[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 7 Sep 2019 09:30:00 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/09/07 09:29:59
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-adobe.de-diff.html malware-adobe.de.po
malware-adobe.fr.po malware-adobe.ja-diff.html
malware-adobe.ja.po malware-adobe.pot
malware-adobe.ru.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po nl.po pl.po pot
proprietary-drm.de-diff.html
proprietary-drm.de.po proprietary-drm.fr.po
proprietary-drm.it-diff.html
proprietary-drm.it.po
proprietary-drm.ja-diff.html
proprietary-drm.ja.po proprietary-drm.pot
proprietary-drm.ru.po
proprietary-sabotage.de-diff.html
proprietary-sabotage.de.po
proprietary-sabotage.es.po
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po pt-br.po ru.po
zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.de.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.fr.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.ja-diff.html?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.ja.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.pot?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-adobe.ru.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.171&r2=1.172
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.83&r2=1.84
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.213&r2=1.214
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.de.po?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.fr.po?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.it.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja-diff.html?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ja.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.pot?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-drm.ru.po?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.123&r2=1.124
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es.po?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.75&r2=1.76
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.306&r2=1.307
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.465&r2=1.466
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.300&r2=1.301
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.240&r2=1.241
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.559&r2=1.560
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.280&r2=1.281
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.131&r2=1.132
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- de.po 7 Sep 2019 07:31:38 -0000 1.131
+++ de.po 7 Sep 2019 13:29:57 -0000 1.132
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-adobe.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -117,11 +117,24 @@
"\">Lizenzüberprüfung durchzuführen</a>."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"<em>Adobe Digital Editions</em>, die von US-Biblioteken meist genutzte "
"Software zum Betrachten von elektronischen Büchern, spitzelt Nutzer aus und "
@@ -6770,7 +6783,7 @@
#. type: Content of: <ul><li><p>
# | Microsoft is going to <a
# |
[-href=\"http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\">-]
-# |
{+href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
# | cut off support for some Internet Explorer versions</a> in the same way.
#, fuzzy
#| msgid ""
@@ -6779,9 +6792,10 @@
#| "months/\"> cut off support for some Internet Explorer versions</a> in the "
#| "same way."
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"Microsoft wird die <a href=\"//www.computerworlduk.com/news/security/3605515/"
"more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\" title=\"More "
@@ -10363,10 +10377,21 @@
"schädliche Funktionen</a> verfügt."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, spy on the user <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for+}
+# | the sake of DRM.</a>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"<em>Adobe Digital Editions</em>, die von US-Biblioteken meist genutzte "
"Software zum Betrachten von elektronischen Büchern, schnüffelt Nutzer <a "
@@ -12786,6 +12811,49 @@
"\">Tyrannische Software in Intel-Prozessoren eingebaut</a><a href=\"#tn01\" "
"id=\"tn01-ref\" class=\"transnote\">[1]</a>."
+#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#~ "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#~ "“excuse”: it's needed to check DRM!"
+#~ msgstr ""
+#~ "<em>Adobe Digital Editions</em>, die von US-Biblioteken meist genutzte "
+#~ "Software zum Betrachten von elektronischen Büchern, spitzelt Nutzer aus "
+#~ "und <a href=\"//www.computerworlduk.com/blogs/open-enterprise/drm-strikes-"
+#~ "again-3575860/\" title=\"Adobe Digital Editions 4 Spies on Users - "
+#~ "Because of DRM, unter: computerworlduk.com 2014.\">sendet viele Daten an "
+#~ "Adobe</a>. Adobes âEntschuldigtungâ dafür: es sei zur Ãberprüfung
von DRM "
+#~ "erforderlich!"
+
+#, fuzzy
+#~| msgid ""
+#~| "Microsoft is going to <a href=\"http://www.computerworlduk.com/news/"
+#~| "security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~| "months/\"> cut off support for some Internet Explorer versions</a> in "
+#~| "the same way."
+#~ msgid ""
+#~ "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#~ "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#~ "a> in the same way."
+#~ msgstr ""
+#~ "Microsoft wird die <a href=\"//www.computerworlduk.com/news/"
+#~ "security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months/\" title=\"More than half of all IE users face patch axe in 10 "
+#~ "months, unter: computerworlduk.com 2015.\">Unterstützung für einige "
+#~ "Internet Explorer-Versionen auf die gleiche Weise stoppen</a>."
+
+#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#~ "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+#~ msgstr ""
+#~ "<em>Adobe Digital Editions</em>, die von US-Biblioteken meist genutzte "
+#~ "Software zum Betrachten von elektronischen Büchern, schnüffelt Nutzer <a
"
+#~ "href=\"//www.computerworlduk.com/blogs/open-enterprise/drm-strikes-"
+#~ "again-3575860/\" title=\"Adobe Digital Editions 4 Spies on Users - "
+#~ "Because of DRM, unter: computerworlduk.com 2014.\">DRM halber</a> aus."
+
#, fuzzy
#~| msgid ""
#~| "Revolv is an IoT device which managed “smart home” "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- es.po 7 Sep 2019 07:31:38 -0000 1.179
+++ es.po 7 Sep 2019 13:29:57 -0000 1.180
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-10-27 11:09+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -122,9 +122,10 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -5959,10 +5960,21 @@
"cifras exorbitantes</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+# | Microsoft is going to <a
+# |
[-href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">-]
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# | cut off support for some Internet Explorer versions</a> in the same way.
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"De igual manera, Microsoft <a href=\"https://www.computerworlduk.com/"
"applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
@@ -9282,8 +9294,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -11297,6 +11310,17 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\"> Los "
"procesadores Intel incorporarán software tirano</a>."
+#~ msgid ""
+#~ "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#~ "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#~ "a> in the same way."
+#~ msgstr ""
+#~ "De igual manera, Microsoft <a href=\"https://www.computerworlduk.com/"
+#~ "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months-3605515/\">interrumpirá el soporte de algunas versiones de "
+#~ "Internet Explorer</a>."
+
#, fuzzy
#~| msgid ""
#~| "Revolv is an IoT device which managed “smart home” "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- fr.po 7 Sep 2019 11:53:16 -0000 1.227
+++ fr.po 7 Sep 2019 13:29:57 -0000 1.228
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2019-09-07 13:52+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -99,11 +99,24 @@
"a> tous les 30 jours, à une heure aléatoire."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"Adobe a fait en sorte que « Digital Editions » (la liseuse utilisée par
la "
"plupart des bibliothèques aux Ãtats-Unis) <a href=\"http://www."
@@ -5735,10 +5748,21 @@
"prix exorbitant</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+# | Microsoft is going to <a
+# |
[-href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">-]
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# | cut off support for some Internet Explorer versions</a> in the same way.
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"De même, Microsoft va <a
href=\"https://www.computerworlduk.com/applications/"
"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">mettre "
@@ -8907,10 +8931,21 @@
"fonctionnalités malveillantes</a>."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, spy on the user <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for+}
+# | the sake of DRM.</a>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"Adobe a fait en sorte que « Digital Editions » (la liseuse utilisée par
la "
"plupart des bibliothèques aux Ãtats-Unis), espionne l'utilisateur <a href="
@@ -10890,3 +10925,36 @@
msgstr ""
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">Les "
"processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#~ "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#~ "“excuse”: it's needed to check DRM!"
+#~ msgstr ""
+#~ "Adobe a fait en sorte que « Digital Editions » (la liseuse utilisée
par "
+#~ "la plupart des bibliothèques aux Ãtats-Unis) <a href=\"http://www."
+#~ "computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/"
+#~ "\">lui envoie une quantité énorme de données</a>. Leur excuse : on en
a "
+#~ "besoin pour vérifier les DRM !"
+
+#~ msgid ""
+#~ "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#~ "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#~ "a> in the same way."
+#~ msgstr ""
+#~ "De même, Microsoft va <a href=\"https://www.computerworlduk.com/"
+#~ "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months-3605515/\">mettre fin au support de certaines versions d'Internet "
+#~ "Explorer</a>."
+
+#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#~ "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+#~ msgstr ""
+#~ "Adobe a fait en sorte que « Digital Editions » (la liseuse utilisée
par "
+#~ "la plupart des bibliothèques aux Ãtats-Unis), espionne l'utilisateur <a "
+#~ "href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-"
+#~ "again-3575860/\">au nom de la gestion numérique des restrictions</a>."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- it.po 7 Sep 2019 07:31:38 -0000 1.131
+++ it.po 7 Sep 2019 13:29:57 -0000 1.132
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2017-09-30 22:48+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -115,11 +115,24 @@
msgstr ""
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"Adobe ha fatto in modo che “Digital Editions”, il lettore e-book "
"usato dalla maggior parte delle biblioteche americane, <a href=\"http://www."
@@ -6379,7 +6392,7 @@
#. type: Content of: <ul><li><p>
# | Microsoft is going to <a
# |
[-href=\"http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\">-]
-# |
{+href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
# | cut off support for some Internet Explorer versions</a> in the same way.
#, fuzzy
#| msgid ""
@@ -6388,9 +6401,10 @@
#| "months/\"> cut off support for some Internet Explorer versions</a> in the "
#| "same way."
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"Microsoft <a href=\"http://www.computerworlduk.com/news/security/3605515/"
"more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\"> sospenderà il
"
@@ -9693,10 +9707,21 @@
"html\">altre funzionalità malevole</a>."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, spy on the user <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for+}
+# | the sake of DRM.</a>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"Adobe ha fatto in modo che “Digital Editions”, il lettore e-book "
"usato dalla maggior parte delle biblioteche americane, spiasse l'utente <a "
@@ -12041,6 +12066,44 @@
"processori Intel avranno del software tiranno preinstallato</a>."
#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#~ "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#~ "“excuse”: it's needed to check DRM!"
+#~ msgstr ""
+#~ "Adobe ha fatto in modo che “Digital Editions”, il lettore e-"
+#~ "book usato dalla maggior parte delle biblioteche americane, <a href="
+#~ "\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-"
+#~ "again-3575860/\">le inviasse molti dati</a>. La “scusa” di "
+#~ "Adobe: serve per verificare il DRM!"
+
+#, fuzzy
+#~| msgid ""
+#~| "Microsoft is going to <a href=\"http://www.computerworlduk.com/news/"
+#~| "security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~| "months/\"> cut off support for some Internet Explorer versions</a> in "
+#~| "the same way."
+#~ msgid ""
+#~ "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#~ "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#~ "a> in the same way."
+#~ msgstr ""
+#~ "Microsoft <a href=\"http://www.computerworlduk.com/news/security/3605515/"
+#~ "more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\"> sospenderÃ
"
+#~ "il supporto per alcune versioni di Internet Explorer</a> allo stesso modo."
+
+#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#~ "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+#~ msgstr ""
+#~ "Adobe ha fatto in modo che “Digital Editions”, il lettore e-"
+#~ "book usato dalla maggior parte delle biblioteche americane, spiasse "
+#~ "l'utente <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#~ "drm-strikes-again-3575860/\">a beneficio del DRM</a>."
+
+#~ msgid ""
#~ "Google Chrome contains a key logger that <a href=\"http://www.favbrowser."
#~ "com/google-chrome-spyware-confirmed/\"> sends Google every URL typed in</"
#~ "a>, one key at a time."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- ja.po 7 Sep 2019 07:31:38 -0000 1.138
+++ ja.po 7 Sep 2019 13:29:57 -0000 1.139
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/po/\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -96,11 +96,18 @@
"ããã«ã©ã³ãã ãªæã«è¡ããã¾ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"Adobeã¯é»åæ¸ç±ãã¥ã¼ã¯ã“Digital
Editions”ããåè¡å½ã®ã»ã¨ãã©ã®"
"å³æ¸é¤¨ã§ä½¿ããã¦ãã¾ããã<a
href=\"http://www.computerworlduk.com/blogs/"
@@ -4926,10 +4933,17 @@
"a>ã"
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"åæ§ã«ããã¤ã¯ãã½ããã¯<a
href=\"https://www.computerworlduk.com/"
"applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
@@ -7480,10 +7494,16 @@
"ebooks.html\">ã»ãã®æªæã®ããæ©è½</a>ãããããã§ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"ã¢ããã¯åè¡å½ã®å³æ¸é¤¨ã®ã»ã¨ãã©ã§ä½¿ãããããã£ã¸ã¿ã«çãã®é»åãªã¼ããä½"
"ããã¦ã¼ã¶ãã¹ãã¤ãã¾ãã<a
href=\"http://www.computerworlduk.com/blogs/"
@@ -9388,6 +9408,38 @@
"ããã»ããµã«ã¯æ´åã½ããã¦ã§ã¢ãçµã¿è¾¼ã¾ããããã«ãªãã¾ã</a>ã"
#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#~ "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#~ "“excuse”: it's needed to check DRM!"
+#~ msgstr ""
+#~ "Adobeã¯é»åæ¸ç±ãã¥ã¼ã¯ã“Digital
Editions”ããåè¡å½ã®ã»ã¨ã"
+#~ "ã©ã®å³æ¸é¤¨ã§ä½¿ããã¦ãã¾ããã<a
href=\"http://www.computerworlduk.com/"
+#~
"blogs/open-enterprise/drm-strikes-again-3575860/\">Adobeã«ããããã®ãã¼ã¿"
+#~ "ãéãããã«ãã¾ãã</a>ãAdobeã®ãå¼æã:
DRMããã§ãã¯ããã®ã«å¿
è¦ãªã®ã§"
+#~ "ã!"
+
+#~ msgid ""
+#~ "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#~ "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#~ "a> in the same way."
+#~ msgstr ""
+#~ "åæ§ã«ããã¤ã¯ãã½ããã¯<a
href=\"https://www.computerworlduk.com/"
+#~ "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months-3605515/\">
ã¤ã³ã¿ã¼ãããã¨ã¯ã¹ããã¼ã©ã®ããã¤ãã®ãã¼ã¸ã§ã³ã®ãµ"
+#~ "ãã¼ããçµäº</a>ãããã¨ãã¦ãã¾ãã"
+
+#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#~ "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+#~ msgstr ""
+#~
"ã¢ããã¯åè¡å½ã®å³æ¸é¤¨ã®ã»ã¨ãã©ã§ä½¿ãããããã£ã¸ã¿ã«çãã®é»åãªã¼ããä½"
+#~ "ããã¦ã¼ã¶ãã¹ãã¤ãã¾ãã<a
href=\"http://www.computerworlduk.com/blogs/"
+#~ "open-enterprise/drm-strikes-again-3575860/\">DRMã®ããã§ãã</a>"
+
+#~ msgid ""
#~ "A Motorola phone <a href=\"http://www.itproportal.com/2013/07/25/"
#~ "motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/"
#~ "\"> listens for voice all the time</a>."
Index: malware-adobe.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-adobe.de-diff.html 21 Apr 2019 08:00:29 -0000 1.21
+++ malware-adobe.de-diff.html 7 Sep 2019 13:29:57 -0000 1.22
@@ -51,13 +51,13 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p></em></ins></span>
+to serve as specific substantiation.</p>
+</div></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
<li></strong></del></span>
-<span class="inserted"><ins><em></div>
-<div class="column-limit" id="malware-adobe"></div>
+<span class="inserted"><ins><em><div class="column-limit"
id="malware-adobe"></div>
<ul class="blurbs">
<li id="M201701110">
@@ -77,7 +77,7 @@
<li id="M201410080">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries, <a
-
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p></em></ins></span>
</li>
@@ -108,7 +108,7 @@
<p>Adobe applications</em></ins></span> <a
<span
class="removed"><del><strong>href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/2013/05/adobe-creative-cloud-petition/">
- require periodic connection</em></ins></span> to <span
class="removed"><del><strong>perform a license check</a>,
at</strong></del></span> a <span class="removed"><del><strong>random time every
30
+ require periodic connection</em></ins></span> to <span
class="removed"><del><strong>perform</strong></del></span> a <span
class="removed"><del><strong>license check</a>, at a random time every 30
days.</p></li>
<li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>server</a>.</p>
@@ -192,7 +192,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/04/21 08:00:29 $
+$Date: 2019/09/07 13:29:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-adobe.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.de.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- malware-adobe.de.po 21 Apr 2019 08:00:29 -0000 1.14
+++ malware-adobe.de.po 7 Sep 2019 13:29:57 -0000 1.15
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-adobe.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -117,11 +117,24 @@
"\">Lizenzüberprüfung durchzuführen</a>."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"<em>Adobe Digital Editions</em>, die von US-Biblioteken meist genutzte "
"Software zum Betrachten von elektronischen Büchern, spitzelt Nutzer aus und "
Index: malware-adobe.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.fr.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- malware-adobe.fr.po 21 Apr 2019 08:36:24 -0000 1.24
+++ malware-adobe.fr.po 7 Sep 2019 13:29:57 -0000 1.25
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-adobe.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2019-04-21 10:33+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
#. type: Content of: <title>
msgid "Adobe's Software Is Malware - GNU Project - Free Software Foundation"
@@ -99,11 +100,24 @@
"a> tous les 30 jours, à une heure aléatoire."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"Adobe a fait en sorte que « Digital Editions » (la liseuse utilisée par
la "
"plupart des bibliothèques aux Ãtats-Unis) <a href=\"http://www."
Index: malware-adobe.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.ja-diff.html,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- malware-adobe.ja-diff.html 26 Jun 2019 20:32:25 -0000 1.22
+++ malware-adobe.ja-diff.html 7 Sep 2019 13:29:57 -0000 1.23
@@ -51,13 +51,13 @@
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
to inform us. Please include the URL of a trustworthy reference or two
-to serve as specific substantiation.</p></em></ins></span>
+to serve as specific substantiation.</p>
+</div></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
<li></strong></del></span>
-<span class="inserted"><ins><em></div>
-<div class="column-limit" id="malware-adobe"></div>
+<span class="inserted"><ins><em><div class="column-limit"
id="malware-adobe"></div>
<ul class="blurbs">
<li id="M201701110">
@@ -77,7 +77,7 @@
<li id="M201410080">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries, <a
-
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p></em></ins></span>
</li>
@@ -108,7 +108,7 @@
<p>Adobe applications</em></ins></span> <a
<span
class="removed"><del><strong>href="http://shallowsky.com/blog/gimp/non-free-software-surprises.html"></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.wired.com/2013/05/adobe-creative-cloud-petition/">
- require periodic connection</em></ins></span> to <span
class="removed"><del><strong>perform a license check</a>,
at</strong></del></span> a <span class="removed"><del><strong>random time every
30
+ require periodic connection</em></ins></span> to <span
class="removed"><del><strong>perform</strong></del></span> a <span
class="removed"><del><strong>license check</a>, at a random time every 30
days.</p></li>
<li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>server</a>.</p>
@@ -192,7 +192,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/26 20:32:25 $
+$Date: 2019/09/07 13:29:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-adobe.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.ja.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- malware-adobe.ja.po 26 Jun 2019 09:01:19 -0000 1.17
+++ malware-adobe.ja.po 7 Sep 2019 13:29:57 -0000 1.18
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-adobe.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2016-10-31 15:15+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -96,11 +96,18 @@
"ããã«ã©ã³ãã ãªæã«è¡ããã¾ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"Adobeã¯é»åæ¸ç±ãã¥ã¼ã¯ã“Digital
Editions”ããåè¡å½ã®ã»ã¨ãã©ã®"
"å³æ¸é¤¨ã§ä½¿ããã¦ãã¾ããã<a
href=\"http://www.computerworlduk.com/blogs/"
Index: malware-adobe.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.pot,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- malware-adobe.pot 21 Apr 2019 08:00:29 -0000 1.12
+++ malware-adobe.pot 7 Sep 2019 13:29:57 -0000 1.13
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-adobe.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,7 +77,7 @@
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
"libraries, <a "
-"href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">
"
+"href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">
"
"send lots of data to Adobe</a>. Adobe's “excuse”: it's needed "
"to check DRM!"
msgstr ""
Index: malware-adobe.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-adobe.ru.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- malware-adobe.ru.po 22 Apr 2019 08:59:53 -0000 1.27
+++ malware-adobe.ru.po 7 Sep 2019 13:29:57 -0000 1.28
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-adobe.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-10-25 16:59+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
#. type: Content of: <title>
msgid "Adobe's Software Is Malware - GNU Project - Free Software Foundation"
@@ -100,11 +101,24 @@
"в 30 дней."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, пÑогÑамма "
"ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð² болÑÑинÑÑве
библиоÑек СШÐ, <a href=\"http://www."
Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-microsoft.de-diff.html 15 Aug 2019 16:30:45 -0000 1.43
+++ malware-microsoft.de-diff.html 7 Sep 2019 13:29:57 -0000 1.44
@@ -516,7 +516,7 @@
<li><p>Windows displays</strong></del></span> <span
class="inserted"><ins><em>going to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2017/3/17/14956540/microsoft-windows-10-ads-taskbar-file-explorer">
intrusive ads</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/">
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/">
cut off support</em></ins></span> for <span
class="removed"><del><strong>Microsoft products and its
partners' products</a>.</p>
<p>The article's author starts from</strong></del></span> <span
class="inserted"><ins><em>some Internet Explorer versions</a>
in</em></ins></span> the <span class="removed"><del><strong>premise that
Microsoft</strong></del></span> <span class="inserted"><ins><em>same
@@ -917,7 +917,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/15 16:30:45 $
+$Date: 2019/09/07 13:29:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- malware-microsoft.de.po 15 Aug 2019 16:30:45 -0000 1.139
+++ malware-microsoft.de.po 7 Sep 2019 13:29:57 -0000 1.140
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-08-15 16:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -800,7 +800,7 @@
#. type: Content of: <ul><li><p>
# | Microsoft is going to <a
# |
[-href=\"http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\">-]
-# |
{+href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
# | cut off support for some Internet Explorer versions</a> in the same way.
#, fuzzy
#| msgid ""
@@ -809,9 +809,10 @@
#| "months/\"> cut off support for some Internet Explorer versions</a> in the "
#| "same way."
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"Microsoft wird die <a href=\"//www.computerworlduk.com/news/security/3605515/"
"more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\" title=\"More "
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- malware-microsoft.es.po 16 Aug 2019 11:28:53 -0000 1.148
+++ malware-microsoft.es.po 7 Sep 2019 13:29:57 -0000 1.149
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-08-15 16:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
"X-Generator: Poedit 1.8.11\n"
#. type: Content of: <title>
@@ -703,10 +704,21 @@
"cifras exorbitantes</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+# | Microsoft is going to <a
+# |
[-href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">-]
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# | cut off support for some Internet Explorer versions</a> in the same way.
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"De igual manera, Microsoft <a href=\"https://www.computerworlduk.com/"
"applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.171
retrieving revision 1.172
diff -u -b -r1.171 -r1.172
--- malware-microsoft.fr.po 16 Aug 2019 15:43:14 -0000 1.171
+++ malware-microsoft.fr.po 7 Sep 2019 13:29:57 -0000 1.172
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-08-15 16:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2019-08-16 17:41+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -700,10 +701,21 @@
"prix exorbitant</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+# | Microsoft is going to <a
+# |
[-href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">-]
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# | cut off support for some Internet Explorer versions</a> in the same way.
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"De même, Microsoft va <a
href=\"https://www.computerworlduk.com/applications/"
"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">mettre "
Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-microsoft.it-diff.html 15 Aug 2019 16:30:45 -0000 1.43
+++ malware-microsoft.it-diff.html 7 Sep 2019 13:29:57 -0000 1.44
@@ -489,7 +489,7 @@
pay <span
class="removed"><del><strong>exorbitantly.</a></p></strong></del></span>
<span
class="inserted"><ins><em>exorbitantly</a>.</p></em></ins></span>
<p>Microsoft is going to <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
cut off support for some Internet Explorer versions</a> in the same
way.</p>
@@ -907,7 +907,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/15 16:30:45 $
+$Date: 2019/09/07 13:29:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- malware-microsoft.it.po 15 Aug 2019 16:30:45 -0000 1.145
+++ malware-microsoft.it.po 7 Sep 2019 13:29:57 -0000 1.146
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-08-15 16:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -767,7 +767,7 @@
#. type: Content of: <ul><li><p>
# | Microsoft is going to <a
# |
[-href=\"http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\">-]
-# |
{+href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
# | cut off support for some Internet Explorer versions</a> in the same way.
#, fuzzy
#| msgid ""
@@ -776,9 +776,10 @@
#| "months/\"> cut off support for some Internet Explorer versions</a> in the "
#| "same way."
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"Microsoft <a href=\"http://www.computerworlduk.com/news/security/3605515/"
"more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\"> sospenderà il
"
Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- malware-microsoft.ja-diff.html 15 Aug 2019 16:30:45 -0000 1.55
+++ malware-microsoft.ja-diff.html 7 Sep 2019 13:29:57 -0000 1.56
@@ -490,7 +490,7 @@
pay <span
class="removed"><del><strong>exorbitantly.</a></p></strong></del></span>
<span
class="inserted"><ins><em>exorbitantly</a>.</p></em></ins></span>
<p>Microsoft is going to <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
cut off support for some Internet Explorer versions</a> in the same
way.</p>
@@ -884,7 +884,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/15 16:30:45 $
+$Date: 2019/09/07 13:29:57 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- malware-microsoft.ja.po 15 Aug 2019 16:30:45 -0000 1.122
+++ malware-microsoft.ja.po 7 Sep 2019 13:29:57 -0000 1.123
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-08-15 16:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -631,10 +631,17 @@
"a>ã"
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"åæ§ã«ããã¤ã¯ãã½ããã¯<a
href=\"https://www.computerworlduk.com/"
"applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.83
retrieving revision 1.84
diff -u -b -r1.83 -r1.84
--- malware-microsoft.pot 15 Aug 2019 16:30:45 -0000 1.83
+++ malware-microsoft.pot 7 Sep 2019 13:29:57 -0000 1.84
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-08-15 16:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -477,7 +477,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft is going to <a "
-"href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">
"
+"href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">
"
"cut off support for some Internet Explorer versions</a> in the same way."
msgstr ""
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.213
retrieving revision 1.214
diff -u -b -r1.213 -r1.214
--- malware-microsoft.ru.po 15 Aug 2019 18:58:54 -0000 1.213
+++ malware-microsoft.ru.po 7 Sep 2019 13:29:57 -0000 1.214
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-08-15 16:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-11-20 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
#. type: Content of: <title>
msgid ""
@@ -697,10 +698,21 @@
"оплаÑиваÑÑ Ð·Ð°Ð¾Ð±Ð»Ð°ÑнÑе ÑÑеÑа</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+# | Microsoft is going to <a
+# |
[-href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">-]
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# | cut off support for some Internet Explorer versions</a> in the same way.
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"Microsoft ÑоÑно Ñаким же обÑазом ÑобиÑаеÑÑÑ <a
href=\"https://www."
"computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-"
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- nl.po 7 Sep 2019 07:31:39 -0000 1.132
+++ nl.po 7 Sep 2019 13:29:57 -0000 1.133
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -112,9 +112,10 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -4647,9 +4648,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6856,8 +6858,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
#. type: Content of: <ul><li><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- pl.po 7 Sep 2019 07:31:39 -0000 1.131
+++ pl.po 7 Sep 2019 13:29:57 -0000 1.132
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -90,9 +90,10 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -4019,9 +4020,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6181,8 +6183,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
#. type: Content of: <ul><li><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- pot 7 Sep 2019 07:31:39 -0000 1.130
+++ pot 7 Sep 2019 13:29:57 -0000 1.131
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/po/\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -74,9 +74,10 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3816,9 +3817,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -5915,8 +5917,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-drm.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-drm.de-diff.html 17 Aug 2019 08:29:47 -0000 1.25
+++ proprietary-drm.de-diff.html 7 Sep 2019 13:29:57 -0000 1.26
@@ -130,20 +130,20 @@
href="https://en.wikipedia.org/wiki/FairPlay">dictate where its customers
can
watch</strong></del></span> <span class="inserted"><ins><em>involves totally
unacceptable
restrictions in</em></ins></span> the <span
class="removed"><del><strong>videos they
purchased</a>.</p></strong></del></span> <span
class="inserted"><ins><em>use of ink cartridges that would otherwise be in
- working order.</p></em></ins></span>
+ working order.</p>
</li>
-<span class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810150">
+ <li id="M201810150">
<p>Printer manufacturers are very innovative—at blocking the
use of independent replacement ink cartridges. Their “security
upgrades” occasionally impose new forms of cartridge DRM. <a
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP and Epson have done this</a>.</p>
+ HP and Epson have done this</a>.</p></em></ins></span>
</li>
- <li id="M201806250">
+<span class="removed"><del><strong><li><p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201806250">
<p>The game Metal Gear Rising for
MacOS was tethered to a server. The company <a
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
@@ -185,8 +185,8 @@
term used to promote DRM. Nonetheless it serves as a reference for
the facts.</p>
- <p>We refer to that product as the</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/why-call-it-the-swindle.html">
Amazon Swindle</a>
+ <p>We refer to that product as the <a
+ href="/philosophy/why-call-it-the-swindle.html"> Amazon
Swindle</a>
because of this and <a href="/philosophy/ebooks.html"> other
malicious
functionalities</a>.</p>
</li>
@@ -199,8 +199,8 @@
“Unauthorized” essentially means anyone besides
Apple.</p>
<p>The article uses the term “lock”
- to describe the DRM, but we prefer to use the term <a
- href="/philosophy/words-to-avoid.html#DigitalLocks"> digital
+ to describe the DRM, but we prefer to use the term</em></ins></span> <a
<span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/02/02/231229/windows-drm-protected-files-used-to-decloak-tor-browser-users">can</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#DigitalLocks">
digital
handcuffs</a>.</p>
</li>
@@ -306,7 +306,7 @@
<li id="M201410080.1">
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries, spy on the user <a
-
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for
the sake of DRM.</a></p>
</li>
@@ -514,7 +514,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/17 08:29:47 $
+$Date: 2019/09/07 13:29:57 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.de.po,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary-drm.de.po 17 Aug 2019 08:29:47 -0000 1.66
+++ proprietary-drm.de.po 7 Sep 2019 13:29:57 -0000 1.67
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-08-17 08:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -481,10 +481,21 @@
"Filmstudios vorgegebene Ortungsbeschränkungen durchsetzt."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, spy on the user <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for+}
+# | the sake of DRM.</a>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"<em>Adobe Digital Editions</em>, die von US-Biblioteken meist genutzte "
"Software zum Betrachten von elektronischen Büchern, schnüffelt Nutzer <a "
Index: proprietary-drm.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.fr.po,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- proprietary-drm.fr.po 17 Aug 2019 16:30:50 -0000 1.68
+++ proprietary-drm.fr.po 7 Sep 2019 13:29:57 -0000 1.69
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-08-17 08:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2019-08-17 18:27+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -417,10 +418,21 @@
"cinéma."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, spy on the user <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for+}
+# | the sake of DRM.</a>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"Adobe a fait en sorte que « Digital Editions » (la liseuse utilisée par
la "
"plupart des bibliothèques aux Ãtats-Unis), espionne l'utilisateur <a href="
Index: proprietary-drm.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary-drm.it-diff.html 17 Aug 2019 08:29:47 -0000 1.39
+++ proprietary-drm.it-diff.html 7 Sep 2019 13:29:58 -0000 1.40
@@ -317,8 +317,8 @@
<span class="inserted"><ins><em><li id="M201410080.1">
<p>Adobe</em></ins></span> made “Digital Editions,”
- the e-reader used by most US libraries, spy on the user <a
-
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for
+ the e-reader used by most US libraries, spy on the user <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for</em></ins></span>
the sake of DRM.</a></p>
</li>
@@ -480,7 +480,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/17 08:29:47 $
+$Date: 2019/09/07 13:29:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.it.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-drm.it.po 17 Aug 2019 08:29:47 -0000 1.56
+++ proprietary-drm.it.po 7 Sep 2019 13:29:58 -0000 1.57
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-08-17 08:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2017-12-30 14:17+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -491,10 +491,21 @@
msgstr ""
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, spy on the user <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for+}
+# | the sake of DRM.</a>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"Adobe ha fatto in modo che “Digital Editions”, il lettore e-book "
"usato dalla maggior parte delle biblioteche americane, spiasse l'utente <a "
Index: proprietary-drm.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja-diff.html,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- proprietary-drm.ja-diff.html 17 Aug 2019 08:29:47 -0000 1.40
+++ proprietary-drm.ja-diff.html 7 Sep 2019 13:29:58 -0000 1.41
@@ -312,8 +312,8 @@
<span class="inserted"><ins><em><li id="M201410080.1">
<p>Adobe</em></ins></span> made “Digital Editions,”
- the e-reader used by most US libraries, spy on the user <a
-
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for
+ the e-reader used by most US libraries, spy on the user <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">for</em></ins></span>
the sake of DRM.</a></p>
</li>
@@ -475,7 +475,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/17 08:29:47 $
+$Date: 2019/09/07 13:29:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-drm.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ja.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- proprietary-drm.ja.po 17 Aug 2019 08:29:47 -0000 1.53
+++ proprietary-drm.ja.po 7 Sep 2019 13:29:58 -0000 1.54
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-08-17 08:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:55+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -341,10 +341,16 @@
msgstr ""
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"ã¢ããã¯åè¡å½ã®å³æ¸é¤¨ã®ã»ã¨ãã©ã§ä½¿ãããããã£ã¸ã¿ã«çãã®é»åãªã¼ããä½"
"ããã¦ã¼ã¶ãã¹ãã¤ãã¾ãã<a
href=\"http://www.computerworlduk.com/blogs/"
Index: proprietary-drm.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.pot,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-drm.pot 17 Aug 2019 08:29:47 -0000 1.34
+++ proprietary-drm.pot 7 Sep 2019 13:29:58 -0000 1.35
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-08-17 08:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -283,7 +283,7 @@
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
"libraries, spy on the user <a "
-"href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for
"
+"href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for
"
"the sake of DRM.</a>"
msgstr ""
Index: proprietary-drm.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-drm.ru.po,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary-drm.ru.po 18 Aug 2019 11:02:05 -0000 1.89
+++ proprietary-drm.ru.po 7 Sep 2019 13:29:58 -0000 1.90
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-drm.html\n"
-"POT-Creation-Date: 2019-08-17 08:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-10-08 17:34+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary DRM - GNU Project - Free Software Foundation"
@@ -421,10 +422,21 @@
"огÑаниÑÐµÐ½Ð¸Ñ Ð¿Ð¾ меÑÑонаÑ
ождениÑ
полÑзоваÑелÑ, коÑоÑÑе дикÑÑÑÑÑÑ
киноÑÑÑдиÑми."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, spy on the user <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for+}
+# | the sake of DRM.</a>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, пÑогÑамма "
"ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð² болÑÑинÑÑве
библиоÑек СШÐ, <a href=\"http://www."
Index: proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- proprietary-sabotage.de-diff.html 4 Sep 2019 16:00:09 -0000 1.41
+++ proprietary-sabotage.de-diff.html 7 Sep 2019 13:29:58 -0000 1.42
@@ -599,7 +599,7 @@
pay <span
class="removed"><del><strong>exorbitantly.</a></p></strong></del></span>
<span
class="inserted"><ins><em>exorbitantly</a>.</p></em></ins></span>
<p>Microsoft is going to <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
cut off support for some Internet Explorer versions</a> in the same
way.</p>
@@ -823,7 +823,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/04 16:00:09 $
+$Date: 2019/09/07 13:29:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.123
retrieving revision 1.124
diff -u -b -r1.123 -r1.124
--- proprietary-sabotage.de.po 4 Sep 2019 16:00:09 -0000 1.123
+++ proprietary-sabotage.de.po 7 Sep 2019 13:29:58 -0000 1.124
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-04 15:55+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -973,7 +973,7 @@
#. type: Content of: <ul><li><p>
# | Microsoft is going to <a
# |
[-href=\"http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\">-]
-# |
{+href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
# | cut off support for some Internet Explorer versions</a> in the same way.
#, fuzzy
#| msgid ""
@@ -982,9 +982,10 @@
#| "months/\"> cut off support for some Internet Explorer versions</a> in the "
#| "same way."
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"Microsoft wird die <a href=\"//www.computerworlduk.com/news/security/3605515/"
"more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\" title=\"More "
Index: proprietary-sabotage.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es.po,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-sabotage.es.po 5 Sep 2019 08:50:40 -0000 1.6
+++ proprietary-sabotage.es.po 7 Sep 2019 13:29:58 -0000 1.7
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-04 15:55+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2019-09-05 10:42+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -832,10 +833,21 @@
"cifras exorbitantes</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+# | Microsoft is going to <a
+# |
[-href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">-]
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# | cut off support for some Internet Explorer versions</a> in the same way.
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"De igual manera, Microsoft <a href=\"https://www.computerworlduk.com/"
"applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary-sabotage.fr.po 4 Sep 2019 16:30:54 -0000 1.155
+++ proprietary-sabotage.fr.po 7 Sep 2019 13:29:58 -0000 1.156
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-04 15:55+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2019-09-04 18:02+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -837,10 +838,21 @@
"prix exorbitant</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+# | Microsoft is going to <a
+# |
[-href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">-]
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# | cut off support for some Internet Explorer versions</a> in the same way.
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"De même, Microsoft va <a
href=\"https://www.computerworlduk.com/applications/"
"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">mettre "
Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-sabotage.it-diff.html 4 Sep 2019 16:00:10 -0000 1.52
+++ proprietary-sabotage.it-diff.html 7 Sep 2019 13:29:58 -0000 1.53
@@ -576,7 +576,7 @@
pay <span
class="removed"><del><strong>exorbitantly.</a></p></strong></del></span>
<span
class="inserted"><ins><em>exorbitantly</a>.</p></em></ins></span>
<p>Microsoft is going to <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
cut off support for some Internet Explorer versions</a> in the same
way.</p>
@@ -801,7 +801,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/04 16:00:10 $
+$Date: 2019/09/07 13:29:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary-sabotage.it.po 4 Sep 2019 16:00:10 -0000 1.117
+++ proprietary-sabotage.it.po 7 Sep 2019 13:29:58 -0000 1.118
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-04 15:55+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -799,7 +799,7 @@
#. type: Content of: <ul><li><p>
# | Microsoft is going to <a
# |
[-href=\"http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\">-]
-# |
{+href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
# | cut off support for some Internet Explorer versions</a> in the same way.
#, fuzzy
#| msgid ""
@@ -808,9 +808,10 @@
#| "months/\"> cut off support for some Internet Explorer versions</a> in the "
#| "same way."
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"Microsoft <a href=\"http://www.computerworlduk.com/news/security/3605515/"
"more-than-half-of-all-ie-users-face-patch-axe-in-10-months/\"> sospenderà il
"
Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- proprietary-sabotage.ja-diff.html 4 Sep 2019 16:00:10 -0000 1.56
+++ proprietary-sabotage.ja-diff.html 7 Sep 2019 13:29:58 -0000 1.57
@@ -549,7 +549,7 @@
pay <span
class="removed"><del><strong>exorbitantly.</a></p></strong></del></span>
<span
class="inserted"><ins><em>exorbitantly</a>.</p></em></ins></span>
<p>Microsoft is going to <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/news/security/3605515/more-than-half-of-all-ie-users-face-patch-axe-in-10-months/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/"></em></ins></span>
cut off support for some Internet Explorer versions</a> in the same
way.</p>
@@ -774,7 +774,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/04 16:00:10 $
+$Date: 2019/09/07 13:29:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary-sabotage.ja.po 4 Sep 2019 16:00:10 -0000 1.110
+++ proprietary-sabotage.ja.po 7 Sep 2019 13:29:58 -0000 1.111
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-04 15:55+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -651,10 +651,17 @@
"a>ã"
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"åæ§ã«ããã¤ã¯ãã½ããã¯<a
href=\"https://www.computerworlduk.com/"
"applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.75
retrieving revision 1.76
diff -u -b -r1.75 -r1.76
--- proprietary-sabotage.pot 4 Sep 2019 16:00:10 -0000 1.75
+++ proprietary-sabotage.pot 7 Sep 2019 13:29:58 -0000 1.76
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-04 15:55+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -549,7 +549,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"Microsoft is going to <a "
-"href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">
"
+"href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">
"
"cut off support for some Internet Explorer versions</a> in the same way."
msgstr ""
Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary-sabotage.ru.po 4 Sep 2019 16:00:10 -0000 1.191
+++ proprietary-sabotage.ru.po 7 Sep 2019 13:29:58 -0000 1.192
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-04 15:55+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-12-10 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -829,10 +830,21 @@
"оплаÑиваÑÑ Ð·Ð°Ð¾Ð±Ð»Ð°ÑнÑе ÑÑеÑа</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+# | Microsoft is going to <a
+# |
[-href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">-]
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# | cut off support for some Internet Explorer versions</a> in the same way.
