[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 19 Oct 2019 06:32:24 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/10/19 06:32:24
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-apple.de-diff.html malware-apple.de.po
malware-apple.es.po malware-apple.fr.po
malware-apple.it-diff.html malware-apple.it.po
malware-apple.ja-diff.html malware-apple.ja.po
malware-apple.nl-diff.html malware-apple.nl.po
malware-apple.pot malware-apple.ru.po nl.po
pl.po pot proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.211&r2=1.212
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.260&r2=1.261
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de-diff.html?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.de.po?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.fr.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.it.po?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ja.po?cvsroot=www&r1=1.122&r2=1.123
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.nl.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.pot?cvsroot=www&r1=1.87&r2=1.88
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.ru.po?cvsroot=www&r1=1.226&r2=1.227
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.149&r2=1.150
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.33&r2=1.34
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.132&r2=1.133
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.24&r2=1.25
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.143&r2=1.144
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.60&r2=1.61
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.58&r2=1.59
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.106&r2=1.107
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.74&r2=1.75
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.99&r2=1.100
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.314&r2=1.315
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.480&r2=1.481
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.327&r2=1.328
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.308&r2=1.309
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.248&r2=1.249
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.574&r2=1.575
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.133&r2=1.134
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.175&r2=1.176
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.231&r2=1.232
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.145&r2=1.146
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.151&r2=1.152
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.241&r2=1.242
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.312&r2=1.313
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.125&r2=1.126
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.136&r2=1.137
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.320&r2=1.321
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.150&r2=1.151
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- de.po 19 Oct 2019 10:01:29 -0000 1.150
+++ de.po 19 Oct 2019 10:32:21 -0000 1.151
@@ -1862,14 +1862,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -10154,19 +10154,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.211
retrieving revision 1.212
diff -u -b -r1.211 -r1.212
--- es.po 19 Oct 2019 10:01:30 -0000 1.211
+++ es.po 19 Oct 2019 10:32:21 -0000 1.212
@@ -1754,14 +1754,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -9591,19 +9591,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.260
retrieving revision 1.261
diff -u -b -r1.260 -r1.261
--- fr.po 19 Oct 2019 10:01:30 -0000 1.260
+++ fr.po 19 Oct 2019 10:32:22 -0000 1.261
@@ -1647,14 +1647,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -8800,19 +8800,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- it.po 19 Oct 2019 10:01:30 -0000 1.150
+++ it.po 19 Oct 2019 10:32:22 -0000 1.151
@@ -1843,14 +1843,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -9494,19 +9494,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- ja.po 19 Oct 2019 10:01:30 -0000 1.157
+++ ja.po 19 Oct 2019 10:32:22 -0000 1.158
@@ -1429,14 +1429,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -7331,19 +7331,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: malware-apple.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de-diff.html,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- malware-apple.de-diff.html 19 Oct 2019 10:01:30 -0000 1.50
+++ malware-apple.de-diff.html 19 Oct 2019 10:32:22 -0000 1.51
@@ -885,22 +885,22 @@
programs.</p>
<p>Here</strong></del></span> <span class="inserted"><ins><em>users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app</em></ins></span> is <span class="removed"><del><strong>an article
about the</strong></del></span> <span class="inserted"><ins><em>mandatory at
some workplaces.</p>
- <p>(1) The</em></ins></span> <a
+ <p>Note: The</em></ins></span> <a
<span
class="removed"><del><strong>href="http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/">
code signing</a> that</strong></del></span>
<span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>iThings use to lock up</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that</em></ins></span> the <span
class="removed"><del><strong>user.</p>
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>iThings use to lock up</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that</em></ins></span> the <span
class="removed"><del><strong>user.</p>
<p>Curiously, Apple is beginning to allow limited passage
through</strong></del></span> <span class="inserted"><ins><em>tests were only
performed on</em></ins></span> the
-<span class="removed"><del><strong>walls</strong></del></span>
- <span class="inserted"><ins><em>Android version</em></ins></span> of the
<span class="removed"><del><strong>iThing jail: users can now
install</strong></del></span> <span class="inserted"><ins><em>app, and that,
according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+<span class="removed"><del><strong>walls</strong></del></span> <span
class="inserted"><ins><em>Android version</em></ins></span>
+ of the <span class="removed"><del><strong>iThing jail: users can now
install</strong></del></span> <span class="inserted"><ins><em>app, and that,
according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201905280">
@@ -1278,7 +1278,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:30 $
+$Date: 2019/10/19 10:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.de.po,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- malware-apple.de.po 19 Oct 2019 10:01:30 -0000 1.145
+++ malware-apple.de.po 19 Oct 2019 10:32:22 -0000 1.146
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-apple.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1228,14 +1228,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: malware-apple.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- malware-apple.es.po 19 Oct 2019 10:01:30 -0000 1.168
+++ malware-apple.es.po 19 Oct 2019 10:32:22 -0000 1.169
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -1089,14 +1089,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: malware-apple.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.fr.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- malware-apple.fr.po 19 Oct 2019 10:01:30 -0000 1.175
+++ malware-apple.fr.po 19 Oct 2019 10:32:22 -0000 1.176
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-10-16 12:46+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -1091,14 +1091,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: malware-apple.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- malware-apple.it-diff.html 19 Oct 2019 10:01:30 -0000 1.58
+++ malware-apple.it-diff.html 19 Oct 2019 10:32:22 -0000 1.59
@@ -697,18 +697,18 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish</em></ins></span>
in <span class="inserted"><ins><em>the users'
- phone, as “superusers.”(1) Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
+ phone, as “superusers.” Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
not involve making</strong></del></span>
<span class="inserted"><ins><em>app is mandatory at some
workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>program that runs</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated,
- but readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way that hurts the user.
