: users</strong></del></span> <span
class="inserted"><ins><em>also <a
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells</em></ins></span> Apple <span
class="removed"><del><strong>iThings,</strong></del></span> <span
class="inserted"><ins><em>its geolocation</a> by default, though that can
be
+ tells Apple its geolocation</a> by default, though
that</em></ins></span> can <span class="removed"><del><strong>now install apps
built from
+ source code, provided the source code</strong></del></span> <span
class="inserted"><ins><em>be
turned off.</p>
</li>
<li id="M201210170">
- <p>There</em></ins></span> is <span
class="inserted"><ins><em>also</em></ins></span> a <span
class="removed"><del><strong>jail</strong></del></span> <span
class="inserted"><ins><em>feature</em></ins></span> for
- <span class="removed"><del><strong>users.</a> That means it imposes
censorship of application programs.</p>
-
- <p>Apple has used this power</strong></del></span> <span
class="inserted"><ins><em>web sites</em></ins></span> to
- <span class="removed"><del><strong><a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- censor all bitcoin apps</a> for the iThings.</p>
-
- <p>Apple, in the iThings, pioneered the practice of general purpose
- computers that are jails, and the term comes from
iThing</strong></del></span> <span
class="inserted"><ins><em>track</em></ins></span> users, <span
class="removed"><del><strong>who
- referred to escaping from the censorship as
“jailbreaking.”</p>
+ <p>There</em></ins></span> is <span
class="removed"><del><strong>written in Swift. Users
+ cannot do this freely because they are required</strong></del></span> <span
class="inserted"><ins><em>also a feature for web sites</em></ins></span> to
<span class="removed"><del><strong>identify themselves.
+ <a href="https://developer.apple.com/xcode/">Here are
details.</a></p>
- <p>Here</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> is <span
class="removed"><del><strong>an</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>While this</strong></del></span> <span
class="inserted"><ins><em>track users, which</em></ins></span> is <span
class="removed"><del><strong>a crack in the prison walls,</strong></del></span>
<span class="inserted"><ins><em><a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That</em></ins></span> article <span
class="inserted"><ins><em>talks</em></ins></span> about <span
class="removed"><del><strong>the <a
- href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
- code signing</a> that the iThings use to jail the user.</p>
-
- <p>Curiously, Apple is beginning to allow limited passage through the
- walls of the the iThing jail: users can now install apps built from
- source code, provided the source code</strong></del></span> <span
class="inserted"><ins><em>iOS 6, but it</em></ins></span> is <span
class="removed"><del><strong>written</strong></del></span>
- <span class="inserted"><ins><em>still true</em></ins></span> in <span
class="removed"><del><strong>Swift. Users</strong></del></span> <span
class="inserted"><ins><em>iOS 7.)</p>
+ enabled by default</a>. (That article talks about iOS 6,
but</em></ins></span> it is <span class="removed"><del><strong>not big
enough</strong></del></span>
+ <span class="inserted"><ins><em>still true in iOS 7.)</p>
</li>
<li id="M201204280">
- <p>Users</em></ins></span> cannot <span
class="removed"><del><strong>do this freely because they are
required</strong></del></span> <span class="inserted"><ins><em>make an Apple ID
(<a
+ <p>Users cannot make an Apple ID (<a
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>identify themselves.
- <a href="https://developer.apple.com/xcode/">Here are
details.</a></p>
-
- <p>While this is</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without
giving</em></ins></span> a <span class="removed"><del><strong>crack
in</strong></del></span> <span class="inserted"><ins><em>valid
- email address and receiving</em></ins></span> the <span
class="removed"><del><strong>prison walls, it is not big
enough</strong></del></span> <span class="inserted"><ins><em>verification code
Apple sends</em></ins></span>
to
<span class="removed"><del><strong>mean that the iThings are no longer
jails.</p></li>
<li><p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples of Apple's arbitrary and inconsistent
censorship</a>.</p></strong></del></span> <span
class="inserted"><ins><em>it.</p></em></ins></span>
+ More examples of Apple's arbitrary</strong></del></span> <span
class="inserted"><ins><em>install even gratis apps</a>) without giving a
valid
+ email address</em></ins></span> and <span
class="removed"><del><strong>inconsistent
censorship</a>.</p></strong></del></span> <span
class="inserted"><ins><em>receiving the verification code Apple sends
+ to it.</p></em></ins></span>
</li>
</ul>
@@ -966,7 +980,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/08 15:01:36 $
+$Date: 2019/05/18 08:29:44 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-apple.nl.po 8 May 2019 15:01:36 -0000 1.58
+++ malware-apple.nl.po 18 May 2019 08:29:44 -0000 1.59
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -464,6 +464,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-apple.pot 8 May 2019 15:01:36 -0000 1.70
+++ malware-apple.pot 18 May 2019 08:29:44 -0000 1.71
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -328,6 +328,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a "
+"href=\"https://boingboing.net/2019/05/15/brittle-security.html\"> sitting "
+"ducks for other attackers</a>, and the app censorship prevents security "
+"companies from figuring out how those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a "
"href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet\">
"
"censoring apps for the US government too</a>. Specifically, it is deleting "
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- malware-apple.ru.po 12 May 2019 09:12:12 -0000 1.195
+++ malware-apple.ru.po 18 May 2019 08:29:44 -0000 1.196
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-05-08 14:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2019-01-29 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -449,6 +450,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- nl.po 10 May 2019 17:02:55 -0000 1.87
+++ nl.po 18 May 2019 08:29:44 -0000 1.88
@@ -910,6 +910,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -7144,17 +7158,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -8020,6 +8023,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- pl.po 10 May 2019 17:02:55 -0000 1.87
+++ pl.po 18 May 2019 08:29:44 -0000 1.88
@@ -809,6 +809,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -6647,17 +6661,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
# | Free Software Foundation, Inc.
#. type: Content of: <div><p>
@@ -7514,6 +7517,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- pot 10 May 2019 17:02:55 -0000 1.87
+++ pot 18 May 2019 08:29:44 -0000 1.88
@@ -686,6 +686,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -6136,17 +6150,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
#. type: Content of: <div><p>
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
@@ -6922,6 +6925,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-insecurity.de-diff.html 11 Apr 2019 07:00:33 -0000 1.26
+++ proprietary-insecurity.de-diff.html 18 May 2019 08:29:45 -0000 1.27
@@ -63,35 +63,79 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to <span class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
+to <span class="removed"><del><strong>present the specifics.</p>
+
+<ul>
+<li>
+ <p>Some Samsung phones
+ randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
+ photos to people</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol has <a
-
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ <li id="M201905150">
+ <p>Users caught</em></ins></span> in the <span
class="removed"><del><strong>owner's contact list</a>.</p>
+</li>
+<li>
+ <p>One of the dangers</strong></del></span> <span
class="inserted"><ins><em>jail</em></ins></span> of <span
class="inserted"><ins><em>an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and</em></ins></span> the <span
class="removed"><del><strong>“internet</strong></del></span> <span
class="inserted"><ins><em>app censorship prevents security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship</em></ins></span> of <span
class="removed"><del><strong>stings”</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> is <span
class="removed"><del><strong>that, if
+ you lose your internet service, you also <a
+href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control of your house</strong></del></span> <span
class="inserted"><ins><em>fundamentally unjust,</em></ins></span> and <span
class="removed"><del><strong>appliances</a>.</p>
+ <p>For your safety, don't use any appliance with a connection to the
real
+ internet.</p>
+</li>
+<li>
+ <p>Amazon recently invited consumers to</strong></del></span> <span
class="inserted"><ins><em>would</em></ins></span> be <span
class="removed"><del><strong>suckers and <a
+href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff</strong></del></span>
+ <span class="inserted"><ins><em>inexcusable even if it didn't
lead</em></ins></span> to <span class="removed"><del><strong>open their front
doors</a>. Wouldn't you know it,
+ the system has a grave</strong></del></span> security <span
class="removed"><del><strong>flaw.</p></strong></del></span> <span
class="inserted"><ins><em>threats as well.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+ <p>Intel's intentional “management engine” back
door</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol</em></ins></span> has
<a
+<span
class="removed"><del><strong>href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
+ unintended back doors</a> too.</p>
+</li>
+<li>
+ <p>Bad security</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
defibrillators</a> and the devices they connect to.</p>
<p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
+ vulnerabilities were discovered</em></ins></span> in <span
class="removed"><del><strong>some cars makes it possible
+ to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ remotely activate</strong></del></span> <span
class="inserted"><ins><em>an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by</em></ins></span> the
<span
class="removed"><del><strong>airbags</a>.</p></strong></del></span>
<span class="inserted"><ins><em>company to
correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p>
+ developers to fix bugs in their products.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li>
+ <p>A “smart” intravenous pump</strong></del></span>
- <li id="M201902270">
- <p>The Ring (now Amazon) doorbell camera is designed so that the
+ <span class="inserted"><ins><em><li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is</em></ins></span>
designed <span class="removed"><del><strong>for
+ hospitals</strong></del></span> <span class="inserted"><ins><em>so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
- <p>The third party vulnerability is presumably
+ <p>The third party vulnerability</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>presumably
unintentional and I suppose Amazon will fix it. I
- do not expect Amazon to change the design that <a
- href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ do not expect Amazon</em></ins></span> to <span
class="inserted"><ins><em>change</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally</strong></del></span> <span
