[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Tue, 10 Sep 2019 19:59:31 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/09/10 19:59:31
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.ru.po nl.po
pl.po pot proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.233&r2=1.234
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.114&r2=1.115
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.68&r2=1.69
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.69&r2=1.70
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.89&r2=1.90
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.207&r2=1.208
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.252&r2=1.253
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.131&r2=1.132
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.212&r2=1.213
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.121&r2=1.122
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.286&r2=1.287
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.134&r2=1.135
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- de.po 10 Sep 2019 11:33:42 -0000 1.134
+++ de.po 10 Sep 2019 23:59:29 -0000 1.135
@@ -1088,6 +1088,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- es.po 10 Sep 2019 11:33:42 -0000 1.184
+++ es.po 10 Sep 2019 23:59:29 -0000 1.185
@@ -997,6 +997,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.233
retrieving revision 1.234
diff -u -b -r1.233 -r1.234
--- fr.po 10 Sep 2019 12:40:46 -0000 1.233
+++ fr.po 10 Sep 2019 23:59:30 -0000 1.234
@@ -953,6 +953,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- it.po 10 Sep 2019 11:33:42 -0000 1.134
+++ it.po 10 Sep 2019 23:59:30 -0000 1.135
@@ -1010,6 +1010,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- ja.po 10 Sep 2019 11:33:42 -0000 1.141
+++ ja.po 10 Sep 2019 23:59:30 -0000 1.142
@@ -853,6 +853,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-apple.de-diff.html 7 Sep 2019 07:31:38 -0000 1.42
+++ malware-apple.de-diff.html 10 Sep 2019 23:59:30 -0000 1.43
@@ -318,25 +318,37 @@
<li>
<p>Apple <a
href="https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/">
-stops users from fixing</strong></del></span> <span
class="inserted"><ins><em>refute</em></ins></span> the
+stops users from fixing</strong></del></span> <span
class="inserted"><ins><em>refute</em></ins></span> the <span
class="removed"><del><strong>security bugs</strong></del></span>
<span class="inserted"><ins><em>supposition that prestigious proprietary
software doesn't have grave
bugs.</p>
<ul class="blurbs">
- <li id="M201908300">
- <p>In spite of iPhone's reputation for being
- secure, it does have bad</em></ins></span> security <span
class="inserted"><ins><em>flaws. Crackers
- exploited 14</em></ins></span> bugs <span class="removed"><del><strong>in
Quicktime</strong></del></span> <span class="inserted"><ins><em>of
iOS</em></ins></span> for
- <span class="removed"><del><strong>Windows</a>, while
refusing</strong></del></span> <span class="inserted"><ins><em>two and a half
years</em></ins></span> to <span class="removed"><del><strong>fix them
itself.</p>
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found</em></ins></span>
+ in <span class="removed"><del><strong>Quicktime</strong></del></span>
<span class="inserted"><ins><em>iOS allowed attackers to gain access to
sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on
Apple</em></ins></span>
+ for
+ <span class="removed"><del><strong>Windows</a>, while
refusing</strong></del></span> <span class="inserted"><ins><em>even a modicum
of security. It also means that the devices do
+ not even try</em></ins></span> to <span class="removed"><del><strong>fix
them</strong></del></span> <span class="inserted"><ins><em>offer security
against Apple</em></ins></span> itself.</p>
</li>
- <li>
- <p>iOS version 9 for
- iThings</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ <span class="removed"><del><strong><li>
+ <p>iOS version 9</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908300">
+ <p>In spite of iPhone's reputation</em></ins></span> for
+ <span class="removed"><del><strong>iThings <a
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
Apple</a>. Apple eventually backed off from this policy under
- criticism from the users. However, it</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">
+ criticism from the users. However,</strong></del></span> <span
class="inserted"><ins><em>being
+ secure,</em></ins></span> it <span class="inserted"><ins><em>does have bad
security flaws. Crackers
+ exploited 14 bugs of iOS for two and a half years to <a
+
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">
steal users' most private data</a>, and gain access to their
accounts.</p>
@@ -442,84 +454,87 @@
<span class="removed"><del><strong>startup</strong></del></span> <span
class="inserted"><ins><em>operating system</em></ins></span> of <span
class="removed"><del><strong>iOS</a>. The term “cloud” means
“please don't ask where.”</p>
- <p>There</strong></del></span> <span class="inserted"><ins><em>the
Apple iThings,</em></ins></span> is <span class="removed"><del><strong>a way to
<a href="https://support.apple.com/en-us/HT201104">
+ <p>There</strong></del></span> <span class="inserted"><ins><em>the
Apple iThings,</em></ins></span> is <span class="inserted"><ins><em>the
prototype
+of</em></ins></span> a <span class="removed"><del><strong>way
to</strong></del></span> <span class="inserted"><ins><em>jail</a>. It
was Apple that introduced the practice of
+designing general purpose computers with censorship of application
+programs.</p>
+
+<p>Here is an article about the</em></ins></span> <a <span
class="removed"><del><strong>href="https://support.apple.com/en-us/HT201104">
deactivate iCloud</a>, but it's active by default so it still
counts as a
surveillance functionality.</p>
- <p>Unknown people apparently took advantage</strong></del></span>
<span class="inserted"><ins><em>the prototype</em></ins></span>
-of <span class="removed"><del><strong>this to
+ <p>Unknown people apparently took advantage of this to
<a
href="https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence">get
- nude photos</strong></del></span> <span class="inserted"><ins><em>a
jail</a>. It was Apple that introduced the practice</em></ins></span> of
<span class="removed"><del><strong>many celebrities</a>. They needed to
break Apple's
- security to get at them, but NSA can access any</strong></del></span>
-<span class="inserted"><ins><em>designing general purpose computers with
censorship</em></ins></span> of <span class="removed"><del><strong>them
through</strong></del></span> <span class="inserted"><ins><em>application
-programs.</p>
+ nude photos of many celebrities</a>. They
needed</strong></del></span>
+<span
class="inserted"><ins><em>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
+code signing</a> that the iThings use</em></ins></span> to <span
class="removed"><del><strong>break Apple's
+ security</strong></del></span> <span class="inserted"><ins><em>lock up
the user.</p>
-<p>Here is an article about the</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
+<p>Curiously, Apple is beginning</em></ins></span> to <span
class="removed"><del><strong>get at them, but NSA can access any of
them</strong></del></span> <span class="inserted"><ins><em>allow limited
passage</em></ins></span> through
+ <span class="removed"><del><strong><a
href="/philosophy/surveillance-vs-democracy.html#digitalcash">PRISM</a>.
</p></li>
<li><p><a
href="http://www.washingtonpost.com/blogs/the-switch/wp/2014/10/30/how-one-mans-private-files-ended-up-on-apples-icloud-without-his-consent/">
- MacOS automatically sends</strong></del></span>
-<span
class="inserted"><ins><em>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
-code signing</a> that the iThings use</em></ins></span> to <span
class="inserted"><ins><em>lock up the user.</p>
-
-<p>Curiously,</em></ins></span> Apple <span
class="removed"><del><strong>servers unsaved documents being
- edited</a>. The</strong></del></span> <span
class="inserted"><ins><em>is beginning to allow limited passage through the
+ MacOS automatically sends</strong></del></span> <span
class="inserted"><ins><em>the
walls of the iThing jail: users can now install apps built from
source code, provided the source code is written in Swift. Users
-cannot do this freely because they are required to identify
+cannot do this freely because they are required</em></ins></span> to <span
class="removed"><del><strong>Apple servers unsaved documents being
+ edited</a>. The</strong></del></span> <span
class="inserted"><ins><em>identify
themselves.</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.schneier.com/blog/archives/2014/10/apple_copies_yo.html?utm_source=twitterfeed&utm_medium=twitter">
things you have</strong></del></span> <span
class="inserted"><ins><em>href="https://developer.apple.com/xcode/">Here
are details</a>. While this is a crack in the prison walls, it
is</em></ins></span> not <span
class="removed"><del><strong>decided</strong></del></span>
-<span class="inserted"><ins><em>big enough</em></ins></span> to <span
class="removed"><del><strong>save</strong></del></span> <span
class="inserted"><ins><em>mean that the iThings are no longer jails.</p>
+<span class="inserted"><ins><em>big enough</em></ins></span> to <span
class="removed"><del><strong>save are even more sensitive
than</strong></del></span> <span class="inserted"><ins><em>mean
that</em></ins></span> the
+ <span class="removed"><del><strong>things you have
stored</strong></del></span> <span class="inserted"><ins><em>iThings are no
longer jails.</p>
<h4>Examples of censorship by Apple jails</h4>
<ul class="blurbs">
<li id="M201905150">
- <p>Users caught in the jail of an iMonster</em></ins></span> are
<span class="inserted"><ins><em><a
- href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ <p>Users caught</em></ins></span> in <span
class="removed"><del><strong>files</a>.</p>
+ </li>
+
+ <li><p>Apple has made various</strong></del></span> <span
class="inserted"><ins><em>the jail of an iMonster are</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
+ MacOS programs send files</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
ducks for other attackers</a>, and the app censorship prevents
security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable</em></ins></span> even <span class="removed"><del><strong>more
sensitive than</strong></del></span> <span class="inserted"><ins><em>if it
didn't lead to security threats as well.</p>
+ inexcusable even if it didn't lead</em></ins></span> to <span
class="inserted"><ins><em>security threats as well.</p>
</li>
<li id="M201710130">
<p>Apple is <a
href="https://www.eff.org/deeplinks/2017/10/iranian-hardliners-want-isolated-internet">
- censoring apps for</em></ins></span> the
- <span class="removed"><del><strong>things you have
stored</strong></del></span> <span class="inserted"><ins><em>US government
too</a>. Specifically, it is
+ censoring apps for the US government too</a>. Specifically, it is
deleting apps developed by Iranians.</p>
- <p>The root of these wrongs are</em></ins></span> in <span
class="removed"><del><strong>files</a>.</p></strong></del></span>
<span class="inserted"><ins><em>Apple. If Apple had not designed
- the iMonsters to let Apple censor applications, Apple would not have
- had the power to stop users from installing whatever kind of
apps.</p></em></ins></span>
- </li>
+ <p>The root of these wrongs are in Apple. If</em></ins></span> Apple
<span class="removed"><del><strong>servers without asking permission</a>.
