[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-google.ru.html malware-...
From: |
GNUN |
Subject: |
www/proprietary malware-google.ru.html malware-... |
Date: |
Mon, 15 Jul 2019 07:01:09 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/07/15 07:01:09
Modified files:
proprietary : malware-google.ru.html malware-mobiles.ru.html
proprietary-insecurity.ru.html
proprietary-surveillance.ru.html
proprietary.ru.html
proprietary/po : malware-google.ru-en.html malware-google.ru.po
malware-mobiles.ru-en.html
malware-mobiles.ru.po
proprietary-insecurity.ru-en.html
proprietary-insecurity.ru.po
proprietary-surveillance.ru-en.html
proprietary-surveillance.ru.po
proprietary.ru-en.html proprietary.ru.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-google.ru.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-mobiles.ru.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.ru.html?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-surveillance.ru.html?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary.ru.html?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru-en.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.92&r2=1.93
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru-en.html?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru-en.html?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.220&r2=1.221
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru-en.html?cvsroot=www&r1=1.186&r2=1.187
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.547&r2=1.548
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru-en.html?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.259&r2=1.260
Patches:
Index: malware-google.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-google.ru.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- malware-google.ru.html 13 Jul 2019 19:29:09 -0000 1.41
+++ malware-google.ru.html 15 Jul 2019 11:01:08 -0000 1.42
@@ -201,6 +201,16 @@
пÑедположение, ÑÑо в пÑеÑÑижнÑÑ
неÑвободнÑÑ
пÑогÑаммаÑ
Ð½ÐµÑ ÑеÑÑезнÑÑ
оÑибок.</p>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ
оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей,
даже
+когда полÑзоваÑÐµÐ»Ñ <a
+href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+не позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>.</p>
+
+ <p>ÐÑо ÑвÑзано Ñ Ð¾Ñевидно
непÑеднамеÑенной ÑлабоÑÑÑÑ Ð² Android,
пÑеднамеÑенно
+иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми.</p>
+ </li>
+
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
@@ -555,7 +565,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/07/13 19:29:09 $
+$Date: 2019/07/15 11:01:08 $
<!-- timestamp end -->
</p>
Index: malware-mobiles.ru.html
===================================================================
RCS file: /web/www/www/proprietary/malware-mobiles.ru.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-mobiles.ru.html 27 Jun 2019 14:00:27 -0000 1.76
+++ malware-mobiles.ru.html 15 Jul 2019 11:01:08 -0000 1.77
@@ -397,6 +397,16 @@
<h3 id="surveillance">Слежка</h3>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ
оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей,
даже
+когда полÑзоваÑÐµÐ»Ñ <a
+href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+не позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>.</p>
+
+ <p>ÐÑо ÑвÑзано Ñ Ð¾Ñевидно
непÑеднамеÑенной ÑлабоÑÑÑÑ Ð² Android,
пÑеднамеÑенно
+иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми.</p>
+ </li>
+
<li id="M201905280">
<p>ÐеÑмоÑÑÑ Ð½Ð° Ñо, ÑÑо ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Apple ÑкобÑ
ÑÑÐ¾Ð¸Ñ Ð½Ð° ÑÑÑаже непÑикоÑновенноÑÑи
лиÑной жизни, в пÑиложениÑÑ
iPhone еÑÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð¾ÑÑлеживаниÑ, коÑоÑÑе по
@@ -1127,7 +1137,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/06/27 14:00:27 $
+$Date: 2019/07/15 11:01:08 $
<!-- timestamp end -->
</p>
