[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Tue, 16 Jul 2019 16:29:53 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/07/16 16:29:53
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.ru.po nl.po
pl.po pot proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.46&r2=1.47
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.204&r2=1.205
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.102&r2=1.103
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.185&r2=1.186
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.104&r2=1.105
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.119&r2=1.120
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.94&r2=1.95
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.105&r2=1.106
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.237&r2=1.238
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.107&r2=1.108
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- de.po 15 Jul 2019 10:02:17 -0000 1.108
+++ de.po 16 Jul 2019 20:29:51 -0000 1.109
@@ -814,6 +814,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- es.po 15 Jul 2019 10:02:18 -0000 1.145
+++ es.po 16 Jul 2019 20:29:51 -0000 1.146
@@ -732,6 +732,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- fr.po 15 Jul 2019 11:32:42 -0000 1.188
+++ fr.po 16 Jul 2019 20:29:51 -0000 1.189
@@ -708,6 +708,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- it.po 15 Jul 2019 10:02:18 -0000 1.108
+++ it.po 16 Jul 2019 20:29:51 -0000 1.109
@@ -761,6 +761,20 @@
msgstr "Backdoor di Apple"
#. type: Content of: <ul><li><p>
+msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | The Dropbox app for Macintosh <a
# |
[-href=\"http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\">takes
# | total-]
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- ja.po 15 Jul 2019 10:02:18 -0000 1.114
+++ ja.po 16 Jul 2019 20:29:51 -0000 1.115
@@ -643,6 +643,20 @@
msgstr "Appleã®ããã¯ãã¢"
#. type: Content of: <ul><li><p>
+msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
#| "The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-apple.de-diff.html 10 Jul 2019 13:00:22 -0000 1.38
+++ malware-apple.de-diff.html 16 Jul 2019 20:29:51 -0000 1.39
@@ -93,6 +93,17 @@
Mac</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -176,21 +187,20 @@
DRM (digital restrictions mechanisms)</em></ins></span> in <span
class="inserted"><ins><em>MacOS</a>. This article
focuses on</em></ins></span> the <span
class="removed"><del><strong>iThings Messages
app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed</strong></del></span>
<span class="inserted"><ins><em>fact that</em></ins></span> a <span
class="removed"><del><strong>malicious web site</strong></del></span> <span
class="inserted"><ins><em>new model of Macbook introduced a
- requirement for monitors</em></ins></span> to <span
class="removed"><del><strong>extract all the user's messaging history</a>.
- </p>
+ requirement for monitors</em></ins></span> to <span
class="removed"><del><strong>extract all</strong></del></span> <span
class="inserted"><ins><em>have malicious hardware, but DRM software
+ in MacOS is involved in activating</em></ins></span> the <span
class="removed"><del><strong>user's messaging history</a>.
+ </p></strong></del></span> <span class="inserted"><ins><em>hardware.
The software for
+ accessing iTunes is also responsible.</p></em></ins></span>
</li>
-</ul>
+<span class="removed"><del><strong></ul>
<h3 id="interference">Apple Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage,</strong></del></span> <span class="inserted"><ins><em>have
malicious hardware,</em></ins></span> but <span
class="removed"><del><strong>they are not grave enough to qualify
-for</strong></del></span> <span class="inserted"><ins><em>DRM software
- in MacOS is involved in activating</em></ins></span> the <span
class="removed"><del><strong>word “sabotage”. Nonetheless, they are
nasty</strong></del></span> <span class="inserted"><ins><em>hardware. The
software for
- accessing iTunes is also responsible.</p>
- </li>
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span>
- <li id="M200708130">
+ <span class="inserted"><ins><em><li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article focused on
Windows</em></ins></span>
+ DRM that caters</em></ins></span> to <span
class="removed"><del><strong>qualify
+for the word “sabotage”. Nonetheless, they are
nasty</strong></del></span> <span class="inserted"><ins><em>Bluray
disks</a>. (The article focused on Windows</em></ins></span>
and <span class="removed"><del><strong>wrong. This section describes
examples of</strong></del></span> <span class="inserted"><ins><em>said that
MacOS would do the same thing subsequently.)</p>
</li>
@@ -232,34 +242,34 @@
<h3 id="sabotage">Apple Sabotage</h3>
-<p>These are situations</strong></del></span>
+<p>These are situations in which Apple employs its power
over</strong></del></span>
<span class="inserted"><ins><em><li id="M201802120">
- <p>Apple devices lock users</em></ins></span> in <span
class="removed"><del><strong>which</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely to</em></ins></span> Apple <span
class="removed"><del><strong>employs its power over users</strong></del></span>
<span class="inserted"><ins><em>services</a> by being
designed</em></ins></span> to <span class="removed"><del><strong>directly
intervene in ways that harm them</strong></del></span> <span
class="inserted"><ins><em>be incompatible
- with all other options, ethical</em></ins></span> or <span
class="removed"><del><strong>block their work.</p>
+ <p>Apple devices lock</em></ins></span> users
+<span class="removed"><del><strong>to directly intervene</strong></del></span>
in <span class="removed"><del><strong>ways that harm them or block their
work.</p>
<ul>
<li>
- <p>MacOS High Sierra forcibly reformats SSD boot
drives,</strong></del></span> <span
class="inserted"><ins><em>unethical.</p>
- </li>
-
- <li id="M201605044">
- <p>iWork (office software that runs on MacOS,
- iOS and iCloud) uses secret formats</em></ins></span> and <a
+ <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</strong></del></span> <a
<span
class="removed"><del><strong>href="https://www.macworld.com/article/3230498/storage/apple-file-system-apfs-faq.html">
changes the file system from HFS+</strong></del></span>
- <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/IWork">provides
no means of
- converting them</em></ins></span> to <span
class="removed"><del><strong>APFS</a>, which cannot be accessed
- from GNU/Linux, Windows</strong></del></span> or <span
class="removed"><del><strong>even older versions of MacOS.</p>
+ <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely to Apple services</a> by being designed</em></ins></span> to
<span class="removed"><del><strong>APFS</a>, which
cannot</strong></del></span> be <span class="removed"><del><strong>accessed
+ from GNU/Linux, Windows</strong></del></span> <span
class="inserted"><ins><em>incompatible
+ with all other options, ethical</em></ins></span> or <span
class="removed"><del><strong>even older versions of
MacOS.</p></strong></del></span> <span
class="inserted"><ins><em>unethical.</p></em></ins></span>
</li>
- <li>
- <p>Apple will stop <a
href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older
+ <span class="removed"><del><strong><li>
+ <p>Apple will stop</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605044">
+ <p>iWork (office software that runs on MacOS,
+ iOS and iCloud) uses secret formats and</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/jun/06/iphone-ipad-apps-games-apple-5-5c-obsolete">fixing
bugs for older
model iThings</a>.</p>
- <p>Meanwhile, Apple stops people</strong></del></span> from <span
class="removed"><del><strong>fixing problems themselves;
+ <p>Meanwhile, Apple stops people</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/IWork">provides
no means of
+ converting them to or</em></ins></span> from <span
class="removed"><del><strong>fixing problems themselves;
that's</strong></del></span> <span class="inserted"><ins><em>Open Document
Formats</a>. iWork
formats have changed several times since they were first
introduced. This may have had</em></ins></span> the <span
class="removed"><del><strong>nature</strong></del></span> <span
class="inserted"><ins><em>effect</em></ins></span> of <span
class="removed"><del><strong>proprietary software.</p>
@@ -386,230 +396,242 @@
designing general purpose computers with censorship of application
programs.</p>
-<p>Here is</em></ins></span> an <span class="removed"><del><strong>Apple
ID (<a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary
to install even gratis apps</a>) without giving a valid email address
and receiving</strong></del></span> <span class="inserted"><ins><em>article
about</em></ins></span> the <span
class="removed"><del><strong>verification</strong></del></span> <span
class="inserted"><ins><em><a
-href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/"></em></ins></span>
-code <span class="removed"><del><strong>Apple
- sends</strong></del></span> <span
class="inserted"><ins><em>signing</a> that the iThings
use</em></ins></span> to <span class="removed"><del><strong>it.</p>
- </li>
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>lock up the user.</p>
-
-<p>Curiously, Apple is beginning</em></ins></span> to <span
class="removed"><del><strong>Apple's servers all</strong></del></span> <span
class="inserted"><ins><em>allow limited passage through</em></ins></span> the
<span class="removed"><del><strong>photos and
- videos</strong></del></span>
-<span class="inserted"><ins><em>walls of the iThing jail: users can now
install apps built from
-source code, provided the source code is written in Swift. Users
-cannot do this freely because</em></ins></span> they <span
class="removed"><del><strong>make.</p>
+<p>Here is</em></ins></span> an <span class="inserted"><ins><em>article
about the <a
+href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+code signing</a> that the iThings use to lock up the user.</p>
+
+<p>Curiously,</em></ins></span> Apple <span
class="removed"><del><strong>ID (<a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">necessary</strong></del></span>
<span class="inserted"><ins><em>is beginning</em></ins></span> to <span
class="inserted"><ins><em>allow limited passage through the
+walls of the iThing jail: users can now</em></ins></span> install <span
class="removed"><del><strong>even gratis apps</a>) without giving a valid
email address and receiving</strong></del></span> <span
class="inserted"><ins><em>apps built from
+source code, provided</em></ins></span> the <span
class="removed"><del><strong>verification</strong></del></span> <span
class="inserted"><ins><em>source</em></ins></span> code <span
class="removed"><del><strong>Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>is written
in Swift. Users
+cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>it.</p>
+ </li>
+ <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>identify
+themselves. <a href="https://developer.apple.com/xcode/">Here
+are details</a>. While this is a crack in the prison walls, it is not
+big enough</em></ins></span> to <span class="removed"><del><strong>Apple's
servers all</strong></del></span> <span class="inserted"><ins><em>mean
that</em></ins></span> the <span class="removed"><del><strong>photos and
+ videos they make.</p>
<blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make</strong></del></span> are <span
class="removed"><del><strong>automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From</strong></del></span> <span
class="inserted"><ins><em>required to identify
-themselves.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.apple.com/icloud/photos/">Apple's
iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span
class="inserted"><ins><em>href="https://developer.apple.com/xcode/">Here
-are details</a>. While this</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span> <span class="inserted"><ins><em>a crack
in</em></ins></span> the
- <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
- “please don't ask where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>prison walls, it</em></ins></span> is <span
class="removed"><del><strong>a way</strong></del></span> <span
class="inserted"><ins><em>not
-big enough</em></ins></span> to <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active</strong></del></span> <span
class="inserted"><ins><em>mean that the iThings are no longer jails.</p>
-
-<h4>Examples of censorship</em></ins></span> by <span
class="removed"><del><strong>default so it still counts as a
- surveillance functionality.</p>
+ iCloud Photo Library stores every photo</strong></del></span> <span
class="inserted"><ins><em>iThings are no longer jails.</p>
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>Apple jails</h4>
+<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
<li id="M201905150">
- <p>Users caught in the jail</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>an iMonster are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
- ducks for other attackers</a>, and the app censorship prevents
security
+ <p>Users caught in the jail of an iMonster are <a
+ href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ ducks for other attackers</a>,</em></ins></span> and <span
class="removed"><del><strong>video you take,</strong></del></span> <span
class="inserted"><ins><em>the app censorship prevents security
companies from figuring out how those attacks work.</p>
- <p>Apple's censorship</em></ins></span> of <span
class="removed"><del><strong>many celebrities</a>. They
needed</strong></del></span> <span class="inserted"><ins><em>apps is
fundamentally unjust, and would be
- inexcusable even if it didn't lead</em></ins></span> to <span
class="removed"><del><strong>break Apple's</strong></del></span> security <span
class="removed"><del><strong>to get at them, but NSA can access any of them
through</strong></del></span> <span class="inserted"><ins><em>threats as
well.</p>
+ <p>Apple's censorship of apps is fundamentally
unjust,</em></ins></span> and <span class="removed"><del><strong>keeps them
up</strong></del></span> <span class="inserted"><ins><em>would be
+ inexcusable even if it didn't lead</em></ins></span> to <span
class="removed"><del><strong>date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a></strong></del></span> <span
class="inserted"><ins><em>security threats</em></ins></span> as <span
class="removed"><del><strong>accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>well.</p>
</li>
<li id="M201710130">
- <p>Apple is</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ <p>Apple</em></ins></span> is <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT202033">activated
by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
+ censoring apps for</em></ins></span> the
+ <span class="removed"><del><strong>startup of iOS</a>. The term
“cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span> <span class="inserted"><ins><em>US
government too</a>. Specifically, it</em></ins></span> is <span
class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active</strong></del></span>
+ <span class="inserted"><ins><em>deleting apps developed</em></ins></span>
by <span class="removed"><del><strong>default so it still counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this to
+ <a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any</strong></del></span>
<span class="inserted"><ins><em>Iranians.</p>
+
+ <p>The root</em></ins></span> of <span
class="removed"><del><strong>them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
<li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- MacOS automatically sends to</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
- censoring apps for the US government too</a>. Specifically, it is
- deleting apps developed by Iranians.</p>
-
- <p>The root of these wrongs are in Apple. If</em></ins></span> Apple
<span class="removed"><del><strong>servers unsaved documents being
+ MacOS automatically sends to Apple servers unsaved documents being
edited</a>. The <a
href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
- things you have</strong></del></span> <span
class="inserted"><ins><em>had</em></ins></span> not <span
class="removed"><del><strong>decided to save are even more sensitive
than</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span>
- the
- <span class="removed"><del><strong>things you</strong></del></span> <span
class="inserted"><ins><em>iMonsters to let Apple censor applications, Apple
would not</em></ins></span> have <span class="removed"><del><strong>stored in
files</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>had the power to stop users from
installing whatever kind of apps.</p></em></ins></span>
+ things you have not decided to save</strong></del></span> <span
class="inserted"><ins><em>these wrongs</em></ins></span> are <span
class="removed"><del><strong>even more sensitive than the
+ things you have stored</strong></del></span> in <span
class="removed"><del><strong>files</a>.</p>
+ </li>
+
+ <li><p>Apple has made various
+ <a
href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files to</strong></del></span> <span
class="inserted"><ins><em>Apple. If</em></ins></span> Apple <span
class="removed"><del><strong>servers without asking permission</a>.
