[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Tue, 6 Aug 2019 04:29:31 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/08/06 04:29:31
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.82&r2=1.83
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.84&r2=1.85
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.116&r2=1.117
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.62&r2=1.63
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.221&r2=1.222
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.234&r2=1.235
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.270&r2=1.271
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.101&r2=1.102
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.253&r2=1.254
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.117&r2=1.118
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- de.po 3 Aug 2019 11:31:14 -0000 1.117
+++ de.po 6 Aug 2019 08:29:29 -0000 1.118
@@ -7569,6 +7569,21 @@
msgstr "Unsicherheit in Smartphones"
#. type: Content of: <ul><li><p>
+msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | Siri, Alexa, and all the other voice-control systems can be <a
# |
href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">{+
# | +}hijacked by programs that play commands in ultrasound that humans can't
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- es.po 4 Aug 2019 14:58:46 -0000 1.159
+++ es.po 6 Aug 2019 08:29:29 -0000 1.160
@@ -6558,6 +6558,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses “free”-]
+# | {+refers+} to [-mean “zero price.” We recommend saying-]
+# | {+these proprietary apps as “free”. It should have said+}
+# | “gratis” instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Desafortunadamente, el artÃculo utiliza el término <cite>«free»</cite>
para "
+"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- fr.po 3 Aug 2019 13:59:26 -0000 1.203
+++ fr.po 6 Aug 2019 08:29:29 -0000 1.204
@@ -6282,6 +6282,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- it.po 3 Aug 2019 11:31:15 -0000 1.117
+++ it.po 6 Aug 2019 08:29:29 -0000 1.118
@@ -7137,6 +7137,21 @@
msgstr "Scarsa sicurezza in dispositivi mobili"
#. type: Content of: <ul><li><p>
+msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | Siri, Alexa, and all the other voice-control systems can be <a
# |
href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">{+
# | +}hijacked by programs that play commands in ultrasound that humans can't
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- ja.po 3 Aug 2019 11:31:16 -0000 1.124
+++ ja.po 6 Aug 2019 08:29:29 -0000 1.125
@@ -5458,6 +5458,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- malware-mobiles.de-diff.html 3 Aug 2019 11:31:16 -0000 1.61
+++ malware-mobiles.de-diff.html 6 Aug 2019 08:29:29 -0000 1.62
@@ -255,6 +255,19 @@
<li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p>
+ </li>
+
<li id="M201807100"></em></ins></span>
<p>Siri, Alexa, and all the other voice-control systems can be <a
<span
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
@@ -337,34 +350,51 @@
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
WhatsApp messages are not entirely deleted</a>. They can be
recovered</em></ins></span>
- in <span class="removed"><del><strong>user's address
- book to</strong></del></span> <span class="inserted"><ins><em>various
ways.</p>
+ in <span class="inserted"><ins><em>various ways.</p>
</li>
<li id="M201607280">
<p>A half-blind security critique of a tracking app: it found that
<a
href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
- blatant flaws allowed anyone to snoop on a user's personal data</a>.
- The critique fails entirely to express concern that the app sends the
- personal data to a server, where the <em>developer</em> gets
it all.
+ blatant flaws allowed anyone to snoop on a</em></ins></span> user's <span
class="removed"><del><strong>address
+ book</strong></del></span> <span class="inserted"><ins><em>personal
data</a>.
+ The critique fails entirely</em></ins></span> to <span
class="removed"><del><strong>developer's server. Note</strong></del></span>
<span class="inserted"><ins><em>express concern</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span> the
<span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p>
+ </li>
+
+ <li><p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
+
+<li>
+ <p>Facebook's</strong></del></span> app <span
class="removed"><del><strong>listens all</strong></del></span> <span
class="inserted"><ins><em>sends</em></ins></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
+ on what people are listening</strong></del></span>
+ <span class="inserted"><ins><em>personal data</em></ins></span> to <span
class="removed"><del><strong>or watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>a server, where
the <em>developer</em> gets</em></ins></span> it <span
class="removed"><del><strong>may
+ be analyzing people's conversations to serve</strong></del></span> <span
class="inserted"><ins><em>all.
This “service” is for suckers!</p>
<p>The server surely has a “privacy policy,” and surely
- it is worthless since nearly all of them are.</p>
+ it is worthless since nearly all of</em></ins></span> them <span
class="removed"><del><strong>with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>are.</p></em></ins></span>
</li>
- <li id="M201607190">
- <p>A bug in a proprietary ASN.1 library, used
- in cell phone towers as well as cell phones and routers, <a
-
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201607190"></em></ins></span>
+ <p>A <span class="inserted"><ins><em>bug in a proprietary ASN.1
library, used
+ in cell phone towers as well as cell phones and routers,</em></ins></span>
<a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
taking control of those systems</a>.</p>
</li>
<li id="M201603100">
<p>Many proprietary payment apps <a
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
- personal data in an insecure way</a>. However,
- the worse aspect of these apps is that <a
+ personal data in an insecure way</a>. However,</em></ins></span>
+ the <span class="removed"><del><strong>privacy and
security</strong></del></span> <span class="inserted"><ins><em>worse
aspect</em></ins></span> of <span class="removed"><del><strong>283 Android
VPN</strong></del></span> <span
class="inserted"><ins><em>these</em></ins></span> apps <span
class="removed"><del><strong>concluded</strong></del></span> <span
class="inserted"><ins><em>is</em></ins></span> that <span
class="removed"><del><strong>“in spite of the
+ promises for privacy, security,</strong></del></span> <span
class="inserted"><ins><em><a
href="/philosophy/surveillance-vs-democracy.html">payment is not
anonymous</a>.</p>
</li>
@@ -374,9 +404,10 @@
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
your personal data on remote servers</a>. This leaves personal
- information like email addresses, passwords, and health information
- vulnerable. Because many of these apps are proprietary it makes it
- hard to impossible to know which apps are at risk.</p>
+ information like email addresses, passwords,</em></ins></span> and <span
class="removed"><del><strong>anonymity given by the
+ majority of VPN apps—millions</strong></del></span> <span
class="inserted"><ins><em>health information
+ vulnerable. Because many</em></ins></span> of <span
class="removed"><del><strong>users may be unawarely
subject</strong></del></span> <span class="inserted"><ins><em>these apps are
proprietary it makes it
+ hard</em></ins></span> to <span class="removed"><del><strong>poor security
guarantees and</strong></del></span> <span class="inserted"><ins><em>impossible
to know which apps are at risk.</p>
</li>
<li id="M201405190">
@@ -742,7 +773,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to</em></ins></span> developer's server. Note that this <span
class="removed"><del><strong>article misuses</strong></del></span> <span
class="inserted"><ins><em>article misuses the words
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -809,24 +840,16 @@
the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses that this was done without</em></ins></span> the
<span class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>users'
consent.
+ <p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span class="inserted"><ins><em>design
- the app to snoop at all</a>.</p></em></ins></span>
+ href="/philosophy/surveillance-vs-democracy.html"> illegal to design
+ the app to snoop at all</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704074">
- <p>Pairs</em></ins></span> of <span
class="inserted"><ins><em>Android apps can collude
- to transmit users' personal</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
-
-<li>
- <p>Facebook's</strong></del></span> <span
class="inserted"><ins><em>servers. <a
+ <li id="M201704074">
+ <p>Pairs of Android apps can collude
+ to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
@@ -834,15 +857,14 @@
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search</em></ins></span> app <span
class="removed"><del><strong>listens all</strong></del></span> <span
class="inserted"><ins><em>that it will</a> pre-install
- on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>same information
+ announced an opt-in proprietary search app that it will</a>
pre-install
+ on some of its phones. The app will give Verizon the same information
about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</em></ins></span> on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>, and the user must
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
@@ -851,8 +873,7 @@
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span class="removed"><del><strong>serve
them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -862,20 +883,17 @@
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p></em></ins></span>
+ massive surveillance.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160"></em></ins></span>
+ <li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
for privacy, security, and anonymity given by the majority of VPN
apps—millions of users may be unawarely subject to poor security
- guarantees and abusive practices inflicted by VPN apps.”</p>
+ guarantees and</em></ins></span> abusive practices inflicted by VPN
apps.”</p>
<p>Following is a non-exhaustive <span
class="removed"><del><strong>list</strong></del></span> <span
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN
apps <span class="removed"><del><strong>from
@@ -1387,7 +1405,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/03 11:31:16 $
+$Date: 2019/08/06 08:29:29 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-mobiles.de.po 3 Aug 2019 11:31:16 -0000 1.118
+++ malware-mobiles.de.po 6 Aug 2019 08:29:29 -0000 1.119
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -452,6 +452,21 @@
"schwerwiegenden Fehler hat."