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"Microsoft ÑоÑно Ñаким же обÑазом ÑобиÑаеÑÑÑ <a
href=\"https://www."
"computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-"
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary-surveillance.de-diff.html 17 Aug 2019 10:29:51 -0000
1.91
+++ proprietary-surveillance.de-diff.html 7 Sep 2019 13:29:58 -0000
1.92
@@ -646,8 +646,7 @@
to
<span class="removed"><del><strong>users' text messages.</dd>
- <dt>DroidVPN and TigerVPN</dt>
- <dd>Requests the <code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>have
GPS.)</p>
+ <dt>DroidVPN</strong></del></span> <span
class="inserted"><ins><em>have GPS.)</p>
</li>
</ul>
@@ -659,344 +658,187 @@
<ul class="blurbs">
<li id="M201905280">
- <p>In spite of Apple's supposed commitment</em></ins></span> to
<span class="removed"><del><strong>read logs
- for other</strong></del></span>
- <span class="inserted"><ins><em>privacy, iPhone</em></ins></span> apps
<span class="removed"><del><strong>and also core system logs. TigerVPN
developers
- have confirmed this.</dd>
-
- <dt>HideMyAss</dt>
- <dd>Sends traffic</strong></del></span> <span
class="inserted"><ins><em>contain trackers that are busy at night <a
+ <p>In spite of Apple's supposed commitment to
+ privacy, iPhone apps contain trackers that are busy at night <a
href="https://freediggz.com/2019/05/28/perspective-its-the-middle-of-the-night-do-you-know-who-your-iphone-is-talking-to/">
- sending users' personal information</em></ins></span> to <span
class="removed"><del><strong>LinkedIn. Also, it stores detailed
logs</strong></del></span> <span class="inserted"><ins><em>third
parties</a>.</p>
+ sending users' personal information to third parties</a>.</p>
<p>The article mentions specific examples: Microsoft OneDrive,
Intuitâs Mint, Nike, Spotify, The Washington Post, The Weather
- Channel (owned by IBM), the crime-alert service Citizen,
Yelp</em></ins></span>
- and <span class="removed"><del><strong>may turn them over to the UK
government if
- requested.</dd>
-
- <dt>VPN Services HotspotShield</dt>
- <dd>Injects JavaScript code into the HTML pages returned
to</strong></del></span> <span class="inserted"><ins><em>DoorDash. But it is
likely that most nonfree apps contain
+ Channel (owned by IBM), the crime-alert service Citizen, Yelp
+ and DoorDash. But it is likely that most nonfree apps contain
trackers. Some of these send personally identifying data such as phone
fingerprint, exact location, email address, phone number or even
- delivery address (in</em></ins></span> the
- <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span
class="inserted"><ins><em>case</em></ins></span> of <span
class="inserted"><ins><em>DoorDash). Once this information
- is collected by</em></ins></span> the <span
class="removed"><del><strong>JS injection</strong></del></span> <span
class="inserted"><ins><em>company, there</em></ins></span> is <span
class="removed"><del><strong>to display
- ads. Uses roughly 5 tracking libraries. Also,</strong></del></span>
<span class="inserted"><ins><em>no telling what</em></ins></span> it <span
class="removed"><del><strong>redirects the
- user's traffic through valueclick.com (an advertising
- website).</dd>
-
- <dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>will be
+ delivery address (in the case of DoorDash). Once this information
+ is collected by the company, there is no telling what it will be
used for.</p>
</li>
<li id="M201711250">
- <p>The DMCA</em></ins></span> and <span
class="removed"><del><strong>also uses
- roughly 5 tracking libraries. Developers of</strong></del></span> <span
class="inserted"><ins><em>the EU Copyright Directive make it <a
+ <p>The DMCA and the EU Copyright Directive make it <a
href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal to study how iOS cr…apps spy on users</a>,
because</em></ins></span>
- this <span class="removed"><del><strong>app have
- confirmed that</strong></del></span> <span
class="inserted"><ins><em>would require circumventing</em></ins></span> the
<span class="removed"><del><strong>non-premium version of</strong></del></span>
<span class="inserted"><ins><em>iOS DRM.</p>
+ illegal to study how iOS cr…apps spy on users</a>, because
+ this would require circumventing the iOS DRM.</p>
</li>
<li id="M201709210">
- <p>In</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>latest iThings system,
+ <p>In the latest iThings system,
“turning off” WiFi and Bluetooth the obvious way <a
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>. A more advanced way
really</em></ins></span> does
- <span class="removed"><del><strong>JavaScript
injection</strong></del></span> <span class="inserted"><ins><em>turn
- them off—only until 5am. That's Apple</em></ins></span> for <span
class="removed"><del><strong>tracking and display ads.</dd>
- </dl></strong></del></span> <span
class="inserted"><ins><em>you—“We
- know you want to be spied on”.</p></em></ins></span>
+ doesn't really turn them off</a>. A more advanced way really does
turn
+ them off—only until 5am. That's Apple for you—“We
+ know you want to be spied on”.</p>
</li>
-<span class="removed"><del><strong><li>
- <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
study in 2015</a> found that 90% of the top-ranked gratis
- proprietary Android apps contained recognizable tracking libraries. For
- the paid proprietary apps, it was only 60%.</p>
-
- <p>The article confusingly describes gratis apps as “free”,
- but most of them are not in fact</strong></del></span>
- <span class="inserted"><ins><em><li id="M201702150">
- <p>Apple proposes</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>.
- It also uses</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
+ <li id="M201702150">
+ <p>Apple proposes <a
+
href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>—which would mean no way
to use it without having your fingerprints taken. Users would have
- no way to tell whether</em></ins></span> the <span
class="removed"><del><strong>ugly word “monetize”. A good
replacement
- for that word</strong></del></span> <span
class="inserted"><ins><em>phone</em></ins></span> is <span
class="removed"><del><strong>“exploit”; nearly always that will fit
- perfectly.</p>
-</li>
-
-<li>
- <p>Apps for BART
- <a
href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
<span class="inserted"><ins><em>snooping</em></ins></span> on <span
class="removed"><del><strong>users</a>.</p>
- <p>With free software apps, users could <em>make sure</em>
that they don't snoop.</p>
- <p>With proprietary apps, one can only hope that they
don't.</p></strong></del></span> <span
class="inserted"><ins><em>them.</p></em></ins></span>
+ no way to tell whether the phone is snooping on them.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>A study found 234 Android apps that track users
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
programs</a>.
- </p>
-
-</li>
-
-<li>
- <p>Pairs</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
- lots</em></ins></span> of <span class="removed"><del><strong>Android apps
can collude to transmit users'</strong></del></span> personal data to <span
class="removed"><del><strong>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found
- tens of thousands of pairs that
collude</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Apple's servers</a>. Big Brother can get
- them from there.</p></em></ins></span>
+ <li id="M201611170">
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send
+ lots of personal data to Apple's servers</a>. Big Brother can get
+ them from there.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Google Play intentionally sends</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609280">
- <p>The iMessage</em></ins></span> app <span
class="removed"><del><strong>developers</strong></del></span> <span
class="inserted"><ins><em>on iThings</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
-the personal details of users</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number</em></ins></span> that <span
class="removed"><del><strong>install</strong></del></span> the <span
class="removed"><del><strong>app</a>.</p>
-
-<p>Merely asking</strong></del></span> <span
class="inserted"><ins><em>user types into it</a>;</em></ins></span> the
<span class="removed"><del><strong>“consent” of users is not
enough</strong></del></span>
- <span class="inserted"><ins><em>server records these numbers for at least
30 days.</p>
+ <li id="M201609280">
+ <p>The iMessage app on iThings <a
+
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number that the user types into it</a>; the
+ server records these numbers for at least 30 days.</p>
</li>
<li id="M201509240">
- <p>iThings automatically upload</em></ins></span> to <span
class="removed"><del><strong>legitimize actions like this. At this point, most
users have
-stopped reading</strong></del></span> <span class="inserted"><ins><em>Apple's
servers all</em></ins></span> the <span
class="removed"><del><strong>“Terms</strong></del></span> <span
class="inserted"><ins><em>photos</em></ins></span>
- and <span class="removed"><del><strong>Conditions” that spell out
-what</strong></del></span> <span
class="inserted"><ins><em>videos</em></ins></span> they <span
class="removed"><del><strong>are “consenting” to. Google should
clearly</strong></del></span> <span class="inserted"><ins><em>make.</p>
-
- <blockquote><p> iCloud Photo Library stores every
photo</em></ins></span> and <span class="removed"><del><strong>honestly
identify the information it collects on users, instead
-of hiding it in an obscurely worded EULA.</p>
-
-<p>However, to truly protect people's privacy, we must prevent Google
-and other companies from getting this personal information in the first
-place!</p>
-</li>
-
- <li>
- <p>Google Play (a component of Android) <a
-
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks the users' movements without their permission</a>.</p>
+ <p>iThings automatically upload to Apple's servers all the photos
+ and videos they make.</p>
- <p>Even if</strong></del></span> <span
class="inserted"><ins><em>video</em></ins></span> you <span
class="removed"><del><strong>disable Google Maps</strong></del></span>
- <span class="inserted"><ins><em>take,</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
- disable Google Play itself</strong></del></span> <span
class="inserted"><ins><em>keeps them up</em></ins></span> to <span
class="removed"><del><strong>completely stop the tracking.
This</strong></del></span> <span class="inserted"><ins><em>date on all your
devices. Any edits you
+ <blockquote><p> iCloud Photo Library stores every photo and
video you
+ take, and keeps them up to date on all your devices. Any edits you
make are automatically updated everywhere. […]
</p></blockquote>
<p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</em></ins></span> is
- <span class="removed"><del><strong>yet another
example</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT202033">activated by the
- startup</em></ins></span> of <span class="removed"><del><strong>nonfree
software pretending</strong></del></span> <span
class="inserted"><ins><em>iOS</a>. The term “cloud” means
“please
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means “please
don't ask where.”</p>
- <p>There is a way</em></ins></span> to <span
class="removed"><del><strong>obey the user,
- when</strong></del></span>
- <span class="inserted"><ins><em><a
href="https://support.apple.com/en-us/HT201104"> deactivate
- iCloud</a>, but</em></ins></span> it's <span
class="removed"><del><strong>actually doing something else.
Such</strong></del></span> <span class="inserted"><ins><em>active by default so
it still counts as</em></ins></span> a <span class="removed"><del><strong>thing
would be almost
- unthinkable with free software.</p>
-
- </li>
+ <p>There is a way to
+ <a href="https://support.apple.com/en-us/HT201104"> deactivate
+ iCloud</a>, but it's active by default so it still counts as a
+ surveillance functionality.</p>
- <li><p>More than 73%</strong></del></span>
- <span class="inserted"><ins><em>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</em></ins></span> of
<span class="removed"><del><strong>the most popular Android
apps</strong></del></span> <span class="inserted"><ins><em>this
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://jots.pub/a/2015103001/index.php">share
personal,
- behavioral and location information</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</em></ins></span> of <span class="removed"><del><strong>their
users with third parties.</p>
- </li>
-
- <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>many
celebrities</a>. They needed</em></ins></span> to <span
class="removed"><del><strong>the app's functionality,
- was</strong></del></span> <span class="inserted"><ins><em>break Apple's
- security to get at them, but NSA can access any of them
through</em></ins></span> <a <span
class="removed"><del><strong>href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in</strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
+ <p>Unknown people apparently took advantage of this to <a
+
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security to get at them, but NSA can access any of them through <a
+
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.</p>
</li>
<li id="M201409220">
<p>Apple can, and regularly does, <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</em></ins></span> the <span
class="removed"><del><strong>500 most popular gratis Android
apps</a>.</p>
-
- <p>The article should not</strong></del></span> <span
class="inserted"><ins><em>state</a>.</p>
+ remotely extract some data from iPhones for the state</a>.</p>
- <p>This may</em></ins></span> have <span
class="removed"><del><strong>described these apps as
- “free”—they are</strong></del></span> <span
class="inserted"><ins><em>improved with <a
+ <p>This may have improved with <a
href="https://www.denverpost.com/2014/09/17/apple-will-no-longer-unlock-most-iphones-ipads-for-police/">
iOS 8 security improvements</a>; but <a
-
href="https://firstlook.org/theintercept/2014/09/22/apple-data/"></em></ins></span>
- not <span class="removed"><del><strong>free software. The clear
way</strong></del></span> <span class="inserted"><ins><em>as much as Apple
claims</a>.</p>
+ href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not as much as Apple claims</a>.</p>
</li>
<li id="M201407230">
<p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</em></ins></span> to <span
class="removed"><del><strong>say
- “zero price” is “gratis.”</p>
-
- <p>The article takes</strong></del></span> <span
class="inserted"><ins><em>exist</em></ins></span>
- for <span class="removed"><del><strong>granted that the usual analytics
tools are
- legitimate, but is that valid? Software developers
have</strong></del></span> no <span class="removed"><del><strong>right to
- analyze what users are doing or how. “Analytics” tools that
snoop are
- just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>possible purpose</em></ins></span> other <span
class="removed"><del><strong>snooping.</p>
- </li>
- <li><p>Gratis Android apps (but not</strong></del></span> <span
class="inserted"><ins><em>than surveillance</a>. Here is
the</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-sw.html">free
software</a>)
- connect to 100</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Several “features” of iOS seem to exist
+ for no possible purpose other than surveillance</a>. Here is the
<a
+
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
Technical presentation</a>.</p>
</li>
<li id="M201401100">
- <p>The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>class="not-a-duplicate"
+ <p>The <a class="not-a-duplicate"
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly where the iThing
is,</em></ins></span> and <span
class="removed"><del><strong>advertising</a> URLs,</strong></del></span>
- <span class="inserted"><ins><em>get other info too.</p>
+ iBeacon</a> lets stores determine exactly where the iThing is, and
+ get other info too.</p>
</li>
<li id="M201312300">
<p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps the NSA snoop</em></ins></span> on <span
class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>average.</p>
- </li>
- <li><p>Spyware is present</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> in <span
class="removed"><del><strong>some Android devices when they are sold.
- Some Motorola phones modify Android to</strong></del></span> <span
class="inserted"><ins><em>an iThing, or it
+ Either Apple helps the NSA snoop on all the data in an iThing, or it
is totally incompetent</a>.</p>
</li>
<li id="M201308080">
- <p>The iThing also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ <p>The iThing also <a
+
href="https://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
tells Apple its geolocation</a> by default, though that can be
- turned off.</p></em></ins></span>
+ turned off.</p>
</li>
- <span class="removed"><del><strong><li><p>Some manufacturers
add</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201210170">
- <p>There is also</em></ins></span> a <span
class="inserted"><ins><em>feature for web sites to track users, which
is</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ <li id="M201210170">
+ <p>There is also a feature for web sites to track users, which is
<a
+
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
enabled by default</a>. (That article talks about iOS 6, but it is
- still true in iOS 7.)</p></em></ins></span>
+ still true in iOS 7.)</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201204280">
+ <li id="M201204280">
<p>Users cannot make an Apple ID (<a
-
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary</em></ins></span>
- to <span class="removed"><del><strong>any file on</strong></del></span>
<span class="inserted"><ins><em>install even gratis apps</a>) without
giving a valid
- email address and receiving</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>verification code Apple sends
- to it.</p></em></ins></span>
+
href="https://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-id">necessary
+ to install even gratis apps</a>) without giving a valid
+ email address and receiving the verification code Apple sends
+ to it.</p>
</li>
</ul>
-
-<span class="removed"><del><strong><!-- #SpywareOnMobiles -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
-
-
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnMobiles">Spyware on
Mobiles</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInAndroid">Android
Telephones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInAndroid">#SpywareInAndroid</a>)</span></em></ins></span>
-</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-
-
<div class="big-subsection">
- <h4 id="SpywareIniThings">Spyware in iThings</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+ <h4 id="SpywareInAndroid">Android Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInAndroid">#SpywareInAndroid</a>)</span>
</div>
-<ul>
- <li><p>The DMCA and the EU Copyright Directive make it <a
-href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
- illegal</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201812060">
- <p>Facebook's app got “consent”</em></ins></span> to
<span class="removed"><del><strong>study how iOS cr...apps spy on
users</a>, because this
- would require circumventing</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Facebook's app got “consent” to <a
href="https://www.theguardian.com/technology/2018/dec/06/facebook-emails-reveal-discussions-over-call-log-consent">
upload call logs automatically from Android phones</a> while
disguising
- what</em></ins></span> the <span class="removed"><del><strong>iOS
DRM.</p></strong></del></span> <span
class="inserted"><ins><em>“consent” was
for.</p></em></ins></span>
+ what the “consent” was for.</p>
</li>
- <span class="removed"><del><strong><li><p>In the latest iThings
system, “turning off” WiFi and Bluetooth</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201811230">
+ <li id="M201811230">
<p>An Android phone was observed to track location even while
- in airplane mode. It didn't send</em></ins></span> the
- <span class="removed"><del><strong>obvious way</strong></del></span>
<span class="inserted"><ins><em>location data while in
- airplane mode. Instead,</em></ins></span> <a
- <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
- doesn't really turn them off</a>.
- A more advanced way really does turn</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
- it saved up the data, and sent</em></ins></span> them <span
class="removed"><del><strong>off—only until 5am.
- That's Apple for you—“We know you want to be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>all
later</a>.</p></em></ins></span>
+ in airplane mode. It didn't send the location data while in
+ airplane mode. Instead, <a
+
href="https://www.thesun.co.uk/tech/7811918/google-is-tracking-you-even-with-airplane-mode-turned-on/">
+ it saved up the data, and sent them all later</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711210">
- <p>Android tracks location for Google</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
- — which would mean no way to use it without having your
fingerprints
- taken. Users would have no way to tell whether</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
when</em></ins></span>
- the phone <span class="removed"><del><strong>is snooping on
- them.</p></li>
-
- <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>has no SIM card</a>.</p>
+ <li id="M201711210">
+ <p>Android tracks location for Google <a
+
href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even when
+ the phone has no SIM card</a>.</p>
</li>
<li id="M201611150">
- <p>Some portable phones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending</em></ins></span> lots of <span
class="removed"><del><strong>personal</strong></del></span> data to <span
class="removed"><del><strong>Apple's servers</a>. Big Brother can
- get them from there.</p></strong></del></span> <span
class="inserted"><ins><em>China</a>.</p></em></ins></span>
+ <p>Some portable phones <a
+
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to China</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>The iMessage app on
iThings</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609140">
- <p>Google Play (a component of Android)</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
- a server every phone number that the user types into
it</a>;</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
- tracks</em></ins></span> the <span class="removed"><del><strong>server
records these numbers for at least 30
- days.</p>
- </li>
-
- <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary
to install even gratis apps)</a></strong></del></span> <span
class="inserted"><ins><em>users' movements</em></ins></span> without <span
class="removed"><del><strong>giving a valid email address</strong></del></span>
<span class="inserted"><ins><em>their permission</a>.</p>
-
- <p>Even if you disable Google Maps</em></ins></span> and <span
class="removed"><del><strong>receiving the code Apple
- sends</strong></del></span> <span class="inserted"><ins><em>location
tracking, you must
- disable Google Play itself</em></ins></span> to <span
class="removed"><del><strong>it.</p>
- </li>
-
- <li><p>Around 47% of</strong></del></span> <span
class="inserted"><ins><em>completely stop</em></ins></span> the <span
class="removed"><del><strong>most popular iOS apps
- <a class="not-a-duplicate"
- href="http://jots.pub/a/2015103001/index.php">share personal,
- behavioral and location information</a></strong></del></span>
<span class="inserted"><ins><em>tracking. This is
- yet another example</em></ins></span> of <span
class="removed"><del><strong>their users with third parties.</p>
- </li>
+ <li id="M201609140">
+ <p>Google Play (a component of Android) <a
+
href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg">
+ tracks the users' movements without their permission</a>.</p>
- <li><p>iThings automatically upload</strong></del></span> <span
class="inserted"><ins><em>nonfree software pretending</em></ins></span> to
<span class="removed"><del><strong>Apple's servers all</strong></del></span>
<span class="inserted"><ins><em>obey</em></ins></span> the <span
class="removed"><del><strong>photos</strong></del></span> <span
class="inserted"><ins><em>user,
+ <p>Even if you disable Google Maps and location tracking, you must
+ disable Google Play itself to completely stop the tracking. This is
+ yet another example of nonfree software pretending to obey the user,
when it's actually doing something else. Such a thing would be almost
unthinkable with free software.</p>
</li>
@@ -1004,22 +846,10 @@
<li id="M201507030">
<p>Samsung phones come with <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
- that users can't delete</a>,</em></ins></span> and
- <span class="removed"><del><strong>videos</strong></del></span> they
<span class="removed"><del><strong>make.</p>
-
- <blockquote><p>
- iCloud Photo Library stores every photo and video you take,
- and keeps them up to date on all your devices.