+ This exposes</strong></del></span> <span class="inserted"><ins><em>had not
designed</em></ins></span>
+ the <span class="removed"><del><strong>files to Big Brother and
perhaps</strong></del></span> <span
class="inserted"><ins><em>iMonsters</em></ins></span> to <span
class="removed"><del><strong>other snoops.</p>
+
+ <p>It also demonstrates how you can't trust proprietary software,
+ because even if today's version doesn't</strong></del></span> <span
class="inserted"><ins><em>let Apple censor applications, Apple would
not</em></ins></span> have <span class="removed"><del><strong>a malicious
+ functionality, tomorrow's version might add it. The developer won't
+ remove the malfeature unless many users push back hard,
and</strong></del></span>
+ <span class="inserted"><ins><em>had</em></ins></span> the <span
class="inserted"><ins><em>power to stop</em></ins></span> users
+ <span class="removed"><del><strong>can't remove it
themselves.</p></strong></del></span> <span
class="inserted"><ins><em>from installing whatever kind of
apps.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apple has made
various</strong></del></span>
+ <span class="removed"><del><strong><li><p>Various operations
in</strong></del></span>
<span class="inserted"><ins><em><li id="M201707290">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
- MacOS programs send files</strong></del></span>
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540">
+ the latest MacOS send reports</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
deleted several VPNs from its app store for China</a>, thus using its
- own censorship power</em></ins></span> to <span
class="removed"><del><strong>Apple servers without asking permission</a>.
- This exposes</strong></del></span> <span
class="inserted"><ins><em>strengthen that of</em></ins></span> the <span
class="removed"><del><strong>files to Big Brother and
perhaps</strong></del></span> <span class="inserted"><ins><em>Chinese
government.</p>
+ own censorship power</em></ins></span> to <span
class="removed"><del><strong>Apple</a>
servers.</p></strong></del></span> <span
class="inserted"><ins><em>strengthen that of the Chinese
government.</p></em></ins></span>
</li>
- <li id="M201701064">
- <p>Apple used its censorship system</em></ins></span> to <span
class="removed"><del><strong>other snoops.</p>
+ <span class="removed"><del><strong><li><p>Spyware in MacOS:
+ <a
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ Spotlight search</a> sends users' search terms</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201701064">
+ <p>Apple used its censorship system</em></ins></span> to <span
class="removed"><del><strong>Apple.</p>
+ </li>
- <p>It also demonstrates how you can't trust proprietary
software,</strong></del></span> <span class="inserted"><ins><em>enforce Russian
surveillance <a
-
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
- by blocking distribution of the LinkedIn app in Russia</a>.</p>
+ <li><p>Apple admits the</strong></del></span> <span
class="inserted"><ins><em>enforce Russian surveillance</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
+ spying</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ by blocking distribution of the LinkedIn app</em></ins></span> in <span
class="inserted"><ins><em>Russia</a>.</p>
- <p>This is ironic</em></ins></span> because <span
class="removed"><del><strong>even if today's version doesn't
have</strong></del></span> <span class="inserted"><ins><em>LinkedIn
is</em></ins></span> a <span class="removed"><del><strong>malicious
- functionality, tomorrow's version might add it. The developer won't
- remove the malfeature unless many</strong></del></span> <span
class="inserted"><ins><em>surveillance system itself.
- While subjecting its</em></ins></span> users <span
class="removed"><del><strong>push back hard,</strong></del></span> <span
class="inserted"><ins><em>to its own surveillance, it tries to
- protect its users from Russian surveillance,</em></ins></span> and <span
class="inserted"><ins><em>is therefore subject
+ <p>This is ironic because LinkedIn is</em></ins></span> a <span
class="removed"><del><strong>search facility</a>, but there's a lot
+ <a href="https://github.com/fix-macosx/yosemite-phone-home">
+ more snooping that Apple has not talked about</a>.</p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>surveillance system itself.
+ While subjecting its users</em></ins></span> to <span
class="removed"><del><strong>exist for no possible
+ purpose other than surveillance</a>. Here</strong></del></span> <span
class="inserted"><ins><em>its own surveillance, it tries to
+ protect its users from Russian surveillance, and</em></ins></span> is
<span class="inserted"><ins><em>therefore subject
to Russian censorship.</p>
- <p>However,</em></ins></span> the <span
class="removed"><del><strong>users
- can't remove it themselves.</p></strong></del></span> <span
class="inserted"><ins><em>point here is the wrong of Apple's censorship of
+ <p>However,</em></ins></span> the <span
class="removed"><del><strong><a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>point here is the wrong of Apple's censorship of
apps.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Various operations
in</strong></del></span>
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
<span class="inserted"><ins><em><li id="M201701050">
- <p>Apple used its censorship system to enforce China's
censorship</em></ins></span> <a <span
class="removed"><del><strong>href="http://lifehacker.com/safari-and-spotlight-can-send-data-to-apple-heres-how-1648453540"></strong></del></span>
+ <p>Apple used its censorship system to enforce China's
censorship</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2017/jan/05/apple-removes-new-york-times-app-in-china">
- by blocking distribution of</em></ins></span> the <span
class="removed"><del><strong>latest MacOS send reports to Apple</a>
servers.</p></strong></del></span> <span class="inserted"><ins><em>New
York Times app</a>.</p></em></ins></span>
+ by blocking distribution of</em></ins></span> the <span
class="removed"><del><strong>iThing is, and
+ get other info too.</p></strong></del></span> <span
class="inserted"><ins><em>New York Times
app</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Spyware in
MacOS:</strong></del></span>
+ <span class="removed"><del><strong><li><p>Apple can, and
regularly does,</strong></del></span>
<span class="inserted"><ins><em><li id="M201605190">
- <p>Apple censors games,</em></ins></span> <a <span
class="removed"><del><strong>href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- Spotlight search</a> sends users' search terms to Apple.</p>
- </li>
-
- <li><p>Apple admits</strong></del></span>
+ <p>Apple censors games,</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract</strong></del></span>
<span
class="inserted"><ins><em>href="http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game">
- banning some games from</em></ins></span> the <span
class="inserted"><ins><em>cr…app store</a> because of which
+ banning</em></ins></span> some <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>games</em></ins></span> from <span
class="removed"><del><strong>iPhones for</strong></del></span> the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>cr…app store</a> because of which
political points they suggest. Some political points are apparently
considered acceptable.</p>
</li>
<li id="M201509290">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.intego.com/mac-security-blog/spotlight-suggestions-in-os-x-yosemite-and-ios-are-you-staying-private/">
- spying in a search facility</a>, but there's</strong></del></span>
<span
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
- banned</em></ins></span> a <span class="removed"><del><strong>lot
- <a href="https://github.com/fix-macosx/yosemite-phone-home">
- more snooping that Apple has not talked
about</a>.</p></strong></del></span> <span
class="inserted"><ins><em>program from the App Store</a> because its
developers
+ <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
+ banned a program from the App Store</a> because its developers
committed the enormity of disassembling some
iThings.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<h3 id="incompatibility">Apple Incompatibility</h3>
- <span class="removed"><del><strong><li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features”</strong></del></span>
+<p>In this section, we list characteristics</strong></del></span>
<span class="inserted"><ins><em><li id="M201509230">
- <p>As</em></ins></span> of <span class="removed"><del><strong>iOS
seem to exist for no possible
- purpose other than surveillance</a>. Here is
the</strong></del></span> <span class="inserted"><ins><em>2015,
Apple</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p>
- </li>
+ <p>As</em></ins></span> of <span
class="inserted"><ins><em>2015,</em></ins></span> Apple <span
class="removed"><del><strong>programs</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
+ systematically bans apps</em></ins></span> that <span
class="removed"><del><strong>block</strong></del></span> <span
class="inserted"><ins><em>endorse abortion rights</em></ins></span> or
+<span class="removed"><del><strong>hinder users from switching to any
alternative program—and, in
+particular, from switching to free software which can liberate the device
+the software runs on.</p>
- <li><p>The</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/commentisfree/2015/sep/23/apple-anti-choice-tendencies-showing-in-app-store-reproductive-rights">
- systematically bans apps that endorse abortion rights or would help
+<ul>
+<li>
+<p>Apple devices lock users in</strong></del></span> <span
class="inserted"><ins><em>would help
women find abortions</a>.</p>
- <p>This particular political slant</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing is, and
- get</strong></del></span>
+ <p>This particular political slant</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+solely to Apple services</a> by being designed to be incompatible with
all</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions">
- affects</em></ins></span> other <span class="removed"><del><strong>info
too.</p></strong></del></span> <span class="inserted"><ins><em>Apple
services</a>.</p></em></ins></span>
+ affects</em></ins></span> other <span
class="removed"><del><strong>options, ethical or
unethical.</p></strong></del></span> <span
class="inserted"><ins><em>Apple services</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Apple can, and
regularly does, <a
-
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span>
+<span class="removed"><del><strong><li>
+<p>iWork (office software</strong></del></span>
<span class="inserted"><ins><em><li id="M201506250">
<p>Apple has banned iThing
- applications that show</em></ins></span> the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>confederate flag.</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not as much</strong></del></span>
+ applications</em></ins></span> that <span
class="removed"><del><strong>runs on MacOS, iOS and iCloud) uses secret
+formats and</strong></del></span> <span class="inserted"><ins><em>show the
confederate flag.</em></ins></span> <a <span
class="removed"><del><strong>href="https://en.wikipedia.org/wiki/IWork">provides
no means</strong></del></span>
<span
class="inserted"><ins><em>href="http://www.huffingtonpost.com/2015/06/25/apple-confederate-flag_n_7663754.html">
- Not only those that use it</em></ins></span> as <span
class="removed"><del><strong>Apple claims</a>.</p>
- </li>
-</ul>
-
-
-<h3 id="incompatibility">Apple Incompatibility</h3>
-
-<p>In this section, we list characteristics</strong></del></span> <span
class="inserted"><ins><em>a symbol</em></ins></span> of <span
class="removed"><del><strong>Apple programs</strong></del></span> <span
class="inserted"><ins><em>racism</a>, but even
- strategic games</em></ins></span> that <span
class="removed"><del><strong>block or
-hinder users from switching</strong></del></span> <span
class="inserted"><ins><em>use it</em></ins></span> to <span
class="removed"><del><strong>any alternative
program—and,</strong></del></span> <span
class="inserted"><ins><em>represent confederate army units
- fighting</em></ins></span> in
-<span class="removed"><del><strong>particular, from switching to free software
which can liberate</strong></del></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>Civil War.</p>
+ Not only those that use it as a symbol</em></ins></span> of <span
class="removed"><del><strong>converting them</strong></del></span> <span
class="inserted"><ins><em>racism</a>, but even
+ strategic games that use it</em></ins></span> to <span
class="removed"><del><strong>or from Open Document Formats</a>. iWork
formats
+have changed several times since they were first introduced. This may have
+had</strong></del></span> <span class="inserted"><ins><em>represent
confederate army units
+ fighting in</em></ins></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>Civil War.</p>
- <p>This ludicrous rigidity illustrates</em></ins></span> the <span
class="removed"><del><strong>software runs on.</p>
+ <p>This ludicrous rigidity illustrates the point that Apple should
+ not be allowed to censor apps. Even if Apple carried out this
act</em></ins></span> of <span class="removed"><del><strong>thwarting <a
+href="https://github.com/obriensp/iWorkFileFormat">reverse engineering
+efforts</a>, thus preventing free software from fully supporting
them.</p>
-<ul>
-<li>
-<p>Apple devices lock users in <a
-href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
-solely to</strong></del></span> <span class="inserted"><ins><em>point
that</em></ins></span> Apple <span
class="removed"><del><strong>services</a> by being designed
to</strong></del></span> <span class="inserted"><ins><em>should
- not</em></ins></span> be <span class="removed"><del><strong>incompatible
with all
-other options, ethical</strong></del></span> <span
class="inserted"><ins><em>allowed to censor apps. Even if Apple carried out
this act of
- censorship with some care, it would still be wrong. Whether racism
- is bad, whether educating people about drone attacks is bad, are not
+<p>iWork formats</strong></del></span>
+ <span class="inserted"><ins><em>censorship with some care, it would still
be wrong. Whether racism
+ is bad, whether educating people about drone attacks is
bad,</em></ins></span> are <span class="removed"><del><strong>considered <a
+href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
+unfit for document preservation</a>.</p></strong></del></span>
<span class="inserted"><ins><em>not
the real issue. Apple should not have the power to impose its views
- about either of these questions,</em></ins></span> or <span
class="removed"><del><strong>unethical.</p></strong></del></span> <span
class="inserted"><ins><em>any other.</p></em></ins></span>
+ about either of these questions, or any other.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>iWork (office software that runs on MacOS, iOS and iCloud) uses secret
-formats and <a href="https://en.wikipedia.org/wiki/IWork">provides no
means</strong></del></span>
+<p>In MacOS</strong></del></span>
<span class="inserted"><ins><em><li id="M201412110">
<p><a
href="http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans">
- More examples</em></ins></span> of <span
class="removed"><del><strong>converting them</strong></del></span> <span
class="inserted"><ins><em>Apple's arbitrary and inconsistent
censorship</a>.</p>
+ More examples of Apple's arbitrary</em></ins></span> and <span
class="removed"><del><strong>iOS,</strong></del></span> <span
class="inserted"><ins><em>inconsistent censorship</a>.</p>
</li>
<li id="M201405250">
- <p>Apple used this censorship power in 2014</em></ins></span> to
<span class="removed"><del><strong>or from Open Document Formats</a>.