#. type: Content of: <ul><li><p>
+msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | Siri, Alexa, and all the other voice-control systems can be <a
# |
href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">{+
# | +}hijacked by programs that play commands in ultrasound that humans can't
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- malware-mobiles.es.po 4 Aug 2019 14:54:44 -0000 1.138
+++ malware-mobiles.es.po 6 Aug 2019 08:29:29 -0000 1.139
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -362,6 +363,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses “free”-]
+# | {+refers+} to [-mean “zero price.” We recommend saying-]
+# | {+these proprietary apps as “free”. It should have said+}
+# | “gratis” instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Desafortunadamente, el artÃculo utiliza el término <cite>«free»</cite>
para "
+"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- malware-mobiles.fr.po 3 Aug 2019 13:59:26 -0000 1.164
+++ malware-mobiles.fr.po 6 Aug 2019 08:29:29 -0000 1.165
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2019-08-03 15:58+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -360,6 +361,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- malware-mobiles.it-diff.html 3 Aug 2019 11:31:16 -0000 1.66
+++ malware-mobiles.it-diff.html 6 Aug 2019 08:29:30 -0000 1.67
@@ -334,6 +334,19 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p>
+ </li>
+
<li id="M201807100">
<p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
@@ -1431,7 +1444,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/03 11:31:16 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- malware-mobiles.it.po 3 Aug 2019 11:31:16 -0000 1.118
+++ malware-mobiles.it.po 6 Aug 2019 08:29:30 -0000 1.119
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -427,6 +427,21 @@
"software proprietario di prestigio è immune da difetti."
#. type: Content of: <ul><li><p>
+msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
# | Siri, Alexa, and all the other voice-control systems can be <a
# |
href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">{+
# | +}hijacked by programs that play commands in ultrasound that humans can't
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.82
retrieving revision 1.83
diff -u -b -r1.82 -r1.83
--- malware-mobiles.ja-diff.html 3 Aug 2019 11:31:16 -0000 1.82
+++ malware-mobiles.ja-diff.html 6 Aug 2019 08:29:30 -0000 1.83
@@ -241,7 +241,7 @@
use</a>.</p>
<p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor that the local phone
+ universal back</em></ins></span> door <span class="inserted"><ins><em>in
the modem processor</em></ins></span> that <span
class="removed"><del><strong>we know nearly</strong></del></span> <span
class="inserted"><ins><em>the local phone
company can use</a>.</p>
</li>
@@ -257,9 +257,10 @@
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>. Nearly
- all models of mobile phones have a <a
href="#universal-back-door-phone-modem">
- universal back</em></ins></span> door <span class="inserted"><ins><em>in
the modem chip</a>. So why did Coolpad bother
+ A Chinese version of Android has a universal back door</a>.
Nearly</em></ins></span>
+ all
+ <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span
class="removed"><del><strong>have.</strong></del></span> <span
class="inserted"><ins><em>have a <a
href="#universal-back-door-phone-modem">
+ universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
@@ -294,6 +295,19 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”.</em></ins></span> It <span
class="removed"><del><strong>may involve exploiting various bugs. There
are</strong></del></span> <span class="inserted"><ins><em>should have said
“gratis”
+ instead.</p>
+ </li>
+
<li id="M201807100">
<p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
@@ -333,7 +347,7 @@
</li>
<li id="M201701130">
- <p>WhatsApp has a feature</em></ins></span> that <span
class="inserted"><ins><em><a
+ <p>WhatsApp has a feature that <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
has been described as a “back door”</a> because it would
enable governments to nullify its encryption.</p>
@@ -764,18 +778,17 @@
<p>Google did not intend to make these apps spy; on the contrary, it
worked in various ways to prevent that, and deleted these apps after
- discovering what they did. So</em></ins></span> we <span
class="removed"><del><strong>know nearly all
- portable phones have.</strong></del></span> <span
class="inserted"><ins><em>cannot blame Google specifically
+ discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
<p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
- nonfree.</em></ins></span> It <span class="removed"><del><strong>may
involve exploiting various bugs.</strong></del></span> <span
class="inserted"><ins><em>also distributes its own nonfree apps, such as Google
Play,
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
- cheating?</em></ins></span> There <span class="inserted"><ins><em>is no
systematic way for Google, or Android users,
+ cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
<p>Google could demand the source code for these apps, and study
@@ -814,7 +827,7 @@
</li>
<li id="M201704190">
- <p>Users</em></ins></span> are <span class="inserted"><ins><em>suing
Bose for <a
+ <p>Users are suing Bose for <a
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
distributing a spyware app for its headphones</a>. Specifically,
the app would record the names of the audio files users listen to
@@ -1273,7 +1286,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/03 11:31:16 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- malware-mobiles.ja.po 3 Aug 2019 11:31:16 -0000 1.108
+++ malware-mobiles.ja.po 6 Aug 2019 08:29:30 -0000 1.109
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -333,6 +333,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.84
retrieving revision 1.85
diff -u -b -r1.84 -r1.85
--- malware-mobiles.pot 3 Aug 2019 11:31:16 -0000 1.84
+++ malware-mobiles.pot 6 Aug 2019 08:29:30 -0000 1.85
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -258,6 +258,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a "
+"href=\"https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/\">
"
+"failed to detect a test virus</a>. All of them asked for dangerous "
+"permissions or contained advertising trackers, with seven being more risky "
+"than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as "
+"“free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a "
"href=\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa\">
"
"hijacked by programs that play commands in ultrasound that humans can't "
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- malware-mobiles.ru.po 5 Aug 2019 07:28:36 -0000 1.198
+++ malware-mobiles.ru.po 6 Aug 2019 08:29:30 -0000 1.199
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -355,6 +356,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses “free”-]
+# | {+refers+} to [-mean “zero price.” We recommend saying-]
+# | {+these proprietary apps as “free”. It should have said+}
+# | “gratis” instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Ð ÑожалениÑ, в ÑÑаÑÑе Ñлово
“ÑвободнÑй” иÑполÑзÑеÑÑÑ Ð² знаÑении "
+"“нÑлевой Ñенє. ÐÑ ÑекомендÑем
вмеÑÑо ÑÑого говоÑиÑÑ “"
+"беÑплаÑнÑй”."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- nl.po 3 Aug 2019 11:31:16 -0000 1.118
+++ nl.po 6 Aug 2019 08:29:30 -0000 1.119
@@ -5020,6 +5020,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- pl.po 3 Aug 2019 11:31:16 -0000 1.117
+++ pl.po 6 Aug 2019 08:29:30 -0000 1.118
@@ -4386,6 +4386,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.116
retrieving revision 1.117
diff -u -b -r1.116 -r1.117
--- pot 3 Aug 2019 11:31:16 -0000 1.116
+++ pot 6 Aug 2019 08:29:30 -0000 1.117
@@ -4178,6 +4178,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-insecurity.de-diff.html 15 Jul 2019 10:02:22 -0000 1.28
+++ proprietary-insecurity.de-diff.html 6 Aug 2019 08:29:30 -0000 1.29
@@ -63,86 +63,107 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to <span class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
+to <span class="removed"><del><strong>present the specifics.</p>
+
+<ul>
+<li>
+ <p>Some Samsung phones
+ randomly</strong></del></span> <span class="inserted"><ins><em>serve as
specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M201907080">
- <p>Many Android apps can track
- users' movements even when</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
+ photos</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed</em></ins></span> to <span class="removed"><del><strong>people in
the owner's contact list</a>.</p>
+</li>
+<li>
+ <p>One</strong></del></span> <span class="inserted"><ins><em>detect a
test virus</a>. All</em></ins></span> of <span
class="inserted"><ins><em>them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than</em></ins></span> the <span
class="removed"><del><strong>dangers</strong></del></span> <span
class="inserted"><ins><em>average</em></ins></span> of the <span
class="removed"><del><strong>“internet of stings” is that, if
+ you lose your internet service, you also <a
+href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control of your house and appliances</a>.</p>
+ <p>For your safety, don't use any appliance with a connection
to</strong></del></span> <span class="inserted"><ins><em>100 most popular
Android apps.</p>
-<ul>
+ <p>Note that</em></ins></span> the <span
class="removed"><del><strong>real
+ internet.</p>
+</li>
<li>
- <p>Some Samsung phones
- randomly</strong></del></span> <span class="inserted"><ins><em>user
says</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos</strong></del></span>
+ <p>Amazon recently invited consumers</strong></del></span> <span
class="inserted"><ins><em>article refers</em></ins></span> to <span
class="removed"><del><strong>be suckers and</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p>
+ </li>
+
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to <span
class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>allow them access to locations</a>.</p>
+ not to</em></ins></span> allow <span class="removed"><del><strong>delivery
staff</strong></del></span> <span class="inserted"><ins><em>them
access</em></ins></span> to <span class="removed"><del><strong>open their front
doors</a>. Wouldn't you know it,
+ the system has a grave security flaw.</p>
+</li>
+<li>