- Any edits you make are automatically updated everywhere. [...]
- </p></blockquote>
-
- <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
- information</a> as accessed on 24 Sep 2015.) The iCloud
feature</strong></del></span> <span class="inserted"><ins><em>send so much data
that their
- transmission</em></ins></span> is
- <span class="removed"><del><strong><a
href="https://support.apple.com/en-us/HT202033">activated</strong></del></span>
<span class="inserted"><ins><em>a substantial expense for users. Said
transmission,
- not wanted or requested</em></ins></span> by the
- <span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>user, clearly must constitute spying</em></ins></span>
- of <span class="removed"><del><strong>iOS</a>.</strong></del></span>
<span class="inserted"><ins><em>some kind.</p>
+ that users can't delete</a>, and they send so much data that their
+ transmission is a substantial expense for users. Said transmission,
+ not wanted or requested by the user, clearly must constitute spying
+ of some kind.</p>
</li>
<li id="M201403120">
@@ -1028,147 +858,79 @@
</li>
<li id="M201308010">
- <p>Spyware in Android phones (and Windows?
laptops):</em></ins></span> The <span class="removed"><del><strong>term
“cloud”</strong></del></span> <span class="inserted"><ins><em>Wall
Street
+ <p>Spyware in Android phones (and Windows? laptops): The Wall Street
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this</em></ins></span> means
- <span class="removed"><del><strong>“please don't ask
where.”</p>
-
- <p>There</strong></del></span> <span
class="inserted"><ins><em>Windows laptops.) Here</em></ins></span> is <span
class="removed"><del><strong>a way to</strong></del></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
- deactivate iCloud</a>, but it's active</strong></del></span>
- <span
class="inserted"><ins><em>href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
+ and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
+ href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
<li id="M201307280">
<p>Spyware is present in some Android devices when they are
- sold. Some Motorola phones, made when this company was
owned</em></ins></span>
- by <span class="removed"><del><strong>default so it still counts
as</strong></del></span> <span class="inserted"><ins><em>Google,
use</em></ins></span> a
- <span class="removed"><del><strong>surveillance functionality.</p>
-
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>modified version</em></ins></span> of <span
class="removed"><del><strong>this to</strong></del></span> <span
class="inserted"><ins><em>Android that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos of many celebrities</a>. They needed to break Apple's
- security</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- sends personal data</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them
through</strong></del></span> <span
class="inserted"><ins><em>Motorola</a>.</p>
+ sold. Some Motorola phones, made when this company was owned
+ by Google, use a modified version of Android that <a
+
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ sends personal data to Motorola</a>.</p>
</li>
<li id="M201307250">
- <p>A Motorola phone</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
- </p></li>
-
- <li><p>Spyware in iThings:</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens for voice all</em></ins></span> the <span
class="inserted"><ins><em>time</a>.</p>
+ <p>A Motorola phone <a
+
href="https://web.archive.org/web/20170629175629/http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all the time</a>.</p>
</li>
<li id="M201302150">
- <p>Google Play intentionally sends app developers</em></ins></span>
<a <span class="removed"><del><strong>class="not-a-duplicate"
-
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
- iBeacon</a> lets stores determine exactly
where</strong></del></span>
- <span
class="inserted"><ins><em>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116"></em></ins></span>
- the <span class="removed"><del><strong>iThing is,
- and get other info too.</p>
- </li>
-
- <li><p>There</strong></del></span> <span
class="inserted"><ins><em>personal details of users that install the
app</a>.</p>
-
- <p>Merely asking the “consent” of
users</em></ins></span> is <span class="removed"><del><strong>also a feature
for web sites</strong></del></span> <span class="inserted"><ins><em>not
enough</em></ins></span> to <span class="removed"><del><strong>track users,
which is
- <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
- enabled by default</a>. (That article talks about iOS 6, but it
- is still true in iOS 7.)</p>
- </li>
-
- <li><p>The iThing also
- <a
-href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
- tells Apple its geolocation</a> by default,
though</strong></del></span>
- <span class="inserted"><ins><em>legitimize actions like this. At this
point, most users have stopped
- reading the “Terms and Conditions”</em></ins></span> that
<span class="removed"><del><strong>can be
- turned off.</p>
- </li>
-
- <li><p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>spell out what
- they are “consenting” to. Google should
clearly</em></ins></span> and <span class="removed"><del><strong>regularly does,
- <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for the
state</a>.</p>
- </li>
-
- <li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
- Either Apple helps</strong></del></span>
- <span class="inserted"><ins><em>honestly identify</em></ins></span> the
<span class="removed"><del><strong>NSA snoop</strong></del></span> <span
class="inserted"><ins><em>information it collects</em></ins></span> on <span
class="removed"><del><strong>all the data</strong></del></span> <span
class="inserted"><ins><em>users, instead of
- hiding it</em></ins></span> in an <span
class="removed"><del><strong>iThing,
- or it is totally incompetent.</a></p>
- </li>
-
- <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
- Several “features” of iOS seem</strong></del></span> <span
class="inserted"><ins><em>obscurely worded EULA.</p>
-
- <p>However,</em></ins></span> to <span
class="removed"><del><strong>exist for no
- possible purpose</strong></del></span> <span
class="inserted"><ins><em>truly protect people's privacy, we must prevent Google
- and</em></ins></span> other <span class="removed"><del><strong>than
surveillance</a>. Here is</strong></del></span> <span
class="inserted"><ins><em>companies from getting this personal information
in</em></ins></span> the
- <span class="inserted"><ins><em>first place!</p>
+ <p>Google Play intentionally sends app developers <a
+
href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+ the personal details of users that install the app</a>.</p>
+
+ <p>Merely asking the “consent” of users is not enough to
+ legitimize actions like this. At this point, most users have stopped
+ reading the “Terms and Conditions” that spell out what
+ they are “consenting” to. Google should clearly and
+ honestly identify the information it collects on users, instead of
+ hiding it in an obscurely worded EULA.</p>
+
+ <p>However, to truly protect people's privacy, we must prevent Google
+ and other companies from getting this personal information in the
+ first place!</p>
</li>
<li id="M201111170">
- <p>Some manufacturers add a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
- Technical presentation</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
- hidden general surveillance package such as Carrier
IQ</a>.</p></em></ins></span>
+ <p>Some manufacturers add a <a
+
href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier IQ</a>.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInTelephones">Spyware in
Telephones</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInElectronicReaders">E-Readers</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTelephones">#SpywareInTelephones</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">E-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>Tracking software in popular Android apps is
pervasive</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code,</em></ins></span> and
- <span class="removed"><del><strong>sometimes very clever. Some trackers
can</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store by noticing WiFi
- networks</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Android tracks
location for Google <a
-href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
- even when “location services” are turned off, even
- when</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
- <p>Adobe made “Digital Editions,”</em></ins></span>
- the <span class="removed"><del><strong>phone has no SIM
card</a>.</p></li>
-
- <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>e-reader used by most US libraries,</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send</em></ins></span> lots of data to <span
class="removed"><del><strong>China</a>.</p></li>
-
- <li><p>According</strong></del></span> <span
class="inserted"><ins><em>Adobe</a>. Adobe's “excuse”: it's
- needed</em></ins></span> to <span class="removed"><del><strong>Edward
Snowden,</strong></del></span> <span class="inserted"><ins><em>check
DRM!</p>
+ <li id="M201410080">
+ <p>Adobe made “Digital Editions,”
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data to Adobe</a>. Adobe's “excuse”: it's
+ needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only the
Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
- by sending hidden text messages</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even</em></ins></span> which <span
class="removed"><del><strong>enable them to turn the phones
- on and off, listen to the microphone, retrieve geo-location data from the
- GPS, take photographs, read text messages, read call, location and web
- browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>page</em></ins></span> the <span
class="removed"><del><strong>contact list. This malware is designed to
- disguise itself from investigation.</p></strong></del></span>
<span class="inserted"><ins><em>user reads at what
time</a>.</p></em></ins></span>
+ <p>Spyware in many e-readers—not only the Kindle: <a
+ href="https://www.eff.org/pages/reader-privacy-chart-2012"> they
+ report even which page the user reads at what time</a>.</p>
</li>
-
- <span class="removed"><del><strong><li><p>Samsung phones come
with</strong></del></span>
-<span class="inserted"><ins><em></ul>
+</ul>
@@ -1185,329 +947,153 @@
<ul class="blurbs">
<li id="M201811020">
- <p>Foundry's graphics software</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
+ <p>Foundry's graphics software <a
+
href="https://torrentfreak.com/software-company-fines-pirates-after-monitoring-their-computers-181102/">
reports information to identify who is running it</a>. The result is
often a legal threat demanding a lot of money.</p>
- <p>The fact</em></ins></span> that <span
class="removed"><del><strong>users can't delete</a>,
- and they send so much data</strong></del></span> <span
class="inserted"><ins><em>this is used for repression of forbidden sharing
+ <p>The fact that this is used for repression of forbidden sharing
makes it even more vicious.</p>
- <p>This illustrates</em></ins></span> that <span
class="removed"><del><strong>their transmission</strong></del></span> <span
class="inserted"><ins><em>making unauthorized copies of nonfree
software</em></ins></span>
- is <span class="inserted"><ins><em>not</em></ins></span> a
- <span class="removed"><del><strong>substantial
expense</strong></del></span> <span
class="inserted"><ins><em>cure</em></ins></span> for <span
class="removed"><del><strong>users. Said transmission, not wanted or
- requested by</strong></del></span> the <span
class="removed"><del><strong>user, clearly must constitute
spying</strong></del></span> <span
class="inserted"><ins><em>injustice</em></ins></span> of <span
class="removed"><del><strong>some
- kind.</p></li>
-
- <li><p>A Motorola phone
- <a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
- listens</strong></del></span> <span class="inserted"><ins><em>nonfree
software. It may avoid
- paying</em></ins></span> for <span class="removed"><del><strong>voice
all</strong></del></span> the <span
class="removed"><del><strong>time</a>.</p>
- </li>
-
- <li><p>Spyware in Android phones (and Windows? laptops): The Wall
- Street Journal (in an article blocked from us by a paywall)
- reports that
- <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
- the FBI can remotely activate the GPS and microphone in Android
- phones and laptops</a>.
- (I suspect this means Windows laptops.) Here is
- <a href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
- </li>
-
- <li><p>Portable phones with GPS will send their GPS location on
- remote command and users cannot stop them:
- <a
href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
-
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
- (The US says it will eventually require all new portable phones
- to have GPS.)</p>
- </li>
-
- <li><p>The nonfree Snapchat app's principal purpose is to
restrict
- the use of data on the user's computer, but it does surveillance
- too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
- it tries to get the user's list of other people's phone
- numbers.</a></p></strong></del></span> <span
class="inserted"><ins><em>nasty thing, but cannot make it less
nasty.</p></em></ins></span>
+ <p>This illustrates that making unauthorized copies of nonfree
software
+ is not a cure for the injustice of nonfree software. It may avoid
+ paying for the nasty thing, but cannot make it less nasty.</p>
</li>
</ul>
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInMobileApps">Mobile
Apps</h4></em></ins></span>
+ <h4 id="SpywareInMobileApps">Mobile Apps</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li>
- <p>The moviepass app and dis-service spy on users even more than
users
- expected. It</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
- where they travel before</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and <span
class="removed"><del><strong>after going</strong></del></span> <span
class="inserted"><ins><em>privacy-enhancing features
- of the operating system, in order</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
- </p>
-
- <p>Don't be tracked — pay
cash!</p></strong></del></span> <span class="inserted"><ins><em>gather as
much private data as
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
they possibly can.</p>
<p>Thus, we can't trust rules against spying. What we can trust is
- having control over the software we run.</p></em></ins></span>
+ having control over the software we run.</p>
</li>
- <span class="removed"><del><strong><li><p>AI-powered
driving</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907080">
- <p>Many Android</em></ins></span> apps can
- <span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move"></strong></del></span>
track <span class="removed"><del><strong>your every move</a>.</p>
- </li>
-
- <li><p>The Sarahah app</strong></del></span>
- <span class="inserted"><ins><em>users' movements even when the user
says</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note that this article misuses the words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring</strong></del></span> <span class="inserted"><ins><em>allow
them access</em></ins></span> to <span class="removed"><del><strong>zero
price.</p></strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ <li id="M201907080">
+ <p>Many Android apps can track
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally by malicious apps.</p></em></ins></span>
+ exploited intentionally by malicious apps.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Facebook's</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app <span
class="removed"><del><strong>listens all the time,</strong></del></span> <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
+ <li id="M201905300">
+ <p>The Femm “fertility” app is secretly a <a
+
href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
- <p>It snoops</em></ins></span> on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
- be analyzing people's conversations to serve them with targeted
- advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>users, too, as you must expect from nonfree
- programs.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to <span
class="removed"><del><strong>personal data in the device</a>.
- </p>
+ <p>It snoops on users, too, as you must expect from nonfree
+ programs.</p>
</li>
- <li>
- <p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in</strong></del></span> <span
class="inserted"><ins><em>run a</em></ins></span> proprietary <span
class="removed"><del><strong>search app that it will</a>
- pre-install on some of its phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>phone app</a> to be allowed
into</em></ins></span>
- the <span class="inserted"><ins><em>event.</p>
+ <li id="M201905060">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
- <p>This</em></ins></span> app is <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed</strong></del></span> <span
class="inserted"><ins><em>a spyware that can snoop</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>a lot of
- sensitive data, including user's location</em></ins></span> and <span
class="inserted"><ins><em>contact list, and has <a
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the
- <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
- app remains spyware—an “optional” piece of spyware is
- still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>phone.</p></em></ins></span>
+ near-complete control</a> over the phone.</p>
</li>
- <span class="removed"><del><strong><li><p>The Meitu photo-editing
- app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p></li>
-
- <li><p>A</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904131">
- <p>Data collected by menstrual and</em></ins></span> pregnancy <span
class="removed"><del><strong>test controller application not only
- can</strong></del></span> <span class="inserted"><ins><em>monitoring apps is
often</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of data in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available to employers and insurance companies</a>. Even
though</em></ins></span> the <span
class="removed"><del><strong>phone,</strong></del></span>
- <span class="inserted"><ins><em>data is
“anonymized</em></ins></span> and <span class="removed"><del><strong>in
server accounts,</strong></del></span> <span
class="inserted"><ins><em>aggregated,”</em></ins></span> it can
- <span class="removed"><del><strong>alter them too</a>.
- </p></li>
-
- <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</strong></del></span> <span
class="inserted"><ins><em>easily be
- traced back to</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>woman who
uses</em></ins></span> the <span class="removed"><del><strong>user's
consent”</strong></del></span> <span
class="inserted"><ins><em>app.</p>
+ <li id="M201904131">
+ <p>Data collected by menstrual and pregnancy monitoring apps is
often <a
+
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
+ available to employers and insurance companies</a>. Even though the
+ data is “anonymized and aggregated,” it can easily be
+ traced back to the woman who uses the app.</p>
- <p>This has harmful implications</em></ins></span> for <span
class="removed"><del><strong>surveillance is inadequate
as</strong></del></span> <span class="inserted"><ins><em>women's rights to
equal employment
+ <p>This has harmful implications for women's rights to equal
employment
and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging</strong></del></span> <span
class="inserted"><ins><em>reward to do so. A
- free-software</em></ins></span> app <span
class="removed"><del><strong><a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps</strong></del></span> that <span
class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>does more or less the same thing without
- spying</em></ins></span> on <span class="removed"><del><strong>what radio
and TV programs
- are playing nearby</a>. Also on what users post on various sites
- such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>you is available from <a
-
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>Twitter.</p>
- </li>
-
- <li><p>Facebook's</strong></del></span> <span
class="inserted"><ins><em><a
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
+ spying on you is available from <a
+ href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a</em></ins></span> new <span class="removed"><del><strong>Magic Photo
app</strong></del></span> <span class="inserted"><ins><em>one is being
developed</a>.</p>
+ a new one is being developed</a>.</p>
</li>
<li id="M201904130">
<p>Google tracks the movements of Android phones and iPhones
- running Goggle apps, and sometimes</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
- saves the data</em></ins></span> for <span
class="removed"><del><strong>known faces</a>,
- and suggests you to share</strong></del></span> <span
class="inserted"><ins><em>years</a>.</p>
-
- <p>Nonfree software in</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>phone has</em></ins></span> to <span
class="removed"><del><strong>who
- is in</strong></del></span> <span class="inserted"><ins><em>be
responsible for sending</em></ins></span>
- the <span class="removed"><del><strong>frame.</p>
+ running Goggle apps, and sometimes <a
+
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
+ saves the data for years</a>.</p>
- <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>location data</em></ins></span> to <span
class="removed"><del><strong>require online</strong></del></span> <span
class="inserted"><ins><em>Google.</p>
+ <p>Nonfree software in the phone has to be responsible for sending
+ the location data to Google.</p>
</li>
<li id="M201903251">
<p>Many Android phones come with a huge number of <a
href="https://elpais.com/elpais/2019/03/22/inenglish/1553244778_819882.html">
- preinstalled nonfree apps that have</em></ins></span> access to <span
class="removed"><del><strong>some
- known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>sensitive data without
- users' knowledge</a>. These hidden apps may either call home
with</em></ins></span>
- the <span class="removed"><del><strong>pictures are
likely</strong></del></span> <span class="inserted"><ins><em>data, or pass it
on</em></ins></span> to <span class="removed"><del><strong>be
- sent across the wire</strong></del></span> <span
class="inserted"><ins><em>user-installed apps that have
access</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers and face-recognition
- algorithms.</p>
-
- <p>If so, none of Facebook users' pictures are private
- anymore, even if</strong></del></span>
- the <span class="removed"><del><strong>user didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>network but no
direct access</em></ins></span> to the <span
class="removed"><del><strong>service.</p>
- </li>
-
- <li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>data.
