[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Wed, 18 Sep 2019 12:01:46 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/09/18 12:01:44
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-amazon.de-diff.html
malware-amazon.de.po malware-amazon.es.po
malware-amazon.fr.po
malware-amazon.it-diff.html
malware-amazon.it.po
malware-amazon.ja-diff.html
malware-amazon.ja.po malware-amazon.pot
malware-amazon.ru.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po
malware-cars.de-diff.html malware-cars.de.po
malware-cars.fr.po malware-cars.pot
malware-cars.ru.po malware-games.de-diff.html
malware-games.de.po malware-games.fr.po
malware-games.ja-diff.html malware-games.ja.po
malware-games.pot malware-games.ru.po
malware-google.de-diff.html
malware-google.de.po malware-google.es.po
malware-google.fr.po malware-google.pot
malware-google.ru.po
malware-microsoft.de-diff.html
malware-microsoft.de.po malware-microsoft.es.po
malware-microsoft.fr.po
malware-microsoft.it-diff.html
malware-microsoft.it.po
malware-microsoft.ja-diff.html
malware-microsoft.ja.po malware-microsoft.pot
malware-microsoft.ru.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary-sabotage.de-diff.html
proprietary-sabotage.de.po
proprietary-sabotage.es.po
proprietary-sabotage.fr.po
proprietary-sabotage.it-diff.html
proprietary-sabotage.it.po
proprietary-sabotage.ja-diff.html
proprietary-sabotage.ja.po
proprietary-sabotage.pot
proprietary-sabotage.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary-tethers.de-diff.html
proprietary-tethers.de.po
proprietary-tethers.fr.po
proprietary-tethers.ja-diff.html
proprietary-tethers.ja.po
proprietary-tethers.pot
proprietary-tethers.pt-br.po
proprietary-tethers.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.195&r2=1.196
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.246&r2=1.247
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de-diff.html?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.de.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.es.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.fr.po?cvsroot=www&r1=1.41&r2=1.42
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.it.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ja.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.pot?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-amazon.ru.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.79&r2=1.80
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de-diff.html?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.de.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.fr.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.pot?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-cars.ru.po?cvsroot=www&r1=1.40&r2=1.41
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.de.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.fr.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja-diff.html?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ja.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-games.ru.po?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de-diff.html?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.de.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.es.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.fr.po?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.pot?cvsroot=www&r1=1.49&r2=1.50
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-google.ru.po?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.de.po?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.es.po?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.fr.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.it.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja-diff.html?cvsroot=www&r1=1.57&r2=1.58
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ja.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.pot?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-microsoft.ru.po?cvsroot=www&r1=1.217&r2=1.218
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.147&r2=1.148
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.86&r2=1.87
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.112&r2=1.113
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.206&r2=1.207
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.141&r2=1.142
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.178&r2=1.179
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.47&r2=1.48
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.152&r2=1.153
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.66&r2=1.67
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.124&r2=1.125
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.91&r2=1.92
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de-diff.html?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.de.po?cvsroot=www&r1=1.126&r2=1.127
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.es.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.fr.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it-diff.html?cvsroot=www&r1=1.55&r2=1.56
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.it.po?cvsroot=www&r1=1.120&r2=1.121
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja-diff.html?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ja.po?cvsroot=www&r1=1.113&r2=1.114
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.pot?cvsroot=www&r1=1.78&r2=1.79
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-sabotage.ru.po?cvsroot=www&r1=1.197&r2=1.198
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.311&r2=1.312
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.475&r2=1.476
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.324&r2=1.325
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.179&r2=1.180
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.305&r2=1.306
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.569&r2=1.570
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.20&r2=1.21
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.32&r2=1.33
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.39&r2=1.40
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.31&r2=1.32
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.65&r2=1.66
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.219&r2=1.220
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.265&r2=1.266
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.137&r2=1.138
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.138&r2=1.139
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.225&r2=1.226
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.298&r2=1.299
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.117&r2=1.118
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.142&r2=1.143
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- de.po 18 Sep 2019 10:02:30 -0000 1.142
+++ de.po 18 Sep 2019 16:01:41 -0000 1.143
@@ -639,10 +639,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2523,9 +2523,21 @@
"nutzbar</a>.</ins>"
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -4634,13 +4646,23 @@
"\"tn01-ref\" class=\"transnote\">[1]</a>"
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "<ins>Vorstellbar wäre</ins>, dass Chrysler und NSA dies auch können."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"<ins>Wäre ein Fahrzeug serienmäÃig mit âInfotainmentsystemâ
ausgestattet, "
"sollte es besser grundsätzlich deaktiviert werden.</ins>"
@@ -4903,7 +4925,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
@@ -5963,7 +5985,13 @@
"Software aus."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
#, fuzzy
#| msgid ""
#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
@@ -5978,9 +6006,9 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"Spionageprogramme in Android-Telefonen (und âWindows-Laptopsâ?): Die "
"amerikanische Tageszeitung <span xml:lang=\"en\" lang=\"en\">The Wall Street "
@@ -8214,7 +8242,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -8276,9 +8304,15 @@
msgstr "Das macht sie zu Spionen bei der Durchsetzung von Lizenzen."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Ich [RMS] erwarte, dass es auch DRM umsetzt ‑ dass es keine "
"Möglichkeit gibt, eine Aufzeichnung zu speichern. Dem Artikel nach kann man "
@@ -12838,6 +12872,70 @@
"id=\"tn01-ref\" class=\"transnote\">[1]</a>."
#~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people. The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "Im Artikel wird sich auf einen weiteren bösen Ansporn konzentriert, der "
+#~ "den Verkauf der defekten Geräte fortsetzt. Aber ich [RMS] denke, dass "
+#~ "dies zweitrangig ist; es führt dazu, dass sich die bösen Folgen auf "
+#~ "einige weitere Personen ausweitet werden. Der grundlegende Fehler war die "
+#~ "Geräte so zu gestalten, dass sie von etwas anderem abhängig waren, was "
+#~ "nicht die Freiheit der Nutzer respektierte."
+
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr ""
+#~ "<ins>Vorstellbar wäre</ins>, dass Chrysler und NSA dies auch können."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "<ins>Wäre ein Fahrzeug serienmäÃig mit âInfotainmentsystemâ
ausgestattet, "
+#~ "sollte es besser grundsätzlich deaktiviert werden.</ins>"
+
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Android phones (and Windows? laptops): The Wall Street "
+#~| "Journal (in an article blocked from us by a paywall) reports that <a "
+#~| "href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-"
+#~| "activate-android-and-laptop-microphones-reports-wsj\"> the FBI can "
+#~| "remotely activate the GPS and microphone in Android phones and laptops</"
+#~| "a>. (I suspect this means Windows laptops.) Here is <a href=\"http://"
+#~| "cryptome.org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#~ "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "Spionageprogramme in Android-Telefonen (und âWindows-Laptopsâ?): Die "
+#~ "amerikanische Tageszeitung <span xml:lang=\"en\" lang=\"en\">The Wall "
+#~ "Street Journal</span> berichtet (in einem von uns durch eine "
+#~ "Bezahlschranke blockierten Artikel), dass die <a href=\"//www.theverge."
+#~ "com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
+#~ "microphones-reports-wsj\" title=\"FBI can remotely activate Android and "
+#~ "laptop microphones, reports WSJ, unter: theverge.com 2013."
+#~ "\">amerikanische Bundespolizei FBI aus der Ferne GPS und Mikrofon in "
+#~ "Android-Telefonen und Laptops aktivieren kann</a> (vermutlich deutet dies "
+#~ "auf âWindows-Laptopsâ hin). Hier <a href=\"//cryptome.org/2013/08/fbi-"
+#~ "hackers.htm\" title=\"FBI Taps Hacker Tactics to Spy on Suspects, unter: "
+#~ "cryptome.org 2013.\">weitere Informationen</a>."
+
+#~ msgid ""
+#~ "I expect it implements DRM, too—that there is no way to save a "
+#~ "recording. But I can't be sure from the article."
+#~ msgstr ""
+#~ "Ich [RMS] erwarte, dass es auch DRM umsetzt ‑ dass es "
+#~ "keine Möglichkeit gibt, eine Aufzeichnung zu speichern. Dem Artikel nach "
+#~ "kann man aber nicht sicher sein. "
+
+#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
#~ "NoDerivatives 4.0 International License</a>."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.195
retrieving revision 1.196
diff -u -b -r1.195 -r1.196
--- es.po 18 Sep 2019 10:02:30 -0000 1.195
+++ es.po 18 Sep 2019 16:01:41 -0000 1.196
@@ -572,11 +572,22 @@
"\">también cualquier otro puede observar e incluso falsear vÃdeos</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"Es de suponer que la vulnerabilidad a terceros no es intencionada, e imagino "
"que la Amazon lo solucionará. Pero no cuento con que Amazon cambie el
diseño "
@@ -2288,9 +2299,21 @@
"which\">Todas las pulseras dejaron de funcionar para siempre</a>."
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -3821,13 +3844,23 @@
"o desactivar los frenos, entre otras cosas."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "Es de suponer que Chrysler y la NSA también pueden hacerlo."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"Si se posee un automóvil que contiene un teléfono móvil, hay que "
"desactivarlo."
@@ -4107,8 +4140,15 @@
"grabaciones</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Desde el punto de vista moral no veo ninguna diferencia entre tener "
@@ -5319,7 +5359,8 @@
# | (in an article blocked from us by a paywall) reports that <a
# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
# | the FBI can remotely activate the GPS and microphone in Android phones and
-# | [-in-] laptops</a>. (I suspect this means Windows laptops.) Here is <a
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
#, fuzzy
#| msgid ""
@@ -5327,7 +5368,7 @@
#| "(in an article blocked from us by a paywall) reports that <a href="
#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
-#| "activate the GPS and microphone in Android phones and in laptops</a>. (I "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
@@ -5335,19 +5376,18 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
-msgstr ""
-"Software espÃÂa en los teléfonos Android y ordenadores portátiles
(ÿcon "
-"Windows?): El periódico <cite>The Wall Street Journal</cite>, en un
artÃÂ"
-"culo que no podemos leer a causa de una barrera de pago, informa que <a href="
-"\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-"
-"and-laptop-microphones-reports-wsj\"> el FBI puede activar remotamente el "
-"GPS y el micrófono en los teléfonos Android y en los ordenadores portÃ"
-"¡tiles</a> (sospecho que se refieren a los portátiles con Windows).
AquÃÂ "
-"hay <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">más "
-"información</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
+msgstr ""
+"Software espÃa en teléfonos Android (¿y en portátiles con Windows?): The "
+"Wall Street Journal (en un artÃculo al que solo se puede acceder previo "
+"pago) informa que <a href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-"
+"remotely-activate-android-and-laptop-microphones-reports-wsj\"> el FBI puede "
+"activar de forma remota el GPS y el micrófono en teléfonos con Android y "
+"portátiles</a> (sospecho que quiere decir portátiles equipados con
Windows). "
+"Aquà hay <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">más "
+"información</a>."
#. type: Content of: <ul><li><p>
# | {+Spyware is present in some Android devices when they are sold.+} Some
@@ -7476,8 +7516,16 @@
"que se le exige que notifique a los usuarios qué va a hacer con los datos."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -7567,9 +7615,15 @@
"de las licencias."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Supongo que también implementa el DRM, que no hay manera de guardar una "
"grabación, aunque no puedo estar seguro a partir de lo que dice el
artÃculo."
@@ -11527,6 +11581,93 @@
"procesadores Intel incorporarán software tirano</a>."
#~ msgid ""
+#~ "The third party vulnerability is presumably unintentional and I suppose "
+#~ "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#~ "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#~ "Amazon to watch</a>."
+#~ msgstr ""
+#~ "Es de suponer que la vulnerabilidad a terceros no es intencionada, e "
+#~ "imagino que la Amazon lo solucionará. Pero no cuento con que Amazon "
+#~ "cambie el diseño que <a href=\"/proprietary/proprietary-surveillance."
+#~ "html#M201901100\">le permite observar</a>."
+
+#~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people. The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "El artÃculo hace hincapié en la perversa decisión de continuar
vendiendo "
+#~ "los dispositivos ya inutilizables. Pero creo que esto es algo secundario: "
+#~ "hizo que las consecuencias nocivas alcanzaran a algunas personas más. Lo "
+#~ "realmente grave fue diseñar los dispositivos de manera que tuvieran que "
+#~ "depender de algún otro que no respeta la libertad de los usuarios."
+
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr "Es de suponer que Chrysler y la NSA también pueden hacerlo."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "Si se posee un automóvil que contiene un teléfono móvil, hay que "
+#~ "desactivarlo."
+
+#~ msgid ""
+#~ "Morally I see no difference between having human workers listen and "
+#~ "having speech-recognition systems listen. Both intrude on privacy."
+#~ msgstr ""
+#~ "Desde el punto de vista moral no veo ninguna diferencia entre tener "
+#~ "trabajadores humanos a la escucha y tener sistemas de reconocimiento del "
+#~ "habla."
+
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Android phones (and Windows? laptops): The Wall Street "
+#~| "Journal (in an article blocked from us by a paywall) reports that <a "
+#~| "href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-"
+#~| "activate-android-and-laptop-microphones-reports-wsj\"> the FBI can "
+#~| "remotely activate the GPS and microphone in Android phones and in "
+#~| "laptops</a>. (I suspect this means Windows laptops.) Here is <a href="
+#~| "\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#~ "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "Software espÃÂa en los teléfonos Android y ordenadores portátiles
(ÿcon "
+#~ "Windows?): El periódico <cite>The Wall Street Journal</cite>, en un
artÃÂ"
+#~ "culo que no podemos leer a causa de una barrera de pago, informa que <a "
+#~ "href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#~ "android-and-laptop-microphones-reports-wsj\"> el FBI puede activar "
+#~ "remotamente el GPS y el micrófono en los teléfonos Android y en los "
+#~ "ordenadores portátiles</a> (sospecho que se refieren a los
portátiles "
+#~ "con Windows). AquÃÂ hay <a
href=\"http://cryptome.org/2013/08/fbi-hackers."
+#~ "htm\">más información</a>."
+
+#~ msgid ""
+#~ "I think that lawsuit is about a side issue. What the company does with "
+#~ "the data is a secondary issue. The principal wrong here is that the "
+#~ "company gets that data at all."
+#~ msgstr ""
+#~ "Pienso que esta demanda aborda un asunto colateral. Lo que la compañÃa "
+#~ "haga con los datos es una cuestión secundaria. El principal daño aquÃ
es "
+#~ "que la compañÃa recoja esos datos."
+
+#~ msgid ""
+#~ "I expect it implements DRM, too—that there is no way to save a "
+#~ "recording. But I can't be sure from the article."
+#~ msgstr ""
+#~ "Supongo que también implementa el DRM, que no hay manera de guardar una "
+#~ "grabación, aunque no puedo estar seguro a partir de lo que dice el "
+#~ "artÃculo."
+
+#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
#~ "NoDerivatives 4.0 International License</a>."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.246
retrieving revision 1.247
diff -u -b -r1.246 -r1.247
--- fr.po 18 Sep 2019 10:48:29 -0000 1.246
+++ fr.po 18 Sep 2019 16:01:41 -0000 1.247
@@ -546,11 +546,22 @@
"peut en faire autant, et peut également falsifier les vidéos</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"Une vulnérabilité à des attaques de tiers est vraisemblablement
involontaire "
"et je suppose qu'Amazon la corrigera. Cependant je ne m'attends pas à ce "
@@ -2181,9 +2192,21 @@
"traqueurs existants ont cessé de fonctionner pour toujours</a>."
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -3805,13 +3828,23 @@
"activer et désactiver les freins, et plus encore."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "J'imagine que Chrysler et la NSA peuvent faire de même."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"Si un jour je possède une voiture et qu'elle contient un téléphone
portable, "
"je le désactiverai."
@@ -4072,8 +4105,15 @@
"d'écouter les enregistrements</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Du point de vue éthique, je ne vois aucune différence entre l'écoute par
des "
@@ -5106,14 +5146,30 @@
"autres logiciels installés."
#. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"Des logiciels espions dans les téléphones Android et les ordinateurs "
"portables (sous Windows ?) : le <cite>Wall Street Journal</cite> (dans un "
@@ -7042,8 +7098,16 @@
"données."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -7129,9 +7193,15 @@
"Ainsi elle fait office d'espionne au service de l'application des licences."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Je suppose qu'elle implémente aussi la gestion numérique des restrictions
â "
"qu'il n'y a aucun moyen de sauvegarder un enregistrement. Mais je ne peux "
@@ -10971,3 +11041,83 @@
msgstr ""
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">Les "
"processeurs Intel vont avoir un tyran logiciel intégré</a>."
+
+#~ msgid ""
+#~ "The third party vulnerability is presumably unintentional and I suppose "
+#~ "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#~ "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#~ "Amazon to watch</a>."
+#~ msgstr ""
+#~ "Une vulnérabilité à des attaques de tiers est vraisemblablement "
+#~ "involontaire et je suppose qu'Amazon la corrigera. Cependant je ne "
+#~ "m'attends pas à ce qu'Amazon change la caractéristique de l'appareil qui
"
+#~ "<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">lui "
+#~ "permet, Ã elle, de regarder</a>."
+
+#~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people. The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "Cet article souligne un effet pervers supplémentaire, à savoir que les "
+#~ "ventes d'appareils inutilisables ont continué. Mais je pense que c'est "
+#~ "secondaireâ¯; cela a simplement étendu le préjudice à quelques autre "
+#~ "personnes. La faute première, c'est d'avoir conçu des appareils "
+#~ "dépendants d'une chose extérieure qui ne respecte pas la liberté des "
+#~ "utilisateurs."
+
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr "J'imagine que Chrysler et la NSA peuvent faire de même."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "Si un jour je possède une voiture et qu'elle contient un téléphone "
+#~ "portable, je le désactiverai."
+
+#~ msgid ""
+#~ "Morally I see no difference between having human workers listen and "
+#~ "having speech-recognition systems listen. Both intrude on privacy."
+#~ msgstr ""
+#~ "Du point de vue éthique, je ne vois aucune différence entre l'écoute
par "
+#~ "des employés humains et l'écoute par des systèmes de reconnaissance "
+#~ "vocale. Toutes deux portent atteinte à la vie privée."
+
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#~ "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "Des logiciels espions dans les téléphones Android et les ordinateurs "
+#~ "portables (sous Windows ?) : le <cite>Wall Street Journal</cite> (dans
un "
+#~ "article pourvu d'une barrière à péage) rapporte que <a
href=\"http://www."
+#~ "theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
+#~ "laptop-microphones-reports-wsj\">le FBI peut activer à distance le GPS et
"
+#~ "le micro des téléphones Android et des ordinateurs portables</a> (je "
+#~ "soupçonne qu'ils parlent des ordinateurs sous Windows) ; voici des <a "
+#~ "href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">informations "
+#~ "complémentaires</a>."
+
+#~ msgid ""
+#~ "I think that lawsuit is about a side issue. What the company does with "
+#~ "the data is a secondary issue. The principal wrong here is that the "
+#~ "company gets that data at all."
+#~ msgstr ""
+#~ "Je pense que cette action en justice s'intéresse à un problème annexe.
Ce "
+#~ "que fait la société avec les données est secondaire. Son tort principal
"
+#~ "est de se les accaparer."
+
+#~ msgid ""
+#~ "I expect it implements DRM, too—that there is no way to save a "
+#~ "recording. But I can't be sure from the article."
+#~ msgstr ""
+#~ "Je suppose qu'elle implémente aussi la gestion numérique des
restrictions "
+#~ "â qu'il n'y a aucun moyen de sauvegarder un enregistrement. Mais je ne "
+#~ "peux pas en être sûr d'après l'article."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- it.po 18 Sep 2019 10:02:31 -0000 1.142
+++ it.po 18 Sep 2019 16:01:41 -0000 1.143
@@ -598,10 +598,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2439,7 +2439,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -4331,13 +4331,23 @@
"Jeep."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"Se si possiede un'automobile che contiene tra i suoi componenti un telefono "
"cellulare, è opportuno considerare se disattivarlo."
@@ -4612,7 +4622,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
@@ -5642,7 +5652,13 @@
msgstr ""
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
#, fuzzy
#| msgid ""
#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
@@ -5657,9 +5673,9 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"Spyware nei telefoni Android (e computer portatili, forse Windows): il Wall "
"Street Journal (in un articolo che può essere letto solo previo pagamento) "
@@ -7774,7 +7790,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -7834,8 +7850,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -12112,6 +12128,44 @@
"<a href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">I "
"processori Intel avranno del software tiranno preinstallato</a>."
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr ""
+#~ "Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "Se si possiede un'automobile che contiene tra i suoi componenti un "
+#~ "telefono cellulare, è opportuno considerare se disattivarlo."
+
+#, fuzzy
+#~| msgid ""
+#~| "Spyware in Android phones (and Windows? laptops): The Wall Street "
+#~| "Journal (in an article blocked from us by a paywall) reports that <a "
+#~| "href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-"
+#~| "activate-android-and-laptop-microphones-reports-wsj\"> the FBI can "
+#~| "remotely activate the GPS and microphone in Android phones and laptops</"
+#~| "a>. (I suspect this means Windows laptops.) Here is <a href=\"http://"
+#~| "cryptome.org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#~ "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "Spyware nei telefoni Android (e computer portatili, forse Windows): il "
+#~ "Wall Street Journal (in un articolo che può essere letto solo previo "
+#~ "pagamento) afferma che <a href=\"http://www.theverge.com/2013/8/1/4580718/"
+#~ "fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj"
+#~ "\">l'FBI può attivare remotamente il GPS ed il microfono di telefoni "
+#~ "Android e computer portatili</a>. (Sospettiamo si tratti di computer "
+#~ "portatili Windows.) <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
+#~ "\">Ulteriori informazioni</a>."
+
#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- ja.po 18 Sep 2019 10:02:31 -0000 1.149
+++ ja.po 18 Sep 2019 16:01:41 -0000 1.150
@@ -496,10 +496,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1899,7 +1899,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -3282,13 +3282,19 @@
"ãããããªã©ãªã©ã§ããã®ã§ãã"
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "ã¯ã©ã¤ã¹ã©ã¼ã¨NSAãã§ããã¨ãããã¯èãã¾ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"ãããè»ãæã¤ãªããããã¦ããã«æºå¸¯é»è©±ãã¤ãã¦ãããªãã°ããããã¯ãããæ¢"
"ããã§ãããã"
@@ -3513,7 +3519,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
@@ -4346,14 +4352,23 @@
msgstr ""
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"(ãã¤ã»ã¦ã©ã¼ã«ã§ãããã¯ãããè¨äºã§ã)ã¯<a
href=\"http://www.theverge."
"com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
@@ -5989,7 +6004,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -6049,8 +6064,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -9442,6 +9457,32 @@
"<a
href=\"http://soylentnews.org/article.pl?sid=14/03/15/1912255\">ã¤ã³ãã«ã®"
"ããã»ããµã«ã¯æ´åã½ããã¦ã§ã¢ãçµã¿è¾¼ã¾ããããã«ãªãã¾ã</a>ã"
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr "ã¯ã©ã¤ã¹ã©ã¼ã¨NSAãã§ããã¨ãããã¯èãã¾ãã"
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~
"ãããè»ãæã¤ãªããããã¦ããã«æºå¸¯é»è©±ãã¤ãã¦ãããªãã°ããããã¯ããã"
+#~ "æ¢ããã§ãããã"
+
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#~ "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "(ãã¤ã»ã¦ã©ã¼ã«ã§ãããã¯ãããè¨äºã§ã)ã¯<a
href=\"http://www.theverge."
+#~ "com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
+#~ "microphones-reports-wsj\">FBIãé
éæä½ã§ã¢ã³ããã¤ãã¨ã©ãããããã®GPSã¨"
+#~ "ãã¤ã¯ããã©ã³ãæå¹ã«ã§ãã</a>ãã¨å
±åãã¦ãã¾ãã (ã¦ã£ãã¦ãºã®ã©ãã"
+#~ "ãããã ããã¨æããã¾ãã) ãã¡ãã«<a
href=\"http://cryptome.org/2013/08/"
+#~ "fbi-hackers.htm\">ãã£ã¨å¤ãã®æ
å ±(è±èª)</a>ãããã¾ãã"
+
#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
Index: malware-amazon.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de-diff.html,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-amazon.de-diff.html 29 May 2019 06:00:57 -0000 1.21
+++ malware-amazon.de-diff.html 18 Sep 2019 16:01:41 -0000 1.22
@@ -276,7 +276,7 @@
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
- unintentional and I suppose Amazon will fix it. I
+ unintentional and Amazon will probably fix it. However, we
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -370,7 +370,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/29 06:00:57 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.de.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- malware-amazon.de.po 29 May 2019 06:00:57 -0000 1.25
+++ malware-amazon.de.po 18 Sep 2019 16:01:41 -0000 1.26
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-09-26 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -367,10 +367,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-amazon.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.es.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-amazon.es.po 15 Sep 2019 21:06:07 -0000 1.35
+++ malware-amazon.es.po 18 Sep 2019 16:01:41 -0000 1.36
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-05-29 11:15+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -342,11 +343,22 @@
"\">también cualquier otro puede observar e incluso falsear vÃdeos</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"Es de suponer que la vulnerabilidad a terceros no es intencionada, e imagino "
"que la Amazon lo solucionará. Pero no cuento con que Amazon cambie el
diseño "
Index: malware-amazon.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.fr.po,v
retrieving revision 1.41
retrieving revision 1.42
diff -u -b -r1.41 -r1.42
--- malware-amazon.fr.po 30 May 2019 05:14:06 -0000 1.41
+++ malware-amazon.fr.po 18 Sep 2019 16:01:41 -0000 1.42
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-05-30 07:12+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -337,11 +338,22 @@
"peut en faire autant, et peut également falsifier les vidéos</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"Une vulnérabilité à des attaques de tiers est vraisemblablement
involontaire "
"et je suppose qu'Amazon la corrigera. Cependant je ne m'attends pas à ce "
Index: malware-amazon.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-amazon.it-diff.html 29 May 2019 06:00:57 -0000 1.35
+++ malware-amazon.it-diff.html 18 Sep 2019 16:01:41 -0000 1.36
@@ -276,7 +276,7 @@
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
- unintentional and I suppose Amazon will fix it. I
+ unintentional and Amazon will probably fix it. However, we
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -370,7 +370,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/05/29 06:00:57 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.it.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- malware-amazon.it.po 29 May 2019 06:00:57 -0000 1.28
+++ malware-amazon.it.po 18 Sep 2019 16:01:41 -0000 1.29
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-09-30 22:48+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -345,10 +345,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-amazon.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-amazon.ja-diff.html 26 Jun 2019 20:32:25 -0000 1.34
+++ malware-amazon.ja-diff.html 18 Sep 2019 16:01:41 -0000 1.35
@@ -56,11 +56,10 @@
the developer's awareness that the users would be powerless to fix any
malicious functionalities tempts the developer to impose some.
</p>
-<span class="removed"><del><strong></div>
-
-<div class="toc"></strong></del></span>
+<span class="removed"><del><strong></div></strong></del></span>
-<div <span class="removed"><del><strong>class="malfunctions">
+<div <span class="removed"><del><strong>class="toc">
+<div class="malfunctions">
<ul>
<li><strong>Type of malware</strong></li>
<li><a href="#back-doors">Back doors</a></li>
@@ -265,7 +264,7 @@
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
- unintentional and I suppose Amazon will fix it. I
+ unintentional and Amazon will probably fix it. However, we
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -359,7 +358,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/06/26 20:32:25 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-amazon.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ja.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-amazon.ja.po 26 Jun 2019 09:01:19 -0000 1.21
+++ malware-amazon.ja.po 18 Sep 2019 16:01:41 -0000 1.22
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2016-10-31 11:24+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -289,10 +289,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-amazon.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.pot,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- malware-amazon.pot 29 May 2019 06:00:57 -0000 1.18
+++ malware-amazon.pot 18 Sep 2019 16:01:41 -0000 1.19
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -237,10 +237,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
-"to watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-amazon.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-amazon.ru.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- malware-amazon.ru.po 29 May 2019 15:31:37 -0000 1.43
+++ malware-amazon.ru.po 18 Sep 2019 16:01:41 -0000 1.44
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-amazon.html\n"
-"POT-Creation-Date: 2019-05-29 05:56+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-10-08 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Amazon's Software Is Malware - GNU Project - Free Software Foundation"
@@ -337,11 +338,22 @@
"видеоизобÑажение</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
"полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво "
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-appliances.de-diff.html 13 Sep 2019 12:31:16 -0000 1.45
+++ malware-appliances.de-diff.html 18 Sep 2019 16:01:41 -0000 1.46
@@ -118,7 +118,7 @@
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability</em></ins></span> is <span
class="removed"><del><strong>connected</strong></del></span> <span
class="inserted"><ins><em>presumably
- unintentional and I suppose Amazon will fix it. I
+ unintentional and Amazon will probably fix it. However, we
do not expect Amazon</em></ins></span> to <span
class="inserted"><ins><em>change</em></ins></span> the <span
class="removed"><del><strong>internet. Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
@@ -238,300 +238,283 @@
<span class="removed"><del><strong>computer, the TV reports what it is.