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>program that runs</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way that hurts the user.
But they are</strong></del></span> <span class="inserted"><ins><em>text
editor) includes</em></ins></span> a <span class="removed"><del><strong>lot
like malware, since they are technical Apple
-actions</strong></del></span>
- <span class="inserted"><ins><em>clarification saying</em></ins></span>
that <span class="removed"><del><strong>harm to</strong></del></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the
- Android version</em></ins></span> of <span
class="removed"><del><strong>specific Apple software.</p>
+actions</strong></del></span> <span class="inserted"><ins><em>clarification
+ saying</em></ins></span> that <span class="removed"><del><strong>harm
to</strong></del></span> the <span
class="removed"><del><strong>users</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the Android
version</em></ins></span>
+ of <span class="removed"><del><strong>specific Apple software.</p>
<ul>
<li>
@@ -716,9 +716,9 @@
model iThings</a>.</p>
<p>Meanwhile, Apple stops people from fixing problems themselves;
- that's</strong></del></span> the <span
class="removed"><del><strong>nature</strong></del></span> <span
class="inserted"><ins><em>app, and that, according to Apple, “this
- kind</em></ins></span> of <span class="removed"><del><strong>proprietary
software.</p></strong></del></span> <span
class="inserted"><ins><em>‘superuser’ surveillance could not be
conducted
- on Apple's operating system.”</p></em></ins></span>
+ that's</strong></del></span> the <span
class="removed"><del><strong>nature</strong></del></span> <span
class="inserted"><ins><em>app, and that, according to Apple, “this
kind</em></ins></span> of <span class="removed"><del><strong>proprietary
software.</p></strong></del></span>
+ <span class="inserted"><ins><em>‘superuser’ surveillance could
not be conducted on
+ Apple's operating system.”</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
@@ -1154,7 +1154,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:30 $
+$Date: 2019/10/19 10:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.it.po,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- malware-apple.it.po 19 Oct 2019 10:01:30 -0000 1.139
+++ malware-apple.it.po 19 Oct 2019 10:32:22 -0000 1.140
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:01+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1252,14 +1252,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: malware-apple.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- malware-apple.ja-diff.html 19 Oct 2019 10:01:30 -0000 1.71
+++ malware-apple.ja-diff.html 19 Oct 2019 10:32:22 -0000 1.72
@@ -688,20 +688,20 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish</em></ins></span>
in <span class="inserted"><ins><em>the users'
- phone, as “superusers.”(1) Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
+ phone, as “superusers.” Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
not involve making</strong></del></span>
<span class="inserted"><ins><em>app is mandatory at some
workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>program that runs</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated,
- but readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a
- clarification saying</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> the <span
class="removed"><del><strong>user.
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>program that runs</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a clarification
+ saying</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> the <span
class="removed"><del><strong>user.
But they are a lot like malware, since they are technical Apple
-actions</strong></del></span> <span class="inserted"><ins><em>tests were only
performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+actions</strong></del></span> <span class="inserted"><ins><em>tests were only
performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201905280">
@@ -1118,7 +1118,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:30 $
+$Date: 2019/10/19 10:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ja.po,v
retrieving revision 1.122
retrieving revision 1.123
diff -u -b -r1.122 -r1.123
--- malware-apple.ja.po 19 Oct 2019 10:01:31 -0000 1.122
+++ malware-apple.ja.po 19 Oct 2019 10:32:22 -0000 1.123
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2016-12-20 14:42+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -936,14 +936,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: malware-apple.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- malware-apple.nl-diff.html 19 Oct 2019 10:01:31 -0000 1.76
+++ malware-apple.nl-diff.html 19 Oct 2019 10:32:22 -0000 1.77
@@ -688,20 +688,20 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish</em></ins></span>
in <span class="inserted"><ins><em>the users'
- phone, as “superusers.”(1) Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
+ phone, as “superusers.” Downloading and
using</em></ins></span> this <span class="removed"><del><strong>section are not
precisely malware, since they do
not involve making</strong></del></span>
<span class="inserted"><ins><em>app is mandatory at some
workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>program that runs</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated,
- but readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a
- clarification saying</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> the <span
class="removed"><del><strong>user.
+ Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>program that runs</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
+ readable after copy-pasting</em></ins></span> in a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a clarification
+ saying</em></ins></span> that <span
class="removed"><del><strong>hurts</strong></del></span> the <span
class="removed"><del><strong>user.
But they are a lot like malware, since they are technical Apple
-actions</strong></del></span> <span class="inserted"><ins><em>tests were only
performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+actions</strong></del></span> <span class="inserted"><ins><em>tests were only
performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201905280">
@@ -1118,7 +1118,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:31 $
+$Date: 2019/10/19 10:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: malware-apple.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.nl.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- malware-apple.nl.po 19 Oct 2019 10:01:31 -0000 1.77
+++ malware-apple.nl.po 19 Oct 2019 10:32:22 -0000 1.78
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2017-01-10 22:15+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -912,14 +912,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: malware-apple.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.pot,v
retrieving revision 1.87
retrieving revision 1.88
diff -u -b -r1.87 -r1.88
--- malware-apple.pot 19 Oct 2019 10:01:31 -0000 1.87
+++ malware-apple.pot 19 Oct 2019 10:32:22 -0000 1.88
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -745,13 +745,13 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a "
"back-door allowing developers to run any code they wish in the users' phone, "
-"as “superusers.”(1) Downloading and using this app is mandatory "
-"at some workplaces."