iWork formats
-have changed several times since they were first introduced. This may have
-had</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Apple used this censorship power in 2014 to <a
href="http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html">
- ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>effect</strong></del></span> <span
class="inserted"><ins><em>iThings for a time. It also <a
-
href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
+ ban all bitcoin apps</a> for</em></ins></span> the <span
class="removed"><del><strong>procedure</strong></del></span> <span
class="inserted"><ins><em>iThings</em></ins></span> for <span
class="inserted"><ins><em>a time. It also</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
+converting images from</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.gamespot.com/articles/apple-removes-game-about-growing-marijuana-from-app-store/1100-6419864/">
banned a game about growing marijuana</a>, while permitting games
about other crimes such as killing people. Perhaps Apple considers
killing more acceptable than marijuana.</p>
</li>
<li id="M201402070">
- <p>Apple rejected an app that displayed the
locations</em></ins></span>
- of <span class="removed"><del><strong>thwarting</strong></del></span>
<span class="inserted"><ins><em>US drone assassinations, giving various
excuses. Each
+ <p>Apple rejected an app that displayed</em></ins></span> the <span
class="removed"><del><strong>Photos format</a></strong></del></span>
<span class="inserted"><ins><em>locations
+ of US drone assassinations, giving various excuses. Each
time the developers fixed one “problem”, Apple
- complained about another. After the fifth rejection,
Apple</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://github.com/obriensp/iWorkFileFormat">reverse
engineering
-efforts</a>, thus preventing free software from fully supporting
them.</p>
-
-<p>iWork formats</strong></del></span>
- <span
class="inserted"><ins><em>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
+ complained about another. After the fifth rejection, Apple <a
+ href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">
admitted it was censoring the app based on the subject
matter</a>.</p>
</li>
</ul>
@@ -619,34 +641,27 @@
<ul class="blurbs">
<li id="M201308290">
- <p>“Dark patterns”</em></ins></span> are <span
class="removed"><del><strong>considered</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://wiki.harvard.edu/confluence/download/attachments/204385883/Format%20profile%20-%20Apple%20iWork%20Pages%20v04.docx?version=1&modificationDate=1459873751000&api=v2">
-unfit for document preservation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
- interfaces designed to mislead users, or make option settings hard
+ <p>“Dark patterns” are <a
+
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
+ interfaces designed</em></ins></span> to <span
class="inserted"><ins><em>mislead users, or make option settings hard
to find</a>.</p>
- <p>This allows a company such as Apple to say, “We allow users
+ <p>This allows</em></ins></span> a <span
class="removed"><del><strong>free format is so tedious</strong></del></span>
<span class="inserted"><ins><em>company such as Apple to say, “We allow
users
to turn this off” while ensuring that few will understand how
- to actually turn it off.</p></em></ins></span>
+ to actually turn it off.</p>
</li>
-
-<span class="removed"><del><strong><li>
-<p>In MacOS and iOS,</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
<h3 id="pressuring">Apple Pressuring</h3>
-<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of</em></ins></span> the <span
class="removed"><del><strong>procedure for</strong></del></span> <span
class="inserted"><ins><em>software. This section reports examples of hard sell
and other unjust commercial tactics by Apple.</p>
+<p>Proprietary companies can take advantage of their customers by
imposing arbitrary limits to their use of the software. This section reports
examples of hard sell and other unjust commercial tactics by Apple.</p>
<ul class="blurbs">
<li id="M201510270">
- <p>Apple Siri</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://support.apple.com/guide/photos/export-photos-videos-and-slideshows-pht6e157c5f/mac">
-converting images from the Photos format</a></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses</em></ins></span>
- to <span class="removed"><del><strong>a free format is so
tedious</strong></del></span> <span class="inserted"><ins><em>give you
information</a> about music charts if you're not an Apple
+ <p>Apple Siri <a
+
href="http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions">refuses
+ to give you information</a> about music charts if you're not an Apple
Music subscriber.</p>
</li>
</ul>
@@ -1176,7 +1191,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/10 13:00:22 $
+$Date: 2019/07/16 20:29:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- malware-apple.de.po 10 Jul 2019 13:00:22 -0000 1.133
+++ malware-apple.de.po 16 Jul 2019 20:29:51 -0000 1.134
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -183,6 +183,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-apple.es.po 10 Jul 2019 13:00:23 -0000 1.142
+++ malware-apple.es.po 16 Jul 2019 20:29:51 -0000 1.143
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
"X-Generator: Poedit 1.8.11\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -154,6 +155,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- malware-apple.fr.po 13 Jul 2019 16:12:38 -0000 1.150
+++ malware-apple.fr.po 16 Jul 2019 20:29:51 -0000 1.151
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2019-07-13 18:10+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -152,6 +153,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.46
retrieving revision 1.47
diff -u -b -r1.46 -r1.47
--- malware-apple.it-diff.html 10 Jul 2019 13:00:23 -0000 1.46
+++ malware-apple.it-diff.html 16 Jul 2019 20:29:51 -0000 1.47
@@ -92,6 +92,17 @@
Mac</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -169,18 +180,18 @@
Apple <span class="removed"><del><strong>used its censorship
system</strong></del></span> <span class="inserted"><ins><em>uses DRM
software</em></ins></span> to <span class="removed"><del><strong>enforce Russian
surveillance <a
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
-by blocking distribution of the LinkedIn app</strong></del></span> <span
class="inserted"><ins><em>prevent people from charging an iThing
+by blocking distribution of the LinkedIn app in Russia</a>.</p>
+
+<p>This is ironic because LinkedIn is a surveillance system
+itself.</strong></del></span> <span class="inserted"><ins><em>prevent people
from charging an iThing
with a generic USB cable</a>.</p>
</li>
<li id="M200811210">
<p><a
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
- DRM (digital restrictions mechanisms)</em></ins></span> in <span
class="removed"><del><strong>Russia</a>.</p>
-
-<p>This is ironic because LinkedIn is</strong></del></span> <span
class="inserted"><ins><em>MacOS</a>. This article
- focuses on the fact that</em></ins></span> a <span
class="removed"><del><strong>surveillance system
-itself. While subjecting its users to its</strong></del></span> <span
class="inserted"><ins><em>new model of Macbook introduced a
+ DRM (digital restrictions mechanisms) in MacOS</a>. This article
+ focuses on the fact that a new model of Macbook introduced a
requirement for monitors to have malicious hardware, but DRM software
in MacOS is involved in activating the hardware. The software for
accessing iTunes is also responsible.</p>
@@ -339,8 +350,8 @@
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
- <p>This is ironic because LinkedIn is a surveillance system itself.
- While subjecting its users to its</em></ins></span> own surveillance, it
tries to
+ <p>This is ironic because LinkedIn is a surveillance system
itself.</em></ins></span>
+ While subjecting its users to its own surveillance, it tries to
protect its users from Russian surveillance, and is therefore subject
to Russian censorship.</p>
@@ -1051,7 +1062,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/10 13:00:23 $
+$Date: 2019/07/16 20:29:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- malware-apple.it.po 10 Jul 2019 13:00:23 -0000 1.127
+++ malware-apple.it.po 16 Jul 2019 20:29:51 -0000 1.128
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -173,6 +173,20 @@
msgstr "Backdoor di Apple"
#. type: Content of: <ul><li><p>
+msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | The Dropbox app for Macintosh <a
# |
[-href=\"http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\">takes
# | total-]
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-apple.ja-diff.html 10 Jul 2019 13:00:23 -0000 1.59
+++ malware-apple.ja-diff.html 16 Jul 2019 20:29:51 -0000 1.60
@@ -102,6 +102,17 @@
Mac</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -184,30 +195,29 @@
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
DRM (digital restrictions mechanisms) in MacOS</a>. This article
focuses on</em></ins></span> the <span
class="removed"><del><strong>locations</strong></del></span> <span
class="inserted"><ins><em>fact that a new model</em></ins></span> of <span
class="removed"><del><strong>US drone
-assassinations, giving various excuses. Each time the developers
-fixed one “problem”, Apple complained about another.
-After the fifth rejection,
-Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
-it was censoring</strong></del></span> <span class="inserted"><ins><em>Macbook
introduced a
+assassinations, giving various excuses. Each time</strong></del></span> <span
class="inserted"><ins><em>Macbook introduced a
requirement for monitors to have malicious hardware, but DRM software
- in MacOS is involved in activating</em></ins></span> the <span
class="removed"><del><strong>app based</strong></del></span> <span
class="inserted"><ins><em>hardware. The software for
+ in MacOS is involved in activating</em></ins></span> the <span
class="removed"><del><strong>developers
+fixed one “problem”, Apple complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>hardware. The
software for
accessing iTunes is also responsible.</p>
</li>
<li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article
focused</em></ins></span> on <span class="inserted"><ins><em>Windows
- and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>subject matter</a>.
-</p></li>
-
-<li><p>
-As</strong></del></span> <span class="inserted"><ins><em>same thing
subsequently.)</p>
+ DRM that caters to Bluray disks</a>. (The article focused on Windows
+ and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>fifth rejection,</strong></del></span> <span
class="inserted"><ins><em>same thing subsequently.)</p>
</li>
<li id="M200703310">
- <p>iTunes videos have DRM, which allows Apple to <a
- href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
- customers can watch the videos they purchased</a>.</p>
+ <p>iTunes videos have DRM, which allows</em></ins></span> Apple
<span class="inserted"><ins><em>to</em></ins></span> <a <span
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its
+ customers can watch</em></ins></span> the <span
class="removed"><del><strong>subject matter</a>.
+</p></li>
+
+<li><p>
+As</strong></del></span> <span class="inserted"><ins><em>videos they
purchased</a>.</p>
</li>
</ul>
@@ -284,10 +294,14 @@
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
a malicious web site to extract all the user's messaging <span
class="removed"><del><strong>history</a>.
</p></strong></del></span>
- <span class="inserted"><ins><em>history</a>.</p>
+ <span
class="inserted"><ins><em>history</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="interference">Apple Interference</h3>
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span>
- <li id="M201311120">
+ <span class="inserted"><ins><em><li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
@@ -296,13 +310,13 @@
the universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio
software</a>.</p></em></ins></span>
+ lots of bugs in the phones' radio software</a>.</p>
</li>
</ul>
-<span class="inserted"><ins><em><!--</em></ins></span>
+<!--
<h3 id="interference">Apple Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</em></ins></span> to qualify
for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Apple committing
interference.</p>
@@ -313,30 +327,30 @@
<h3 id="jails">Apple Jails</h3>
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
-iOS, the operating system</em></ins></span> of <span
class="removed"><del><strong>iThings</strong></del></span> <span
class="inserted"><ins><em>the Apple iThings, is the prototype
+iOS, the operating system of the Apple iThings, is the prototype
of a jail</a>. It was Apple that introduced the practice of
-designing general purpose computers with censorship of application
+designing general purpose computers with censorship</em></ins></span> of <span
class="inserted"><ins><em>application
programs.</p>
<p>Here is an article about the <a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
-code signing</a> that the iThings use to lock up the user.</p>
+code signing</a> that the</em></ins></span> iThings <span
class="inserted"><ins><em>use to lock up the user.</p>
-<p>Curiously, Apple is beginning</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>allow limited passage through the
+<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>identify
themselves. <a href="https://developer.apple.com/xcode/">Here
-are details</a>. While this is</em></ins></span> a <span
class="inserted"><ins><em>crack in the prison walls, it is not
+are details</a>. While this is</em></ins></span> a <span
class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>crack in the prison walls, it is not
big enough to mean that the iThings are no longer jails.</p>
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
<li id="M201905150">
- <p>Users caught in the jail of an iMonster are <a
- href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
- ducks for other attackers</a>, and the app censorship prevents
security
+ <p>Users caught in the jail of an iMonster are</em></ins></span>
<a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
+ ducks for other attackers</a>, and</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>app censorship prevents security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
@@ -362,9 +376,9 @@
</li>
<li id="M201701064">
- <p>Apple used its censorship</em></ins></span> system <span
class="removed"><del><strong>upgrade</strong></del></span> <span
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span>
<a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
- by blocking distribution of</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>LinkedIn app in Russia</a>.</p>
+ <p>Apple used its censorship system to enforce Russian surveillance
<a
+
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ by blocking distribution of the LinkedIn app in Russia</a>.</p>
<p>This is ironic because LinkedIn is a surveillance system itself.
While subjecting its users to its own surveillance, it tries to
@@ -997,7 +1011,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/10 13:00:23 $
+$Date: 2019/07/16 20:29:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- malware-apple.ja.po 10 Jul 2019 13:00:23 -0000 1.110
+++ malware-apple.ja.po 16 Jul 2019 20:29:51 -0000 1.111
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -152,6 +152,20 @@
msgstr "Appleã®ããã¯ãã¢"
#. type: Content of: <ul><li><p>
+msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
#, fuzzy
#| msgid ""
#| "The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-apple.nl-diff.html 10 Jul 2019 13:00:23 -0000 1.63
+++ malware-apple.nl-diff.html 16 Jul 2019 20:29:51 -0000 1.64
@@ -102,6 +102,17 @@
Mac</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201607284">
<p>The Dropbox app for Macintosh <a
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
@@ -184,30 +195,29 @@
href="https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm">
DRM (digital restrictions mechanisms) in MacOS</a>. This article
focuses on</em></ins></span> the <span
class="removed"><del><strong>locations</strong></del></span> <span
class="inserted"><ins><em>fact that a new model</em></ins></span> of <span
class="removed"><del><strong>US drone
-assassinations, giving various excuses. Each time the developers
-fixed one “problem”, Apple complained about another.