+ This exposes</strong></del></span> <span class="inserted"><ins><em>had not
designed</em></ins></span>
+ the <span class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>iMonsters</em></ins></span> to <span
class="removed"><del><strong>Big Brother and perhaps</strong></del></span>
<span class="inserted"><ins><em>let Apple censor applications, Apple would not
have
+ had the power</em></ins></span> to <span
class="removed"><del><strong>other snoops.</p>
- <span class="removed"><del><strong><li><p>Apple has made
various</strong></del></span>
+ <p>It also demonstrates how you can't trust proprietary software,
+ because</strong></del></span> <span class="inserted"><ins><em>stop users
from installing whatever kind of apps.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201707290">
- <p>Apple</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2014/nov/04/apple-data-privacy-icloud">
- MacOS programs send files</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
+ <li id="M201707290">
+ <p>Apple <a
+
href="https://www.nytimes.com/2017/07/29/technology/china-apple-censorhip.html">
deleted several VPNs from its app store for China</a>, thus using its
- own censorship power</em></ins></span> to <span
class="removed"><del><strong>Apple servers without asking permission</a>.
- This exposes</strong></del></span> <span
class="inserted"><ins><em>strengthen that of</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>Chinese government.</p>
+ own censorship power to strengthen that of the Chinese
government.</p>
</li>
<li id="M201701064">
- <p>Apple used its censorship system</em></ins></span> to <span
class="removed"><del><strong>Big Brother</strong></del></span> <span
class="inserted"><ins><em>enforce Russian surveillance <a
+ <p>Apple used its censorship system to enforce Russian surveillance
<a
href="http://www.nytimes.com/2017/01/06/technology/linkedin-blocked-in-russia.html?partner=rss&emc=rss&_r=0">
by blocking distribution of the LinkedIn app in Russia</a>.</p>
<p>This is ironic because LinkedIn is a surveillance system itself.
While subjecting its users to its own surveillance, it tries to
- protect its users from Russian surveillance,</em></ins></span> and <span
class="removed"><del><strong>perhaps</strong></del></span> <span
class="inserted"><ins><em>is therefore subject</em></ins></span>
- to <span class="removed"><del><strong>other snoops.</p>
-
- <p>It also demonstrates how you can't trust proprietary
software,</strong></del></span> <span class="inserted"><ins><em>Russian
censorship.</p>
+ protect its users from Russian surveillance, and is therefore subject
+ to Russian censorship.</p>
<p>However, the point here is the wrong of Apple's censorship of
apps.</p>
@@ -541,7 +556,7 @@
<li id="M201509290">
<p>Apple <a
href="http://ifixit.org/blog/7401/ifixit-app-pulled/">
- banned a program from the App Store</a></em></ins></span> because
<span class="inserted"><ins><em>its developers
+ banned a program from the App Store</a> because its developers
committed the enormity of disassembling some iThings.</p>
</li>
@@ -1230,7 +1245,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:38 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- malware-apple.de.po 7 Sep 2019 07:31:38 -0000 1.137
+++ malware-apple.de.po 10 Sep 2019 23:59:30 -0000 1.138
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -444,6 +444,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- malware-apple.es.po 7 Sep 2019 22:28:49 -0000 1.152
+++ malware-apple.es.po 10 Sep 2019 23:59:30 -0000 1.153
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
"X-Generator: Poedit 2.2\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -397,6 +398,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- malware-apple.fr.po 7 Sep 2019 11:59:39 -0000 1.158
+++ malware-apple.fr.po 10 Sep 2019 23:59:30 -0000 1.159
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2019-08-25 21:05+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -396,6 +397,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- malware-apple.it-diff.html 7 Sep 2019 07:31:38 -0000 1.50
+++ malware-apple.it-diff.html 10 Sep 2019 23:59:30 -0000 1.51
@@ -266,6 +266,19 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201908300">
<p>In spite of iPhone's reputation for being
secure, it does have bad security flaws. Crackers
@@ -391,8 +404,7 @@
apps.</p>
</li>
-<span class="removed"><del><strong><li><p>
-Apple</strong></del></span>
+<span class="removed"><del><strong><li><p></strong></del></span>
<span class="inserted"><ins><em><li id="M201701050">
<p>Apple used its censorship system to enforce China's censorship
<a
@@ -437,7 +449,7 @@
not be allowed to censor apps. Even if Apple carried out this act of
censorship with some care, it would still be wrong. Whether racism
is bad, whether educating people about drone attacks is bad, are not
- the real issue. Apple should not have the power to impose its views
+ the real issue.</em></ins></span> Apple <span
class="inserted"><ins><em>should not have the power to impose its views
about either of these questions, or any other.</p>
</li>
@@ -1098,7 +1110,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:38 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- malware-apple.it.po 7 Sep 2019 07:31:38 -0000 1.131
+++ malware-apple.it.po 10 Sep 2019 23:59:30 -0000 1.132
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -409,6 +409,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- malware-apple.ja-diff.html 7 Sep 2019 07:31:38 -0000 1.63
+++ malware-apple.ja-diff.html 10 Sep 2019 23:59:30 -0000 1.64
@@ -269,6 +269,19 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201908300">
<p>In spite of iPhone's reputation for being
secure, it does have bad security flaws. Crackers
@@ -537,19 +550,19 @@
<h3 id="sabotage">Apple Sabotage</h3>
-<span class="removed"><del><strong><p>The wrongs in this
section</strong></del></span>
+<span class="removed"><del><strong><p>The wrongs</strong></del></span>
-<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way that hurts the user.
-But they are a lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> Apple
-<span class="removed"><del><strong>actions</strong></del></span> <span
class="inserted"><ins><em>employs its power over users
-to directly intervene in ways</em></ins></span> that harm <span
class="inserted"><ins><em>them or block their work.</p>
+<span class="inserted"><ins><em><p>These are situations in which Apple
employs its power over users
+to directly intervene</em></ins></span> in <span
class="removed"><del><strong>this section are not precisely malware, since they
do
+not involve making the program</strong></del></span> <span
class="inserted"><ins><em>ways</em></ins></span> that <span
class="removed"><del><strong>runs in</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When Apple suspects a user of fraud, it
- judges the case secretly and presents the verdict
- as a fait accompli. The punishment</em></ins></span> to <span
class="inserted"><ins><em>a user found guilty <a
+ <p>When Apple suspects</em></ins></span> a <span
class="removed"><del><strong>way that hurts</strong></del></span> <span
class="inserted"><ins><em>user of fraud, it
+ judges</em></ins></span> the <span class="removed"><del><strong>user.