+"as “superusers.” Downloading and using this app is mandatory at "
+"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a "
+"Note: The <a "
"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
"Washington Post version of the article</a> (partly obfuscated, but readable "
"after copy-pasting in a text editor) includes a clarification saying that "
Index: malware-apple.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.ru.po,v
retrieving revision 1.226
retrieving revision 1.227
diff -u -b -r1.226 -r1.227
--- malware-apple.ru.po 19 Oct 2019 10:01:31 -0000 1.226
+++ malware-apple.ru.po 19 Oct 2019 10:32:22 -0000 1.227
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-apple.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-01-29 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -1081,14 +1081,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- nl.po 19 Oct 2019 10:01:31 -0000 1.151
+++ nl.po 19 Oct 2019 10:32:22 -0000 1.152
@@ -1540,14 +1540,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -6759,19 +6759,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- pl.po 19 Oct 2019 10:01:31 -0000 1.150
+++ pl.po 19 Oct 2019 10:32:22 -0000 1.151
@@ -1260,14 +1260,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -6062,19 +6062,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.149
retrieving revision 1.150
diff -u -b -r1.149 -r1.150
--- pot 19 Oct 2019 10:01:31 -0000 1.149
+++ pot 19 Oct 2019 10:32:22 -0000 1.150
@@ -1117,14 +1117,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -5823,19 +5823,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.33
retrieving revision 1.34
diff -u -b -r1.33 -r1.34
--- proprietary-back-doors.de-diff.html 19 Oct 2019 10:01:31 -0000 1.33
+++ proprietary-back-doors.de-diff.html 19 Oct 2019 10:32:22 -0000 1.34
@@ -445,9 +445,8 @@
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to</em></ins></span> remotely <span
class="removed"><del><strong>deleting apps</a>.</p>
<p>You might well decide</strong></del></span> <span
class="inserted"><ins><em>delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for
Apple</em></ins></span> to <span class="removed"><del><strong>let a security
service that you</strong></del></span> <span class="inserted"><ins><em>have
- this power because of course we can</em></ins></span> trust
- <span class="removed"><del><strong>remotely
<em>deactivate</em> programs</strong></del></span> <span
class="inserted"><ins><em>Apple.</p>
+ “inappropriate”. Jobs said it's OK for
Apple</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>have
+ this power because of course we can trust Apple.</p>
</li>
</ul>
@@ -459,44 +458,25 @@
<p>The Chinese Communist Party's <a
href="/proprietary/proprietary-surveillance.html#M201910130">
“Study the Great Nation” app</a> was found to contain
<a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- a back-door allowing developers to run any code they wish</a> in the
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"></em></ins></span>
+ a <span class="removed"><del><strong>security
service</strong></del></span> <span class="inserted"><ins><em>back-door
allowing developers to run any code they wish</a> in the
users' phone, as “superusers.”</p>
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
readable after copy-pasting in a text editor) includes a clarification
- saying</em></ins></span> that <span class="inserted"><ins><em>the tests
were only performed on the Android version
+ saying</em></ins></span> that <span class="removed"><del><strong>you trust
+ remotely <em>deactivate</em> programs</strong></del></span>
<span class="inserted"><ins><em>the tests were only performed on the Android
version
of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant</em></ins></span> it
<span class="removed"><del><strong>considers malicious.
- But there</strong></del></span> <span class="inserted"><ins><em><a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
- app is mandatory at some workplaces.</p>
-
- <p>(1) The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
- </li>
-
<li id="M201908220">
<p>ChromeBooks are programmed for obsolescence:
- ChromeOS has a universal back door that</em></ins></span> is <span
class="inserted"><ins><em>used for updates and <a
+ ChromeOS has a universal back door</em></ins></span> that <span
class="removed"><del><strong>it considers malicious.