+ <p>Intel's intentional “management engine” back door has
<a
+href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
+ unintended back doors</a> too.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
- <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>the owner's
contact list</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Android,
+ <p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>One of</strong></del></span>
+ <p>Bad security</strong></del></span>
<span class="inserted"><ins><em><li id="M201905150">
- <p>Users caught in</em></ins></span> the <span
class="removed"><del><strong>dangers</strong></del></span> <span
class="inserted"><ins><em>jail</em></ins></span> of <span
class="inserted"><ins><em>an iMonster are <a
+ <p>Users caught</em></ins></span> in <span
class="removed"><del><strong>some cars makes it possible
+ to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ remotely activate</strong></del></span> the <span
class="removed"><del><strong>airbags</a>.</p>
+</li>
+<li>
+ <p>A “smart” intravenous pump
designed</strong></del></span> <span class="inserted"><ins><em>jail of an
iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
- ducks for other attackers</a>, and</em></ins></span> the <span
class="removed"><del><strong>“internet</strong></del></span> <span
class="inserted"><ins><em>app censorship prevents security
+ ducks</em></ins></span> for
+ <span class="removed"><del><strong>hospitals</strong></del></span> <span
class="inserted"><ins><em>other attackers</a>, and the app censorship
prevents security
companies from figuring out how those attacks work.</p>
- <p>Apple's censorship</em></ins></span> of <span
class="removed"><del><strong>stings”</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> is <span
class="removed"><del><strong>that, if
- you lose your internet service, you also <a
-href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house</strong></del></span> <span
class="inserted"><ins><em>fundamentally unjust,</em></ins></span> and <span
class="removed"><del><strong>appliances</a>.</p>
- <p>For your safety, don't use any appliance with a connection to the
real
- internet.</p>
-</li>
-<li>
- <p>Amazon recently invited consumers to</strong></del></span> <span
class="inserted"><ins><em>would</em></ins></span> be <span
class="removed"><del><strong>suckers and <a
-href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff</strong></del></span>
- <span class="inserted"><ins><em>inexcusable even if it didn't
lead</em></ins></span> to <span class="removed"><del><strong>open their front
doors</a>. Wouldn't you know it,
- the system has a grave</strong></del></span> security <span
class="removed"><del><strong>flaw.</p></strong></del></span> <span
class="inserted"><ins><em>threats as well.</p></em></ins></span>
+ <p>Apple's censorship of apps</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>fundamentally unjust, and would be
+ inexcusable even if it didn't lead</em></ins></span> to <span
class="removed"><del><strong>the internet. Naturally <a
+href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its</strong></del></span> security <span class="inserted"><ins><em>threats
as well.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>Intel's intentional “management engine” back
door</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201903210">
- <p>The Medtronics Conexus Telemetry Protocol</em></ins></span> has
<a
-<span
class="removed"><del><strong>href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
- unintended back doors</a> too.</p>
-</li>
-<li>
- <p>Bad security</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models of implantable
- defibrillators</a> and the devices they connect to.</p>
+
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol</em></ins></span> has
<span class="removed"><del><strong>been cracked</a>.</p>
+ <p>Note</strong></del></span> <span class="inserted"><ins><em><a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities</em></ins></span> that <span
class="removed"><del><strong>this article misuses</strong></del></span> <span
class="inserted"><ins><em>affect several models of implantable
+ defibrillators</a> and</em></ins></span> the <span
class="removed"><del><strong>term <a
+href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ referring</strong></del></span> <span class="inserted"><ins><em>devices
they connect to.</p>
<p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered</em></ins></span> in <span
class="removed"><del><strong>some cars makes it possible
- to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
- remotely activate</strong></del></span> <span
class="inserted"><ins><em>an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by</em></ins></span> the
<span
class="removed"><del><strong>airbags</a>.</p></strong></del></span>
<span class="inserted"><ins><em>company to
- correct them. This means you can't rely on proprietary software
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by the
company</em></ins></span> to <span
class="removed"><del><strong>crackers.</p></strong></del></span>
+ <span class="inserted"><ins><em>correct them. This means you can't rely on
proprietary software
developers to fix bugs in their products.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li>
- <p>A “smart” intravenous pump designed for
- hospitals</strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201902270">
- <p>The Ring (now Amazon) doorbell camera</em></ins></span> is <span
class="removed"><del><strong>connected to</strong></del></span> <span
class="inserted"><ins><em>designed so that</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally</strong></del></span>
- <span class="inserted"><ins><em>manufacturer (now Amazon) can watch all
the time. Now it turns out
- that</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"></strong></del></span>
<span
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ <span class="inserted"><ins><em><li id="M201902270"></em></ins></span>
+ <p>The <span class="removed"><del><strong>bad security in many
Internet of Stings devices
+ allows</strong></del></span> <span class="inserted"><ins><em>Ring (now
Amazon) doorbell camera is designed so that the
+ manufacturer (now Amazon) can watch all the time. Now it turns out
+ that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</strong></del></span>
<span
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
unintentional and I suppose Amazon will fix it. I
- do not expect Amazon to change the design that <a
+ do not expect Amazon</em></ins></span> to <span
class="removed"><del><strong>snoop on</strong></del></span> <span
class="inserted"><ins><em>change</em></ins></span> the <span
class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span> that <span
class="removed"><del><strong>use them</a>.</p>
+ <p>Don't be</strong></del></span> <span class="inserted"><ins><em><a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
</li>
@@ -155,28 +176,34 @@
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>sucker—reject all</strong></del></span>
<span class="inserted"><ins><em>way to break</em></ins></span> the <span
class="removed"><del><strong>stings.</p></strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
- turn it into a listening device</a> for them.</p>
+ turn it into a listening device</a> for
them.</p></em></ins></span>
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
+ <p>It <span class="removed"><del><strong>is unfortunate
that</strong></del></span> <span class="inserted"><ins><em>was very difficult
for them to do this. The job would be much
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span class="removed"><del><strong>article
uses</strong></del></span> <span class="inserted"><ins><em>US
+ told Amazon to do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>term</strong></del></span> <span
class="inserted"><ins><em>product in that country,
do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers are probably hackers too, but please <a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.</p>
+ <p>These crackers are probably hackers too, but
please</em></ins></span> <a
+ <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize">
+ “monetize”</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking” to mean “breaking
security”</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li id="M201807100">
+ <span class="inserted"><ins><em><li id="M201807100"></em></ins></span>
<p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
</li>
- <li id="M201807020">
+ <li <span class="removed"><del><strong>id="break-security-smarttv">
+ <p><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found</strong></del></span> <span
class="inserted"><ins><em>id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
photos to people in the owner's contact list</a>.</p>
@@ -188,7 +215,7 @@
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
lose control of your house and appliances</a>.</p>
- <p>For your safety, don't use any appliance with a connection to the
+ <p>For your safety, don't use any appliance with</em></ins></span> a
<span class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>connection</em></ins></span> to <span
class="removed"><del><strong>break security on</strong></del></span> <span
class="inserted"><ins><em>the
real internet.</p>
</li>
@@ -202,7 +229,7 @@
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
allow delivery staff to open their front doors</a>. Wouldn't you know
- it, the system has a grave security flaw.</p>
+ it, the system has</em></ins></span> a <span
class="inserted"><ins><em>grave security flaw.</p>
</li>
<li id="M201709290">
@@ -212,44 +239,29 @@
</li>
<li id="M201709200">
- <p>A “smart” intravenous pump
+ <p>A</em></ins></span> “smart” <span
class="removed"><del><strong>TV</a> and use</strong></del></span> <span
class="inserted"><ins><em>intravenous pump
designed for hospitals is connected to the internet. Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"></em></ins></span>
- its security has been cracked</a>.</p>
+ its <span class="removed"><del><strong>camera</strong></del></span> <span
class="inserted"><ins><em>security has been cracked</a>.</p>
<p>Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p>
+ referring</em></ins></span> to <span
class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em>crackers.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201708280"></em></ins></span>