The existence of</strong></del></span> <span class="inserted"><ins><em>router
(which can
be an old computer running completely free software), and set
up</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
<span class="inserted"><ins><em>firewall</em></ins></span> to
- <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden</strong></del></span> <span class="inserted"><ins><em>block
connections to Vizio's servers. Or,</em></ins></span> as <span
class="removed"><del><strong>it was in
- these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span class="inserted"><ins><em>a
last resort,
- you can replace your TV with another model.</p></em></ins></span>
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>block connections to Vizio's servers. Or, as a last
resort,
+ you can replace your TV with another model.</p>
+ </li>
+
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy of everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>were</strong></del></span> <span
class="inserted"><ins><em>suggested that these
+ manufacturers promise</em></ins></span> not <span
class="removed"><del><strong>hidden as it was</strong></del></span> <span
class="inserted"><ins><em>to look at what's</em></ins></span> in
+ <span class="removed"><del><strong>these TVs, does</strong></del></span>
<span class="inserted"><ins><em>the videos. That's</em></ins></span> not <span
class="removed"><del><strong>legitimize</strong></del></span>
+ <span class="inserted"><ins><em>security for your home. Security means
making sure they don't get to
+ see through your camera.</p>
+ </li>
+
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at
blocking</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
+ <span class="inserted"><ins><em>use of independent replacement ink
cartridges. Their “security
+ upgrades” occasionally impose new forms of cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson have done this</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>More or less</strong></del></span>
+<p>More or less all</strong></del></span>
- <span class="inserted"><ins><em><li id="M201810300">
- <p>Nearly</em></ins></span> all <span
class="removed"><del><strong>“smart” TVs</strong></del></span>
<span class="inserted"><ins><em>“home security
cameras”</em></ins></span> <a
+ <span class="inserted"><ins><em><li id="M201809260">
+ <p>Honeywell's</em></ins></span> “smart” <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em>thermostats communicate
+ only through the company's server. They have
+ all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
<p>The report was as</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
+ <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
+ surveillance, and danger</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
-<p>This shows</strong></del></span> <span
class="inserted"><ins><em>everything they
- see</a>. “Home insecurity camera” would be a better
- name!</p>
-
- <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span class="inserted"><ins><em>these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>get users' formal
+<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate. And
-what happens if a user declines consent? Probably</strong></del></span> <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>TV will say,
-“Without</strong></del></span> <span class="inserted"><ins><em>videos.
That's not
- security for</em></ins></span> your <span
class="removed"><del><strong>consent</strong></del></span> <span
class="inserted"><ins><em>home. Security means making sure they don't
get</em></ins></span> to <span class="removed"><del><strong>tracking, the TV
will not
+what happens if</strong></del></span> <span
class="inserted"><ins><em>sabotage</a> (of</em></ins></span> a <span
class="removed"><del><strong>user declines consent? Probably the TV will say,
+“Without your consent to tracking,</strong></del></span> <span
class="inserted"><ins><em>specific user, or of
+ all users at once), as well as</em></ins></span> the <span
class="removed"><del><strong>TV will not
work.”</p>
-<p>Proper laws would say that TVs</strong></del></span>
- <span class="inserted"><ins><em>see through your camera.</p>
- </li>
+<p>Proper laws would say that TVs are not allowed to
report</strong></del></span> <span class="inserted"><ins><em>risk of an outage
(which is</em></ins></span> what
+ <span class="inserted"><ins><em>just happened).</p>
- <li id="M201810150">
- <p>Printer manufacturers</em></ins></span> are <span
class="removed"><del><strong>not allowed to report what</strong></del></span>
<span class="inserted"><ins><em>very innovative—at
blocking</em></ins></span> the
+ <p>In addition, setting</em></ins></span> the
<span class="removed"><del><strong>user watches — no
exceptions!</p>
</li>
<li>
<p>Some LG
-TVs</strong></del></span>
- <span class="inserted"><ins><em>use of independent replacement ink
cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge
DRM.</em></ins></span> <a <span
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
-tyrants</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
- HP and Epson have done this</a>.</p></em></ins></span>
+TVs <a href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
+tyrants</a>.</p></strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can do it
+ using controls right on the thermostat.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li><a
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
Samsung “Smart” TVs</strong></del></span>
- <span class="inserted"><ins><em><li id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through the company's server. They</em></ins></span> have <span
class="removed"><del><strong>turned Linux into</strong></del></span>
- <span class="inserted"><ins><em>all</em></ins></span> the <span
class="removed"><del><strong>base
+ <span class="inserted"><ins><em><li id="M201809240">
+ <p>Researchers</em></ins></span> have <span
class="removed"><del><strong>turned Linux into the base
for a tyrant system</a> so as to impose DRM.
-What enables Samsung to do this is that Linux is released under
-GNU GPL version 2,</strong></del></span> <span class="inserted"><ins><em>nasty
characteristics of such devices:</em></ins></span> <a <span
class="removed"><del><strong>href="/licenses/rms-why-gplv3.html">not version
3</a>,
-together with</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of</em></ins></span> a
<span class="removed"><del><strong>weak interpretation</strong></del></span>
<span class="inserted"><ins><em>specific user, or</em></ins></span> of <span
class="removed"><del><strong>GPL version 2.
-</li>
-
-<li>
-<p>A company that makes internet-controlled vibrators
-<a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
-being sued for collecting lots</strong></del></span>
- <span class="inserted"><ins><em>all users at once), as well as the
risk</em></ins></span> of <span class="removed"><del><strong>personal
information about how
-people use it</a>.</p>
-
-<p>The company's statement that it anonymizes</strong></del></span>
<span class="inserted"><ins><em>an outage (which is what
- just happened).</p>
-
- <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>data may be true,
-but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can
do</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span>
- <span class="inserted"><ins><em>using controls right on</em></ins></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>thermostat.</p>
- </li>
-
- <li id="M201809240">
- <p>Researchers have discovered how to <a
-
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
+What enables Samsung</strong></del></span> <span
class="inserted"><ins><em>discovered how</em></ins></span> to <span
class="removed"><del><strong>do this is that Linux is released under
+GNU GPL version 2,</strong></del></span> <a <span
class="removed"><del><strong>href="/licenses/rms-why-gplv3.html">not version
3</a>,
+together with a weak interpretation of GPL version 2.</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
hide voice commands in other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p>
+ them, but Alexa and Siri can.</p></em></ins></span>
</li>
- <li id="M201807050">
- <p>The Jawbone fitness tracker was tethered</em></ins></span> to a
<span class="removed"><del><strong>data broker,</strong></del></span> <span
class="inserted"><ins><em>proprietary phone
- app. In 2017,</em></ins></span> the <span
class="removed"><del><strong>data broker can figure out
who</strong></del></span> <span class="inserted"><ins><em>company shut down and
made</em></ins></span> the <span class="removed"><del><strong>user is.</p>
-</li>
+<span class="removed"><del><strong><li>
+<p>A</strong></del></span>
-<li>
-<p>Google/Alphabet</strong></del></span> <span
class="inserted"><ins><em>app stop working.</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
-intentionally broke Revolv home automatic control products that
depended</strong></del></span>
+ <span class="inserted"><ins><em><li id="M201807050">
+ <p>The Jawbone fitness tracker was tethered to a proprietary phone
+ app. In 2017, the</em></ins></span> company <span
class="removed"><del><strong>that makes internet-controlled
vibrators</strong></del></span> <span class="inserted"><ins><em>shut down and
made the app stop working.</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">is
+being sued for collecting lots of personal information about how
+people use it</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
- the existing trackers stopped working forever</a>.</p>
+ the existing trackers stopped working
forever</a>.</p></em></ins></span>
- <p>The article focuses</em></ins></span> on a <span
class="removed"><del><strong>server</a></strong></del></span> <span
class="inserted"><ins><em>further nasty fillip, that sales of the
- broken devices continued. But I think that is a secondary issue;
- it made the nasty consequences extend</em></ins></span> to <span
class="removed"><del><strong>function.</strong></del></span> <span
class="inserted"><ins><em>some additional people.</em></ins></span>
- The <span class="removed"><del><strong>lesson is, don't stand for that!
Insist</strong></del></span> <span class="inserted"><ins><em>fundamental wrong
was to design the devices to depend</em></ins></span> on <span
class="removed"><del><strong>self-contained computers</strong></del></span>
<span class="inserted"><ins><em>something
- else</em></ins></span> that <span class="removed"><del><strong>run free
software!</p></strong></del></span> <span
class="inserted"><ins><em>didn't respect users'
freedom.</p></em></ins></span>
+ <p>The <span class="removed"><del><strong>company's
statement</strong></del></span> <span class="inserted"><ins><em>article focuses
on a further nasty fillip,</em></ins></span> that <span
class="removed"><del><strong>it anonymizes</strong></del></span> <span
class="inserted"><ins><em>sales of</em></ins></span> the <span
class="removed"><del><strong>data may be true,
+but it doesn't really matter. If</strong></del></span>
+ <span class="inserted"><ins><em>broken devices continued. But we think
that is a secondary issue;</em></ins></span>
+ it <span class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>made</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span
class="removed"><del><strong>a data broker,</strong></del></span> <span
class="inserted"><ins><em>some additional people.
+ The fundamental wrong was to design</em></ins></span> the <span
class="inserted"><ins><em>devices to depend on something
+ else that didn't respect users' freedom.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>ARRIS cable modem has a</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804140">
- <p>A medical insurance company</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-backdoor in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
+ <li id="M201804140">
+ <p>A medical insurance company <a
+
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
offers a gratis electronic toothbrush that snoops on its user by
- sending usage data back over</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
+ sending usage</em></ins></span> data <span
class="removed"><del><strong>broker can figure out who</strong></del></span>
<span class="inserted"><ins><em>back over</em></ins></span> the <span
class="removed"><del><strong>user is.</p></strong></del></span> <span
class="inserted"><ins><em>Internet</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>HP “storage appliances”</strong></del></span>
+<p>Google/Alphabet</strong></del></span>
<span class="inserted"><ins><em><li id="M201804010">
- <p>Some “Smart” TVs automatically <a
-
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades</em></ins></span> that <span
class="removed"><del><strong>use the proprietary
-“Left Hand” operating system have back doors that give HP
-<a
-href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
-remote login access</a> to them. HP claims that this does not give HP
-access</strong></del></span> <span class="inserted"><ins><em>install a
surveillance app</a>.</p>
-
- <p>We link</em></ins></span> to the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>article for</em></ins></span> the <span
class="removed"><del><strong>back door allows
-installation of software changes, a change could be
installed</strong></del></span> <span class="inserted"><ins><em>facts it
presents. It
- is too bad</em></ins></span> that
-<span class="removed"><del><strong>would give access to</strong></del></span>
the <span class="removed"><del><strong>customer's data.
-</p>
+ <p>Some “Smart” TVs automatically</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+intentionally broke Revolv home automatic control
products</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
+ load downgrades</em></ins></span> that <span
class="removed"><del><strong>depended on</strong></del></span> <span
class="inserted"><ins><em>install</em></ins></span> a <span
class="removed"><del><strong>server</a></strong></del></span> <span
class="inserted"><ins><em>surveillance app</a>.</p>
+
+ <p>We link</em></ins></span> to <span
class="removed"><del><strong>function. The lesson is, don't
stand</strong></del></span> <span class="inserted"><ins><em>the
article</em></ins></span> for <span class="removed"><del><strong>that! Insist
+on self-contained computers</strong></del></span> <span
class="inserted"><ins><em>the facts it presents. It
+ is too bad</em></ins></span> that <span class="removed"><del><strong>run
free software!</p>
</li>
<li>
-<p><a
-href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
-Some D-Link routers</a> have a back door for changing settings in a
-dlink of an eye.</p>
-
-<p>
-<a href="https://github.com/elvanderb/TCP-32764">Many
models</strong></del></span> <span class="inserted"><ins><em>article finishes
by advocating the
- moral weakness</em></ins></span> of <span
class="removed"><del><strong>routers
-have back doors</a>.</p>
+<p>ARRIS cable modem has a <a
+href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+backdoor in</strong></del></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
</li>
<li>
-<p><a
href="http://sekurak.pl/tp-link-httptftp-backdoor/"></strong></del></span>
<span class="inserted"><ins><em>surrendering to Netflix.</em></ins></span> The
<span class="removed"><del><strong>TP-Link router has a
backdoor</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+<p>HP “storage appliances” that use</strong></del></span>
<span class="inserted"><ins><em>article finishes by
advocating</em></ins></span> the <span class="removed"><del><strong>proprietary
+“Left Hand” operating system have back doors that give
HP</strong></del></span>
+ <span class="inserted"><ins><em>moral weakness of surrendering to Netflix.
The Netflix app</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
+remote login access</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201802120">
- <p>Apple devices lock users in</em></ins></span> <a <span
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer was</strong></del></span>
- <span
class="inserted"><ins><em>href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
- solely to Apple services</a> by being</em></ins></span> designed
<span class="inserted"><ins><em>to be incompatible</em></ins></span>
- with <span class="removed"><del><strong>DRM</a>: it won't accept
-third-party printing materials. It is</strong></del></span> <span
class="inserted"><ins><em>all other options, ethical or unethical.</p>
+ <li id="M201802120">
+ <p>Apple devices lock users in <a
+
href="https://gizmodo.com/homepod-is-the-ultimate-apple-product-in-a-bad-way-1822883347">
+ solely</em></ins></span> to <span class="removed"><del><strong>them. HP
claims that this does not give HP
+access</strong></del></span> <span class="inserted"><ins><em>Apple
services</a> by being designed</em></ins></span> to <span
class="inserted"><ins><em>be incompatible
+ with all other options, ethical or unethical.</p>
</li>
<li id="M201712240">
- <p>One of</em></ins></span> the <span
class="removed"><del><strong>Keurig</strong></del></span> <span
class="inserted"><ins><em>dangers</em></ins></span> of <span
class="removed"><del><strong>printers. Now it</strong></del></span> <span
class="inserted"><ins><em>the “internet of stings”</em></ins></span>
- is
-<span class="removed"><del><strong>being discontinued, which means that
eventually authorized materials won't</strong></del></span> <span
class="inserted"><ins><em>that, if you lose your internet service, you also
<a
+ <p>One of</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>dangers of</em></ins></span> the <span
class="removed"><del><strong>back door allows
+installation</strong></del></span> <span
class="inserted"><ins><em>“internet</em></ins></span> of <span
class="removed"><del><strong>software changes,</strong></del></span> <span
class="inserted"><ins><em>stings”
+ is that, if you lose your internet service, you also <a
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
lose control of your house and appliances</a>.</p>
- <p>For your safety, don't use any appliance with a connection to the
- real internet.</p>
+ <p>For your safety, don't use any appliance with</em></ins></span> a
<span class="removed"><del><strong>change could be installed that
+would give access</strong></del></span> <span
class="inserted"><ins><em>connection</em></ins></span> to the <span
class="removed"><del><strong>customer's data.
+</p></strong></del></span>
+ <span class="inserted"><ins><em>real internet.</p></em></ins></span>
</li>
- <li id="M201711200">
- <p>Amazon recently invited consumers to</em></ins></span> be <span
class="removed"><del><strong>available</strong></del></span> <span
class="inserted"><ins><em>suckers</em></ins></span> and <span
class="inserted"><ins><em><a
-
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff to open their front doors</a>. Wouldn't you know
- it,</em></ins></span> the <span class="removed"><del><strong>printers may
become unusable.</p>
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
+Some D-Link routers</a> have a back door for changing settings in a
+dlink of an eye.</p>
+
+<p></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764">Many
models of routers
+have back doors</a>.</p>
+</li>
-<p>With</strong></del></span> <span class="inserted"><ins><em>system
has</em></ins></span> a <span class="inserted"><ins><em>grave security
flaw.</p>
+<li>
+<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+The TP-Link router</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system</em></ins></span> has a <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>grave security
flaw.</p></em></ins></span>
</li>
- <li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of</em></ins></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
-even be a remote possibility.</p>
+<span class="removed"><del><strong><li>
+<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+“Cube” 3D printer</strong></del></span>
-<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy</em></ins></span> was <span
class="removed"><del><strong>designed with DRM</a>: it won't accept
+third-party printing materials. It is the Keurig</strong></del></span> <span
class="inserted"><ins><em>found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings</em></ins></span> of <span
class="removed"><del><strong>printers. Now it is
+being discontinued, which means that eventually authorized materials won't
+be available and</strong></del></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
+
+<p>With a</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
</li>
<li id="M201711080">
<p>Logitech will sabotage
- all Harmony Link household control devices by <a
-
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off</em></ins></span> the <span
class="removed"><del><strong>author of that article says that there was
-“nothing wrong” with designing</strong></del></span> <span
class="inserted"><ins><em>server through which</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>products' supposed owners
- communicate with them</a>.</p>
-
- <p>The owners suspect this is</em></ins></span> to <span
class="removed"><del><strong>restrict users in
-the first place. This is like putting</strong></del></span> <span
class="inserted"><ins><em>pressure them to buy</em></ins></span> a <span
class="removed"><del><strong>“cheat me and mistreat me”
-sign on your chest. We should know better: we should condemn all companies
-that take advantage of people like him. Indeed, it is the acceptance of
-their unjust practice</strong></del></span> <span
class="inserted"><ins><em>newer model. If
- they are wise, they will learn, rather, to distrust any
product</em></ins></span> that <span class="removed"><del><strong>teaches
people</strong></del></span>
- <span class="inserted"><ins><em>requires users</em></ins></span> to <span
class="removed"><del><strong>be doormats.</p></strong></del></span> <span
class="inserted"><ins><em>talk with them through some specialized
service.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>Philips “smart” lightbulbs <a
-href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
-have been designed not to interact</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201710040">
- <p>Every “home security” camera, if its
- manufacturer can communicate</em></ins></span> with <span
class="removed"><del><strong>other companies' smart
-lightbulbs</a>.</p>
+ all Harmony Link household control devices by</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer that gets</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off</em></ins></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
+even be a remote possibility.</p>
-<p>If a product is “smart”, and you didn't
build</strong></del></span> it, <span
class="removed"><del><strong>it</strong></del></span> is
-<span class="removed"><del><strong>cleverly serving its manufacturer
<em>against you</em>.</p>
-</li>
+<p>How pitiful that</strong></del></span> <span
class="inserted"><ins><em>server through which</em></ins></span> the <span
class="removed"><del><strong>author of that article says that there was
+“nothing wrong”</strong></del></span> <span
class="inserted"><ins><em>products' supposed owners
+ communicate</em></ins></span> with <span
class="removed"><del><strong>designing the device</strong></del></span> <span
class="inserted"><ins><em>them</a>.</p>
-<li>
-<p><a
-href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
-DVDs and Bluray disks have DRM</a>.
-</p>
+ <p>The owners suspect this is</em></ins></span> to <span
class="removed"><del><strong>restrict</strong></del></span> <span
class="inserted"><ins><em>pressure them to buy a newer model. If
+ they are wise, they will learn, rather, to distrust any product that
+ requires</em></ins></span> users <span class="removed"><del><strong>in
+the first place. This</strong></del></span> <span
class="inserted"><ins><em>to talk with them through some specialized
service.</p>
+ </li>
-<p>That page uses spin terms that favor DRM,
-including <a
href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital “rights” management</a>
-and</strong></del></span> <span class="inserted"><ins><em>a surveillance
device.</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,
-and it claims</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ <li id="M201710040">
+ <p>Every “home security” camera, if its
+ manufacturer can communicate with it,</em></ins></span> is <span
class="removed"><del><strong>like putting</strong></del></span> a <span
class="removed"><del><strong>“cheat me and mistreat me”
+sign</strong></del></span> <span class="inserted"><ins><em>surveillance
device. <a
+
href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by the manufacturer, based on
- the fact</em></ins></span> that <span
class="removed"><del><strong>“artists” (rather than companies) are
-primarily responsible for putting digital restrictions management into
-these disks. Nonetheless, it</strong></del></span> <span
class="inserted"><ins><em>the device</em></ins></span> is <span
class="inserted"><ins><em>tethered to</em></ins></span> a <span
class="removed"><del><strong>reference for</strong></del></span> <span
class="inserted"><ins><em>server.</p>
+ <p>The article describes wrongdoing by the manufacturer,
based</em></ins></span> on <span class="removed"><del><strong>your chest. We
should know better: we should condemn all companies</strong></del></span>
+ <span class="inserted"><ins><em>the fact</em></ins></span> that <span
class="removed"><del><strong>take advantage of people like him.
Indeed,</strong></del></span> <span class="inserted"><ins><em>the device is
tethered to a server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that</em></ins></span> the <span
class="removed"><del><strong>facts.
-</p>
-
-<p>Every Bluray disk (with few, rare exceptions) has DRM—so
-don't use Bluray disks!</p></strong></del></span> <span
class="inserted"><ins><em>device gives the company
- surveillance capability.</p></em></ins></span>
+ <p>But</em></ins></span> it <span class="inserted"><ins><em>also
demonstrates that the device gives the company
+ surveillance capability.</p>
</li>
- <li <span class="removed"><del><strong>id="cameras-bugs">
-<p>Over 70 brands of network-connected surveillance cameras
have</strong></del></span> <span class="inserted"><ins><em>id="M201709200">
+ <li id="M201709200">
<p>A “smart” intravenous pump
- designed for hospitals is connected to the internet.
Naturally</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its</em></ins></span> security <span
class="removed"><del><strong>bugs</strong></del></span> <span
class="inserted"><ins><em>has been cracked</a>.</p>
+ designed for hospitals</em></ins></span> is <span
class="inserted"><ins><em>connected to</em></ins></span> the <span
class="removed"><del><strong>acceptance of
+their unjust practice</strong></del></span> <span
class="inserted"><ins><em>internet. Naturally <a
+
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ its security has been cracked</a>.</p>
- <p>Note</em></ins></span> that <span
class="removed"><del><strong>allow anyone</strong></del></span> <span
class="inserted"><ins><em>this article misuses the term <a
+ <p>Note</em></ins></span> that <span
class="removed"><del><strong>teaches people</strong></del></span> <span
class="inserted"><ins><em>this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</em></ins></span> to <span class="removed"><del><strong>watch
through them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
+ referring</em></ins></span> to <span class="removed"><del><strong>be
doormats.</p></strong></del></span> <span
class="inserted"><ins><em>crackers.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>Samsung's “Smart Home” has a big</strong></del></span>
+<p>Philips “smart” lightbulbs</strong></del></span>
<span class="inserted"><ins><em><li id="M201708280">
- <p>The bad</em></ins></span> security <span
class="removed"><del><strong>hole; <a
-href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"></strong></del></span>
<span class="inserted"><ins><em>in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
+ <p>The bad security in many Internet of Stings devices
allows</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+have been designed not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="removed"><del><strong>interact with other companies' smart
+lightbulbs</a>.</p>
- <p>Don't be a sucker—reject all the stings.</p>
+<p>If</strong></del></span> <span class="inserted"><ins><em>snoop on the
people that use them</a>.</p>
+
+ <p>Don't be</em></ins></span> a <span
class="removed"><del><strong>product is “smart”, and you didn't
build it, it</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+ <p>It</em></ins></span> is
+<span class="removed"><del><strong>cleverly serving its manufacturer
<em>against you</em>.</p>
+</li>
+
+<li>
+<p><a
+href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
+DVDs and Bluray disks have DRM</a>.
+</p>
+
+<p>That page uses spin terms</strong></del></span> <span
class="inserted"><ins><em>unfortunate</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>the article
uses the term</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+digital “rights” management</a>
+and</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li id="M201708230">
- <p>Sonos <a
-
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
+ <p>Sonos</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”
to snooping or the product will stop working</a>. <a
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
Another article</a> says they won't forcibly change the software, but
- people won't be able to get any upgrades and eventually it will
+ people won't be able to get any upgrades</em></ins></span> and <span
class="inserted"><ins><em>eventually</em></ins></span> it <span
class="removed"><del><strong>claims that “artists” (rather than
companies)</strong></del></span> <span class="inserted"><ins><em>will
stop working.</p>
</li>
@@ -543,11 +526,12 @@
</li>
<li id="M201706200">
- <p>Many models of Internet-connected cameras
- are tremendously insecure. They have login
+ <p>Many models of Internet-connected cameras</em></ins></span>
+ are
+<span class="removed"><del><strong>primarily responsible for putting digital
restrictions management into</strong></del></span> <span
class="inserted"><ins><em>tremendously insecure. They have login
accounts with hard-coded passwords, which can't be changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
- is no way to delete these accounts either</a>.</p>
+ is no way to delete</em></ins></span> these <span
class="removed"><del><strong>disks. Nonetheless,</strong></del></span> <span
class="inserted"><ins><em>accounts either</a>.</p>
</li>
<li id="M201705250">
@@ -720,10 +704,8 @@
<li id="M201605020">
<p>Samsung's “Smart Home” has a big security hole; <a
-
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/"></em></ins></span>
- unauthorized people can <span class="removed"><del><strong>remotely
control it</a>.</p>
-
-<p>Samsung claims</strong></del></span> <span
class="inserted"><ins><em>remotely control it</a>.</p>
+
href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+ unauthorized people can remotely control it</a>.</p>
<p>Samsung claims that this is an “open” platform so the
problem is partly the fault of app developers. That is clearly true
@@ -795,35 +777,50 @@
later the company updated the firmware to disallow
interoperability</a>.</p>
- <p>If a product is “smart”, and you didn't build it,
- it is cleverly serving its manufacturer <em>against
you</em>.</p>
+ <p>If a product is “smart”, and you didn't build
it,</em></ins></span>
+ it is <span class="inserted"><ins><em>cleverly serving its manufacturer
<em>against you</em>.</p>
</li>
<li id="M201512074">
<p><a
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
- Some D-Link routers</a> have a back door for changing settings in a
+ Some D-Link routers</a> have</em></ins></span> a <span
class="removed"><del><strong>reference</strong></del></span> <span
class="inserted"><ins><em>back door</em></ins></span> for <span
class="removed"><del><strong>the facts.
+</p>
+
+<p>Every Bluray disk (with few, rare exceptions)</strong></del></span>
<span class="inserted"><ins><em>changing settings in a
dlink of an eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
- router has a back door</a>.</p>
+ router</em></ins></span> has <span
class="removed"><del><strong>DRM—so
+don't use Bluray disks!</p>
+</li>
+
+<li id="cameras-bugs">
+<p>Over 70 brands</strong></del></span> <span
class="inserted"><ins><em>a back door</a>.</p>
- <p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
- routers have back doors</a>.</p>
+ <p><a href="https://github.com/elvanderb/TCP-32764">Many
models</em></ins></span> of <span
class="removed"><del><strong>network-connected surveillance
cameras</strong></del></span>
+ <span class="inserted"><ins><em>routers</em></ins></span> have <span
class="inserted"><ins><em>back doors</a>.</p>
</li>
<li id="M201511250">
- <p>The Nest Cam “smart” camera is <a
- href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ <p>The Nest Cam “smart” camera is</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+security bugs that allow anyone</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
even when the “owner” switches it “off.”</p>
- <p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ <p>A “smart” device means the manufacturer is using
it</em></ins></span>
+ to <span class="removed"><del><strong>watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
</li>
- <li id="M201511198">
- <p>ARRIS cable modem has a <a
-
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+<span class="removed"><del><strong><li>
+<p>Samsung's “Smart Home”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511198">
+ <p>ARRIS cable modem</em></ins></span> has a <span
class="removed"><del><strong>big security hole;</strong></del></span> <a
+<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+unauthorized people</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
back door in the back door</a>.</p>
</li>
@@ -832,7 +829,9 @@
sounds to be picked up by proprietary malware running
on other devices in range so as to determine that they
are nearby. Once your Internet devices are paired with
- your TV, advertisers can correlate ads with Web activity, and other <a
+ your TV, advertisers</em></ins></span> can <span
class="removed"><del><strong>remotely control it</a>.</p>
+
+<p>Samsung claims</strong></del></span> <span
class="inserted"><ins><em>correlate ads with Web activity, and other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">
cross-device tracking</a>.</p>
</li>
@@ -1332,7 +1331,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/13 12:31:16 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.79
retrieving revision 1.80
diff -u -b -r1.79 -r1.80
--- malware-appliances.de.po 13 Sep 2019 12:31:16 -0000 1.79
+++ malware-appliances.de.po 18 Sep 2019 16:01:41 -0000 1.80
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -146,10 +146,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -285,9 +285,21 @@
"nutzbar</a>.</ins>"
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- malware-appliances.fr.po 15 Sep 2019 12:48:10 -0000 1.130
+++ malware-appliances.fr.po 18 Sep 2019 16:01:41 -0000 1.131
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-13 14:48+0200\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -137,11 +138,22 @@
"peut en faire autant, et peut également falsifier les vidéos</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"Une vulnérabilité à des attaques de tiers est vraisemblablement
involontaire "
"et je suppose qu'Amazon la corrigera. Cependant je ne m'attends pas à ce "
@@ -345,9 +357,21 @@
"traqueurs existants ont cessé de fonctionner pour toujours</a>."