+ But there</strong></del></span> is <span class="inserted"><ins><em>used
for updates and <a
href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
ceases to operate at a predefined date</a>. From then on, there
appears to be</em></ins></span> no <span
class="removed"><del><strong>excuse</strong></del></span> <span
class="inserted"><ins><em>support whatsoever</em></ins></span> for <span
class="removed"><del><strong><em>deleting</em></strong></del></span>
the <span class="removed"><del><strong>programs,</strong></del></span> <span
class="inserted"><ins><em>computer.</p>
@@ -882,7 +862,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:31 $
+$Date: 2019/10/19 10:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.132
retrieving revision 1.133
diff -u -b -r1.132 -r1.133
--- proprietary-back-doors.de.po 19 Oct 2019 10:01:31 -0000 1.132
+++ proprietary-back-doors.de.po 19 Oct 2019 10:32:22 -0000 1.133
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -784,31 +784,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.24
retrieving revision 1.25
diff -u -b -r1.24 -r1.25
--- proprietary-back-doors.es.po 19 Oct 2019 10:01:32 -0000 1.24
+++ proprietary-back-doors.es.po 19 Oct 2019 10:32:22 -0000 1.25
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-09-12 12:36+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -682,31 +682,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.143
retrieving revision 1.144
diff -u -b -r1.143 -r1.144
--- proprietary-back-doors.fr.po 19 Oct 2019 10:01:32 -0000 1.143
+++ proprietary-back-doors.fr.po 19 Oct 2019 10:32:22 -0000 1.144
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-10-04 10:51+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -690,31 +690,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.60
retrieving revision 1.61
diff -u -b -r1.60 -r1.61
--- proprietary-back-doors.it-diff.html 19 Oct 2019 10:01:32 -0000 1.60
+++ proprietary-back-doors.it-diff.html 19 Oct 2019 10:32:22 -0000 1.61
@@ -377,7 +377,7 @@
<p>It is used by 14,000 Android applications.</p>
</li>
-<span class="removed"><del><strong><li><p>ARRIS cable modem has
a</strong></del></span>
+<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
<span class="inserted"><ins><em><li id="M201112080">
<p> In addition to its <a href="#windows-update">universal back
@@ -395,7 +395,12 @@
<li id="M201103070">
<p>In Android, <a
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google has a back door to remotely delete apps</a>. (It was in a
+ Google</em></ins></span> has a
+ <span class="removed"><del><strong><a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in the backdoor</a>.</p>
+</li>
+ <li><p>Caterpillar vehicles come with
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>back door to
remotely delete apps</a>. (It was in a
program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
@@ -409,15 +414,22 @@
malicious so far, the point is that nobody should have such power,
which could also be used maliciously. You might well decide to
let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for allowing it to
- <em>delete</em> the programs, and you should have the right to
decide
- who (if anyone) to trust in this way.</p>
- </li>
+ it considers malicious. But there is no excuse for allowing
it</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span>
+ <span
class="inserted"><ins><em><em>delete</em></em></ins></span> the
<span class="removed"><del><strong>engine</a>
+ remotely.</p></strong></del></span> <span
class="inserted"><ins><em>programs, and you should have the right to decide
+ who (if anyone) to trust in this way.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li><p>
+Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local</strong></del></span>
- <li id="M200808110">
- <p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple to remotely delete apps</a> which Apple considers
+ <span class="inserted"><ins><em><li id="M200808110">
+ <p>The iPhone has a</em></ins></span> back door <span
class="removed"><del><strong>for 4 years</a>.
+</p></li>
+
+<li><p>Users reported</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></em></ins></span>
+ that <span class="inserted"><ins><em>allows Apple to remotely delete
apps</a> which Apple considers
“inappropriate”. Jobs said it's OK for Apple to have
this power because of course we can trust Apple.</p>
</li>
@@ -428,59 +440,28 @@
<ul class="blurbs">
<li id="M201910130.1">
- <p>The Chinese Communist Party's</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor in</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130">
- “Study</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
-</li>
- <li><p>Caterpillar vehicles come with</strong></del></span>
<span class="inserted"><ins><em>Great Nation” app</a> was found to
contain</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- a</em></ins></span> back-door <span class="inserted"><ins><em>allowing
developers</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>run any code they wish</a> in</em></ins></span>
the <span class="removed"><del><strong>engine</a>
- remotely.</p>
- </li>
-<li><p>
-Mac OS X had an</strong></del></span>
- <span class="inserted"><ins><em>users' phone, as
“superusers.”</p>
-
- <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local back door for 4 years</a>.
-</p></li>
-
-<li><p>Users reported</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying</em></ins></span> that <span class="inserted"><ins><em>the tests
were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
- </li>
-
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it</em></ins></span>
<a
+ <p>The Chinese Communist Party's</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access</em></ins></span> to <span class="removed"><del><strong>replace
Windows 7</strong></del></span> <span class="inserted"><ins><em>the phone's
microphone, photos, text messages, contacts,</em></ins></span> and <span
class="removed"><del><strong>8 with all-spying
+ Microsoft</strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130">
+ “Study the Great Nation” app</a></em></ins></span> was
<span class="removed"><del><strong>forcing them</strong></del></span> <span
class="inserted"><ins><em>found</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7 and 8 with all-spying
Windows 10</a>.</p>
- <p>Microsoft</strong></del></span>
- <span class="inserted"><ins><em>internet history</a>, and the
Android version</em></ins></span> was <span class="inserted"><ins><em>found to
contain a
- back-door allowing developers to run any code they wish</em></ins></span>
in <span class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>the users'
- phone, as “superusers.”(1) Downloading and using this
- app is mandatory at some workplaces.</p>
+ <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>contain <a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ a back-door allowing developers to run any code they
wish</a></em></ins></span> in <span
class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>the
+ users' phone, as “superusers.”</p>
- <p>(1) The</em></ins></span> <a
+ <p>Note: The</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