+ <li id="M201708280">
<p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ to snoop on</em></ins></span> the people <span
class="removed"><del><strong>who are watching
TV.</p></strong></del></span> <span class="inserted"><ins><em>that use
them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
<p>It is unfortunate that the article uses the term <a
- <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize">
- “monetize”</a>.</p>
-</li>
-<li>
- <p>Siri, Alexa, and all the other voice-control systems can be
- <a
-href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
- hijacked by programs that play commands in ultrasound that humans can't
- hear</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li <span class="removed"><del><strong>id="break-security-smarttv">
- <p><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a> and use its camera
- to watch the people who are watching TV.</p>
-</li>
-<li></strong></del></span> <span
class="inserted"><ins><em>id="M201706200.1"></em></ins></span>
+ <span class="inserted"><ins><em><li
id="M201706200.1"></em></ins></span>
<p>Many models of Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
@@ -1027,7 +1039,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:22 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary-insecurity.de.po 15 Jul 2019 10:02:22 -0000 1.131
+++ proprietary-insecurity.de.po 6 Aug 2019 08:29:30 -0000 1.132
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -139,6 +139,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- proprietary-insecurity.es.po 18 Jul 2019 12:58:55 -0000 1.2
+++ proprietary-insecurity.es.po 6 Aug 2019 08:29:30 -0000 1.3
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2019-07-18 14:25+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -111,6 +112,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses “free”-]
+# | {+refers+} to [-mean “zero price.” We recommend saying-]
+# | {+these proprietary apps as “free”. It should have said+}
+# | “gratis” instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Desafortunadamente, el artÃculo utiliza el término <cite>«free»</cite>
para "
+"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary-insecurity.fr.po 15 Jul 2019 11:32:42 -0000 1.168
+++ proprietary-insecurity.fr.po 6 Aug 2019 08:29:30 -0000 1.169
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2019-07-15 13:32+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -110,6 +111,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-insecurity.it-diff.html 15 Jul 2019 10:02:22 -0000 1.43
+++ proprietary-insecurity.it-diff.html 6 Aug 2019 08:29:30 -0000 1.44
@@ -58,97 +58,97 @@
<li id="break-security-smarttv">
<p><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a> and use its camera
- to watch the people who are watching TV.</p>
-</li>
-<li>
- <p>Many models</strong></del></span>
-
-<span class="inserted"><ins><em><p>This page lists clearly established
cases</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras <a
- href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
- have backdoors</a>.</p>
-
- <p>That is a malicious functionality, but</strong></del></span> <span
class="inserted"><ins><em>insecurity</em></ins></span> in <span
class="removed"><del><strong>addition it</strong></del></span>
-<span class="inserted"><ins><em>proprietary software that has grave
consequences or</em></ins></span> is <span class="removed"><del><strong>a gross
- insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into
- users' cameras</a>.</p>
-
-</li>
+ Crackers found</strong></del></span>
-<li>
- <p>
- Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
- pre-installed on 28 models</strong></del></span> <span
class="inserted"><ins><em>otherwise
+<span class="inserted"><ins><em><p>This page lists clearly established
cases of insecurity in
+proprietary software that has grave consequences or is otherwise
noteworthy.</p>
<div class="important">
-<p>If you know</em></ins></span> of <span
class="removed"><del><strong>HP laptops logged the user's
- keystroke</strong></del></span> <span class="inserted"><ins><em>an example
that ought</em></ins></span> to <span class="removed"><del><strong>a
file</strong></del></span> <span class="inserted"><ins><em>be</em></ins></span>
in <span class="removed"><del><strong>the filesystem. Any process with
access</strong></del></span> <span class="inserted"><ins><em>this page but isn't
-here, please write</em></ins></span>
-to <span class="inserted"><ins><em><a
href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>filesystem</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference</em></ins></span> or
<span class="removed"><del><strong>the MapViewOfFile API could gain
access</strong></del></span> <span
class="inserted"><ins><em>two</em></ins></span>
-to <span class="inserted"><ins><em>serve as specific substantiation.</p>
+<p>If you know of an example that ought to be in this page but isn't
+here, please write
+to <a href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include the URL of</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
+to <span class="removed"><del><strong>break</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M201907080">
- <p>Many Android apps can track
- users' movements even when</em></ins></span> the
- <span class="removed"><del><strong>log. Furthermore,</strong></del></span>
<span class="inserted"><ins><em>user says</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according</strong></del></span>
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by</em></ins></span> security <span
class="removed"><del><strong>on a “smart” TV</a> and use its
camera</strong></del></span> <span class="inserted"><ins><em>researchers, eight
<a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed</em></ins></span> to <span
class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em>detect a test virus</a>. All of them asked for
dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than</em></ins></span> the <span class="removed"><del><strong>people
who are watching TV.</p></strong></del></span> <span
class="inserted"><ins><em>average of the 100 most popular Android
apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907080"></em></ins></span>
+ <p>Many <span class="removed"><del><strong>models of
Internet-connected cameras</strong></del></span> <span
class="inserted"><ins><em>Android apps can track
+ users' movements even when the user says</em></ins></span> <a
+ <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
+ have backdoors</a>.</p>
+
+ <p>That is a malicious functionality, but</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to <span
class="removed"><del><strong>modzero</a> the “information-leak via
Covert Storage
- Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>allow them access</em></ins></span> to <span
class="removed"><del><strong>capture keystrokes without
- taking</strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ not to allow them access to locations</a>.</p>
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
+ <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>addition it is
a gross
+ insecurity since anyone, including</strong></del></span> <span
class="inserted"><ins><em>Android,
+ exploited intentionally by</em></ins></span> malicious <span
class="removed"><del><strong>crackers,</strong></del></span> <span
class="inserted"><ins><em>apps.</p>
</li>
<li id="M201905150">
- <p>Users caught in</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>jail</em></ins></span> of <span
class="removed"><del><strong>being classified</strong></del></span> <span
class="inserted"><ins><em>an iMonster are <a
- href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ <p>Users caught in the jail of an iMonster are</em></ins></span>
<a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
ducks for other attackers</a>, and the app censorship prevents
security
- companies from figuring out how those attacks work.</p>
+ companies from figuring out how</em></ins></span> those <span
class="removed"><del><strong>accounts</strong></del></span> <span
class="inserted"><ins><em>attacks work.</p>
- <p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable even if it didn't lead to security threats</em></ins></span>
as <span class="removed"><del><strong>malicious task by AV
- heuristics”.
- </p></strong></del></span> <span
class="inserted"><ins><em>well.</p></em></ins></span>
+ <p>Apple's censorship of apps is fundamentally
unjust,</em></ins></span> and <span class="removed"><del><strong>use
them</strong></del></span> <span class="inserted"><ins><em>would be
+ inexcusable even if it didn't lead</em></ins></span> to <span
class="removed"><del><strong>get into
+ users' cameras</a>.</p></strong></del></span> <span
class="inserted"><ins><em>security threats as well.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201903210"></em></ins></span>
- <p>The <span class="removed"><del><strong>proprietary
code</strong></del></span> <span class="inserted"><ins><em>Medtronics Conexus
Telemetry Protocol has <a
+<span class="removed"><del><strong><li>
+ <p>
+ Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+ pre-installed on 28</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities</em></ins></span> that <span
class="removed"><del><strong>runs pacemakers, insulin
pumps,</strong></del></span> <span class="inserted"><ins><em>affect several
models of implantable
- defibrillators</a></em></ins></span> and <span
class="removed"><del><strong>other
-medical</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> devices <span
class="removed"><del><strong>is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>they connect to.</p>
+ two vulnerabilities that affect several</em></ins></span> models of <span
class="removed"><del><strong>HP laptops logged</strong></del></span> <span
class="inserted"><ins><em>implantable
+ defibrillators</a> and</em></ins></span> the <span
class="removed"><del><strong>user's
+ keystroke to a file</strong></del></span> <span
class="inserted"><ins><em>devices they connect to.</p>
<p>This protocol has been around since 2006, and similar
vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on proprietary software
- developers to fix bugs in their products.</p></em></ins></span>
+ protocol</em></ins></span> in <span class="inserted"><ins><em>2008.