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- malware-appliances.pot 13 Sep 2019 12:31:16 -0000 1.64
+++ malware-appliances.pot 18 Sep 2019 16:01:41 -0000 1.65
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -103,10 +103,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
-"to watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -235,7 +235,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- malware-appliances.ru.po 13 Sep 2019 17:28:51 -0000 1.165
+++ malware-appliances.ru.po 18 Sep 2019 16:01:41 -0000 1.166
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -140,11 +141,22 @@
"видеоизобÑажение</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
"полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво "
@@ -347,9 +359,21 @@
"\">ÐÑе ÑÑÑеÑÑвÑÑÑие ÑÑÑÑойÑÑва навÑегда
пÑекÑаÑили ÑабоÑÑ.</a>"
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: malware-cars.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de-diff.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-cars.de-diff.html 16 Sep 2019 08:31:26 -0000 1.31
+++ malware-cars.de-diff.html 18 Sep 2019 16:01:41 -0000 1.32
@@ -195,34 +195,36 @@
<p><a</em></ins></span>
href="http://jalopnik.com/america-figured-out-a-new-way-audi-cheated-on-emissions-1788630969">
Audi's proprietary software used a simple method to cheat on emissions
- tests</a>: to activate a special low-emission gearshifting mode until
- the first time the car made a <span class="removed"><del><strong>turn.
+ tests</a>: to activate a <span class="removed"><del><strong>special
low-emission gearshifting mode until the
+first time the car made a turn.
</li>
<li>
<p>Caterpillar vehicles come with a <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
-back-door to shutoff the engine</a>
remotely.</p></strong></del></span> <span
class="inserted"><ins><em>turn.</p></em></ins></span>
- </li>
+back-door to shutoff the engine</a> remotely.</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p><a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
-Volkswagen programmed its car engine computers</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201608110">
- <p>Due</em></ins></span> to <span
class="removed"><del><strong>detect the
+Volkswagen programmed its car engine computers to detect the
Environmental Protection Agency's emission tests</a>,
-and run dirty</strong></del></span> <span class="inserted"><ins><em>weak
security, <a
-
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
- is easy to open</em></ins></span> the <span
class="removed"><del><strong>rest</strong></del></span> <span
class="inserted"><ins><em>doors</em></ins></span> of <span
class="removed"><del><strong>the time.</p>
+and run dirty the rest of the time.</p>
-<p>In real driving, the</strong></del></span> <span
class="inserted"><ins><em>100 million</em></ins></span> cars <span
class="removed"><del><strong>exceeded emissions standards</strong></del></span>
<span class="inserted"><ins><em>built</em></ins></span> by <span
class="removed"><del><strong>a factor
+<p>In real driving, the cars exceeded emissions standards by a factor
of up to 35.</p>
<p>Using free software would not have stopped Volkswagen from
-programming it this way, but would have made it harder to
conceal.</p></strong></del></span>
- <span
class="inserted"><ins><em>Volkswagen</a>.</p></em></ins></span>
+programming it this way, but would have</strong></del></span> <span
class="inserted"><ins><em>special low-emission gearshifting mode until
+ the first time the car</em></ins></span> made <span
class="removed"><del><strong>it harder</strong></del></span> <span
class="inserted"><ins><em>a turn.</p>
+ </li>
+
+ <li id="M201608110">
+ <p>Due to weak security, <a
+
href="http://jalopnik.com/almost-every-volkswagen-built-since-1995-is-vulnerable-1785159844">it
+ is easy</em></ins></span> to <span
class="removed"><del><strong>conceal.</p></strong></del></span> <span
class="inserted"><ins><em>open the doors of 100 million cars built by
+ Volkswagen</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -285,10 +287,12 @@
could track the car, start or stop the engine, and activate or
deactivate the brakes, and more.</p>
- <p>I expect that Chrysler and the NSA can do this too.</p>
+<span class="removed"><del><strong><p>I</strong></del></span>
+
+ <span class="inserted"><ins><em><p>We</em></ins></span> expect that
Chrysler and the NSA can do this too.</p>
- <p>If I ever own a car, and it contains a portable phone, I will
- deactivate that.</p>
+ <p>If <span class="removed"><del><strong>I
ever</strong></del></span> <span
class="inserted"><ins><em>you</em></ins></span> own a <span
class="removed"><del><strong>car, and it</strong></del></span> <span
class="inserted"><ins><em>car that</em></ins></span> contains a <span
class="removed"><del><strong>portable phone, I will</strong></del></span> <span
class="inserted"><ins><em>phone modem, it would be a good
+ idea to</em></ins></span> deactivate <span
class="removed"><del><strong>that.</p></strong></del></span> <span
class="inserted"><ins><em>this.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -416,7 +420,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/16 08:31:26 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-cars.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.de.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- malware-cars.de.po 16 Sep 2019 08:31:26 -0000 1.21
+++ malware-cars.de.po 18 Sep 2019 16:01:41 -0000 1.22
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-cars.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -484,13 +484,23 @@
"\"tn01-ref\" class=\"transnote\">[1]</a>"
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "<ins>Vorstellbar wäre</ins>, dass Chrysler und NSA dies auch können."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"<ins>Wäre ein Fahrzeug serienmäÃig mit âInfotainmentsystemâ
ausgestattet, "
"sollte es besser grundsätzlich deaktiviert werden.</ins>"
Index: malware-cars.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.fr.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-cars.fr.po 16 Sep 2019 11:42:11 -0000 1.34
+++ malware-cars.fr.po 18 Sep 2019 16:01:41 -0000 1.35
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-16 13:39+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -434,13 +435,23 @@
"activer et désactiver les freins, et plus encore."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "J'imagine que Chrysler et la NSA peuvent faire de même."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"Si un jour je possède une voiture et qu'elle contient un téléphone
portable, "
"je le désactiverai."
Index: malware-cars.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.pot,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- malware-cars.pot 16 Sep 2019 08:31:26 -0000 1.16
+++ malware-cars.pot 18 Sep 2019 16:01:41 -0000 1.17
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -295,13 +295,13 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-cars.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-cars.ru.po,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -b -r1.40 -r1.41
--- malware-cars.ru.po 16 Sep 2019 09:00:24 -0000 1.40
+++ malware-cars.ru.po 18 Sep 2019 16:01:41 -0000 1.41
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-cars.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-09-27 04:21-0500\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -427,13 +428,23 @@
"оÑпÑÑкаÑÑ ÑоÑмоза и Ñ.д."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"ÐÑли Ñ Ð¼ÐµÐ½Ñ ÐºÐ¾Ð³Ð´Ð°-нибÑÐ´Ñ Ð±ÑÐ´ÐµÑ Ð¼Ð°Ñина и в
ней бÑÐ´ÐµÑ Ð¼Ð¾Ð±Ð¸Ð»ÑнÑй ÑелеÑон, Ñ ÐµÐ³Ð¾ "
"вÑклÑÑÑ."
Index: malware-games.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- malware-games.de-diff.html 11 Sep 2019 08:01:15 -0000 1.34
+++ malware-games.de-diff.html 18 Sep 2019 16:01:41 -0000 1.35
@@ -133,7 +133,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -438,7 +438,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/11 08:01:15 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-games.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.de.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-games.de.po 11 Sep 2019 08:01:15 -0000 1.35
+++ malware-games.de.po 18 Sep 2019 16:01:41 -0000 1.36
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-games.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-12-05 22:00+0100\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -216,7 +216,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: malware-games.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.fr.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- malware-games.fr.po 11 Sep 2019 09:34:19 -0000 1.59
+++ malware-games.fr.po 18 Sep 2019 16:01:41 -0000 1.60
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-11 11:32+0200\n"
"Last-Translator: Tom Mounet <tom.m.mounet AT gmail.com>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -246,8 +247,15 @@
"d'écouter les enregistrements</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Du point de vue éthique, je ne vois aucune différence entre l'écoute par
des "
Index: malware-games.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja-diff.html,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- malware-games.ja-diff.html 11 Sep 2019 08:01:15 -0000 1.42
+++ malware-games.ja-diff.html 18 Sep 2019 16:01:41 -0000 1.43
@@ -133,7 +133,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -438,7 +438,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/11 08:01:15 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-games.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ja.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-games.ja.po 11 Sep 2019 08:01:15 -0000 1.35
+++ malware-games.ja.po 18 Sep 2019 16:01:41 -0000 1.36
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2016-11-18 13:34+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -199,7 +199,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: malware-games.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-games.pot 11 Sep 2019 08:01:15 -0000 1.29
+++ malware-games.pot 18 Sep 2019 16:01:41 -0000 1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -181,7 +181,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: malware-games.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-games.ru.po,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-games.ru.po 11 Sep 2019 14:29:06 -0000 1.71
+++ malware-games.ru.po 18 Sep 2019 16:01:41 -0000 1.72
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-games.html\n"
-"POT-Creation-Date: 2019-09-11 07:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-11-09 16:08+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Games - GNU Project - Free Software Foundation"
@@ -244,8 +245,15 @@
"пÑоÑлÑÑиваÑÑ Ð·Ð°Ð¿Ð¸Ñи</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Я не Ð²Ð¸Ð¶Ñ Ð¼Ð¾ÑалÑной ÑазниÑÑ Ð¼ÐµÐ¶Ð´Ñ
пÑоÑлÑÑиванием ÑабоÑниками-лÑдÑми и "
Index: malware-google.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de-diff.html,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- malware-google.de-diff.html 13 Sep 2019 12:31:16 -0000 1.38
+++ malware-google.de-diff.html 18 Sep 2019 16:01:41 -0000 1.39
@@ -483,18 +483,18 @@
</li>
<span class="removed"><del><strong><li><p>Spyware is present in
some Android devices when they are sold.
- Some Motorola phones modify Android to</strong></del></span>
+ Some Motorola phones modify Android to
+ <a
href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html"></strong></del></span>
<span class="inserted"><ins><em><li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send <a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
- data about the user</a>.</p>
+ <p id="nest-thermometers">Nest thermometers</em></ins></span> send
<span class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em><a
+ href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot
of</em></ins></span>
+ data <span class="removed"><del><strong>to
Motorola</a>.</p></strong></del></span> <span
class="inserted"><ins><em>about the user</a>.</p>
</li>
<li id="M201308040">
- <p>Google Chrome</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html">
- send personal data to Motorola</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
+ <p>Google Chrome <a
+ href="https://www.brad-x.com/2013/08/04/google-chrome-is-spyware/">
spies on browser history, affiliations</a>, and other installed
software.</p></em></ins></span>
</li>
@@ -506,7 +506,8 @@
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
+ and <span class="removed"><del><strong>laptops</a>.
+ (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
@@ -673,7 +674,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/13 12:31:16 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-google.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.de.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- malware-google.de.po 13 Sep 2019 12:31:17 -0000 1.53
+++ malware-google.de.po 18 Sep 2019 16:01:41 -0000 1.54
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-google.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-05-07 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -861,7 +861,13 @@
"Software aus."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
#, fuzzy
#| msgid ""
#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
@@ -876,9 +882,9 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"Spionageprogramme in Android-Telefonen (und âWindows-Laptopsâ?): Die "
"amerikanische Tageszeitung <span xml:lang=\"en\" lang=\"en\">The Wall Street "
Index: malware-google.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.es.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- malware-google.es.po 15 Sep 2019 21:06:07 -0000 1.35
+++ malware-google.es.po 18 Sep 2019 16:01:41 -0000 1.36
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-13 10:33-0400\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2\n"
@@ -787,14 +788,30 @@
"software instalado."
#. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"Software espÃa en teléfonos Android (¿y en portátiles con Windows?): The "
"Wall Street Journal (en un artÃculo al que solo se puede acceder previo "
Index: malware-google.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.fr.po,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- malware-google.fr.po 15 Sep 2019 12:48:10 -0000 1.93
+++ malware-google.fr.po 18 Sep 2019 16:01:41 -0000 1.94
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-13 14:48+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -790,14 +791,30 @@
"autres logiciels installés."
#. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"Des logiciels espions dans les téléphones Android et les ordinateurs "
"portables (sous Windows ?) : le <cite>Wall Street Journal</cite> (dans un "
Index: malware-google.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.pot,v
retrieving revision 1.49
retrieving revision 1.50
diff -u -b -r1.49 -r1.50
--- malware-google.pot 13 Sep 2019 12:31:18 -0000 1.49
+++ malware-google.pot 18 Sep 2019 16:01:41 -0000 1.50
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -543,7 +543,7 @@
"(in an article blocked from us by a paywall) reports that <a "
"href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
"
"the FBI can remotely activate the GPS and microphone in Android phones and "
-"laptops</a>. (I suspect this means Windows laptops.) Here is <a "
+"laptops</a> (presumably Windows laptops). Here is <a "
"href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>."
msgstr ""
Index: malware-google.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-google.ru.po,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- malware-google.ru.po 13 Sep 2019 17:28:51 -0000 1.107
+++ malware-google.ru.po 18 Sep 2019 16:01:41 -0000 1.108
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-google.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-10-05 09:03+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -785,14 +786,30 @@
"a> и за дÑÑгими ÑÑÑановленнÑми
пÑогÑаммами."
#. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"ШпионÑкие пÑогÑÐ°Ð¼Ð¼Ñ Ð² ÑелеÑонаÑ
Android (и
поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
[Ñ "
"Windows?]): “Уолл-ÑÑÑÐ¸Ñ Ð´Ð¶Ð¾Ñнел” (в
ÑÑаÑÑе, закÑÑÑой Ð¾Ñ Ð½Ð°Ñ "
Index: malware-microsoft.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-microsoft.de-diff.html 11 Sep 2019 08:31:52 -0000 1.45
+++ malware-microsoft.de-diff.html 18 Sep 2019 16:01:41 -0000 1.46
@@ -585,7 +585,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -926,7 +926,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/11 08:31:52 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.de.po,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- malware-microsoft.de.po 11 Sep 2019 08:31:52 -0000 1.141
+++ malware-microsoft.de.po 18 Sep 2019 16:01:41 -0000 1.142
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -896,7 +896,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: malware-microsoft.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.es.po,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- malware-microsoft.es.po 15 Sep 2019 21:06:07 -0000 1.155
+++ malware-microsoft.es.po 18 Sep 2019 16:01:41 -0000 1.156
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
#. type: Content of: <title>
@@ -770,8 +771,15 @@
"grabaciones</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Desde el punto de vista moral no veo ninguna diferencia entre tener "
Index: malware-microsoft.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.fr.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- malware-microsoft.fr.po 11 Sep 2019 09:34:19 -0000 1.175
+++ malware-microsoft.fr.po 18 Sep 2019 16:01:41 -0000 1.176
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-11 11:32+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -768,8 +769,15 @@
"d'écouter les enregistrements</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Du point de vue éthique, je ne vois aucune différence entre l'écoute par
des "
Index: malware-microsoft.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- malware-microsoft.it-diff.html 11 Sep 2019 08:31:52 -0000 1.45
+++ malware-microsoft.it-diff.html 18 Sep 2019 16:01:41 -0000 1.46
@@ -440,7 +440,7 @@
<li id="M201606270">
<p id="windows10-forcing">In its efforts to trick users of Windows
7 and 8 into installing all-spying Windows 10 against their
- will, Microsoft forced their computers to <a
+ will,</em></ins></span> Microsoft <span class="inserted"><ins><em>forced
their computers to <a
href="https://www.theguardian.com/technology/2015/sep/11/microsoft-downloading-windows-1">
silently download… the whole of Windows 10</a>! Apparently,
this was done through a <a
@@ -471,7 +471,7 @@
for its USB-to-serial chips has been designed to <a
href="http://arstechnica.com/information-technology/2014/10/windows-update-drivers-bricking-usb-serial-chips-beloved-of-hardware-hackers/">sabotage
alternative compatible chips</a>
- so that they no longer work.</em></ins></span> Microsoft <span
class="inserted"><ins><em>is <a
+ so that they no longer work. Microsoft is <a
href="http://it.slashdot.org/story/16/01/31/1720259/ftdi-driver-breaks-hardware-again">installing
this automatically</a> as an “upgrade”.</p>
</li>
@@ -522,10 +522,10 @@
<li>In order to increase Windows 10's install base, Microsoft
<a
href="https://www.eff.org/deeplinks/2016/08/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive">
-blatantly disregards user choice and privacy</a>.
-</li>
+blatantly disregards user choice and privacy</a>.</strong></del></span>
<span class="inserted"><ins><em>them.</p></em></ins></span>
+ </li>
-<li><p>Microsoft has
+<span class="removed"><del><strong><li><p>Microsoft has
started <a
href="https://www.theguardian.com/technology/2016/jul/04/microsoft-windows-10-full-screen-upgrade-notification-pop-up-reminder">nagging
users obnoxiously and repeatedly to install Windows
10</a>.</p></li>
@@ -536,10 +536,9 @@
href="https://web.archive.org/web/20160522062607/http://www.theregister.co.uk/2016/03/17/microsoft_windows_10_upgrade_gwx_vs_humanity/">
into replacing Windows 7 with Windows 10</a>.</p></li>
- <li><p>Microsoft has made companies' Windows machines managed
by</strong></del></span> <span class="inserted"><ins><em>them.</p>
- </li>
+ <li><p>Microsoft has made companies' Windows machines managed
by</strong></del></span>
- <li id="M201306220">
+ <span class="inserted"><ins><em><li id="M201306220">
<p><a
href="https://web.archive.org/web/20130622044225/http://blogs.computerworlduk.com/open-enterprise/2013/06/how-can-any-company-ever-trust-microsoft-again/index.htm">Microsoft
informs</em></ins></span> the
@@ -573,7 +572,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -914,7 +913,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/11 08:31:52 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.it.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- malware-microsoft.it.po 11 Sep 2019 08:31:53 -0000 1.147
+++ malware-microsoft.it.po 18 Sep 2019 16:01:41 -0000 1.148
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:06+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -847,7 +847,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: malware-microsoft.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja-diff.html,v
retrieving revision 1.57
retrieving revision 1.58
diff -u -b -r1.57 -r1.58
--- malware-microsoft.ja-diff.html 11 Sep 2019 08:31:53 -0000 1.57
+++ malware-microsoft.ja-diff.html 18 Sep 2019 16:01:41 -0000 1.58
@@ -548,7 +548,7 @@
<span
class="inserted"><ins><em>href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -893,7 +893,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/11 08:31:53 $
+$Date: 2019/09/18 16:01:41 $
<!-- timestamp end -->
</p>
</div>
Index: malware-microsoft.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ja.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- malware-microsoft.ja.po 11 Sep 2019 08:31:53 -0000 1.124
+++ malware-microsoft.ja.po 18 Sep 2019 16:01:42 -0000 1.125
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:57+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -697,7 +697,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: malware-microsoft.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.pot,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-microsoft.pot 11 Sep 2019 08:31:53 -0000 1.85
+++ malware-microsoft.pot 18 Sep 2019 16:01:42 -0000 1.86
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -520,7 +520,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: malware-microsoft.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-microsoft.ru.po,v
retrieving revision 1.217
retrieving revision 1.218
diff -u -b -r1.217 -r1.218
--- malware-microsoft.ru.po 11 Sep 2019 14:29:06 -0000 1.217
+++ malware-microsoft.ru.po 18 Sep 2019 16:01:42 -0000 1.218
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-microsoft.html\n"
-"POT-Creation-Date: 2019-09-11 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-11-20 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid ""
@@ -764,8 +765,15 @@
"пÑоÑлÑÑиваÑÑ Ð·Ð°Ð¿Ð¸Ñи</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Я не Ð²Ð¸Ð¶Ñ Ð¼Ð¾ÑалÑной ÑазниÑÑ Ð¼ÐµÐ¶Ð´Ñ
пÑоÑлÑÑиванием ÑабоÑниками-лÑдÑми и "
Index: malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- malware-mobiles.de-diff.html 18 Sep 2019 10:02:31 -0000 1.65
+++ malware-mobiles.de-diff.html 18 Sep 2019 16:01:42 -0000 1.66
@@ -681,7 +681,7 @@
being sued, demanding that it notify the users of what it will do
with the data.</p>
- <p>I think that lawsuit is about a side issue. What the company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
@@ -726,8 +726,8 @@
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
@@ -1423,7 +1423,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- malware-mobiles.de.po 18 Sep 2019 10:02:31 -0000 1.122
+++ malware-mobiles.de.po 18 Sep 2019 16:01:42 -0000 1.123
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1081,7 +1081,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -1143,9 +1143,15 @@
msgstr "Das macht sie zu Spionen bei der Durchsetzung von Lizenzen."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Ich [RMS] erwarte, dass es auch DRM umsetzt ‑ dass es keine "
"Möglichkeit gibt, eine Aufzeichnung zu speichern. Dem Artikel nach kann man "
Index: malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.147
retrieving revision 1.148
diff -u -b -r1.147 -r1.148
--- malware-mobiles.es.po 18 Sep 2019 10:02:31 -0000 1.147
+++ malware-mobiles.es.po 18 Sep 2019 16:01:42 -0000 1.148
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -1070,8 +1070,16 @@
"que se le exige que notifique a los usuarios qué va a hacer con los datos."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -1161,9 +1169,15 @@
"de las licencias."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Supongo que también implementa el DRM, que no hay manera de guardar una "
"grabación, aunque no puedo estar seguro a partir de lo que dice el
artÃculo."
Index: malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- malware-mobiles.fr.po 18 Sep 2019 10:48:29 -0000 1.172
+++ malware-mobiles.fr.po 18 Sep 2019 16:01:42 -0000 1.173
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-18 12:48+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -1077,8 +1078,16 @@
"données."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -1164,9 +1173,15 @@
"Ainsi elle fait office d'espionne au service de l'application des licences."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Je suppose qu'elle implémente aussi la gestion numérique des restrictions
â "
"qu'il n'y a aucun moyen de sauvegarder un enregistrement. Mais je ne peux "
Index: malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-mobiles.it-diff.html 18 Sep 2019 10:02:31 -0000 1.70
+++ malware-mobiles.it-diff.html 18 Sep 2019 16:01:42 -0000 1.71
@@ -713,7 +713,7 @@
being sued, demanding that it notify the users of what it will do
with the data.</p>
- <p>I think that lawsuit is about a side issue. What the company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
@@ -758,8 +758,8 @@
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
@@ -1461,7 +1461,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- malware-mobiles.it.po 18 Sep 2019 10:02:31 -0000 1.122
+++ malware-mobiles.it.po 18 Sep 2019 16:01:42 -0000 1.123
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1032,7 +1032,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -1092,8 +1092,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.86
retrieving revision 1.87
diff -u -b -r1.86 -r1.87
--- malware-mobiles.ja-diff.html 18 Sep 2019 10:02:31 -0000 1.86
+++ malware-mobiles.ja-diff.html 18 Sep 2019 16:01:42 -0000 1.87
@@ -674,7 +674,7 @@
being sued, demanding that it notify the users of what it will do
with the data.</p>
- <p>I think that lawsuit is about a side issue. What the company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
@@ -719,8 +719,8 @@
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
@@ -1304,7 +1304,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.112
retrieving revision 1.113
diff -u -b -r1.112 -r1.113
--- malware-mobiles.ja.po 18 Sep 2019 10:02:31 -0000 1.112
+++ malware-mobiles.ja.po 18 Sep 2019 16:01:42 -0000 1.113
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -830,7 +830,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -890,8 +890,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-mobiles.pot 18 Sep 2019 10:02:31 -0000 1.88
+++ malware-mobiles.pot 18 Sep 2019 16:01:42 -0000 1.89
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -711,7 +711,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -772,8 +772,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
Index: malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.206
retrieving revision 1.207
diff -u -b -r1.206 -r1.207
--- malware-mobiles.ru.po 18 Sep 2019 14:29:41 -0000 1.206
+++ malware-mobiles.ru.po 18 Sep 2019 16:01:42 -0000 1.207
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -1058,8 +1059,16 @@
"делаÑÑ Ñ ÑÑими даннÑми."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -1146,9 +1155,15 @@
msgstr "Таким обÑазом, они ÑпионÑÑ Ð²
лиÑензионнÑÑ
ÑелÑÑ
."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Я не ÑдивлÑÑÑ, еÑли в нем Ñеализовано и
ÑиÑÑовое ÑпÑавление "
"огÑаниÑениÑми — Ñ.е. ÑоÑ
ÑаниÑÑ
запиÑÑ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾. Ðо из ÑÑаÑÑи "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- nl.po 18 Sep 2019 10:02:31 -0000 1.143
+++ nl.po 18 Sep 2019 16:01:42 -0000 1.144
@@ -492,10 +492,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2098,7 +2098,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -3174,13 +3174,13 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3371,7 +3371,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
@@ -4152,9 +4152,9 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -5542,7 +5542,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -5602,8 +5602,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- pl.po 18 Sep 2019 10:02:31 -0000 1.142
+++ pl.po 18 Sep 2019 16:01:42 -0000 1.143
@@ -436,10 +436,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1634,7 +1634,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -2709,13 +2709,13 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2905,7 +2905,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
@@ -3600,9 +3600,9 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -4873,7 +4873,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -4933,8 +4933,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.141
retrieving revision 1.142
diff -u -b -r1.141 -r1.142
--- pot 18 Sep 2019 10:02:31 -0000 1.141
+++ pot 18 Sep 2019 16:01:42 -0000 1.142
@@ -381,10 +381,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1482,7 +1482,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -2539,13 +2539,13 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2726,7 +2726,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
@@ -3410,9 +3410,9 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -4665,7 +4665,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -4725,8 +4725,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-insecurity.de-diff.html 13 Sep 2019 12:31:18 -0000 1.32
+++ proprietary-insecurity.de-diff.html 18 Sep 2019 16:01:42 -0000 1.33
@@ -140,25 +140,26 @@
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow them access to locations</a>.</p>
- <p>This involves an apparently unintentional weakness in Android,
+ <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>many
Internet</strong></del></span> <span class="inserted"><ins><em>Android,
exploited intentionally by malicious apps.</p>
</li>
<li id="M201905150">
- <p>Users caught in the jail of an iMonster are <a
- href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
+ <p>Users caught in the jail</em></ins></span> of <span
class="removed"><del><strong>Stings devices
+ allows</strong></del></span> <span class="inserted"><ins><em>an iMonster
are</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/05/15/brittle-security.html">
sitting
ducks for other attackers</a>, and the app censorship prevents
security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable even if it didn't lead to security threats as well.</p>
+ inexcusable even if it didn't lead</em></ins></span> to <span
class="removed"><del><strong>snoop on</strong></del></span> <span
class="inserted"><ins><em>security threats as well.</p>
</li>
<li id="M201903210">
<p>The Medtronics Conexus Telemetry Protocol has <a
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
- defibrillators</a> and the devices they connect to.</p>
+ defibrillators</a> and</em></ins></span> the <span
class="removed"><del><strong>people</strong></del></span> <span
class="inserted"><ins><em>devices they connect to.</p>
<p>This protocol has been around since 2006, and similar
vulnerabilities were discovered in an earlier Medtronics communication
@@ -168,13 +169,15 @@
</li>
<li id="M201902270">
- <p>The Ring (now Amazon) doorbell camera is designed so that the
- manufacturer (now Amazon) can watch all the time. Now it turns out
+ <p>The Ring (now Amazon) doorbell camera is designed
so</em></ins></span> that <span class="removed"><del><strong>use
them</a>.</p>
+ <p>Don't be a sucker—reject</strong></del></span> <span
class="inserted"><ins><em>the
+ manufacturer (now Amazon) can watch</em></ins></span> all the <span
class="removed"><del><strong>stings.</p>
+ <p>It</strong></del></span> <span class="inserted"><ins><em>time. Now
it turns out
that <a
href="https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
anyone else can also watch, and fake videos too</a>.</p>
- <p>The third party vulnerability is presumably
- unintentional and I suppose Amazon will fix it. I
+ <p>The third party vulnerability</em></ins></span> is <span
class="removed"><del><strong>unfortunate</strong></del></span> <span
class="inserted"><ins><em>presumably
+ unintentional and Amazon will probably fix it. However, we
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -183,36 +186,45 @@
<li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
+ hide voice commands in other audio</a>, so</em></ins></span> that
<span class="inserted"><ins><em>people cannot hear
them, but Alexa and Siri can.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
+ <p>Crackers found a way to break</em></ins></span> the <span
class="removed"><del><strong>article uses</strong></del></span> <span
class="inserted"><ins><em>security of an Amazon device,
and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
<p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
+ easier for Amazon. And if some government such as China
or</em></ins></span> the <span
class="removed"><del><strong>term</strong></del></span> <span
class="inserted"><ins><em>US
told Amazon to do this, or cease to sell the product in that country,
do you think Amazon would have the moral fiber to say no?</p>
- <p>These crackers are probably hackers too, but please <a
- href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.</p>
+ <p>These crackers are probably hackers too, but
please</em></ins></span> <a
+ <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize">
+ “monetize”</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://stallman.org/articles/on-hacking.html">
don't use
+ “hacking” to mean “breaking
security”</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li id="M201807100">
+ <span class="inserted"><ins><em><li id="M201807100"></em></ins></span>
<p>Siri, Alexa, and all the other voice-control systems can be <a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
</li>
- <li id="M201807020">
+ <li <span class="removed"><del><strong>id="break-security-smarttv">
+ <p><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found a way to break security on a “smart”
TV</a> and use its camera</strong></del></span> <span
class="inserted"><ins><em>id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
- photos to people in the owner's contact list</a>.</p>
+ photos</em></ins></span> to <span class="removed"><del><strong>watch
the</strong></del></span> people <span class="removed"><del><strong>who are
watching TV.</p>
+</li>
+<li>
+ <p>Many models</strong></del></span> <span
class="inserted"><ins><em>in the owner's contact list</a>.</p>
</li>
<li id="M201712240">
@@ -256,51 +268,72 @@
</li>
<li id="M201708280">
- <p>The bad security</em></ins></span> in many Internet of Stings
devices allows <a
+ <p>The bad security in many Internet of Stings devices allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
to snoop on the people that use them</a>.</p>
<p>Don't be a sucker—reject all the stings.</p>
<p>It is unfortunate that the article uses the term <a
- <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize">
- “monetize”</a>.</p>
-</li>
-<li>
- <p>Siri, Alexa, and all the other voice-control systems can be
- <a
-href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
- hijacked by programs that play commands in ultrasound that humans can't
- hear</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p></em></ins></span>
+
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
- <li <span class="removed"><del><strong>id="break-security-smarttv">
- <p><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a> and use its camera
- to watch the people who are watching TV.</p>
-</li>
-<li></strong></del></span> <span
class="inserted"><ins><em>id="M201706200.1"></em></ins></span>
- <p>Many models of Internet-connected cameras <a
+ <li id="M201706200.1">
+ <p>Many models</em></ins></span> of Internet-connected cameras <a
href="/proprietary/proprietary-back-doors.html#InternetCameraBackDoor">
have backdoors</a>.</p>
<p>That is a malicious functionality, but in addition it
- is <span class="removed"><del><strong>a gross
- insecurity since anyone, including malicious crackers,</strong></del></span>
<span class="inserted"><ins><em>a gross insecurity since anyone, including
malicious crackers, <a
+ is a gross insecurity since anyone, including malicious crackers, <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into users'
cameras</a>.</p>
</li>
- <li id="M201706050">
+<span class="removed"><del><strong><li>
+ <p>
+ Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
+ pre-installed on 28 models of HP laptops logged the user's
+ keystroke to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706050">
<p id="intel-me-10-year-vulnerability">Intel's
- CPU backdoor—the Intel Management Engine—had a <a
+ CPU backdoor—the Intel Management Engine—had</em></ins></span>
a <span class="removed"><del><strong>file in the filesystem. Any process with
access</strong></del></span> <span class="inserted"><ins><em><a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security vulnerability for 10 years</a>.</p>
- <p>The vulnerability allowed a cracker to access
- the computer's Intel Active Management Technology (AMT) <a
+ <p>The vulnerability allowed a cracker</em></ins></span> to
+ <span class="removed"><del><strong>the filesystem or the MapViewOfFile API
could gain</strong></del></span> access <span
class="removed"><del><strong>to</strong></del></span>
+ the
+ <span class="removed"><del><strong>log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
+ to modzero</a> the “information-leak via Covert Storage
+ Channel enables malware authors to capture keystrokes without
+ taking the risk of being classified as malicious task by AV
+ heuristics”.