-After the fifth rejection,
-Apple <a
href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
-it was censoring</strong></del></span> <span class="inserted"><ins><em>Macbook
introduced a
+assassinations, giving various excuses. Each time</strong></del></span> <span
class="inserted"><ins><em>Macbook introduced a
requirement for monitors to have malicious hardware, but DRM software
- in MacOS is involved in activating</em></ins></span> the <span
class="removed"><del><strong>app based</strong></del></span> <span
class="inserted"><ins><em>hardware. The software for
+ in MacOS is involved in activating</em></ins></span> the <span
class="removed"><del><strong>developers
+fixed one “problem”, Apple complained about another.
+After</strong></del></span> <span class="inserted"><ins><em>hardware. The
software for
accessing iTunes is also responsible.</p>
</li>
<li id="M200708130">
<p><a
href="http://arstechnica.com/apple/2007/08/aacs-tentacles/">
- DRM that caters to Bluray disks</a>. (The article
focused</em></ins></span> on <span class="inserted"><ins><em>Windows
- and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>subject matter</a>.
-</p></li>
-
-<li><p>
-As</strong></del></span> <span class="inserted"><ins><em>same thing
subsequently.)</p>
+ DRM that caters to Bluray disks</a>. (The article focused on Windows
+ and said that MacOS would do</em></ins></span> the <span
class="removed"><del><strong>fifth rejection,</strong></del></span> <span
class="inserted"><ins><em>same thing subsequently.)</p>
</li>
<li id="M200703310">
- <p>iTunes videos have DRM, which allows Apple to <a
- href="https://en.wikipedia.org/wiki/FairPlay">dictate where its
- customers can watch the videos they purchased</a>.</p>
+ <p>iTunes videos have DRM, which allows</em></ins></span> Apple
<span class="inserted"><ins><em>to</em></ins></span> <a <span
class="removed"><del><strong>href="http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/">admitted
+it was censoring the app based on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://en.wikipedia.org/wiki/FairPlay">dictate
where its
+ customers can watch</em></ins></span> the <span
class="removed"><del><strong>subject matter</a>.
+</p></li>
+
+<li><p>
+As</strong></del></span> <span class="inserted"><ins><em>videos they
purchased</a>.</p>
</li>
</ul>
@@ -284,10 +294,14 @@
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
a malicious web site to extract all the user's messaging <span
class="removed"><del><strong>history</a>.
</p></strong></del></span>
- <span class="inserted"><ins><em>history</a>.</p>
+ <span
class="inserted"><ins><em>history</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="interference">Apple Interference</h3>
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</strong></del></span>
- <li id="M201311120">
+ <span class="inserted"><ins><em><li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
The NSA can tap data in smart phones, including iPhones,
@@ -296,13 +310,13 @@
the universal back door that we know nearly all portable
phones have. It may involve exploiting various bugs. There are <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs in the phones' radio
software</a>.</p></em></ins></span>
+ lots of bugs in the phones' radio software</a>.</p>
</li>
</ul>
-<span class="inserted"><ins><em><!--</em></ins></span>
+<!--
<h3 id="interference">Apple Interference</h3>
-<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough to qualify
+<p>Various proprietary programs often mess up the user's system. They
are like sabotage, but they are not grave enough</em></ins></span> to qualify
for the word “sabotage”. Nonetheless, they are nasty and wrong.
This section describes examples of Apple committing
interference.</p>
@@ -313,30 +327,30 @@
<h3 id="jails">Apple Jails</h3>
<p><a
href="https://en.wikipedia.org/w/index.php?title=IOS_jailbreaking&oldid=835861046">
-iOS, the operating system</em></ins></span> of <span
class="removed"><del><strong>iThings</strong></del></span> <span
class="inserted"><ins><em>the Apple iThings, is the prototype
+iOS, the operating system of the Apple iThings, is the prototype
of a jail</a>. It was Apple that introduced the practice of
-designing general purpose computers with censorship of application
+designing general purpose computers with censorship</em></ins></span> of <span
class="inserted"><ins><em>application
programs.</p>
<p>Here is an article about the <a
href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
-code signing</a> that the iThings use to lock up the user.</p>
+code signing</a> that the</em></ins></span> iThings <span
class="inserted"><ins><em>use to lock up the user.</p>
-<p>Curiously, Apple is beginning</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>allow limited passage through the
+<p>Curiously, Apple is beginning to allow limited passage through the
walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>download</strong></del></span> <span
class="inserted"><ins><em>identify
themselves. <a href="https://developer.apple.com/xcode/">Here
-are details</a>. While this is</em></ins></span> a <span
class="inserted"><ins><em>crack in the prison walls, it is not
+are details</a>. While this is</em></ins></span> a <span
class="removed"><del><strong>system upgrade</strong></del></span> <span
class="inserted"><ins><em>crack in the prison walls, it is not
big enough to mean that the iThings are no longer jails.</p>
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
<li id="M201905150">
- <p>Users caught in the jail of an iMonster are <a
- href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
- ducks for other attackers</a>, and the app censorship prevents
security
+ <p>Users caught in the jail of an iMonster are</em></ins></span>
<a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
+ ducks for other attackers</a>, and</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>app censorship prevents security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
@@ -362,9 +376,9 @@
</li>
<li id="M201701064">
- <p>Apple used its censorship</em></ins></span> system <span
class="removed"><del><strong>upgrade</strong></del></span> <span
class="inserted"><ins><em>to enforce Russian surveillance</em></ins></span>
<a <span
class="removed"><del><strong>href="https://discussions.apple.com/thread/7256669?tstart0=">without
asking</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
- by blocking distribution of</em></ins></span> the <span
class="removed"><del><strong>users</a>.</strong></del></span> <span
class="inserted"><ins><em>LinkedIn app in Russia</a>.</p>
+ <p>Apple used its censorship system to enforce Russian surveillance
<a
+
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
+ by blocking distribution of the LinkedIn app in Russia</a>.</p>
<p>This is ironic because LinkedIn is a surveillance system itself.
While subjecting its users to its own surveillance, it tries to
@@ -997,7 +1011,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/10 13:00:23 $
+$Date: 2019/07/16 20:29:51 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-apple.nl.po 10 Jul 2019 13:00:23 -0000 1.63
+++ malware-apple.nl.po 16 Jul 2019 20:29:51 -0000 1.64
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -166,6 +166,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- malware-apple.pot 10 Jul 2019 13:00:23 -0000 1.75
+++ malware-apple.pot 16 Jul 2019 20:29:51 -0000 1.76
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -122,6 +122,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a "
+"href=\"https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/\"> "
+"there is a back door in MacOS</a> for automatically updating some (all?) "
+"apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a "
"href=\"http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\">
"
"takes control of user interface items after luring the user into entering an "
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.204
retrieving revision 1.205
diff -u -b -r1.204 -r1.205
--- malware-apple.ru.po 10 Jul 2019 13:00:23 -0000 1.204
+++ malware-apple.ru.po 16 Jul 2019 20:29:51 -0000 1.205
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-07-10 12:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2019-01-29 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -149,6 +150,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- nl.po 15 Jul 2019 10:02:20 -0000 1.108
+++ nl.po 16 Jul 2019 20:29:51 -0000 1.109
@@ -658,6 +658,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- pl.po 15 Jul 2019 10:02:21 -0000 1.108
+++ pl.po 16 Jul 2019 20:29:51 -0000 1.109
@@ -644,6 +644,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- pot 15 Jul 2019 10:02:22 -0000 1.107
+++ pot 16 Jul 2019 20:29:51 -0000 1.108
@@ -506,6 +506,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-back-doors.de-diff.html 27 Jun 2019 08:02:22 -0000 1.29
+++ proprietary-back-doors.de-diff.html 16 Jul 2019 20:29:51 -0000 1.30
@@ -297,6 +297,17 @@
<h3 <span class="removed"><del><strong>id="install-delete">Installing
or</strong></del></span> <span
class="inserted"><ins><em>id='install-delete'>Installing,</em></ins></span>
deleting <span class="inserted"><ins><em>or disabling</em></ins></span>
programs</h3>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201811100">
<p>Corel Paintshop Pro has a <a
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
@@ -359,13 +370,10 @@
<p>It is used by 14,000 Android applications.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>In Android,</strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201112080">
- <p> In addition to its</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google</strong></del></span> <span
class="inserted"><ins><em>href="#windows-update">universal back
+ <p> In addition to its <a href="#windows-update">universal back
door</a>, Windows 8 has a back door for <a
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
@@ -377,10 +385,11 @@
way.</p>
</li>
- <li id="M201103070">
+ <li id="M201103070"></em></ins></span>
<p>In Android, <a
-
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google</em></ins></span> has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It was in a
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"></em></ins></span>
+ Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It was in a
program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
@@ -392,24 +401,24 @@
<p>Although Google's <em>exercise</em> of this power has
not been
malicious so far, the point is that nobody should have such power,
- which could also be used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for allowing it to
- <em>delete</em> the programs, and you should have the right to
decide
- who (if anyone) to trust in this way.</p>
+ which could <span class="removed"><del><strong>also be used maliciously.
You might well decide to let a
+ security service remotely <em>deactivate</em> programs that
it
+ considers malicious. But there is no excuse for allowing it
+ to <em>delete</em> the programs, and you should have the
right to
+ decide who (if anyone) to trust in this way.</p>
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
Windows 8 also has a back door for remotely deleting
apps</a>.</p>
- <p>You might well decide to let a security service that you trust
- remotely <em>deactivate</em> programs that it considers
malicious.
- But there is no excuse for <em>deleting</em> the programs,
and you
- should have the right to decide whom (if anyone) to trust in this
- way.</p>
+ <p>You</strong></del></span> <span class="inserted"><ins><em>also be
used maliciously. You</em></ins></span> might well decide to
+ let a security service <span class="removed"><del><strong>that you
trust</strong></del></span> remotely <em>deactivate</em> programs
that
+ it considers malicious. But there is no excuse for <span
class="removed"><del><strong><em>deleting</em></strong></del></span>
<span class="inserted"><ins><em>allowing it to
+ <em>delete</em></em></ins></span> the programs, and you should
have the right to decide <span
class="removed"><del><strong>whom</strong></del></span>
+ <span class="inserted"><ins><em>who</em></ins></span> (if anyone) to trust
in this way.</p>
</li>
- <li></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
<p>The iPhone has a back door <a
@@ -787,7 +796,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/27 08:02:22 $
+$Date: 2019/07/16 20:29:51 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary-back-doors.de.po 27 Jun 2019 08:02:22 -0000 1.128
+++ proprietary-back-doors.de.po 16 Jul 2019 20:29:51 -0000 1.129
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -508,6 +508,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- proprietary-back-doors.es.po 1 Jul 2019 09:07:07 -0000 1.16
+++ proprietary-back-doors.es.po 16 Jul 2019 20:29:51 -0000 1.17
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2019-07-01 10:55+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -414,6 +415,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary-back-doors.fr.po 27 Jun 2019 09:14:42 -0000 1.136
+++ proprietary-back-doors.fr.po 16 Jul 2019 20:29:51 -0000 1.137
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2019-06-27 11:13+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -415,6 +416,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-back-doors.it-diff.html 27 Jun 2019 08:02:22 -0000 1.56
+++ proprietary-back-doors.it-diff.html 16 Jul 2019 20:29:51 -0000 1.57
@@ -270,50 +270,62 @@
<p>It is used</strong></del></span>
<span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
- <cite>1984</cite>,</em></ins></span> by <span
class="removed"><del><strong>14,000 Android applications.</p>
- </li>
-
-<li><p>ARRIS cable modem has a</strong></del></span> <span
class="inserted"><ins><em>George Orwell.</p>
+ <cite>1984</cite>,</em></ins></span> by <span
class="removed"><del><strong>14,000 Android
applications.</p></strong></del></span> <span
class="inserted"><ins><em>George Orwell.</p>
<p>Amazon responded to criticism by saying it
would delete books only following orders from the
- state. However, that policy didn't last. In 2012 it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
+ state. However, that policy didn't last. In 2012 it <a
+
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
wiped a user's Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
- <p>Do other ebook readers have back doors</em></ins></span> in <span
class="removed"><del><strong>the
backdoor</a>.</p></strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
+ <p>Do other ebook readers have back doors in their nonfree software?
We
don't know, and we have no way to find out. There is no reason to
assume that they don't.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Caterpillar vehicles
come with</strong></del></span>
+
+<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
<span class="inserted"><ins><em><li id="M201011220">
- <p>The iPhone has a back door for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
- remotely.</p></strong></del></span>
+ <p>The iPhone</em></ins></span> has a <span
class="inserted"><ins><em>back door for</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in the backdoor</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling it without understanding.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li><p>
-Mac OS X had an</strong></del></span>
+ <span class="removed"><del><strong><li><p>Caterpillar vehicles
come with
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span>
<span class="inserted"><ins><em></ul>
<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
<ul class="blurbs">
- <li id="M201811100">
- <p>Corel Paintshop Pro has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ <li id="M201907100">
+ <p>Apple appears</em></ins></span> to <span
class="removed"><del><strong>shutoff the engine</a>
+ remotely.</p>
+ </li>
+<li><p>
+Mac OS X had an</strong></del></span> <span class="inserted"><ins><em>say
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
- back door <span class="removed"><del><strong>for 4 years</a>.
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a</em></ins></span> back door <span class="inserted"><ins><em>in
MacOS</a></em></ins></span> for <span class="removed"><del><strong>4
years</a>.