Apparently, nothing was done by</em></ins></span> the <span
class="removed"><del><strong>filesystem. Any process with
access</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> to
+ <span class="removed"><del><strong>the filesystem or the MapViewOfFile API
could gain access</strong></del></span>
+ <span class="inserted"><ins><em>correct them. This means you can't rely on
proprietary software
+ developers</em></ins></span> to <span class="inserted"><ins><em>fix bugs
in their products.</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>Exploits</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902270">
- <p>The Ring (now Amazon) doorbell camera is designed so that the
- manufacturer (now Amazon) can watch all the time. Now it turns out
- that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera is designed so
that</em></ins></span> the
+ <span class="removed"><del><strong>log. Furthermore,</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer (now Amazon) can watch all
the time. Now it turns out
+ that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according</strong></del></span>
<span
class="inserted"><ins><em>href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
unintentional and I suppose Amazon will fix it. I
- do not expect Amazon to change the design that <a
+ do not expect Amazon</em></ins></span> to <span
class="removed"><del><strong>modzero</a></strong></del></span> <span
class="inserted"><ins><em>change</em></ins></span> the <span
class="removed"><del><strong>“information-leak via Covert Storage
+ Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
- Amazon to watch</a>.</p>
+ Amazon</em></ins></span> to <span class="removed"><del><strong>capture
keystrokes without
+ taking</strong></del></span> <span
class="inserted"><ins><em>watch</a>.</p>
</li>
<li id="M201809240">
@@ -159,13 +159,18 @@
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security</em></ins></span> of
<span class="removed"><del><strong>bugs</strong></del></span> <span
class="inserted"><ins><em>an Amazon device,
+ <p>Crackers found a way to break</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> of <span
class="removed"><del><strong>being classified</strong></del></span> <span
class="inserted"><ins><em>an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product</em></ins></span> in
<span class="removed"><del><strong>Windows, which were
developed</strong></del></span> <span class="inserted"><ins><em>that country,
+ easier for Amazon. And if some government such</em></ins></span> as <span
class="removed"><del><strong>malicious task by AV
+ heuristics”.
+ </p>
+</li>
+<li>
+<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>China or the US
+ told Amazon to do this, or cease to sell the product in</em></ins></span>
that <span class="removed"><del><strong>runs pacemakers, insulin
pumps,</strong></del></span> <span class="inserted"><ins><em>country,
do you think Amazon would have the moral fiber to say no?</p>
<p>These crackers are probably hackers too, but please <a
@@ -174,23 +179,25 @@
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all the other voice-control systems can be <a
+ <p>Siri, Alexa,</em></ins></span> and <span
class="inserted"><ins><em>all the</em></ins></span> other
+<span class="removed"><del><strong>medical devices</strong></del></span> <span
class="inserted"><ins><em>voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
- hijacked</em></ins></span> by <span class="inserted"><ins><em>programs
that play commands in ultrasound that humans
+ hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
</li>
<li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos to people in</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>owner's contact list</a>.</p>
+ photos to people in the owner's contact list</a>.</p>
</li>
<li id="M201712240">
- <p>One of the dangers of the “internet of stings”
- is that, if you lose your internet service, you also <a
-
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house and appliances</a>.</p>
+ <p>One of the dangers of the “internet of
stings”</em></ins></span>
+ is <span class="inserted"><ins><em>that, if you lose your internet
service, you also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
+full</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control</em></ins></span> of <span
class="removed"><del><strong>gross</strong></del></span> <span
class="inserted"><ins><em>your house and appliances</a>.</p>
<p>For your safety, don't use any appliance with a connection to the
real internet.</p>
@@ -206,13 +213,17 @@
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
allow delivery staff to open their front doors</a>. Wouldn't you know
- it, the system has a grave security flaw.</p>
+ it, the system has a grave</em></ins></span> security <span
class="removed"><del><strong>faults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>flaw.</p></em></ins></span>
</li>
- <li id="M201709290">
- <p>Bad security in some cars makes it possible to <a
+
+<span class="removed"><del><strong><li>
+ <p>Exploits of bugs</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201709290">
+ <p>Bad security</em></ins></span> in <span
class="removed"><del><strong>Windows, which were developed
by</strong></del></span> <span class="inserted"><ins><em>some cars makes it
possible to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
- remotely activate the airbags</a>.</p>
+ remotely activate</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>airbags</a>.</p>
</li>
<li id="M201709200">
@@ -987,7 +998,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:22 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary-insecurity.it.po 15 Jul 2019 10:02:22 -0000 1.148
+++ proprietary-insecurity.it.po 6 Aug 2019 08:29:30 -0000 1.149
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.62
retrieving revision 1.63
diff -u -b -r1.62 -r1.63
--- proprietary-insecurity.ja-diff.html 15 Jul 2019 10:02:23 -0000 1.62
+++ proprietary-insecurity.ja-diff.html 6 Aug 2019 08:29:30 -0000 1.63
@@ -75,25 +75,37 @@
here, please write</em></ins></span>
to <span class="removed"><del><strong>weak security,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
is easy</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a></em></ins></span>
-to <span class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>doors</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>100 million cars built by
Volkswagen</a>.</p>
-</li>
+to <span class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>doors</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>100 million cars built</strong></del></span> <span
class="inserted"><ins><em>a trustworthy reference or two
+to serve as specific substantiation.</p>
+</div>
+</div>
+<div class="column-limit" id="proprietary-insecurity"></div>
-<li>
-<p>Ransomware <a
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
-been developed for</strong></del></span> a <span
class="removed"><del><strong>thermostat that uses proprietary
software</a>.</p>
+<ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested</em></ins></span> by <span
class="removed"><del><strong>Volkswagen</a>.</p>
</li>
<li>
+<p>Ransomware</strong></del></span> <span
class="inserted"><ins><em>security researchers, eight</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
+been developed for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect</em></ins></span> a <span
class="removed"><del><strong>thermostat</strong></del></span> <span
class="inserted"><ins><em>test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note</em></ins></span> that <span
class="removed"><del><strong>uses</strong></del></span> <span
class="inserted"><ins><em>the article refers to these</em></ins></span>
proprietary <span
class="removed"><del><strong>software</a>.</p></strong></del></span>
<span class="inserted"><ins><em>apps as
+ “free”. It should have said “gratis”
+ instead.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
-Internet Explorer and Edge</a> allows an attacker</strong></del></span>
<span class="inserted"><ins><em>trustworthy reference or two</em></ins></span>
-to <span class="removed"><del><strong>retrieve
-Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
-</div>
-</div>
-<div class="column-limit" id="proprietary-insecurity"></div>
+Internet Explorer and Edge</a> allows an attacker to retrieve
+Microsoft account credentials, if</strong></del></span>
-<ul class="blurbs">
- <li id="M201907080">
+ <span class="inserted"><ins><em><li id="M201907080">
<p>Many Android apps can track
users' movements even when</em></ins></span> the user <span
class="removed"><del><strong>is tricked into visiting a
malicious link.</p>
@@ -115,16 +127,12 @@
<span class="inserted"><ins><em><li id="M201905150">
<p>Users caught</em></ins></span> in <span
class="removed"><del><strong>Apple's Image I/O API
allowed</strong></del></span> <span class="inserted"><ins><em>the jail
of</em></ins></span> an <span class="removed"><del><strong>attacker
to</strong></del></span> <span class="inserted"><ins><em>iMonster
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code</strong></del></span>
+ malacious code from any application which uses</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
ducks for other attackers</a>, and the app censorship prevents
security
- companies</em></ins></span> from <span class="removed"><del><strong>any
application which uses this API to render a
- certain kind</strong></del></span> <span class="inserted"><ins><em>figuring
out how those attacks work.</p>
+ companies from figuring out how those attacks work.</p>
- <p>Apple's censorship</em></ins></span> of <span
class="removed"><del><strong>image file</a>.</p>
-</li>
-<li>
-<p>A bug in a proprietary ASN.1 library,</strong></del></span> <span
class="inserted"><ins><em>apps is fundamentally unjust, and would be
+ <p>Apple's censorship of apps is fundamentally unjust, and would be
inexcusable even if it didn't lead to security threats as well.</p>
</li>
@@ -413,12 +421,13 @@
<li id="M201607220">
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malicious code from any application which uses this API to render a
+ malicious code from any application which uses</em></ins></span> this API
to render a
certain kind of image file</a>.</p>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li id="M201607190">
- <p>A bug in a proprietary ASN.1 library,</em></ins></span> used
+ <span class="inserted"><ins><em><li id="M201607190"></em></ins></span>
+ <p>A bug in a proprietary ASN.1 library, used
in cell phone towers as well as cell phones and routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
taking control of those systems</a>.</p>
@@ -933,7 +942,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/07/15 10:02:23 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary-insecurity.ja.po 15 Jul 2019 10:02:23 -0000 1.120
+++ proprietary-insecurity.ja.po 6 Aug 2019 08:29:30 -0000 1.121
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -106,6 +106,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- proprietary-insecurity.pot 15 Jul 2019 10:02:23 -0000 1.87
+++ proprietary-insecurity.pot 6 Aug 2019 08:29:30 -0000 1.88
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a "
+"href=\"https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/\">
"
+"failed to detect a test virus</a>. All of them asked for dangerous "
+"permissions or contained advertising trackers, with seven being more risky "
+"than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as "
+"“free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a "
"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\">
"
"not to allow them access to locations</a>."