+ </p>
+</li>
+<li>
+<p>The proprietary code that runs pacemakers, insulin pumps, and other
+medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross security faults</a>.</p>
+</li>
+
+
+<li>
+ <p>Exploits of bugs in Windows, which were developed by the NSA
+ and then leaked by the Shadowbrokers group, are now being used to
+ <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
a great number
+ of Windows computers with ransomware</a>.
+ </p>
+</li>
+
+<li id="intel-me-10-year-vulnerability">
+ <p>Intel's CPU backdoor—the Intel Management Engine—had a
+ <a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
+ vulnerability for 10 years</a>.</p>
+
+ <p>The vulnerability allowed a cracker to access the computer's Intel
Active
+ Management Technology
+ (AMT)</strong></del></span> <span class="inserted"><ins><em>computer's
Intel Active Management Technology (AMT)</em></ins></span> <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
web interface with an empty password and gave administrative
access</a> to access the computer's keyboard, mouse, monitor among
@@ -312,67 +345,34 @@
besides using machines that don't come with the backdoor.</p>
</li>
- <li id="M201705250">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705250">
<p>The proprietary code that runs pacemakers,
- insulin pumps, and other medical devices is</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them to get into
- users' cameras</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full of gross
- security faults</a>.</p></em></ins></span>
+ insulin pumps, and other medical devices is <a
+ href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
+ security faults</a>.</p>
</li>
-<span class="removed"><del><strong><li>
- <p>
- Conexant</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705160">
- <p>Conexant</em></ins></span> HD Audio Driver Package (version
1.0.0.46 and earlier)
+ <li id="M201705160">
+ <p>Conexant HD Audio Driver Package (version 1.0.0.46 and earlier)
pre-installed on 28 models of HP laptops logged the user's keystroke
to a file in the filesystem. Any process with access to the filesystem
or the MapViewOfFile API could gain access to the log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
to modzero</a> the “information-leak via Covert Storage Channel
enables malware authors to capture keystrokes without taking the risk
- of being classified as malicious task by AV
- <span class="removed"><del><strong>heuristics”.
- </p>
-</li>
-<li>
-<p>The proprietary code that runs pacemakers, insulin pumps, and other
-medical devices is <a
href="http://www.bbc.co.uk/news/technology-40042584">
-full of gross security faults</a>.</p></strong></del></span> <span
class="inserted"><ins><em>heuristics”.</p></em></ins></span>
+ of being classified as malicious task by AV heuristics”.</p>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201705120"></em></ins></span>
+ <li id="M201705120">
<p>Exploits of bugs in Windows, which were developed by the NSA
and then leaked by the Shadowbrokers group, are now being used to <a
href="https://theintercept.com/2017/05/12/the-nsas-lost-digital-weapon-is-helping-hijack-computers-around-the-world/">attack
- a great number of Windows computers with <span
class="removed"><del><strong>ransomware</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>ransomware</a>.</p></em></ins></span>
+ a great number of Windows computers with ransomware</a>.</p>
</li>
- <li <span
class="removed"><del><strong>id="intel-me-10-year-vulnerability">
- <p>Intel's CPU backdoor—the Intel Management Engine—had a
- <a
href="https://arstechnica.com/security/2017/05/intel-patches-remote-code-execution-bug-that-lurked-in-cpus-for-10-years/">major
security
- vulnerability for 10 years</a>.</p>
-
- <p>The vulnerability allowed a cracker to access the computer's Intel
Active
- Management Technology
- (AMT) <a
href="https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/">
- web interface with an empty password and gave administrative
- access</a> to access the computer's keyboard, mouse, monitor
- among other privileges.</p>
-
- <p>It does not help that in newer Intel processors, it is
impossible
- to turn off the Intel Management Engine. Thus, even users who are
- proactive about their security can do nothing to protect themselves
- besides using machines that don't come with the backdoor.</p>
-
-</li>
-
-<li></strong></del></span> <span
class="inserted"><ins><em>id="M201704050"></em></ins></span>
+ <li id="M201704050"></em></ins></span>
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
@@ -385,9 +385,7 @@
<p>When Miele's Internet of
Stings hospital disinfectant dishwasher is <a
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to the <span class="removed"><del><strong>Internet, its security
is crap</a>.</p>
-
-<p>For example,</strong></del></span> <span
class="inserted"><ins><em>Internet, its security is crap</a>.</p>
+ connected to the Internet, its security is crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
filesystem, infect it with malware, and force the dishwasher to launch
@@ -395,9 +393,12 @@
used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
</li>
+<span class="removed"><del><strong><li><p>WhatsApp
has</strong></del></span>
- <li id="M201702200">
- <p>If you buy a used “smart”
+ <span class="inserted"><ins><em><li id="M201702200">
+ <p>If you buy</em></ins></span> a <span
class="removed"><del><strong>feature that
+ <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
+ has been described</strong></del></span> <span
class="inserted"><ins><em>used “smart”
car, house, TV, refrigerator, etc., usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
previous owners can still remotely control it</a>.</p>
@@ -408,20 +409,17 @@
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
- <p>This is in addition to the fact that the car
contains</em></ins></span> a <span class="removed"><del><strong>cracker can
gain access to</strong></del></span> <span class="inserted"><ins><em>cellular
- modem that tells big brother all</em></ins></span> the <span
class="removed"><del><strong>dishwasher's filesystem,
-infect</strong></del></span> <span class="inserted"><ins><em>time
where</em></ins></span> it <span class="removed"><del><strong>with malware, and
force</strong></del></span> <span class="inserted"><ins><em>is. If you own
- such a car, it would be wise to disconnect</em></ins></span> the <span
class="removed"><del><strong>dishwasher</strong></del></span> <span
class="inserted"><ins><em>modem so as</em></ins></span> to <span
class="removed"><del><strong>launch attacks on other
-devices in</strong></del></span> <span class="inserted"><ins><em>turn
- off</em></ins></span> the <span class="removed"><del><strong>network.
Since these dishwashers</strong></del></span> <span
class="inserted"><ins><em>tracking.</p>
+ <p>This is in addition to the fact that the car contains a cellular
+ modem that tells big brother all the time where it is. If you own
+ such a car, it would be wise to disconnect the modem so as to turn
+ off the tracking.</p>
</li>
<li id="M201701271">
<p>A cracker would be able to <a
href="https://uploadvr.com/hackable-webcam-oculus-sensor-be-aware/">
turn the Oculus Rift sensors into spy cameras</a> after breaking into
- the computer they</em></ins></span> are <span
class="removed"><del><strong>used in hospitals, such
-attacks could potentially put hundreds of lives at
risk.</p></strong></del></span> <span class="inserted"><ins><em>connected
to.</p>
+ the computer they are connected to.</p>
<p>Unfortunately, the article <a
href="/philosophy/words-to-avoid.html#Hacker">improperly refers to
crackers
@@ -432,14 +430,13 @@
<p>Samsung phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
- ransomware</a>.</p></em></ins></span>
+ ransomware</a>.</p>
</li>
-<span
class="removed"><del><strong><li><p>WhatsApp</strong></del></span>
- <span class="inserted"><ins><em><li id="M201701130">
- <p>WhatsApp</em></ins></span> has a feature that <a
+ <li id="M201701130">
+ <p>WhatsApp has a feature that <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
- has been described as a “back door”</a> because it would
+ has been described</em></ins></span> as a “back
door”</a> because it would
enable governments to nullify its encryption.</p>
<p>The developers say that it wasn't intended as a back door, and
that
@@ -553,22 +550,20 @@
<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201606290"></em></ins></span>
- <p>Antivirus programs have so many errors that <a <span
class="removed"><del><strong>href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
- may make security worse</a>.</p>
-<p>GNU/Linux does not need antivirus software.</p>
-</li>
-
-<li>
-<p>Over 70 brands of network-connected surveillance
-cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
-security bugs that allow anyone to watch through
them</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
+ <p>Antivirus programs have so many errors that <a
+
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
may make security worse</a>.</p>
- <p>GNU/Linux does not need antivirus
software.</p></em></ins></span>
+ <p>GNU/Linux does not need antivirus software.</p>
</li>
<span class="removed"><del><strong><li>
+<p>Over 70 brands of network-connected surveillance
+cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
+security bugs that allow anyone to watch through them</a>.</p>
+</li>
+
+<li>
<p>
Samsung's</strong></del></span>
@@ -690,24 +685,22 @@
<span class="inserted"><ins><em><li id="M201510200">
<p>“Self-encrypting”</em></ins></span> disk drives
do the encryption with proprietary firmware so you
- can't trust it. Western Digital's <span
class="removed"><del><strong>“My Passport”
-drives
-<a
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
-</p>
-</li>
+ can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
Mac OS X had an
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p></strong></del></span> <span class="inserted"><ins><em>“My
Passport” drives <a
-
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
- have a back door</a>.</p></em></ins></span>
- </li>
+</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<li></strong></del></span>
<span class="inserted"><ins><em><li id="M201508120"></em></ins></span>
<p>Security researchers discovered a <a
@@ -733,13 +726,13 @@
<p>
I</strong></del></span> <span class="inserted"><ins><em>more.</p>
- <p>I</em></ins></span> expect that Chrysler and the NSA can do this
<span class="removed"><del><strong>too.
+ <p>We</em></ins></span> expect that Chrysler and the NSA can do this
<span class="removed"><del><strong>too.
</p>
<p>
-If</strong></del></span> <span class="inserted"><ins><em>too.</p>
+If I ever</strong></del></span> <span class="inserted"><ins><em>too.</p>
- <p>If</em></ins></span> I ever own a car, and it contains a portable
phone, I will
- deactivate <span class="removed"><del><strong>that.
+ <p>If you</em></ins></span> own a <span
class="removed"><del><strong>car, and it</strong></del></span> <span
class="inserted"><ins><em>car that</em></ins></span> contains a <span
class="removed"><del><strong>portable phone, I will
+deactivate that.
</p>
</li>
@@ -750,12 +743,13 @@
“<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
secure IP device I've ever seen</a>”
-by a security researcher.
+by</strong></del></span> <span class="inserted"><ins><em>phone modem, it would
be</em></ins></span> a <span class="removed"><del><strong>security researcher.
</p>
<p>
Depending on what drug is being infused, the insecurity could
-open the door to murder.
-</p></strong></del></span> <span
class="inserted"><ins><em>that.</p></em></ins></span>
+open the door</strong></del></span> <span class="inserted"><ins><em>good
+ idea</em></ins></span> to <span class="removed"><del><strong>murder.
+</p></strong></del></span> <span class="inserted"><ins><em>deactivate
this.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -1059,7 +1053,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/13 12:31:18 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary-insecurity.de.po 13 Sep 2019 12:31:18 -0000 1.135
+++ proprietary-insecurity.de.po 18 Sep 2019 16:01:42 -0000 1.136
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -223,10 +223,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1068,15 +1068,25 @@
"\"tn01-ref\" class=\"transnote\">[1]</a>"
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "<ins>Vorstellbar wäre</ins>, dass Chrysler und NSA dies auch können."
# Note: Author-related, self-centered, is rather uncommon in Germany without
# attribution; therefore more generalized.
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"<ins>Wäre ein Fahrzeug serienmäÃig mit âInfotainmentsystemâ
ausgestattet, "
"sollte es besser grundsätzlich deaktiviert werden.</ins>"
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-insecurity.es.po 15 Sep 2019 21:06:07 -0000 1.13
+++ proprietary-insecurity.es.po 18 Sep 2019 16:01:42 -0000 1.14
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-13 10:37-0400\n"
"Last-Translator: Dora Scilipoti\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2\n"
@@ -238,11 +239,22 @@
"a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"Es de suponer que la vulnerabilidad a terceros no es intencionada, e imagino "
"que Amazon lo solucionará. Pero no cuento con que Amazon cambie el diseño "
@@ -949,13 +961,23 @@
"o desactivar los frenos, entre otras cosas."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "Es de suponer que Chrysler y la NSA también pueden hacerlo."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"Si se posee un automóvil que contiene un teléfono móvil, hay que "
"desactivarlo."
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.178
retrieving revision 1.179
diff -u -b -r1.178 -r1.179
--- proprietary-insecurity.fr.po 15 Sep 2019 12:48:10 -0000 1.178
+++ proprietary-insecurity.fr.po 18 Sep 2019 16:01:42 -0000 1.179
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-13 14:48+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -238,11 +239,22 @@
"peut en faire autant, et peut également falsifier les vidéos</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"Une vulnérabilité à des attaques de tiers est vraisemblablement
involontaire "
"et je suppose qu'Amazon la corrigera. Cependant je ne m'attends pas à ce "
@@ -951,13 +963,23 @@
"activer et désactiver les freins, et plus encore."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "J'imagine que Chrysler et la NSA peuvent faire de même."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"Si un jour je possède une voiture et qu'elle contient un téléphone
portable, "
"je le désactiverai."
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.47
retrieving revision 1.48
diff -u -b -r1.47 -r1.48
--- proprietary-insecurity.it-diff.html 13 Sep 2019 12:31:18 -0000 1.47
+++ proprietary-insecurity.it-diff.html 18 Sep 2019 16:01:42 -0000 1.48
@@ -172,7 +172,7 @@
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
- unintentional and I suppose Amazon will fix it. I
+ unintentional and Amazon will probably fix it. However, we
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -336,9 +336,8 @@
<span class="inserted"><ins><em><li id="M201703270"></em></ins></span>
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is
-<span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
<span class="inserted"><ins><em><a
-
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
+ Stings hospital disinfectant dishwasher is <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
connected to the Internet, its security is crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
@@ -511,14 +510,15 @@
<span class="inserted"><ins><em><li id="M201606290"></em></ins></span>
<p>Antivirus programs have so many errors that <a
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
- may <span class="removed"><del><strong>make security
worse</a>.</p>
+ <span class="removed"><del><strong>may make security
worse</a>.</p>
<p>GNU/Linux does not need antivirus software.</p>
</li>
<li>
<p>Over 70 brands of network-connected surveillance
cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
-security bugs that allow anyone to watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>make security worse</a>.</p>
+security bugs that allow anyone to watch through
them</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>may make security
worse</a>.</p>
<p>GNU/Linux does not need antivirus
software.</p></em></ins></span>
</li>
@@ -645,9 +645,9 @@
<span class="inserted"><ins><em><li id="M201510200">
<p>“Self-encrypting”</em></ins></span> disk drives
do the encryption with proprietary firmware so you
- can't trust it. <span class="removed"><del><strong>Western Digital's
“My Passport”
-drives
-<a
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
+ can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
</p>
</li>
@@ -657,9 +657,7 @@
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p></strong></del></span> <span class="inserted"><ins><em>Western
Digital's “My Passport” drives <a
-
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
- have a back door</a>.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -688,13 +686,13 @@
<p>
I</strong></del></span> <span class="inserted"><ins><em>more.</p>
- <p>I</em></ins></span> expect that Chrysler and the NSA can do this
<span class="removed"><del><strong>too.
+ <p>We</em></ins></span> expect that Chrysler and the NSA can do this
<span class="removed"><del><strong>too.
</p>
<p>
-If</strong></del></span> <span class="inserted"><ins><em>too.</p>
+If I ever</strong></del></span> <span class="inserted"><ins><em>too.</p>
- <p>If</em></ins></span> I ever own a car, and it contains a portable
phone, I will
- deactivate <span class="removed"><del><strong>that.
+ <p>If you</em></ins></span> own a <span
class="removed"><del><strong>car, and it</strong></del></span> <span
class="inserted"><ins><em>car that</em></ins></span> contains a <span
class="removed"><del><strong>portable phone, I will
+deactivate that.
</p>
</li>
@@ -705,12 +703,13 @@
“<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
secure IP device I've ever seen</a>”
-by a security researcher.
+by</strong></del></span> <span class="inserted"><ins><em>phone modem, it would
be</em></ins></span> a <span class="removed"><del><strong>security researcher.
</p>
<p>
Depending on what drug is being infused, the insecurity could
-open the door to murder.
-</p></strong></del></span> <span
class="inserted"><ins><em>that.</p></em></ins></span>
+open the door</strong></del></span> <span class="inserted"><ins><em>good
+ idea</em></ins></span> to <span class="removed"><del><strong>murder.
+</p></strong></del></span> <span class="inserted"><ins><em>deactivate
this.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -1014,7 +1013,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/13 12:31:18 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.152
retrieving revision 1.153
diff -u -b -r1.152 -r1.153
--- proprietary-insecurity.it.po 13 Sep 2019 12:31:18 -0000 1.152
+++ proprietary-insecurity.it.po 18 Sep 2019 16:01:42 -0000 1.153
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -216,10 +216,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -991,13 +991,23 @@
"Jeep."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "Si può ipotizzare che anche Chrysler e la NSA possano fare lo stesso."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"Se si possiede un'automobile che contiene tra i suoi componenti un telefono "
"cellulare, è opportuno considerare se disattivarlo."
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.66
retrieving revision 1.67
diff -u -b -r1.66 -r1.67
--- proprietary-insecurity.ja-diff.html 13 Sep 2019 12:31:18 -0000 1.66
+++ proprietary-insecurity.ja-diff.html 18 Sep 2019 16:01:42 -0000 1.67
@@ -172,7 +172,7 @@
anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
- unintentional and I suppose Amazon will fix it. I
+ unintentional and Amazon will probably fix it. However, we
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -454,18 +454,19 @@
<span class="inserted"><ins><em><li id="M201606290"></em></ins></span>
<p>Antivirus programs have so many errors that <a
href="https://theconversation.com/as-more-vulnerabilities-are-discovered-is-it-time-to-uninstall-antivirus-software-61374">they
- may make security worse</a>.</p>
-
- <p>GNU/Linux does not need antivirus software.</p>
- </li>
+ may make security <span
class="removed"><del><strong>worse</a>.</p>
+<p>GNU/Linux does not need antivirus software.</p>
+</li>
-<span class="removed"><del><strong><li>
+<li>
<p>Over 70 brands of network-connected surveillance
cameras <a
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">have
-security bugs that allow anyone to watch through them</a>.</p>
-</li>
+security bugs that allow anyone to watch through
them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>worse</a>.</p>
-<li>
+ <p>GNU/Linux does not need antivirus
software.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
<p>
Samsung's</strong></del></span>
@@ -587,9 +588,9 @@
<span class="inserted"><ins><em><li id="M201510200">
<p>“Self-encrypting”</em></ins></span> disk drives
do the encryption with proprietary firmware so you
- can't trust it. Western Digital's “My <span
class="removed"><del><strong>Passport”
-drives
-<a
href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have
a back door</a>.
+ can't trust it. Western Digital's “My Passport” drives <a
<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">have</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+ have</em></ins></span> a back <span
class="removed"><del><strong>door</a>.
</p>
</li>
@@ -599,9 +600,7 @@
<a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
intentional local back door for 4 years</a>, which could be
exploited by attackers to gain root privileges.
-</p></strong></del></span> <span
class="inserted"><ins><em>Passport” drives <a
-
href="https://motherboard.vice.com/en_us/article/mgbmma/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
- have a back door</a>.</p></em></ins></span>
+</p></strong></del></span> <span
class="inserted"><ins><em>door</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
@@ -630,13 +629,13 @@
<p>
I</strong></del></span> <span class="inserted"><ins><em>more.</p>
- <p>I</em></ins></span> expect that Chrysler and the NSA can do this
<span class="removed"><del><strong>too.
+ <p>We</em></ins></span> expect that Chrysler and the <span
class="removed"><del><strong>NSA can do this too.
</p>
<p>
-If</strong></del></span> <span class="inserted"><ins><em>too.</p>
+If I ever</strong></del></span> <span class="inserted"><ins><em>NSA can do
this too.</p>
- <p>If</em></ins></span> I ever own a car, and it contains a portable
phone, I will
- deactivate <span class="removed"><del><strong>that.
+ <p>If you</em></ins></span> own a <span
class="removed"><del><strong>car, and it</strong></del></span> <span
class="inserted"><ins><em>car that</em></ins></span> contains a <span
class="removed"><del><strong>portable phone, I will
+deactivate that.
</p>
</li>
@@ -647,12 +646,13 @@
“<a
href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">least
secure IP device I've ever seen</a>”
-by a security researcher.
+by</strong></del></span> <span class="inserted"><ins><em>phone modem, it would
be</em></ins></span> a <span class="removed"><del><strong>security researcher.
</p>
<p>
Depending on what drug is being infused, the insecurity could
-open the door to murder.
-</p></strong></del></span> <span
class="inserted"><ins><em>that.</p></em></ins></span>
+open the door</strong></del></span> <span class="inserted"><ins><em>good
+ idea</em></ins></span> to <span class="removed"><del><strong>murder.
+</p></strong></del></span> <span class="inserted"><ins><em>deactivate
this.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -958,7 +958,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/13 12:31:18 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.124
retrieving revision 1.125
diff -u -b -r1.124 -r1.125
--- proprietary-insecurity.ja.po 13 Sep 2019 12:31:18 -0000 1.124
+++ proprietary-insecurity.ja.po 18 Sep 2019 16:01:42 -0000 1.125
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -190,10 +190,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -740,13 +740,19 @@
"ãããããªã©ãªã©ã§ããã®ã§ãã"
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "ã¯ã©ã¤ã¹ã©ã¼ã¨NSAãã§ããã¨ãããã¯èãã¾ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"ãããè»ãæã¤ãªããããã¦ããã«æºå¸¯é»è©±ãã¤ãã¦ãããªãã°ããããã¯ãããæ¢"
"ããã§ãããã"
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.91
retrieving revision 1.92
diff -u -b -r1.91 -r1.92
--- proprietary-insecurity.pot 13 Sep 2019 12:31:18 -0000 1.91
+++ proprietary-insecurity.pot 18 Sep 2019 16:01:42 -0000 1.92
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -162,10 +162,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a "
-"href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon "
-"to watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -627,13 +627,13 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
#. type: Content of: <ul><li><p>
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- proprietary-insecurity.ru.po 13 Sep 2019 17:28:51 -0000 1.229
+++ proprietary-insecurity.ru.po 18 Sep 2019 16:01:42 -0000 1.230
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-12-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -234,11 +235,22 @@
"видеоизобÑажение</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
"полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво "
@@ -932,13 +944,23 @@
"оÑпÑÑкаÑÑ ÑоÑмоза и Ñ.д."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"ÐÑли Ñ Ð¼ÐµÐ½Ñ ÐºÐ¾Ð³Ð´Ð°-нибÑÐ´Ñ Ð±ÑÐ´ÐµÑ Ð¼Ð°Ñина и в
ней бÑÐ´ÐµÑ Ð¼Ð¾Ð±Ð¸Ð»ÑнÑй ÑелеÑон, Ñ ÐµÐ³Ð¾ "
"вÑклÑÑÑ."
Index: proprietary-sabotage.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de-diff.html,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-sabotage.de-diff.html 16 Sep 2019 08:31:28 -0000 1.44
+++ proprietary-sabotage.de-diff.html 18 Sep 2019 16:01:42 -0000 1.45
@@ -169,7 +169,7 @@
the existing trackers stopped working forever</a>.</p>
<p>The article focuses on a further nasty fillip, that sales of the
- broken devices continued. But I think that is a secondary issue;
+ broken devices continued. But we think that is a secondary issue;
it made the nasty consequences extend to some additional people.
The fundamental wrong was to design the devices to depend
on</em></ins></span> something
<span class="removed"><del><strong>worse than</strong></del></span>
@@ -821,7 +821,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/16 08:31:28 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.de.po,v
retrieving revision 1.126
retrieving revision 1.127
diff -u -b -r1.126 -r1.127
--- proprietary-sabotage.de.po 16 Sep 2019 08:31:28 -0000 1.126
+++ proprietary-sabotage.de.po 18 Sep 2019 16:01:42 -0000 1.127
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:40+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -241,9 +241,21 @@
"nutzbar</a>.</ins>"
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-sabotage.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.es.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-sabotage.es.po 16 Sep 2019 09:48:10 -0000 1.15
+++ proprietary-sabotage.es.po 18 Sep 2019 16:01:42 -0000 1.16
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-16 11:45+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -311,9 +312,21 @@
"which\">Todas las pulseras dejaron de funcionar para siempre</a>."
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-sabotage.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.fr.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary-sabotage.fr.po 16 Sep 2019 11:42:11 -0000 1.163
+++ proprietary-sabotage.fr.po 18 Sep 2019 16:01:42 -0000 1.164
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-16 13:39+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -310,9 +311,21 @@
"traqueurs existants ont cessé de fonctionner pour toujours</a>."
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-sabotage.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it-diff.html,v
retrieving revision 1.55
retrieving revision 1.56
diff -u -b -r1.55 -r1.56
--- proprietary-sabotage.it-diff.html 16 Sep 2019 08:31:30 -0000 1.55
+++ proprietary-sabotage.it-diff.html 18 Sep 2019 16:01:42 -0000 1.56
@@ -175,7 +175,7 @@
the existing trackers stopped working forever</a>.</p>
<p>The article focuses on a further nasty fillip, that sales of the
- broken devices continued. But I think that is a secondary issue;
+ broken devices continued. But we think that is a secondary issue;
it made the nasty consequences extend to some additional people.