</p></li>
-<li><p>Users reported</strong></del></span> that <span
class="removed"><del><strong><a
-
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them</strong></del></span> <span
class="inserted"><ins><em>can make it cease</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7</strong></del></span> <span
class="inserted"><ins><em>function</a>.</p>
+<li><p>Users reported</strong></del></span> <span
class="inserted"><ins><em>automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but</em></ins></span> that <span
class="inserted"><ins><em>is a separate question.</p>
+ </li>
+
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7</strong></del></span> <span
class="inserted"><ins><em>function</a>.</p>
<p>The article is full of confusions, errors</em></ins></span> and
<span class="removed"><del><strong>8 with all-spying
Windows 10</a>.</p>
@@ -342,107 +354,93 @@
</li>
<li>
-<p>Most mobile phones have a universal</strong></del></span> <span
class="inserted"><ins><em>using the</em></ins></span> back <span
class="removed"><del><strong>door, which has been used</strong></del></span>
<span class="inserted"><ins><em>door is always wrong too. No software
- developer should have that power over users.</li>
-
- <li>“<a
- href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word</em></ins></span> to
-<span class="removed"><del><strong><a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+<p>Most mobile phones have a universal</strong></del></span> <span
class="inserted"><ins><em>using the</em></ins></span> back <span
class="removed"><del><strong>door, which has been used to
+<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.
</p>
</li>
<li>
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android has</strong></del></span> <span
class="inserted"><ins><em>refer to sharing copies is</em></ins></span> a <span
class="removed"><del><strong>universal back door</a>. Nearly all
+A Chinese version of Android has</strong></del></span> <span
class="inserted"><ins><em>door is always wrong too. No software
+ developer should have that power over users.</li>
+
+ <li>“<a
+ href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
+ attacking ships. Using that word to refer to sharing copies
is</em></ins></span> a <span class="removed"><del><strong>universal back
door</a>. Nearly all
models</strong></del></span> <span class="inserted"><ins><em>smear;
please don't smear sharing.</li>
<li><p>The idea</em></ins></span> of <span
class="removed"><del><strong>mobile phones have</strong></del></span> <span
class="inserted"><ins><em>“protecting our IP” is
total confusion. The term “IP” itself is</em></ins></span> a
<span class="removed"><del><strong>universal back door</strong></del></span>
<span class="inserted"><ins><em><a
href="/philosophy/not-ipr.html">bogus generalization about things
- that have nothing</em></ins></span> in <span
class="inserted"><ins><em>common</a>.</p>
+ that have nothing</em></ins></span> in <span
class="removed"><del><strong>the modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>common</a>.</p>
- <p>In addition, to speak of “protecting” that bogus
- generalization is a separate absurdity. It's like
calling</em></ins></span> the <span class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>cops
- because neighbors' kids are playing on your front yard, and saying
- that you're “protecting the boundary line”. The kids can't do
harm</em></ins></span>
- to <span class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>the boundary line,
not even with a jackhammer, because it</em></ins></span> is <span
class="removed"><del><strong>controlled</strong></del></span> <span
class="inserted"><ins><em>an
- abstraction and can't be affected</em></ins></span> by <span
class="removed"><del><strong>Coolpad.
-</p></strong></del></span> <span class="inserted"><ins><em>physical
action.</p></li>
+ <p>In addition,</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>speak of
“protecting” that bogus
+ generalization</em></ins></span> is <span
class="removed"><del><strong>controlled
+by Coolpad.
+</p>
+</li>
+
+<li>
+<p>Microsoft Windows has</strong></del></span> a <span
class="removed"><del><strong>universal back door through which
+<a
href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever can be imposed on</strong></del></span> <span
class="inserted"><ins><em>separate absurdity. It's like
calling</em></ins></span> the <span
class="removed"><del><strong>users</a>.
+</p>
+<p>More information</strong></del></span> <span
class="inserted"><ins><em>cops
+ because neighbors' kids are playing</em></ins></span> on <span
class="removed"><del><strong>when
+<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+this was used</a>.
+</p>
+<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>your front yard, and saying
+ that you're “protecting</em></ins></span> the <span
class="removed"><del><strong>universal back door</strong></del></span> <span
class="inserted"><ins><em>boundary line”. The kids can't do harm
+ to the boundary line, not even with a jackhammer, because
it</em></ins></span> is <span class="removed"><del><strong>no longer hidden; all
+“upgrades” will
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>an
+ abstraction</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>can't be
affected by physical action.</p></li>
</ul></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
-<p>Microsoft Windows</strong></del></span>
+<span class="removed"><del><strong><li><p>German
government</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
+away from Windows 8 computers with TPM 2.0 due</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>potential back
+door capabilities of</strong></del></span> the <span
class="removed"><del><strong>TPM 2.0
chip</a>.</p></strong></del></span> <span
class="inserted"><ins><em>article for the facts it presents. It
is too bad that the article finishes by advocating the
moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p>
- </li>
-
- <li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus,</em></ins></span>
has a <span class="removed"><del><strong>universal</strong></del></span> back
door <span class="removed"><del><strong>through which</strong></del></span>
<span class="inserted"><ins><em>that</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"></em></ins></span>
- can <span class="removed"><del><strong>be imposed on the users</a>.
-</p>
-<p>More information on when
-<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
-this was used</a>.
-</p>
-<p>In Windows 10, the universal back door</strong></del></span> <span
class="inserted"><ins><em>“upload files” as well as forcibly install
- apps</a>.</p>
-
- <p>It</em></ins></span> is <span class="removed"><del><strong>no
longer hidden; all
-“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
-and immediately imposed</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>used by
14,000 Android applications.</p></em></ins></span>
+ malware too</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li><p>German
government</strong></del></span>
+<span class="removed"><del><strong><li>
+<p>The iPhone</strong></del></span>
- <span class="inserted"><ins><em><li id="M201112080">
- <p> In addition to its</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
-away from</strong></del></span> <span
class="inserted"><ins><em>href="#windows-update">universal back
- door</a>,</em></ins></span> Windows 8 <span
class="removed"><del><strong>computers with TPM 2.0 due to potential back
-door capabilities of the TPM 2.0 chip</a>.</p>
-</li>
+ <span class="inserted"><ins><em><li id="M201511090">
+ <p>Baidu's proprietary Android library, Moplus,</em></ins></span>
has a back door
+<span class="removed"><del><strong><a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
that <span class="removed"><del><strong>allows Apple to remotely delete
apps</a> which Apple considers
+“inappropriate”. Jobs said it's ok for Apple to have this power
+because of course we</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"></em></ins></span>
+ can <span class="removed"><del><strong>trust Apple.
+</p></strong></del></span> <span class="inserted"><ins><em>“upload
files” as well as forcibly install
+ apps</a>.</p>
-<li>
-<p>The iPhone</strong></del></span> has a back door <span
class="inserted"><ins><em>for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
-that allows Apple</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
- remotely deleting apps</a>.</p>
-
- <p>You might well decide</em></ins></span> to <span
class="inserted"><ins><em>let a security service that you
trust</em></ins></span>
- remotely <span class="removed"><del><strong>delete apps</a> which
Apple</strong></del></span> <span
class="inserted"><ins><em><em>deactivate</em> programs that
it</em></ins></span> considers
-<span class="removed"><del><strong>“inappropriate”. Jobs said
it's ok</strong></del></span> <span class="inserted"><ins><em>malicious.
- But there is no excuse</em></ins></span> for <span
class="removed"><del><strong>Apple to</strong></del></span> <span
class="inserted"><ins><em><em>deleting</em> the programs, and you
- should</em></ins></span> have <span class="removed"><del><strong>this power
-because of course we can</strong></del></span> <span
class="inserted"><ins><em>the right to decide whom (if anyone)
to</em></ins></span> trust <span class="removed"><del><strong>Apple.
-</p></strong></del></span> <span class="inserted"><ins><em>in this
- way.</p></em></ins></span>
+ <p>It is used by 14,000 Android
applications.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>The iPhone</strong></del></span>
- <span class="inserted"><ins><em><li id="M201103070">
- <p>In Android, <a
-
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google</em></ins></span> has a back door <span
class="removed"><del><strong>for
-<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ <span class="inserted"><ins><em><li id="M201112080">
+ <p> In addition to its <a href="#windows-update">universal back
+ door</a>, Windows 8</em></ins></span> has a back door for <a
<span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling
it without understanding.
</p>
@@ -450,46 +448,77 @@
<li>
<p>Apple can, and regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/"></strong></del></span>
<span class="inserted"><ins><em>to</em></ins></span> remotely <span
class="removed"><del><strong>extract some data from iPhones for the
state</a>.
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for the state</a>.
</p>
- <p>This may</strong></del></span> <span
class="inserted"><ins><em>delete apps</a>. (It was in a
- program called GTalkService, which seems since then to</em></ins></span>
have <span class="removed"><del><strong>improved with
+ <p>This may have improved with
<a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>been
- merged into Google Play.)</p>
-
- <p>Google can also</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through GTalkService. This
is</em></ins></span>
- not <span class="removed"><del><strong>as much as Apple
claims</a>.</p>
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
<li>
<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
-Windows 8 also has</strong></del></span> <span
class="inserted"><ins><em>equivalent to</em></ins></span> a <span
class="inserted"><ins><em>universal</em></ins></span> back <span
class="removed"><del><strong>door for remotely deleting apps</a>.
+Windows 8 also has a back door for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
+ remotely deleting <span class="removed"><del><strong>apps</a>.
</p>
-<p></strong></del></span> <span class="inserted"><ins><em>door, but
permits various dirty
- tricks.</p>
+<p>
+You</strong></del></span> <span
class="inserted"><ins><em>apps</a>.</p>
- <p>Although Google's <em>exercise</em> of this power has
not been
- malicious so far, the point is that nobody should have such power,
- which could also be used maliciously.</em></ins></span> You might well
decide to
- let a security service <span class="removed"><del><strong>that you
trust</strong></del></span> remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for <span
class="removed"><del><strong><em>deleting</em></strong></del></span>
<span class="inserted"><ins><em>allowing it to
- <em>delete</em></em></ins></span> the programs, and you should
have the right to decide
- who (if anyone) to trust in this <span class="removed"><del><strong>way.
+ <p>You</em></ins></span> might well decide to let a security service
that you trust
+ remotely <em>deactivate</em> programs that it considers
malicious.
+ But there is no excuse for <em>deleting</em> the programs, and
you
+ should have the right to decide <span
class="removed"><del><strong>who</strong></del></span> <span
class="inserted"><ins><em>whom</em></ins></span> (if anyone) to trust in this
<span class="removed"><del><strong>way.
+</p>
+
+<p>
+As these pages show, if you do want to clean your computer of malware,
+the first software to delete is Windows or iOS.
+</p></strong></del></span>
+ <span class="inserted"><ins><em>way.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201103070"></em></ins></span>
+ <p>In Android, <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html"></em></ins></span>
+ Google has a back door to remotely delete <span
class="removed"><del><strong>apps.</a></strong></del></span> <span
class="inserted"><ins><em>apps</a>.</em></ins></span> (It <span
class="removed"><del><strong>is</strong></del></span> <span
class="inserted"><ins><em>was</em></ins></span> in a
+ program called <span class="removed"><del><strong>GTalkService).
+</p>
+
+<p></strong></del></span> <span class="inserted"><ins><em>GTalkService,
which seems since then to have been
+ merged into</em></ins></span> Google <span
class="inserted"><ins><em>Play.)</p>
+
+ <p>Google</em></ins></span> can also <a
+
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through <span
class="removed"><del><strong>GTalkService (which
+seems, since that article, to have been merged into Google
Play).</strong></del></span> <span
class="inserted"><ins><em>GTalkService.</em></ins></span> This is
+ not equivalent to a universal back <span
class="removed"><del><strong>door, but permits various
+dirty tricks.
</p>
<p>
-As these pages show, if you do want</strong></del></span> <span
class="inserted"><ins><em>way.</p>
+Although Google's <em>exercise</em></strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
+ tricks.</p>
+
+ <p>Although Google's <em>exercise</em> of this power has
not been
+ malicious so far, the point is that nobody should have such power,
+ which could also be used maliciously. You might well decide to
+ let a security service remotely <em>deactivate</em> programs
that
+ it considers malicious. But there is no excuse for allowing it to
+ <em>delete</em> the programs, and you should have the right to
decide
+ who (if anyone) to trust in this way.</p>
</li>
<li id="M200808110">
<p>The iPhone has a back door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple</em></ins></span> to <span
class="removed"><del><strong>clean your computer</strong></del></span> <span
class="inserted"><ins><em>remotely delete apps</a> which Apple considers
+ that allows Apple to remotely delete apps</a> which Apple considers
“inappropriate”. Jobs said it's OK for Apple to have
this power because of course we can trust Apple.</p>
</li>
@@ -500,26 +529,21 @@
<ul class="blurbs">
<li id="M201902011">
- <p>The FordPass Connect feature</em></ins></span> of <span
class="removed"><del><strong>malware,</strong></del></span> <span
class="inserted"><ins><em>some Ford vehicles has <a
+ <p>The FordPass Connect feature of some Ford vehicles has <a
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to</em></ins></span> the <span
class="removed"><del><strong>first software</strong></del></span> <span
class="inserted"><ins><em>internal car network</a>. It is constantly
- connected</em></ins></span> to <span
class="removed"><del><strong>delete</strong></del></span> <span
class="inserted"><ins><em>the cellular phone network and sends Ford a lot of
data,
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
- key</em></ins></span> is <span
class="removed"><del><strong>Windows</strong></del></span> <span
class="inserted"><ins><em>removed, and users report that they can't disable
it.</p>
+ key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
- connectivity by disconnecting the cellular modem,</em></ins></span> or
<span class="removed"><del><strong>iOS.