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.221
retrieving revision 1.222
diff -u -b -r1.221 -r1.222
--- proprietary-insecurity.ru.po 15 Jul 2019 11:01:09 -0000 1.221
+++ proprietary-insecurity.ru.po 6 Aug 2019 08:29:30 -0000 1.222
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-07-15 09:55+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2018-12-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses “free”-]
+# | {+refers+} to [-mean “zero price.” We recommend saying-]
+# | {+these proprietary apps as “free”. It should have said+}
+# | “gratis” instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Ð ÑожалениÑ, в ÑÑаÑÑе Ñлово
“ÑвободнÑй” иÑполÑзÑеÑÑÑ Ð² знаÑении "
+"“нÑлевой Ñенє. ÐÑ ÑекомендÑем
вмеÑÑо ÑÑого говоÑиÑÑ “"
+"беÑплаÑнÑй”."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many Android apps can track users' movements even when the user says <a href="
"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
"permissions-data-collection-imei-ssid-location\"> not to allow them access "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary.de-diff.html 3 Aug 2019 11:31:18 -0000 1.110
+++ proprietary.de-diff.html 6 Aug 2019 08:29:30 -0000 1.111
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -130,14 +130,14 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
+<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
-<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -186,6 +186,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -242,16 +255,6 @@
malicious—it protected users from surveillance by third
parties—but that is a separate question.</p>
</li>
-
- <li id="M201907080">
- <p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
-
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
- </li>
</ul></em></ins></span>
@@ -312,7 +315,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/03 11:31:18 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary.de.po 3 Aug 2019 11:31:20 -0000 1.152
+++ proprietary.de.po 6 Aug 2019 08:29:30 -0000 1.153
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -439,6 +439,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -513,20 +528,6 @@
"separate question."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary.es.po 4 Aug 2019 14:54:59 -0000 1.192
+++ proprietary.es.po 6 Aug 2019 08:29:30 -0000 1.193
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -303,6 +304,31 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses “free”-]
+# | {+refers+} to [-mean “zero price.” We recommend saying-]
+# | {+these proprietary apps as “free”. It should have said+}
+# | “gratis” instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Desafortunadamente, el artÃculo utiliza el término <cite>«free»</cite>
para "
+"significar «precio cero». Recomendamos en su lugar decir: «gratis»."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -414,26 +440,6 @@
"El cambio concreto descrito en el artÃculo no era malicioso, protegÃa a los
"
"usuarios de la vigilancia por parte de terceros, pero esa es otra cuestión."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-"Muchas aplicaciones de Android pueden rastrear los movimientos del usuario "
-"incluso cuando este <a href=\"https://www.theverge.com/2019/7/8/20686514/"
-"android-covert-channel-permissions-data-collection-imei-ssid-location\">no "
-"les permite obtener datos de localización</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-"Al parecer se trata de un defecto no intencionado de Android, aprovechado "
-"intencionalmente por aplicaciones maliciosas."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -513,6 +519,24 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Many Android apps can track users' movements even when the user says <a "
+#~ "href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
+#~ "permissions-data-collection-imei-ssid-location\"> not to allow them "
+#~ "access to locations</a>."
+#~ msgstr ""
+#~ "Muchas aplicaciones de Android pueden rastrear los movimientos del "
+#~ "usuario incluso cuando este <a href=\"https://www.theverge."
+#~ "com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-"
+#~ "imei-ssid-location\">no les permite obtener datos de localización</a>."
+
+#~ msgid ""
+#~ "This involves an apparently unintentional weakness in Android, exploited "
+#~ "intentionally by malicious apps."
+#~ msgstr ""
+#~ "Al parecer se trata de un defecto no intencionado de Android, aprovechado "
+#~ "intencionalmente por aplicaciones maliciosas."
+
+#~ msgid ""
#~ "Cash of Clans is a good example of a gratis mobile game that its "
#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\"> "
#~ "made very addictive</a> for a large proportion of its users—and "
@@ -564,13 +588,6 @@
#~ "usuarios a fin de incrementar la adictividad de sus juegos."
#~ msgid ""
-#~ "Unfortunately, the article uses “free” to mean “zero "
-#~ "price.” We recommend saying “gratis” instead."
-#~ msgstr ""
-#~ "Desafortunadamente, el artÃculo utiliza el término <cite>«free»</cite>
"
-#~ "para significar «precio cero». Recomendamos en su lugar decir:
«gratis»."
-
-#~ msgid ""
#~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/"
#~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
#~ "instrument of surveillance</a>. It lets thousands of trackers invade "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.234
retrieving revision 1.235
diff -u -b -r1.234 -r1.235
--- proprietary.fr.po 3 Aug 2019 13:59:26 -0000 1.234
+++ proprietary.fr.po 6 Aug 2019 08:29:30 -0000 1.235
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2019-08-03 15:58+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -299,6 +300,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -412,26 +428,6 @@
"(il évitait aux utilisateurs d'être espionnés par des tiers) mais c'est un
"
"autre problème."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-"Plusieurs applis pour Android pistent les utilisateurs même quand ils disent
"
-"<a href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\">de ne pas leur donner accès
"
-"à la géolocalisation</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-"Cela fait intervenir une faille apparemment involontaire d'Android, qui est "
-"exploitée sciemment par les applis malveillantes."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -505,3 +501,21 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Many Android apps can track users' movements even when the user says <a "
+#~ "href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
+#~ "permissions-data-collection-imei-ssid-location\"> not to allow them "
+#~ "access to locations</a>."
+#~ msgstr ""
+#~ "Plusieurs applis pour Android pistent les utilisateurs même quand ils "
+#~ "disent <a href=\"https://www.theverge.com/2019/7/8/20686514/android-"
+#~ "covert-channel-permissions-data-collection-imei-ssid-location\">de ne pas "
+#~ "leur donner accès à la géolocalisation</a>."
+
+#~ msgid ""
+#~ "This involves an apparently unintentional weakness in Android, exploited "
+#~ "intentionally by malicious apps."