The fundamental wrong was to design the devices to depend on something
else that didn't respect users' freedom.</p>
@@ -796,7 +796,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/16 08:31:30 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.it.po,v
retrieving revision 1.120
retrieving revision 1.121
diff -u -b -r1.120 -r1.121
--- proprietary-sabotage.it.po 16 Sep 2019 08:31:30 -0000 1.120
+++ proprietary-sabotage.it.po 18 Sep 2019 16:01:42 -0000 1.121
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-07-06 22:45+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -229,7 +229,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-sabotage.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja-diff.html,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-sabotage.ja-diff.html 16 Sep 2019 08:31:30 -0000 1.59
+++ proprietary-sabotage.ja-diff.html 18 Sep 2019 16:01:42 -0000 1.60
@@ -168,7 +168,7 @@
the existing trackers stopped working forever</a>.</p>
<p>The article focuses on a further nasty fillip, that sales of the
- broken devices continued. But I think that is a secondary issue;
+ broken devices continued. But we think that is a secondary issue;
it made the nasty consequences extend to some additional people.
The fundamental wrong was to design the devices to depend on something
else that didn't respect users' freedom.</p>
@@ -777,7 +777,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/16 08:31:30 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-sabotage.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ja.po,v
retrieving revision 1.113
retrieving revision 1.114
diff -u -b -r1.113 -r1.114
--- proprietary-sabotage.ja.po 16 Sep 2019 08:31:30 -0000 1.113
+++ proprietary-sabotage.ja.po 18 Sep 2019 16:01:42 -0000 1.114
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-01-04 10:15+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -221,7 +221,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-sabotage.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.pot,v
retrieving revision 1.78
retrieving revision 1.79
diff -u -b -r1.78 -r1.79
--- proprietary-sabotage.pot 16 Sep 2019 08:31:30 -0000 1.78
+++ proprietary-sabotage.pot 18 Sep 2019 16:01:42 -0000 1.79
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -205,7 +205,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-sabotage.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-sabotage.ru.po,v
retrieving revision 1.197
retrieving revision 1.198
diff -u -b -r1.197 -r1.198
--- proprietary-sabotage.ru.po 16 Sep 2019 09:00:24 -0000 1.197
+++ proprietary-sabotage.ru.po 18 Sep 2019 16:01:42 -0000 1.198
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-sabotage.html\n"
-"POT-Creation-Date: 2019-09-16 08:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-12-10 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Sabotage - GNU Project - Free Software Foundation"
@@ -310,9 +311,21 @@
"\">ÐÑе ÑÑÑеÑÑвÑÑÑие ÑÑÑÑойÑÑва навÑегда
пÑекÑаÑили ÑабоÑÑ.</a>"
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary-surveillance.de-diff.html 18 Sep 2019 10:02:31 -0000
1.96
+++ proprietary-surveillance.de-diff.html 18 Sep 2019 16:01:42 -0000
1.97
@@ -862,7 +862,7 @@
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
+ and laptops</a> (presumably Windows laptops). Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
@@ -1156,7 +1156,7 @@
being sued, demanding that it notify the users of what it will do
with the data.</p>
- <p>I think that lawsuit is about a side issue. What the company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
@@ -1204,8 +1204,8 @@
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
@@ -1907,7 +1907,7 @@
“<a href="/philosophy/free-sw.html">free
software</a>”
referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p></em></ins></span>
</li>
@@ -3573,7 +3573,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.311
retrieving revision 1.312
diff -u -b -r1.311 -r1.312
--- proprietary-surveillance.de.po 18 Sep 2019 10:02:31 -0000 1.311
+++ proprietary-surveillance.de.po 18 Sep 2019 16:01:42 -0000 1.312
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1700,14 +1700,30 @@
"Hintertür</a> ermöglicht Zugriff auf alle Dateien im System."
#. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"Spionageprogramme in Android-Telefonen (und Windows-Laptops?): Die "
"amerikanische Tageszeitung <span xml:lang=\"en\" lang=\"en\">The Wall Street "
@@ -2186,7 +2202,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -2254,9 +2270,15 @@
msgstr "Das macht sie zu Spionen bei der Durchsetzung von Lizenzen."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Ich [RMS] erwarte, dass es auch DRM umsetzt ‑ dass es keine "
"Möglichkeit gibt, eine Aufzeichnung zu speichern. Dem Artikel nach kann man "
@@ -3260,7 +3282,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.475
retrieving revision 1.476
diff -u -b -r1.475 -r1.476
--- proprietary-surveillance.fr.po 18 Sep 2019 10:48:29 -0000 1.475
+++ proprietary-surveillance.fr.po 18 Sep 2019 16:01:42 -0000 1.476
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-18 12:48+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -1271,14 +1272,30 @@
"dérobée de Samsung</a> permet l'accès à n'importe quel fichier du
système."
#. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"Des logiciels espions dans les téléphones Android et les ordinateurs "
"portables (sous Windows ?) : le <cite>Wall Street Journal</cite> (dans un "
@@ -1851,8 +1868,16 @@
"données."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -1945,9 +1970,15 @@
"Ainsi elle fait office d'espionne au service de l'application des licences."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Je suppose qu'elle implémente aussi la gestion numérique des restrictions
â "
"qu'il n'y a aucun moyen de sauvegarder un enregistrement. Mais je ne peux "
@@ -2768,8 +2799,15 @@
"d'écouter les enregistrements</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Du point de vue éthique, je ne vois aucune différence entre l'écoute par
des "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary-surveillance.it-diff.html 18 Sep 2019 10:02:31 -0000
1.163
+++ proprietary-surveillance.it-diff.html 18 Sep 2019 16:01:42 -0000
1.164
@@ -967,7 +967,8 @@
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
+ and <span class="removed"><del><strong>laptops</a>.
+ (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
@@ -1026,39 +1027,40 @@
<span class="removed"><del><strong><ul>
<li>
- <p>Faceapp appears to do lots of surveillance, judging
by</strong></del></span>
+ <p>Faceapp appears to do</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201603080">
- <p>E-books can contain JavaScript code, and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands to personal data in the
device</a>.
- </p></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
- sometimes this code snoops on
readers</a>.</p></em></ins></span>
+ <p>E-books can contain JavaScript code, and <a
+
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">
+ sometimes this code snoops on readers</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>Verizon</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201410080">
+ <li id="M201410080">
<p>Adobe made “Digital Editions,”
- the e-reader used by most US libraries,</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
- pre-install on some</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots</em></ins></span> of <span class="removed"><del><strong>its
phones. The app will give Verizon the same
- information about the users' searches that Google normally gets when
- they use its search engine.</p>
-
- <p>Currently,</strong></del></span> <span
class="inserted"><ins><em>data to Adobe</a>. Adobe's
“excuse”: it's
+ the e-reader used by most US libraries, <a
+
href="https://web.archive.org/web/20141220181015/http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send</em></ins></span> lots of <span
class="removed"><del><strong>surveillance, judging by
+ <a
href="https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
+ how much access it demands to personal</strong></del></span>
data <span class="inserted"><ins><em>to Adobe</a>. Adobe's
“excuse”: it's
needed to check DRM!</p>
</li>
<li id="M201212030">
- <p>Spyware in many e-readers—not only</em></ins></span> the
<span class="removed"><del><strong>app is</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ <p>Spyware</em></ins></span> in <span class="inserted"><ins><em>many
e-readers—not only</em></ins></span> the <span
class="removed"><del><strong>device</a>.
+ </p>
+ </li>
+
+ <li>
+ <p>Verizon</strong></del></span> <span
class="inserted"><ins><em>Kindle:</em></ins></span> <a <span
class="removed"><del><strong>href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
+ announced an opt-in proprietary search app that it will</a>
+ pre-install on some of its phones. The app will give Verizon the same
+ information about the users' searches that Google normally gets
when</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012"></em></ins></span>
they <span class="removed"><del><strong>use its search engine.</p>
+
+ <p>Currently, the app is <a
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/pages/reader-privacy-chart-2012">
they
- report even which page</em></ins></span> the user <span
class="removed"><del><strong>must explicitly opt-in before the app takes
effect. However, the
+ <span class="inserted"><ins><em>report even which page</em></ins></span>
the user <span class="removed"><del><strong>must explicitly opt-in before the
app takes effect. However, the
app remains spyware—an “optional” piece of spyware is
still spyware.</p></strong></del></span> <span
class="inserted"><ins><em>reads at what
time</a>.</p></em></ins></span>
</li>
@@ -1498,7 +1500,7 @@
<li><p>Spyware in Cisco TNP</strong></del></span> <span
class="inserted"><ins><em>will do
with the data.</p>
- <p>I think that lawsuit is about a side issue. What the company does
+ <p>We think that lawsuit is about a side issue. What the company does
with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
@@ -1546,8 +1548,8 @@
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect it implements DRM, too—that there is no way to save
- a recording. But I can't be sure from the article.</p>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
<p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
@@ -1960,7 +1962,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -3337,7 +3339,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:42 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.324
retrieving revision 1.325
diff -u -b -r1.324 -r1.325
--- proprietary-surveillance.it.po 18 Sep 2019 10:02:31 -0000 1.324
+++ proprietary-surveillance.it.po 18 Sep 2019 16:01:43 -0000 1.325
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1633,7 +1633,13 @@
"Samsung</a> fornisce accesso a qualsiasi file sul sistema."
#. type: Content of: <ul><li><p>
-# || No change detected. The change might only be in amounts of spaces.
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
#, fuzzy
#| msgid ""
#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
@@ -1648,9 +1654,9 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"Spyware nei telefoni Android (e computer portatili, forse Windows): il Wall "
"Street Journal (in un articolo che può essere letto solo previo pagamento) "
@@ -2129,7 +2135,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -2195,8 +2201,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3091,7 +3097,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.179
retrieving revision 1.180
diff -u -b -r1.179 -r1.180
--- proprietary-surveillance.ja-diff.html 18 Sep 2019 10:02:31 -0000
1.179
+++ proprietary-surveillance.ja-diff.html 18 Sep 2019 16:01:43 -0000
1.180
@@ -900,7 +900,8 @@
Journal (in an article blocked from us by a paywall) reports that <a
href="http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj">
the FBI can remotely activate the GPS and microphone in Android phones
- and laptops</a>. (I suspect this means Windows laptops.) Here is
<a
+ and <span class="removed"><del><strong>laptops</a>.
+ (I suspect this means</strong></del></span> <span
class="inserted"><ins><em>laptops</a> (presumably</em></ins></span>
Windows <span class="removed"><del><strong>laptops.)</strong></del></span>
<span class="inserted"><ins><em>laptops).</em></ins></span> Here is <a
href="http://cryptome.org/2013/08/fbi-hackers.htm">more
info</a>.</p>
</li>
@@ -1232,10 +1233,13 @@
<span class="inserted"><ins><em><li id="M201903201">
<p>A study</em></ins></span> of <span
class="removed"><del><strong>the vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>24 “health” apps found that 19 of them
<a
+ minute (thus, indirectly, whether it is surrounded by a person's
+ body), and the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed
response:</strong></del></span> <span class="inserted"><ins><em>24
“health” apps found that 19 of them <a
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
- send sensitive personal data to third parties</a>, which can
use</em></ins></span> it <span class="removed"><del><strong>is surrounded
by</strong></del></span>
- <span class="inserted"><ins><em>for invasive advertising or discriminating
against people in poor
+ send sensitive personal data to third parties</a>, which can use it
+ for invasive advertising or discriminating against people in poor
medical condition.</p>
<p>Whenever user “consent” is sought, it is buried in
@@ -1244,271 +1248,113 @@
</li>
<li id="M201902230">
- <p>Facebook offered</em></ins></span> a <span
class="removed"><del><strong>person's
- body),</strong></del></span> <span class="inserted"><ins><em>convenient
proprietary
+ <p>Facebook offered a convenient proprietary
library for building mobile apps, which also <a
href="https://boingboing.net/2019/02/23/surveillance-zucksterism.html">
sent personal data to Facebook</a>. Lots of companies built apps that
- way</em></ins></span> and <span class="inserted"><ins><em>released them,
apparently not realizing that all</em></ins></span> the <span
class="removed"><del><strong>vibration frequency.</p>
+ way and released them, apparently not realizing that all the personal
+ data they collected would go to Facebook as well.</p>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>personal
- data they collected</em></ins></span> would <span
class="removed"><del><strong>make statements about
- their products, rather than free software which
users</strong></del></span> <span class="inserted"><ins><em>go to Facebook as
well.</p>
-
- <p>It shows that no one</em></ins></span> can <span
class="removed"><del><strong>check
- and change.</p></strong></del></span> <span
class="inserted"><ins><em>trust a nonfree program, not even the
- developers of other nonfree programs.</p></em></ins></span>
+ <p>It shows that no one can trust a nonfree program, not even the
+ developers of other nonfree programs.</p>
</li>
- <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <span class="inserted"><ins><em><li id="M201902140">
- <p>The AppCensus database gives information on</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span class="inserted"><ins><em>href="https://www.appcensus.mobi"> how
Android apps use and
+ <li id="M201902140">
+ <p>The AppCensus database gives information on <a
+ href="https://www.appcensus.mobi"> how Android apps use and
misuse users' personal data</a>. As of March 2019, nearly
78,000 have been analyzed, of which 24,000 (31%) transmit the <a
href="/proprietary/proprietary-surveillance.html#M201812290">
- Advertising ID</a></em></ins></span> to <span
class="removed"><del><strong>spy on children</strong></del></span> <span
class="inserted"><ins><em>other companies,</em></ins></span> and <span
class="removed"><del><strong>adults.</a>.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em><a
+ Advertising ID</a> to other companies, and <a
href="https://blog.appcensus.mobi/2019/02/14/ad-ids-behaving-badly/">
- 18,000 (23% of the total) link this ID</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>hardware identifiers</a>,
+ 18,000 (23% of the total) link this ID to hardware identifiers</a>,
so that users cannot escape tracking by resetting it.</p>
- <p>Collecting hardware identifiers is</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
-</div>
-
-<ul>
-<li><p>
-<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
-Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
-Note</strong></del></span> <span class="inserted"><ins><em>apparent violation
of
+ <p>Collecting hardware identifiers is in apparent violation of
Google's policies. But it seems that Google wasn't aware of it,
- and, once informed, was in no hurry to take action. This
proves</em></ins></span>
- that the <span class="removed"><del><strong>specific sabotage method
Lenovo used did not affect
-GNU/Linux; also,</strong></del></span> <span
class="inserted"><ins><em>policies of</em></ins></span> a <span
class="removed"><del><strong>“clean” Windows install is not really
-clean since</strong></del></span> <span class="inserted"><ins><em>development
platform are ineffective at
+ and, once informed, was in no hurry to take action. This proves
+ that the policies of a development platform are ineffective at
preventing nonfree software developers from including malware in
their programs.</p>
</li>
<li id="M201902060">
- <p>Many nonfree apps have a surveillance feature
for</em></ins></span> <a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
-puts</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
- recording all the users' actions</a></em></ins></span> in <span
class="removed"><del><strong>its own malware</a>.
-</p></li>
-</ul>
-
-<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>interacting with the app.</p>
+ <p>Many nonfree apps have a surveillance feature for <a
+
href="https://techcrunch.com/2019/02/06/iphone-session-replay-screenshots/">
+ recording all the users' actions</a> in interacting with the
app.</p>
</li>
<li id="M201902041.1">
- <p>Twenty nine “beauty camera” apps that
used</em></ins></span> to <span class="removed"><del><strong>place new
items</strong></del></span>
- <span class="inserted"><ins><em>be</em></ins></span> on <span
class="removed"><del><strong>top under each subsection -->
-
-<div class="big-section">
- <h3 id="SpywareAtWork">Spyware at Work</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Investigation
- Shows</strong></del></span> <span class="inserted"><ins><em>Google
Play had one or more malicious functionalities, such as</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
- Using US Companies, NSA To Route Around Domestic Surveillance
- Restrictions</a>.</p>
-
- <p>Specifically, it can collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ <p>Twenty nine “beauty camera” apps that used to
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos</a> instead of “beautifying” them,
pushing unwanted and often malicious ads on users, and redirecting
- them to phishing sites that stole their credentials.
Furthermore,</em></ins></span>
- the <span class="removed"><del><strong>emails</strong></del></span> <span
class="inserted"><ins><em>user interface</em></ins></span> of <span
class="removed"><del><strong>members</strong></del></span> <span
class="inserted"><ins><em>most</em></ins></span> of <span
class="removed"><del><strong>Parliament
- this way, because</strong></del></span> <span class="inserted"><ins><em>them
was designed to make uninstallation
+ them to phishing sites that stole their credentials. Furthermore,
+ the user interface of most of them was designed to make uninstallation
difficult.</p>
- <p>Users should of course uninstall these dangerous apps
if</em></ins></span> they <span class="removed"><del><strong>pass it through
Microsoft.</p></li>
-
- <li><p>Spyware</strong></del></span>
- <span class="inserted"><ins><em>haven't yet, but they should also stay
away from nonfree apps</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>general. <em>All</em> nonfree
apps carry a potential risk because
- there is no easy way of knowing what they really
do.</p></em></ins></span>
+ <p>Users should of course uninstall these dangerous apps if they
+ haven't yet, but they should also stay away from nonfree apps in
+ general. <em>All</em> nonfree apps carry a potential risk
because
+ there is no easy way of knowing what they really do.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInSkype">Spyware in Skype</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInSkype">#SpywareInSkype</a>)</span>
-</div>
-
-<ul>
- <li><p>Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902010">
+ <li id="M201902010">
<p>An investigation of the 150 most popular
- gratis VPN apps</em></ins></span> in <span
class="removed"><del><strong>Skype:
- <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
-
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>Google Play found that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
- specifically</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
+ gratis VPN apps in Google Play found that <a
+ href="https://www.top10vpn.com/free-vpn-android-app-risk-index/">
25% fail to protect their usersâ privacy</a> due to DNS leaks. In
addition, 85% feature intrusive permissions or functions in their
- source code—often used</em></ins></span> for <span
class="removed"><del><strong>spying</a>.</p>
- </li>
-</ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>invasive advertising—that could
- potentially also be used</em></ins></span> to <span
class="removed"><del><strong>place new items</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="inserted"><ins><em>users. Other technical flaws were
+ source code—often used for invasive advertising—that could
+ potentially also be used to spy on users. Other technical flaws were
found as well.</p>
<p>Moreover, a previous investigation had found that <a
href="https://www.top10vpn.com/free-vpn-app-investigation/">half of
- the</em></ins></span> top <span class="removed"><del><strong>under each
subsection -->
-
-<div class="big-section">
- <h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
-</div>
+ the top 10 gratis VPN apps have lousy privacy policies</a>.</p>
-<ul>
- <li>
- <p>The Nest Cam “smart” camera</strong></del></span>
<span class="inserted"><ins><em>10 gratis VPN apps have lousy privacy
policies</a>.</p>
-
- <p>It</em></ins></span> is <span
class="inserted"><ins><em>unfortunate that these articles talk about “free
- apps.” These apps are gratis, but they are
<em>not</em></em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span class="inserted"><ins><em>href="/philosophy/free-sw.html">free
software</a>.</p>
+ <p>It is unfortunate that these articles talk about “free
+ apps.” These apps are gratis, but they are <em>not</em>
<a
+ href="/philosophy/free-sw.html">free software</a>.</p>
</li>
<li id="M201901050">
<p>The Weather Channel app <a
href="https://www.theguardian.com/technology/2019/jan/04/weather-channel-app-lawsuit-location-data-selling">
- stored users' locations to</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>company's server</a>. The company is
- being sued, demanding that</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>notify</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>users of what</em></ins></span> it <span
class="removed"><del><strong>to outsmart
- you.</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
-</div>
-
-<ul>
- <li><p>E-books can contain Javascript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
- </li>
-
- <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>will do
- with</em></ins></span> the
- <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page</strong></del></span> <span
class="inserted"><ins><em>data.</p>
-
- <p>I think that lawsuit is about a side issue.
What</em></ins></span> the <span class="removed"><del><strong>user reads at
what time</a>.</p>
- </li>
+ stored users' locations to the company's server</a>. The company is
+ being sued, demanding that it notify the users of what it will do
+ with the data.</p>
- <li><p>Adobe made “Digital
Editions,”</strong></del></span> <span class="inserted"><ins><em>company
does
- with</em></ins></span> the <span class="removed"><del><strong>e-reader used
- by most US libraries,
- <a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
- send lots of</strong></del></span> data <span
class="removed"><del><strong>to Adobe</a>. Adobe's “excuse”:
it's
- needed to check DRM!</p>
- </li>
-</ul>
-
-<div class="big-subsection">
- <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
-</div>
-
-<ul>
-<li><p>Computerized cars with nonfree
software</strong></del></span> <span class="inserted"><ins><em>is a secondary
issue. The principal wrong here is that
+ <p>We think that lawsuit is about a side issue. What the company does
+ with the data is a secondary issue. The principal wrong here is that
the company gets that data at all.</p>
<p><a
href="https://motherboard.vice.com/en_us/article/gy77wy/stop-using-third-party-weather-apps">
- Other weather apps</a>, including Accuweather and
WeatherBug,</em></ins></span> are
- <span class="removed"><del><strong><a
href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
- snooping devices</a>.</p></strong></del></span>
- <span class="inserted"><ins><em>tracking people's
locations.</p></em></ins></span>
+ Other weather apps</a>, including Accuweather and WeatherBug, are
+ tracking people's locations.</p>
</li>
- <span class="removed"><del><strong><li><p>The Nissan Leaf has a
built-in cell phone modem which allows
- effectively
- anyone</strong></del></span>
+ <li id="M201812290">
+ <p>Around 40% of gratis Android apps <a
+
href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
+ report on the user's actions to Facebook</a>.</p>
- <span class="inserted"><ins><em><li id="M201812290">
- <p>Around 40% of gratis Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely and make changes in various
- settings</a>.</p>
+ <p>Often they send the machine's “advertising ID,” so
that
+ Facebook can correlate the data it obtains from the same machine via
+ various apps. Some of them send Facebook detailed information about
+ the user's activities in the app; others only say that the user is
+ using that app, but that alone is often quite informative.</p>
- <p>That's easy to do because</strong></del></span>
- <span
class="inserted"><ins><em>href="https://privacyinternational.org/report/2647/how-apps-android-share-data-facebook-report">
- report on</em></ins></span> the <span class="removed"><del><strong>system
has no authentication when
- accessed through</strong></del></span> <span
class="inserted"><ins><em>user's actions to Facebook</a>.</p>
-
- <p>Often they send</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
- authentication, you couldn't be confident</strong></del></span> <span
class="inserted"><ins><em>machine's “advertising ID,”
so</em></ins></span> that <span class="removed"><del><strong>Nissan has no
- access. The software in</strong></del></span>
- <span class="inserted"><ins><em>Facebook can correlate</em></ins></span>
the <span class="removed"><del><strong>car is
- proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
- means</strong></del></span> <span
class="inserted"><ins><em>data</em></ins></span> it <span
class="removed"><del><strong>demands blind faith</strong></del></span> <span
class="inserted"><ins><em>obtains</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
-
- <p>Even if no one connects to</strong></del></span> the <span
class="removed"><del><strong>car remotely, the cell phone
- modem enables</strong></del></span> <span class="inserted"><ins><em>same
machine via
- various apps. Some of them send Facebook detailed information
about</em></ins></span>
- the <span class="removed"><del><strong>phone company to
track</strong></del></span> <span class="inserted"><ins><em>user's activities
in</em></ins></span> the <span class="removed"><del><strong>car's movements
all</strong></del></span> <span class="inserted"><ins><em>app; others only say
that</em></ins></span> the <span class="removed"><del><strong>time;
it</strong></del></span> <span class="inserted"><ins><em>user</em></ins></span>
is <span class="removed"><del><strong>possible to physically
remove</strong></del></span>
- <span class="inserted"><ins><em>using that app, but that alone is often
quite informative.</p>
-
- <p>This spying occurs regardless of whether</em></ins></span> the
<span class="removed"><del><strong>cell phone modem
- though.</p></strong></del></span> <span
class="inserted"><ins><em>user has a Facebook
- account.</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Proprietary software
in cars</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810244">
- <p>Some Android apps</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records
information about drivers' movements</a>,
- which is made available to car manufacturers, insurance companies, and
- others.</p>
+ <p>This spying occurs regardless of whether the user has a Facebook
+ account.</p>
+ </li>
- <p>The case of toll-collection systems, mentioned in this article,
is not
- really a matter</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
- track the phones</em></ins></span> of <span
class="removed"><del><strong>proprietary surveillance. These
systems</strong></del></span> <span class="inserted"><ins><em>users that have
deleted them</a>.</p>
+ <li id="M201810244">
+ <p>Some Android apps <a
+
href="https://www.androidauthority.com/apps-uninstall-trackers-917539/amp/">
+ track the phones of users that have deleted them</a>.</p>
</li>
<li id="M201808030">
@@ -1517,91 +1363,40 @@
record the user's location even when users disable “location
tracking”</a>.</p>
- <p>There</em></ins></span> are <span class="removed"><del><strong>an
- intolerable invasion of privacy, and should be replaced with anonymous
- payment systems, but</strong></del></span> <span
class="inserted"><ins><em>other ways to turn off</em></ins></span> the <span
class="removed"><del><strong>invasion isn't done by malware.
The</strong></del></span> other
- <span class="removed"><del><strong>cases mentioned are
done</strong></del></span> <span class="inserted"><ins><em>kinds of location
- tracking, but most users will be tricked</em></ins></span> by <span
class="removed"><del><strong>proprietary malware in</strong></del></span> the
<span class="removed"><del><strong>car.</p></li>
-
- <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>misleading control.</p>
+ <p>There are other ways to turn off the other kinds of location
+ tracking, but most users will be tricked by the misleading
control.</p>
</li>
<li id="M201806110">
<p>The Spanish football streaming app <a
-
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks</em></ins></span>
- the <span class="removed"><del><strong>company to extract data
remotely</strong></del></span> <span class="inserted"><ins><em>user's
movements</em></ins></span> and
- <span class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>listens through</em></ins></span> the <span
class="removed"><del><strong>car's location at any time. (See
- <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- Section 2, paragraphs b and c.</a>). The company
says</strong></del></span> <span
class="inserted"><ins><em>microphone</a>.</p>
+
href="https://boingboing.net/2018/06/11/spanish-football-app-turns-use.html">tracks
+ the user's movements and listens through the
microphone</a>.</p>
<p>This makes them act as spies for licensing enforcement.</p>
- <p>I expect</em></ins></span> it <span
class="removed"><del><strong>doesn't
- store this information, but if</strong></del></span> <span
class="inserted"><ins><em>implements DRM, too—that there is no way to save
- a recording. But I can't be sure from</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>article.</p>
+ <p>We expect it implements DRM, too—that there is no way to
save
+ a recording. But we can't be sure from the article.</p>
- <p>If you learn</em></ins></span> to <span
class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em>care much less about sports, you will benefit in
+ <p>If you learn to care much less about sports, you will benefit in
many ways. This is one more.</p>
</li>
<li id="M201804160">
<p>More than <a
href="https://www.theguardian.com/technology/2018/apr/16/child-apps-games-android-us-google-play-store-data-sharing-law-privacy">50%
- of</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>5,855 Android apps studied by researchers were found
to snoop</em></ins></span>
- and <span class="removed"><del><strong>hand it over,</strong></del></span>
<span class="inserted"><ins><em>collect information about its users</a>.
40% of</em></ins></span> the <span class="removed"><del><strong>state can store
it.</p>
- </li>
-</ul>
-
-
-<!-- #SpywareAtHome -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
-
-<div class="big-section">
- <h3 id="SpywareAtHome">Spyware at Home</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>apps</em></ins></span> were <span
class="removed"><del><strong>programmed</strong></del></span>
- <span class="inserted"><ins><em>found</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>insecurely snitch</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
- </li>
-</ul>
-
-
-<div class="big-subsection">
- <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>its users. Furthermore, they could
- detect only some methods of snooping,</em></ins></span> in <span
class="removed"><del><strong>TV Sets</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
-</div>
-
-<p>Emo Phillips made a joke:</strong></del></span> <span
class="inserted"><ins><em>these proprietary apps whose
- source code they cannot look at.</em></ins></span> The other <span
class="removed"><del><strong>day a woman came up to me and
-said, “Didn't I see you on television?” I said, “I
-don't know. You can't see out the</strong></del></span> <span
class="inserted"><ins><em>apps might be snooping
- in</em></ins></span> other <span class="removed"><del><strong>way.”