-</p></strong></del></span> <span class="inserted"><ins><em>wrapping the
- antenna in aluminum foil?</p></em></ins></span>
+ connectivity by disconnecting the cellular modem, or wrapping the
+ antenna in aluminum foil?</p>
</li>
-<span class="removed"><del><strong><li>
-<p>In Android,</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201812300">
- <p>New GM cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
-Google</strong></del></span>
- <span
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
+ <li id="M201812300">
+ <p>New GM cars <a
+ href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
offer the feature of a universal back door</a>.</p>
<p>Every nonfree program offers the user zero security against its
@@ -528,7 +552,7 @@
</li>
<li id="M201711244">
- <p>The Furby Connect</em></ins></span> has a <span
class="inserted"><ins><em><a
+ <p>The Furby Connect has a <a
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
@@ -550,9 +574,9 @@
this limit.</p>
<p>While remotely allowing car “owners” to use the
- whole battery capacity did not do them any harm, the
same</em></ins></span> back
- door <span class="inserted"><ins><em>would permit Tesla (perhaps under the
command of some
- government)</em></ins></span> to remotely <span
class="removed"><del><strong>delete apps.</a> (It</strong></del></span>
<span class="inserted"><ins><em>order the car to use none of its battery. Or
+ whole battery capacity did not do them any harm, the same back
+ door would permit Tesla (perhaps under the command of some
+ government) to remotely order the car to use none of its battery. Or
perhaps to drive its passenger to a torture prison.</p>
</li>
@@ -568,40 +592,32 @@
a universal back door in the application processor, for Xiaomi's
use</a>.</p>
- <p>This</em></ins></span> is <span
class="inserted"><ins><em>separate from <a
href="#universal-back-door-phone-modem">the
- universal back door</em></ins></span> in <span
class="inserted"><ins><em>the modem processor that the local phone
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor that the local phone
company can use</a>.</p>
</li>
<li id="M201608171">
<p id="windows-update">Microsoft
- Windows has</em></ins></span> a <span class="removed"><del><strong>program
-called GTalkService).
-</p>
-
-<p>
-Google</strong></del></span> <span class="inserted"><ins><em>universal back
door through which <a
+ Windows has a universal back door through which <a
href="http://www.informationweek.com/microsoft-updates-windows-without-user-permission-apologizes/d/d-id/1059183">
- any change whatsoever</em></ins></span> can <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>be imposed on the users</a>.</p>
+ any change whatsoever can be imposed on the users</a>.</p>
- <p>This was</em></ins></span> <a <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
-forcibly</strong></del></span>
- <span
class="inserted"><ins><em>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
- reported in 2007</a> for XP</em></ins></span> and <span
class="removed"><del><strong>remotely install apps</a> through
GTalkService (which
-seems, since</strong></del></span> <span class="inserted"><ins><em>Vista, and
it seems</em></ins></span>
- that <span class="removed"><del><strong>article,</strong></del></span>
<span class="inserted"><ins><em>Microsoft used the same
method</em></ins></span> to <span class="removed"><del><strong>have been merged
into Google Play).
-This</strong></del></span> <span class="inserted"><ins><em>push the <a
+ <p>This was <a
+ href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+ reported in 2007</a> for XP and Vista, and it seems
+ that Microsoft used the same method to push the <a
href="/proprietary/malware-microsoft.html#windows10-forcing">
Windows 10 downgrade</a> to computers running Windows 7 and
8.</p>
- <p>In Windows 10, the universal back door</em></ins></span>
- is <span class="removed"><del><strong>not equivalent</strong></del></span>
<span class="inserted"><ins><em>no longer hidden; all “upgrades”
will be <a
+ <p>In Windows 10, the universal back door
+ is no longer hidden; all “upgrades” will be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">
forcibly and immediately imposed</a>.</p>
</li>
<li id="M201606060">
- <p>The Amazon Echo appears</em></ins></span> to <span
class="inserted"><ins><em>have a universal back door, since <a
+ <p>The Amazon Echo appears to have a universal back door, since <a
href="https://en.wikipedia.org/wiki/Amazon_Echo#Software_updates">
it installs “updates” automatically</a>.</p>
@@ -613,12 +629,7 @@
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has</em></ins></span> a universal back <span
class="removed"><del><strong>door, but permits various
-dirty tricks.
-</p>
-
-<p>
-Although Google's <em>exercise</em></strong></del></span> <span
class="inserted"><ins><em>door</a>. Nearly
+ A Chinese version of Android has a universal back door</a>. Nearly
all models</em></ins></span> of <span class="removed"><del><strong>this
power has not been
malicious so far, the point is that nobody should</strong></del></span> <span
class="inserted"><ins><em>mobile phones</em></ins></span> have <span
class="removed"><del><strong>such power,
which could also be used maliciously. You might well decide to
let</strong></del></span> a
@@ -859,7 +870,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/27 08:02:22 $
+$Date: 2019/07/16 20:29:51 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary-back-doors.it.po 27 Jun 2019 08:02:22 -0000 1.121
+++ proprietary-back-doors.it.po 16 Jul 2019 20:29:51 -0000 1.122
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -513,6 +513,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- proprietary-back-doors.ja-diff.html 27 Jun 2019 08:02:22 -0000 1.54
+++ proprietary-back-doors.ja-diff.html 16 Jul 2019 20:29:51 -0000 1.55
@@ -246,50 +246,62 @@
<p>It is used</strong></del></span>
<span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
- <cite>1984</cite>,</em></ins></span> by <span
class="removed"><del><strong>14,000 Android applications.</p>
- </li>
-
-<li><p>ARRIS cable modem has a</strong></del></span> <span
class="inserted"><ins><em>George Orwell.</p>
+ <cite>1984</cite>,</em></ins></span> by <span
class="removed"><del><strong>14,000 Android
applications.</p></strong></del></span> <span
class="inserted"><ins><em>George Orwell.</p>
<p>Amazon responded to criticism by saying it
would delete books only following orders from the
- state. However, that policy didn't last. In 2012 it</em></ins></span>
<a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
+ state. However, that policy didn't last. In 2012 it <a
+
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
wiped a user's Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
- <p>Do other ebook readers have back doors</em></ins></span> in <span
class="removed"><del><strong>the
backdoor</a>.</p></strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
+ <p>Do other ebook readers have back doors in their nonfree software?
We
don't know, and we have no way to find out. There is no reason to
assume that they don't.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Caterpillar vehicles
come with</strong></del></span>
+
+<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
<span class="inserted"><ins><em><li id="M201011220">
- <p>The iPhone has a back door for</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
- remotely.</p></strong></del></span>
+ <p>The iPhone</em></ins></span> has a <span
class="inserted"><ins><em>back door for</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in the backdoor</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling it without understanding.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li><p>
-Mac OS X had an</strong></del></span>
+ <span class="removed"><del><strong><li><p>Caterpillar vehicles
come with
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span>
<span class="inserted"><ins><em></ul>
<h3 id='install-delete'>Installing, deleting or disabling
programs</h3>
<ul class="blurbs">
- <li id="M201811100">
- <p>Corel Paintshop Pro has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+ <li id="M201907100">
+ <p>Apple appears</em></ins></span> to <span
class="removed"><del><strong>shutoff the engine</a>
+ remotely.</p>
+ </li>
+<li><p>
+Mac OS X had an</strong></del></span> <span class="inserted"><ins><em>say
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
- back door <span class="removed"><del><strong>for 4 years</a>.
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a</em></ins></span> back door <span class="inserted"><ins><em>in
MacOS</a></em></ins></span> for <span class="removed"><del><strong>4
years</a>.
</p></li>
-<li><p>Users reported</strong></del></span> that <span
class="removed"><del><strong><a
-
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them</strong></del></span> <span
class="inserted"><ins><em>can make it cease</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7</strong></del></span> <span
class="inserted"><ins><em>function</a>.</p>
+<li><p>Users reported</strong></del></span> <span
class="inserted"><ins><em>automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but</em></ins></span> that <span
class="inserted"><ins><em>is a separate question.</p>
+ </li>
+
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7</strong></del></span> <span
class="inserted"><ins><em>function</a>.</p>
<p>The article is full of confusions, errors</em></ins></span> and
<span class="removed"><del><strong>8 with all-spying
Windows 10</a>.</p>
@@ -323,21 +335,22 @@
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word</em></ins></span> to <span
class="inserted"><ins><em>refer to sharing copies is a smear;
- please don't smear sharing.</li>
-
- <li><p>The idea of “protecting our IP” is
- total confusion. The term “IP” itself is a</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+ attacking ships. Using that word</em></ins></span> to
+<span class="removed"><del><strong><a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.
</p>
</li>
<li>
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android has a universal back door</a>. Nearly all
-models of mobile phones</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/not-ipr.html">bogus
generalization about things
- that</em></ins></span> have <span class="removed"><del><strong>a universal
back door</strong></del></span> <span
class="inserted"><ins><em>nothing</em></ins></span> in <span
class="removed"><del><strong>the modem chip. So
+A Chinese version of Android has</strong></del></span> <span
class="inserted"><ins><em>refer to sharing copies is</em></ins></span> a <span
class="removed"><del><strong>universal back door</a>. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>smear;
+ please don't smear sharing.</li>
+
+ <li><p>The idea</em></ins></span> of <span
class="removed"><del><strong>mobile phones have</strong></del></span> <span
class="inserted"><ins><em>“protecting our IP” is
+ total confusion. The term “IP” itself is</em></ins></span> a
<span class="removed"><del><strong>universal back door</strong></del></span>
<span class="inserted"><ins><em><a
+ href="/philosophy/not-ipr.html">bogus generalization about things
+ that have nothing</em></ins></span> in <span
class="removed"><del><strong>the modem chip. So
why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>common</a>.</p>
<p>In addition,</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>speak of
“protecting” that bogus
@@ -356,37 +369,29 @@
<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
this was used</a>.
</p>
-<p>In Windows 10, the universal back door is no longer hidden; all
+<p>In Windows 10,</strong></del></span> <span
class="inserted"><ins><em>your front yard, and saying
+ that you're “protecting</em></ins></span> the <span
class="removed"><del><strong>universal back door</strong></del></span> <span
class="inserted"><ins><em>boundary line”. The kids can't do harm
+ to the boundary line, not even with a jackhammer, because
it</em></ins></span> is <span class="removed"><del><strong>no longer hidden; all
“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>your front yard,</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
-</p>
-</li>
-
-<li>
-<p>Windows 8's back doors are so gaping</strong></del></span> <span
class="inserted"><ins><em>saying</em></ins></span>
- that
-<span class="removed"><del><strong><a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span class="inserted"><ins><em>you're “protecting</em></ins></span> the
<span class="removed"><del><strong>German government has
decided</strong></del></span> <span class="inserted"><ins><em>boundary
line”. The kids can't do harm
- to the boundary line, not even with a jackhammer,
because</em></ins></span> it <span class="inserted"><ins><em>is an
- abstraction and</em></ins></span> can't be <span
class="removed"><del><strong>trusted</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>affected by
physical action.</p></li>
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>an
+ abstraction</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>can't be
affected by physical action.</p></li>
</ul></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>The iPhone has a back door
-<a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
+<p>Windows 8's back doors are so gaping</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>allows Apple</strong></del></span> <span
class="inserted"><ins><em>install a surveillance app</a>.</p>
+ load downgrades</em></ins></span> that
+<span class="removed"><del><strong><a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span class="inserted"><ins><em>install a surveillance app</a>.</p>
- <p>We link</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
-“inappropriate”. Jobs said it's ok</strong></del></span> <span
class="inserted"><ins><em>the article</em></ins></span> for <span
class="removed"><del><strong>Apple to have this power
-because</strong></del></span> <span class="inserted"><ins><em>the facts it
presents. It
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>German government has
decided</strong></del></span> <span class="inserted"><ins><em>article for the
facts</em></ins></span> it <span class="removed"><del><strong>can't be
trusted</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>presents. It
is too bad that the article finishes by advocating the
- moral weakness</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
-</p></strong></del></span> <span class="inserted"><ins><em>surrendering
to Netflix. The Netflix app <a
+ moral weakness of surrendering to Netflix. The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p></em></ins></span>
</li>
@@ -395,8 +400,24 @@
<p>The iPhone</strong></del></span>
<span class="inserted"><ins><em><li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus,</em></ins></span>
has a back door <span class="removed"><del><strong>for
-<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ <p>Baidu's proprietary Android library, Moplus,</em></ins></span>
has a back door
+<span class="removed"><del><strong><a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></strong></del></span>
that <span class="removed"><del><strong>allows Apple to remotely delete
apps</a> which Apple considers
+“inappropriate”. Jobs said it's ok for Apple to have this power
+because of course we</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"></em></ins></span>
+ can <span class="removed"><del><strong>trust Apple.
+</p></strong></del></span> <span class="inserted"><ins><em>“upload
files” as well as forcibly install
+ apps</a>.</p>
+
+ <p>It is used by 14,000 Android
applications.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p>The iPhone</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201112080">
+ <p> In addition to its <a href="#windows-update">universal back
+ door</a>, Windows 8</em></ins></span> has a back door for <a
<span
class="removed"><del><strong>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling
it without understanding.
</p>
@@ -409,23 +430,16 @@
</p>
<p>This may have improved with
<a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but</strong></del></span> <span
class="inserted"><ins><em>that</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files”</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>well</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>forcibly install
- apps</a>.</p>
-
- <p>It is used by 14,000 Android
applications.</p></em></ins></span>
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html"></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201112080">
- <p> In addition to its <a href="#windows-update">universal back
- door</a>,</em></ins></span> Windows 8 <span
class="removed"><del><strong>also</strong></del></span> has a back door for
<span class="inserted"><ins><em><a
-
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
+<li>
+<p><a
href="http://www.computerworld.com/article/2500036/desktop-apps/microsoft--we-can-remotely-delete-windows-8-apps.html">
+Windows 8 also has a back door for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html"></em></ins></span>
remotely deleting <span class="removed"><del><strong>apps</a>.