This results in massive
- surveillance</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM and snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>which the
user has absolutely no control.</p>
+ preinstalled nonfree apps that have access to sensitive data without
+ users' knowledge</a>. These hidden apps may either call home with
+ the data, or pass it on to user-installed apps that have access to
+ the network but no direct access to the data. This results in massive
+ surveillance on which the user has absolutely no control.</p>
</li>
<li id="M201903201">
- <p>A study of 24 “health” apps found that 19 of
them</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data</em></ins></span> to <span
class="removed"><del><strong>realize that</strong></del></span> <span
class="inserted"><ins><em>third parties</a>, which can
use</em></ins></span> it
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ <p>A study of 24 “health” apps found that 19 of them
<a
+
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
- <p>Whenever user “consent”</em></ins></span> is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways</strong></del></span> <span
class="inserted"><ins><em>sought, it is buried in
- lengthy terms of service</em></ins></span> that <span
class="removed"><del><strong>they present snooping as a
way</strong></del></span> <span class="inserted"><ins><em>are
difficult</em></ins></span> to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>understand. In any case,
- “consent”</em></ins></span> is <span
class="removed"><del><strong>a typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>not sufficient to legitimize
snooping.</p></em></ins></span>
- </li>
- <span
class="removed"><del><strong><li><p>Many</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902230">
- <p>Facebook offered a convenient</em></ins></span> proprietary <span
class="removed"><del><strong>apps</strong></del></span>
- <span class="inserted"><ins><em>library</em></ins></span> for <span
class="inserted"><ins><em>building</em></ins></span> mobile <span
class="removed"><del><strong>devices report</strong></del></span> <span
class="inserted"><ins><em>apps,</em></ins></span> which <span
class="removed"><del><strong>other
- apps the user has
- installed.</strong></del></span> <span
class="inserted"><ins><em>also</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
- sent personal data to Facebook</a>. Lots of companies built
apps</em></ins></span> that <span class="removed"><del><strong>at least is
visible</strong></del></span>
- <span class="inserted"><ins><em>way</em></ins></span> and
- <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>released them,
apparently not realizing that all the personal
- data they collected would go to Facebook</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span> <span
class="inserted"><ins><em>well.</p>
-
- <p>It shows that no one can trust a nonfree program, not
even</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>developers of other nonfree
programs.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android</em></ins></span> apps <span class="removed"><del><strong>snoop on the
user</a>. This is in addition to
- the snooping done by the phone company,</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> and <span
class="removed"><del><strong>perhaps by the OS in the
- phone.</p>
-
- <p>Don't be distracted by the question</strong></del></span>
- <span class="inserted"><ins><em>misuse users' personal data</a>.
As</em></ins></span> of <span
class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>March 2019, nearly
- 78,000 have been analyzed, of which 24,000 (31%)
transmit</em></ins></span> the <span class="removed"><del><strong>app
developers get
- users</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Whenever user “consent” is sought, it is buried in
+ lengthy terms of service that are difficult to understand. In any case,
+ “consent” is not sufficient to legitimize snooping.</p>
+ </li>
+
+ <li id="M201902230">
+ <p>Facebook offered a convenient proprietary
+ library for building mobile apps, which also <a
+ href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
+ sent personal data to Facebook</a>. Lots of companies built apps that
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
+
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
+ </li>
+
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
+ misuse users' personal data</a>. As of March 2019, nearly
+ 78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p>
- </li>
-
- <li><p>The Brightest Flashlight app</strong></del></span> <span
class="inserted"><ins><em>other companies, and</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation, for use by
companies.</a></p>
-
- <p>The FTC criticized this app because it
asked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of</em></ins></span> the <span
class="removed"><del><strong>user to
- approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>total) link this ID</em></ins></span> to <span
class="removed"><del><strong>the app developer but did not
- ask about sending</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ Advertising ID</a> to other companies, and <a
+ href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
<p>Collecting hardware identifiers is in apparent violation of
- Google's policies. But</em></ins></span> it <span
class="inserted"><ins><em>seems that Google wasn't aware of it,
- and, once informed, was in no hurry</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>take action.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>proves
- that</em></ins></span> the
- <span class="removed"><del><strong>weakness</strong></del></span> <span
class="inserted"><ins><em>policies</em></ins></span> of <span
class="removed"><del><strong>the reject-it-if-you-dislike-snooping
- “solution” to surveillance: why should</strong></del></span>
a <span class="removed"><del><strong>flashlight
- app send any information to anyone? A free</strong></del></span> <span
class="inserted"><ins><em>development platform are ineffective at
- preventing nonfree</em></ins></span> software <span
class="removed"><del><strong>flashlight
- app would not.</p></strong></del></span> <span
class="inserted"><ins><em>developers from including malware in
- their programs.</p></em></ins></span>
+ Google's policies. But it seems that Google wasn't aware of it,
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
+ preventing nonfree software developers from including malware in
+ their programs.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902060">
+ <li id="M201902060">
<p>Many nonfree apps have a surveillance feature for <a
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li>
- <p>A remote-control sex toy</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
@@ -1517,7 +1103,7 @@
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
- the user interface of most of them</em></ins></span> was <span
class="removed"><del><strong>found</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to make <span
class="inserted"><ins><em>uninstallation
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
<p>Users should of course uninstall these dangerous apps if they
@@ -1528,8 +1114,8 @@
<li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps in Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
source code—often used for invasive advertising—that could
@@ -1563,7 +1149,7 @@
</li>
<li id="M201812290">
- <p>Around 40%</em></ins></span> of <span
class="inserted"><ins><em>gratis Android apps <a
+ <p>Around 40% of gratis Android apps <a
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
report on the user's actions to Facebook</a>.</p>
@@ -1649,7 +1235,8 @@
<li id="M201711240">
<p>Tracking software in popular Android apps
- is pervasive and sometimes very clever. Some trackers can <a
+ is pervasive</em></ins></span> and <span
class="removed"><del><strong>TigerVPN</dt>
+ <dd>Requests</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
@@ -1659,46 +1246,80 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article misuses the words
+ book to developer's server. Note that this article
misuses</em></ins></span> the <span
class="removed"><del><strong><code>READ_LOGS</code>
permission</strong></del></span> <span class="inserted"><ins><em>words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
+ referring</em></ins></span> to <span class="removed"><del><strong>read logs
+ for other</strong></del></span> <span class="inserted"><ins><em>zero
price.</p>
</li>
<li id="M201707270">
- <p>20 dishonest Android apps recorded <a
+ <p>20 dishonest Android</em></ins></span> apps <span
class="inserted"><ins><em>recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls and sent them and text messages and emails to
snoopers</a>.</p>
+ calls</em></ins></span> and <span class="removed"><del><strong>also core
system logs. TigerVPN developers
+ have confirmed this.</dd>
+
+ <dt>HideMyAss</dt>
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs
+ and may turn</strong></del></span> <span
class="inserted"><ins><em>sent</em></ins></span> them <span
class="removed"><del><strong>over</strong></del></span> <span
class="inserted"><ins><em>and text messages and emails</em></ins></span> to
<span class="inserted"><ins><em>snoopers</a>.</p>
+
+ <p>Google did not intend to make these apps spy;
on</em></ins></span> the <span class="removed"><del><strong>UK government if
+ requested.</dd>
- <p>Google did not intend to make these apps spy; on the contrary, it
- worked in various ways to prevent that, and deleted these apps after
+ <dt>VPN Services HotspotShield</dt>
+ <dd>Injects JavaScript code into the HTML pages
returned</strong></del></span> <span class="inserted"><ins><em>contrary, it
+ worked in various ways</em></ins></span> to <span
class="inserted"><ins><em>prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
- for the snooping of these apps.</p>
+ for</em></ins></span> the
+ <span class="removed"><del><strong>users. The stated
purpose</strong></del></span> <span
class="inserted"><ins><em>snooping</em></ins></span> of <span
class="inserted"><ins><em>these apps.</p>
+
+ <p>On</em></ins></span> the <span class="removed"><del><strong>JS
injection is to display
+ ads. Uses roughly 5 tracking libraries. Also, it redirects the
+ user's traffic through valueclick.com (an advertising
+ website).</dd>
- <p>On the other hand, Google redistributes nonfree Android apps, and
- therefore shares in the responsibility for the injustice of their being
+ <dt>WiFi Protector VPN</dt>
+ <dd>Injects JavaScript code into HTML pages,</strong></del></span>
<span class="inserted"><ins><em>other hand, Google redistributes nonfree
Android apps,</em></ins></span> and <span class="removed"><del><strong>also uses
+ roughly 5 tracking libraries. Developers</strong></del></span>
+ <span class="inserted"><ins><em>therefore shares in the responsibility for
the injustice</em></ins></span> of <span class="removed"><del><strong>this
app</strong></del></span> <span class="inserted"><ins><em>their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
- <p>Could Google have done a better job of preventing apps from
+ <p>Could Google</em></ins></span> have
+ <span class="removed"><del><strong>confirmed that the non-premium
version</strong></del></span> <span class="inserted"><ins><em>done a better
job</em></ins></span> of <span class="inserted"><ins><em>preventing apps from
cheating? There is no systematic way for Google, or Android users,
to inspect executable proprietary apps to see what they do.</p>
- <p>Google could demand the source code for these apps, and study
- the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could more or less
- prevent such snooping, except when the app developers are clever
- enough to outsmart the checking.</p>
-
- <p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release of source code to the
- public, so we can depend on each other.</p>
+ <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>app does
+ JavaScript injection</strong></del></span> <span
class="inserted"><ins><em>source code</em></ins></span> for <span
class="removed"><del><strong>tracking</strong></del></span> <span
class="inserted"><ins><em>these apps,</em></ins></span> and <span
class="removed"><del><strong>display ads.</dd>
+ </dl>
+</li>
+<li>
+ <p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A</strong></del></span>
study
+ <span class="inserted"><ins><em>the source code somehow to determine
whether they mistreat users</em></ins></span> in <span
class="removed"><del><strong>2015</a> found that 90%</strong></del></span>
+ <span class="inserted"><ins><em>various ways. If it did a good
job</em></ins></span> of <span class="inserted"><ins><em>this, it could more or
less
+ prevent such snooping, except when</em></ins></span> the <span
class="removed"><del><strong>top-ranked gratis
+ proprietary Android apps contained recognizable tracking libraries.
For</strong></del></span> <span class="inserted"><ins><em>app developers are
clever
+ enough to outsmart</em></ins></span> the <span
class="removed"><del><strong>paid proprietary</strong></del></span> <span
class="inserted"><ins><em>checking.</p>
+
+ <p>But since Google itself develops malicious</em></ins></span>
apps, <span class="removed"><del><strong>it was only 60%.</p>
+
+ <p>The article confusingly describes gratis apps as “free”,
+ but most</strong></del></span> <span class="inserted"><ins><em>we cannot
trust
+ Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>them are not in fact
+ <a href="/philosophy/free-sw.html">free software</a>.
+ It also uses</strong></del></span> <span class="inserted"><ins><em>source
code to</em></ins></span> the <span class="removed"><del><strong>ugly word
“monetize”. A good replacement
+ for that word is “exploit”; nearly always that will fit
+ perfectly.</p></strong></del></span>
+ <span class="inserted"><ins><em>public, so we can depend on each
other.</p></em></ins></span>
</li>
- <li id="M201705230">
- <p>Apps for BART <a
-
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop on users</a>.</p>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705230"></em></ins></span>
+ <p>Apps for BART <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop</em></ins></span> on users</a>.</p>
<p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
@@ -1706,11 +1327,14 @@
<p>With proprietary apps, one can only hope that they
don't.</p>
</li>
- <li id="M201705040">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705040"></em></ins></span>
<p>A study found 234 Android apps that track users by <a
href="https://www.bleepingcomputer.com/news/security/234-android-applications-are-currently-using-ultrasonic-beacons-to-track-users/">listening
- to ultrasound from beacons placed in stores or played by TV
- programs</a>.</p>
+ to ultrasound from beacons placed in stores or played by TV <span
class="removed"><del><strong>programs</a>.
+ </p></strong></del></span>
+ <span class="inserted"><ins><em>programs</a>.</p>
</li>
<li id="M201704260">
@@ -1730,78 +1354,128 @@
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ the app to snoop at all</a>.</p></em></ins></span>
</li>
- <li id="M201704074">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074"></em></ins></span>
<p>Pairs of Android apps can collude
to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
- <li id="M201703300">
- <p>Verizon <a
-
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
- about the users' searches that Google normally gets when they use
+<span class="removed"><del><strong><li>
+<p>Google Play intentionally sends app developers</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703300">
+ <p>Verizon</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://gadgets.ndtv.com/apps/news/google-play-store-policy-raises-privacy-concerns-331116">
+the personal details of users</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app</em></ins></span> that <span
class="removed"><del><strong>install the app</a>.</p>
+
+<p>Merely asking the “consent”</strong></del></span> <span
class="inserted"><ins><em>it will</a> pre-install
+ on some</em></ins></span> of <span class="removed"><del><strong>users is
not enough
+to legitimize actions like this. At this point, most users have
+stopped reading</strong></del></span> <span class="inserted"><ins><em>its
phones. The app will give Verizon</em></ins></span> the <span
class="removed"><del><strong>“Terms and
Conditions”</strong></del></span> <span class="inserted"><ins><em>same
information
+ about the users' searches</em></ins></span> that <span
class="removed"><del><strong>spell out
+what they are “consenting” to.</strong></del></span> Google <span
class="removed"><del><strong>should clearly
+and honestly identify</strong></del></span> <span
class="inserted"><ins><em>normally gets when they use
its search engine.</p>
- <p>Currently, the app is <a
+ <p>Currently,</em></ins></span> the <span
class="removed"><del><strong>information it collects</strong></del></span>
<span class="inserted"><ins><em>app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
+ being pre-installed</em></ins></span> on <span
class="removed"><del><strong>users, instead
+of hiding it in an obscurely worded EULA.</p>
+
+<p>However, to truly protect people's privacy, we must prevent
Google</strong></del></span> <span class="inserted"><ins><em>only one
phone</a>,</em></ins></span> and <span class="removed"><del><strong>other
companies from getting this personal information in</strong></del></span> the
<span class="removed"><del><strong>first
+place!</p>
+</li>
+
+ <li>
+ <p>Google Play (a component</strong></del></span> <span
class="inserted"><ins><em>user must
explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece of spyware is
+ remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>Android)</strong></del></span> <span
class="inserted"><ins><em>spyware is
still spyware.</p>
</li>
<li id="M201701210">
- <p>The Meitu photo-editing app <a
-
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ <p>The Meitu photo-editing app</em></ins></span> <a
+ <span
class="removed"><del><strong>href="https://www.extremetech.com/mobile/235594-yes-google-play-is-tracking-you-and-thats-just-the-tip-of-a-very-large-iceberg"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
- <p>The Uber app tracks <a
-
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
+ <p>The Uber app</em></ins></span> tracks <span
class="removed"><del><strong>the users'</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'</em></ins></span>
+ movements <span class="removed"><del><strong>without their
permission</a>.</p>
+
+ <p>Even if you disable Google Maps</strong></del></span> <span
class="inserted"><ins><em>before</em></ins></span> and <span
class="removed"><del><strong>location tracking, you must
+ disable Google Play itself to completely stop</strong></del></span> <span
class="inserted"><ins><em>after</em></ins></span> the <span
class="removed"><del><strong>tracking. This is
+ yet another</strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
- <p>This example illustrates how “getting the user's
- consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ <p>This</em></ins></span> example <span
class="removed"><del><strong>of nonfree software pretending to
obey</strong></del></span> <span class="inserted"><ins><em>illustrates how
“getting</em></ins></span> the <span class="removed"><del><strong>user,
+ when it's actually doing something else. Such</strong></del></span> <span
class="inserted"><ins><em>user's
+ consent” for surveillance is inadequate as</em></ins></span> a <span
class="removed"><del><strong>thing would be almost
+ unthinkable with free software.</p></strong></del></span> <span
class="inserted"><ins><em>protection against
+ massive surveillance.</p></em></ins></span>
</li>
- <li id="M201611160">
+ <span class="removed"><del><strong><li><p>More than 73%
of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security of
- 283 Android VPN apps concluded that “in spite of the promises
- for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may be unawarely subject to poor security
+ research paper</a> that investigated</em></ins></span> the <span
class="removed"><del><strong>most popular</strong></del></span> <span
class="inserted"><ins><em>privacy and security of
+ 283</em></ins></span> Android <span
class="inserted"><ins><em>VPN</em></ins></span> apps
+ <span class="removed"><del><strong><a
href="http://jots.pub/a/2015103001/index.php">share personal,
+ behavioral</strong></del></span> <span class="inserted"><ins><em>concluded
that “in spite of the promises
+ for privacy, security,</em></ins></span> and <span
class="removed"><del><strong>location
information</a></strong></del></span> <span
class="inserted"><ins><em>anonymity given by the majority of VPN
+ apps—millions</em></ins></span> of <span
class="removed"><del><strong>their</strong></del></span> users <span
class="removed"><del><strong>with third parties.</p>
+ </li>
+
+ <li><p>“Cryptic communication,”
unrelated</strong></del></span> <span class="inserted"><ins><em>may be
unawarely subject</em></ins></span> to <span class="inserted"><ins><em>poor
security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
+ <p>Following is a non-exhaustive list, taken from</em></ins></span>
the <span class="removed"><del><strong>app's functionality,
+ was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
+ found in the 500 most popular gratis Android apps</a>.</p>
+
+ <p>The article should not have described these</strong></del></span>
<span class="inserted"><ins><em>research paper,
+ of some proprietary VPN</em></ins></span> apps <span
class="inserted"><ins><em>that track users and infringe their
privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
- <dd>Includes tracking libraries such as NativeX and Appflood,
- meant to track users and show them targeted ads.</dd>
+ <dd>Includes tracking libraries such</em></ins></span> as
+ <span class="removed"><del><strong>“free”—they are not
free software. The clear way</strong></del></span> <span
class="inserted"><ins><em>NativeX and Appflood,
+ meant</em></ins></span> to <span class="removed"><del><strong>say
+ “zero price” is “gratis.”</p>
+
+ <p>The article takes for granted that</strong></del></span> <span
class="inserted"><ins><em>track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
- <dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning it has full access to users'
+ <dd>Requests</em></ins></span> the <span
class="removed"><del><strong>usual analytics tools are
+ legitimate, but is that valid? Software developers have no
right</strong></del></span> <span
class="inserted"><ins><em><code>READ_SMS</code> and
<code>SEND_SMS</code>
+ permissions upon installation, meaning it has full
access</em></ins></span> to
+ <span class="removed"><del><strong>analyze what users are doing or how.