attacking computers</strong></del></span>
<span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying</em></ins></span> that <span
class="removed"><del><strong>run Windows 7</strong></del></span> <span
class="inserted"><ins><em>the tests were only performed on the
- Android version of the app,</em></ins></span> and <span
class="removed"><del><strong>8</a>, switching</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be
conducted</em></ins></span>
- on <span class="inserted"><ins><em>Apple's operating
system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying</em></ins></span> that <span class="removed"><del><strong>run
Windows 7</strong></del></span> <span class="inserted"><ins><em>the tests were
only performed on the Android version
+ of the app,</em></ins></span> and <span
class="removed"><del><strong>8</a>, switching</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be
conducted</em></ins></span> on
+ <span class="inserted"><ins><em>Apple's operating system.”</p>
</li>
<li id="M201908220">
@@ -934,7 +915,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:32 $
+$Date: 2019/10/19 10:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary-back-doors.it.po 19 Oct 2019 10:01:32 -0000 1.125
+++ proprietary-back-doors.it.po 19 Oct 2019 10:32:22 -0000 1.126
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -801,31 +801,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.58
retrieving revision 1.59
diff -u -b -r1.58 -r1.59
--- proprietary-back-doors.ja-diff.html 19 Oct 2019 10:01:32 -0000 1.58
+++ proprietary-back-doors.ja-diff.html 19 Oct 2019 10:32:22 -0000 1.59
@@ -241,10 +241,12 @@
<span class="inserted"><ins><em><li id="M201210220">
<p id="swindle-eraser">The Amazon
Kindle-Swindle</em></ins></span> has a back door that <span
class="inserted"><ins><em>has been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
- “upload</strong></del></span>
+ “upload files” as well as forcibly install
+ apps</a>.</p>
+ <p>It is used</strong></del></span>
<span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
- <cite>1984</cite>, by George Orwell.</p>
+ <cite>1984</cite>,</em></ins></span> by <span
class="removed"><del><strong>14,000 Android
applications.</p></strong></del></span> <span
class="inserted"><ins><em>George Orwell.</p>
<p>Amazon responded to criticism by saying it
would delete books only following orders from the
@@ -255,12 +257,15 @@
<p>Do other ebook readers have back doors in their nonfree software?
We
don't know, and we have no way to find out. There is no reason to
- assume that they don't.</p>
+ assume that they don't.</p></em></ins></span>
</li>
- <li id="M201011220">
- <p>The iPhone has a back door for <a
-
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201011220">
+ <p>The iPhone</em></ins></span> has a <span
class="inserted"><ins><em>back door for</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling it without understanding.</p>
</li>
@@ -271,46 +276,69 @@
<ul class="blurbs">
<li id="M201908270">
- <p>A very popular app found in the
- Google Play store contained a module that was designed to <a
-
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
+ <p>A very popular app found</em></ins></span> in the <span
class="removed"><del><strong>backdoor</a>.</p>
+</li>
+ <li><p>Caterpillar vehicles come with</strong></del></span>
+ <span class="inserted"><ins><em>Google Play store contained a module that
was designed to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
install malware on the user's computer</a>. The app developers
- regularly used it to make the computer download and execute any code
+ regularly used it</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> the <span
class="removed"><del><strong>engine</a>
+ remotely.</p></strong></del></span> <span
class="inserted"><ins><em>computer download and execute any code
they wanted.</p>
<p>This is a concrete example of what users are exposed to when they
run nonfree apps. They can never be completely sure that a nonfree
- app is safe.</p>
+ app is safe.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li><p>
+Mac OS X had an</strong></del></span>
- <li id="M201907100">
- <p>Apple appears to say that <a
- href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
- there is a back door in MacOS</a> for automatically updating some
+ <span class="inserted"><ins><em><li id="M201907100">
+ <p>Apple appears to say that</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a</em></ins></span> back door <span class="inserted"><ins><em>in
MacOS</a></em></ins></span> for <span class="removed"><del><strong>4
years</a>.
+</p></li>
+
+<li><p>Users reported</strong></del></span> <span
class="inserted"><ins><em>automatically updating some
(all?) apps.</p>
<p>The specific change described in the article was not
malicious—it protected users from surveillance by third
- parties—but that is a separate question.</p>
+ parties—but</em></ins></span> that <span
class="inserted"><ins><em>is a separate question.</p>
</li>
<li id="M201811100">
- <p>Corel Paintshop Pro has a <a
-
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
- back door that can make it cease to function</a>.</p>
+ <p>Corel Paintshop Pro has a</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7</strong></del></span> <span
class="inserted"><ins><em>function</a>.</p>
- <p>The article is full of confusions, errors and biases that we have
- an obligation to expose, given that we are making a link to them.</p>
+ <p>The article is full of confusions, errors</em></ins></span> and
<span class="removed"><del><strong>8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was in fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers</strong></del></span> <span
class="inserted"><ins><em>biases</em></ins></span> that <span
class="removed"><del><strong>run Windows 7 and 8</a>, switching on a
flag</strong></del></span> <span class="inserted"><ins><em>we have
+ an obligation to expose, given</em></ins></span> that <span
class="removed"><del><strong>said whether</strong></del></span> <span
class="inserted"><ins><em>we are making a link</em></ins></span> to <span
class="removed"><del><strong>“upgrade”</strong></del></span> <span
class="inserted"><ins><em>them.</p>
<ul>
- <li>Getting a patent does not “enable” a company to do
- any particular thing in its products. What it does enable the company
- to do is sue other companies if they do some particular thing in
+ <li>Getting a patent does not “enable” a
company</em></ins></span> to <span class="removed"><del><strong>Windows 10 when
users
+ had turned</strong></del></span> <span class="inserted"><ins><em>do
+ any particular thing in its products. What</em></ins></span> it <span
class="removed"><del><strong>off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject</strong></del></span> <span
class="inserted"><ins><em>does enable</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
+ to <span class="removed"><del><strong>Windows 10</a>.</p>
+
+ <p>This seems</strong></del></span> <span
class="inserted"><ins><em>do is sue other companies if they do some particular
thing in
their products.</li>