+But they are</strong></del></span> <span class="inserted"><ins><em>case
secretly and presents the verdict
+ as</em></ins></span> a <span class="removed"><del><strong>lot like
malware, since they are technical Apple
+actions that harm</strong></del></span> <span class="inserted"><ins><em>fait
accompli. The punishment</em></ins></span> to <span
class="inserted"><ins><em>a user found guilty <a
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
being cut off for life, which more-or-less cripples</em></ins></span> the
<span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>user's Apple
devices forever</a>. There is no appeal.</p>
@@ -575,13 +588,13 @@
<p>The <span class="removed"><del><strong>Apple
Music</strong></del></span> <span
class="inserted"><ins><em>Telegram</em></ins></span> client
<span class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>is free software on other platforms, but not on
- iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
+ iThings. Since</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple">they
are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
+
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
changes</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file system <span
class="inserted"><ins><em>from HFS+ to APFS</a>, which cannot be
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
@@ -629,11 +642,13 @@
</li>
<li id="M201602050"></em></ins></span>
- <p>iOS version 9 for iThings <a
-
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ <p>iOS version 9 for iThings <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ them irreparably if they were repaired by someone other than
+ Apple</a>. Apple eventually backed off from this policy under
+ criticism</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
- Apple</a>. Apple <span class="removed"><del><strong>eventually
backed off from this policy under
- criticism</strong></del></span> <span class="inserted"><ins><em>eventually
backed off from this policy under
+ Apple</a>. Apple eventually backed off from this policy under
criticism from the users. However, it has not acknowledged that this
was wrong.</p>
</li>
@@ -697,8 +712,8 @@
</li>
<li id="M201809070">
- <p>Adware Doctor, an ad blocker for MacOS, <a
-
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
+ <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
</li>
@@ -727,8 +742,8 @@
</li>
<li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
@@ -1059,7 +1074,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:38 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.114
retrieving revision 1.115
diff -u -b -r1.114 -r1.115
--- malware-apple.ja.po 7 Sep 2019 07:31:38 -0000 1.114
+++ malware-apple.ja.po 10 Sep 2019 23:59:30 -0000 1.115
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -355,6 +355,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.68
retrieving revision 1.69
diff -u -b -r1.68 -r1.69
--- malware-apple.nl-diff.html 7 Sep 2019 07:31:38 -0000 1.68
+++ malware-apple.nl-diff.html 10 Sep 2019 23:59:30 -0000 1.69
@@ -269,6 +269,19 @@
bugs.</p>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201908300">
<p>In spite of iPhone's reputation for being
secure, it does have bad security flaws. Crackers
@@ -537,19 +550,19 @@
<h3 id="sabotage">Apple Sabotage</h3>
-<span class="removed"><del><strong><p>The wrongs in this
section</strong></del></span>
+<span class="removed"><del><strong><p>The wrongs</strong></del></span>
-<span class="inserted"><ins><em><p>These</em></ins></span> are <span
class="removed"><del><strong>not precisely malware, since they do
-not involve making the program that runs</strong></del></span> <span
class="inserted"><ins><em>situations</em></ins></span> in <span
class="removed"><del><strong>a way that hurts the user.
-But they are a lot like malware, since they are
technical</strong></del></span> <span
class="inserted"><ins><em>which</em></ins></span> Apple
-<span class="removed"><del><strong>actions</strong></del></span> <span
class="inserted"><ins><em>employs its power over users
-to directly intervene in ways</em></ins></span> that harm <span
class="inserted"><ins><em>them or block their work.</p>
+<span class="inserted"><ins><em><p>These are situations in which Apple
employs its power over users
+to directly intervene</em></ins></span> in <span
class="removed"><del><strong>this section are not precisely malware, since they
do
+not involve making the program</strong></del></span> <span
class="inserted"><ins><em>ways</em></ins></span> that <span
class="removed"><del><strong>runs in</strong></del></span> <span
class="inserted"><ins><em>harm them or block their work.</p>
<ul class="blurbs">
<li id="M201908130">
- <p>When Apple suspects a user of fraud, it
- judges the case secretly and presents the verdict
- as a fait accompli. The punishment</em></ins></span> to <span
class="inserted"><ins><em>a user found guilty <a
+ <p>When Apple suspects</em></ins></span> a <span
class="removed"><del><strong>way that hurts</strong></del></span> <span
class="inserted"><ins><em>user of fraud, it
+ judges</em></ins></span> the <span class="removed"><del><strong>user.
+But they are</strong></del></span> <span class="inserted"><ins><em>case
secretly and presents the verdict
+ as</em></ins></span> a <span class="removed"><del><strong>lot like
malware, since they are technical Apple
+actions that harm</strong></del></span> <span class="inserted"><ins><em>fait
accompli. The punishment</em></ins></span> to <span
class="inserted"><ins><em>a user found guilty <a
href="https://qz.com/1683460/what-happens-to-your-itunes-account-when-apple-says-youve-committed-fraud/">is
being cut off for life, which more-or-less cripples</em></ins></span> the
<span class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>user's Apple
devices forever</a>. There is no appeal.</p>
@@ -575,13 +588,13 @@
<p>The <span class="removed"><del><strong>Apple
Music</strong></del></span> <span
class="inserted"><ins><em>Telegram</em></ins></span> client
<span class="removed"><del><strong>program</strong></del></span> <span
class="inserted"><ins><em>is free software on other platforms, but not on
- iThings. Since <a
href="/proprietary/proprietary-jails.html#apple">they
+ iThings. Since</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html#apple">they
are jails</a>, they don't permit any app to be free
software.</p>
</li>
<li id="M201710044">
- <p>MacOS High Sierra forcibly reformats SSD boot drives,
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/">scans</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
+ <p>MacOS High Sierra forcibly reformats SSD boot drives, and <a
+
href="https://www.macworld.com/article/3230498/apple-file-system-apfs-faq.html">
changes</em></ins></span> the <span
class="removed"><del><strong>user's</strong></del></span> file system <span
class="inserted"><ins><em>from HFS+ to APFS</a>, which cannot be
accessed from GNU/Linux, Windows or even older versions of MacOS.</p>
</li>
@@ -629,11 +642,13 @@
</li>
<li id="M201602050"></em></ins></span>
- <p>iOS version 9 for iThings <a
-
href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ <p>iOS version 9 for iThings <a <span
class="removed"><del><strong>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
+ them irreparably if they were repaired by someone other than
+ Apple</a>. Apple eventually backed off from this policy under
+ criticism</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair">sabotages
them irreparably if they were repaired by someone other than
- Apple</a>. Apple <span class="removed"><del><strong>eventually
backed off from this policy under
- criticism</strong></del></span> <span class="inserted"><ins><em>eventually
backed off from this policy under
+ Apple</a>. Apple eventually backed off from this policy under
criticism from the users. However, it has not acknowledged that this
was wrong.</p>
</li>
@@ -697,8 +712,8 @@
</li>
<li id="M201809070">
- <p>Adware Doctor, an ad blocker for MacOS, <a
-
href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
+ <p>Adware Doctor, an ad blocker for MacOS,</em></ins></span> <a
<span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/wjye8x/mac-anti-adware-doctor-app-steals-browsing-history">reports
the user's browsing history</a>.</p>
</li>
@@ -727,8 +742,8 @@
</li>
<li id="M201611170">
- <p>iPhones</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says">send</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
+ <p>iPhones <a
+
href="https://theintercept.com/2016/11/17/iphones-secretly-send-call-history-to-apple-security-firm-says/">send</em></ins></span>
lots of personal data to Apple's servers</a>. Big Brother can get
them from there.</p>
</li>
@@ -1059,7 +1074,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:38 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.69
retrieving revision 1.70
diff -u -b -r1.69 -r1.70
--- malware-apple.nl.po 7 Sep 2019 07:31:39 -0000 1.69
+++ malware-apple.nl.po 10 Sep 2019 23:59:30 -0000 1.70
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -350,6 +350,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-apple.pot 7 Sep 2019 07:31:39 -0000 1.79
+++ malware-apple.pot 10 Sep 2019 23:59:30 -0000 1.80
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -292,6 +292,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a "
+"href=\"https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/\">found
"
+"in iOS allowed attackers to gain access to sensitive information including "
+"private messages, passwords, photos, contacts stored on the user's "
+"iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a "
"href=\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says\">
"
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- malware-apple.ru.po 9 Sep 2019 07:31:44 -0000 1.212
+++ malware-apple.ru.po 10 Sep 2019 23:59:30 -0000 1.213
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2019-01-29 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -392,6 +393,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- nl.po 10 Sep 2019 11:33:42 -0000 1.135
+++ nl.po 10 Sep 2019 23:59:30 -0000 1.136
@@ -873,6 +873,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- pl.po 10 Sep 2019 11:33:42 -0000 1.134
+++ pl.po 10 Sep 2019 23:59:30 -0000 1.135
@@ -818,6 +818,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- pot 10 Sep 2019 11:33:42 -0000 1.133
+++ pot 10 Sep 2019 23:59:30 -0000 1.134
@@ -675,6 +675,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-insecurity.de-diff.html 7 Sep 2019 07:31:39 -0000 1.30
+++ proprietary-insecurity.de-diff.html 10 Sep 2019 23:59:30 -0000 1.31
@@ -68,16 +68,29 @@
<ul>
<li>
<p>Some Samsung phones
- randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos to people in the owner's contact list</a>.</p>
-</li>
-<li>
- <p>One of the dangers of the “internet</strong></del></span>
<span class="inserted"><ins><em>serve as specific substantiation.</p>
+ randomly</strong></del></span> <span class="inserted"><ins><em>serve as
specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
+ photos to people</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found</em></ins></span>