Index: proprietary-insecurity.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.ru.html,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary-insecurity.ru.html 18 May 2019 08:59:41 -0000 1.75
+++ proprietary-insecurity.ru.html 15 Jul 2019 11:01:08 -0000 1.76
@@ -61,6 +61,16 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ
оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей,
даже
+когда полÑзоваÑÐµÐ»Ñ <a
+href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+не позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>.</p>
+
+ <p>ÐÑо ÑвÑзано Ñ Ð¾Ñевидно
непÑеднамеÑенной ÑлабоÑÑÑÑ Ð² Android,
пÑеднамеÑенно
+иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми.</p>
+ </li>
+
<li id="M201905150">
<p>ÐолÑзоваÑели, пойманнÑе в ÑÑÑÑмÑ
ай-ÑÑÐ´Ð¸Ñ — <a
href="https://boingboing.net/2019/05/15/brittle-security.html">
подÑаднÑе
@@ -707,7 +717,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/05/18 08:59:41 $
+$Date: 2019/07/15 11:01:08 $
<!-- timestamp end -->
</p>
Index: proprietary-surveillance.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-surveillance.ru.html,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- proprietary-surveillance.ru.html 13 Jul 2019 19:29:09 -0000 1.206
+++ proprietary-surveillance.ru.html 15 Jul 2019 11:01:08 -0000 1.207
@@ -839,6 +839,16 @@
</div>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ
оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей,
даже
+когда полÑзоваÑÐµÐ»Ñ <a
+href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+не позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>.</p>
+
+ <p>ÐÑо ÑвÑзано Ñ Ð¾Ñевидно
непÑеднамеÑенной ÑлабоÑÑÑÑ Ð² Android,
пÑеднамеÑенно
+иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми.</p>
+ </li>
+
<li id="M201905300">
<p>ÐÑиложение “ÑождаемоÑÑи” Femm в
Ñайне ÑвлÑеÑÑÑ <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
@@ -2517,7 +2527,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/07/13 19:29:09 $
+$Date: 2019/07/15 11:01:08 $
<!-- timestamp end -->
</p>
Index: proprietary.ru.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary.ru.html,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary.ru.html 10 Jul 2019 13:00:22 -0000 1.106
+++ proprietary.ru.html 15 Jul 2019 11:01:08 -0000 1.107
@@ -162,6 +162,29 @@
<h3 id="latest">ÐоÑледние добавлениÑ</h3>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ
оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей,
даже
+когда полÑзоваÑÐµÐ»Ñ <a
+href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+не позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>.</p>
+
+ <p>ÐÑо ÑвÑзано Ñ Ð¾Ñевидно
непÑеднамеÑенной ÑлабоÑÑÑÑ Ð² Android,
пÑеднамеÑенно
+иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми.</p>
+ </li>
+
+ <li id="M201809210">
+ <p>Cash of Clans — Ñ
оÑоÑий пÑимеÑ
беÑплаÑной мобилÑной игÑÑ, коÑоÑÑÑ
+ее ÑазÑабоÑÑики Ñделали <a
+href="https://gamerant.com/clash-of-clans-addiction/"> вÑзÑваÑÑей
ÑилÑнÑÑ
+завиÑимоÑÑÑ</a> Ñ Ð±Ð¾Ð»ÑÑой доли
полÑзоваÑелей — и пÑевÑаÑили в
+авÑомаÑ, пÑоизводÑÑий денÑги длÑ
ÑазÑабоÑÑиков, Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ <a
+href="/proprietary/proprietary-addictions.html#addictiveness"> пÑиемов
+пÑиÑ
ологиÑеÑкой манипÑлÑÑии</a>.</p>
+
+ <p>Ð ÑÑаÑÑе Ñлово “ÑвободнÑй”
иÑполÑзÑеÑÑÑ Ð² ÑмÑÑле нÑлевой
+ÑенÑ. ÐÑ ÑекомендÑем вмеÑÑо ÑÑого говоÑиÑÑ
“беÑплаÑнÑй”.</p>
+ </li>
+
<li id="M209800000">
<p>РазÑабоÑÑики беÑплаÑнÑÑ
мобилÑнÑÑ
игÑ
пÑименÑÑÑ <a
href="/proprietary/proprietary-addictions.html#addictiveness"> пÑиемÑ
@@ -211,37 +234,6 @@
доÑÑавки (в ÑлÑÑае DoorDash). ÐоÑле Ñого как ÑÑа
инÑоÑмаÑÐ¸Ñ ÑобÑана
компанией, невозможно ÑказаÑÑ, Ð´Ð»Ñ Ñего ее
бÑдÑÑ Ð¸ÑполÑзоваÑÑ.</p>
</li>
-
- <li id="M201905300">
- <p>ÐÑиложение “ÑождаемоÑÑи” Femm в
Ñайне ÑвлÑеÑÑÑ <a
-href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
-оÑÑдием пÑопагандÑ</a> Ñ
ÑиÑÑиан-наÑалиÑÑов.