- <li>A company's policies about when to attack users through a back
- door are beside the point. Inserting the back door is wrong in the
- first place, and using the back door is always wrong too. No software
+ <li>A company's policies about when</em></ins></span> to <span
class="removed"><del><strong>involve use of</strong></del></span> <span
class="inserted"><ins><em>attack users through</em></ins></span> a back
+ door <span class="inserted"><ins><em>are beside the point. Inserting the
back door is wrong</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>the
+ first place,</em></ins></span> and <span
class="removed"><del><strong>8.</p></strong></del></span> <span
class="inserted"><ins><em>using the back door is always wrong too. No software
developer should have that power over users.</li>
<li>“<a
@@ -329,239 +357,182 @@
that you're “protecting the boundary line”. The kids can't do
harm
to the boundary line, not even with a jackhammer, because it is an
abstraction and can't be affected by physical action.</p></li>
- </ul>
+ </ul></em></ins></span>
</li>
- <li id="M201804010">
+<span class="removed"><del><strong><li>
+<p>Most mobile phones have</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install a surveillance app</a>.</p>
+ load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>universal back door, which has been
used</strong></del></span> <span class="inserted"><ins><em>surveillance
app</a>.</p>
- <p>We link to the article for the facts it presents. It
+ <p>We link</em></ins></span> to <span class="inserted"><ins><em>the
article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering to Netflix. The Netflix app <a
- href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p>
+ moral weakness of surrendering to Netflix. The Netflix
app</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
+</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p></em></ins></span>
</li>
- <li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A Chinese version of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201511090">
+ <p>Baidu's proprietary</em></ins></span> Android <span
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span
class="removed"><del><strong>universal back door</a>. Nearly all
+models of mobile phones have a universal</strong></del></span> back door <span
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother to introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>that <a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload</em></ins></span> files” as well as forcibly
install
+ can “upload files” as well as forcibly install
apps</a>.</p>
- <p>It is used by 14,000 Android applications.</p>
+ <p>It</em></ins></span> is <span
class="removed"><del><strong>controlled</strong></del></span> <span
class="inserted"><ins><em>used</em></ins></span> by <span
class="removed"><del><strong>Coolpad.
+</p></strong></del></span> <span class="inserted"><ins><em>14,000
Android applications.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
+<span class="removed"><del><strong><li>
+<p>Microsoft</strong></del></span>
<span class="inserted"><ins><em><li id="M201112080">
<p> In addition to its <a href="#windows-update">universal back
- door</a>, Windows 8 has a back door for <a
-
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ door</a>,</em></ins></span> Windows <span
class="inserted"><ins><em>8</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>through which</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever can be imposed on</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
- But there is no excuse for <em>deleting</em> the programs, and
you
- should have the right to decide whom (if anyone) to trust in this
- way.</p>
+ But there is no excuse for <em>deleting</em></em></ins></span>
the <span class="removed"><del><strong>users</a>.
+</p>
+<p>More information on when
+<a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"></strong></del></span>
<span class="inserted"><ins><em>programs, and you
+ should have the right to decide whom (if anyone) to trust
in</em></ins></span> this <span class="removed"><del><strong>was used</a>.
+</p></strong></del></span>
+ <span class="inserted"><ins><em>way.</p>
</li>
- <li id="M201103070">
- <p>In Android, <a
+ <li id="M201103070"></em></ins></span>
+ <p>In <span class="removed"><del><strong>Windows 10, the
universal</strong></del></span> <span class="inserted"><ins><em>Android, <a
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google</em></ins></span> has a
- <span class="removed"><del><strong><a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor in the backdoor</a>.</p>
-</li>
- <li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>back door to
remotely delete apps</a>. (It was in a
+ Google has a</em></ins></span> back door <span
class="removed"><del><strong>is no longer hidden; all
+“upgrades” will
+be</strong></del></span> <span class="inserted"><ins><em>to remotely delete
apps</a>. (It was in a
program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
- <p>Google can also <a
-
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through GTalkService. This is
- not equivalent to a universal back door, but permits various dirty
+ <p>Google can also</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
+</p>
+</li>
+
+<li>
+<p>Windows 8's</strong></del></span> <span
class="inserted"><ins><em>remotely install apps</a> through GTalkService.
This is
+ not equivalent to a universal</em></ins></span> back <span
class="removed"><del><strong>doors are</strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
tricks.</p>
<p>Although Google's <em>exercise</em> of this power has
not been
- malicious so far, the point is that nobody should have such power,
+ malicious</em></ins></span> so <span
class="removed"><del><strong>gaping</strong></del></span> <span
class="inserted"><ins><em>far, the point is that nobody should have such power,
which could also be used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for allowing
it</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span>
- <span
class="inserted"><ins><em><em>delete</em></em></ins></span> the
<span class="removed"><del><strong>engine</a>
- remotely.</p></strong></del></span> <span
class="inserted"><ins><em>programs, and you should have the right to decide
+ let a security service remotely <em>deactivate</em>
programs</em></ins></span> that
+<span class="removed"><del><strong><a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
+the German government has decided</strong></del></span>
+ it <span class="removed"><del><strong>can't be trusted</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>considers
malicious. But there is no excuse for allowing it to
+ <em>delete</em> the programs, and you should have the right to
decide
who (if anyone) to trust in this way.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li><p>
-Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local</strong></del></span>
- <span class="inserted"><ins><em><li id="M200808110">
- <p>The iPhone has a</em></ins></span> back door <span
class="removed"><del><strong>for 4 years</a>.