+ in <span class="inserted"><ins><em>iOS allowed attackers to gain access to
sensitive information
+ including private messages, passwords, photos, contacts stored
on</em></ins></span>
+ the <span class="removed"><del><strong>owner's contact
list</a>.</p>
+</li>
+<li>
+ <p>One</strong></del></span> <span class="inserted"><ins><em>user's
iMonster</a>.</p>
+
+ <p>The deep insecurity</em></ins></span> of <span
class="removed"><del><strong>the dangers</strong></del></span> <span
class="inserted"><ins><em>iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum</em></ins></span> of <span
class="inserted"><ins><em>security. It also means that</em></ins></span> the
<span class="removed"><del><strong>“internet</strong></del></span> <span
class="inserted"><ins><em>devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201908300">
<p>In spite</em></ins></span> of <span
class="removed"><del><strong>stings” is that, if
you lose your internet service, you also <a
@@ -94,48 +107,46 @@
allow delivery staff</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">
steal users' most private data</a>, and gain
access</em></ins></span> to <span
class="removed"><del><strong>open</strong></del></span> their <span
class="removed"><del><strong>front doors</a>. Wouldn't you know it,
- the system</strong></del></span>
+ the system has a grave security flaw.</p>
+</li>
+<li>
+ <p>Intel's intentional “management engine” back
door</strong></del></span>
<span class="inserted"><ins><em>accounts.</p>
- <p>Apple</em></ins></span> has <span class="removed"><del><strong>a
grave</strong></del></span> <span class="inserted"><ins><em>corrected these
bugs, but this shows that <em>any</em>
- developer of nonfree programs is liable to make mistakes affecting
- the</em></ins></span> security <span
class="removed"><del><strong>flaw.</p>
+ <p>Apple</em></ins></span> has <span
class="removed"><del><strong><a
+href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
+ unintended back doors</a> too.</p>
</li>
<li>
- <p>Intel's intentional “management engine” back door has
<a
-href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
- unintended back doors</a> too.</p></strong></del></span> <span
class="inserted"><ins><em>of their products, and users can't investigate or fix
- them.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li>
- <p>Bad</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908020">
- <p>Out of 21 gratis Android antivirus apps
- that were tested by</em></ins></span> security <span
class="removed"><del><strong>in some cars makes it possible
- to</strong></del></span> <span class="inserted"><ins><em>researchers,
eight</em></ins></span> <a <span
class="removed"><del><strong>href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
+ <p>Bad security in some cars makes it possible
+ to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
remotely activate the airbags</a>.</p>
</li>
<li>
<p>A “smart” intravenous pump designed for
- hospitals is connected</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
- failed</em></ins></span> to <span class="inserted"><ins><em>detect a test
virus</a>. All of them asked for dangerous
- permissions or contained advertising trackers, with seven being more
- risky than</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally <a
+ hospitals</strong></del></span> <span class="inserted"><ins><em>corrected
these bugs, but this shows that <em>any</em>
+ developer of nonfree programs</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>liable</em></ins></span> to <span
class="inserted"><ins><em>make mistakes affecting</em></ins></span>
+ the <span class="removed"><del><strong>internet. Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its security has been cracked</a>.</p></strong></del></span>
<span class="inserted"><ins><em>average of the 100 most popular Android
apps.</p></em></ins></span>
+ its</strong></del></span> security <span class="removed"><del><strong>has
been cracked</a>.</p>
+ <p>Note</strong></del></span> <span class="inserted"><ins><em>of their
products, and users can't investigate or fix
+ them.</p>
+ </li>
+
+ <li id="M201908020">
+ <p>Out of 21 gratis Android antivirus apps</em></ins></span>
+ that <span class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
- <p>Note that <span class="removed"><del><strong>this article
misuses</strong></del></span> the <span class="removed"><del><strong>term <a
-href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</strong></del></span> <span class="inserted"><ins><em>article
refers</em></ins></span> to <span
class="removed"><del><strong>crackers.</p></strong></del></span> <span
class="inserted"><ins><em>these proprietary apps as
+ <p>Note that the article refers to these proprietary apps as
“free”. It should have said “gratis”
- instead.</p></em></ins></span>
+ instead.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>The bad security in</strong></del></span>
- <span class="inserted"><ins><em><li id="M201907080">
+ <li id="M201907080">
<p>Many Android apps can track
users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
@@ -251,13 +262,14 @@
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p>Note that this article misuses the term <a
+ <p>Note that this</em></ins></span> article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
referring to crackers.</p>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li id="M201708280">
- <p>The bad security in</em></ins></span> many Internet of Stings
devices allows <a
+ <span class="inserted"><ins><em><li id="M201708280"></em></ins></span>
+ <p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
to snoop on the people that use them</a>.</p>
@@ -1060,7 +1072,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary-insecurity.de.po 7 Sep 2019 07:31:39 -0000 1.133
+++ proprietary-insecurity.de.po 10 Sep 2019 23:59:30 -0000 1.134
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -139,6 +139,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-insecurity.es.po 7 Sep 2019 22:28:49 -0000 1.7
+++ proprietary-insecurity.es.po 10 Sep 2019 23:59:30 -0000 1.8
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2019-09-07 17:57-0400\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2\n"
@@ -111,6 +112,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary-insecurity.fr.po 7 Sep 2019 11:59:39 -0000 1.172
+++ proprietary-insecurity.fr.po 10 Sep 2019 23:59:30 -0000 1.173
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2019-08-06 13:21+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -110,6 +111,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-insecurity.it-diff.html 7 Sep 2019 07:31:39 -0000 1.45
+++ proprietary-insecurity.it-diff.html 10 Sep 2019 23:59:30 -0000 1.46
@@ -58,50 +58,78 @@
<li id="break-security-smarttv">
<p><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</strong></del></span>
-
-<span class="inserted"><ins><em><p>This page lists clearly established
cases of insecurity in
-proprietary software that has grave consequences or is otherwise
-noteworthy.</p>
-
-<div class="important">
-<p>If you know of an example that ought</em></ins></span> to <span
class="removed"><del><strong>break security on a “smart”
TV</a> and use its camera</strong></del></span> <span
class="inserted"><ins><em>be in this page but isn't
-here, please write</em></ins></span>
-to <span class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em><a
href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>people who are watching TV.</p>
+ Crackers found a way to break security on a “smart”
TV</a> and use its camera
+ to watch the people who are watching TV.</p>
</li>
<li>
- <p>Many models</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras <a
+ <p>Many models</strong></del></span>
+
+<span class="inserted"><ins><em><p>This page lists clearly established
cases</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
- <p>That is</strong></del></span> a <span
class="removed"><del><strong>malicious functionality, but in
addition</strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
-to serve as specific substantiation.</p>
+ <p>That is a malicious functionality, but</strong></del></span> <span
class="inserted"><ins><em>insecurity</em></ins></span> in <span
class="removed"><del><strong>addition it</strong></del></span>
+<span class="inserted"><ins><em>proprietary software that has grave
consequences or</em></ins></span> is <span class="removed"><del><strong>a gross
+ insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into
+ users' cameras</a>.</p>
+
+</li>
+
+<li>
+ <p>
+ Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+ pre-installed on 28 models</strong></del></span> <span
class="inserted"><ins><em>otherwise
+noteworthy.</p>
+
+<div class="important">
+<p>If you know</em></ins></span> of <span
class="removed"><del><strong>HP laptops logged the user's
+ keystroke</strong></del></span> <span class="inserted"><ins><em>an example
that ought</em></ins></span> to <span class="removed"><del><strong>a
file</strong></del></span> <span class="inserted"><ins><em>be</em></ins></span>
in <span class="removed"><del><strong>the filesystem. Any process with
access</strong></del></span> <span class="inserted"><ins><em>this page but isn't
+here, please write</em></ins></span>
+to <span class="inserted"><ins><em><a
href="mailto:address@hidden"><address@hidden></a>
+to inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>filesystem</strong></del></span> <span
class="inserted"><ins><em>URL of a trustworthy reference</em></ins></span> or
<span class="removed"><del><strong>the MapViewOfFile API could gain
access</strong></del></span> <span
class="inserted"><ins><em>two</em></ins></span>
+to <span class="removed"><del><strong>the
+ log. Furthermore,</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M201908300">
- <p>In spite of iPhone's reputation for being
- secure,</em></ins></span> it <span class="removed"><del><strong>is a gross
- insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts</strong></del></span> <span class="inserted"><ins><em>does
have bad security flaws. Crackers
- exploited 14 bugs of iOS for two</em></ins></span> and <span
class="removed"><del><strong>use them</strong></del></span> <span
class="inserted"><ins><em>a half years</em></ins></span> to <span
class="removed"><del><strong>get into</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">
- steal</em></ins></span> users' <span
class="removed"><del><strong>cameras</a>.</p>
-
+ <li id="M201909100">
+ <p>A series of vulnerabilities</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers</em></ins></span> to <span
class="removed"><del><strong>modzero</a> the “information-leak via
Covert Storage
+ Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>gain access</em></ins></span> to <span
class="removed"><del><strong>capture keystrokes without
+ taking</strong></del></span> <span class="inserted"><ins><em>sensitive
information
+ including private messages, passwords, photos, contacts stored
on</em></ins></span>
+ the <span class="removed"><del><strong>risk of being classified as
malicious task by AV
+ heuristics”.