+#~ msgstr ""
+#~ "Cela fait intervenir une faille apparemment involontaire d'Android, qui "
+#~ "est exploitée sciemment par les applis malveillantes."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary.it-diff.html 3 Aug 2019 11:31:21 -0000 1.122
+++ proprietary.it-diff.html 6 Aug 2019 08:29:30 -0000 1.123
@@ -45,8 +45,8 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em>-->
</style>
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -241,16 +254,6 @@
malicious—it protected users from surveillance by third
parties—but that is a separate question.</p>
</li>
-
- <li id="M201907080">
- <p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
-
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/03 11:31:21 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- proprietary.it.po 3 Aug 2019 11:31:21 -0000 1.161
+++ proprietary.it.po 6 Aug 2019 08:29:30 -0000 1.162
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -443,6 +443,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -517,20 +532,6 @@
"separate question."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.ja-diff.html 3 Aug 2019 11:31:21 -0000 1.125
+++ proprietary.ja-diff.html 6 Aug 2019 08:29:30 -0000 1.126
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -182,6 +182,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -238,16 +251,6 @@
malicious—it protected users from surveillance by third
parties—but that is a separate question.</p>
</li>
-
- <li id="M201907080">
- <p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
-
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
- </li>
</ul></em></ins></span>
@@ -308,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/03 11:31:21 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.ja.po 3 Aug 2019 11:31:21 -0000 1.145
+++ proprietary.ja.po 6 Aug 2019 08:29:30 -0000 1.146
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -307,6 +307,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -381,20 +396,6 @@
"separate question."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- proprietary.nl-diff.html 3 Aug 2019 11:31:21 -0000 1.123
+++ proprietary.nl-diff.html 6 Aug 2019 08:29:30 -0000 1.124
@@ -45,8 +45,8 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
<span class="inserted"><ins><em>-->
</style>
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -241,16 +254,6 @@
malicious—it protected users from surveillance by third
parties—but that is a separate question.</p>
</li>
-
- <li id="M201907080">
- <p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
-
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
- </li>
</ul></em></ins></span>
@@ -311,7 +314,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/03 11:31:21 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary.nl.po 3 Aug 2019 11:31:22 -0000 1.135
+++ proprietary.nl.po 6 Aug 2019 08:29:30 -0000 1.136
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -345,6 +345,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -419,20 +434,6 @@
"separate question."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.pl-diff.html 3 Aug 2019 11:31:23 -0000 1.140
+++ proprietary.pl-diff.html 6 Aug 2019 08:29:30 -0000 1.141
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -183,6 +183,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -239,16 +252,6 @@
malicious—it protected users from surveillance by third
parties—but that is a separate question.</p>
</li>
-
- <li id="M201907080">
- <p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
-
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
- </li>
</ul></em></ins></span>
@@ -309,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/03 11:31:23 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary.pl.po 3 Aug 2019 11:31:23 -0000 1.128
+++ proprietary.pl.po 6 Aug 2019 08:29:30 -0000 1.129
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -519,6 +519,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -593,20 +608,6 @@
"separate question."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.pot 3 Aug 2019 11:31:24 -0000 1.125
+++ proprietary.pot 6 Aug 2019 08:29:30 -0000 1.126
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -249,6 +249,22 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a "
+"href=\"https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/\">
"
+"failed to detect a test virus</a>. All of them asked for dangerous "
+"permissions or contained advertising trackers, with seven being more risky "
+"than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as "
+"“free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a "
"href=\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/\">
"
"bypass user's settings</a>, regulations, and privacy-enhancing features of "
@@ -325,19 +341,6 @@
"separate question."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a "
-"href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location\">
"
-"not to allow them access to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.pt-br.po 3 Aug 2019 13:28:58 -0000 1.194
+++ proprietary.pt-br.po 6 Aug 2019 08:29:30 -0000 1.195
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2019-08-03 10:14-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -296,6 +297,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Infelizmente, o artigo usa â<i lang=\"en\">free</i>â no sentido de
âpreço "
+"zeroâ. Nós recomendamos dizer âgrátisâ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -407,26 +429,6 @@
"os usuários da vigilância de terceiros – mas essa é uma questão à "
"parte."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-"Muitos aplicativos do Android podem rastrear os movimentos dos usuários "
-"quando o usuário fala que <a href=\"https://www.theverge."
-"com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-"
-"imei-ssid-location\"> não permite-os acessar a localização</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-"Isso evolve uma aparente falha não intencional no Android, explorada "
-"intencionalmente por aplicativos maliciosos."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -502,6 +504,24 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Many Android apps can track users' movements even when the user says <a "
+#~ "href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
+#~ "permissions-data-collection-imei-ssid-location\"> not to allow them "
+#~ "access to locations</a>."
+#~ msgstr ""
+#~ "Muitos aplicativos do Android podem rastrear os movimentos dos usuários "
+#~ "quando o usuário fala que <a href=\"https://www.theverge."
+#~ "com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-"
+#~ "imei-ssid-location\"> não permite-os acessar a localização</a>."
+
+#~ msgid ""
+#~ "This involves an apparently unintentional weakness in Android, exploited "
+#~ "intentionally by malicious apps."
+#~ msgstr ""
+#~ "Isso evolve uma aparente falha não intencional no Android, explorada "
+#~ "intencionalmente por aplicativos maliciosos."
+
+#~ msgid ""
#~ "Cash of Clans is a good example of a gratis mobile game that its "
#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\"> "
#~ "made very addictive</a> for a large proportion of its users—and "
@@ -552,13 +572,6 @@
#~ "aumentar o vÃcio em seus jogos."
#~ msgid ""
-#~ "Unfortunately, the article uses “free” to mean “zero "
-#~ "price.” We recommend saying “gratis” instead."
-#~ msgstr ""
-#~ "Infelizmente, o artigo usa â<i lang=\"en\">free</i>â no sentido de
âpreço "
-#~ "zeroâ. Nós recomendamos dizer âgrátisâ."
-
-#~ msgid ""
#~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/"
#~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
#~ "instrument of surveillance</a>. It lets thousands of trackers invade "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.270
retrieving revision 1.271
diff -u -b -r1.270 -r1.271
--- proprietary.ru.po 5 Aug 2019 07:28:36 -0000 1.270
+++ proprietary.ru.po 6 Aug 2019 08:29:30 -0000 1.271
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-08-06 08:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -302,6 +303,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses “free”-]
+# | {+refers+} to [-mean “zero price.” We recommend saying-]
+# | {+these proprietary apps as “free”. It should have said+}
+# | “gratis” instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Ð ÑожалениÑ, в ÑÑаÑÑе Ñлово
“ÑвободнÑй” иÑполÑзÑеÑÑÑ Ð² знаÑении "
+"“нÑлевой Ñенє. ÐÑ ÑекомендÑем
вмеÑÑо ÑÑого говоÑиÑÑ “"
+"беÑплаÑнÑй”."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -416,26 +443,6 @@
"оно заÑиÑало полÑзоваÑелей Ð¾Ñ Ñлежки Ñо
ÑÑоÑÐ¾Ð½Ñ ÑÑеÑÑиÑ
Ð»Ð¸Ñ — но "
"ÑÑо оÑделÑнÑй вопÑоÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-"Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ Ð¾ÑÑлеживаÑÑ
пеÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей, даже "
-"когда полÑзоваÑÐµÐ»Ñ <a
href=\"https://www.theverge.com/2019/7/8/20686514/"
-"android-covert-channel-permissions-data-collection-imei-ssid-location\"> не
"
-"позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ Ð´Ð¾ÑÑÑп к
меÑÑоположениÑ</a>."
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-"ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, пÑеднамеÑенно "
-"иÑполÑзÑемой вÑедоноÑнÑми пÑиложениÑми."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -515,6 +522,25 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Many Android apps can track users' movements even when the user says <a "
+#~ "href=\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
+#~ "permissions-data-collection-imei-ssid-location\"> not to allow them "
+#~ "access to locations</a>."
+#~ msgstr ""
+#~ "Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android могÑÑ
оÑÑлеживаÑÑ Ð¿ÐµÑемеÑÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелей, "
+#~ "даже когда полÑзоваÑÐµÐ»Ñ <a
href=\"https://www.theverge."
+#~ "com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-"
+#~ "imei-ssid-location\"> не позволÑÐµÑ Ð¸Ð¼ полÑÑаÑÑ
доÑÑÑп к меÑÑоположениÑ</"
+#~ "a>."
+
+#~ msgid ""
+#~ "This involves an apparently unintentional weakness in Android, exploited "
+#~ "intentionally by malicious apps."
+#~ msgstr ""
+#~ "ÐÑо ÑвÑзано Ñ Ð¾Ñевидно непÑеднамеÑенной
ÑлабоÑÑÑÑ Ð² Android, "
+#~ "пÑеднамеÑенно иÑполÑзÑемой
вÑедоноÑнÑми пÑиложениÑми."
+
+#~ msgid ""
#~ "Cash of Clans is a good example of a gratis mobile game that its "
#~ "developers <a href=\"https://gamerant.com/clash-of-clans-addiction/\"> "
#~ "made very addictive</a> for a large proportion of its users—and "
@@ -564,14 +590,6 @@
#~ "ÑилÑнÑÑ Ð·Ð°Ð²Ð¸ÑимоÑÑÑ."