“Analytics” tools that snoop are
+ just as wrong as any</strong></del></span> <span
class="inserted"><ins><em>users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
<dd>Requests the <code>READ_LOGS</code> permission to
read logs
- for other apps and also core system logs. TigerVPN developers have
+ for</em></ins></span> other <span
class="removed"><del><strong>snooping.</p>
+ </li>
+ <li><p>Gratis Android</strong></del></span> apps <span
class="removed"><del><strong>(but not <a
href="/philosophy/free-sw.html">free software</a>)
+ connect</strong></del></span> <span class="inserted"><ins><em>and also
core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
+ <dd>Sends traffic</em></ins></span> to <span
class="removed"><del><strong>100
+ <a
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</strong></del></span>
<span class="inserted"><ins><em>LinkedIn. Also, it stores detailed logs and
may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -1811,52 +1485,108 @@
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
- <dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have confirmed that
- the non-premium version of the app does JavaScript injection for
+ <dd>Injects JavaScript code into HTML pages,</em></ins></span> and
<span class="removed"><del><strong>advertising</a> URLs,
+ on</strong></del></span> <span class="inserted"><ins><em>also uses
roughly
+ five tracking libraries. Developers of this app have confirmed
that</em></ins></span>
+ the <span
class="removed"><del><strong>average.</p></strong></del></span> <span
class="inserted"><ins><em>non-premium version of the app does JavaScript
injection for
tracking the user and displaying ads.</dd>
- </dl>
+ </dl></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
+ Some Motorola phones modify Android to</strong></del></span>
- <li id="M201609210">
- <p>Google's new voice messaging app <a
-
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
+ <span class="inserted"><ins><em><li id="M201609210">
+ <p>Google's new voice messaging app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
+ send personal data to Motorola</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></em></ins></span>
</li>
- <li id="M201606050">
- <p>Facebook's new Magic Photo app <a
-
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+ <span class="removed"><del><strong><li><p>Some manufacturers add
a</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201606050">
+ <p>Facebook's new Magic Photo app</em></ins></span> <a <span
class="removed"><del><strong>href="http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/">
+ hidden general surveillance package such as Carrier
IQ.</a></p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to who is
- in the frame.</p>
+ and suggests you</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>share</em></ins></span> the <span
class="removed"><del><strong>system.</p>
+ </li>
+</ul>
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across the wire to Facebook's servers and face-recognition
+
+
+<!-- #SpywareOnMobiles -->
+<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>picture you take according</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnMobiles">Spyware on Mobiles</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnMobiles">#SpywareOnMobiles</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareIniThings">Spyware</strong></del></span> <span
class="inserted"><ins><em>who is</em></ins></span>
+ in <span class="removed"><del><strong>iThings</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareIniThings">#SpywareIniThings</a>)</span>
+</div>
+
+<ul>
+ <li><p>The DMCA and</strong></del></span> the <span
class="removed"><del><strong>EU Copyright Directive make it <a
+href="https://boingboing.net/2017/11/25/la-la-la-cant-hear-you.html">
+ illegal</strong></del></span> <span
class="inserted"><ins><em>frame.</p>
+
+ <p>This spyware feature seems</em></ins></span> to <span
class="removed"><del><strong>study how iOS cr...apps spy on users</a>,
because this
+ would</strong></del></span> require <span
class="removed"><del><strong>circumventing</strong></del></span> <span
class="inserted"><ins><em>online access to some
+ known-faces database, which means</em></ins></span> the <span
class="removed"><del><strong>iOS DRM.</p>
+ </li>
+
+ <li><p>In</strong></del></span> <span
class="inserted"><ins><em>pictures are likely to be
+ sent across</em></ins></span> the <span
class="removed"><del><strong>latest iThings system, “turning off”
WiFi</strong></del></span> <span class="inserted"><ins><em>wire to Facebook's
servers</em></ins></span> and <span
class="removed"><del><strong>Bluetooth</strong></del></span> <span
class="inserted"><ins><em>face-recognition
algorithms.</p>
<p>If so, none of Facebook users' pictures are private anymore,
- even if the user didn't “upload” them to the service.</p>
+ even if</em></ins></span> the
+ <span class="removed"><del><strong>obvious way <a
+
href="https://www.theguardian.com/technology/2017/sep/21/ios-11-apple-toggling-wifi-bluetooth-control-centre-doesnt-turn-them-off">
+ doesn't really turn them off</a>.
+ A more advanced way really does turn them off—only until 5am.
+ That's Apple for you—“We know you want</strong></del></span>
<span class="inserted"><ins><em>user didn't “upload”
them</em></ins></span> to <span class="removed"><del><strong>be spied
on”.</p></strong></del></span> <span class="inserted"><ins><em>the
service.</p></em></ins></span>
</li>
- <li id="M201605310">
- <p>Facebook's app listens all the time, <a
-
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
- snoop on what people are listening to or watching</a>. In addition,
- it may be analyzing people's conversations to serve them with targeted
+ <span class="removed"><del><strong><li><p>Apple
proposes</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201605310">
+ <p>Facebook's app listens all the time,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/15/apple-removing-iphone-home-button-fingerprint-scanning-screen">a
fingerprint-scanning touch screen</a>
+ — which would mean no way</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
+ snoop on what people are listening</em></ins></span> to <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>or watching</a>. In addition,</em></ins></span>
+ it <span class="removed"><del><strong>without having your fingerprints
+ taken. Users would have no way</strong></del></span> <span
class="inserted"><ins><em>may be analyzing people's
conversations</em></ins></span> to <span class="removed"><del><strong>tell
whether the phone is snooping on
+ them.</p></li>
+
+ <li><p>iPhones</strong></del></span> <span
class="inserted"><ins><em>serve them with targeted
advertisements.</p>
</li>
<li id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server accounts,
- it can alter them too</a>.</p>
+ <p>A pregnancy test controller application not only
can</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send
+ lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts</em></ins></span> of <span
class="removed"><del><strong>personal</strong></del></span> data <span
class="removed"><del><strong>to Apple's servers</a>. Big
Brother</strong></del></span> <span class="inserted"><ins><em>in the phone, and
in server accounts,
+ it</em></ins></span> can
+ <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>alter</em></ins></span> them <span
class="removed"><del><strong>from there.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
</li>
- <li id="M201601130">
- <p>Apps that include <a
+ <span class="removed"><del><strong><li><p>The iMessage app on
iThings <a
href="https://theintercept.com/2016/09/28/apple-logs-your-imessage-contacts-and-may-share-them-with-police/">tells
+ a server every phone number</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201601130">
+ <p>Apps</em></ins></span> that <span
class="inserted"><ins><em>include <a
href="https://web.archive.org/web/20180913014551/http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
Symphony surveillance software snoop on what radio and TV programs
are playing nearby</a>. Also on what users post on various sites
@@ -1865,94 +1595,221 @@
<li id="M201511190">
<p>“Cryptic communication,”
- unrelated to the app's functionality, was <a
+ unrelated to</em></ins></span> the <span class="removed"><del><strong>user
types into it</a>;</strong></del></span> <span
class="inserted"><ins><em>app's functionality, was <a
href="http://news.mit.edu/2015/data-transferred-android-apps-hiding-1119">
- found in the 500 most popular gratis Android apps</a>.</p>
+ found in</em></ins></span> the <span class="removed"><del><strong>server
records</strong></del></span> <span class="inserted"><ins><em>500 most popular
gratis Android apps</a>.</p>
- <p>The article should not have described these apps as
- “free”—they are not free software. The clear way
- to say “zero price” is “gratis.”</p>
-
- <p>The article takes for granted that the usual analytics tools are
- legitimate, but is that valid? Software developers have no right to
- analyze what users are doing or how. “Analytics” tools
- that snoop are just as wrong as any other snooping.</p>
+ <p>The article should not have described</em></ins></span> these
<span class="removed"><del><strong>numbers for at least 30
+ days.</p>
</li>
- <li id="M201510300">
- <p>More than 73% and 47% of mobile applications, from Android and iOS
- respectively <a href="https://techscience.org/a/2015103001/">share
+ <li><p>Users cannot make an Apple ID <a
href="http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool">(necessary</strong></del></span>
<span class="inserted"><ins><em>apps as
+ “free”—they are not free software. The clear
way</em></ins></span>
+ to <span class="removed"><del><strong>install even gratis apps)</a>
+ without giving a valid email address and receiving</strong></del></span>
<span class="inserted"><ins><em>say “zero price” is
“gratis.”</p>
+
+ <p>The article takes for granted that</em></ins></span> the <span
class="removed"><del><strong>code Apple
+ sends</strong></del></span> <span class="inserted"><ins><em>usual
analytics tools are
+ legitimate, but is that valid? Software developers have no
right</em></ins></span> to <span
class="removed"><del><strong>it.</p></strong></del></span>
+ <span class="inserted"><ins><em>analyze what users are doing or how.
“Analytics” tools
+ that snoop are just as wrong as any other
snooping.</p></em></ins></span>
+ </li>
+
+ <span
class="removed"><del><strong><li><p>Around</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201510300">
+ <p>More than 73% and</em></ins></span> 47% of <span
class="removed"><del><strong>the most popular</strong></del></span> <span
class="inserted"><ins><em>mobile applications, from Android
and</em></ins></span> iOS <span
class="removed"><del><strong>apps</strong></del></span>
+ <span class="inserted"><ins><em>respectively</em></ins></span> <a <span
class="removed"><del><strong>class="not-a-duplicate"
+
href="http://jots.pub/a/2015103001/index.php">share</strong></del></span>
<span
class="inserted"><ins><em>href="https://techscience.org/a/2015103001/">share</em></ins></span>
personal, behavioral and location information</a> of their users with
third parties.</p>
</li>
- <li id="M201508210">
- <p>Like most “music screaming” disservices, Spotify is
- based on proprietary malware (DRM and snooping). In August 2015 it <a
-
href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some are
starting
- to realize that it is nasty.</p>
-
- <p>This article shows the <a
-
href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as a way to “serve”
+ <span class="removed"><del><strong><li><p>iThings automatically
upload to Apple's servers all the photos and
+ videos they make.</p>
+
+ <blockquote><p>
+ iCloud Photo Library stores every photo and video you take,
+ and keeps them up to date on all your devices.
+ Any edits you make are automatically updated everywhere. [...]
+ </p></blockquote>
+
+ <p>(From <a
href="https://www.apple.com/icloud/photos/">Apple's iCloud
+ information</a> as accessed on 24 Sep 2015.) The iCloud feature is
+ <a href="https://support.apple.com/en-us/HT202033">activated by the
+ startup of iOS</a>. The term “cloud” means
+ “please don't ask where.”</p>
+
+ <p>There</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201508210">
+ <p>Like most “music screaming” disservices,
Spotify</em></ins></span> is <span class="removed"><del><strong>a way to <a
href="https://support.apple.com/en-us/HT201104">
+ deactivate iCloud</a>, but it's active by default
so</strong></del></span>
+ <span class="inserted"><ins><em>based on proprietary malware (DRM and
snooping). In August 2015</em></ins></span> it <span
class="removed"><del><strong>still counts as a
+ surveillance functionality.</p>
+
+ <p>Unknown people apparently took advantage of this
to</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
+ nude photos of many celebrities</a>. They needed to break Apple's
+ security</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of them through
+ <a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+ </p></li>
+
+ <li><p>Spyware in iThings:
+ the <a class="not-a-duplicate"
+
href="http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html">
+ iBeacon</a> lets stores determine exactly where the iThing
is,</strong></del></span> <span class="inserted"><ins><em>increased
snooping</a>,</em></ins></span> and <span
class="removed"><del><strong>get other info too.</p>
+ </li>
+
+ <li><p>There is also a feature for web
sites</strong></del></span> <span class="inserted"><ins><em>some are
starting</em></ins></span>
+ to <span class="removed"><del><strong>track users, which is
+ <a
href="http://nakedsecurity.sophos.com/2012/10/17/how-to-disable-apple-ios-user-tracking-ios-6/">
+ enabled by default</a>. (That article talks about iOS 6,
but</strong></del></span> <span class="inserted"><ins><em>realize
that</em></ins></span> it is <span class="removed"><del><strong>still true in
iOS 7.)</p>
+ </li>
+
+ <li><p>The iThing also</strong></del></span> <span
class="inserted"><ins><em>nasty.</p>
+
+ <p>This article shows the</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313215042/http://www.theregister.co.uk/2013/08/08/ios7_tracking_now_its_a_favourite_feature/">
+ tells Apple its geolocation</a> by default,
though</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways</em></ins></span> that <span class="removed"><del><strong>can
be
+ turned off.</p>
+ </li>
+
+ <li><p>Apple can, and regularly does,
+ <a
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span> <span
class="inserted"><ins><em>they present snooping as a way to “serve”
users better</a>—never mind whether they want that. This is a
- typical example of the attitude of the proprietary software industry
+ typical example of</em></ins></span> the <span
class="removed"><del><strong>state</a>.</p></strong></del></span>
<span class="inserted"><ins><em>attitude of the proprietary software industry
towards those they have subjugated.</p>
- <p>Out, out, damned Spotify!</p>
+ <p>Out, out, damned Spotify!</p></em></ins></span>
</li>
- <li id="M201506264">
+ <span class="removed"><del><strong><li><p><a
href="http://www.zerohedge.com/news/2013-12-30/how-nsa-hacks-your-iphone-presenting-dropout-jeep">
+ Either Apple helps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201506264">
<p><a
href="http://www.privmetrics.org/wp-content/uploads/2015/06/wisec2015.pdf">A
- study in 2015</a> found that 90% of the top-ranked gratis proprietary
- Android apps contained recognizable tracking libraries. For the paid
- proprietary apps, it was only 60%.</p>
+ study in 2015</a> found that 90% of</em></ins></span> the <span
class="removed"><del><strong>NSA snoop on all</strong></del></span> <span
class="inserted"><ins><em>top-ranked gratis proprietary
+ Android apps contained recognizable tracking libraries.
For</em></ins></span> the <span class="removed"><del><strong>data in an iThing,
+ or</strong></del></span> <span class="inserted"><ins><em>paid
+ proprietary apps,</em></ins></span> it <span
class="removed"><del><strong>is totally incompetent.</a></p>
+ </li>
+
+ <li><p><a
href="http://www.theguardian.com/technology/2014/jul/23/iphone-backdoors-surveillance-forensic-services">
+ Several “features”</strong></del></span> <span
class="inserted"><ins><em>was only 60%.</p>
<p>The article confusingly describes gratis apps as
- “free”, but most of them are not in fact <a
+ “free”, but most</em></ins></span> of <span
class="removed"><del><strong>iOS seem to exist</strong></del></span> <span
class="inserted"><ins><em>them are not in fact <a
href="/philosophy/free-sw.html">free software</a>. It also uses
the
- ugly word “monetize”. A good replacement for that word
- is “exploit”; nearly always that will fit perfectly.</p>
+ ugly word “monetize”. A good replacement</em></ins></span> for
<span class="removed"><del><strong>no
+ possible purpose other than surveillance</a>.
Here</strong></del></span> <span class="inserted"><ins><em>that
word</em></ins></span>
+ is <span class="removed"><del><strong>the
+ <a
href="http://www.zdziarski.com/blog/wp-content/uploads/2014/07/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms_Moved.pdf">
+ Technical presentation</a>.</p></strong></del></span> <span
class="inserted"><ins><em>“exploit”; nearly always that will fit
perfectly.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
- <li id="M201505060">
- <p>Gratis Android apps (but not <a
- href="/philosophy/free-sw.html">free software</a>) connect to 100
<a
-
href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking
- and advertising</a> URLs, on the average.</p>
+
+<div class="big-subsection">
+ <h4 id="SpywareInTelephones">Spyware in Telephones</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTelephones">#SpywareInTelephones</a>)</span>
+</div>
+
+<ul>
+ <li><p>Tracking software in popular</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201505060">
+ <p>Gratis</em></ins></span> Android apps <span
class="removed"><del><strong>is pervasive and
+ sometimes very clever. Some trackers can <a
+href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
+</li>
+
+ <li><p>Android tracks location for Google <a
+href="https://www.techdirt.com/articles/20171121/09030238658/investigation-finds-google-collected-location-data-even-with-location-services-turned-off.shtml">
+ even when “location services” are turned off, even
+ when the phone has no SIM card</a>.</p></li>
+
+ <li><p>Some portable phones</strong></del></span> <span
class="inserted"><ins><em>(but not</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots of data to
China</a>.</p></li>
+
+ <li><p>According</strong></del></span>
+ <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>) connect</em></ins></span> to <span
class="removed"><del><strong>Edward Snowden,</strong></del></span> <span
class="inserted"><ins><em>100</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.com/news/uk-34444233">agencies
can take over smartphones</a>
+ by sending hidden text messages which enable them to turn the phones
+ on</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/may/06/free-android-apps-connect-tracking-advertising-websites">tracking</em></ins></span>
+ and <span class="removed"><del><strong>off, listen to the microphone,
retrieve geo-location data from</strong></del></span> <span
class="inserted"><ins><em>advertising</a> URLs, on</em></ins></span> the
+ <span class="removed"><del><strong>GPS, take photographs, read text
messages, read call, location and web
+ browsing history, and read</strong></del></span> <span
class="inserted"><ins><em>average.</p>
</li>
<li id="M201504060">
<p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner apps snoop on the user</a>. This is in addition to
- the snooping done by the phone company, and perhaps by the OS in
- the phone.</p>
+ QR-code scanner apps snoop on</em></ins></span> the <span
class="removed"><del><strong>contact list.</strong></del></span> <span
class="inserted"><ins><em>user</a>.</em></ins></span> This <span
class="removed"><del><strong>malware</strong></del></span> is <span
class="removed"><del><strong>designed</strong></del></span> <span
class="inserted"><ins><em>in addition</em></ins></span> to
+ <span class="removed"><del><strong>disguise itself from
investigation.</p>
+ </li>
+
+ <li><p>Samsung phones come with
+ <a
href="http://arstechnica.com/gadgets/2015/07/samsung-sued-for-loading-devices-with-unremovable-crapware-in-china/">apps
that users can't delete</a>,
+ and they send so much data that their transmission is a
+ substantial expense for users. Said transmission, not wanted or
+ requested</strong></del></span>
+ <span class="inserted"><ins><em>the snooping done</em></ins></span> by the
<span class="removed"><del><strong>user, clearly must constitute spying of some
+ kind.</p></li>
- <p>Don't be distracted by the question of whether the app developers
- get users to say “I agree”. That is no excuse for
- malware.</p>
+ <li><p>A Motorola</strong></del></span> phone
+ <span class="removed"><del><strong><a
href="http://www.itproportal.com/2013/07/25/motorolas-new-x8-arm-chip-underpinning-the-always-on-future-of-android/">
+ listens for voice all</strong></del></span> <span
class="inserted"><ins><em>company, and perhaps by</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p>
+ </li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>OS</em></ins></span> in <span
class="removed"><del><strong>Android phones (and Windows? laptops): The Wall
+ Street Journal (in an article blocked from us</strong></del></span>
+ <span class="inserted"><ins><em>the phone.</p>
+
+ <p>Don't be distracted</em></ins></span> by <span
class="removed"><del><strong>a paywall)
+ reports that
+ <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"></strong></del></span>
the <span class="removed"><del><strong>FBI can remotely
activate</strong></del></span> <span class="inserted"><ins><em>question of
whether</em></ins></span> the <span class="removed"><del><strong>GPS and
microphone in Android
+ phones and laptops</a>.
+ (I suspect this means Windows laptops.) Here</strong></del></span>
<span class="inserted"><ins><em>app developers
+ get users to say “I agree”. That</em></ins></span> is
+ <span class="removed"><del><strong><a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p></strong></del></span> <span
class="inserted"><ins><em>no excuse for
+ malware.</p></em></ins></span>
</li>
- <li id="M201411260">
+ <span class="removed"><del><strong><li><p>Portable phones with
GPS will send their GPS location on
+ remote command</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201411260">
<p>Many proprietary apps for mobile devices
report which other apps the user has installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible and optional</a>. Not
+ is doing this in a way that at least is visible</em></ins></span> and
<span class="removed"><del><strong>users cannot stop
them:</strong></del></span> <span class="inserted"><ins><em>optional</a>.
Not
as bad as what the others do.</p>
</li>
<li id="M201401150.1">
- <p>The Simeji keyboard is a smartphone version of Baidu's <a
- href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
- title="Input Method Editor">IME</abbr></a>.</p>
+ <p>The Simeji keyboard is a smartphone version of
Baidu's</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers">
+
http://www.aclu.org/government-location-tracking-cell-phones-gps-devices-and-license-plate-readers</a>.
+ (The US says it will eventually require all new portable phones
+ to have GPS.)</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#baidu-ime">spying
<abbr
+ title="Input Method
Editor">IME</abbr></a>.</p></em></ins></span>
</li>
- <li id="M201312270">
- <p>The nonfree Snapchat app's principal purpose is to restrict the
- use of data on the user's computer, but it does surveillance too: <a
+ <span
class="removed"><del><strong><li><p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201312270">
+ <p>The</em></ins></span> nonfree Snapchat app's principal purpose is
to restrict the
+ use of data on the user's computer, but it <span
class="removed"><del><strong>does surveillance
+ too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
+ it tries</strong></del></span> <span class="inserted"><ins><em>does
surveillance too: <a
href="http://www.theguardian.com/media/2013/dec/27/snapchat-may-be-exposed-hackers">
it tries to get the user's list of other people's phone
numbers</a>.</p>
@@ -1965,8 +1822,9 @@
<p>The FTC criticized this app because it asked the user to
approve sending personal data to the app developer but did not ask
- about sending it to other companies. This shows the weakness of
- the reject-it-if-you-dislike-snooping “solution” to
+ about sending it</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>other companies. This shows</em></ins></span> the
<span class="removed"><del><strong>user's list</strong></del></span> <span
class="inserted"><ins><em>weakness</em></ins></span> of <span
class="removed"><del><strong>other people's phone
+ numbers.</a></p></strong></del></span>
+ <span class="inserted"><ins><em>the reject-it-if-you-dislike-snooping
“solution” to
surveillance: why should a flashlight app send any information to
anyone? A free software flashlight app would not.</p>
</li>
@@ -1974,33 +1832,55 @@
<li id="M201212100">
<p>FTC says most mobile apps for children don't respect privacy:
<a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInSkype">Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
+ <h4 <span
class="removed"><del><strong>id="SpywareInMobileApps">Spyware in Mobile
Applications</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInSkype">Skype</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInMobileApps">#SpywareInMobileApps</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInSkype">#SpywareInSkype</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li>
+ <p>The moviepass app and dis-service spy on users even more than
users
+ expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ where they travel before and after going</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201908151">
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
+ <p>Skype refuses</em></ins></span> to <span
class="removed"><del><strong>a movie</a>.