+ </p>
</li>
+<li></strong></del></span> <span class="inserted"><ins><em>user's
iMonster</a>.</p></em></ins></span>
-<li>
- <p>
- Conexant HD Audio Driver Package (version 1.0.0.46</strong></del></span>
<span class="inserted"><ins><em>most private data</a>,</em></ins></span>
and <span class="removed"><del><strong>earlier)
- pre-installed on 28 models</strong></del></span> <span
class="inserted"><ins><em>gain access to their
+ <p>The <span class="inserted"><ins><em>deep insecurity of iMonsters
is even more pertinent given that
+ Apple's</em></ins></span> proprietary <span
class="removed"><del><strong>code</strong></del></span> <span
class="inserted"><ins><em>software makes users totally dependent on Apple
+ for even a modicum of security. It also means</em></ins></span> that
<span class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+medical</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> devices <span
class="removed"><del><strong>is <a
href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross</strong></del></span> <span class="inserted"><ins><em>do
+ not even try to offer</em></ins></span> security <span
class="removed"><del><strong>faults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>against Apple
itself.</p></em></ins></span>
+ </li>
+
+
+<span class="removed"><del><strong><li>
+ <p>Exploits</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908300">
+ <p>In spite</em></ins></span> of <span
class="removed"><del><strong>bugs in Windows, which were developed by the
NSA</strong></del></span> <span class="inserted"><ins><em>iPhone's reputation
for being
+ secure, it does have bad security flaws. Crackers
+ exploited 14 bugs of iOS for two and a half years to <a
+
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">
+ steal users' most private data</a>, and gain access to their
accounts.</p>
<p>Apple has corrected these bugs, but this shows that
<em>any</em>
- developer</em></ins></span> of <span class="removed"><del><strong>HP
laptops logged</strong></del></span> <span class="inserted"><ins><em>nonfree
programs is liable to make mistakes affecting</em></ins></span>
- the <span class="removed"><del><strong>user's
- keystroke</strong></del></span> <span class="inserted"><ins><em>security
of their products, and users can't investigate or fix
+ developer of nonfree programs is liable to make mistakes affecting
+ the security of their products, and users can't investigate or fix
them.</p>
</li>
@@ -109,43 +137,37 @@
<p>Out of 21 gratis Android antivirus apps
that were tested by security researchers, eight <a
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
- failed</em></ins></span> to <span
class="inserted"><ins><em>detect</em></ins></span> a <span
class="removed"><del><strong>file in the filesystem. Any
process</strong></del></span> <span class="inserted"><ins><em>test
virus</a>. All of them asked for dangerous
- permissions or contained advertising trackers,</em></ins></span> with
<span class="removed"><del><strong>access to</strong></del></span> <span
class="inserted"><ins><em>seven being more
- risky than</em></ins></span> the <span
class="removed"><del><strong>filesystem or</strong></del></span> <span
class="inserted"><ins><em>average of</em></ins></span> the <span
class="removed"><del><strong>MapViewOfFile API could gain
access</strong></del></span> <span class="inserted"><ins><em>100 most popular
Android apps.</p>
+ failed to detect a test virus</a>. All of them asked for dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than the average of the 100 most popular Android apps.</p>
- <p>Note that the article refers</em></ins></span> to <span
class="inserted"><ins><em>these proprietary apps as
+ <p>Note that the article refers to these proprietary apps as
“free”. It should have said “gratis”
instead.</p>
</li>
<li id="M201907080">
<p>Many Android apps can track
- users' movements even when</em></ins></span> the
- <span class="removed"><del><strong>log. Furthermore,</strong></del></span>
<span class="inserted"><ins><em>user says</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to <span
class="removed"><del><strong>modzero</a> the “information-leak via
Covert Storage
- Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>allow them access</em></ins></span> to <span
class="removed"><del><strong>capture keystrokes without
- taking</strong></del></span> <span
class="inserted"><ins><em>locations</a>.</p>
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
<li id="M201905150">
- <p>Users caught in</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>jail</em></ins></span> of <span
class="removed"><del><strong>being classified</strong></del></span> <span
class="inserted"><ins><em>an iMonster are <a
+ <p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
ducks for other attackers</a>, and the app censorship prevents
security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable even if it didn't lead to security threats</em></ins></span>
as <span class="removed"><del><strong>malicious task by AV
- heuristics”.
- </p></strong></del></span> <span
class="inserted"><ins><em>well.</p></em></ins></span>
+ inexcusable even if it didn't lead to security threats as well.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201903210"></em></ins></span>
- <p>The <span class="inserted"><ins><em>Medtronics Conexus Telemetry
Protocol has <a
+ <li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has <a
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
defibrillators</a> and the devices they connect to.</p>
@@ -153,18 +175,18 @@
<p>This protocol has been around since 2006, and similar
vulnerabilities were discovered in an earlier Medtronics communication
protocol in 2008. Apparently, nothing was done by the company to
- correct them. This means you can't rely on</em></ins></span> proprietary
<span class="removed"><del><strong>code</strong></del></span> <span
class="inserted"><ins><em>software
+ correct them. This means you can't rely on proprietary software
developers to fix bugs in their products.</p>
</li>
<li id="M201902270">
- <p>The Ring (now Amazon) doorbell camera is designed
so</em></ins></span> that <span class="removed"><del><strong>runs pacemakers,
insulin pumps,</strong></del></span> <span class="inserted"><ins><em>the
+ <p>The Ring (now Amazon) doorbell camera is designed so that the
manufacturer (now Amazon) can watch all the time. Now it turns out
that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
- unintentional</em></ins></span> and <span class="inserted"><ins><em>I
suppose Amazon will fix it. I
+ unintentional and I suppose Amazon will fix it. I
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -173,8 +195,7 @@
<li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in</em></ins></span> other
-<span class="removed"><del><strong>medical devices</strong></del></span> <span
class="inserted"><ins><em>audio</a>, so that people cannot hear
+ hide voice commands in other audio</a>, so that people cannot hear
them, but Alexa and Siri can.</p>
</li>
@@ -207,11 +228,10 @@
</li>
<li id="M201712240">
- <p>One of the dangers of the “internet of
stings”</em></ins></span>
- is <span class="inserted"><ins><em>that, if you lose your internet
service, you also</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
-full</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control</em></ins></span> of <span
class="removed"><del><strong>gross</strong></del></span> <span
class="inserted"><ins><em>your house and appliances</a>.</p>
+ <p>One of the dangers of the “internet of stings”
+ is that, if you lose your internet service, you also <a
+
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
+ lose control of your house and appliances</a>.</p>
<p>For your safety, don't use any appliance with a connection to the
real internet.</p>
@@ -227,17 +247,13 @@
<p>Amazon recently invited consumers to be suckers and <a
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
allow delivery staff to open their front doors</a>. Wouldn't you know
- it, the system has a grave</em></ins></span> security <span
class="removed"><del><strong>faults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>flaw.</p></em></ins></span>
+ it, the system has a grave security flaw.</p>
</li>
-
-<span class="removed"><del><strong><li>
- <p>Exploits of bugs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201709290">
- <p>Bad security</em></ins></span> in <span
class="removed"><del><strong>Windows, which were developed
by</strong></del></span> <span class="inserted"><ins><em>some cars makes it
possible to <a
+ <li id="M201709290">
+ <p>Bad security in some cars makes it possible to <a
href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14937">
- remotely activate</em></ins></span> the <span
class="removed"><del><strong>NSA</strong></del></span> <span
class="inserted"><ins><em>airbags</a>.</p>
+ remotely activate the airbags</a>.</p>