class="inserted"><ins><em>design that</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
</li>
@@ -118,23 +162,19 @@
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>other
voice-control systems can be <a
+ <p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
</li>
- <li id="M201807020"></em></ins></span>
+ <li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
photos to people in the owner's contact list</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201712240"></em></ins></span>
+ <li id="M201712240">
<p>One of the dangers of the “internet of stings”
is that, if you lose your internet service, you also <a
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
@@ -143,39 +183,31 @@
<p>For your safety, don't use any appliance with a connection to the
real internet.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201711204">
+ <li id="M201711204">
<p>Intel's intentional “management engine” back door has
<a
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
unintended back doors</a> too.</p>
</li>
- <li id="M201711200"></em></ins></span>
+ <li id="M201711200">
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
allow delivery staff to open their front doors</a>. Wouldn't you know
it, the system has a grave security flaw.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Intel's intentional “management engine” back door has
<a
-href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
- unintended back doors</a> too.</p>
-</li>
-<li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201709290"></em></ins></span>
+ <li id="M201709290">
<p>Bad security in some cars makes it possible to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
remotely activate the airbags</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201709200"></em></ins></span>
+ <li id="M201709200">
<p>A “smart” intravenous pump
designed for hospitals is connected to the internet. Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its security has been cracked</a>.</p>
+ its</em></ins></span> security has been cracked</a>.</p>
<p>Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
@@ -215,16 +247,13 @@
have backdoors</a>.</p>
<p>That is a malicious functionality, but in addition it
- is a gross insecurity since anyone, including malicious crackers, <a
+ is <span class="removed"><del><strong>a gross
+ insecurity since anyone, including malicious crackers,</strong></del></span>
<span class="inserted"><ins><em>a gross insecurity since anyone, including
malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into users'
cameras</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>
- Conexant</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201706050">
+ <li id="M201706050">
<p id="intel-me-10-year-vulnerability">Intel's
CPU backdoor—the Intel Management Engine—had a <a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
@@ -245,12 +274,17 @@
<li id="M201705250">
<p>The proprietary code that runs pacemakers,
- insulin pumps, and other medical devices is <a
- href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
- security faults</a>.</p>
+ insulin pumps, and other medical devices is</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into
+ users' cameras</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full of gross
+ security faults</a>.</p></em></ins></span>
</li>
- <li id="M201705160">
+<span class="removed"><del><strong><li>
+ <p>
+ Conexant</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705160">
<p>Conexant</em></ins></span> HD Audio Driver Package (version
1.0.0.46 and earlier)
pre-installed on 28 models of HP laptops logged the user's keystroke
to a file in the filesystem. Any process with access to the filesystem
@@ -280,16 +314,8 @@
</li>
<li <span
class="removed"><del><strong>id="intel-me-10-year-vulnerability">
- <p>Intel's CPU backdoor—the Intel Management
Engine—had</strong></del></span> <span
class="inserted"><ins><em>id="M201704050">
- <p>Many Android devices <a
-
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
- can be hijacked through their Wi-Fi chips</a> because
of</em></ins></span> a <span class="inserted"><ins><em>bug in
- Broadcom's non-free firmware.</p>
- </li>
-
- <li id="M201703270">
- <p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
+ <p>Intel's CPU backdoor—the Intel Management Engine—had a
+ <a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
vulnerability for 10 years</a>.</p>
<p>The vulnerability allowed a cracker to access the computer's Intel
Active
@@ -306,18 +332,22 @@
</li>
-<li>
- <p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+<li></strong></del></span> <span
class="inserted"><ins><em>id="M201704050"></em></ins></span>
+ <p>Many Android devices <a
+
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
-</li>
+ </li>
-<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
<a
-href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
-connected to the Internet, its</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to the Internet, its</em></ins></span> security is
crap</a>.</p>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703270"></em></ins></span>
+ <p>When Miele's Internet of
+ Stings hospital disinfectant dishwasher is <a
+
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ connected to the <span class="removed"><del><strong>Internet, its security
is crap</a>.</p>
+
+<p>For example,</strong></del></span> <span
class="inserted"><ins><em>Internet, its security is crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
filesystem, infect it with malware, and force the dishwasher to launch
@@ -325,9 +355,8 @@
used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
</li>
-<span
class="removed"><del><strong><li><p>WhatsApp</strong></del></span>
- <span class="inserted"><ins><em><li id="M201702200">
+ <li id="M201702200">
<p>If you buy a used “smart”
car, house, TV, refrigerator, etc., usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
@@ -339,17 +368,20 @@
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
- <p>This is in addition to the fact that the car contains a cellular
- modem that tells big brother all the time where it is. If you own
- such a car, it would be wise to disconnect the modem so as to turn
- off the tracking.</p>
+ <p>This is in addition to the fact that the car
contains</em></ins></span> a <span class="removed"><del><strong>cracker can
gain access to</strong></del></span> <span class="inserted"><ins><em>cellular
+ modem that tells big brother all</em></ins></span> the <span
class="removed"><del><strong>dishwasher's filesystem,
+infect</strong></del></span> <span class="inserted"><ins><em>time
where</em></ins></span> it <span class="removed"><del><strong>with malware, and
force</strong></del></span> <span class="inserted"><ins><em>is. If you own
+ such a car, it would be wise to disconnect</em></ins></span> the <span
class="removed"><del><strong>dishwasher</strong></del></span> <span
class="inserted"><ins><em>modem so as</em></ins></span> to <span
class="removed"><del><strong>launch attacks on other
+devices in</strong></del></span> <span class="inserted"><ins><em>turn
+ off</em></ins></span> the <span class="removed"><del><strong>network.
Since these dishwashers</strong></del></span> <span
class="inserted"><ins><em>tracking.</p>
</li>
<li id="M201701271">
<p>A cracker would be able to <a
href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
turn the Oculus Rift sensors into spy cameras</a> after breaking into
- the computer they are connected to.</p>
+ the computer they</em></ins></span> are <span
class="removed"><del><strong>used in hospitals, such
+attacks could potentially put hundreds of lives at
risk.</p></strong></del></span> <span class="inserted"><ins><em>connected
to.</p>
<p>Unfortunately, the article <a
href="/philosophy/words-to-avoid.html#Hacker">improperly refers to
crackers
@@ -360,10 +392,11 @@
<p>Samsung phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
- ransomware</a>.</p>
+ ransomware</a>.</p></em></ins></span>
</li>
+<span
class="removed"><del><strong><li><p>WhatsApp</strong></del></span>
- <li id="M201701130">
+ <span class="inserted"><ins><em><li id="M201701130">
<p>WhatsApp</em></ins></span> has a feature that <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
has been described as a “back door”</a> because it would
@@ -480,20 +513,22 @@
<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201606290"></em></ins></span>
- <p>Antivirus programs have so many errors that <a
-
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
+ <p>Antivirus programs have so many errors that <a <span
class="removed"><del><strong>href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
may make security worse</a>.</p>
+<p>GNU/Linux does not need antivirus software.</p>
+</li>
- <p>GNU/Linux does not need antivirus software.</p>
- </li>
-
-<span class="removed"><del><strong><li>
+<li>
<p>Over 70 brands of network-connected surveillance
cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
-security bugs that allow anyone to watch through them</a>.</p>
-</li>
+security bugs that allow anyone to watch through
them</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
+ may make security worse</a>.</p>
-<li>
+ <p>GNU/Linux does not need antivirus
software.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
Samsung's</strong></del></span>
@@ -569,10 +604,7 @@
<span class="removed"><del><strong><li>
<p>
Malware found
-on</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201510210">
- <p>FitBit fitness trackers have a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
+on <a
href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">security
cameras available through Amazon</a>.
</p>
@@ -600,10 +632,12 @@
<li>
<p>
-FitBit fitness trackers <a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-have a Bluetooth vulnerability</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
- Bluetooth vulnerability</a></em></ins></span> that allows attackers
to send malware
+FitBit</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510210">
+ <p>FitBit</em></ins></span> fitness trackers <span
class="removed"><del><strong><a
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></strong></del></span>
have a <span class="inserted"><ins><em><a
+
href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/"></em></ins></span>
+ Bluetooth vulnerability</a> that allows attackers to send malware
to the devices, which can subsequently spread to computers and other
FitBit trackers that interact with <span class="removed"><del><strong>them.
</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
@@ -616,9 +650,9 @@
<span class="inserted"><ins><em><li id="M201510200">
<p>“Self-encrypting”</em></ins></span> disk drives
do the encryption with proprietary firmware so you
- can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
- have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
+ can't trust it. Western Digital's <span
class="removed"><del><strong>“My Passport”
+drives
+<a
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
</p>
</li>
@@ -628,7 +662,9 @@
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+</p></strong></del></span> <span class="inserted"><ins><em>“My
Passport” drives <a
+
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ have a back door</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -664,58 +700,34 @@
<p>If</em></ins></span> I ever own a car, and it contains a portable
phone, I will
deactivate <span class="removed"><del><strong>that.