-</p></li>
+<span class="removed"><del><strong><li></strong></del></span>
-<li><p>Users reported</strong></del></span> <span
class="inserted"><ins><em><a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html"></em></ins></span>
- that <span class="inserted"><ins><em>allows Apple to remotely delete
apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for Apple to have
- this power because of course we can trust Apple.</p>
+ <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
+ <p>The iPhone has a back door <a
+
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+ that allows Apple to remotely delete apps</a> which Apple considers
+ “inappropriate”. Jobs said it's <span
class="removed"><del><strong>ok</strong></del></span> <span
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
+ this power because of course we can trust <span
class="removed"><del><strong>Apple.
+</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
</li>
-</ul>
+
+<span class="removed"><del><strong><li></strong></del></span>
+<span class="inserted"><ins><em></ul>
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
- <li id="M201910130.1">
- <p>The Chinese Communist Party's</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft</strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201910130">
- “Study the Great Nation” app</a></em></ins></span> was
<span class="removed"><del><strong>forcing them</strong></del></span> <span
class="inserted"><ins><em>found</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7 and 8 with all-spying
- Windows 10</a>.</p>
-
- <p>Microsoft was in fact</strong></del></span> <span
class="inserted"><ins><em>contain</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- a back-door allowing developers to</em></ins></span> run <span
class="removed"><del><strong>Windows 7 and 8</a>, switching
on</strong></del></span> <span class="inserted"><ins><em>any code they
wish</a> in the
+ <li id="M201910130.1"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's <a
+ href="/proprietary/proprietary-surveillance.html#M201910130">
+ “Study the Great Nation” app</a> was found to contain
<a
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ a back-door allowing developers to run any code they wish</a> in the
users' phone, as “superusers.”</p>
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes</em></ins></span> a
<span class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>clarification
- saying</em></ins></span> that <span class="removed"><del><strong>said
whether to “upgrade”</strong></del></span> <span
class="inserted"><ins><em>the tests were only performed on the Android version
- of the app, and that, according</em></ins></span> to <span
class="removed"><del><strong>Windows 10 when</strong></del></span> <span
class="inserted"><ins><em>Apple, “this kind of
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires</em></ins></span> users
- <span class="removed"><del><strong>had turned</strong></del></span> <span
class="inserted"><ins><em>to grant</em></ins></span> it <span
class="removed"><del><strong>off.</p>
-
- <p>Later on, Microsoft published instructions
on</strong></del></span> <a
- <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access</em></ins></span> to <span class="removed"><del><strong>permanently
reject</strong></del></span> the <span class="removed"><del><strong>downgrade
to Windows 10</a>.</p>
-
- <p>This seems</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
- internet history</a>, and the Android version was
found</em></ins></span> to <span class="removed"><del><strong>involve use
of</strong></del></span> <span
class="inserted"><ins><em>contain</em></ins></span> a <span
class="removed"><del><strong>back door</strong></del></span>
- <span class="inserted"><ins><em>back-door allowing developers to run any
code they wish</em></ins></span> in <span class="removed"><del><strong>Windows
7</strong></del></span> <span class="inserted"><ins><em>the users'
- phone, as “superusers.”(1) Downloading</em></ins></span> and
<span class="removed"><del><strong>8.</p>
-</li>
-
-<li>
-<p>Most mobile phones have a universal back door, which has been used
to</strong></del></span> <span class="inserted"><ins><em>using this
- app is mandatory at some workplaces.</p>
-
- <p>(1) The</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
+ <li id="M201908220">
+ <p>ChromeBooks are programmed for obsolescence:
+ ChromeOS</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back door <span
class="inserted"><ins><em>that is used</em></ins></span> for
+<span class="removed"><del><strong><a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
enabling
+it without understanding.
</p>
</li>
<li>
-<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese</strong></del></span>
- <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post</em></ins></span> version of <span
class="removed"><del><strong>Android has</strong></del></span> <span
class="inserted"><ins><em>the article</a> (partly obfuscated,
- but readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>universal back door</a>. Nearly all
-models of mobile phones have</strong></del></span> <span
class="inserted"><ins><em>text editor) includes</em></ins></span> a <span
class="removed"><del><strong>universal back door in</strong></del></span>
- <span class="inserted"><ins><em>clarification saying
that</em></ins></span> the <span class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the
- Android version of the app, and that, according</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this one is controlled
-by Coolpad.
-</p></strong></del></span> <span class="inserted"><ins><em>Apple,
“this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>Microsoft Windows</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908220">
- <p>ChromeBooks are programmed for obsolescence:
- ChromeOS</em></ins></span> has a universal back door <span
class="removed"><del><strong>through which</strong></del></span> <span
class="inserted"><ins><em>that is used for updates and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can</strong></del></span>
+ <p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>updates</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
ceases to operate at a predefined date</a>. From then on, there
- appears to</em></ins></span> be <span class="removed"><del><strong>imposed
on</strong></del></span> <span class="inserted"><ins><em>no support whatsoever
for</em></ins></span> the <span class="removed"><del><strong>users</a>.