</li>
<li id="M201709200">
@@ -1012,7 +1028,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary-insecurity.it.po 7 Sep 2019 07:31:39 -0000 1.150
+++ proprietary-insecurity.it.po 10 Sep 2019 23:59:30 -0000 1.151
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -132,6 +132,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary-insecurity.ja-diff.html 7 Sep 2019 07:31:39 -0000 1.64
+++ proprietary-insecurity.ja-diff.html 10 Sep 2019 23:59:30 -0000 1.65
@@ -64,70 +64,104 @@
noteworthy.</p>
<div class="important">
-<p>If you know of an example that ought to</em></ins></span> be <span
class="inserted"><ins><em>in this page but isn't
-here, please write
-to</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
+<p>If you know of an example that ought to</em></ins></span> be
+<span class="removed"><del><strong><a
href="https://web.archive.org/web/20161027223907/http://www.theregister.co.uk/2016/10/23/every_lte_call_text_can_be_intercepted_blacked_out_hacker_finds/">
taken
-over by third parties and used</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of a trustworthy reference or two
+over by third parties and used for man-in-the-middle
attacks</a>.</p>
+</li>
+
+<li>
+<p>Due</strong></del></span> <span class="inserted"><ins><em>in this
page but isn't
+here, please write</em></ins></span>
+to <span class="removed"><del><strong>weak security,</strong></del></span>
<a <span
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+is easy</strong></del></span> <span
class="inserted"><ins><em>href="mailto:address@hidden"><address@hidden></a></em></ins></span>
+to <span class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>inform us. Please include</em></ins></span> the <span
class="removed"><del><strong>doors</strong></del></span> <span
class="inserted"><ins><em>URL</em></ins></span> of <span
class="removed"><del><strong>100 million cars built by
Volkswagen</a>.</p>
+</li>
+
+<li>
+<p>Ransomware <a
href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
+been developed for</strong></del></span> a <span
class="removed"><del><strong>thermostat that uses proprietary
software</a>.</p>
+</li>
+
+<li></strong></del></span> <span class="inserted"><ins><em>trustworthy
reference or two
to serve as specific substantiation.</p>
</div>
</div>
<div class="column-limit" id="proprietary-insecurity"></div>
<ul class="blurbs">
- <li id="M201908300">
- <p>In spite of iPhone's reputation</em></ins></span> for <span
class="removed"><del><strong>man-in-the-middle attacks</a>.</p>
+ <li id="M201909100"></em></ins></span>
+ <p>A <span class="inserted"><ins><em>series of
vulnerabilities</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found</em></ins></span>
+ in
+<span class="removed"><del><strong>Internet Explorer and Edge</a> allows
an attacker</strong></del></span> <span class="inserted"><ins><em>iOS allowed
attackers</em></ins></span> to <span class="removed"><del><strong>retrieve
+Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>gain access to sensitive information
+ including private messages, passwords, photos, contacts stored
on</em></ins></span>
+ the <span class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters</em></ins></span> is <span
class="removed"><del><strong>tricked into visiting</strong></del></span> <span
class="inserted"><ins><em>even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even</em></ins></span> a
+<span class="removed"><del><strong>malicious link.</p>
+</li>
+
+<li>
+<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
+WhatsApp messages are</strong></del></span> <span
class="inserted"><ins><em>modicum of security. It also means that the devices
do</em></ins></span>
+ not <span class="removed"><del><strong>entirely deleted</a>. They
can be recovered
+in various ways.
+</p>
</li>
<li>
-<p>Due</strong></del></span> <span class="inserted"><ins><em>being
+<p>A vulnerability in Apple's Image I/O API allowed an attacker to
+<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this
API</strong></del></span> <span class="inserted"><ins><em>even
try</em></ins></span> to <span class="removed"><del><strong>render a
+ certain kind</strong></del></span> <span class="inserted"><ins><em>offer
security against Apple itself.</p>
+ </li>
+
+ <li id="M201908300">
+ <p>In spite</em></ins></span> of <span
class="removed"><del><strong>image file</a>.</p>
+</li>
+<li>
+<p>A bug</strong></del></span> <span class="inserted"><ins><em>iPhone's
reputation for being
secure, it does have bad security flaws. Crackers
- exploited 14 bugs of iOS for two and a half years</em></ins></span> to
<span class="removed"><del><strong>weak security,</strong></del></span> <a
<span
class="removed"><del><strong>href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">
+ exploited 14 bugs of iOS for two and a half years to <a
+
href="https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says">
steal users' most private data</a>, and gain access to their
accounts.</p>
<p>Apple has corrected these bugs, but this shows that
<em>any</em>
- developer of nonfree programs</em></ins></span> is <span
class="removed"><del><strong>easy</strong></del></span> <span
class="inserted"><ins><em>liable</em></ins></span> to <span
class="removed"><del><strong>open</strong></del></span> <span
class="inserted"><ins><em>make mistakes affecting</em></ins></span>
- the <span class="removed"><del><strong>doors</strong></del></span> <span
class="inserted"><ins><em>security</em></ins></span> of <span
class="removed"><del><strong>100 million cars built by
Volkswagen</a>.</p></strong></del></span> <span
class="inserted"><ins><em>their products, and users can't investigate or fix
- them.</p></em></ins></span>
+ developer of nonfree programs is liable to make mistakes affecting
+ the security of their products, and users can't investigate or fix
+ them.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Ransomware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908020">
+ <li id="M201908020">
<p>Out of 21 gratis Android antivirus apps
- that were tested by security researchers, eight</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.pentestpartners.com/blog/thermostat-ransomware-a-lesson-in-iot-security/">has
-been developed for</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
- failed to detect</em></ins></span> a <span
class="removed"><del><strong>thermostat</strong></del></span> <span
class="inserted"><ins><em>test virus</a>. All of them asked for dangerous
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
permissions or contained advertising trackers, with seven being more
risky than the average of the 100 most popular Android apps.</p>
- <p>Note</em></ins></span> that <span
class="removed"><del><strong>uses</strong></del></span> <span
class="inserted"><ins><em>the article refers to these</em></ins></span>
proprietary <span
class="removed"><del><strong>software</a>.</p></strong></del></span>
<span class="inserted"><ins><em>apps as
+ <p>Note that the article refers to these proprietary apps as
“free”. It should have said “gratis”
- instead.</p></em></ins></span>
+ instead.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>A</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907080">
+ <li id="M201907080">
<p>Many Android apps can track
- users' movements even when the user says</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
+ users' movements even when the user says <a
+
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow them access to locations</a>.</p>
- <p>This involves an apparently unintentional
weakness</em></ins></span> in
-<span class="removed"><del><strong>Internet Explorer and Edge</a>
allows</strong></del></span> <span class="inserted"><ins><em>Android,
+ <p>This involves an apparently unintentional weakness in Android,
exploited intentionally by malicious apps.</p>
</li>
<li id="M201905150">
- <p>Users caught in the jail of</em></ins></span> an <span
class="removed"><del><strong>attacker to retrieve
-Microsoft</strong></del></span> <span class="inserted"><ins><em>iMonster are
<a
+ <p>Users caught in the jail of an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
ducks for other attackers</a>, and the app censorship prevents
security
companies from figuring out how those attacks work.</p>
@@ -407,33 +441,26 @@
<p>A <a
href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in Internet Explorer and Edge</a> allows an attacker to retrieve
- Microsoft</em></ins></span> account credentials, if the user is tricked
into visiting
+ Microsoft account credentials, if the user is tricked into visiting
a malicious link.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607290"></em></ins></span>
+ <li id="M201607290">
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
WhatsApp messages are not entirely deleted</a>. They can be recovered
- in various <span class="removed"><del><strong>ways.