-</p></strong></del></span> <span
class="inserted"><ins><em>that.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
-Hospira</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201506080">
- <p>Due to bad security in a drug pump, crackers could use it to <a
-
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
- kill patients</a>.</p>
- </li>
-
- <li id="M201505294">
- <p><a
-
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
- Many smartphone apps use insecure authentication methods when storing
- your personal data on remote servers</a>. This leaves personal
- information like email addresses, passwords, and health information
- vulnerable. Because many of these apps are proprietary it makes it
- hard to impossible to know which apps are at risk.</p>
- </li>
-
- <li id="M201505050">
- <p>Hospira</em></ins></span> infusion pumps, which are used
- to administer drugs to a patient, were rated “<a
-
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
- secure IP device I've ever seen</a>” by a security <span
class="removed"><del><strong>researcher.
+Hospira infusion pumps, which are used to administer drugs to
+a patient, were rated
+“<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+secure IP device I've ever seen</a>”
+by a security researcher.
</p>
<p>
-Depending</strong></del></span>
- <span class="inserted"><ins><em>researcher.</p>
-
- <p>Depending</em></ins></span> on what drug is being infused, the
insecurity could open
- the door to <span class="removed"><del><strong>murder.
-</p></strong></del></span> <span
class="inserted"><ins><em>murder.</p></em></ins></span>
+Depending on what drug is being infused, the insecurity could
+open the door to murder.
+</p></strong></del></span> <span
class="inserted"><ins><em>that.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>
-Due to bad security in a drug pump, crackers</strong></del></span>
+Due</strong></del></span>
- <span class="inserted"><ins><em><li id="M201504090">
- <p>Mac OS X had an <a
-
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
- intentional local back door for 4 years</a>, which</em></ins></span>
could <span class="removed"><del><strong>use it</strong></del></span> <span
class="inserted"><ins><em>be exploited
- by attackers</em></ins></span> to
-<span class="removed"><del><strong><a
href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>gain root
privileges.</p></em></ins></span>
- </li>
+ <span class="inserted"><ins><em><li id="M201506080">
+ <p>Due</em></ins></span> to bad security in a drug pump, crackers
could use it to <a <span
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">kill
patients</a>.
+</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>
<a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones, Android, and
@@ -759,34 +771,60 @@
<li>
<p><a
href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-It is possible to kill people by taking control of medical implants by
+It is possible to</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/"></em></ins></span>
+ kill <span class="removed"><del><strong>people by taking control of
medical implants by
radio</a>. Here
is <a href="http://www.bbc.co.uk/news/technology-17631838">more
information</a>. And <a
href="https://web.archive.org/web/20180203130244/http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">here</a>.
-</p>
-</li>
+</p></strong></del></span> <span
class="inserted"><ins><em>patients</a>.</p></em></ins></span>
+ </li>
-<li>
-<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>, and it can be fatal.
-</p>
-</li>
+<span class="removed"><del><strong><li>
+<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">hospital
equipment has lousy security</a>,</strong></del></span>
-<li>
+ <span class="inserted"><ins><em><li id="M201505294">
+ <p><a
+
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
+ Many smartphone apps use insecure authentication methods when storing
+ your personal data on remote servers</a>. This leaves personal
+ information like email addresses, passwords,</em></ins></span> and <span
class="inserted"><ins><em>health information
+ vulnerable. Because many of these apps are proprietary</em></ins></span>
it <span class="removed"><del><strong>can be fatal.
+</p></strong></del></span> <span class="inserted"><ins><em>makes it
+ hard to impossible to know which apps are at
risk.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken over and turned
-into a botnet for the purpose of collecting customers' credit card
+Point-of-sale terminals running Windows</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505050">
+ <p>Hospira infusion pumps, which are used
+ to administer drugs to a patient,</em></ins></span> were <span
class="removed"><del><strong>taken over and turned
+into</strong></del></span> <span class="inserted"><ins><em>rated “<a
+
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
+ secure IP device I've ever seen</a>” by</em></ins></span> a
<span class="removed"><del><strong>botnet for</strong></del></span> <span
class="inserted"><ins><em>security
+ researcher.</p>
+
+ <p>Depending on what drug is being infused,</em></ins></span> the
<span class="removed"><del><strong>purpose of collecting customers' credit card
numbers</a>.
-</p>
-</li>
+</p></strong></del></span> <span class="inserted"><ins><em>insecurity
could open
+ the door to murder.</p>
+ </li>
-<li>
-<p>An app to prevent “identity theft” (access to personal
data)
-by storing users'</strong></del></span>
+ <li id="M201504090">
+ <p>Mac OS X had an <a
+
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ intentional local back door for 4 years</a>, which could be exploited
+ by attackers to gain root privileges.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201405190">
+ <span class="inserted"><ins><em><li id="M201405190"></em></ins></span>
<p>An app to prevent “identity theft”
- (access to personal data) by storing users'</em></ins></span> data on a
special server <a
+ (access to personal data) by storing users' data on a special server <a
href="http://arstechnica.com/tech-policy/2014/05/id-theft-protector-lifelock-deletes-user-data-over-concerns-that-app-isnt-safe/">was
deactivated by its developer</a> which had discovered a security
<span class="removed"><del><strong>flaw.
</p>
@@ -981,7 +1019,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/11 07:00:33 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.129
retrieving revision 1.130
diff -u -b -r1.129 -r1.130
--- proprietary-insecurity.de.po 11 Apr 2019 07:00:33 -0000 1.129
+++ proprietary-insecurity.de.po 18 May 2019 08:29:45 -0000 1.130
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -139,6 +139,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
"hacking/507470932/\"> two vulnerabilities that affect several models of "
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary-insecurity.fr.po 11 Apr 2019 08:20:02 -0000 1.164
+++ proprietary-insecurity.fr.po 18 May 2019 08:29:45 -0000 1.165
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2019-04-11 10:16+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -110,6 +111,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
"hacking/507470932/\"> two vulnerabilities that affect several models of "
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary-insecurity.it-diff.html 11 Apr 2019 07:00:33 -0000 1.41
+++ proprietary-insecurity.it-diff.html 18 May 2019 08:29:45 -0000 1.42
@@ -58,100 +58,97 @@
<li id="break-security-smarttv">
<p><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a> and use its camera
- to watch the people who are watching TV.</p>
-</li>
-<li>
- <p>Many models</strong></del></span>
-
-<span class="inserted"><ins><em><p>This page lists clearly established
cases</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras <a
- href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
- have backdoors</a>.</p>
-
- <p>That is a malicious functionality, but</strong></del></span> <span
class="inserted"><ins><em>insecurity</em></ins></span> in <span
class="removed"><del><strong>addition it</strong></del></span>
-<span class="inserted"><ins><em>proprietary software that has grave
consequences or</em></ins></span> is <span class="removed"><del><strong>a gross
- insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into
- users' cameras</a>.</p>
-
-</li>
+ Crackers found a way</strong></del></span>
-<li>
- <p>
- Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models</strong></del></span> <span
class="inserted"><ins><em>otherwise
+<span class="inserted"><ins><em><p>This page lists clearly established
cases of insecurity in
+proprietary software that has grave consequences or is otherwise
noteworthy.</p>
<div class="important">
-<p>If you know</em></ins></span> of <span
class="removed"><del><strong>HP laptops logged the user's
- keystroke</strong></del></span> <span class="inserted"><ins><em>an example
that ought</em></ins></span> to <span class="removed"><del><strong>a
file</strong></del></span> <span class="inserted"><ins><em>be</em></ins></span>
in <span class="removed"><del><strong>the filesystem. Any process with access to
- the filesystem or the MapViewOfFile API could gain
access</strong></del></span> <span class="inserted"><ins><em>this page but isn't
+<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>break security on a “smart”
TV</a> and use its camera</strong></del></span> <span
class="inserted"><ins><em>be in this page but isn't
here, please write</em></ins></span>
-to <span class="removed"><del><strong>the
- log. Furthermore,</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
- to modzero</a> the “information-leak via Covert Storage
- Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a></em></ins></span>
-to <span class="removed"><del><strong>capture keystrokes without
- taking</strong></del></span> <span class="inserted"><ins><em>inform us.
Please include</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>being classified</strong></del></span> <span
class="inserted"><ins><em>a trustworthy reference or two
-to serve</em></ins></span> as <span class="removed"><del><strong>malicious
task by AV
- heuristics”.