+ </p>
+
+ <p>Don't be tracked — pay cash!</p>
+ </li>
+
+ <li><p>AI-powered driving apps</strong></del></span> <span
class="inserted"><ins><em>say whether it</em></ins></span> can <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
+ track your every move</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
on calls</a>.</p>
- <p>That almost certainly means it can do so.</p>
+ <p>That almost certainly means it can do
so.</p></em></ins></span>
</li>
- <li id="M201307110">
- <p>Skype contains <a
-
href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
+ <span class="removed"><del><strong><li><p>The Sarahah
app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201307110">
+ <p>Skype contains</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20130928235637/http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">spyware</a>.
Microsoft changed Skype <a
href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically for spying</a>.</p>
+ specifically for spying</a>.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li>
+ <p>Facebook's app listens all the time,</strong></del></span>
+<span class="inserted"><ins><em></ul>
<div class="big-subsection">
@@ -2011,75 +1891,122 @@
<ul class="blurbs">
<li id="M201806240">
<p>Red Shell is a spyware that
- is found in many proprietary games. It <a
-
href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
- tracks data on users' computers and sends it to third
parties</a>.</p>
+ is found in many proprietary games. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://nebulous.cloud/threads/red-shell-illegal-spyware-for-steam-games.31924/">
+ tracks data</em></ins></span> on <span class="removed"><del><strong>what
people are listening to or watching</a>. In
addition,</strong></del></span> <span class="inserted"><ins><em>users'
computers and sends</em></ins></span> it <span class="removed"><del><strong>may
+ be analyzing people's conversations</strong></del></span> to <span
class="removed"><del><strong>serve them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>third parties</a>.</p></em></ins></span>
</li>
- <li id="M201804144">
+ <span class="removed"><del><strong><li>
+ <p>Faceapp appears to do lots of surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804144">
<p>ArenaNet surreptitiously installed a spyware
- program along with an update to the massive
- multiplayer game Guild Wars 2. The spyware allowed ArenaNet <a
-
href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
- to snoop on all open processes running on its user's
computer</a>.</p>
+ program along with an update</em></ins></span> to <span
class="removed"><del><strong>personal data in</strong></del></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>massive
+ multiplayer game Guild Wars 2. The spyware allowed
ArenaNet</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techraptor.net/content/arenanet-used-spyware-anti-cheat-for-guild-wars-2-banwave">
+ to snoop on all open processes running</em></ins></span> on <span
class="removed"><del><strong>some of</strong></del></span> its <span
class="removed"><del><strong>phones. The app will give Verizon the
same</strong></del></span> <span class="inserted"><ins><em>user's
computer</a>.</p>
</li>
<li id="M201711070">
<p>The driver for a certain gaming keyboard <a
-
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends
- information to China</a>.</p>
+
href="https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html">sends</em></ins></span>
+ information <span class="removed"><del><strong>about the users' searches
that Google normally gets when
+ they use its search engine.</p>
+
+ <p>Currently, the app is</strong></del></span> <span
class="inserted"><ins><em>to China</a>.</p>
</li>
<li id="M201512290">
- <p>Many <a
-
href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles snoop on their users and report to the
- internet</a>—even what their users weigh.</p>
+ <p>Many</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop</em></ins></span> on <span
class="removed"><del><strong>only one phone</a>,</strong></del></span>
<span class="inserted"><ins><em>their users</em></ins></span> and <span
class="inserted"><ins><em>report to</em></ins></span> the
+ <span class="removed"><del><strong>user must explicitly opt-in before the
app takes effect. However, the
+ app remains spyware—an “optional” piece of
spyware</strong></del></span>
+ <span class="inserted"><ins><em>internet</a>—even what their
users weigh.</p>
- <p>A game console is a computer, and you can't trust a computer with
- a nonfree operating system.</p>
+ <p>A game console</em></ins></span> is
+ <span class="removed"><del><strong>still
spyware.</p></strong></del></span> <span class="inserted"><ins><em>a
computer, and you can't trust a computer with
+ a nonfree operating system.</p></em></ins></span>
</li>
- <li id="M201509160">
- <p>Modern gratis game cr…apps <a
-
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of data about their users and their users'
- friends and associates</a>.</p>
+ <span class="removed"><del><strong><li><p>The Meitu photo-editing
+ app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509160">
+ <p>Modern gratis game cr…apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ user data to</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect</em></ins></span> a <span class="removed"><del><strong>Chinese
company</a>.</p></li>
+
+ <li><p>A pregnancy test controller application not only
+ can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
+ on many sorts</strong></del></span> <span class="inserted"><ins><em>wide
range</em></ins></span> of data <span class="removed"><del><strong>in the
phone,</strong></del></span> <span class="inserted"><ins><em>about their
users</em></ins></span> and <span class="removed"><del><strong>in server
accounts, it can
+ alter them too</a>.
+ </p></li>
+
+ <li><p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
+ movements before</strong></del></span> <span
class="inserted"><ins><em>their users'
+ friends</em></ins></span> and <span class="removed"><del><strong>after the
ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span
class="inserted"><ins><em>associates</a>.</p>
- <p>Even nastier, they do it through ad networks that merge the data
+ <p>Even nastier, they do it through ad networks that
merge</em></ins></span> the <span class="removed"><del><strong>user's
consent”</strong></del></span> <span class="inserted"><ins><em>data
collected by various cr…apps and sites made by different
companies.</p>
- <p>They use this data to manipulate people to buy things, and hunt
for
- “whales” who can be led to spend a lot of money. They also
+ <p>They use this data to manipulate people to buy things, and
hunt</em></ins></span> for <span class="removed"><del><strong>surveillance is
inadequate as</strong></del></span>
+ <span class="inserted"><ins><em>“whales” who can be led to
spend</em></ins></span> a <span class="removed"><del><strong>protection against
massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>lot of money. They also
use a back door to manipulate the game play for specific players.</p>
<p>While the article describes gratis games, games that cost money
- can use the same tactics.</p>
+ can use the same tactics.</p></em></ins></span>
</li>
- <li id="M201401280">
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201401280">
<p>Angry Birds <a
href="http://www.nytimes.com/2014/01/28/world/spy-agencies-scour-phone-apps-for-personal-data.html">
spies for companies, and the NSA takes advantage
- to spy through it too</a>. Here's information on <a
-
href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
+ to spy through it too</a>. Here's information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://confabulator.blogspot.com/2012/11/analysis-of-what-information-angry.html">
more spyware apps</a>.</p>
<p><a
href="http://www.propublica.org/article/spy-agencies-probe-angry-birds-and-other-apps-for-personal-data">
- More about NSA app spying</a>.</p>
+ More about NSA app spying</a>.</p></em></ins></span>
</li>
- <li id="M200510200">
+ <span
class="removed"><del><strong><li><p>Apps</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M200510200">
<p>Blizzard Warden is a hidden
- “cheating-prevention” program that <a
- href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
- spies on every process running on a gamer's computer and sniffs a
+ “cheating-prevention” program</em></ins></span> that <span
class="removed"><del><strong>include</strong></del></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software snoop on what radio and TV programs
+ are playing nearby</a>. Also</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2005/10/new-gaming-feature-spyware">
+ spies</em></ins></span> on <span class="removed"><del><strong>what users
post</strong></del></span> <span class="inserted"><ins><em>every process
running</em></ins></span> on <span class="removed"><del><strong>various sites
+ such as Facebook, Google+</strong></del></span> <span
class="inserted"><ins><em>a gamer's computer</em></ins></span> and <span
class="removed"><del><strong>Twitter.</p></strong></del></span> <span
class="inserted"><ins><em>sniffs a
good deal of personal data</a>, including lots of activities which
- have nothing to do with cheating.</p>
+ have nothing to do with cheating.</p></em></ins></span>
</li>
-</ul>
+
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
+<span class="inserted"><ins><em></ul>
@@ -2091,13 +2018,21 @@
<ul class="blurbs">
<li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>share</strong></del></span> <span
class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>picture you take according to who
+ is in</strong></del></span> <span class="inserted"><ins><em>people that
use them</a>.</p>
+
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>frame.</p>
- <p>Don't be a sucker—reject all the stings.</p>
+ <p>This spyware feature seems to require online access to some
+ known-faces database, which means</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
- <p>It is unfortunate that the article uses the term <a
+ <p>It is unfortunate that</em></ins></span> the <span
class="removed"><del><strong>pictures are likely to be
+ sent across</strong></del></span> <span
class="inserted"><ins><em>article uses</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
</ul>
@@ -2108,44 +2043,78 @@
<span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
</div>
-<p>Emo Phillips made a joke: The other day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the other way.” Evidently that was
+<p>Emo Phillips made a joke: The other day a woman came
up</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers</strong></del></span> <span
class="inserted"><ins><em>me</em></ins></span> and <span
class="removed"><del><strong>face-recognition
+ algorithms.</p>
+
+ <p>If so, none of Facebook users' pictures are private
+ anymore, even if</strong></del></span>
+<span class="inserted"><ins><em>said, “Didn't I see you on
television?” I said, “I
+don't know. You can't see out</em></ins></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>other way.”
Evidently that was
before Amazon “smart” TVs.</p>
<ul class="blurbs">
<li id="M201901070">
<p>Vizio TVs <a
href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO, and this data is sold to third parties. This is in return for
- “better service” (meaning more intrusive ads?) and slightly
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
+
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in the own words of the
company's
+ CTO,</em></ins></span> and <span class="removed"><del><strong>snooping).
In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span> <span
class="inserted"><ins><em>this data is sold</em></ins></span> to <span
class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span class="inserted"><ins><em>third
parties. This is in return for
+ “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>some
+ are starting</strong></del></span> <span
class="inserted"><ins><em>slightly
lower retail prices.</p>
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since the Vizio software is
- nonfree, we don't know what is actually happening behind the scenes,
- and there is no guarantee that all future updates will leave the
- settings unchanged.</p>
-
- <p>If you already own a Vizio smart TV (or any smart TV, for that
- matter), the easiest way to make sure it isn't spying on you is
- to disconnect it from the Internet, and use a terrestrial antenna
- instead. Unfortunately, this is not always possible. Another option,
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>make this spying acceptable, according to him,
+ is</em></ins></span> that it is <span
class="removed"><del><strong>nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em>opt-in in newer models. But since</em></ins></span>
the <span class="removed"><del><strong><a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as a way
+ to “serve” users better</a>—never mind
+ whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>Vizio software</em></ins></span> is <span
class="removed"><del><strong>a typical example of</strong></del></span>
+ <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind</em></ins></span> the <span
class="removed"><del><strong>attitude of</strong></del></span> <span
class="inserted"><ins><em>scenes,
+ and there is no guarantee that all future updates will
leave</em></ins></span> the <span class="removed"><del><strong>proprietary
software industry towards
+ those they have subjugated.</p>
+
+ <p>Out, out, damned Spotify!</p>
+ </li>
+ <li><p>Many proprietary apps</strong></del></span>
+ <span class="inserted"><ins><em>settings unchanged.</p>
+
+ <p>If you already own a Vizio smart TV (or any smart
TV,</em></ins></span> for <span class="removed"><del><strong>mobile devices
report which other
+ apps</strong></del></span> <span class="inserted"><ins><em>that
+ matter),</em></ins></span> the <span class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter</strong></del></span>
<span class="inserted"><ins><em>easiest way to make sure it isn't spying on
you</em></ins></span> is <span class="removed"><del><strong>doing this
in</strong></del></span>
+ <span class="inserted"><ins><em>to disconnect it from the Internet, and
use</em></ins></span> a <span class="removed"><del><strong>way that at
least</strong></del></span> <span class="inserted"><ins><em>terrestrial antenna
+ instead. Unfortunately, this</em></ins></span> is <span
class="removed"><del><strong>visible</strong></del></span> <span
class="inserted"><ins><em>not always possible. Another option,
if you are technically oriented, is to get your own router (which can
- be an old computer running completely free software), and set up a
- firewall to block connections to Vizio's servers. Or, as a last resort,
- you can replace your TV with another model.</p>
+ be an old computer running completely free software),</em></ins></span> and
+ <span class="removed"><del><strong>optional</a>. Not as
bad</strong></del></span> <span class="inserted"><ins><em>set up a
+ firewall to block connections to Vizio's servers. Or,</em></ins></span> as
<span class="removed"><del><strong>what the others do.</p>
</li>
- <li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>a last resort,
+ you can replace your TV with another model.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>Widely
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804010">
+ <p>Some “Smart” TVs automatically</em></ins></span>
<a <span
class="removed"><del><strong>href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
- <p>We link to the article for the facts it presents. It
- is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
+ <p>We link to</em></ins></span> the <span
class="removed"><del><strong>user</a>. This</strong></del></span> <span
class="inserted"><ins><em>article for the facts it presents.
It</em></ins></span>
+ is <span class="removed"><del><strong>in addition to</strong></del></span>
<span class="inserted"><ins><em>too bad that</em></ins></span> the <span
class="removed"><del><strong>snooping done</strong></del></span> <span
class="inserted"><ins><em>article finishes</em></ins></span> by <span
class="inserted"><ins><em>advocating</em></ins></span> the <span
class="removed"><del><strong>phone company,</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness of surrendering to Netflix.
The Netflix app <a
href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
malware too</a>.</p>
</li>
@@ -2153,17 +2122,32 @@
<li id="M201702060">
<p>Vizio “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts and
- cable</a>. Even if the image is coming from the user's own computer,
- the TV reports what it is. The existence of a way to disable the
- surveillance, even if it were not hidden as it was in these TVs,
+ report everything that is viewed on them, and not just
broadcasts</em></ins></span> and <span class="removed"><del><strong>perhaps by
the OS in</strong></del></span>
+ <span class="inserted"><ins><em>cable</a>. Even if</em></ins></span>
the
+ <span class="removed"><del><strong>phone.</p>
+
+ <p>Don't be distracted by</strong></del></span> <span
class="inserted"><ins><em>image is coming from</em></ins></span> the <span
class="removed"><del><strong>question of whether</strong></del></span> <span
class="inserted"><ins><em>user's own computer,</em></ins></span>
+ the <span class="removed"><del><strong>app developers get
+ users to say “I agree”. That is no excuse for
malware.</p>
+ </li>
+
+ <li><p>The Brightest Flashlight app
+ <a
href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>TV reports what</em></ins></span> it <span
class="removed"><del><strong>asked the user to
+ approve sending personal data</strong></del></span> <span
class="inserted"><ins><em>is. The existence of a way</em></ins></span> to <span
class="inserted"><ins><em>disable</em></ins></span> the <span
class="removed"><del><strong>app developer but did</strong></del></span>
+ <span class="inserted"><ins><em>surveillance, even if it
were</em></ins></span> not
+ <span class="removed"><del><strong>ask about
sending</strong></del></span> <span class="inserted"><ins><em>hidden
as</em></ins></span> it <span class="inserted"><ins><em>was in these TVs,
does not legitimize the surveillance.</p>
</li>
<li id="M201511130">
<p>Some web and TV advertisements play inaudible
- sounds to be picked up by proprietary malware running
- on other devices in range so as to determine that they
+ sounds</em></ins></span> to <span class="inserted"><ins><em>be picked up
by proprietary malware running
+ on</em></ins></span> other <span class="removed"><del><strong>companies.
This shows the
+ weakness of the reject-it-if-you-dislike-snooping
+ “solution”</strong></del></span> <span
class="inserted"><ins><em>devices in range so as</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>determine that they
are nearby. Once your Internet devices are paired with
your TV, advertisers can correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
@@ -2171,20 +2155,34 @@
</li>
<li id="M201511060">
- <p>Vizio goes a step further than other TV
+ <p>Vizio goes</em></ins></span> a <span
class="removed"><del><strong>flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>step further than other TV
manufacturers in spying on their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
“smart” TVs analyze your viewing habits in detail and
link them your IP address</a> so that advertisers can track you
across devices.</p>
- <p>It is possible to turn this off, but having it enabled by default
- is an injustice already.</p>
+ <p>It is possible</em></ins></span> to <span
class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>turn this off, but having it enabled by default
+ is an injustice already.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInToys">Spyware in Toys</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+</div>
+
+<ul>
+
+ <li>
+ <p>A remote-control sex toy was found</strong></del></span>
- <li id="M201511020">
- <p>Tivo's alliance with Viacom adds 2.3 million households
- to</em></ins></span> the <span class="removed"><del><strong>conversation
between two users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>600 millions social media profiles the company
+ <span class="inserted"><ins><em><li id="M201511020">
+ <p>Tivo's alliance with Viacom adds 2.3 million
households</em></ins></span>
+ to <span class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of</strong></del></span> the <span
class="removed"><del><strong>conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>600 millions social media profiles the company
already monitors. Tivo customers are unaware they're
being watched by advertisers. By combining TV viewing
information with online social media participation, Tivo can now <a
@@ -2239,11 +2237,11 @@
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> free
- software <span class="removed"><del><strong>which users could have
+ their products, rather than</strong></del></span> free <span
class="removed"><del><strong>software which users could have
checked and changed.</p>
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>in your own computer.</p>
+ <p>The company</strong></del></span>
+ <span class="inserted"><ins><em>software in your own computer.</p>
<p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
@@ -3550,7 +3548,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/17 10:29:51 $
+$Date: 2019/09/07 13:29:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.306
retrieving revision 1.307
diff -u -b -r1.306 -r1.307
--- proprietary-surveillance.de.po 17 Aug 2019 10:29:51 -0000 1.306
+++ proprietary-surveillance.de.po 7 Sep 2019 13:29:58 -0000 1.307
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-08-17 10:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1845,11 +1845,24 @@
"Guardian 2017.\">so die Leserschaft bisweilen ausschnüffeln</a>."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"<b>Adobe Digital Editions</b>, die von US-Biblioteken meist genutzte "
"Software zum Betrachten von elektronischen Büchern, spitzelt Nutzer aus und "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.465
retrieving revision 1.466
diff -u -b -r1.465 -r1.466
--- proprietary-surveillance.fr.po 17 Aug 2019 16:30:50 -0000 1.465
+++ proprietary-surveillance.fr.po 7 Sep 2019 13:29:58 -0000 1.466
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-08-17 10:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2019-08-17 18:27+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1383,11 +1384,24 @@
"l'utilisateur</a>."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"Adobe a fait en sorte que « Digital Editions » (la liseuse utilisée par
la "
"plupart des bibliothèques aux Ãtats-Unis) <a href=\"http://www."