Ðно наÑÐ°Ð¶Ð´Ð°ÐµÑ Ð½ÐµÐ´Ð¾Ð²ÐµÑие к
-конÑÑаÑепÑии.</p>
-
- <p>Ðно еÑе и подглÑдÑÐ²Ð°ÐµÑ Ð·Ð°
полÑзоваÑелÑми, как и ÑледÑÐµÑ Ð¾Ð¶Ð¸Ð´Ð°ÑÑ Ð¾Ñ
-неÑвободнÑÑ
пÑогÑамм.</p>
- </li>
-
- <li id="M201905061">
- <p>Amazon Alexa ÑобиÑÐ°ÐµÑ Ð³Ð¾Ñаздо болÑÑе
инÑоÑмаÑии о полÑзоваÑелÑÑ
, Ñем
-необÑ
одимо Ð´Ð»Ñ Ð¿ÑавилÑного
ÑÑнкÑиониÑÐ¾Ð²Ð°Ð½Ð¸Ñ (вÑемÑ, меÑÑо, запиÑи,
ÑделаннÑе
-без надлежаÑего ÑведомлениÑ), и оÑпÑавлÑеÑ
ее на ÑеÑвеÑÑ Amazon, коÑоÑÑе
-Ñ
ÑанÑÑ Ð¸Ñ
неопÑеделенное вÑемÑ. Ð¥Ñже Ñого,
Amazon пеÑеÑÑÐ»Ð°ÐµÑ ÐµÐµ в дÑÑгие
-компании. Тем ÑамÑм, даже еÑли
полÑзоваÑели запÑаÑиваÑÑ Ñдаление ÑвоиÑ
-даннÑÑ
Ñ ÑеÑвеÑов Amazon <a
-href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
-даннÑе оÑÑаÑÑÑÑ Ð½Ð° дÑÑгиÑ
ÑеÑвеÑаÑ
</a>, где
иÑ
могÑÑ Ð¿Ð¾Ð»ÑÑаÑÑ ÑекламнÑе
-компании, а Ñакже гоÑÑдаÑÑÑвеннÑе оÑганÑ.
ÐÑÑгими Ñловами, Ñдаление
-ÑобÑанной инÑоÑмаÑии не пÑекÑаÑÐ°ÐµÑ Ð²Ñеда
Ð¾Ñ ÐµÐµ ÑбоÑа.</p>
-
- <p>ÐаннÑе, ÑобÑаннÑе Ñакими ÑÑÑÑойÑÑвами
как ÑеÑмоÑÑÐ°Ñ Nest, ÑеÑевÑе
-ÑвеÑилÑники Philips Hue, ÑÑÑÑойÑÑво оÑкÑÑваниÑ
гаÑажа Chamberlain MyQ и
-колонки Sonos Ñаким же обÑазом Ñ
ÑанÑÑÑÑ
долÑÑе, Ñем необÑ
одимо, на ÑеÑвеÑаÑ
,
-к коÑоÑÑм пÑивÑÐ·Ð°Ð½Ñ ÑÑи ÑÑÑÑойÑÑва. Ðолее
Ñого, иÑ
пеÑедаÑÑ Ð² Alexa. Ð
-ÑезÑлÑÑаÑе Ñ Amazon поÑвлÑеÑÑÑ Ð¾ÑÐµÐ½Ñ ÑоÑнаÑ
каÑÑина домаÑней жизни
-полÑзоваÑелÑ, не ÑолÑко в наÑÑоÑÑем, но и в
пÑоÑлом (и — кÑо
-знаеÑ? — Ð¼Ð¾Ð¶ÐµÑ Ð±ÑÑÑ, и в бÑдÑÑем).</p>
- </li>
</ul>
@@ -323,7 +315,7 @@
<p class="unprintable"><!-- timestamp start -->
Ðбновлено:
-$Date: 2019/07/10 13:00:22 $
+$Date: 2019/07/15 11:01:08 $
<!-- timestamp end -->
</p>
Index: po/malware-google.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru-en.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- po/malware-google.ru-en.html 13 Jul 2019 19:29:10 -0000 1.39
+++ po/malware-google.ru-en.html 15 Jul 2019 11:01:08 -0000 1.40
@@ -193,6 +193,16 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
@@ -521,7 +531,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/13 19:29:10 $
+$Date: 2019/07/15 11:01:08 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.92
retrieving revision 1.93
diff -u -b -r1.92 -r1.93
--- po/malware-google.ru.po 15 Jul 2019 10:02:20 -0000 1.92
+++ po/malware-google.ru.po 15 Jul 2019 11:01:09 -0000 1.93
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-07-15 09:55+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -355,12 +354,18 @@
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
"to locations</a>."