</p>
@@ -827,7 +841,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/27 08:02:22 $
+$Date: 2019/07/16 20:29:51 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.102
retrieving revision 1.103
diff -u -b -r1.102 -r1.103
--- proprietary-back-doors.ja.po 27 Jun 2019 08:02:22 -0000 1.102
+++ proprietary-back-doors.ja.po 16 Jul 2019 20:29:51 -0000 1.103
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -389,6 +389,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-back-doors.pot 27 Jun 2019 08:02:22 -0000 1.70
+++ proprietary-back-doors.pot 16 Jul 2019 20:29:52 -0000 1.71
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -289,6 +289,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a "
+"href=\"https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/\"> "
+"there is a back door in MacOS</a> for automatically updating some (all?) "
+"apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a "
"href=\"https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/\">
"
"back door that can make it cease to function</a>."
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.185
retrieving revision 1.186
diff -u -b -r1.185 -r1.186
--- proprietary-back-doors.ru.po 27 Jun 2019 14:00:28 -0000 1.185
+++ proprietary-back-doors.ru.po 16 Jul 2019 20:29:52 -0000 1.186
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-06-27 07:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -404,6 +405,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Corel Paintshop Pro has a <a href=\"https://torrentfreak.com/corel-wrongly-"
"accuses-licensed-user-of-piracy-disables-software-remotely-181110/\"> back "
"door that can make it cease to function</a>."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.104
retrieving revision 1.105
diff -u -b -r1.104 -r1.105
--- proprietary.de-diff.html 15 Jul 2019 10:02:25 -0000 1.104
+++ proprietary.de-diff.html 16 Jul 2019 20:29:52 -0000 1.105
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -126,12 +126,12 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -186,6 +186,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -242,23 +253,6 @@
href="/software/icecat/">IceCat</a>, a modified version of Firefox
with several changes to protect users' privacy.</p>
</li>
-
- <li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
- sending users' personal information to third parties</a>.</p>
-
- <p>The article mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
- </li>
</ul></em></ins></span>
@@ -319,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/16 20:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.de.po 15 Jul 2019 10:02:25 -0000 1.146
+++ proprietary.de.po 16 Jul 2019 20:29:52 -0000 1.147
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -439,6 +439,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -508,25 +522,6 @@
"protect users' privacy."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- proprietary.es.po 15 Jul 2019 10:02:25 -0000 1.181
+++ proprietary.es.po 16 Jul 2019 20:29:52 -0000 1.182
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -304,6 +304,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -405,39 +419,6 @@
"icecat/\">IceCat</a>, una versión modificada de Firefox con algunos cambios "
"para proteger la privacidad de los usuarios."
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-"A pesar del supuesto compromiso de Apple con la privacidad, hay aplicaciones "
-"para el iPhone que contienen rastreadores que funcionan por la noche y <a "
-"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-"
-"night-do-you-know-who-your-iphone-is-talking-to/\">envÃan información "
-"personal del usuario a terceras partes</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-"El artÃculo menciona ejemplos concretos: Microsoft OneDrive, el Mint de "
-"Intuit, Nike, Spotify, The Washington Post, The Weather Channel (propiedad "
-"de IBM), el servicio de alerta criminal Citizen, Yelp y DoorDash. Pero es "
-"probable que la mayorÃa de las aplicaciones que no son libres contengan "
-"rastreadores. Algunas de ellas envÃan datos de identificación personal
tales "
-"como la huella digital telefónica, la localización exacta, la dirección de
"
-"correo electrónico, el número de teléfono o incluso la dirección de
entrega "
-"(en el caso de DoorDash). Una vez que la compañÃa ha recogido esta "
-"información, no hay manera de saber para qué va a utilizarla."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -517,6 +498,40 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+#~ "trackers that are busy at night <a href=\"https://freediggz."
+#~ "com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-"
+#~ "your-iphone-is-talking-to/\"> sending users' personal information to "
+#~ "third parties</a>."
+#~ msgstr ""
+#~ "A pesar del supuesto compromiso de Apple con la privacidad, hay "
+#~ "aplicaciones para el iPhone que contienen rastreadores que funcionan por "
+#~ "la noche y <a href=\"https://freediggz.com/2019/05/28/perspective-its-the-"
+#~ "middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\">envÃan "
+#~ "información personal del usuario a terceras partes</a>."
+
+#~ msgid ""
+#~ "The article mentions specific examples: Microsoft OneDrive, Intuitâs "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (owned by "
+#~ "IBM), the crime-alert service Citizen, Yelp and DoorDash. But it is "
+#~ "likely that most nonfree apps contain trackers. Some of these send "
+#~ "personally identifying data such as phone fingerprint, exact location, "
+#~ "email address, phone number or even delivery address (in the case of "
+#~ "DoorDash). Once this information is collected by the company, there is no "
+#~ "telling what it will be used for."
+#~ msgstr ""
+#~ "El artÃculo menciona ejemplos concretos: Microsoft OneDrive, el Mint de "
+#~ "Intuit, Nike, Spotify, The Washington Post, The Weather Channel "
+#~ "(propiedad de IBM), el servicio de alerta criminal Citizen, Yelp y "
+#~ "DoorDash. Pero es probable que la mayorÃa de las aplicaciones que no son "
+#~ "libres contengan rastreadores. Algunas de ellas envÃan datos de "
+#~ "identificación personal tales como la huella digital telefónica, la "
+#~ "localización exacta, la dirección de correo electrónico, el número de "
+#~ "teléfono o incluso la dirección de entrega (en el caso de DoorDash). Una
"
+#~ "vez que la compañÃa ha recogido esta información, no hay manera de
saber "
+#~ "para qué va a utilizarla."
+
+#~ msgid ""
#~ "The Femm “fertility” app is secretly a <a href=\"https://www."
#~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
#~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary.fr.po 15 Jul 2019 11:32:42 -0000 1.225
+++ proprietary.fr.po 16 Jul 2019 20:29:52 -0000 1.226
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2019-07-15 13:32+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -299,6 +300,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -406,40 +421,6 @@
"software/icecat/\">IceCat</a>, une version de Firefox avec plusieurs "
"modifications améliorant la protection de la vie privée."
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-"En dépit de l'engagement supposé d'Apple sur la confidentialité, les
applis "
-"de l'iPhone contiennent des pisteurs qui sont très occupés la nuit à <a
href="
-"\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-"
-"do-you-know-who-your-iphone-is-talking-to/\">envoyer des données "
-"personnelles de l'utilisateur à des tiers</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-"L'article donne des exemples particuliers : Microsoft OneDrive, Mint "
-"(division d'Intuit), Nike, Spotify, le Washington Post, le Weather Channel "
-"(propriété d'IBM), le service Citizen d'alerte sur les délits, Yelp et "
-"DoorDash. Mais il est probable que la plupart des applis non libres "
-"contiennent des pisteurs. Certains envoient des informations permettant "
-"d'identifier la personne, comme l'empreinte du téléphone, sa localisation "
-"exacte, l'adresse de courriel et le numéro de téléphone de l'utilisateur,
ou "
-"même une adresse de livraison (dans le cas de DoorDash). Une fois que cette "
-"information a été collectée par la société, les paris sont ouverts
quant à "
-"son utilisation."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,3 +494,37 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+#~ "trackers that are busy at night <a href=\"https://freediggz."
+#~ "com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-"
+#~ "your-iphone-is-talking-to/\"> sending users' personal information to "
+#~ "third parties</a>."
+#~ msgstr ""
+#~ "En dépit de l'engagement supposé d'Apple sur la confidentialité, les "
+#~ "applis de l'iPhone contiennent des pisteurs qui sont très occupés la
nuit "
+#~ "Ã <a href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-"
+#~ "of-the-night-do-you-know-who-your-iphone-is-talking-to/\">envoyer des "
+#~ "données personnelles de l'utilisateur à des tiers</a>."
+
+#~ msgid ""
+#~ "The article mentions specific examples: Microsoft OneDrive, Intuitâs "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (owned by "
+#~ "IBM), the crime-alert service Citizen, Yelp and DoorDash. But it is "
+#~ "likely that most nonfree apps contain trackers. Some of these send "
+#~ "personally identifying data such as phone fingerprint, exact location, "
+#~ "email address, phone number or even delivery address (in the case of "
+#~ "DoorDash). Once this information is collected by the company, there is no "
+#~ "telling what it will be used for."
+#~ msgstr ""
+#~ "L'article donne des exemples particuliers : Microsoft OneDrive, Mint "
+#~ "(division d'Intuit), Nike, Spotify, le Washington Post, le Weather "
+#~ "Channel (propriété d'IBM), le service Citizen d'alerte sur les délits, "
+#~ "Yelp et DoorDash. Mais il est probable que la plupart des applis non "
+#~ "libres contiennent des pisteurs. Certains envoient des informations "
+#~ "permettant d'identifier la personne, comme l'empreinte du téléphone, sa "
+#~ "localisation exacte, l'adresse de courriel et le numéro de téléphone de
"
+#~ "l'utilisateur, ou même une adresse de livraison (dans le cas de "
+#~ "DoorDash). Une fois que cette information a été collectée par la
société, "
+#~ "les paris sont ouverts quant à son utilisation."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary.it-diff.html 15 Jul 2019 10:02:25 -0000 1.116
+++ proprietary.it-diff.html 16 Jul 2019 20:29:52 -0000 1.117
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -241,23 +252,6 @@
href="/software/icecat/">IceCat</a>, a modified version of Firefox
with several changes to protect users' privacy.</p>
</li>
-
- <li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
- sending users' personal information to third parties</a>.</p>
-
- <p>The article mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
- </li>
</ul></em></ins></span>
@@ -318,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/16 20:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.it.po 15 Jul 2019 10:02:25 -0000 1.155
+++ proprietary.it.po 16 Jul 2019 20:29:52 -0000 1.156
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -512,25 +526,6 @@
"protect users' privacy."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.ja-diff.html 15 Jul 2019 10:02:25 -0000 1.119
+++ proprietary.ja-diff.html 16 Jul 2019 20:29:52 -0000 1.120
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -158,10 +158,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -182,6 +182,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -238,23 +249,6 @@
href="/software/icecat/">IceCat</a>, a modified version of Firefox
with several changes to protect users' privacy.</p>
</li>
-
- <li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
- sending users' personal information to third parties</a>.</p>
-
- <p>The article mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
- </li>
</ul></em></ins></span>
@@ -315,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:25 $
+$Date: 2019/07/16 20:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.ja.po 15 Jul 2019 10:02:25 -0000 1.139
+++ proprietary.ja.po 16 Jul 2019 20:29:52 -0000 1.140
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -307,6 +307,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -376,25 +390,6 @@
"protect users' privacy."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- proprietary.nl-diff.html 15 Jul 2019 10:02:26 -0000 1.116
+++ proprietary.nl-diff.html 16 Jul 2019 20:29:52 -0000 1.117
@@ -160,10 +160,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -185,6 +185,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -241,23 +252,6 @@
href="/software/icecat/">IceCat</a>, a modified version of Firefox
with several changes to protect users' privacy.</p>
</li>
-
- <li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
- sending users' personal information to third parties</a>.</p>
-
- <p>The article mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
- </li>
</ul></em></ins></span>
@@ -318,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:26 $
+$Date: 2019/07/16 20:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary.nl.po 15 Jul 2019 10:02:26 -0000 1.127
+++ proprietary.nl.po 16 Jul 2019 20:29:52 -0000 1.128
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -436,6 +436,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -505,25 +519,6 @@
"protect users' privacy."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary.pl-diff.html 15 Jul 2019 10:02:26 -0000 1.134
+++ proprietary.pl-diff.html 16 Jul 2019 20:29:52 -0000 1.135
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -127,17 +127,17 @@
<td></em></ins></span>
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
<li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -183,6 +183,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -239,23 +250,6 @@
href="/software/icecat/">IceCat</a>, a modified version of Firefox
with several changes to protect users' privacy.</p>
</li>
-
- <li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
- sending users' personal information to third parties</a>.</p>
-
- <p>The article mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
- </li>
</ul></em></ins></span>
@@ -316,7 +310,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:26 $
+$Date: 2019/07/16 20:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.pl.po 15 Jul 2019 10:02:26 -0000 1.122
+++ proprietary.pl.po 16 Jul 2019 20:29:52 -0000 1.123
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -588,25 +602,6 @@
"protect users' privacy."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.119
retrieving revision 1.120
diff -u -b -r1.119 -r1.120
--- proprietary.pot 15 Jul 2019 10:02:26 -0000 1.119
+++ proprietary.pot 16 Jul 2019 20:29:52 -0000 1.120
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Type: text/plain; charset=CHARSET\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -249,6 +249,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a "
+"href=\"https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/\"> "
+"there is a back door in MacOS</a> for automatically updating some (all?) "
+"apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a "
"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\">
"
"not to allow them access to locations</a>."
@@ -319,25 +334,6 @@
"several changes to protect users' privacy."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a "
-"href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/\">
"
-"sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary.pt-br.po 15 Jul 2019 10:02:26 -0000 1.182
+++ proprietary.pt-br.po 16 Jul 2019 20:29:52 -0000 1.183
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2019-07-01 02:08-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -297,6 +297,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -395,38 +409,6 @@
"icecat/\">IceCat</a>, uma versão modificada do Firefox com várias
alterações "
"para proteger a privacidade dos usuários."
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-"Apesar do suposto compromisso da Apple com a privacidade, os aplicativos "
-"para iPhone contêm rastreadores ocupados à noite <a
href=\"https://freediggz."