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary-surveillance.it-diff.html 17 Aug 2019 10:29:51 -0000
1.158
+++ proprietary-surveillance.it-diff.html 7 Sep 2019 13:29:58 -0000
1.159
@@ -1045,7 +1045,7 @@
the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
announced an opt-in proprietary search app that it will</a>
pre-install on some</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots</em></ins></span> of <span class="removed"><del><strong>its
phones. The app will give Verizon the same
information about the users' searches that Google normally gets when
they use its search engine.</p>
@@ -1197,13 +1197,13 @@
is based</strong></del></span> <span class="inserted"><ins><em>same
thing without
spying</em></ins></span> on <span class="removed"><del><strong>proprietary
malware (DRM</strong></del></span> <span class="inserted"><ins><em>you is
available from <a
href="https://search.f-droid.org/?q=menstr">F-Droid</a>,</em></ins></span>
and <span class="removed"><del><strong>snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ 2015 it</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
demanded users submit to increased snooping</a>, and some
are starting to realize that it is nasty.</p>
- <p>This article shows the</strong></del></span> <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ <p>This article shows the <a
+href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
twisted ways that they present snooping as</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast"></em></ins></span>
a <span class="removed"><del><strong>way
@@ -1257,9 +1257,9 @@
<p>The FTC criticized this app because</strong></del></span> <span
class="inserted"><ins><em>or pass</em></ins></span> it <span
class="removed"><del><strong>asked the user</strong></del></span> <span
class="inserted"><ins><em>on</em></ins></span> to
<span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>user-installed apps
that have access</em></ins></span> to
the <span class="removed"><del><strong>app developer</strong></del></span>
<span class="inserted"><ins><em>network</em></ins></span> but <span
class="removed"><del><strong>did not
- ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies.</strong></del></span> <span
class="inserted"><ins><em>the data.</em></ins></span> This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>results in massive
- surveillance on which</em></ins></span> the
- <span class="removed"><del><strong>weakness of the
reject-it-if-you-dislike-snooping
+ ask about sending it</strong></del></span> <span
class="inserted"><ins><em>no direct access</em></ins></span> to <span
class="removed"><del><strong>other companies. This shows</strong></del></span>
the
+ <span class="removed"><del><strong>weakness of</strong></del></span>
<span class="inserted"><ins><em>data. This results in massive
+ surveillance on which</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
“solution” to surveillance: why should a flashlight
app</strong></del></span> <span class="inserted"><ins><em>user has
absolutely no control.</p>
</li>
@@ -3300,7 +3300,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/17 10:29:51 $
+$Date: 2019/09/07 13:29:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- proprietary-surveillance.it.po 17 Aug 2019 10:29:51 -0000 1.319
+++ proprietary-surveillance.it.po 7 Sep 2019 13:29:58 -0000 1.320
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-08-17 10:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1785,11 +1785,24 @@
"faster-than-women-study-finds\">spia i lettori</a>."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"Adobe ha fatto in modo che “Digital Editions”, il lettore e-book "
"usato dalla maggior parte delle biblioteche americane, <a href=\"http://www."
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary-surveillance.ja-diff.html 17 Aug 2019 10:29:51 -0000
1.174
+++ proprietary-surveillance.ja-diff.html 7 Sep 2019 13:29:58 -0000
1.175
@@ -979,7 +979,7 @@
<p>Adobe made “Digital Editions,”
the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
all conversations</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
needed to check DRM!</p></em></ins></span>
</li>
@@ -1340,8 +1340,8 @@
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically, it can collect the emails</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>members of Parliament
+ <p>Specifically, it can collect the emails of
members</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-app-investigation/">half</em></ins></span>
of <span class="removed"><del><strong>Parliament
this way, because</strong></del></span>
<span class="inserted"><ins><em>the top 10 gratis VPN apps have lousy
privacy policies</a>.</p>
@@ -1489,9 +1489,9 @@
means it demands blind faith from its users</a>.</p>
<p>Even if no one connects to the car remotely, the cell phone
- modem enables the phone company to track</strong></del></span>
+ modem enables</strong></del></span>
<span
class="inserted"><ins><em>href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+ the <span class="removed"><del><strong>phone company to track the
car's</strong></del></span> <span
class="inserted"><ins><em>user's</em></ins></span> movements <span
class="removed"><del><strong>all</strong></del></span> <span
class="inserted"><ins><em>and listens through</em></ins></span> the <span
class="removed"><del><strong>time;</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
@@ -1501,26 +1501,26 @@
</li>
<li><p>Proprietary software in cars
- <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information</strong></del></span> <span
class="inserted"><ins><em>article.</p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>car manufacturers, insurance companies, and
- others.</p>
-
- <p>The case of toll-collection systems,
mentioned</strong></del></span> <span class="inserted"><ins><em>care much less
about sports, you will benefit</em></ins></span> in <span
class="removed"><del><strong>this article,</strong></del></span>
- <span class="inserted"><ins><em>many ways. This</em></ins></span> is <span
class="removed"><del><strong>not
- really a matter of proprietary surveillance. These systems are an
- intolerable invasion</strong></del></span> <span
class="inserted"><ins><em>one more.</p>
+ <p>If you learn to care much less</em></ins></span> about <span
class="removed"><del><strong>drivers' movements</a>,
+ which</strong></del></span> <span class="inserted"><ins><em>sports, you
will benefit in
+ many ways. This</em></ins></span> is <span
class="removed"><del><strong>made available</strong></del></span> <span
class="inserted"><ins><em>one more.</p>
</li>
<li id="M201804160">
<p>More than <a
-
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%</em></ins></span>
- of <span class="removed"><del><strong>privacy, and should be replaced with
anonymous
- payment systems, but</strong></del></span> the <span
class="removed"><del><strong>invasion isn't done</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied</em></ins></span> by <span
class="removed"><del><strong>malware.</strong></del></span> <span
class="inserted"><ins><em>researchers were found to snoop
- and collect information about its users</a>. 40% of the apps were
+
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
+ of the 5,855 Android apps studied by researchers were
found</em></ins></span> to <span class="removed"><del><strong>car
manufacturers, insurance companies,</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span>
+ and
+ <span class="removed"><del><strong>others.</p>
+
+ <p>The case</strong></del></span> <span
class="inserted"><ins><em>collect information about its users</a>.
40%</em></ins></span> of <span class="removed"><del><strong>toll-collection
systems, mentioned in this article, is not
+ really a matter</strong></del></span> <span
class="inserted"><ins><em>the apps were
found to insecurely snitch on its users. Furthermore, they could
- detect only some methods of snooping, in these proprietary apps whose
+ detect only some methods</em></ins></span> of <span
class="inserted"><ins><em>snooping, in these</em></ins></span> proprietary
<span class="removed"><del><strong>surveillance. These systems are an
+ intolerable invasion of privacy, and should be replaced with anonymous
+ payment systems, but the invasion isn't done by
malware.</strong></del></span> <span class="inserted"><ins><em>apps whose
source code they cannot look at.</em></ins></span> The other
<span class="removed"><del><strong>cases mentioned are done by
proprietary malware</strong></del></span> <span class="inserted"><ins><em>apps
might be snooping</em></ins></span>
in <span class="removed"><del><strong>the car.</p></li>
@@ -1575,7 +1575,8 @@
<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>users even more than users expected. It <a
+ <h4 id="SpywareInTVSets">Spyware in TV Sets</h4>
+ <span</strong></del></span> <span class="inserted"><ins><em>users even
more than users expected. It <a
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
@@ -1583,14 +1584,10 @@
</li>
<li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
+ <p>Tracking software in popular Android apps
is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow</em></ins></span> a <span class="removed"><del><strong>joke: The
other day</strong></del></span> <span class="inserted"><ins><em>user's
movements around</em></ins></span> a <span class="removed"><del><strong>woman
came up</strong></del></span> <span class="inserted"><ins><em>physical store by
noticing WiFi
+ follow a user's movements around a physical store by noticing WiFi
networks</a>.</p>
</li>
@@ -1598,7 +1595,7 @@
<p>The Sarahah app <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
uploads all phone numbers and email addresses</a> in user's address
- book</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note that this article misuses
the words
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p>
</li>
@@ -1606,20 +1603,14 @@
<li id="M201707270">
<p>20 dishonest Android apps recorded <a
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and
-<span class="removed"><del><strong>said, “Didn't I see
you</strong></del></span> <span class="inserted"><ins><em>sent them and text
messages and emails to snoopers</a>.</p>
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy;</em></ins></span>
on <span class="removed"><del><strong>television?” I said, “I
-don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>the contrary, it
+ <p>Google did not intend to make these apps spy; on the contrary, it
worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
- <p>On</em></ins></span> the other <span
class="removed"><del><strong>way.” Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More</strong></del></span> <span
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
+ <p>On the other hand, Google redistributes nonfree Android apps, and
therefore shares in the responsibility for the injustice of their being
nonfree. It also distributes its own nonfree apps, such as Google Play,
<a href="/philosophy/free-software-even-more-important.html">which
@@ -1631,8 +1622,8 @@
<p>Google could demand the source code for these apps, and study
the source code somehow to determine whether they mistreat users in
- various ways. If it did a good job of this, it could
more</em></ins></span> or less <span class="removed"><del><strong>all
“smart” TVs</strong></del></span>
- <span class="inserted"><ins><em>prevent such snooping, except when the app
developers are clever
+ various ways. If it did a good job of this, it could more or less
+ prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
@@ -1641,14 +1632,11 @@
</li>
<li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
- snoop</em></ins></span> on <span
class="removed"><del><strong>their</strong></del></span>
users</a>.</p>
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop on users</a>.</p>
- <span class="removed"><del><strong><p>The
report</strong></del></span>
-
- <span class="inserted"><ins><em><p>With free software apps, users
could <em>make sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
@@ -2364,10 +2352,12 @@
<div class="big-subsection">
<h4 id="SpywareInDrones">Drones</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInDrones">#SpywareInDrones</a>)</span>
+ <span</em></ins></span> class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInTVSets">#SpywareInTVSets</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><p>Emo Phillips</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
to snoop on other people, DJI is in many cases <a
@@ -2400,12 +2390,12 @@
<li id="M201905061">
<p>Amazon Alexa collects a lot more information from users
than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
+ recordings</em></ins></span> made <span
class="inserted"><ins><em>without</em></ins></span> a <span
class="removed"><del><strong>joke: The</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt), and sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
even if users request deletion of their data from Amazon's servers, <a
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
+ the data remain on</em></ins></span> other <span
class="removed"><del><strong>day</strong></del></span> <span
class="inserted"><ins><em>servers</a>, where they can be accessed by
advertising companies and government agencies. In other words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
@@ -2414,15 +2404,16 @@
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon has a very precise picture of users' life
+ Alexa. As</em></ins></span> a <span class="removed"><del><strong>woman
came up</strong></del></span> <span class="inserted"><ins><em>result, Amazon
has a very precise picture of users' life
at home, not only in the present, but in the past (and, who knows,
in the future too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>me</strong></del></span> <span
class="inserted"><ins><em>the Alexa service are <a
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ recorded for Amazon employees to listen to</a>. The
Google</em></ins></span> and
+<span class="removed"><del><strong>said, “Didn't I
see</strong></del></span> <span class="inserted"><ins><em>Apple
voice assistants do similar things.</p>
<p>A fraction of the Alexa service staff even has access to <a
@@ -2432,7 +2423,7 @@
<p>Since the client program is nonfree, and data processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
+ tell</em></ins></span> you <span class="inserted"><ins><em>how and where
it's done”), users have no way
to know what happens to the recordings unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
break their non-disclosure agreements</a>.</p>
@@ -2447,14 +2438,23 @@
paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges that would otherwise be in
+ specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions in</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently</strong></del></span>
<span class="inserted"><ins><em>use of ink cartridges</em></ins></span> that
<span class="removed"><del><strong>was
+before</strong></del></span> <span class="inserted"><ins><em>would otherwise
be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found a way to break the security of
an</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>device,
+ and</em></ins></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
@@ -3157,7 +3157,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/08/17 10:29:51 $
+$Date: 2019/09/07 13:29:58 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.300
retrieving revision 1.301
diff -u -b -r1.300 -r1.301
--- proprietary-surveillance.ja.po 17 Aug 2019 10:29:51 -0000 1.300
+++ proprietary-surveillance.ja.po 7 Sep 2019 13:29:58 -0000 1.301
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-08-17 10:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1327,11 +1327,18 @@
"than-women-study-finds\">æã
ãã®ã³ã¼ãã¯èªè
ãè¦ãè¦ãã¾ã</a>ã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"Adobeã¯é»åæ¸ç±ãã¥ã¼ã¯ã“Digital
Editions”ããåè¡å½ã®ã»ã¨ãã©ã®"
"å³æ¸é¤¨ã§ä½¿ããã¦ãã¾ããã<a
href=\"http://www.computerworlduk.com/blogs/"
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.240
retrieving revision 1.241
diff -u -b -r1.240 -r1.241
--- proprietary-surveillance.pot 17 Aug 2019 10:29:51 -0000 1.240
+++ proprietary-surveillance.pot 7 Sep 2019 13:29:58 -0000 1.241
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-08-17 10:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -971,7 +971,7 @@
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
"libraries, <a "
-"href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">
"
+"href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">
"
"send lots of data to Adobe</a>. Adobe's “excuse”: it's needed "
"to check DRM!"
msgstr ""
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.559
retrieving revision 1.560
diff -u -b -r1.559 -r1.560
--- proprietary-surveillance.ru.po 18 Aug 2019 11:02:05 -0000 1.559
+++ proprietary-surveillance.ru.po 7 Sep 2019 13:29:58 -0000 1.560
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-08-17 10:25+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-07 13:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1369,11 +1370,24 @@
"ÑиÑаÑелÑми</a>."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, пÑогÑамма "
"ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð² болÑÑинÑÑве
библиоÑек СШÐ, <a href=\"http://www."
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- pt-br.po 7 Sep 2019 07:31:39 -0000 1.168
+++ pt-br.po 7 Sep 2019 13:29:58 -0000 1.169
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-12-11 11:00-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -84,9 +84,10 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -4467,9 +4468,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6907,8 +6909,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
#. type: Content of: <ul><li><p>
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.280
retrieving revision 1.281
diff -u -b -r1.280 -r1.281
--- ru.po 7 Sep 2019 07:31:39 -0000 1.280
+++ ru.po 7 Sep 2019 13:29:59 -0000 1.281
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-adobe.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2019-08-24 16:59+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -100,11 +100,24 @@
"в 30 дней."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">+}
+# | send lots of data to Adobe</a>. Adobe's “excuse”: it's needed
+# | to check DRM!
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#| "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#| "“excuse”: it's needed to check DRM!"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, пÑогÑамма "
"ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð² болÑÑинÑÑве
библиоÑек СШÐ, <a href=\"http://www."
@@ -5691,10 +5704,21 @@
"оплаÑиваÑÑ Ð·Ð°Ð¾Ð±Ð»Ð°ÑнÑе ÑÑеÑа</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+# | Microsoft is going to <a
+# |
[-href=\"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">-]
+# |
{+href=\"https://web.archive.org/web/20181030194725/https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\">+}
+# | cut off support for some Internet Explorer versions</a> in the same way.
+#, fuzzy
+#| msgid ""
+#| "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#| "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#| "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#| "a> in the same way."
+msgid ""
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
"Microsoft ÑоÑно Ñаким же обÑазом ÑобиÑаеÑÑÑ <a
href=\"https://www."
"computerworlduk.com/applications/more-than-half-of-all-ie-users-face-patch-"
@@ -8847,10 +8871,21 @@
"вÑедоноÑнÑÑ
ÑÑнкÑий</a>."
#. type: Content of: <ul><li><p>
+# | Adobe made “Digital Editions,” the e-reader used by most US
+# | libraries, spy on the user <a
+# |
[-href=\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for-]
+# |
{+href=\"https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\">for+}
+# | the sake of DRM.</a>
+#, fuzzy
+#| msgid ""
+#| "Adobe made “Digital Editions,” the e-reader used by most US "
+#| "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#| "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, пÑогÑамма "
"ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð² болÑÑинÑÑве
библиоÑек СШÐ, <a href=\"http://www."
@@ -10833,6 +10868,41 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\"> Ð "
"пÑоÑеÑÑоÑаÑ
Intel бÑдÑÑ Ð²ÑÑÑоеннÑе
неÑвободнÑе пÑогÑаммÑ-ÑиÑанÑ</a>."
+#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
+#~ "drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
+#~ "“excuse”: it's needed to check DRM!"
+#~ msgstr ""
+#~ "ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, "
+#~ "пÑогÑамма ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð²
болÑÑинÑÑве библиоÑек СШÐ, <a href="
+#~ "\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-"
+#~ "again-3575860/\"> вÑÑÑлала маÑÑÑ Ð´Ð°Ð½Ð½ÑÑ
в Adobe</a>.
“"
+#~ "ÐпÑавдание” Adobe — “ÑÑо нÑжно
Ð´Ð»Ñ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ "
+#~ "ÑиÑÑового ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ Ð¾Ð³ÑаниÑениÑми!”"
+
+#~ msgid ""
+#~ "Microsoft is going to <a href=\"https://www.computerworlduk.com/"
+#~ "applications/more-than-half-of-all-ie-users-face-patch-axe-in-10-"
+#~ "months-3605515/\"> cut off support for some Internet Explorer versions</"
+#~ "a> in the same way."
+#~ msgstr ""
+#~ "Microsoft ÑоÑно Ñаким же обÑазом ÑобиÑаеÑÑÑ
<a href=\"https://www."
+#~ "computerworlduk.com/applications/more-than-half-of-all-ie-users-face-"
+#~ "patch-axe-in-10-months-3605515/\"> оÑÑÑбиÑÑ Ð¿Ð¾Ð´Ð´ÐµÑжкÑ
некоÑоÑÑÑ
веÑÑий "
+#~ "Internet Explorer</a>."
+
+#~ msgid ""
+#~ "Adobe made “Digital Editions,” the e-reader used by most US "
+#~ "libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
+#~ "open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+#~ msgstr ""
+#~ "ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Adobe Ñделала Ñак, ÑÑобÑ
“ЦиÑÑÐ¾Ð²Ð°Ñ ÑедакÑиє, "
+#~ "пÑогÑамма ÑÑениÑ, пÑименÑÐµÐ¼Ð°Ñ Ð²
болÑÑинÑÑве библиоÑек СШÐ, <a href="
+#~ "\"http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-"
+#~ "again-3575860/\"> Ñпионила за полÑзоваÑелем в
ÑелÑÑ
ÑиÑÑового ÑпÑÐ°Ð²Ð»ÐµÐ½Ð¸Ñ "
+#~ "огÑаниÑениÑми</a>."
+
#, fuzzy
#~| msgid ""
#~| "Revolv is an device which managed “smart home” operations: "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- zh-tw.po 7 Sep 2019 07:31:39 -0000 1.131
+++ zh-tw.po 7 Sep 2019 13:29:59 -0000 1.132
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-04-21 07:56+0000\n"
+"POT-Creation-Date: 2019-09-07 13:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -89,9 +89,10 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, <a href=\"http://www.computerworlduk.com/blogs/open-enterprise/"
-"drm-strikes-again-3575860/\"> send lots of data to Adobe</a>. Adobe's "
-"“excuse”: it's needed to check DRM!"
+"libraries, <a href=\"https://web.archive.org/web/20141220181015/http://www."
+"computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/\"> send "
+"lots of data to Adobe</a>. Adobe's “excuse”: it's needed to "
+"check DRM!"
msgstr ""
#. type: Content of: <ul><li><p>
@@ -4021,9 +4022,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Microsoft is going to <a href=\"https://www.computerworlduk.com/applications/"
-"more-than-half-of-all-ie-users-face-patch-axe-in-10-months-3605515/\"> cut "
-"off support for some Internet Explorer versions</a> in the same way."
+"Microsoft is going to <a href=\"https://web.archive.org/web/20181030194725/"
+"https://www.computerworlduk.com/applications/more-than-half-of-all-ie-users-"
+"face-patch-axe-in-10-months-3605515/\"> cut off support for some Internet "
+"Explorer versions</a> in the same way."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -6178,8 +6180,9 @@
#. type: Content of: <ul><li><p>
msgid ""
"Adobe made “Digital Editions,” the e-reader used by most US "
-"libraries, spy on the user <a href=\"http://www.computerworlduk.com/blogs/"
-"open-enterprise/drm-strikes-again-3575860/\">for the sake of DRM.</a>"
+"libraries, spy on the user <a href=\"https://web.archive.org/"
+"web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-"
+"strikes-again-3575860/\">for the sake of DRM.</a>"
msgstr ""
#. type: Content of: <ul><li><p>
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/14
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/18