- </p>
+to <span class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em><a
href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>people who are watching TV.</p>
</li>
-<li></strong></del></span> <span class="inserted"><ins><em>specific
substantiation.</p>
+<li>
+ <p>Many models</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras <a
+ href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
+ have backdoors</a>.</p>
+
+ <p>That is</strong></del></span> a <span
class="removed"><del><strong>malicious functionality, but</strong></del></span>
<span class="inserted"><ins><em>trustworthy reference or two
+to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M201903210"></em></ins></span>
- <p>The <span class="removed"><del><strong>proprietary code that runs
pacemakers, insulin pumps, and other
-medical devices is</strong></del></span> <span
class="inserted"><ins><em>Medtronics Conexus Telemetry Protocol
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p>
-</li>
+ <li id="M201905150">
+ <p>Users caught</em></ins></span> in <span
class="removed"><del><strong>addition it is a gross
+ insecurity since anyone, including malicious crackers,</strong></del></span>
<span class="inserted"><ins><em>the jail of an iMonster are</em></ins></span>
<a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how</em></ins></span> those <span
class="removed"><del><strong>accounts</strong></del></span> <span
class="inserted"><ins><em>attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally
unjust,</em></ins></span> and <span class="removed"><del><strong>use
them</strong></del></span> <span class="inserted"><ins><em>would be
+ inexcusable even if it didn't lead</em></ins></span> to <span
class="removed"><del><strong>get into
+ users' cameras</a>.</p></strong></del></span> <span
class="inserted"><ins><em>security threats as well.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+ <p>
+ Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+ pre-installed on 28</strong></del></span>
-<li>
- <p>Exploits</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models</em></ins></span> of <span
class="removed"><del><strong>bugs in Windows, which were developed
by</strong></del></span> <span class="inserted"><ins><em>implantable
- defibrillators</a> and</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>devices they connect to.</p>
+ <span class="inserted"><ins><em><li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several</em></ins></span> models of <span
class="removed"><del><strong>HP laptops logged</strong></del></span> <span
class="inserted"><ins><em>implantable
+ defibrillators</a> and</em></ins></span> the <span
class="removed"><del><strong>user's
+ keystroke to a file</strong></del></span> <span
class="inserted"><ins><em>devices they connect to.</p>
- <p>This protocol has been around since 2006,</em></ins></span> and
<span class="removed"><del><strong>then leaked</strong></del></span> <span
class="inserted"><ins><em>similar
+ <p>This protocol has been around since 2006, and similar
vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done</em></ins></span> by the
<span class="removed"><del><strong>Shadowbrokers group, are now being
used</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> to
- <span class="removed"><del><strong><a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
- of Windows computers</strong></del></span>
- <span class="inserted"><ins><em>correct them. This means you can't rely on
proprietary software
- developers to fix bugs in their products.</p>
+ protocol</em></ins></span> in <span class="inserted"><ins><em>2008.
Apparently, nothing was done by</em></ins></span> the <span
class="removed"><del><strong>filesystem. Any process with
access</strong></del></span> <span class="inserted"><ins><em>company to
+ correct them. This means you can't rely on proprietary software
+ developers</em></ins></span> to <span class="inserted"><ins><em>fix bugs
in their products.</p>
</li>
<li id="M201902270">
- <p>The Ring (now Amazon) doorbell camera is designed so that the
- manufacturer (now Amazon) can watch all the time. Now it turns out
+ <p>The Ring (now Amazon) doorbell camera is designed so
that</em></ins></span> the <span class="removed"><del><strong>filesystem
or</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer (now Amazon) can watch
all</em></ins></span> the <span class="removed"><del><strong>MapViewOfFile API
could gain access</strong></del></span> <span class="inserted"><ins><em>time.
Now it turns out
that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
unintentional and I suppose Amazon will fix it. I
- do not expect Amazon to change the design that <a
- href="/proprietary/proprietary-surveillance.html#M201901100">allows
- Amazon to watch</a>.</p>
+ do not expect Amazon</em></ins></span> to <span
class="inserted"><ins><em>change</em></ins></span> the
+ <span class="removed"><del><strong>log. Furthermore,</strong></del></span>
<span class="inserted"><ins><em>design that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon</em></ins></span> to <span
class="removed"><del><strong>modzero</a> the “information-leak via
Covert Storage
+ Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>watch</a>.</p>
</li>
<li id="M201809240">
- <p>Researchers have discovered how to <a
+ <p>Researchers have discovered how</em></ins></span> to <span
class="removed"><del><strong>capture keystrokes without
+ taking</strong></del></span> <span class="inserted"><ins><em><a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
hide voice commands in other audio</a>, so that people cannot hear
them, but Alexa and Siri can.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
+ <p>Crackers found a way to break</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> of <span
class="removed"><del><strong>being classified</strong></del></span> <span
class="inserted"><ins><em>an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
+ easier for Amazon. And if some government such</em></ins></span> as <span
class="removed"><del><strong>malicious task by AV
+ heuristics”.
+ </p>
+</li>
+<li>
+<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>China or the US
+ told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>runs pacemakers, insulin
pumps,</strong></del></span> <span class="inserted"><ins><em>country,
do you think Amazon would have the moral fiber to say no?</p>
<p>These crackers are probably hackers too, but please <a
@@ -160,7 +157,8 @@
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all the other voice-control systems can be <a
+ <p>Siri, Alexa,</em></ins></span> and <span
class="inserted"><ins><em>all the</em></ins></span> other
+<span class="removed"><del><strong>medical devices</strong></del></span> <span
class="inserted"><ins><em>voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
@@ -173,13 +171,13 @@
</li>
<li id="M201712240">
- <p>One of the dangers of the “internet of stings”
- is that, if you lose your internet service, you also <a
-
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house and appliances</a>.</p>
+ <p>One of the dangers of the “internet of
stings”</em></ins></span>
+ is <span class="inserted"><ins><em>that, if you lose your internet
service, you also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
+full</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control</em></ins></span> of <span
class="removed"><del><strong>gross</strong></del></span> <span
class="inserted"><ins><em>your house and appliances</a>.</p>
- <p>For your safety, don't use any appliance</em></ins></span> with
<span class="removed"><del><strong>ransomware</a>.
- </p></strong></del></span> <span class="inserted"><ins><em>a
connection to the
+ <p>For your safety, don't use any appliance with a connection to the
real internet.</p>
</li>
@@ -193,13 +191,17 @@
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
allow delivery staff to open their front doors</a>. Wouldn't you know
- it, the system has a grave security flaw.</p>
+ it, the system has a grave</em></ins></span> security <span
class="removed"><del><strong>faults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>flaw.</p></em></ins></span>
</li>
- <li id="M201709290">
- <p>Bad security in some cars makes it possible to <a
+
+<span class="removed"><del><strong><li>
+ <p>Exploits of bugs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709290">
+ <p>Bad security</em></ins></span> in <span
class="removed"><del><strong>Windows, which were developed
by</strong></del></span> <span class="inserted"><ins><em>some cars makes it
possible to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
- remotely activate the airbags</a>.</p>
+ remotely activate</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>airbags</a>.</p>
</li>
<li id="M201709200">
@@ -232,7 +234,10 @@
<p>That is a malicious functionality, but in addition it
is a gross insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
- find those accounts and use them to get into users'
cameras</a>.</p></em></ins></span>
+ find those accounts</em></ins></span> and <span
class="removed"><del><strong>then leaked by the Shadowbrokers group, are now
being used</strong></del></span> <span class="inserted"><ins><em>use
them</em></ins></span> to
+ <span class="removed"><del><strong><a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>get
into users' cameras</a>.</p></em></ins></span>
</li>
<li <span
class="removed"><del><strong>id="intel-me-10-year-vulnerability">
@@ -971,7 +976,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/11 07:00:33 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary-insecurity.it.po 11 Apr 2019 07:00:33 -0000 1.146
+++ proprietary-insecurity.it.po 18 May 2019 08:29:45 -0000 1.147
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
"hacking/507470932/\"> two vulnerabilities that affect several models of "
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary-insecurity.ja-diff.html 11 Apr 2019 07:00:33 -0000 1.58
+++ proprietary-insecurity.ja-diff.html 18 May 2019 08:29:45 -0000 1.59
@@ -75,57 +75,82 @@
here, please write</em></ins></span>
to <span class="removed"><del><strong>weak security,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
is easy</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a></em></ins></span>
-to <span class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>doors</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>100 million cars built</strong></del></span> <span
class="inserted"><ins><em>a trustworthy reference or two
+to <span class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>doors</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>100 million cars built by
Volkswagen</a>.</p>
+</li>
+
+<li>
+<p>Ransomware <a
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
+been developed for</strong></del></span> a <span
class="removed"><del><strong>thermostat that uses proprietary
software</a>.</p>
+</li>
+
+<li>
+<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
<span class="inserted"><ins><em>trustworthy reference or two
to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M201903210">
+ <li id="M201905150">
+ <p>Users caught</em></ins></span> in
+<span class="removed"><del><strong>Internet Explorer and Edge</a>
allows</strong></del></span> <span class="inserted"><ins><em>the jail
of</em></ins></span> an <span class="removed"><del><strong>attacker to retrieve
+Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>app censorship prevents security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps</em></ins></span> is <span
class="removed"><del><strong>tricked into visiting a
+malicious link.</p>
+</li>
+
+<li>
+<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
+WhatsApp messages are not entirely deleted</a>. They
can</strong></del></span> <span class="inserted"><ins><em>fundamentally unjust,
and would</em></ins></span> be <span class="removed"><del><strong>recovered
+in various ways.