msgstr ""
+"Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ Ð¾ÑÑлеживаÑÑ
пеÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей, даже "
+"когда полÑзоваÑÐµÐ»Ñ <a
href=\"https://www.theverge.com/2019/7/8/20686514/"
+"android-covert-channel-permissions-data-collection-imei-ssid-location\"> не
"
+"позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
"This involves an apparently unintentional weakness in Android, exploited "
"intentionally by malicious apps."
msgstr ""
+"ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, пÑеднамеÑенно "
+"иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/malware-mobiles.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru-en.html,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- po/malware-mobiles.ru-en.html 27 Jun 2019 14:00:28 -0000 1.77
+++ po/malware-mobiles.ru-en.html 15 Jul 2019 11:01:09 -0000 1.78
@@ -392,6 +392,16 @@
<h3 id="surveillance">Mobile Surveillance</h3>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
<li id="M201905280">
<p>In spite of Apple's supposed commitment to
privacy, iPhone apps contain trackers that are busy at night <a
@@ -1079,7 +1089,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/27 14:00:28 $
+$Date: 2019/07/15 11:01:09 $
<!-- timestamp end -->
</p>
</div>
Index: po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- po/malware-mobiles.ru.po 15 Jul 2019 10:02:20 -0000 1.195
+++ po/malware-mobiles.ru.po 15 Jul 2019 11:01:09 -0000 1.196
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-07-15 09:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -712,12 +711,18 @@
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
"to locations</a>."
msgstr ""
+"Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ Ð¾ÑÑлеживаÑÑ
пеÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей, даже "
+"когда полÑзоваÑÐµÐ»Ñ <a
href=\"https://www.theverge.com/2019/7/8/20686514/"
+"android-covert-channel-permissions-data-collection-imei-ssid-location\"> не
"
+"позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
"This involves an apparently unintentional weakness in Android, exploited "
"intentionally by malicious apps."
msgstr ""
+"ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, пÑеднамеÑенно "
+"иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary-insecurity.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru-en.html,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- po/proprietary-insecurity.ru-en.html 18 May 2019 08:59:41 -0000
1.74
+++ po/proprietary-insecurity.ru-en.html 15 Jul 2019 11:01:09 -0000
1.75
@@ -53,6 +53,16 @@
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
<li id="M201905150">
<p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
@@ -678,7 +688,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/18 08:59:41 $
+$Date: 2019/07/15 11:01:09 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.220
retrieving revision 1.221
diff -u -b -r1.220 -r1.221
--- po/proprietary-insecurity.ru.po 15 Jul 2019 10:02:23 -0000 1.220
+++ po/proprietary-insecurity.ru.po 15 Jul 2019 11:01:09 -0000 1.221
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-07-15 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -113,12 +112,18 @@
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
"to locations</a>."
msgstr ""
+"Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ Ð¾ÑÑлеживаÑÑ
пеÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей, даже "
+"когда полÑзоваÑÐµÐ»Ñ <a
href=\"https://www.theverge.com/2019/7/8/20686514/"
+"android-covert-channel-permissions-data-collection-imei-ssid-location\"> не
"
+"позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
"This involves an apparently unintentional weakness in Android, exploited "
"intentionally by malicious apps."