#~ msgid ""
-#~ "Unfortunately, the article uses “free” to mean “zero "
-#~ "price.” We recommend saying “gratis” instead."
-#~ msgstr ""
-#~ "Ð ÑожалениÑ, в ÑÑаÑÑе Ñлово
“ÑвободнÑй” иÑполÑзÑеÑÑÑ Ð² "
-#~ "знаÑении “нÑлевой Ñенє. ÐÑ
ÑекомендÑем вмеÑÑо ÑÑого говоÑиÑÑ "
-#~ "“беÑплаÑнÑй”."
-
-#~ msgid ""
#~ "Google Chrome is an <a href=\"https://www.mercurynews.com/2019/06/21/"
#~ "google-chrome-has-become-surveillance-software-its-time-to-switch/\"> "
#~ "instrument of surveillance</a>. It lets thousands of trackers invade "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.101
retrieving revision 1.102
diff -u -b -r1.101 -r1.102
--- proprietary.zh-tw-diff.html 3 Aug 2019 11:31:25 -0000 1.101
+++ proprietary.zh-tw-diff.html 6 Aug 2019 08:29:30 -0000 1.102
@@ -45,14 +45,14 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
+-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -130,14 +130,14 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
+<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
-<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
@@ -186,6 +186,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
+
+ <p>Note that the article refers to these proprietary apps as
+ “free”. It should have said “gratis”
+ instead.</p>
+ </li>
+
<li id="M201907081">
<p>Many unscrupulous mobile-app developers keep finding ways to <a
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
@@ -242,16 +255,6 @@
malicious—it protected users from surveillance by third
parties—but that is a separate question.</p>
</li>
-
- <li id="M201907080">
- <p>Many Android apps can track
- users' movements even when the user says <a
-
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not to allow them access to locations</a>.</p>
-
- <p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p>
- </li>
</ul></em></ins></span>
@@ -312,7 +315,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/03 11:31:25 $
+$Date: 2019/08/06 08:29:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- proprietary.zh-tw.po 3 Aug 2019 11:31:25 -0000 1.112
+++ proprietary.zh-tw.po 6 Aug 2019 08:29:30 -0000 1.113
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-08-03 11:25+0000\n"
+"POT-Creation-Date: 2019-08-06 08:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -417,6 +417,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Many unscrupulous mobile-app developers keep finding ways to <a href="
"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
"even-after-you-deny-permissions/\"> bypass user's settings</a>, regulations, "
@@ -491,20 +506,6 @@
"separate question."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Many Android apps can track users' movements even when the user says <a href="
-"\"https://www.theverge.com/2019/7/8/20686514/android-covert-channel-"
-"permissions-data-collection-imei-ssid-location\"> not to allow them access "
-"to locations</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"This involves an apparently unintentional weakness in Android, exploited "
-"intentionally by malicious apps."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- pt-br.po 3 Aug 2019 13:28:58 -0000 1.151
+++ pt-br.po 6 Aug 2019 08:29:30 -0000 1.152
@@ -4829,6 +4829,27 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Infelizmente, o artigo usa â<i lang=\"en\">free</i>â no sentido de
âpreço "
+"zeroâ. Nós recomendamos dizer âgrátisâ."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.253
retrieving revision 1.254
diff -u -b -r1.253 -r1.254
--- ru.po 5 Aug 2019 07:05:28 -0000 1.253
+++ ru.po 6 Aug 2019 08:29:30 -0000 1.254
@@ -6238,6 +6238,32 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+# | [-Unfortunately,-]{+Note that+} the article [-uses “free”-]
+# | {+refers+} to [-mean “zero price.” We recommend saying-]
+# | {+these proprietary apps as “free”. It should have said+}
+# | “gratis” instead.
+#, fuzzy
+#| msgid ""
+#| "Unfortunately, the article uses “free” to mean “zero "
+#| "price.” We recommend saying “gratis” instead."
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+"Ð ÑожалениÑ, в ÑÑаÑÑе Ñлово
“ÑвободнÑй” иÑполÑзÑеÑÑÑ Ð² знаÑении "
+"“нÑлевой Ñенє. ÐÑ ÑекомендÑем
вмеÑÑо ÑÑого говоÑиÑÑ “"
+"беÑплаÑнÑй”."
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
@@ -6541,20 +6567,21 @@
"and privacy-enhancing features of the operating system, in order to gather "
"as much private data as they possibly can."
msgstr ""
-"Ðногие беÑпÑинÑипнÑе ÑазÑабоÑÑики
мобилÑнÑÑ
пÑиложений пÑодолжаÑÑ Ð½Ð°Ñ
одиÑÑ
ÑпоÑÐ¾Ð±Ñ <a href="
-"\"https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-"
-"even-after-you-deny-permissions/\"> обÑ
ода наÑÑÑоек
полÑзоваÑелÑ</a>, ноÑм "
-"и возможноÑÑей опеÑаÑионной ÑиÑÑемÑ,
ÑвÑзаннÑÑ
Ñ Ð·Ð°ÑиÑой лиÑной жизни, "
-"ÑÑÐ¾Ð±Ñ ÑобиÑаÑÑ ÐºÐ°Ðº можно болÑÑе
конÑиденÑиалÑнÑÑ
даннÑÑ
."
+"Ðногие беÑпÑинÑипнÑе ÑазÑабоÑÑики
мобилÑнÑÑ
пÑиложений пÑодолжаÑÑ Ð½Ð°Ñ
одиÑÑ "
+"ÑпоÑÐ¾Ð±Ñ <a
href=\"https://www.cnet.com/news/more-than-1000-android-apps-"
+"harvest-your-data-even-after-you-deny-permissions/\"> обÑ
ода
наÑÑÑоек "
+"полÑзоваÑелÑ</a>, ноÑм и возможноÑÑей
опеÑаÑионной ÑиÑÑемÑ, ÑвÑзаннÑÑ
Ñ "
+"заÑиÑой лиÑной жизни, ÑÑÐ¾Ð±Ñ ÑобиÑаÑÑ ÐºÐ°Ðº
можно болÑÑе конÑиденÑиалÑнÑÑ
"
+"даннÑÑ
."
#. type: Content of: <ul><li><p>
msgid ""
"Thus, we can't trust rules against spying. What we can trust is having "
"control over the software we run."
msgstr ""
-"Таким обÑазом, Ð¼Ñ Ð½Ðµ можем полагаÑÑÑÑ Ð½Ð°
пÑавила пÑоÑив Ñпионажа. "
-"Ðа ÑÑо Ð¼Ñ Ð¼Ð¾Ð¶ÐµÐ¼ полагаÑÑÑÑ — ÑÑо на
конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ пÑогÑаммами, "
-"Ñ ÐºÐ¾ÑоÑÑми Ð¼Ñ ÑабоÑаем."
+"Таким обÑазом, Ð¼Ñ Ð½Ðµ можем полагаÑÑÑÑ Ð½Ð°
пÑавила пÑоÑив Ñпионажа. Ðа ÑÑо Ð¼Ñ "
+"можем полагаÑÑÑÑ — ÑÑо на конÑÑолÑ
над пÑогÑаммами, Ñ ÐºÐ¾ÑоÑÑми Ð¼Ñ "
+"ÑабоÑаем."
#. type: Content of: <ul><li><p>
msgid ""
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- zh-tw.po 3 Aug 2019 11:31:25 -0000 1.117
+++ zh-tw.po 6 Aug 2019 08:29:30 -0000 1.118
@@ -4387,6 +4387,21 @@
#. type: Content of: <ul><li><p>
msgid ""
+"Out of 21 gratis Android antivirus apps that were tested by security "
+"researchers, eight <a href=\"https://www.comparitech.com/antivirus/android-"
+"antivirus-vulnerabilities/\"> failed to detect a test virus</a>. All of them "
+"asked for dangerous permissions or contained advertising trackers, with "
+"seven being more risky than the average of the 100 most popular Android apps."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"Note that the article refers to these proprietary apps as “"
+"free”. It should have said “gratis” instead."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Siri, Alexa, and all the other voice-control systems can be <a href="
"\"https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-"
"astoundingly-easy-to-hack-siri-and-alexa\"> hijacked by programs that play "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/03
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/15
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/15
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/17
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/23
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/31
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/08/31