+</p></strong></del></span>
+ <span class="inserted"><ins><em>inexcusable even if it didn't lead to
security threats as well.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>A vulnerability</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903210">
<p>The Medtronics Conexus Telemetry Protocol has <a
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
defibrillators</a> and the devices they connect to.</p>
<p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done</em></ins></span> by <span
class="removed"><del><strong>Volkswagen</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p></em></ins></span>
+ vulnerabilities were discovered</em></ins></span> in <span
class="removed"><del><strong>Apple's Image I/O API
allowed</strong></del></span> an <span class="removed"><del><strong>attacker to
+<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this
API</strong></del></span> <span class="inserted"><ins><em>earlier Medtronics
communication
+ protocol in 2008. Apparently, nothing was done by the
company</em></ins></span> to <span class="removed"><del><strong>render
a</strong></del></span>
+ <span class="inserted"><ins><em>correct them. This means you can't rely on
proprietary software
+ developers to fix bugs in their products.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Ransomware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902270">
+ <li id="M201902270">
<p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
- that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
-been developed for a thermostat</strong></del></span> <span
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
unintentional and I suppose Amazon will fix it. I
- do not expect Amazon to change the design</em></ins></span> that <span
class="removed"><del><strong>uses proprietary
software</a>.</p></strong></del></span> <span
class="inserted"><ins><em><a
+ do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
- Amazon to watch</a>.</p></em></ins></span>
+ Amazon to watch</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>A</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201809240">
- <p>Researchers have discovered how to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
- <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands</em></ins></span> in
-<span class="removed"><del><strong>Internet Explorer</strong></del></span>
<span class="inserted"><ins><em>other audio</a>, so that people cannot
hear
- them, but Alexa</em></ins></span> and <span
class="removed"><del><strong>Edge</a> allows an
attacker</strong></del></span> <span class="inserted"><ins><em>Siri
can.</p>
+ <li id="M201809240">
+ <p>Researchers have discovered how to <a
+
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+ hide voice commands in other audio</a>, so that people cannot hear
+ them, but Alexa and Siri can.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>retrieve
-Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>user is tricked</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
+ <p>Crackers found a way to break the security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
@@ -362,27 +387,21 @@
<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a> allows an attacker to retrieve
- Microsoft account credentials, if the user is tricked</em></ins></span>
into visiting
+ Microsoft account credentials, if the user is tricked into visiting
a malicious link.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607290"></em></ins></span>
+ <li id="M201607290">
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
WhatsApp messages are not entirely deleted</a>. They can be recovered
- in various <span class="removed"><del><strong>ways.
-</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p></em></ins></span>
+ in various ways.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607220"></em></ins></span>
+ <li id="M201607220">
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- <span class="removed"><del><strong>malacious</strong></del></span>
- <span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
+ malicious code from any application which uses this API to render
a</em></ins></span>
certain kind of image file</a>.</p>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -903,7 +922,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/11 07:00:33 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary-insecurity.ja.po 11 Apr 2019 07:00:33 -0000 1.116
+++ proprietary-insecurity.ja.po 18 May 2019 08:29:45 -0000 1.117
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -102,6 +102,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
"hacking/507470932/\"> two vulnerabilities that affect several models of "
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- proprietary-insecurity.pot 11 Apr 2019 07:00:33 -0000 1.85
+++ proprietary-insecurity.pot 18 May 2019 08:29:45 -0000 1.86
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a "
+"href=\"https://boingboing.net/2019/05/15/brittle-security.html\"> sitting "
+"ducks for other attackers</a>, and the app censorship prevents security "
+"companies from figuring out how those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Medtronics Conexus Telemetry Protocol has <a "
"href=\"http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/\">
"
"two vulnerabilities that affect several models of implantable "
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- proprietary-insecurity.ru.po 11 May 2019 17:29:37 -0000 1.217
+++ proprietary-insecurity.ru.po 18 May 2019 08:29:45 -0000 1.218
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-04-11 06:56+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2018-12-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Medtronics Conexus Telemetry Protocol has <a href=\"http://www."
"startribune.com/750-000-medtronic-defibrillators-vulnerable-to-"
"hacking/507470932/\"> two vulnerabilities that affect several models of "
Index: proprietary-jails.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de-diff.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-jails.de-diff.html 17 Mar 2019 10:32:41 -0000 1.23
+++ proprietary-jails.de-diff.html 18 May 2019 08:29:45 -0000 1.24
@@ -90,17 +90,26 @@
<h4>Examples of censorship by Apple jails</h4>
<span class="removed"><del><strong><ul>
<li>
- <p>Apple <a
-
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
- deleted several VPNs from its app store for China</a>, thus using
- its own censorship power to strengthen that of the Chinese
- government.</p>
+ <p>Apple</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are</em></ins></span>
<a
+ <span
class="removed"><del><strong>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
+ deleted several VPNs from its app store</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
+ ducks</em></ins></span> for <span
class="removed"><del><strong>China</a>, thus using
+ its own</strong></del></span> <span class="inserted"><ins><em>other
attackers</a>, and the app censorship prevents security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's</em></ins></span> censorship <span
class="removed"><del><strong>power to strengthen that</strong></del></span> of
<span class="removed"><del><strong>the Chinese
+ government.</p></strong></del></span> <span
class="inserted"><ins><em>apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as
well.</p></em></ins></span>
</li>
- <li></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201710130"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201710130"></em></ins></span>
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
censoring apps for the US government too</a>. Specifically, it is
@@ -328,7 +337,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:41 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-jails.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.de.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-jails.de.po 17 Mar 2019 10:32:41 -0000 1.51
+++ proprietary-jails.de.po 18 May 2019 08:29:45 -0000 1.52
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -155,6 +155,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: proprietary-jails.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.es.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-jails.es.po 5 Apr 2019 09:20:42 -0000 1.51
+++ proprietary-jails.es.po 18 May 2019 08:29:45 -0000 1.52
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2019-04-05 11:17+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -146,6 +147,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: proprietary-jails.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.fr.po,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary-jails.fr.po 31 Mar 2019 11:07:09 -0000 1.58
+++ proprietary-jails.fr.po 18 May 2019 08:29:45 -0000 1.59
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2019-03-31 13:02+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
#. type: Content of: <title>
@@ -141,6 +142,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: proprietary-jails.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary-jails.it-diff.html 17 Mar 2019 10:32:41 -0000 1.31
+++ proprietary-jails.it-diff.html 18 May 2019 08:29:45 -0000 1.32
@@ -79,10 +79,7 @@
<p>Here is an article about</em></ins></span> the <span
class="removed"><del><strong>Chinese
government.
-</p>
-</li>
-
-<li></strong></del></span> <span class="inserted"><ins><em><a
+</p></strong></del></span> <span class="inserted"><ins><em><a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
code signing</a> that the iThings use to lock up the user.</p>
@@ -97,7 +94,19 @@
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
- <li id="M201710130"></em></ins></span>
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as
well.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201710130"></em></ins></span>
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
censoring apps for the US government too</a>. Specifically, it is
@@ -118,20 +127,21 @@
deleted several VPNs</em></ins></span> from <span
class="removed"><del><strong>the Windows Store can be
downloaded and executed</a>.</p>
- <p>If the history</strong></del></span> <span
class="inserted"><ins><em>its app store for China</a>, thus using its
- own censorship power to strengthen that</em></ins></span> of <span
class="removed"><del><strong>iOS as a jail is any indication, Windows 10 J
+ <p>If the history of iOS as a jail is any indication, Windows 10 J
will be no better.</p>
</li>
- <li><p>Google Chrome, running on Windows, <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">is
a jail</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the Chinese government.</p></em></ins></span>
+ <li><p>Google Chrome, running on Windows, <a
href="https://www.privateinternetaccess.com/blog/2015/06/google-chrome-listening-in-to-your-room-shows-the-importance-of-privacy-defense-in-depth/">is
a jail</a>.</p>
</li>
-<span class="removed"><del><strong><li><p>
-Apple</strong></del></span>
+<li><p>
+Apple used</strong></del></span> its <span
class="removed"><del><strong>censorship system to enforce
Russian</strong></del></span> <span class="inserted"><ins><em>app store for
China</a>, thus using its
+ own censorship power to strengthen that of the Chinese
government.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201701064">
- <p>Apple</em></ins></span> used its censorship system to enforce
Russian surveillance <a
+ <li id="M201701064">
+ <p>Apple used its censorship system to enforce
Russian</em></ins></span> surveillance <a
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
@@ -157,9 +167,8 @@
</li>
<li id="M201605190">
- <p>Apple</em></ins></span> censors games, <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
- banning</em></ins></span> some games from the <span
class="removed"><del><strong>cr…app store</a> because of which
political
+ <p>Apple</em></ins></span> censors games, <a <span
class="removed"><del><strong>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">banning
+some games from the cr…app store</a> because of which political
points they suggest. Some political points are apparently considered
acceptable.</p>
</li>
@@ -167,7 +176,9 @@
<li><p>
Apple <a href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
banned a program from the App Store</a> because its developers
-committed the enormity of disassembling some iThings.
+committed the enormity of disassembling</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
+ banning</em></ins></span> some <span class="removed"><del><strong>iThings.