msgstr ""
+"ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, пÑеднамеÑенно "
+"иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary-surveillance.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru-en.html,v
retrieving revision 1.186
retrieving revision 1.187
diff -u -b -r1.186 -r1.187
--- po/proprietary-surveillance.ru-en.html 13 Jul 2019 19:29:10 -0000
1.186
+++ po/proprietary-surveillance.ru-en.html 15 Jul 2019 11:01:09 -0000
1.187
@@ -813,6 +813,16 @@
</div>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
<li id="M201905300">
<p>The Femm “fertility” app is secretly a <a
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
@@ -2422,7 +2432,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/13 19:29:10 $
+$Date: 2019/07/15 11:01:09 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.547
retrieving revision 1.548
diff -u -b -r1.547 -r1.548
--- po/proprietary-surveillance.ru.po 15 Jul 2019 10:02:25 -0000 1.547
+++ po/proprietary-surveillance.ru.po 15 Jul 2019 11:01:09 -0000 1.548
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-07-15 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1484,12 +1483,18 @@
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
"to locations</a>."
msgstr ""
+"Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ Ð¾ÑÑлеживаÑÑ
пеÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей, даже "
+"когда полÑзоваÑÐµÐ»Ñ <a
href=\"https://www.theverge.com/2019/7/8/20686514/"
+"android-covert-channel-permissions-data-collection-imei-ssid-location\"> не
"
+"позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
"This involves an apparently unintentional weakness in Android, exploited "
"intentionally by malicious apps."
msgstr ""
+"ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, пÑеднамеÑенно "
+"иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми."
#. type: Content of: <ul><li><p>
msgid ""
Index: po/proprietary.ru-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru-en.html,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- po/proprietary.ru-en.html 10 Jul 2019 13:00:24 -0000 1.102
+++ po/proprietary.ru-en.html 15 Jul 2019 11:01:09 -0000 1.103
@@ -147,6 +147,29 @@
<h3 id="latest">Latest additions</h3>
<ul class="blurbs">
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
+
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
+ </li>
+
+ <li id="M201809210">
+ <p>Cash of Clans is a good example of a gratis mobile game that its
+ developers <a href="https://gamerant.com/clash-of-clans-addiction/">
+ made very addictive</a> for a large proportion of its users—and
+ turned into a cash machine for themselves—by using <a
+ href="/proprietary/proprietary-addictions.html#addictiveness">
+ psychological manipulation techniques</a>.</p>
+
+ <p>The article uses “free” to mean “zero
+ price,” which is a usage we should avoid. We recommend saying
+ “gratis” instead.</p>
+ </li>
+
<li id="M209800000">
<p>The developers of gratis mobile games apply <a
href="/proprietary/proprietary-addictions.html#addictiveness">
@@ -197,38 +220,6 @@
is collected by the company, there is no telling what it will be
used for.</p>
</li>
-
- <li id="M201905300">
- <p>The Femm “fertility” app is secretly a <a
-
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool for propaganda</a> by natalist Christians. It spreads distrust
- for contraception.</p>
-
- <p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
- </li>
-
- <li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
- it to Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,
- even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
- advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
- collecting it.</p>
-
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
- in the future too?)</p>
- </li>
</ul>
@@ -289,7 +280,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/10 13:00:24 $
+$Date: 2019/07/15 11:01:09 $
<!-- timestamp end -->
</p>
</div>
Index: po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.259
retrieving revision 1.260
diff -u -b -r1.259 -r1.260
--- po/proprietary.ru.po 15 Jul 2019 10:02:26 -0000 1.259
+++ po/proprietary.ru.po 15 Jul 2019 11:01:09 -0000 1.260
@@ -15,7 +15,6 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
-"X-Outdated-Since: 2019-07-15 09:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -308,12 +307,18 @@
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
"to locations</a>."
msgstr ""
+"Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ Ð¾ÑÑлеживаÑÑ
пеÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей, даже "
+"когда полÑзоваÑÐµÐ»Ñ <a
href=\"https://www.theverge.com/2019/7/8/20686514/"
+"android-covert-channel-permissions-data-collection-imei-ssid-location\"> не
"
+"позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
"This involves an apparently unintentional weakness in Android, exploited "
"intentionally by malicious apps."
msgstr ""
+"ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, пÑеднамеÑенно "
+"иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми."
#. type: Content of: <ul><li><p>
msgid ""
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-google.ru.html malware-...,
GNUN <=