Evidently that was
-before Amazon “smart” TVs.</p>
-
-<ul>
- <li><p>More or less all “smart” TVs <a href="
-
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
- on their users</a>.</p>
+ of the 5,855 Android apps studied by researchers were found to snoop
+ and collect information about its users</a>. 40% of the apps were
+ found to insecurely snitch on its users. Furthermore, they could
+ detect only some methods of snooping, in these proprietary apps whose
+ source code they cannot look at. The other apps might be snooping
+ in other ways.</p>
- <p>The report was as of 2014, but we don't expect this has got
better.</p></strong></del></span> <span
class="inserted"><ins><em>ways.</p></em></ins></span>
-
- <p>This <span
class="removed"><del><strong>shows</strong></del></span> <span
class="inserted"><ins><em>is evidence</em></ins></span> that <span
class="removed"><del><strong>laws requiring products</strong></del></span>
<span class="inserted"><ins><em>proprietary apps generally work against
+ <p>This is evidence that proprietary apps generally work against
their users. To protect their privacy and freedom, Android users
- need</em></ins></span> to get <span class="removed"><del><strong>users'
formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>rid
of</em></ins></span> the <span class="removed"><del><strong>TV
- will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>proprietary software—both proprietary
- Android by <a
href="https://replicant.us">switching</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>Replicant</a>,
- and</em></ins></span> the <span class="removed"><del><strong>TV will
- not work.”</p>
-
- <p>Proper laws would say</strong></del></span> <span
class="inserted"><ins><em>proprietary apps by getting apps from the free
software
- only <a href="https://f-droid.org/">F-Droid
store</a></em></ins></span> that <span
class="removed"><del><strong>TVs</strong></del></span> <span
class="inserted"><ins><em><a
+ need to get rid of the proprietary software—both proprietary
+ Android by <a href="https://replicant.us">switching to
Replicant</a>,
+ and the proprietary apps by getting apps from the free software
+ only <a href="https://f-droid.org/">F-Droid store</a> that
<a
href="https://f-droid.org/wiki/page/Antifeatures"> prominently warns
the user if an app contains anti-features</a>.</p>
</li>
@@ -1609,141 +1404,77 @@
<li id="M201804020">
<p>Grindr collects information about <a
href="https://www.commondreams.org/news/2018/04/02/egregious-breach-privacy-popular-app-grindr-supplies-third-parties-users-hiv-status">
- which users</em></ins></span> are <span
class="inserted"><ins><em>HIV-positive, then provides the information to
+ which users are HIV-positive, then provides the information to
companies</a>.</p>
<p>Grindr should not have so much information about its users.
It could be designed so that users communicate such info to each
- other but</em></ins></span> not <span
class="removed"><del><strong>allowed</strong></del></span> to <span
class="removed"><del><strong>report what</strong></del></span> the <span
class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>server's database.</p></em></ins></span>
+ other but not to the server's database.</p>
</li>
- <span class="removed"><del><strong><li><p>Vizio goes a step
further than other TV manufacturers in spying</strong></del></span>
- <span class="inserted"><ins><em><li id="M201803050">
+ <li id="M201803050">
<p>The moviepass app and dis-service
- spy</em></ins></span> on
- <span class="removed"><del><strong>their users:
their</strong></del></span> <span class="inserted"><ins><em>users even more
than users expected. It</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you">
- “smart” TVs analyze your viewing habits</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
+ spy on users even more than users expected. It <a
+
href="https://techcrunch.com/2018/03/05/moviepass-ceo-proudly-says-the-app-tracks-your-location-before-and-after-movies/">records
where they travel before and after going to a movie</a>.</p>
<p>Don't be tracked—pay cash!</p>
</li>
<li id="M201711240">
- <p>Tracking software</em></ins></span> in <span
class="removed"><del><strong>detail</strong></del></span> <span
class="inserted"><ins><em>popular Android apps
- is pervasive</em></ins></span> and
- <span class="removed"><del><strong>link them your IP address</a>
so that advertisers</strong></del></span> <span
class="inserted"><ins><em>sometimes very clever. Some
trackers</em></ins></span> can <span class="removed"><del><strong>track you
- across devices.</p>
-
- <p>It is possible to turn this off, but having it
enabled</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Tracking software in popular Android apps
+ is pervasive and sometimes very clever. Some trackers can <a
href="https://theintercept.com/2017/11/24/staggering-variety-of-clandestine-trackers-found-in-popular-android-apps/">
- follow a user's movements around a physical store</em></ins></span> by
<span class="removed"><del><strong>default
- is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>noticing WiFi
- networks</a>.</p></em></ins></span>
+ follow a user's movements around a physical store by noticing WiFi
+ networks</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
- the 600 millions social media profiles the company already
- monitors. Tivo customers are unaware they're being watched by
- advertisers. By combining TV viewing information with online
- social media participation, Tivo can now</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708270">
- <p>The Sarahah app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
- advertisement with online purchases</a>,
exposing</strong></del></span>
- <span
class="inserted"><ins><em>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads</em></ins></span> all <span class="removed"><del><strong>users to
- new combined surveillance by default.</p></li>
- <li><p>Some web</strong></del></span> <span
class="inserted"><ins><em>phone numbers</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible sounds to be
- picked up by proprietary malware running on other
devices</strong></del></span> <span class="inserted"><ins><em>email
addresses</a></em></ins></span> in
- <span class="removed"><del><strong>range so as</strong></del></span>
<span class="inserted"><ins><em>user's address
- book</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>developer's server. Note</em></ins></span> that
<span class="removed"><del><strong>they are nearby. Once your
- Internet devices are paired with your TV, advertisers can
- correlate ads with Web activity, and
- other <a
href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p>
- </li>
- <li><p>Vizio “smart” TVs recognize and
- <a
href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track what
people are watching</a>,
- even if it isn't a TV channel.</p>
- </li>
- <li><p>The Amazon “Smart” TV
- <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
- watching and listening all</strong></del></span> <span
class="inserted"><ins><em>this article misuses</em></ins></span> the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>words
+ <li id="M201708270">
+ <p>The Sarahah app <a
+
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that this article misuses the words
“<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></em></ins></span>
+ referring to zero price.</p>
</li>
- <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <span class="inserted"><ins><em><li id="M201707270">
- <p>20 dishonest Android apps recorded</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet to another
- company, Nuance</a>. Nuance can save it</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
- calls</em></ins></span> and <span class="removed"><del><strong>would then
have</strong></del></span> <span class="inserted"><ins><em>sent them and text
messages and emails</em></ins></span> to
- <span class="removed"><del><strong>give</strong></del></span> <span
class="inserted"><ins><em>snoopers</a>.</p>
+ <li id="M201707270">
+ <p>20 dishonest Android apps recorded <a
+
href="https://arstechnica.com/information-technology/2017/07/stealthy-google-play-apps-recorded-calls-and-stole-e-mails-and-texts">phone
+ calls and sent them and text messages and emails to
snoopers</a>.</p>
- <p>Google did not intend to make these apps spy; on the
contrary,</em></ins></span> it
- <span class="inserted"><ins><em>worked in various ways</em></ins></span>
to <span class="inserted"><ins><em>prevent that, and deleted these apps after
+ <p>Google did not intend to make these apps spy; on the contrary, it
+ worked in various ways to prevent that, and deleted these apps after
discovering what they did. So we cannot blame Google specifically
for the snooping of these apps.</p>
- <p>On</em></ins></span> the <span class="removed"><del><strong>US or
some</strong></del></span> other <span
class="removed"><del><strong>government.</p>
- <p>Speech recognition is not to be trusted unless it is done
- by free software</strong></del></span> <span
class="inserted"><ins><em>hand, Google redistributes nonfree Android apps, and
- therefore shares</em></ins></span> in <span
class="removed"><del><strong>your</strong></del></span> <span
class="inserted"><ins><em>the responsibility for the injustice of their being
- nonfree. It also distributes its</em></ins></span> own <span
class="removed"><del><strong>computer.</p>
- </li>
- <li><p>Spyware in</strong></del></span> <span
class="inserted"><ins><em>nonfree apps, such as Google Play,</em></ins></span>
- <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- LG “smart” TVs</a> reports</strong></del></span> <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
+ <p>On the other hand, Google redistributes nonfree Android apps, and
+ therefore shares in the responsibility for the injustice of their being
+ nonfree. It also distributes its own nonfree apps, such as Google Play,
+ <a href="/philosophy/free-software-even-more-important.html">which
are malicious</a>.</p>
<p>Could Google have done a better job of preventing apps from
cheating? There is no systematic way for Google, or Android users,
- to inspect executable proprietary apps to see</em></ins></span> what <span
class="inserted"><ins><em>they do.</p>
-
- <p>Google could demand</em></ins></span> the <span
class="removed"><del><strong>user watches,</strong></del></span> <span
class="inserted"><ins><em>source code for these apps,</em></ins></span> and
<span class="inserted"><ins><em>study</em></ins></span>
- the <span class="removed"><del><strong>switch</strong></del></span> <span
class="inserted"><ins><em>source code somehow</em></ins></span> to <span
class="removed"><del><strong>turn this off has no effect. (The fact that the
- transmission reports a 404 error really means nothing; the server
- could save that data anyway.)</p>
+ to inspect executable proprietary apps to see what they do.</p>
- <p>Even worse, it
- <a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network.</a></p>
-
- <p>LG later said</strong></del></span> <span
class="inserted"><ins><em>determine whether they mistreat users in
- various ways. If</em></ins></span> it <span
class="removed"><del><strong>had installed</strong></del></span> <span
class="inserted"><ins><em>did</em></ins></span> a <span
class="removed"><del><strong>patch to stop</strong></del></span> <span
class="inserted"><ins><em>good job of</em></ins></span> this, <span
class="removed"><del><strong>but any product</strong></del></span> <span
class="inserted"><ins><em>it</em></ins></span> could <span
class="removed"><del><strong>spy this way.</p>
-
- <p>Meanwhile, LG TVs
- <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots</strong></del></span> <span class="inserted"><ins><em>more or less
+ <p>Google could demand the source code for these apps, and study
+ the source code somehow to determine whether they mistreat users in
+ various ways. If it did a good job of this, it could more or less
prevent such snooping, except when the app developers are clever
enough to outsmart the checking.</p>
<p>But since Google itself develops malicious apps, we cannot trust
- Google to protect us. We must demand release</em></ins></span> of <span
class="removed"><del><strong>spying anyway</a>.</p>
+ Google to protect us. We must demand release of source code to the
+ public, so we can depend on each other.</p>
</li>
- <li>
- <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they
wanted</strong></del></span> <span class="inserted"><ins><em>source
code</em></ins></span> to <span
class="removed"><del><strong>record.</a></p></strong></del></span>
<span class="inserted"><ins><em>the
- public, so we can depend on each other.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong></ul>
-<!-- #SpywareAtPlay -->
-<div class="big-section">
- <h3 id="SpywareAtPlay">Spyware at Play</h3>
- <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
-</div>
-<div style="clear: left;"></div>
-
-<ul>
- <li><p>Many</strong></del></span>
+ <li id="M201705230">
+ <p>Apps for BART <a
+
href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/">
+ snoop on users</a>.</p>
- <span class="inserted"><ins><em><li id="M201705230">
- <p>Apps for BART</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
- video game consoles</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20171124190046/https://consumerist.com/2017/05/23/passengers-say-commuter-rail-app-illegally-collects-personal-user-data/"></em></ins></span>
- snoop on <span class="removed"><del><strong>their</strong></del></span>
<span class="inserted"><ins><em>users</a>.</p>
-
- <p>With free software apps,</em></ins></span> users <span
class="removed"><del><strong>and report</strong></del></span> <span
class="inserted"><ins><em>could <em>make sure</em> that they
+ <p>With free software apps, users could <em>make
sure</em> that they
don't snoop.</p>
<p>With proprietary apps, one can only hope that they
don't.</p>
@@ -1759,31 +1490,17 @@
<li id="M201704260">
<p>Faceapp appears to do lots of surveillance, judging by <a
href="https://web.archive.org/web/20170426191242/https://www.washingtonpost.com/news/the-intersect/wp/2017/04/26/everything-thats-wrong-with-faceapp-the-latest-creepy-photo-app-for-your-face/">
- how much access it demands</em></ins></span> to <span
class="inserted"><ins><em>personal data in</em></ins></span> the
- <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
-
- <p>A game console is a computer, and you can't trust a computer
with
- a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>device</a>.</p></em></ins></span>
+ how much access it demands to personal data in the
device</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201704190">
- <p>Users are suing Bose for</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing</em></ins></span> a <span class="removed"><del><strong>wide
range</strong></del></span> <span class="inserted"><ins><em>spyware app for its
headphones</a>. Specifically,
- the app would record the names</em></ins></span> of <span
class="removed"><del><strong>data about their</strong></del></span> <span
class="inserted"><ins><em>the audio files</em></ins></span> users <span
class="removed"><del><strong>and their users'
- friends and associates</a>.</p>
-
- <p>Even nastier, they do it through ad
networks</strong></del></span> <span class="inserted"><ins><em>listen to
+ <li id="M201704190">
+ <p>Users are suing Bose for <a
+
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing a spyware app for its headphones</a>. Specifically,
+ the app would record the names of the audio files users listen to
along with the headphone's unique serial number.</p>
- <p>The suit accuses</em></ins></span> that <span
class="removed"><del><strong>merge</strong></del></span> <span
class="inserted"><ins><em>this was done without</em></ins></span> the <span
class="removed"><del><strong>data
- collected by various cr…apps and sites made by different
- companies.</p>
-
- <p>They use this</strong></del></span> <span
class="inserted"><ins><em>users' consent.
+ <p>The suit accuses that this was done without the users' consent.
If the fine print of the app said that users gave consent for this,
would that make it acceptable? No way! It should be flat out <a
href="/philosophy/surveillance-vs-democracy.html"> illegal to design
@@ -1792,7 +1509,7 @@
<li id="M201704074">
<p>Pairs of Android apps can collude
- to transmit users' personal</em></ins></span> data to <span
class="removed"><del><strong>manipulate people</strong></del></span> <span
class="inserted"><ins><em>servers. <a
+ to transmit users' personal data to servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
@@ -1816,16 +1533,16 @@
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data</em></ins></span> to <span class="removed"><del><strong>buy
things,</strong></del></span> <span class="inserted"><ins><em>a Chinese
company</a>.</p>
+ user data to a Chinese company</a>.</p>
</li>
<li id="M201611280">
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before</em></ins></span> and <span
class="removed"><del><strong>hunt</strong></del></span> <span
class="inserted"><ins><em>after the ride</a>.</p>
+ movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
- consent”</em></ins></span> for <span
class="removed"><del><strong>“whales” who can</strong></del></span>
<span class="inserted"><ins><em>surveillance is inadequate as a protection
against
+ consent” for surveillance is inadequate as a protection against
massive surveillance.</p>
</li>
@@ -1835,11 +1552,11 @@
research paper</a> that investigated the privacy and security of
283 Android VPN apps concluded that “in spite of the promises
for privacy, security, and anonymity given by the majority of VPN
- apps—millions of users may</em></ins></span> be <span
class="removed"><del><strong>led</strong></del></span> <span
class="inserted"><ins><em>unawarely subject</em></ins></span> to <span
class="removed"><del><strong>spend</strong></del></span> <span
class="inserted"><ins><em>poor security
+ apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is</em></ins></span> a <span
class="removed"><del><strong>lot</strong></del></span> <span
class="inserted"><ins><em>non-exhaustive list, taken from the research
paper,</em></ins></span>
- of <span class="removed"><del><strong>money. They</strong></del></span>
<span class="inserted"><ins><em>some proprietary VPN apps that track users and
infringe their
+ <p>Following is a non-exhaustive list, taken from the research paper,
+ of some proprietary VPN apps that track users and infringe their
privacy:</p>
<dl class="compact">
@@ -1854,11 +1571,11 @@
<dt>DroidVPN and TigerVPN</dt>
<dd>Requests the <code>READ_LOGS</code> permission to
read logs
- for other apps and</em></ins></span> also <span
class="removed"><del><strong>use a back door</strong></del></span> <span
class="inserted"><ins><em>core system logs. TigerVPN developers have
+ for other apps and also core system logs. TigerVPN developers have
confirmed this.</dd>
<dt>HideMyAss</dt>
- <dd>Sends traffic</em></ins></span> to <span
class="removed"><del><strong>manipulate</strong></del></span> <span
class="inserted"><ins><em>LinkedIn. Also, it stores detailed logs and
+ <dd>Sends traffic to LinkedIn. Also, it stores detailed logs and
may turn them over to the UK government if requested.</dd>
<dt>VPN Services HotspotShield</dt>
@@ -2071,7 +1788,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -2311,17 +2028,21 @@
<p>This shows that laws requiring products to get users' formal
consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV will
+ And what happens if</em></ins></span> a <span
class="removed"><del><strong>labeling
+ standard with which manufacturers</strong></del></span> <span
class="inserted"><ins><em>user declines consent? Probably the TV will
say, “Without your consent to tracking, the TV will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p>
+ <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>make statements about
+ their products, rather than free software which users can check
+ and change.</p></strong></del></span> <span
class="inserted"><ins><em>say that TVs are not allowed to report what the
+ user watches—no exceptions!</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Barbie</strong></del></span>
- <li id="M201405200">
- <p>Spyware in LG “smart” TVs <a
-
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ <span class="inserted"><ins><em><li id="M201405200">
+ <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
@@ -2330,8 +2051,8 @@
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
snoops on other devices on the user's local network</a>.</p>
- <p>LG later said it had installed a patch to stop this, but any
- product could spy this way.</p>
+ <p>LG later said it had installed a patch</em></ins></span> to <span
class="inserted"><ins><em>stop this, but any
+ product could</em></ins></span> spy <span class="inserted"><ins><em>this
way.</p>
<p>Meanwhile, LG TVs <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
@@ -2341,49 +2062,90 @@
<li id="M201212170">
<p id="break-security-smarttv"><a
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way to break security on a “smart”
TV</a>
- and use its camera to watch the people who are watching TV.</p>
+ Crackers found a way to break security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
+ and <span
class="removed"><del><strong>adults.</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
</li>
</ul>
+<span class="removed"><del><strong><!-- #SpywareAtLowLevel -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
+</div>
+<div style="clear: left;"></div></strong></del></span>
+
+
<div class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInBIOS">Spyware in
BIOS</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInCameras">Cameras</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInBIOS">#SpywareInBIOS</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+<li><p></strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201901100">
- <p>Amazon Ring “security” devices <a
-
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
+Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
+Note</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
send the video they capture to Amazon servers</a>, which save it
long-term.</p>
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
+ <p>In many cases, the video shows everyone</em></ins></span> that
<span class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span
class="removed"><del><strong>specific sabotage method
Lenovo</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
+
+ <p>The article focuses on how Ring</em></ins></span> used <span
class="removed"><del><strong>did not affect
+GNU/Linux; also, a “clean” Windows install is not really
+clean since <a href="/proprietary/malware-microsoft.html">Microsoft
+puts in its own malware</a>.
+</p></li>
+</ul>
+
+<!-- #SpywareAtWork -->
+<!-- WEBMASTERS: make sure</strong></del></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
- <p>The article focuses on how Ring used to let individual employees
look
- at the videos freely. It appears Amazon has tried to prevent that
+<div class="big-section">
+ <h3 id="SpywareAtWork">Spyware</strong></del></span> <span
class="inserted"><ins><em>let individual employees look</em></ins></span>
+ at <span class="removed"><del><strong>Work</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtWork">#SpywareAtWork</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Investigation
+ Shows</strong></del></span> <span class="inserted"><ins><em>the videos
freely. It appears Amazon has tried to prevent that
secondary abuse, but the primary abuse—that Amazon gets the
video—Amazon expects society to surrender to.</p>
</li>
<li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would be a better
+ <p>Nearly all “home security cameras”</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Using US Companies, NSA To Route Around Domestic Surveillance
+ Restrictions</a>.</p>
+
+ <p>Specifically, it can collect</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span class="removed"><del><strong>emails of
members</strong></del></span> <span class="inserted"><ins><em>manufacturer an
unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>Parliament
+ this way, because</strong></del></span> <span
class="inserted"><ins><em>everything</em></ins></span> they <span
class="removed"><del><strong>pass</strong></del></span>
+ <span class="inserted"><ins><em>see</a>. “Home insecurity
camera” would be a better
name!</p>
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's in the videos. That's not
+ <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>suggested that these
+ manufacturers promise not to look at what's</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>the videos. That's not
security for your home. Security means making sure they don't get to
see through your camera.</p>
</li>
<li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
security bugs that allow anyone to watch through them</a>.</p>
</li>
@@ -2393,27 +2155,43 @@
even when the “owner” switches it “off.”</p>
<p>A “smart” device means the manufacturer is using it
- to outsmart you.</p>
+ to outsmart you.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 id="SpywareInToys">Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
</div>
-<ul class="blurbs">
+<span class="removed"><del><strong><ul>
+ <li><p>Spyware in Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
+ Microsoft changed Skype</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
<li id="M201711244">
- <p>The Furby Connect has a <a
-
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ specifically for spying</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
universal back door</a>. If the product as shipped doesn't act as a
listening device, remote changes to the code could surely convert it
- into one.</p>
+ into one.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+
+<!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure</strong></del></span>
- <li id="M201711100">
- <p>A remote-control sex toy was found to make <a
+ <span class="inserted"><ins><em><li id="M201711100">
+ <p>A remote-control sex toy was found</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareOnTheRoad">Spyware</strong></del></span> <span
class="inserted"><ins><em>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings of the conversation between two users</a>.</p>
</li>
@@ -2421,7 +2199,18 @@
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping</em></ins></span> on <span class="removed"><del><strong>The
Road</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Spyware in Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
+
+<ul>
+ <li></strong></del></span> <span class="inserted"><ins><em>its users
through the proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
@@ -2430,33 +2219,78 @@
<p>Note the totally inadequate proposed response: a labeling
standard with which manufacturers would make statements about their
products, rather than free software which users could have checked
- and changed.</p>
+ and changed.</p></em></ins></span>
- <p>The company that made the vibrator <a
+ <p>The <span class="removed"><del><strong>Nest Cam
“smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>company that made</em></ins></span> the <span
class="removed"><del><strong>“owner” switches</strong></del></span>
<span class="inserted"><ins><em>vibrator <a
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of C$4m</a> to its
- customers.</p>
- </li>
-
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
-
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ <p>The company's statement that</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>was anonymizing</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using</strong></del></span> <span
class="inserted"><ins><em>data may be
+ true, but it doesn't really matter. If</em></ins></span> it <span
class="inserted"><ins><em>had sold the data</em></ins></span> to <span
class="removed"><del><strong>outsmart
+ you.</p>
+ </li>
+</ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
+</div>
+
+<ul>
+ <li><p>E-books can contain Javascript code,
+ and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops on readers</a>.</p>
+ </li>
+
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> <span class="inserted"><ins><em>a data
+ broker,</em></ins></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>data broker would have been able to figure out
who</em></ins></span> the
+ user <span class="removed"><del><strong>reads at what
time</a>.</p>
+ </li>
+
+ <li><p>Adobe made “Digital Editions,” the e-reader
used
+ by most US libraries,</strong></del></span> <span
class="inserted"><ins><em>was.</p>
+
+ <p>Following this lawsuit,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
+ send lots of data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered</em></ins></span> to <span
class="removed"><del><strong>Adobe</a>. Adobe's “excuse”:
it's
+ needed</strong></del></span> <span class="inserted"><ins><em>pay a total
of C$4m</a></em></ins></span> to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>its
+ customers.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<div class="big-subsection">
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
+</div>
+
+<ul>
+<li><p>Computerized cars</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>nonfree software are</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-07-12/your-car-s-been-studying-you-closely-and-everyone-wants-the-data">
+ snooping devices</a>.</p>
+ </li>
+
+ <li><p>The Nissan Leaf has a built-in cell phone modem which
allows
+ effectively
+ anyone</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak childrens' conversations to the manufacturer</a>. Guess
what?</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers found a way to</em></ins></span> access <span
class="removed"><del><strong>its computers remotely</strong></del></span> <span
class="inserted"><ins><em>the data</a> collected by the
manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI could listen to these
+ <p>That the manufacturer</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ settings</a>.</p>
+
+ <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>the FBI could listen</em></ins></span> to <span
class="removed"><del><strong>do because</strong></del></span> <span
class="inserted"><ins><em>these
conversations was unacceptable by itself.</p>
</li>
@@ -2464,12 +2298,15 @@
<p>The “smart” toys My Friend Cayla and i-Que transmit
<a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>, a speech recognition
- company based in the U.S.</p>
+ company based in</em></ins></span> the <span
class="removed"><del><strong>system has no authentication when
+ accessed through</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
<p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with a mobile phone. This would enable
- crackers to listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ can remotely control</em></ins></span> the <span
class="removed"><del><strong>modem. However, even if it asked for
+ authentication, you couldn't be confident that Nissan has no
+ access. The software</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen</em></ins></span> in <span class="inserted"><ins><em>on
a child's speech, and even speak into</em></ins></span> the <span
class="removed"><del><strong>car</strong></del></span>
+ <span class="inserted"><ins><em>toys themselves.</p>
</li>
<li id="M201502180">
@@ -2488,8 +2325,10 @@
<ul class="blurbs">
<li id="M201708040">
<p>While you're using a DJI drone
- to snoop on other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ to snoop on other people, DJI</em></ins></span> is
+ <span class="removed"><del><strong>proprietary,</strong></del></span>
<span class="inserted"><ins><em>in many cases</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/free-software-even-more-important.html">which
+ means</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
on you</a>.</p>
</li>
</ul>
@@ -2503,116 +2342,196 @@
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
+ when</em></ins></span> it <span class="removed"><del><strong>demands blind
faith</strong></del></span> <span class="inserted"><ins><em>is not supposed to
listen</a>. Thus, when one of Google's
subcontractors discloses a thousand confidential voice recordings,
- users were easily identified from these recordings.</p>
+ users were easily identified</em></ins></span> from <span
class="removed"><del><strong>its users</a>.</p>
+
+ <p>Even if</strong></del></span> <span
class="inserted"><ins><em>these recordings.</p>
- <p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what it records or sends.</p>
+ <p>Since Google “Assistant” uses proprietary software,
there is</em></ins></span> no <span class="removed"><del><strong>one
connects</strong></del></span>
+ <span class="inserted"><ins><em>way</em></ins></span> to <span
class="inserted"><ins><em>see or control what it records or sends.</p>
- <p>Rather than trying to better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google service.</p>
+ <p>Rather than trying to better control</em></ins></span> the <span
class="removed"><del><strong>car remotely, the cell phone
+ modem enables the phone company</strong></del></span> <span
class="inserted"><ins><em>use of recordings, Google
+ should not record or listen</em></ins></span> to <span
class="removed"><del><strong>track</strong></del></span> the <span
class="removed"><del><strong>car's movements all</strong></del></span> <span
class="inserted"><ins><em>person's voice. It should only
+ get commands that</em></ins></span> the <span
class="removed"><del><strong>time; it is possible</strong></del></span> <span
class="inserted"><ins><em>user wants</em></ins></span> to <span
class="removed"><del><strong>physically remove the cell phone modem
+ though.</p></strong></del></span> <span
class="inserted"><ins><em>send to some Google
service.</p></em></ins></span>
</li>
- <li id="M201905061">
- <p>Amazon Alexa collects a lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt), and sends
+ <span class="removed"><del><strong><li><p>Proprietary software
in cars
+ <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">records</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905061">
+ <p>Amazon Alexa collects a lot more</em></ins></span> information
<span class="removed"><del><strong>about drivers' movements</a>,
+ which</strong></del></span> <span class="inserted"><ins><em>from users
+ than</em></ins></span> is <span class="inserted"><ins><em>necessary for
correct functioning (time, location,
+ recordings</em></ins></span> made <span
class="removed"><del><strong>available to car manufacturers, insurance
companies, and
+ others.</p>
+
+ <p>The case of toll-collection systems, mentioned in this article,
is not
+ really</strong></del></span> <span
class="inserted"><ins><em>without</em></ins></span> a <span
class="removed"><del><strong>matter of proprietary surveillance. These systems
are an
+ intolerable invasion of privacy,</strong></del></span> <span
class="inserted"><ins><em>legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>should be replaced with anonymous
+ payment systems, but</strong></del></span> <span
class="inserted"><ins><em>sends
it to Amazon's servers, which store it indefinitely. Even
worse, Amazon forwards it to third-party companies. Thus,
even if users request deletion of their data from Amazon's servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they can be accessed by
- advertising companies and government agencies. In other words,
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>invasion isn't
done</strong></del></span> <span class="inserted"><ins><em>data remain on other
servers</a>, where they can be accessed</em></ins></span> by <span
class="removed"><del><strong>malware. The</strong></del></span>
+ <span class="inserted"><ins><em>advertising companies and government
agencies. In</em></ins></span> other
+ <span class="removed"><del><strong>cases mentioned</strong></del></span>
<span class="inserted"><ins><em>words,
deleting the collected information doesn't cancel the wrong of
collecting it.</p>
<p>Data collected by devices such as the Nest thermostat, the Philips
Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
+ the devices</em></ins></span> are <span class="removed"><del><strong>done
by proprietary malware</strong></del></span> <span
class="inserted"><ins><em>tethered to. Moreover, they are made available to
Alexa. As a result, Amazon has a very precise picture of users' life
- at home, not only in the present, but in the past (and, who knows,
+ at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car.</p></li>
+
+ <li><p>Tesla cars allow</strong></del></span> <span
class="inserted"><ins><em>present, but in</em></ins></span> the <span
class="removed"><del><strong>company</strong></del></span> <span
class="inserted"><ins><em>past (and, who knows,
in the future too?)</p>
</li>
<li id="M201904240">
- <p>Some of users' commands to the Alexa service are <a
-
href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
- recorded for Amazon employees to listen to</a>. The Google and Apple
+ <p>Some of users' commands</em></ins></span> to <span
class="removed"><del><strong>extract data remotely and
+ determine</strong></del></span> the <span
class="removed"><del><strong>car's location at any time.