</p></li>
<li><p>
@@ -215,7 +226,7 @@
to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
ban all bitcoin apps</a> for the iThings for a time. It
also <a
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">banned
-a game about growing marijuana</a>, while permitting games about other
+a game about growing marijuana</a>, while
permitting</strong></del></span> games <span class="removed"><del><strong>about
other
crimes such as killing people. Perhaps Apple considers killing more
acceptable than marijuana.</p>
@@ -224,8 +235,8 @@
signing</a> that the iThings use to lock up the user.</p>
<p>Curiously, Apple is beginning to allow limited passage through the
-walls of the the iThing jail: users can now install apps built from
-source code, provided the source code is written in Swift. Users
+walls of the the iThing jail: users can now install apps
built</strong></del></span> from
+<span class="removed"><del><strong>source code, provided</strong></del></span>
the <span class="removed"><del><strong>source code is written in Swift. Users
cannot do this freely</strong></del></span> <span
class="inserted"><ins><em>cr…app store</a></em></ins></span>
because <span class="inserted"><ins><em>of which
political points</em></ins></span> they <span
class="inserted"><ins><em>suggest. Some political points</em></ins></span> are
<span class="removed"><del><strong>required to identify
themselves.</strong></del></span> <span class="inserted"><ins><em>apparently
considered acceptable.</p>
@@ -401,7 +412,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:41 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-jails.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.it.po,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-jails.it.po 17 Mar 2019 10:32:41 -0000 1.55
+++ proprietary-jails.it.po 18 May 2019 08:29:45 -0000 1.56
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2017-12-31 13:15+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -181,6 +181,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: proprietary-jails.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-jails.ja-diff.html 17 Mar 2019 10:32:41 -0000 1.30
+++ proprietary-jails.ja-diff.html 18 May 2019 08:29:45 -0000 1.31
@@ -99,6 +99,16 @@
<span class="inserted"><ins><em><h4>Examples of censorship by Apple
jails</h4>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
@@ -207,11 +217,9 @@
time the developers fixed one “problem”, Apple
complained about another. After the fifth rejection, Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
- admitted it was censoring the app based on the subject
matter</a>.</p></em></ins></span>
+ admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id="microsoft">Microsoft jails</h3>
@@ -227,10 +235,12 @@
10 S is a special configuration of Windows 10 called <a
href="https://support.microsoft.com/en-gb/help/4020089/windows-10-in-s-mode-faq">
S mode</a>. The major difference with Windows 10 S is that there is
- an easy way to switch out of S mode.</p>
+ an easy way to switch out of S mode.</p></em></ins></span>
</li>
- <li id="M201210080"></em></ins></span>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201210080"></em></ins></span>
<p><a
<span
class="removed"><del><strong>href="http://www.itworld.com/article/2832657/operating-systems/microsoft-metro-app-store-lock-down.html">Windows</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.itworld.com/article/2832657/microsoft-metro-app-store-lock-down.html">
@@ -312,7 +322,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/03/17 10:32:41 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-jails.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ja.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-jails.ja.po 17 Mar 2019 10:32:41 -0000 1.43
+++ proprietary-jails.ja.po 18 May 2019 08:29:45 -0000 1.44
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:28+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -155,6 +155,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: proprietary-jails.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.pot,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-jails.pot 17 Mar 2019 10:32:41 -0000 1.27
+++ proprietary-jails.pot 18 May 2019 08:29:45 -0000 1.28
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -106,6 +106,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a "
+"href=\"https://boingboing.net/2019/05/15/brittle-security.html\"> sitting "
+"ducks for other attackers</a>, and the app censorship prevents security "
+"companies from figuring out how those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a "
"href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet\">
"
"censoring apps for the US government too</a>. Specifically, it is deleting "
Index: proprietary-jails.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-jails.ru.po,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-jails.ru.po 18 Mar 2019 06:31:57 -0000 1.76
+++ proprietary-jails.ru.po 18 May 2019 08:29:45 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-jails.html\n"
-"POT-Creation-Date: 2019-03-17 10:26+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2019-01-29 19:55+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Jails - GNU Project - Free Software Foundation"
@@ -139,6 +140,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary.de-diff.html 10 May 2019 17:02:56 -0000 1.93
+++ proprietary.de-diff.html 18 May 2019 08:29:45 -0000 1.94
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -186,6 +186,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -240,17 +250,6 @@
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
-
- <li id="M201904210">
- <p>As of April 2019, it is <a
-
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
- unscrupulous tracking anti-feature</a> that <a
-
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
- users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
- going to be based on Chromium.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/10 17:02:56 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary.de.po 10 May 2019 17:02:56 -0000 1.135
+++ proprietary.de.po 18 May 2019 08:29:45 -0000 1.136
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -439,6 +439,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -510,17 +524,6 @@
"disclosure agreements</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary.es.po 14 May 2019 10:10:27 -0000 1.164
+++ proprietary.es.po 18 May 2019 08:29:45 -0000 1.165
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -303,6 +304,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -414,25 +429,6 @@
"bnnbloomberg.ca/three-cheers-for-amazon-s-human-"
"eavesdroppers-1.1243033\">rompa sus acuerdos de confidencialidad</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-"Desde abril de 2019, ya <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no es posible deshabilitar una descarada funcionalidad de rastreo</a> que "
-"<a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">revela la IP de los usuarios que siguen un enlace provisto del "
-"atributo <cite>ping</cite></a>. Esto sucede en Apple Safari, Google Chrome, "
-"Opera, Microsoft Edge y también en la próxima versión de Microsoft Edge
que "
-"estará basada en Chromium."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -512,6 +508,24 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+#~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
+#~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"
+#~ "feature</a> that <a href=\"https://html.spec.whatwg.org/multipage/links."
+#~ "html#hyperlink-auditing\">reports users when they follow ping links</a> "
+#~ "in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the "
+#~ "upcoming Microsoft Edge that going to be based on Chromium."
+#~ msgstr ""
+#~ "Desde abril de 2019, ya <a href=\"https://www.bleepingcomputer.com/news/"
+#~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
+#~ "risk/\">no es posible deshabilitar una descarada funcionalidad de "
+#~ "rastreo</a> que <a href=\"https://html.spec.whatwg.org/multipage/links."
+#~ "html#hyperlink-auditing\">revela la IP de los usuarios que siguen un "
+#~ "enlace provisto del atributo <cite>ping</cite></a>. Esto sucede en Apple "
+#~ "Safari, Google Chrome, Opera, Microsoft Edge y también en la próxima "
+#~ "versión de Microsoft Edge que estará basada en Chromium."
+
+#~ msgid ""
#~ "Data collected by menstrual and pregnancy monitoring apps is often <a "
#~ "href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-"
#~ "to-womens-health-apps-menstrual-surveillance\"> available to employers "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary.fr.po 10 May 2019 17:59:15 -0000 1.203
+++ proprietary.fr.po 18 May 2019 08:29:45 -0000 1.204
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2019-05-10 19:58+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -299,6 +300,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -410,26 +425,6 @@
"eavesdroppers-1.1243033\">rompt l'accord de confidentialité</a> qu'il a "
"signé."
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-"Depuis avril 2019, il n'est <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">plus possible de désactiver le dispositif de pistage par <cite>ping</"
-"cite></a> dans Apple Safari, Google Chrome, Opera, Microsoft Edge, et aussi "
-"dans la prochaine version de Microsoft Edge qui sera basée sur Chromium. Ce "
-"dispositif peu scrupuleux <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
-"\">envoie les IPs des utilisateurs</a> qui suivent les liens munis de "
-"l'attribut <cite>ping</cite> à l'URL définie dans cet attribut."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -503,3 +498,23 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+#~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
+#~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"
+#~ "feature</a> that <a href=\"https://html.spec.whatwg.org/multipage/links."
+#~ "html#hyperlink-auditing\">reports users when they follow ping links</a> "
+#~ "in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the "
+#~ "upcoming Microsoft Edge that going to be based on Chromium."
+#~ msgstr ""
+#~ "Depuis avril 2019, il n'est <a href=\"https://www.bleepingcomputer.com/"
+#~ "news/software/major-browsers-to-prevent-disabling-of-click-tracking-"
+#~ "privacy-risk/\">plus possible de désactiver le dispositif de pistage par "
+#~ "<cite>ping</cite></a> dans Apple Safari, Google Chrome, Opera, Microsoft "
+#~ "Edge, et aussi dans la prochaine version de Microsoft Edge qui sera basée
"
+#~ "sur Chromium. Ce dispositif peu scrupuleux <a href=\"https://www."