-</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p></em></ins></span>
+ in various ways.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607220"></em></ins></span>
+ <li id="M201607220">
<p>A vulnerability in Apple's Image I/O API allowed an attacker to
<a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- <span class="removed"><del><strong>malacious</strong></del></span>
- <span class="inserted"><ins><em>malicious</em></ins></span> code from any
application which uses this API to render a
+ malicious code from any application which uses this API to render a
certain kind of image file</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201607190"></em></ins></span>
- <p>A bug in a proprietary ASN.1 library, used
+ <li id="M201607190">
+ <p>A bug</em></ins></span> in a proprietary ASN.1 library, used
in cell phone towers as well as cell phones and routers, <a
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover">allows
taking control of those systems</a>.</p>
@@ -948,7 +975,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/07 07:31:39 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- proprietary-insecurity.ja.po 7 Sep 2019 07:31:39 -0000 1.122
+++ proprietary-insecurity.ja.po 10 Sep 2019 23:59:30 -0000 1.123
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -106,6 +106,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.89
retrieving revision 1.90
diff -u -b -r1.89 -r1.90
--- proprietary-insecurity.pot 7 Sep 2019 07:31:39 -0000 1.89
+++ proprietary-insecurity.pot 10 Sep 2019 23:59:30 -0000 1.90
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -77,6 +77,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a "
+"href=\"https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/\">found
"
+"in iOS allowed attackers to gain access to sensitive information including "
+"private messages, passwords, photos, contacts stored on the user's "
+"iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a "
"href=\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-implants-iphones-google-says\">
"
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary-insecurity.ru.po 9 Sep 2019 07:31:44 -0000 1.225
+++ proprietary-insecurity.ru.po 10 Sep 2019 23:59:30 -0000 1.226
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-07 07:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2018-12-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -107,6 +108,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary.de-diff.html 10 Sep 2019 11:33:42 -0000 1.118
+++ proprietary.de-diff.html 10 Sep 2019 23:59:30 -0000 1.119
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,19 +101,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
- <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -128,12 +128,12 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -188,6 +188,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
@@ -229,14 +242,6 @@
being cut off for life, which more-or-less cripples the user's Apple
devices forever</a>. There is no appeal.</p>
</li>
-
- <li id="M201908151">
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
-
- <p>That almost certainly means it can do so.</p>
- </li>
</ul></em></ins></span>
@@ -297,7 +302,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/10 11:33:42 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary.de.po 10 Sep 2019 11:33:42 -0000 1.160
+++ proprietary.de.po 10 Sep 2019 23:59:30 -0000 1.161
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -455,6 +455,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -501,18 +518,6 @@
"appeal."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.207
retrieving revision 1.208
diff -u -b -r1.207 -r1.208
--- proprietary.es.po 10 Sep 2019 11:33:42 -0000 1.207
+++ proprietary.es.po 10 Sep 2019 23:59:30 -0000 1.208
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -313,6 +313,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -380,22 +397,6 @@
"dispositivos Apple del usuario para siempre</a>. No hay posibilidad de "
"apelación."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-"Skype se niega a decir si puede <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">escuchar las llamadas</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr "Casi seguro eso quiere decir que puede hacerlo."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -475,6 +476,20 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">eavesdrop on calls</a>."
+#~ msgstr ""
+#~ "Skype se niega a decir si puede <a href=\"http://www.slate.com/blogs/"
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">escuchar las llamadas</a>."
+
+#~ msgid "That almost certainly means it can do so."
+#~ msgstr "Casi seguro eso quiere decir que puede hacerlo."
+
+#~ msgid ""
#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.252
retrieving revision 1.253
diff -u -b -r1.252 -r1.253
--- proprietary.fr.po 10 Sep 2019 12:40:46 -0000 1.252
+++ proprietary.fr.po 10 Sep 2019 23:59:30 -0000 1.253
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2019-09-10 14:39+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -308,6 +309,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -380,22 +398,6 @@
"committed-fraud/\">banni à vie, ce qui rend ses appareils Apple plus ou "
"moins inutilisables pour toujours</a>. C'est sans appel."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-"Skype refuse de dire s'il peut <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">écouter les appels</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr "Cela signifie sûrement qu'il en a la possibilité."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -469,3 +471,17 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">eavesdrop on calls</a>."
+#~ msgstr ""
+#~ "Skype refuse de dire s'il peut <a href=\"http://www.slate.com/blogs/"
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">écouter les appels</a>."
+
+#~ msgid "That almost certainly means it can do so."
+#~ msgstr "Cela signifie sûrement qu'il en a la possibilité."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary.it-diff.html 10 Sep 2019 11:33:42 -0000 1.130
+++ proprietary.it-diff.html 10 Sep 2019 23:59:30 -0000 1.131
@@ -40,10 +40,10 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
@@ -187,6 +187,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
@@ -228,14 +241,6 @@
being cut off for life, which more-or-less cripples the user's Apple
devices forever</a>. There is no appeal.</p>
</li>
-
- <li id="M201908151">
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
-
- <p>That almost certainly means it can do so.</p>
- </li>
</ul></em></ins></span>
@@ -296,7 +301,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/10 11:33:42 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.it.po 10 Sep 2019 11:33:43 -0000 1.169
+++ proprietary.it.po 10 Sep 2019 23:59:30 -0000 1.170
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -459,6 +459,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -505,18 +522,6 @@
"appeal."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary.ja-diff.html 10 Sep 2019 11:33:43 -0000 1.133
+++ proprietary.ja-diff.html 10 Sep 2019 23:59:30 -0000 1.134
@@ -27,9 +27,9 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-table#TOC {
- display: block;</em></ins></span>
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
margin: 2.5em auto;
@@ -123,8 +123,8 @@
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html">Tethers</a> (<a
href="#f4">4</a>)</li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a>
to
-servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/potential-malware.html">In the
pipe</a></li>
+servers</li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-tyrants.html">Tyrants</a> (<a
href="#f5">5</a>)</li>
+ <li><a href="/proprietary/potential-malware.html">In the
pipe</a></li>
</ul>
</td>
<td>
@@ -132,8 +132,8 @@
<li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li>
<li><a
href="/proprietary/malware-games.html">Games</a></li>
- <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul>
<li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
@@ -161,10 +161,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
@@ -226,14 +239,6 @@
being cut off for life, which more-or-less cripples the user's Apple
devices forever</a>. There is no appeal.</p>
</li>
-
- <li id="M201908151">
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
-
- <p>That almost certainly means it can do so.</p>
- </li>
</ul></em></ins></span>
@@ -294,7 +299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/10 11:33:43 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary.ja.po 10 Sep 2019 11:33:43 -0000 1.153
+++ proprietary.ja.po 10 Sep 2019 23:59:30 -0000 1.154
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -319,6 +319,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -365,18 +382,6 @@
"appeal."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.131
retrieving revision 1.132
diff -u -b -r1.131 -r1.132
--- proprietary.nl-diff.html 10 Sep 2019 11:33:43 -0000 1.131
+++ proprietary.nl-diff.html 10 Sep 2019 23:59:30 -0000 1.132
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -187,6 +187,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
@@ -228,14 +241,6 @@
being cut off for life, which more-or-less cripples the user's Apple
devices forever</a>. There is no appeal.</p>
</li>
-
- <li id="M201908151">
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
-
- <p>That almost certainly means it can do so.</p>
- </li>
</ul></em></ins></span>
@@ -296,7 +301,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/10 11:33:43 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary.nl.po 10 Sep 2019 11:33:43 -0000 1.143
+++ proprietary.nl.po 10 Sep 2019 23:59:30 -0000 1.144
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -361,6 +361,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -407,18 +424,6 @@
"appeal."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.pl-diff.html 10 Sep 2019 11:33:43 -0000 1.148
+++ proprietary.pl-diff.html 10 Sep 2019 23:59:30 -0000 1.149
@@ -42,8 +42,8 @@
#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -89,8 +89,8 @@
<li><strong>Company or type</strong></del></span> <span
class="inserted"><ins><em>typically
a way to be had.</p>
-<p>As of April, 2019, the pages in this directory list around 400
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 450
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>April, 2019, the pages in this directory list
around 400
+instances of malicious functionalities (with more than 450 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -185,6 +185,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
@@ -226,14 +239,6 @@
being cut off for life, which more-or-less cripples the user's Apple
devices forever</a>. There is no appeal.</p>
</li>
-
- <li id="M201908151">
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
-
- <p>That almost certainly means it can do so.</p>
- </li>
</ul></em></ins></span>
@@ -294,7 +299,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/10 11:33:43 $
+$Date: 2019/09/10 23:59:30 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary.pl.po 10 Sep 2019 11:33:43 -0000 1.136
+++ proprietary.pl.po 10 Sep 2019 23:59:30 -0000 1.137
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -540,6 +540,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -586,18 +603,6 @@
"appeal."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary.pot 10 Sep 2019 11:33:43 -0000 1.133
+++ proprietary.pot 10 Sep 2019 23:59:30 -0000 1.134
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -257,6 +257,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a "
+"href=\"https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/\">found
"
+"in iOS allowed attackers to gain access to sensitive information including "
+"private messages, passwords, photos, contacts stored on the user's "
+"iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a "
@@ -302,17 +319,6 @@
"forever</a>. There is no appeal."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a "
-"href=\"http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html\">eavesdrop
"
-"on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.212
retrieving revision 1.213
diff -u -b -r1.212 -r1.213
--- proprietary.pt-br.po 10 Sep 2019 11:33:43 -0000 1.212
+++ proprietary.pt-br.po 10 Sep 2019 23:59:30 -0000 1.213
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2019-09-09 22:19-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -306,6 +306,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -371,22 +388,6 @@
"cortado para sempre, o que prejudica mais ou menos os dispositivos Apple do "
"usuário para sempre</a>. Não há recurso."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-"O Skype se recusa a dizer se ele pode <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">espionar chamadas</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr "Isso quase com certeza significa que ele pode fazê-lo."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -462,6 +463,20 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">eavesdrop on calls</a>."