(See</strong></del></span> <span class="inserted"><ins><em>Alexa service
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
+ Section 2, paragraphs b and c.</a>).</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.smh.com.au/technology/alexa-is-someone-else-listening-to-us-sometimes-someone-is-20190411-p51d4g.html">
+ recorded for Amazon employees to listen to</a>.</em></ins></span>
The <span class="removed"><del><strong>company says it doesn't
+ store this information, but if</strong></del></span> <span
class="inserted"><ins><em>Google and Apple
voice assistants do similar things.</p>
- <p>A fraction of the Alexa service staff even has access to <a
+ <p>A fraction of</em></ins></span> the <span
class="removed"><del><strong>state orders it</strong></del></span> <span
class="inserted"><ins><em>Alexa service staff even has access</em></ins></span>
to <span class="removed"><del><strong>get</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.bnnbloomberg.ca/amazon-s-alexa-reviewers-can-access-customers-home-addresses-1.1248788">
location and other personal data</a>.</p>
- <p>Since the client program is nonfree, and data processing is done
+ <p>Since</em></ins></span> the <span
class="inserted"><ins><em>client program is nonfree, and</em></ins></span> data
<span class="inserted"><ins><em>processing is done
“<a href="/philosophy/words-to-avoid.html#CloudComputing">in
the cloud</a>” (a soothing way of saying “We won't
- tell you how and where it's done”), users have no way
- to know what happens to the recordings unless human eavesdroppers <a
+ tell you how</em></ins></span> and <span class="removed"><del><strong>hand
it over,</strong></del></span> <span class="inserted"><ins><em>where it's
done”), users have no way
+ to know what happens to</em></ins></span> the <span
class="removed"><del><strong>state can store
it.</p></strong></del></span> <span class="inserted"><ins><em>recordings
unless human eavesdroppers <a
href="https://www.bnnbloomberg.ca/three-cheers-for-amazon-s-human-eavesdroppers-1.1243033">
- break their non-disclosure agreements</a>.</p>
+ break their non-disclosure
agreements</a>.</p></em></ins></span>
</li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareAtHome -->
+<!-- WEBMASTERS:</strong></del></span>
- <li id="M201902080">
+ <span class="inserted"><ins><em><li id="M201902080">
<p>The HP <a
href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
“ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a> to make sure the user is still
- paying for the subscription, and hasn't printed more pages than were
- paid for.</p>
+ communicates with HP servers</a> to</em></ins></span> make sure
<span class="removed"><del><strong>to place new items on top under each
subsection -->
+
+<div class="big-section">
+ <h3 id="SpywareAtHome">Spyware at Home</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtHome">#SpywareAtHome</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p><a
href="http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
+ Rent-to-own computers</strong></del></span> <span
class="inserted"><ins><em>the user is still
+ paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>programmed to
spy</strong></del></span>
+ <span class="inserted"><ins><em>paid for.</p>
<p>Even though the ink subscription program may be cheaper in some
- specific cases, it spies on users, and involves totally unacceptable
- restrictions in the use of ink cartridges that would otherwise be in
+ specific cases, it spies</em></ins></span> on <span
class="removed"><del><strong>their renters</a>.</p>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 id="SpywareInTVSets">Spyware</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
+ restrictions</em></ins></span> in <span class="removed"><del><strong>TV
Sets</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInTVSets">#SpywareInTVSets</a>)</span>
+</div>
+
+<p>Emo Phillips made a joke: The other day</strong></del></span> <span
class="inserted"><ins><em>the use of ink cartridges that would otherwise be in
working order.</p>
</li>
<li id="M201808120">
- <p>Crackers found a way to break the security of an Amazon device,
- and <a href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
+ <p>Crackers found</em></ins></span> a <span
class="removed"><del><strong>woman came up</strong></del></span> <span
class="inserted"><ins><em>way</em></ins></span> to <span
class="removed"><del><strong>me and
+said, “Didn't I see you on television?” I said, “I
+don't know. You can't see out</strong></del></span> <span
class="inserted"><ins><em>break</em></ins></span> the <span
class="removed"><del><strong>other way.” Evidently that was
+before</strong></del></span> <span class="inserted"><ins><em>security of
an</em></ins></span> Amazon <span
class="removed"><del><strong>“smart” TVs.</p>
+
+<ul>
+ <li><p>More or less all “smart”
TVs</strong></del></span> <span class="inserted"><ins><em>device,
+ and</em></ins></span> <a <span class="removed"><del><strong>href="
+
http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ on their users</a>.</p>
+
+ <p>The report</strong></del></span> <span
class="inserted"><ins><em>href="https://boingboing.net/2018/08/12/alexa-bob-carol.html">
turn it into a listening device</a> for them.</p>
- <p>It was very difficult for them to do this. The job would be much
- easier for Amazon. And if some government such as China or the US
- told Amazon to do this, or cease to sell the product in that country,
- do you think Amazon would have the moral fiber to say no?</p>
+ <p>It</em></ins></span> was <span class="removed"><del><strong>as of
2014, but we don't expect this has got better.</p>
+
+ <p>This shows that laws requiring products</strong></del></span>
<span class="inserted"><ins><em>very difficult for them</em></ins></span> to
<span class="removed"><del><strong>get users' formal
+ consent before collecting personal data are totally
inadequate.</strong></del></span> <span class="inserted"><ins><em>do this. The
job would be much
+ easier for Amazon.</em></ins></span> And <span
class="removed"><del><strong>what happens</strong></del></span> if <span
class="removed"><del><strong>a user declines consent?
Probably</strong></del></span> <span class="inserted"><ins><em>some government
such as China or</em></ins></span> the <span class="removed"><del><strong>TV
+ will say, “Without your consent</strong></del></span> <span
class="inserted"><ins><em>US
+ told Amazon</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>do this, or cease to sell</em></ins></span> the <span
class="removed"><del><strong>TV will
+ not work.”</p>
+
+ <p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>product in that country,
+ do you think Amazon</em></ins></span> would <span
class="inserted"><ins><em>have the moral fiber to</em></ins></span> say <span
class="removed"><del><strong>that TVs</strong></del></span> <span
class="inserted"><ins><em>no?</p>
- <p>These crackers are probably hackers too, but please <a
+ <p>These crackers</em></ins></span> are <span
class="removed"><del><strong>not allowed</strong></del></span> <span
class="inserted"><ins><em>probably hackers too, but please <a
href="https://stallman.org/articles/on-hacking.html"> don't use
- “hacking” to mean “breaking
security”</a>.</p>
+ “hacking”</em></ins></span> to <span
class="removed"><del><strong>report what
+ the user watches — no exceptions!</p></strong></del></span>
<span class="inserted"><ins><em>mean “breaking
security”</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Vizio
goes</strong></del></span>
- <li id="M201804140">
+ <span class="inserted"><ins><em><li id="M201804140">
<p>A medical insurance company <a
href="https://wolfstreet.com/2018/04/14/our-dental-insurance-sent-us-free-internet-connected-toothbrushes-and-this-is-what-happened-next">
- offers a gratis electronic toothbrush that snoops on its user by
+ offers</em></ins></span> a <span class="removed"><del><strong>step further
than other TV manufacturers in spying</strong></del></span> <span
class="inserted"><ins><em>gratis electronic toothbrush that
snoops</em></ins></span> on
+ <span class="removed"><del><strong>their users: their <a
href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>its user by
sending usage data back over the Internet</a>.</p>
</li>
<li id="M201706204">
- <p>Lots of “smart” products are designed <a
+ <p>Lots of</em></ins></span> “smart” <span
class="removed"><del><strong>TVs analyze your viewing
habits</strong></del></span> <span class="inserted"><ins><em>products are
designed <a
href="http://enews.cnet.com/ct/42931641:shoPz52LN:m:1:1509237774:B54C9619E39F7247C0D58117DD1C7E96:r:27417204357610908031812337994022">to
- listen to everyone in the house, all the time</a>.</p>
+ listen to everyone</em></ins></span> in <span
class="removed"><del><strong>detail and
+ link them your IP address</a> so</strong></del></span> <span
class="inserted"><ins><em>the house, all the time</a>.</p>
<p>Today's technological practice does not include any way of making
- a device that can obey your voice commands without potentially spying
- on you. Even if it is air-gapped, it could be saving up records
- about you for later examination.</p>
+ a device</em></ins></span> that <span
class="removed"><del><strong>advertisers</strong></del></span> can <span
class="removed"><del><strong>track you
+ across devices.</p>
+
+ <p>It is possible to turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>obey your voice
commands without potentially spying
+ on you. Even if</em></ins></span> it <span
class="removed"><del><strong>enabled by default</strong></del></span> is <span
class="removed"><del><strong>an injustice
already.</p></strong></del></span> <span
class="inserted"><ins><em>air-gapped, it could be saving up records
+ about you for later examination.</p></em></ins></span>
</li>
- <li id="M201407170">
- <p id="nest-thermometers">Nest thermometers send <a
- href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
+ <span class="removed"><del><strong><li><p>Tivo's alliance with
Viacom adds 2.3 million households to
+ the 600 millions social media profiles the company already
+ monitors. Tivo customers are unaware they're being watched by
+ advertisers. By combining TV viewing information with online
+ social media participation, Tivo can now</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
+ <p id="nest-thermometers">Nest thermometers send</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">correlate
TV
+ advertisement with online purchases</a>, exposing all users to
+ new combined surveillance by default.</p></li>
+ <li><p>Some web and TV advertisements play inaudible
sounds</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a
lot of
data about the user</a>.</p>
</li>
<li id="M201310260">
<p><a
href="https://web.archive.org/web/20180911191954/http://consumerman.com/Rent-to-own%20giant%20accused%20of%20spying%20on%20its%20customers.htm">
- Rent-to-own computers were programmed to spy on their
renters</a>.</p>
+ Rent-to-own computers were programmed</em></ins></span> to <span
class="removed"><del><strong>be
+ picked up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>spy</em></ins></span> on <span
class="removed"><del><strong>other devices in
+ range so as</strong></del></span> <span class="inserted"><ins><em>their
renters</a>.</p>
</li>
</ul>
@@ -2628,8 +2547,10 @@
href="https://www.theguardian.com/fashion/2018/jul/26/tommy-hilfiger-new-clothing-line-monitor-customers">will
monitor how often people wear it</a>.</p>
- <p>This will teach the sheeple to find it normal that companies
- monitor every aspect of what they do.</p>
+ <p>This will teach the sheeple</em></ins></span> to <span
class="removed"><del><strong>determine</strong></del></span> <span
class="inserted"><ins><em>find it normal</em></ins></span> that <span
class="inserted"><ins><em>companies
+ monitor every aspect of what</em></ins></span> they <span
class="removed"><del><strong>are nearby. Once your
+ Internet devices are paired with your TV, advertisers can
+ correlate ads</strong></del></span> <span
class="inserted"><ins><em>do.</p>
</li>
</ul>
@@ -2638,16 +2559,18 @@
<ul class="blurbs">
<li id="M201603020">
- <p>A very cheap “smart watch” comes with an Android app
<a
-
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ <p>A very cheap “smart watch” comes</em></ins></span>
with <span class="removed"><del><strong>Web activity, and
+ other</strong></del></span> <span class="inserted"><ins><em>an Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/tech-policy/2015/11/beware-of-ads-that-use-inaudible-sound-to-link-your-phone-tv-tablet-and-pc/">cross-device
tracking</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
that connects to an unidentified site in China</a>.</p>
<p>The article says this is a back door, but that could be a
- misunderstanding. However, it is certainly surveillance, at
least.</p>
+ misunderstanding. However, it is certainly surveillance, at
least.</p></em></ins></span>
</li>
+ <span
class="removed"><del><strong><li><p>Vizio</strong></del></span>
- <li id="M201407090">
- <p>An LG “smart” watch is designed <a
+ <span class="inserted"><ins><em><li id="M201407090">
+ <p>An LG</em></ins></span> “smart” <span
class="removed"><del><strong>TVs recognize</strong></del></span> <span
class="inserted"><ins><em>watch is designed <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
to report its location to someone else and to transmit conversations
too</a>.</p>
@@ -2662,31 +2585,36 @@
<ul class="blurbs">
<li id="M201903290">
- <p>Tesla cars collect lots of personal data, and <a
-
href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
- when they go to a junkyard the driver's personal data goes with
- them</a>.</p>
- </li>
-
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ <p>Tesla cars collect lots of personal data,</em></ins></span> and
<a <span
class="removed"><del><strong>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
what people are watching</a>,
+ even if it isn't</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.cnbc.com/2019/03/29/tesla-model-3-keeps-data-like-crash-videos-location-phone-contacts.html">
+ when they go to</em></ins></span> a <span class="removed"><del><strong>TV
channel.</p></strong></del></span> <span
class="inserted"><ins><em>junkyard the driver's personal data goes with
+ them</a>.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>The Amazon
“Smart” TV</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">is
+ watching</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
- including car location. This feature operates even when the ignition
+ connected to the cellular phone network</em></ins></span> and <span
class="removed"><del><strong>listening all</strong></del></span> <span
class="inserted"><ins><em>sends Ford a lot of data,
+ including car location. This feature operates even when</em></ins></span>
the <span
class="removed"><del><strong>time</a>.</p></strong></del></span>
<span class="inserted"><ins><em>ignition
key is removed, and users report that they can't disable it.</p>
<p>If you own one of these cars, have you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
- antenna in aluminum foil?</p>
+ antenna in aluminum foil?</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>The Samsung
“Smart” TV</strong></del></span>
- <li id="M201811300">
+ <span class="inserted"><ins><em><li id="M201811300">
<p>In China, it is mandatory for electric
- cars to be equipped with a terminal that <a
- href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
- transfers technical data, including car location,
- to a government-run platform</a>. In practice, <a
+ cars to be equipped with a terminal that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">transmits
users' voice on the internet</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.apnews.com/4a749a4211904784826b45e812cff4ca">
+ transfers technical data, including car location,</em></ins></span>
+ to <span class="removed"><del><strong>another
+ company, Nuance</a>. Nuance can save</strong></del></span> <span
class="inserted"><ins><em>a government-run platform</a>. In practice,
<a
href="/proprietary/proprietary-surveillance.html#car-spying">
manufacturers collect this data</a> as part of their own spying, then
forward it to the government-run platform.</p>
@@ -2698,28 +2626,33 @@
tracked the choices of radio programs</a> in its
“connected” cars, minute by minute.</p>
- <p>GM did not get users' consent, but it could have got that easily
by
- sneaking it into the contract that users sign for some digital service
- or other. A requirement for consent is effectively no protection.</p>
+ <p>GM did not get users' consent, but</em></ins></span> it <span
class="removed"><del><strong>and would then</strong></del></span> <span
class="inserted"><ins><em>could</em></ins></span> have <span
class="removed"><del><strong>to
+ give</strong></del></span> <span class="inserted"><ins><em>got that
easily by
+ sneaking</em></ins></span> it <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>into</em></ins></span> the <span
class="removed"><del><strong>US or</strong></del></span> <span
class="inserted"><ins><em>contract that users sign for</em></ins></span> some
<span class="removed"><del><strong>other government.</p>
+ <p>Speech recognition</strong></del></span> <span
class="inserted"><ins><em>digital service
+ or other. A requirement for consent</em></ins></span> is <span
class="removed"><del><strong>not</strong></del></span> <span
class="inserted"><ins><em>effectively no protection.</p>
- <p>The cars can also collect lots of other data: listening to you,
+ <p>The cars can also collect lots of other data:
listening</em></ins></span> to <span class="inserted"><ins><em>you,
watching you, following your movements, tracking passengers' cell
- phones. <em>All</em> such data collection should be
forbidden.</p>
+ phones. <em>All</em> such data collection
should</em></ins></span> be <span class="removed"><del><strong>trusted unless
it</strong></del></span> <span class="inserted"><ins><em>forbidden.</p>
<p>But if you really want to be safe, we must make sure the car's
- hardware cannot collect any of that data, or that the software
- is free so we know it won't collect any of that data.</p>
+ hardware cannot collect any of that data, or that the
software</em></ins></span>
+ is <span class="removed"><del><strong>done
+ by</strong></del></span> free <span class="removed"><del><strong>software
in</strong></del></span> <span class="inserted"><ins><em>so we know it won't
collect any of that data.</p>
</li>
<li id="M201711230">
<p>AI-powered driving apps can <a
href="https://motherboard.vice.com/en_us/article/43nz9p/ai-powered-driving-apps-can-track-your-every-move">
- track your every move</a>.</p>
+ track</em></ins></span> your <span class="removed"><del><strong>own
computer.</p></strong></del></span> <span class="inserted"><ins><em>every
move</a>.</p></em></ins></span>
</li>
+ <span class="removed"><del><strong><li><p>Spyware
in</strong></del></span>
- <li id="M201607160">
- <p id="car-spying">Computerized cars with nonfree software are <a
-
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ <span class="inserted"><ins><em><li id="M201607160">
+ <p id="car-spying">Computerized cars with nonfree software
are</em></ins></span> <a <span
class="removed"><del><strong>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ LG “smart” TVs</a> reports what the user
watches,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
snooping devices</a>.</p>
</li>
@@ -2727,39 +2660,85 @@
<p id="nissan-modem">The Nissan Leaf has a built-in
cell phone modem which allows effectively anyone to <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">
- access its computers remotely and make changes in various
+ access its computers remotely</em></ins></span> and
+ <span class="removed"><del><strong>the switch</strong></del></span>
<span class="inserted"><ins><em>make changes in various
settings</a>.</p>
- <p>That's easy to do because the system has no authentication
- when accessed through the modem. However, even if it asked
+ <p>That's easy</em></ins></span> to <span
class="removed"><del><strong>turn this off</strong></del></span> <span
class="inserted"><ins><em>do because the system</em></ins></span> has no <span
class="removed"><del><strong>effect. (The fact that the
+ transmission reports a 404 error really means
nothing;</strong></del></span> <span class="inserted"><ins><em>authentication
+ when accessed through</em></ins></span> the <span
class="removed"><del><strong>server
+ could save that data anyway.)</p>
+
+ <p>Even worse,</strong></del></span> <span
class="inserted"><ins><em>modem. However, even if</em></ins></span> it
+ <span class="removed"><del><strong><a
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</strong></del></span> <span
class="inserted"><ins><em>asked
for authentication, you couldn't be confident that Nissan
- has no access. The software in the car is proprietary, <a
- href="/philosophy/free-software-even-more-important.html">which means
+ has no access. The software in</em></ins></span> the <span
class="removed"><del><strong>user's local network.</a></p>
+
+ <p>LG later said it had installed a patch to stop this, but any
product
+ could spy this way.</p>
+
+ <p>Meanwhile, LG TVs
+ <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
do lots of spying anyway</a>.</p>
+ </li>
+ <li>
+ <p><a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">Verizon
cable TV snoops on what programs people watch, and even what they wanted to
record.</a></p>
+ </li>
+</ul>
+
+<!-- #SpywareAtPlay -->
+<div class="big-section">
+ <h3 id="SpywareAtPlay">Spyware at Play</h3>
+ <span class="anchor-reference-id">(<a
href="#SpywareAtPlay">#SpywareAtPlay</a>)</span>
+</div>
+<div style="clear: left;"></div>
+
+<ul>
+ <li><p>Many</strong></del></span> <span
class="inserted"><ins><em>car is proprietary,</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thestar.com/news/canada/2015/12/29/how-much-data-are-video-games-collecting-about-you.html/">
+ video game consoles snoop on their users and report</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/free-software-even-more-important.html">which
means
it demands blind faith from its users</a>.</p>
- <p>Even if no one connects to the car remotely, the cell phone modem
+ <p>Even if no one connects</em></ins></span> to the
+ <span class="removed"><del><strong>internet</a>— even what
their users weigh.</p>
+
+ <p>A game console</strong></del></span> <span
class="inserted"><ins><em>car remotely, the cell phone modem
enables the phone company to track the car's movements all the time;
- it is possible to physically remove the cell phone modem, though.</p>
+ it</em></ins></span> is <span class="removed"><del><strong>a computer, and
you can't trust a computer with
+ a nonfree operating system.</p></strong></del></span> <span
class="inserted"><ins><em>possible to physically remove the cell phone modem,
though.</p></em></ins></span>
</li>
- <li id="M201306140">
- <p>Tesla cars allow the company to extract
- data remotely and determine the car's location
- at any time. (See Section 2, paragraphs b and c of the <a
+ <span class="removed"><del><strong><li><p>Modern gratis game
cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a wide range of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201306140">
+ <p>Tesla cars allow the company to extract</em></ins></span>
+ data <span class="removed"><del><strong>about their
users</strong></del></span> <span
class="inserted"><ins><em>remotely</em></ins></span> and <span
class="removed"><del><strong>their users'
+ friends</strong></del></span> <span class="inserted"><ins><em>determine
the car's location
+ at any time. (See Section 2, paragraphs b</em></ins></span> and <span
class="removed"><del><strong>associates</a>.</p>
+
+ <p>Even nastier, they do</strong></del></span> <span
class="inserted"><ins><em>c of the <a
href="http://www.teslamotors.com/sites/default/files/pdfs/tmi_privacy_statement_external_6-14-2013_v2.pdf">
- privacy statement</a>.) The company says it doesn't store this
- information, but if the state orders it to get the data and hand it
+ privacy statement</a>.) The company says</em></ins></span> it <span
class="removed"><del><strong>through ad networks that
merge</strong></del></span> <span class="inserted"><ins><em>doesn't store this
+ information, but if the state orders it to get</em></ins></span> the data
+ <span class="removed"><del><strong>collected by various
cr…apps</strong></del></span> and <span
class="removed"><del><strong>sites</strong></del></span> <span
class="inserted"><ins><em>hand it
over, the state can store it.</p>
</li>
<li id="M201303250">
<p id="records-drivers">Proprietary software in cars <a
href="http://www.usatoday.com/story/money/cars/2013/03/24/car-spying-edr-data-privacy/1991751/">
- records information about drivers' movements</a>, which is made
- available to car manufacturers, insurance companies, and others.</p>
+ records information about drivers' movements</a>, which
is</em></ins></span> made <span class="removed"><del><strong>by different
+ companies.</p>
- <p>The case of toll-collection systems, mentioned in this article,
- is not really a matter of proprietary surveillance. These systems
+ <p>They use this data to manipulate people</strong></del></span>
+ <span class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>buy things,</strong></del></span> <span
class="inserted"><ins><em>car manufacturers, insurance
companies,</em></ins></span> and <span class="removed"><del><strong>hunt
+ for “whales” who can be led to spend a
lot</strong></del></span> <span class="inserted"><ins><em>others.</p>
+
+ <p>The case</em></ins></span> of <span
class="removed"><del><strong>money. They
+ also use</strong></del></span> <span
class="inserted"><ins><em>toll-collection systems, mentioned in this article,
+ is not really</em></ins></span> a <span class="removed"><del><strong>back
door to manipulate</strong></del></span> <span class="inserted"><ins><em>matter
of proprietary surveillance. These systems
are an intolerable invasion of privacy, and should be replaced with
anonymous payment systems, but the invasion isn't done by malware. The
other cases mentioned are done by proprietary malware in the car.</p>
@@ -3190,7 +3169,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.305
retrieving revision 1.306
diff -u -b -r1.305 -r1.306
--- proprietary-surveillance.ja.po 18 Sep 2019 10:02:31 -0000 1.305
+++ proprietary-surveillance.ja.po 18 Sep 2019 16:01:43 -0000 1.306
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1225,14 +1225,23 @@
"ã¯ãã¢</a>ã¯ã·ã¹ãã
ä¸ã®ã©ããªãã¡ã¤ã«ã«ãã¢ã¯ã»ã¹ãæä¾ãã¾ãã"
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"(ãã¤ã»ã¦ã©ã¼ã«ã§ãããã¯ãããè¨äºã§ã)ã¯<a
href=\"http://www.theverge."
"com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
@@ -1650,7 +1659,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -1716,8 +1725,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2360,7 +2369,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- proprietary-surveillance.pot 18 Sep 2019 10:02:31 -0000 1.245
+++ proprietary-surveillance.pot 18 Sep 2019 16:01:43 -0000 1.246
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -900,7 +900,7 @@
"(in an article blocked from us by a paywall) reports that <a "
"href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
"
"the FBI can remotely activate the GPS and microphone in Android phones and "
-"laptops</a>. (I suspect this means Windows laptops.) Here is <a "
+"laptops</a> (presumably Windows laptops). Here is <a "
"href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>."
msgstr ""
@@ -1270,7 +1270,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -1337,8 +1337,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1882,7 +1882,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.569
retrieving revision 1.570
diff -u -b -r1.569 -r1.570
--- proprietary-surveillance.ru.po 18 Sep 2019 14:29:41 -0000 1.569
+++ proprietary-surveillance.ru.po 18 Sep 2019 16:01:43 -0000 1.570
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
@@ -1257,14 +1258,30 @@
"Samsung</a> пÑедоÑÑавлÑÐµÑ Ð´Ð¾ÑÑÑп к лÑбомÑ
ÑÐ°Ð¹Ð»Ñ Ð² ÑиÑÑеме."
#. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"ШпионÑкие пÑогÑÐ°Ð¼Ð¼Ñ Ð² ÑелеÑонаÑ
Android (и
поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
[Ñ "
"Windows?]): “Уолл-ÑÑÑÐ¸Ñ Ð´Ð¶Ð¾Ñнел” (в
ÑÑаÑÑе, закÑÑÑой Ð¾Ñ Ð½Ð°Ñ "
@@ -1828,8 +1845,16 @@
"делаÑÑ Ñ ÑÑими даннÑми."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -1924,9 +1949,15 @@
msgstr "Таким обÑазом, они ÑпионÑÑ Ð²
лиÑензионнÑÑ
ÑелÑÑ
."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Я не ÑдивлÑÑÑ, еÑли в нем Ñеализовано и
ÑиÑÑовое ÑпÑавление "
"огÑаниÑениÑми — Ñ.е. ÑоÑ
ÑаниÑÑ
запиÑÑ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾. Ðо из ÑÑаÑÑи "
@@ -2743,8 +2774,15 @@
"пÑоÑлÑÑиваÑÑ Ð·Ð°Ð¿Ð¸Ñи</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Я не Ð²Ð¸Ð¶Ñ Ð¼Ð¾ÑалÑной ÑазниÑÑ Ð¼ÐµÐ¶Ð´Ñ
пÑоÑлÑÑиванием ÑабоÑниками-лÑдÑми и "
Index: proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -b -r1.20 -r1.21
--- proprietary-tethers.de-diff.html 13 Sep 2019 12:31:20 -0000 1.20
+++ proprietary-tethers.de-diff.html 18 Sep 2019 16:01:43 -0000 1.21
@@ -112,7 +112,7 @@
the existing trackers stopped working forever</a>.</p>
<p>The article focuses on a further nasty fillip, that sales of the
- broken devices continued. But I think that is a secondary issue;
+ broken devices continued. But <span
class="removed"><del><strong>I</strong></del></span> <span
class="inserted"><ins><em>we</em></ins></span> think that is a secondary issue;
it made the nasty consequences extend to some additional people.
The fundamental wrong was to design the devices to depend on something
else that didn't respect users' freedom.</p>
@@ -306,7 +306,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/13 12:31:20 $
+$Date: 2019/09/18 16:01:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.32
retrieving revision 1.33
diff -u -b -r1.32 -r1.33
--- proprietary-tethers.de.po 13 Sep 2019 12:31:21 -0000 1.32
+++ proprietary-tethers.de.po 18 Sep 2019 16:01:43 -0000 1.33
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -158,9 +158,21 @@
"nutzbar</a>.</ins>"
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary-tethers.fr.po 15 Sep 2019 12:48:10 -0000 1.60
+++ proprietary-tethers.fr.po 18 Sep 2019 16:01:43 -0000 1.61
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-13 14:48+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -172,9 +173,21 @@
"traqueurs existants ont cessé de fonctionner pour toujours</a>."
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.39
retrieving revision 1.40
diff -u -b -r1.39 -r1.40
--- proprietary-tethers.ja-diff.html 13 Sep 2019 12:31:23 -0000 1.39
+++ proprietary-tethers.ja-diff.html 18 Sep 2019 16:01:43 -0000 1.40
@@ -105,7 +105,7 @@
the existing trackers stopped working forever</a>.</p>
<p>The article focuses on a further nasty fillip, that sales of the
- broken devices continued. But I think that</em></ins></span> is <span
class="inserted"><ins><em>a secondary issue;
+ broken devices continued. But we think that is a secondary issue;
it made the nasty consequences extend to some additional people.