+#~ "bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-"
+#~ "click-tracking-privacy-risk\">envoie les IPs des utilisateurs</a> qui "
+#~ "suivent les liens munis de l'attribut <cite>ping</cite> à l'URL définie "
+#~ "dans cet attribut."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.it-diff.html 10 May 2019 17:02:56 -0000 1.105
+++ proprietary.it-diff.html 18 May 2019 08:29:45 -0000 1.106
@@ -185,6 +185,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -239,17 +249,6 @@
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
-
- <li id="M201904210">
- <p>As of April 2019, it is <a
-
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
- unscrupulous tracking anti-feature</a> that <a
-
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
- users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
- going to be based on Chromium.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/10 17:02:56 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary.it.po 10 May 2019 17:02:56 -0000 1.144
+++ proprietary.it.po 18 May 2019 08:29:45 -0000 1.145
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -514,17 +528,6 @@
"disclosure agreements</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.ja-diff.html 10 May 2019 17:02:56 -0000 1.106
+++ proprietary.ja-diff.html 18 May 2019 08:29:45 -0000 1.107
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -182,6 +182,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -236,17 +246,6 @@
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
-
- <li id="M201904210">
- <p>As of April 2019, it is <a
-
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
- unscrupulous tracking anti-feature</a> that <a
-
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
- users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
- going to be based on Chromium.</p>
- </li>
</ul></em></ins></span>
@@ -307,7 +306,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/10 17:02:56 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary.ja.po 10 May 2019 17:02:56 -0000 1.127
+++ proprietary.ja.po 18 May 2019 08:29:45 -0000 1.128
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -361,6 +361,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -432,17 +446,6 @@
"disclosure agreements</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.nl-diff.html 10 May 2019 17:02:56 -0000 1.105
+++ proprietary.nl-diff.html 18 May 2019 08:29:45 -0000 1.106
@@ -185,6 +185,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -239,17 +249,6 @@
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
-
- <li id="M201904210">
- <p>As of April 2019, it is <a
-
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
- unscrupulous tracking anti-feature</a> that <a
-
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
- users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
- going to be based on Chromium.</p>
- </li>
</ul></em></ins></span>
@@ -310,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/10 17:02:56 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary.nl.po 10 May 2019 17:02:56 -0000 1.116
+++ proprietary.nl.po 18 May 2019 08:29:45 -0000 1.117
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -507,17 +521,6 @@
"disclosure agreements</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- proprietary.pl-diff.html 10 May 2019 17:02:56 -0000 1.123
+++ proprietary.pl-diff.html 18 May 2019 08:29:45 -0000 1.124
@@ -127,18 +127,18 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li>
- <li><a
href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -159,10 +159,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -183,6 +183,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -237,17 +247,6 @@
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
-
- <li id="M201904210">
- <p>As of April 2019, it is <a
-
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
- unscrupulous tracking anti-feature</a> that <a
-
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
- users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
- going to be based on Chromium.</p>
- </li>
</ul></em></ins></span>
@@ -308,7 +307,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/10 17:02:56 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.111
retrieving revision 1.112
diff -u -b -r1.111 -r1.112
--- proprietary.pl.po 10 May 2019 17:02:56 -0000 1.111
+++ proprietary.pl.po 18 May 2019 08:29:45 -0000 1.112
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -590,17 +604,6 @@
"disclosure agreements</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary.pot 10 May 2019 17:02:56 -0000 1.108
+++ proprietary.pot 18 May 2019 08:29:45 -0000 1.109
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <address@hidden>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a "
+"href=\"https://boingboing.net/2019/05/15/brittle-security.html\"> sitting "
+"ducks for other attackers</a>, and the app censorship prevents security "
+"companies from figuring out how those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a "
"href=\"https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/\">
"
"requirement to run a proprietary phone app</a> to be allowed into the event."
@@ -319,17 +333,6 @@
"break their non-disclosure agreements</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a "
-"href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/\">no
"
-"longer possible to disable an unscrupulous tracking anti-feature</a> that <a "
-"href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing\">reports
"
-"users when they follow ping links</a> in Apple Safari, Google Chrome, Opera, "
-"Microsoft Edge and also in the upcoming Microsoft Edge that going to be "
-"based on Chromium."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary.pt-br.po 13 May 2019 19:31:13 -0000 1.165
+++ proprietary.pt-br.po 18 May 2019 08:29:45 -0000 1.166
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2019-05-13 15:53-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -296,6 +297,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -406,24 +421,6 @@
"amazon-s-human-eavesdroppers-1.1243033\"> quebrem seus acordos de não "
"divulgação</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-"A partir de abril de 2019, <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">não é mais possÃvel desativar um recurso indesejado de rastreamento sem
"
-"escrúpulos</a> que <a href=\"https://html.spec.whatwg.org/multipage/links."
-"html#hyperlink-auditing\">relata os usuários quando eles seguem links de "
-"ping</a> no Apple Safari, Google Chrome, Opera, Microsoft Edge e também no "
-"Microsoft Edge que será baseado no Chromium."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -499,6 +496,23 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+#~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
+#~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"
+#~ "feature</a> that <a href=\"https://html.spec.whatwg.org/multipage/links."
+#~ "html#hyperlink-auditing\">reports users when they follow ping links</a> "
+#~ "in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the "
+#~ "upcoming Microsoft Edge that going to be based on Chromium."
+#~ msgstr ""
+#~ "A partir de abril de 2019, <a href=\"https://www.bleepingcomputer.com/"
+#~ "news/software/major-browsers-to-prevent-disabling-of-click-tracking-"
+#~ "privacy-risk/\">não é mais possÃvel desativar um recurso indesejado de "
+#~ "rastreamento sem escrúpulos</a> que <a href=\"https://html.spec.whatwg."
+#~ "org/multipage/links.html#hyperlink-auditing\">relata os usuários quando "
+#~ "eles seguem links de ping</a> no Apple Safari, Google Chrome, Opera, "
+#~ "Microsoft Edge e também no Microsoft Edge que será baseado no Chromium."
+
+#~ msgid ""
#~ "Data collected by menstrual and pregnancy monitoring apps is often <a "
#~ "href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-"
#~ "to-womens-health-apps-menstrual-surveillance\"> available to employers "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary.ru.po 11 May 2019 17:29:37 -0000 1.240
+++ proprietary.ru.po 18 May 2019 08:29:45 -0000 1.241
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-05-18 08:26+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -411,25 +426,6 @@
"bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033\"> "
"наÑÑÑÐ°Ñ Ñвой Ð´Ð¾Ð³Ð¾Ð²Ð¾Ñ Ð¾ неÑазглаÑении</a>."
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-"Ðа апÑÐµÐ»Ñ 2019 года <a
href=\"https://www.bleepingcomputer.com/news/software/"
-"major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/\">болÑÑе
"
-"невозможно оÑклÑÑиÑÑ Ð½ÐµÐ´Ð¾Ð±ÑоÑовеÑÑнÑÑ
вÑедоноÑнÑÑ ÑÑнкÑÐ¸Ñ Ñлежки</a>, "
-"коÑоÑÐ°Ñ <a href=\"https://html.spec.whatwg.org/multipage/links."
-"html#hyperlink-auditing\">ÑообÑаеÑ, когда
полÑзоваÑели пеÑеÑ
одÑÑ Ð¿Ð¾ ÑÑÑлкам "
-"Ñ “ÑведомлениÑми”</a> в Apple Safari, Google
Chrome, Opera, "
-"Microsoft Edge, а Ñакже в гоÑовÑÑемÑÑ Ðº вÑпÑÑкÑ
Microsoft Edge, коÑоÑÑй "
-"бÑдÑÑ Ð´ÐµÐ»Ð°ÑÑ Ð½Ð° базе Chromium."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -509,6 +505,24 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+#~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
+#~ "risk/\">no longer possible to disable an unscrupulous tracking anti-"
+#~ "feature</a> that <a href=\"https://html.spec.whatwg.org/multipage/links."
+#~ "html#hyperlink-auditing\">reports users when they follow ping links</a> "
+#~ "in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the "
+#~ "upcoming Microsoft Edge that going to be based on Chromium."
+#~ msgstr ""
+#~ "Ðа апÑÐµÐ»Ñ 2019 года <a
href=\"https://www.bleepingcomputer.com/news/"
+#~ "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
+#~ "risk/\">болÑÑе невозможно оÑклÑÑиÑÑ
недобÑоÑовеÑÑнÑÑ Ð²ÑедоноÑнÑÑ ÑÑнкÑÐ¸Ñ "
+#~ "Ñлежки</a>, коÑоÑÐ°Ñ <a
href=\"https://html.spec.whatwg.org/multipage/"
+#~ "links.html#hyperlink-auditing\">ÑообÑаеÑ, когда
полÑзоваÑели пеÑеÑ
одÑÑ Ð¿Ð¾ "
+#~ "ÑÑÑлкам Ñ “ÑведомлениÑми”</a> в Apple
Safari, Google Chrome, "
+#~ "Opera, Microsoft Edge, а Ñакже в гоÑовÑÑемÑÑ Ðº
вÑпÑÑÐºÑ Microsoft Edge, "
+#~ "коÑоÑÑй бÑдÑÑ Ð´ÐµÐ»Ð°ÑÑ Ð½Ð° базе Chromium."