-"com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-"
-"iphone-is-talking-to/\"> enviando informações pessoais dos usuários para "
-"terceiros</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-"O artigo menciona exemplos especÃficos: Microsoft OneDrive, Intuitâs Mint,
"
-"Nike, Spotify, The Washington Post, The Weather Channel (de propriedade da "
-"IBM), o serviço de alerta de crime Citizen, Yelp e DoorDash. Mas é
provável "
-"que a maioria dos aplicativos não livres contenham rastreadores. Algumas "
-"delas enviam dados de identificação pessoal, como impressão digital do "
-"telefone, localização exata, endereço de e-mail, número de telefone ou
até "
-"mesmo endereço de entrega (no caso da DoorDash). Uma vez que essa
informação "
-"é coletada pela empresa, não há como dizer para que ela será usada."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -502,6 +484,39 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+#~ "trackers that are busy at night <a href=\"https://freediggz."
+#~ "com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-"
+#~ "your-iphone-is-talking-to/\"> sending users' personal information to "
+#~ "third parties</a>."
+#~ msgstr ""
+#~ "Apesar do suposto compromisso da Apple com a privacidade, os aplicativos "
+#~ "para iPhone contêm rastreadores ocupados à noite <a href=\"https://"
+#~ "freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-"
+#~ "know-who-your-iphone-is-talking-to/\"> enviando informações pessoais dos
"
+#~ "usuários para terceiros</a>."
+
+#~ msgid ""
+#~ "The article mentions specific examples: Microsoft OneDrive, Intuitâs "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (owned by "
+#~ "IBM), the crime-alert service Citizen, Yelp and DoorDash. But it is "
+#~ "likely that most nonfree apps contain trackers. Some of these send "
+#~ "personally identifying data such as phone fingerprint, exact location, "
+#~ "email address, phone number or even delivery address (in the case of "
+#~ "DoorDash). Once this information is collected by the company, there is no "
+#~ "telling what it will be used for."
+#~ msgstr ""
+#~ "O artigo menciona exemplos especÃficos: Microsoft OneDrive, Intuitâs "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (de "
+#~ "propriedade da IBM), o serviço de alerta de crime Citizen, Yelp e "
+#~ "DoorDash. Mas é provável que a maioria dos aplicativos não livres "
+#~ "contenham rastreadores. Algumas delas enviam dados de identificação "
+#~ "pessoal, como impressão digital do telefone, localização exata,
endereço "
+#~ "de e-mail, número de telefone ou até mesmo endereço de entrega (no caso
"
+#~ "da DoorDash). Uma vez que essa informação é coletada pela empresa, não
há "
+#~ "como dizer para que ela será usada."
+
+#~ msgid ""
#~ "The Femm “fertility” app is secretly a <a href=\"https://www."
#~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
#~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- proprietary.ru.po 15 Jul 2019 11:01:09 -0000 1.260
+++ proprietary.ru.po 16 Jul 2019 20:29:52 -0000 1.261
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-07-16 20:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -408,38 +423,6 @@
"icecat/\">IceCat</a>, модиÑиÑиÑованнÑÑ Ð²ÐµÑÑÐ¸Ñ Firefox
Ñ Ð¸Ð·Ð¼ÐµÐ½ÐµÐ½Ð¸Ñми Ð´Ð»Ñ "
"заÑиÑÑ Ð»Ð¸Ñной жизни полÑзоваÑелей."
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-"ÐеÑмоÑÑÑ Ð½Ð° Ñо, ÑÑо ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Apple ÑкобÑ
ÑÑÐ¾Ð¸Ñ Ð½Ð° ÑÑÑаже непÑикоÑновенноÑÑи "
-"лиÑной жизни, в пÑиложениÑÑ
iPhone еÑÑÑ
пÑогÑÐ°Ð¼Ð¼Ñ Ð¾ÑÑлеживаниÑ, коÑоÑÑе по "
-"ноÑам <a
href=\"https://freediggz.com/2019/05/28/perspective-its-the-middle-"
-"of-the-night-do-you-know-who-your-iphone-is-talking-to/\"> оÑÑÑлаÑÑ
лиÑнÑе "
-"даннÑе полÑзоваÑÐµÐ»Ñ ÑÑеÑÑим ÑÑоÑонам</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-"Ð ÑÑаÑÑе пÑиводÑÑÑÑ ÐºÐ¾Ð½ÐºÑеÑнÑе пÑимеÑÑ:
Microsoft OneDrive, Mint компании "
-"Intuit, Nike, Spotify, Washington Post, Weather Channel
(ÑобÑÑвенноÑÑÑ IBM), "
-"ÑлÑжба Ð¾Ð¿Ð¾Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ пÑеÑÑÑплениÑÑ
Citizen, Yelp
и DoorDash. Ðо веÑоÑÑно, "
-"пÑогÑÐ°Ð¼Ð¼Ñ ÑÐ»ÐµÐ¶ÐµÐ½Ð¸Ñ ÐµÑÑÑ Ð² болÑÑинÑÑве
неÑвободнÑÑ
пÑиложений. ÐекоÑоÑÑе из "
-"ниÑ
оÑÑÑлаÑÑ Ð¸Ð´ÐµÐ½ÑиÑиÑиÑÑÑÑие лиÑноÑÑÑ
даннÑе, Ñакие как оÑпеÑаÑок ÑелеÑона, "
-"ÑоÑное меÑÑоположение, адÑÐµÑ ÑлекÑÑонной
поÑÑÑ, Ð½Ð¾Ð¼ÐµÑ ÑелеÑона и даже адÑÐµÑ "
-"доÑÑавки (в ÑлÑÑае DoorDash). ÐоÑле Ñого как
ÑÑа инÑоÑмаÑÐ¸Ñ ÑобÑана "
-"компанией, невозможно ÑказаÑÑ, Ð´Ð»Ñ Ñего ее
бÑдÑÑ Ð¸ÑполÑзоваÑÑ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -519,6 +502,39 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "In spite of Apple's supposed commitment to privacy, iPhone apps contain "
+#~ "trackers that are busy at night <a href=\"https://freediggz."
+#~ "com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-"
+#~ "your-iphone-is-talking-to/\"> sending users' personal information to "
+#~ "third parties</a>."
+#~ msgstr ""
+#~ "ÐеÑмоÑÑÑ Ð½Ð° Ñо, ÑÑо ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Apple ÑкобÑ
ÑÑÐ¾Ð¸Ñ Ð½Ð° ÑÑÑаже "
+#~ "непÑикоÑновенноÑÑи лиÑной жизни, в
пÑиложениÑÑ
iPhone еÑÑÑ Ð¿ÑогÑÐ°Ð¼Ð¼Ñ "
+#~ "оÑÑлеживаниÑ, коÑоÑÑе по ноÑам <a
href=\"https://freediggz.com/2019/05/28/"
+#~ "perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
+#~ "talking-to/\"> оÑÑÑлаÑÑ Ð»Ð¸ÑнÑе даннÑе
полÑзоваÑÐµÐ»Ñ ÑÑеÑÑим ÑÑоÑонам</a>."
+
+#~ msgid ""
+#~ "The article mentions specific examples: Microsoft OneDrive, Intuitâs "
+#~ "Mint, Nike, Spotify, The Washington Post, The Weather Channel (owned by "
+#~ "IBM), the crime-alert service Citizen, Yelp and DoorDash. But it is "
+#~ "likely that most nonfree apps contain trackers. Some of these send "
+#~ "personally identifying data such as phone fingerprint, exact location, "
+#~ "email address, phone number or even delivery address (in the case of "
+#~ "DoorDash). Once this information is collected by the company, there is no "
+#~ "telling what it will be used for."
+#~ msgstr ""
+#~ "Ð ÑÑаÑÑе пÑиводÑÑÑÑ ÐºÐ¾Ð½ÐºÑеÑнÑе пÑимеÑÑ:
Microsoft OneDrive, Mint компании "
+#~ "Intuit, Nike, Spotify, Washington Post, Weather Channel
(ÑобÑÑвенноÑÑÑ "
+#~ "IBM), ÑлÑжба Ð¾Ð¿Ð¾Ð²ÐµÐ´ÐµÐ½Ð¸Ñ Ð¾ пÑеÑÑÑплениÑÑ
Citizen, Yelp и DoorDash. Ðо "
+#~ "веÑоÑÑно, пÑогÑÐ°Ð¼Ð¼Ñ ÑÐ»ÐµÐ¶ÐµÐ½Ð¸Ñ ÐµÑÑÑ Ð²
болÑÑинÑÑве неÑвободнÑÑ
пÑиложений. "
+#~ "ÐекоÑоÑÑе из ниÑ
оÑÑÑлаÑÑ
иденÑиÑиÑиÑÑÑÑие лиÑноÑÑÑ Ð´Ð°Ð½Ð½Ñе, Ñакие
как "
+#~ "оÑпеÑаÑок ÑелеÑона, ÑоÑное
меÑÑоположение, адÑÐµÑ ÑлекÑÑонной поÑÑÑ,
Ð½Ð¾Ð¼ÐµÑ "
+#~ "ÑелеÑона и даже адÑÐµÑ Ð´Ð¾ÑÑавки (в ÑлÑÑае
DoorDash). ÐоÑле Ñого как ÑÑа "
+#~ "инÑоÑмаÑÐ¸Ñ ÑобÑана компанией,
невозможно ÑказаÑÑ, Ð´Ð»Ñ Ñего ее бÑдÑÑ "
+#~ "иÑполÑзоваÑÑ."
+
+#~ msgid ""
#~ "The Femm “fertility” app is secretly a <a href=\"https://www."
#~ "theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-"
#~ "by-anti-abortion-campaigners\"> tool for propaganda</a> by natalist "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.94
retrieving revision 1.95
diff -u -b -r1.94 -r1.95
--- proprietary.zh-tw-diff.html 15 Jul 2019 10:02:26 -0000 1.94
+++ proprietary.zh-tw-diff.html 16 Jul 2019 20:29:52 -0000 1.95
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -126,12 +126,12 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -186,6 +186,17 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
+
<li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
@@ -242,23 +253,6 @@
href="/software/icecat/">IceCat</a>, a modified version of Firefox
with several changes to protect users' privacy.</p>
</li>
-
- <li id="M201905280">
- <p>In spite of Apple's supposed commitment to
- privacy, iPhone apps contain trackers that are busy at night <a
-
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
- sending users' personal information to third parties</a>.</p>
-
- <p>The article mentions specific examples: Microsoft OneDrive,
- Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen, Yelp
- and DoorDash. But it is likely that most nonfree apps contain
- trackers. Some of these send personally identifying data such as phone
- fingerprint, exact location, email address, phone number or even
- delivery address (in the case of DoorDash). Once this information
- is collected by the company, there is no telling what it will be
- used for.</p>
- </li>
</ul></em></ins></span>
@@ -319,7 +313,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:26 $
+$Date: 2019/07/16 20:29:52 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.105
retrieving revision 1.106
diff -u -b -r1.105 -r1.106
--- proprietary.zh-tw.po 15 Jul 2019 10:02:26 -0000 1.105
+++ proprietary.zh-tw.po 16 Jul 2019 20:29:52 -0000 1.106
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-07-16 20:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -350,6 +350,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
@@ -419,25 +433,6 @@
"protect users' privacy."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"In spite of Apple's supposed commitment to privacy, iPhone apps contain "
-"trackers that are busy at night <a href=\"https://freediggz.com/2019/05/28/"
-"perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-"
-"talking-to/\"> sending users' personal information to third parties</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"The article mentions specific examples: Microsoft OneDrive, Intuitâs Mint, "
-"Nike, Spotify, The Washington Post, The Weather Channel (owned by IBM), the "
-"crime-alert service Citizen, Yelp and DoorDash. But it is likely that most "
-"nonfree apps contain trackers. Some of these send personally identifying "
-"data such as phone fingerprint, exact location, email address, phone number "
-"or even delivery address (in the case of DoorDash). Once this information is "
-"collected by the company, there is no telling what it will be used for."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- pt-br.po 15 Jul 2019 10:02:26 -0000 1.137
+++ pt-br.po 16 Jul 2019 20:29:52 -0000 1.138
@@ -640,6 +640,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.237
retrieving revision 1.238
diff -u -b -r1.237 -r1.238
--- ru.po 15 Jul 2019 10:28:50 -0000 1.237
+++ ru.po 16 Jul 2019 20:29:52 -0000 1.238
@@ -718,6 +718,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "
@@ -4501,18 +4515,17 @@
"to locations</a>."
msgstr ""
"Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ Ð¾ÑÑлеживаÑÑ
пеÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей, даже "
-"когда полÑзоваÑÐµÐ»Ñ <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> не позволÑеÑ
им "
-"полÑÑаÑÑ Ð´Ð¾ÑÑÑп к меÑÑоположениÑ</a>."
+"когда полÑзоваÑÐµÐ»Ñ <a
href=\"https://www.theverge.com/2019/7/8/20686514/"
+"android-covert-channel-permissions-data-collection-imei-ssid-location\"> не
"
+"позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>."
#. type: Content of: <ul><li><p>
msgid ""
"This involves an apparently unintentional weakness in Android, exploited "
"intentionally by malicious apps."
msgstr ""
-"ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, "
-"пÑеднамеÑенно иÑполÑзÑемой вÑедоноÑнÑми
пÑиложениÑми."
+"ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, пÑеднамеÑенно "
+"иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми."
#. type: Content of: <h3>
msgid "Google Interference"
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- zh-tw.po 15 Jul 2019 10:02:26 -0000 1.107
+++ zh-tw.po 16 Jul 2019 20:29:52 -0000 1.108
@@ -591,6 +591,20 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Apple appears to say that <a href=\"https://techcrunch.com/2019/07/10/apple-"
+"silent-update-zoom-app/\"> there is a back door in MacOS</a> for "
+"automatically updating some (all?) apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The specific change described in the article was not malicious—it "
+"protected users from surveillance by third parties—but that is a "
+"separate question."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"The Dropbox app for Macintosh <a href=\"http://applehelpwriter."
"com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/\"> takes "
"control of user interface items after luring the user into entering an admin "