The fundamental wrong was to design the devices to depend on something
else that didn't respect users' freedom.</p>
@@ -113,10 +113,7 @@
<li id="M201806250">
<p>The game Metal Gear Rising for
- MacOS was</em></ins></span> tethered to a <span
class="removed"><del><strong>server.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>server. The
company <a
+ MacOS was tethered to a server. The company <a
href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
shut down the server, and all copies stopped working</a>.</p>
</li>
@@ -128,7 +125,7 @@
turning off the server through which the products' supposed owners
communicate with them</a>.</p>
- <p>The owners suspect this is to pressure them to buy a newer model.
If
+ <p>The owners suspect this</em></ins></span> is <span
class="inserted"><ins><em>to pressure them to buy a newer model. If
they are wise, they will learn, rather, to distrust any product that
requires users to talk with them through some specialized
service.</p>
</li>
@@ -136,7 +133,10 @@
<li id="M201711010">
<p>Sony has brought back its robotic pet Aibo, this time <a
href="https://motherboard.vice.com/en_us/article/bj778v/sony-wants-to-sell-you-a-subscription-to-a-robot-dog-aibo-90s-pet">
- with a universal back door, and tethered to a server that requires
+ with a universal back door, and</em></ins></span> tethered to a <span
class="removed"><del><strong>server.</p>
+
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>server that
requires
a subscription</a>.</p>
</li>
@@ -290,7 +290,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/13 12:31:23 $
+$Date: 2019/09/18 16:01:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- proprietary-tethers.ja.po 13 Sep 2019 12:31:23 -0000 1.31
+++ proprietary-tethers.ja.po 18 Sep 2019 16:01:43 -0000 1.32
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2016-11-18 13:34+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -137,7 +137,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-tethers.pot 13 Sep 2019 12:31:23 -0000 1.29
+++ proprietary-tethers.pot 18 Sep 2019 16:01:43 -0000 1.30
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -125,7 +125,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-tethers.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-tethers.pt-br.po 15 Sep 2019 08:59:36 -0000 1.7
+++ proprietary-tethers.pt-br.po 18 Sep 2019 16:01:43 -0000 1.8
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-15 05:27-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -171,9 +172,16 @@
"para sempre</a>."
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.65
retrieving revision 1.66
diff -u -b -r1.65 -r1.66
--- proprietary-tethers.ru.po 13 Sep 2019 17:28:51 -0000 1.65
+++ proprietary-tethers.ru.po 18 Sep 2019 16:01:43 -0000 1.66
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2019-09-13 12:25+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-10-01 09:13+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -177,9 +178,21 @@
"\">ÐÑе ÑÑÑеÑÑвÑÑÑие ÑÑÑÑойÑÑва навÑегда
пÑекÑаÑили ÑабоÑÑ.</a>"
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.de-diff.html 18 Sep 2019 10:02:31 -0000 1.125
+++ proprietary.de-diff.html 18 Sep 2019 16:01:43 -0000 1.126
@@ -45,10 +45,10 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -101,18 +101,18 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -131,9 +131,9 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
+<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -221,7 +221,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -297,7 +297,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:31 $
+$Date: 2019/09/18 16:01:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.de.po 18 Sep 2019 10:02:31 -0000 1.167
+++ proprietary.de.po 18 Sep 2019 16:01:43 -0000 1.168
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -499,7 +499,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.219
retrieving revision 1.220
diff -u -b -r1.219 -r1.220
--- proprietary.es.po 18 Sep 2019 10:02:31 -0000 1.219
+++ proprietary.es.po 18 Sep 2019 16:01:43 -0000 1.220
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -376,8 +376,15 @@
"grabaciones</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Desde el punto de vista moral no veo ninguna diferencia entre tener "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.265
retrieving revision 1.266
diff -u -b -r1.265 -r1.266
--- proprietary.fr.po 18 Sep 2019 10:48:29 -0000 1.265
+++ proprietary.fr.po 18 Sep 2019 16:01:43 -0000 1.266
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-18 12:48+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -375,8 +376,15 @@
"d'écouter les enregistrements</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Du point de vue éthique, je ne vois aucune différence entre l'écoute par
des "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.137
retrieving revision 1.138
diff -u -b -r1.137 -r1.138
--- proprietary.it-diff.html 18 Sep 2019 10:02:32 -0000 1.137
+++ proprietary.it-diff.html 18 Sep 2019 16:01:43 -0000 1.138
@@ -220,7 +220,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -296,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary.it.po 18 Sep 2019 10:02:32 -0000 1.176
+++ proprietary.it.po 18 Sep 2019 16:01:43 -0000 1.177
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -503,7 +503,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.ja-diff.html 18 Sep 2019 10:02:32 -0000 1.140
+++ proprietary.ja-diff.html 18 Sep 2019 16:01:43 -0000 1.141
@@ -218,7 +218,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -294,7 +294,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary.ja.po 18 Sep 2019 10:02:32 -0000 1.160
+++ proprietary.ja.po 18 Sep 2019 16:01:43 -0000 1.161
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -363,7 +363,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.138
retrieving revision 1.139
diff -u -b -r1.138 -r1.139
--- proprietary.nl-diff.html 18 Sep 2019 10:02:32 -0000 1.138
+++ proprietary.nl-diff.html 18 Sep 2019 16:01:43 -0000 1.139
@@ -101,19 +101,19 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
- <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
- <li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
+ <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
+ <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-phones.html">Malware
in phones</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
<li><a
href="/proprietary/proprietary-surveillance.html">Surveillance</a></li>
@@ -220,7 +220,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -296,7 +296,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary.nl.po 18 Sep 2019 10:02:32 -0000 1.150
+++ proprietary.nl.po 18 Sep 2019 16:01:43 -0000 1.151
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -405,7 +405,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary.pl-diff.html 18 Sep 2019 10:02:32 -0000 1.155
+++ proprietary.pl-diff.html 18 Sep 2019 16:01:43 -0000 1.156
@@ -218,7 +218,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -294,7 +294,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary.pl.po 18 Sep 2019 10:02:32 -0000 1.143
+++ proprietary.pl.po 18 Sep 2019 16:01:43 -0000 1.144
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -584,7 +584,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary.pot 18 Sep 2019 10:02:32 -0000 1.140
+++ proprietary.pot 18 Sep 2019 16:01:43 -0000 1.141
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -300,7 +300,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.225
retrieving revision 1.226
diff -u -b -r1.225 -r1.226
--- proprietary.pt-br.po 18 Sep 2019 10:02:32 -0000 1.225
+++ proprietary.pt-br.po 18 Sep 2019 16:01:43 -0000 1.226
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-09-16 19:48-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -368,8 +368,12 @@
"homes-kinect-cortana\"> trabalhadores humanos ouvindo às gravações</a>."
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Moralmente, não vejo diferença entre ter trabalhadores humanos ouvindo ou "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.298
retrieving revision 1.299
diff -u -b -r1.298 -r1.299
--- proprietary.ru.po 18 Sep 2019 14:29:41 -0000 1.298
+++ proprietary.ru.po 18 Sep 2019 16:01:43 -0000 1.299
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-09-18 15:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -378,8 +379,15 @@
"пÑоÑлÑÑиваÑÑ Ð·Ð°Ð¿Ð¸Ñи</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Я не Ð²Ð¸Ð¶Ñ Ð¼Ð¾ÑалÑной ÑазниÑÑ Ð¼ÐµÐ¶Ð´Ñ
пÑоÑлÑÑиванием ÑабоÑниками-лÑдÑми и "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.117
retrieving revision 1.118
diff -u -b -r1.117 -r1.118
--- proprietary.zh-tw-diff.html 18 Sep 2019 10:02:32 -0000 1.117
+++ proprietary.zh-tw-diff.html 18 Sep 2019 16:01:43 -0000 1.118
@@ -45,10 +45,10 @@
<span class="inserted"><ins><em>#TOC ul { padding-bottom: .5em; }
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>margin: .5em
0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
--->
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
#TOC { width: 55em; }
@@ -101,18 +101,18 @@
<tr>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li>
- <li><a href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
<li><a
href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
@@ -131,9 +131,9 @@
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li>
-<li><a
href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li>
+<li><a
href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
@@ -221,7 +221,7 @@
href="https://www.vice.com/en_us/article/43kv4q/microsoft-human-contractors-listened-to-xbox-owners-homes-kinect-cortana">
human workers listen to the recordings</a>.</p>
- <p>Morally I see no difference between having human workers listen
and
+ <p>Morally, we see no difference between having human workers listen
and
having speech-recognition systems listen. Both intrude on
privacy.</p>
</li>
@@ -297,7 +297,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/09/18 10:02:32 $
+$Date: 2019/09/18 16:01:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary.zh-tw.po 18 Sep 2019 10:02:32 -0000 1.128
+++ proprietary.zh-tw.po 18 Sep 2019 16:01:43 -0000 1.129
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-09-18 09:55+0000\n"
+"POT-Creation-Date: 2019-09-18 15:55+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -477,7 +477,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- pt-br.po 18 Sep 2019 10:02:32 -0000 1.183
+++ pt-br.po 18 Sep 2019 16:01:43 -0000 1.184
@@ -460,11 +460,17 @@
"pessoa também pode assistir, e falsificar vÃdeos também</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"A vulnerabilidade de terceiros é presumivelmente não intencional e suponho "
"que a Amazon consertará isso. Não tenho esperanças de que a Amazon mude o "
@@ -1773,9 +1779,16 @@
"para sempre</a>."
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -2948,13 +2961,13 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -3194,8 +3207,12 @@
"homes-kinect-cortana\"> trabalhadores humanos ouvindo às gravações</a>."
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Moralmente, não vejo diferença entre ter trabalhadores humanos ouvindo ou "
@@ -4056,9 +4073,9 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -5543,8 +5560,13 @@
"com os dados."
#. type: Content of: <ul><li><p>
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -5629,8 +5651,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -8695,6 +8717,27 @@
"Processadores da Intel terão software tirano embutido</a>."
#~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people. The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "O artigo concentra-se em mais um impulso desagradável, de que as vendas "
+#~ "dos dispositivos quebrados continuaram. Mas acho que isso é secundário. "
+#~ "Isso fez com que as consequências desagradáveis se estendessem a algumas
"
+#~ "pessoas adicionais. O erro fundamental foi projetar os dispositivos para "
+#~ "depender de outra coisa que não respeitou a liberdade dos usuários."
+
+#~ msgid ""
+#~ "Morally I see no difference between having human workers listen and "
+#~ "having speech-recognition systems listen. Both intrude on privacy."
+#~ msgstr ""
+#~ "Moralmente, não vejo diferença entre ter trabalhadores humanos ouvindo
ou "
+#~ "sistemas de reconhecimento de fala ouvindo. Ambos se intrometem na "
+#~ "privacidade."
+
+#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
#~ "NoDerivatives 4.0 International License</a>."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- ru.po 18 Sep 2019 14:07:17 -0000 1.302
+++ ru.po 18 Sep 2019 16:01:43 -0000 1.303
@@ -553,11 +553,22 @@
"видеоизобÑажение</a>."
#. type: Content of: <ul><li><p>
-msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+# | The third party vulnerability is presumably unintentional and [-I
+# | suppose-] Amazon will {+probably+} fix it. [-I-] {+However, we+} do not
+# | expect Amazon to change the design that <a
+# | href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows
+# | Amazon to watch</a>.
+#, fuzzy
+#| msgid ""
+#| "The third party vulnerability is presumably unintentional and I suppose "
+#| "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#| "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#| "Amazon to watch</a>."
+msgid ""
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
"УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
"полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ дÑмаÑ,
ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ ÑÑÑÑойÑÑво "
@@ -2182,9 +2193,21 @@
"\">ÐÑе ÑÑÑеÑÑвÑÑÑие ÑÑÑÑойÑÑва навÑегда
пÑекÑаÑили ÑабоÑÑ.</a>"
#. type: Content of: <ul><li><p>
+# | The article focuses on a further nasty fillip, that sales of the broken
+# | devices continued. But [-I-] {+we+} think that is a secondary issue; it
+# | made the nasty consequences extend to some additional people. The
+# | fundamental wrong was to design the devices to depend on something else
+# | that didn't respect users' freedom.
+#, fuzzy
+#| msgid ""
+#| "The article focuses on a further nasty fillip, that sales of the broken "
+#| "devices continued. But I think that is a secondary issue; it made the "
+#| "nasty consequences extend to some additional people. The fundamental "
+#| "wrong was to design the devices to depend on something else that didn't "
+#| "respect users' freedom."
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -3776,13 +3799,23 @@
"оÑпÑÑкаÑÑ ÑоÑмоза и Ñ.д."
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+# | [-I-]{+We+} expect that Chrysler and the NSA can do this too.
+#, fuzzy
+#| msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr "Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ."
#. type: Content of: <ul><li><p>
+# | If [-I ever-] {+you+} own a [-car, and it-] {+car that+} contains a
+# | [-portable phone, I will-] {+phone modem, it would be a good idea to+}
+# | deactivate [-that.-] {+this.+}
+#, fuzzy
+#| msgid ""
+#| "If I ever own a car, and it contains a portable phone, I will deactivate "
+#| "that."
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
"ÐÑли Ñ Ð¼ÐµÐ½Ñ ÐºÐ¾Ð³Ð´Ð°-нибÑÐ´Ñ Ð±ÑÐ´ÐµÑ Ð¼Ð°Ñина и в
ней бÑÐ´ÐµÑ Ð¼Ð¾Ð±Ð¸Ð»ÑнÑй ÑелеÑон, Ñ ÐµÐ³Ð¾ "
"вÑклÑÑÑ."
@@ -4039,8 +4072,15 @@
"пÑоÑлÑÑиваÑÑ Ð·Ð°Ð¿Ð¸Ñи</a>."
#. type: Content of: <ul><li><p>
+# | [-Morally I-]{+Morally, we+} see no difference between having human
+# | workers listen and having speech-recognition systems listen. Both intrude
+# | on privacy.
+#, fuzzy
+#| msgid ""
+#| "Morally I see no difference between having human workers listen and "
+#| "having speech-recognition systems listen. Both intrude on privacy."
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
"Я не Ð²Ð¸Ð¶Ñ Ð¼Ð¾ÑалÑной ÑазниÑÑ Ð¼ÐµÐ¶Ð´Ñ
пÑоÑлÑÑиванием ÑабоÑниками-лÑдÑми и "
@@ -5068,14 +5108,30 @@
"a> и за дÑÑгими ÑÑÑановленнÑми
пÑогÑаммами."
#. type: Content of: <ul><li><p>
+# | Spyware in Android phones (and Windows? laptops): The Wall Street Journal
+# | (in an article blocked from us by a paywall) reports that <a
+# |
href=\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-microphones-reports-wsj\">
+# | the FBI can remotely activate the GPS and microphone in Android phones and
+# | [-laptops</a>. (I suspect this means-] {+laptops</a> (presumably+}
+# | Windows [-laptops.)-] {+laptops).+} Here is <a
+# | href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</a>.
+#, fuzzy
+#| msgid ""
+#| "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#| "(in an article blocked from us by a paywall) reports that <a href="
+#| "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#| "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#| "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#| "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#| "org/2013/08/fbi-hackers.htm\">more info</a>."
msgid ""
"Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
"ШпионÑкие пÑогÑÐ°Ð¼Ð¼Ñ Ð² ÑелеÑонаÑ
Android (и
поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
[Ñ "
"Windows?]): “Уолл-ÑÑÑÐ¸Ñ Ð´Ð¶Ð¾Ñнел” (в
ÑÑаÑÑе, закÑÑÑой Ð¾Ñ Ð½Ð°Ñ "
@@ -6716,10 +6772,10 @@
"\"https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-"
"maya-mia-fem\"> send intimate details of users' lives to Facebook</a>."
msgstr ""
-"ÐекоÑоÑÑе неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¿ÐµÑиода, в Ñом ÑиÑле "
-"MIA Fem и Maya <a href="
-"\"https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-"
-"maya-mia-fem\"> оÑÑÑлаÑÑ Ð¸Ð½ÑимнÑе подÑобноÑÑи
жизни полÑзоваÑелей в Facebook</a>."
+"ÐекоÑоÑÑе неÑвободнÑе пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð´Ð»Ñ
оÑÑÐ»ÐµÐ¶Ð¸Ð²Ð°Ð½Ð¸Ñ Ð¿ÐµÑиода, в Ñом ÑиÑле MIA "
+"Fem и Maya <a href=\"https://www.buzzfeednews.com/article/meghara/period-"
+"tracker-apps-facebook-maya-mia-fem\"> оÑÑÑлаÑÑ Ð¸Ð½ÑимнÑе
подÑобноÑÑи жизни "
+"полÑзоваÑелей в Facebook</a>."
#. type: Content of: <ul><li><p>
msgid ""
@@ -6988,8 +7044,16 @@
"делаÑÑ Ñ ÑÑими даннÑми."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} think that lawsuit is about a side issue. What the company
+# | does with the data is a secondary issue. The principal wrong here is that
+# | the company gets that data at all.
+#, fuzzy
+#| msgid ""
+#| "I think that lawsuit is about a side issue. What the company does with "
+#| "the data is a secondary issue. The principal wrong here is that the "
+#| "company gets that data at all."
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -7076,9 +7140,15 @@
msgstr "Таким обÑазом, они ÑпионÑÑ Ð²
лиÑензионнÑÑ
ÑелÑÑ
."
#. type: Content of: <ul><li><p>
+# | [-I-]{+We+} expect it implements DRM, too—that there is no way to
+# | save a recording. But [-I-] {+we+} can't be sure from the article.
+#, fuzzy
+#| msgid ""
+#| "I expect it implements DRM, too—that there is no way to save a "
+#| "recording. But I can't be sure from the article."
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
"Я не ÑдивлÑÑÑ, еÑли в нем Ñеализовано и
ÑиÑÑовое ÑпÑавление "
"огÑаниÑениÑми — Ñ.е. ÑоÑ
ÑаниÑÑ
запиÑÑ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾. Ðо из ÑÑаÑÑи "
@@ -10921,6 +10991,85 @@
"пÑоÑеÑÑоÑаÑ
Intel бÑдÑÑ Ð²ÑÑÑоеннÑе
неÑвободнÑе пÑогÑаммÑ-ÑиÑанÑ</a>."
#~ msgid ""
+#~ "The third party vulnerability is presumably unintentional and I suppose "
+#~ "Amazon will fix it. I do not expect Amazon to change the design that <a "
+#~ "href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+#~ "Amazon to watch</a>."
+#~ msgstr ""
+#~ "УÑзвимоÑÑÑ ÑÑеÑÑей ÑÑоÑонÑ,
пÑедположиÑелÑно, бÑла непÑеднамеÑенной, и
Ñ "
+#~ "полагаÑ, в Amazon ÑÑо иÑпÑавÑÑ. Ðо Ñ Ð½Ðµ
дÑмаÑ, ÑÑо Amazon Ð¸Ð·Ð¼ÐµÐ½Ð¸Ñ "
+#~ "ÑÑÑÑойÑÑво пÑогÑаммÑ, коÑоÑое <a
href=\"/proprietary/proprietary-"
+#~ "surveillance.html#M201901100\">позволÑÐµÑ Amazon ÑмоÑÑеÑÑ
ÑеÑез камеÑÑ</a>."
+
+#~ msgid ""
+#~ "The article focuses on a further nasty fillip, that sales of the broken "
+#~ "devices continued. But I think that is a secondary issue; it made the "
+#~ "nasty consequences extend to some additional people. The fundamental "
+#~ "wrong was to design the devices to depend on something else that didn't "
+#~ "respect users' freedom."
+#~ msgstr ""
+#~ "СÑаÑÑÑ Ð¾Ð±ÑÑÐ¶Ð´Ð°ÐµÑ Ð¿Ñодолжение ÑÑой
ÑквеÑной иÑÑоÑии — Ñо, ÑÑо "
+#~ "неÑабоÑаÑÑие ÑÑÑÑойÑÑва пÑодолжали
пÑодаваÑÑ. Ðо Ñ Ð´ÑмаÑ, Ñо "
+#~ "вÑоÑоÑÑÐµÐ¿ÐµÐ½Ð½Ð°Ñ Ð¿Ñоблема; из-за ÑÑого
поÑледÑÑÐ²Ð¸Ñ ÑаÑпÑоÑÑÑанилиÑÑ ÐµÑе на "
+#~ "какиÑ
-Ñо лÑдей. ÐÑинÑипиалÑнаÑ
неÑпÑаведливоÑÑÑ Ð±Ñла в Ñом, ÑÑо ÑÑи "
+#~ "ÑÑÑÑойÑÑва бÑли ÑпÑоекÑиÑÐ¾Ð²Ð°Ð½Ñ Ñак,
ÑÑÐ¾Ð±Ñ Ð·Ð°Ð²Ð¸ÑеÑÑ Ð¾Ñ Ñего-Ñо еÑе, ÑÑо не "
+#~ "ÑÐ²Ð°Ð¶Ð°ÐµÑ ÑÐ²Ð¾Ð±Ð¾Ð´Ñ Ð¿Ð¾Ð»ÑзоваÑелей."
+
+#~ msgid "I expect that Chrysler and the NSA can do this too."
+#~ msgstr "Я дÑмаÑ, ÑÑо ÐÑайÑÐ»ÐµÑ Ð¸ ÐÐÐ Ñоже ÑÑо
могÑÑ."
+
+#~ msgid ""
+#~ "If I ever own a car, and it contains a portable phone, I will deactivate "
+#~ "that."
+#~ msgstr ""
+#~ "ÐÑли Ñ Ð¼ÐµÐ½Ñ ÐºÐ¾Ð³Ð´Ð°-нибÑÐ´Ñ Ð±ÑÐ´ÐµÑ Ð¼Ð°Ñина и в
ней бÑÐ´ÐµÑ Ð¼Ð¾Ð±Ð¸Ð»ÑнÑй ÑелеÑон, Ñ "
+#~ "его вÑклÑÑÑ."
+
+#~ msgid ""
+#~ "Morally I see no difference between having human workers listen and "
+#~ "having speech-recognition systems listen. Both intrude on privacy."
+#~ msgstr ""
+#~ "Я не Ð²Ð¸Ð¶Ñ Ð¼Ð¾ÑалÑной ÑазниÑÑ Ð¼ÐµÐ¶Ð´Ñ
пÑоÑлÑÑиванием ÑабоÑниками-лÑдÑми и "
+#~ "пÑоÑлÑÑиванием ÑиÑÑемами ÑаÑпознаваниÑ
ÑеÑи. Ð Ñо, и дÑÑгое пÑедÑÑавлÑÐµÑ "
+#~ "вÑоÑжение в лиÑнÑÑ Ð¶Ð¸Ð·Ð½Ñ."
+
+#~ msgid ""
+#~ "Spyware in Android phones (and Windows? laptops): The Wall Street Journal "
+#~ "(in an article blocked from us by a paywall) reports that <a href="
+#~ "\"http://www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-"
+#~ "android-and-laptop-microphones-reports-wsj\"> the FBI can remotely "
+#~ "activate the GPS and microphone in Android phones and laptops</a>. (I "
+#~ "suspect this means Windows laptops.) Here is <a href=\"http://cryptome."
+#~ "org/2013/08/fbi-hackers.htm\">more info</a>."
+#~ msgstr ""
+#~ "ШпионÑкие пÑогÑÐ°Ð¼Ð¼Ñ Ð² ÑелеÑонаÑ
Android (и
поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
[Ñ "
+#~ "Windows?]): “Уолл-ÑÑÑÐ¸Ñ Ð´Ð¶Ð¾Ñнел” (в
ÑÑаÑÑе, закÑÑÑой Ð¾Ñ Ð½Ð°Ñ "
+#~ "баÑÑеÑом плаÑежа) ÑообÑаеÑ, ÑÑо <a
href=\"http://www.theverge."
+#~ "com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-laptop-"
+#~ "microphones-reports-wsj\">ФÐÐ Ð¼Ð¾Ð¶ÐµÑ Ñдаленной
командой вклÑÑаÑÑ Ð¿Ñиемник "
+#~ "GPS и микÑоÑон в ÑелеÑонаÑ
Ñ Android и
поÑÑаÑивнÑÑ
компÑÑÑеÑаÑ
</a>. (Я "
+#~ "подозÑеваÑ, ÑÑо ÑеÑÑ Ð¸Ð´ÐµÑ Ð¾ компÑÑÑеÑаÑ
Ñ Windows.) <a href=\"http://"
+#~ "cryptome.org/2013/08/fbi-hackers.htm\">ÐÑÑгие
подÑобноÑÑи</a>."
+
+#~ msgid ""
+#~ "I think that lawsuit is about a side issue. What the company does with "
+#~ "the data is a secondary issue. The principal wrong here is that the "
+#~ "company gets that data at all."
+#~ msgstr ""
+#~ "Я дÑмаÑ, ÑÑдебнÑй пÑоÑеÑÑ Ð·Ð°ÑÑагиваеÑ
побоÑнÑÑ Ð¿ÑоблемÑ. ЧÑо ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ "
+#~ "Ð´ÐµÐ»Ð°ÐµÑ Ñ Ð´Ð°Ð½Ð½Ñми — вопÑоÑ
вÑоÑоÑÑепеннÑй. ÐÐ»Ð°Ð²Ð½Ð°Ñ "
+#~ "неÑпÑаведливоÑÑÑ Ð·Ð´ÐµÑÑ ÑоÑÑÐ¾Ð¸Ñ Ð² Ñом,
ÑÑо ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð²Ð¾Ð¾Ð±Ñе полÑÑÐ°ÐµÑ ÑÑи "
+#~ "даннÑе."
+
+#~ msgid ""
+#~ "I expect it implements DRM, too—that there is no way to save a "
+#~ "recording. But I can't be sure from the article."
+#~ msgstr ""
+#~ "Я не ÑдивлÑÑÑ, еÑли в нем Ñеализовано и
ÑиÑÑовое ÑпÑавление "
+#~ "огÑаниÑениÑми — Ñ.е. ÑоÑ
ÑаниÑÑ
запиÑÑ Ð½ÐµÐ²Ð¾Ð·Ð¼Ð¾Ð¶Ð½Ð¾. Ðо из ÑÑаÑÑи "
+#~ "ÑÑо не ÑледÑеÑ."
+
+#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
#~ "NoDerivatives 4.0 International License</a>."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- zh-tw.po 18 Sep 2019 10:02:32 -0000 1.142
+++ zh-tw.po 18 Sep 2019 16:01:43 -0000 1.143
@@ -435,10 +435,10 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The third party vulnerability is presumably unintentional and I suppose "
-"Amazon will fix it. I do not expect Amazon to change the design that <a href="
-"\"/proprietary/proprietary-surveillance.html#M201901100\">allows Amazon to "
-"watch</a>."
+"The third party vulnerability is presumably unintentional and Amazon will "
+"probably fix it. However, we do not expect Amazon to change the design that "
+"<a href=\"/proprietary/proprietary-surveillance.html#M201901100\">allows "
+"Amazon to watch</a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -1635,7 +1635,7 @@
#. type: Content of: <ul><li><p>
msgid ""
"The article focuses on a further nasty fillip, that sales of the broken "
-"devices continued. But I think that is a secondary issue; it made the nasty "
+"devices continued. But we think that is a secondary issue; it made the nasty "
"consequences extend to some additional people. The fundamental wrong was to "
"design the devices to depend on something else that didn't respect users' "
"freedom."
@@ -2709,13 +2709,13 @@
msgstr ""
#. type: Content of: <ul><li><p>
-msgid "I expect that Chrysler and the NSA can do this too."
+msgid "We expect that Chrysler and the NSA can do this too."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"If I ever own a car, and it contains a portable phone, I will deactivate "
-"that."
+"If you own a car that contains a phone modem, it would be a good idea to "
+"deactivate this."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -2908,7 +2908,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Morally I see no difference between having human workers listen and having "
+"Morally, we see no difference between having human workers listen and having "
"speech-recognition systems listen. Both intrude on privacy."
msgstr ""
@@ -3602,9 +3602,9 @@
"(in an article blocked from us by a paywall) reports that <a href=\"http://"
"www.theverge.com/2013/8/1/4580718/fbi-can-remotely-activate-android-and-"
"laptop-microphones-reports-wsj\"> the FBI can remotely activate the GPS and "
-"microphone in Android phones and laptops</a>. (I suspect this means Windows "
-"laptops.) Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm"
-"\">more info</a>."
+"microphone in Android phones and laptops</a> (presumably Windows laptops). "
+"Here is <a href=\"http://cryptome.org/2013/08/fbi-hackers.htm\">more info</"
+"a>."
msgstr ""
#. type: Content of: <ul><li><p>
@@ -4874,7 +4874,7 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I think that lawsuit is about a side issue. What the company does with the "
+"We think that lawsuit is about a side issue. What the company does with the "
"data is a secondary issue. The principal wrong here is that the company gets "
"that data at all."
msgstr ""
@@ -4934,8 +4934,8 @@
#. type: Content of: <ul><li><p>
msgid ""
-"I expect it implements DRM, too—that there is no way to save a "
-"recording. But I can't be sure from the article."
+"We expect it implements DRM, too—that there is no way to save a "
+"recording. But we can't be sure from the article."
msgstr ""
#. type: Content of: <ul><li><p>
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/07
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/10
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/11
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/13
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/09/14
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=