+
+#~ msgid ""
#~ "Data collected by menstrual and pregnancy monitoring apps is often <a "
#~ "href=\"https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-"
#~ "to-womens-health-apps-menstrual-surveillance\"> available to employers "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- proprietary.zh-tw-diff.html 10 May 2019 17:02:56 -0000 1.83
+++ proprietary.zh-tw-diff.html 18 May 2019 08:29:45 -0000 1.84
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
-#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+#TOC { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -186,6 +186,16 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201905150">
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>, and the app censorship prevents
security
+ companies from figuring out how those attacks work.</p>
+
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
+ inexcusable even if it didn't lead to security threats as well.</p>
+ </li>
+
<li id="M201905060">
<p>BlizzCon 2019 imposed a <a
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
@@ -240,17 +250,6 @@
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
</li>
-
- <li id="M201904210">
- <p>As of April 2019, it is <a
-
href="https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/">no
- longer possible to disable an
- unscrupulous tracking anti-feature</a> that <a
-
href="https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing">reports
- users when they follow ping links</a> in Apple Safari, Google Chrome,
- Opera, Microsoft Edge and also in the upcoming Microsoft Edge that
- going to be based on Chromium.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/10 17:02:56 $
+$Date: 2019/05/18 08:29:45 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.zh-tw.po 10 May 2019 17:02:56 -0000 1.94
+++ proprietary.zh-tw.po 18 May 2019 08:29:45 -0000 1.95
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-05-10 16:57+0000\n"
+"POT-Creation-Date: 2019-05-18 08:26+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"BlizzCon 2019 imposed a <a href=\"https://arstechnica.com/gaming/2019/05/"
"blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/"
"\"> requirement to run a proprietary phone app</a> to be allowed into the "
@@ -421,17 +435,6 @@
"disclosure agreements</a>."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- pt-br.po 13 May 2019 19:31:13 -0000 1.114
+++ pt-br.po 18 May 2019 08:29:45 -0000 1.115
@@ -803,6 +803,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -6937,33 +6951,6 @@
msgid "Latest additions"
msgstr "Ãltimas adições"
-#. type: Content of: <ul><li><p>
-#, fuzzy
-#| msgid ""
-#| "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-#| "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
-#| "risk\">no longer possible to disable an unscrupulous tracking anti-"
-#| "feature</a> that <a href=\"https://html.spec.whatwg.org/multipage/links."
-#| "html#hyperlink-auditing\">reports users when they follow ping links</a> "
-#| "in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the "
-#| "upcoming Microsoft Edge that going to be based on Chromium."
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-"A partir de abril de 2019, <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
-"\">não é mais possÃvel desativar um recurso indesejado de rastreamento sem
"
-"escrúpulos</a> que <a href=\"https://html.spec.whatwg.org/multipage/links."
-"html#hyperlink-auditing\">relata os usuários quando eles seguem links de "
-"ping</a> no Apple Safari, Google Chrome, Opera, Microsoft Edge e também no "
-"Microsoft Edge que será baseado no Chromium."
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
@@ -7786,6 +7773,33 @@
msgstr ""
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+#| "software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-"
+#| "risk\">no longer possible to disable an unscrupulous tracking anti-"
+#| "feature</a> that <a href=\"https://html.spec.whatwg.org/multipage/links."
+#| "html#hyperlink-auditing\">reports users when they follow ping links</a> "
+#| "in Apple Safari, Google Chrome, Opera, Microsoft Edge and also in the "
+#| "upcoming Microsoft Edge that going to be based on Chromium."
+msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+"A partir de abril de 2019, <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk"
+"\">não é mais possÃvel desativar um recurso indesejado de rastreamento sem
"
+"escrúpulos</a> que <a href=\"https://html.spec.whatwg.org/multipage/links."
+"html#hyperlink-auditing\">relata os usuários quando eles seguem links de "
+"ping</a> no Apple Safari, Google Chrome, Opera, Microsoft Edge e também no "
+"Microsoft Edge que será baseado no Chromium."
+
+#. type: Content of: <ul><li><p>
msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.190
retrieving revision 1.191
diff -u -b -r1.190 -r1.191
--- ru.po 12 May 2019 09:12:12 -0000 1.190
+++ ru.po 18 May 2019 08:29:46 -0000 1.191
@@ -987,6 +987,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -9150,33 +9164,6 @@
msgid "Latest additions"
msgstr "ÐоÑледние добавлениÑ"
-# | As of April 2019, it is <a
-# |
href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk{+/+}\">no
-# | longer possible to disable an unscrupulous tracking anti-feature</a> that
-# | <a
-# |
href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing\">reports
-# | users when they follow ping links</a> in Apple Safari, Google Chrome,
-# | Opera, Microsoft Edge and also in the upcoming Microsoft Edge that going
-# | to be based on Chromium.
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-"Ðа апÑÐµÐ»Ñ 2019 года <a
href=\"https://www.bleepingcomputer.com/news/software/"
-"major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/\">болÑÑе
"
-"невозможно оÑклÑÑиÑÑ Ð½ÐµÐ´Ð¾Ð±ÑоÑовеÑÑнÑÑ
вÑедоноÑнÑÑ ÑÑнкÑÐ¸Ñ Ñлежки</a>, "
-"коÑоÑÐ°Ñ <a href=\"https://html.spec.whatwg.org/multipage/links."
-"html#hyperlink-auditing\">ÑообÑаеÑ, когда
полÑзоваÑели пеÑеÑ
одÑÑ Ð¿Ð¾ ÑÑÑлкам "
-"Ñ “ÑведомлениÑми”</a> в Apple Safari, Google
Chrome, Opera, "
-"Microsoft Edge, а Ñакже в гоÑовÑÑемÑÑ Ðº вÑпÑÑкÑ
Microsoft Edge, коÑоÑÑй "
-"бÑдÑÑ Ð´ÐµÐ»Ð°ÑÑ Ð½Ð° базе Chromium."
-
#. type: Content of: <div><p>
msgid ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
@@ -10177,6 +10164,33 @@
"nonfree.html\"> понÑÑÐ¸Ñ “ÑвободнÑй” и
“неÑвободнÑй” "
"Ð´Ð»Ñ Ð½Ð¸Ñ
не имеÑÑ ÑмÑÑла</a>, но вÑе Ñавно
Ñлежка ÑвлÑеÑÑÑ Ð·Ð»Ð¾ÑпоÑÑеблением."
+# | As of April 2019, it is <a
+# |
href=\"https://www.bleepingcomputer.com/news/software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk{+/+}\">no
+# | longer possible to disable an unscrupulous tracking anti-feature</a> that
+# | <a
+# |
href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-auditing\">reports
+# | users when they follow ping links</a> in Apple Safari, Google Chrome,
+# | Opera, Microsoft Edge and also in the upcoming Microsoft Edge that going
+# | to be based on Chromium.
+#. type: Content of: <ul><li><p>
+msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+"Ðа апÑÐµÐ»Ñ 2019 года <a
href=\"https://www.bleepingcomputer.com/news/software/"
+"major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/\">болÑÑе
"
+"невозможно оÑклÑÑиÑÑ Ð½ÐµÐ´Ð¾Ð±ÑоÑовеÑÑнÑÑ
вÑедоноÑнÑÑ ÑÑнкÑÐ¸Ñ Ñлежки</a>, "
+"коÑоÑÐ°Ñ <a href=\"https://html.spec.whatwg.org/multipage/links."
+"html#hyperlink-auditing\">ÑообÑаеÑ, когда
полÑзоваÑели пеÑеÑ
одÑÑ Ð¿Ð¾ ÑÑÑлкам "
+"Ñ “ÑведомлениÑми”</a> в Apple Safari, Google
Chrome, Opera, "
+"Microsoft Edge, а Ñакже в гоÑовÑÑемÑÑ Ðº вÑпÑÑкÑ
Microsoft Edge, коÑоÑÑй "
+"бÑдÑÑ Ð´ÐµÐ»Ð°ÑÑ Ð½Ð° базе Chromium."
+
#. type: Content of: <ul><li><p>
msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- zh-tw.po 10 May 2019 17:02:56 -0000 1.87
+++ zh-tw.po 18 May 2019 08:29:46 -0000 1.88
@@ -771,6 +771,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Users caught in the jail of an iMonster are <a href=\"https://boingboing."
+"net/2019/05/15/brittle-security.html\"> sitting ducks for other attackers</"
+"a>, and the app censorship prevents security companies from figuring out how "
+"those attacks work."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Apple's censorship of apps is fundamentally unjust, and would be inexcusable "
+"even if it didn't lead to security threats as well."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Apple is <a href=\"https://www.eff.org/deeplinks/2017/10/iranian-hardliners-"
"want-isolated-internet\"> censoring apps for the US government too</a>. "
"Specifically, it is deleting apps developed by Iranians."
@@ -6419,17 +6433,6 @@
msgid "Latest additions"
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
-"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
-"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
-"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
-"auditing\">reports users when they follow ping links</a> in Apple Safari, "
-"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
-"that going to be based on Chromium."
-msgstr ""
-
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
@@ -7251,6 +7254,17 @@
#. type: Content of: <ul><li><p>
msgid ""
+"As of April 2019, it is <a href=\"https://www.bleepingcomputer.com/news/"
+"software/major-browsers-to-prevent-disabling-of-click-tracking-privacy-risk/"
+"\">no longer possible to disable an unscrupulous tracking anti-feature</a> "
+"that <a href=\"https://html.spec.whatwg.org/multipage/links.html#hyperlink-"
+"auditing\">reports users when they follow ping links</a> in Apple Safari, "
+"Google Chrome, Opera, Microsoft Edge and also in the upcoming Microsoft Edge "
+"that going to be based on Chromium."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Until 2015, any tweet that listed a geographical tag <a href=\"http://web-"
"old.archive.org/web/20190115233002/https://www.wired.com/story/twitter-"
"location-data-gps-privacy/\"> sent the precise GPS location to Twitter's "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/08
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/09
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/10
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/05/29