+#~ msgstr ""
+#~ "O Skype se recusa a dizer se ele pode <a href=\"http://www.slate.com/"
+#~ "blogs/future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">espionar chamadas</a>."
+
+#~ msgid "That almost certainly means it can do so."
+#~ msgstr "Isso quase com certeza significa que ele pode fazê-lo."
+
+#~ msgid ""
#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- proprietary.ru.po 10 Sep 2019 12:30:54 -0000 1.286
+++ proprietary.ru.po 10 Sep 2019 23:59:30 -0000 1.287
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-10 23:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -311,6 +312,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -384,22 +402,6 @@
"Apple ÑÑиÑ
полÑзоваÑелей более или менее
ÑвеÑнÑми</a>. ÐÐ±Ð¶Ð°Ð»Ð¾Ð²Ð°Ð½Ð¸Ñ Ð½Ðµ "
"подлежиÑ."
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-"РазÑабоÑÑики Skype оÑказÑваÑÑÑÑ Ð¾ÑвеÑаÑÑ,
Ð¼Ð¾Ð¶ÐµÑ Ð»Ð¸ он <a href=\"http://www."
-"slate.com/blogs/future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">подÑлÑÑиваÑÑ Ð¿ÐµÑеговоÑÑ</a>."
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr "ÐÑо поÑÑи навеÑнÑка ознаÑаеÑ, ÑÑо
можеÑ."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -479,6 +481,20 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
+#~ "future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">eavesdrop on calls</a>."
+#~ msgstr ""
+#~ "РазÑабоÑÑики Skype оÑказÑваÑÑÑÑ Ð¾ÑвеÑаÑÑ,
Ð¼Ð¾Ð¶ÐµÑ Ð»Ð¸ он <a href=\"http://"
+#~ "www.slate.com/blogs/future_tense/2012/07/20/"
+#~ "skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
+#~ "\">подÑлÑÑиваÑÑ Ð¿ÐµÑеговоÑÑ</a>."
+
+#~ msgid "That almost certainly means it can do so."
+#~ msgstr "ÐÑо поÑÑи навеÑнÑка ознаÑаеÑ, ÑÑо
можеÑ."
+
+#~ msgid ""
#~ "Apple is putting DRM on iPhone batteries, and the system proprietary "
#~ "software <a href=\"https://www.vice.com/en_us/article/59nz3k/apple-is-"
#~ "locking-batteries-to-specific-iphones-a-nightmare-for-diy-repair\">turns "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary.zh-tw-diff.html 10 Sep 2019 11:33:43 -0000 1.110
+++ proprietary.zh-tw-diff.html 10 Sep 2019 23:59:31 -0000 1.111
@@ -40,19 +40,19 @@
<span class="inserted"><ins><em>#TOC th</em></ins></span> {
<span class="removed"><del><strong>text-align: left;</strong></del></span>
font-size: <span class="removed"><del><strong>1.2em;</strong></del></span>
<span class="inserted"><ins><em>1.1em; }
#TOC th, #TOC td {</em></ins></span> padding: <span
class="removed"><del><strong>0 .83em;
- margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center; }
-#TOC ul { padding-bottom: .5em;</em></ins></span> }
+ margin: .5em 1.5% 1em;</strong></del></span> <span
class="inserted"><ins><em>.7em; text-align: center;</em></ins></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>margin: .5em 0;</em></ins></span> list-style: none;
<span class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
+<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
+#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
-->
</style>
<style type="text/css" media="print,screen">
-#TOC { width: 55em; }
-</style></em></ins></span>
+#TOC</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>width:
55em;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em></style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<h2>Proprietary Software Is Often Malware</h2>
@@ -101,19 +101,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li>
- <li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -128,12 +128,12 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -188,6 +188,19 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909100">
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers to gain access to sensitive information
+ including private messages, passwords, photos, contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
+ </li>
+
<li id="M201909060">
<p>Keeping track of who downloads a proprietary
program is a form of surveillance. There is a
@@ -229,14 +242,6 @@
being cut off for life, which more-or-less cripples the user's Apple
devices forever</a>. There is no appeal.</p>
</li>
-
- <li id="M201908151">
- <p>Skype refuses to say whether it can <a
-
href="http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html">eavesdrop
- on calls</a>.</p>
-
- <p>That almost certainly means it can do so.</p>
- </li>
</ul></em></ins></span>
@@ -297,7 +302,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/10 11:33:43 $
+$Date: 2019/09/10 23:59:31 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.121
retrieving revision 1.122
diff -u -b -r1.121 -r1.122
--- proprietary.zh-tw.po 10 Sep 2019 11:33:43 -0000 1.121
+++ proprietary.zh-tw.po 10 Sep 2019 23:59:31 -0000 1.122
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-10 11:25+0000\n"
+"POT-Creation-Date: 2019-09-10 23:55+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -433,6 +433,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"Keeping track of who downloads a proprietary program is a form of "
"surveillance. There is a proprietary program for adjusting a certain "
"telescopic rifle sight. <a href=\"https://www.forbes.com/sites/"
@@ -479,18 +496,6 @@
"appeal."
msgstr ""
-#. type: Content of: <ul><li><p>
-msgid ""
-"Skype refuses to say whether it can <a href=\"http://www.slate.com/blogs/"
-"future_tense/2012/07/20/"
-"skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html"
-"\">eavesdrop on calls</a>."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid "That almost certainly means it can do so."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- pt-br.po 10 Sep 2019 11:33:43 -0000 1.172
+++ pt-br.po 10 Sep 2019 23:59:31 -0000 1.173
@@ -825,6 +825,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.286
retrieving revision 1.287
diff -u -b -r1.286 -r1.287
--- ru.po 10 Sep 2019 11:55:14 -0000 1.286
+++ ru.po 10 Sep 2019 23:59:31 -0000 1.287
@@ -962,6 +962,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
@@ -6667,12 +6684,11 @@
"list of all the 10,000 or more people who have installed it</a>."
msgstr ""
"ÐÑÑлеживание Ñого, кÑо полÑÑаеÑ
неÑвободнÑÑ Ð¿ÑогÑаммÑ, пÑедÑÑавлÑÐµÑ Ñобой "
-"ÑазновидноÑÑÑÑ Ñлежки. ÐÑÑÑ Ð½ÐµÑвободнаÑ
пÑогÑамма Ð´Ð»Ñ ÑÑÑиÑовки "
-"пÑиÑела опÑеделенного ÑелеÑкопиÑеÑкого
ÑÑжÑÑ. "
-"<a href=\"https://www.forbes.com/sites/"
+"ÑазновидноÑÑÑÑ Ñлежки. ÐÑÑÑ Ð½ÐµÑвободнаÑ
пÑогÑамма Ð´Ð»Ñ ÑÑÑиÑовки пÑиÑела "
+"опÑеделенного ÑелеÑкопиÑеÑкого ÑÑжÑÑ. <a
href=\"https://www.forbes.com/sites/"
"thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-"
-"names-of-10000-users-of-a-gun-scope-app/\"> СледоваÑÐµÐ»Ñ Ð¡Ð¨Ð
поÑÑебовал веÑÑ ÑпиÑок "
-"из 10 ÑÑÑÑÑ Ð¸Ð»Ð¸ более лÑдей, коÑоÑÑе
ÑÑÑановили ее</a>."
+"names-of-10000-users-of-a-gun-scope-app/\"> СледоваÑÐµÐ»Ñ Ð¡Ð¨Ð
поÑÑебовал веÑÑ "
+"ÑпиÑок из 10 ÑÑÑÑÑ Ð¸Ð»Ð¸ более лÑдей, коÑоÑÑе
ÑÑÑановили ее</a>."
#. type: Content of: <ul><li><p>
msgid "With a free program there would not be a list of who has installed it."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- zh-tw.po 10 Sep 2019 11:33:43 -0000 1.134
+++ zh-tw.po 10 Sep 2019 23:59:31 -0000 1.135
@@ -816,6 +816,23 @@
#. type: Content of: <ul><li><p>
msgid ""
+"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
+"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
+"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
+"information including private messages, passwords, photos, contacts stored "
+"on the user's iMonster</a>."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
+"The deep insecurity of iMonsters is even more pertinent given that Apple's "
+"proprietary software makes users totally dependent on Apple for even a "
+"modicum of security. It also means that the devices do not even try to "
+"offer security against Apple itself."
+msgstr ""
+
+#. type: Content of: <ul><li><p>
+msgid ""
"In spite of iPhone's reputation for being secure, it does have bad security "
"flaws. Crackers exploited 14 bugs of iOS for two and a half years to <a href="
"\"https://www.theguardian.com/technology/2019/aug/30/hackers-monitoring-"
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/10
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/14
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/18