-</p>
-<p>More information on when
-<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
-this was used</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>computer.</p></em></ins></span>
-
- <p>In <span class="removed"><del><strong>Windows
10,</strong></del></span> <span class="inserted"><ins><em>other words, when you
stop getting screwed by</em></ins></span> the <span
class="removed"><del><strong>universal back door is no longer hidden; all
-“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
-and immediately imposed</a>.
-</p>
-</li>
+ appears to be no support whatsoever</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may</strong></del></span> <span
class="inserted"><ins><em>computer.</p>
-<li>
-<p>Windows 8's</strong></del></span> back <span
class="removed"><del><strong>doors are so gaping that
-<a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span class="inserted"><ins><em>door,
- you start getting screwed by</em></ins></span> the <span
class="removed"><del><strong>German government has decided it can't be
trusted</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>obsolescence.</p></em></ins></span>
+ <p>In other words, when you stop getting screwed by the back door,
+ you start getting screwed by the obsolescence.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201902011"></em></ins></span>
- <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>FordPass Connect feature of some Ford
vehicles</em></ins></span> has <span class="removed"><del><strong>a back
door</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
-that allows Apple</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
-“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
- connected</em></ins></span> to <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
+ <li id="M201902011">
+ <p>The FordPass Connect feature of some Ford vehicles has <a
+
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access to the internal car network</a>. It is
constantly
+ connected to the cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>this power
-because</strong></del></span> <span class="inserted"><ins><em>you succeeded in
breaking the
+ <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>improved with</strong></del></span> <span
class="inserted"><ins><em>you succeeded in breaking the
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
<li id="M201812300">
- <p>New GM cars <a
- href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
-</p></strong></del></span> <span class="inserted"><ins><em>a universal
back door</a>.</p>
+ <p>New GM cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
+ offer the feature of a universal back door</a>.</p>
- <p>Every nonfree program offers the user zero security against its
+ <p>Every nonfree program offers the user zero</em></ins></span>
security <span class="removed"><del><strong>improvements</a>;
but</strong></del></span> <span class="inserted"><ins><em>against its
developer. With this malfeature, GM has explicitly made things even
- worse.</p></em></ins></span>
+ worse.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711244"></em></ins></span>
- <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>back door for
-<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
-remote wipe</a>. It's not always enabled, but users are led into
enabling
-it without understanding.
-</p>
-</li>
-
-<li>
- <p>Apple can, and regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones for</strong></del></span>
+ <li id="M201711244">
+ <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may have improved with
- <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8 security improvements</a>; but
- <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span> <span
class="inserted"><ins><em>product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
+ universal back door</a>. If the product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
listening device, remote changes to the code could surely convert it
into one.</p></em></ins></span>
</li>
@@ -911,7 +882,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:32 $
+$Date: 2019/10/19 10:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.106
retrieving revision 1.107
diff -u -b -r1.106 -r1.107
--- proprietary-back-doors.ja.po 19 Oct 2019 10:01:32 -0000 1.106
+++ proprietary-back-doors.ja.po 19 Oct 2019 10:32:22 -0000 1.107
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -625,31 +625,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.74
retrieving revision 1.75
diff -u -b -r1.74 -r1.75
--- proprietary-back-doors.pot 19 Oct 2019 10:01:33 -0000 1.74
+++ proprietary-back-doors.pot 19 Oct 2019 10:32:22 -0000 1.75
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -475,29 +475,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a "
-"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\">
"
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a "
-"back-door allowing developers to run any code they wish in the users' phone, "
-"as “superusers.”(1) Downloading and using this app is mandatory "
-"at some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a "
-"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
-"Washington Post version of the article</a> (partly obfuscated, but readable "
-"after copy-pasting in a text editor) includes a clarification saying that "
-"the tests were only performed on the Android version of the app, and that, "
-"according to Apple, “this kind of ‘superuser’ surveillance "
-"could not be conducted on Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a "
"href=\"https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\">
"
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary-back-doors.ru.po 19 Oct 2019 10:01:33 -0000 1.192
+++ proprietary-back-doors.ru.po 19 Oct 2019 10:32:22 -0000 1.193
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -676,31 +676,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"ChromeBooks are programmed for obsolescence: ChromeOS has a universal back "
"door that is used for updates and <a href=\"https://www.theregister.co."
"uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/\"> "
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.99
retrieving revision 1.100
diff -u -b -r1.99 -r1.100
--- proprietary-surveillance.de-diff.html 19 Oct 2019 10:01:33 -0000
1.99
+++ proprietary-surveillance.de-diff.html 19 Oct 2019 10:32:22 -0000
1.100
@@ -974,17 +974,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201909091">
@@ -3601,7 +3601,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:33 $
+$Date: 2019/10/19 10:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.314
retrieving revision 1.315
diff -u -b -r1.314 -r1.315
--- proprietary-surveillance.de.po 19 Oct 2019 10:01:33 -0000 1.314
+++ proprietary-surveillance.de.po 19 Oct 2019 10:32:22 -0000 1.315
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -1975,14 +1975,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- proprietary-surveillance.es.po 19 Oct 2019 10:01:33 -0000 1.7
+++ proprietary-surveillance.es.po 19 Oct 2019 10:32:22 -0000 1.8
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-10-04 10:39+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish\n"
@@ -1486,14 +1486,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.480
retrieving revision 1.481
diff -u -b -r1.480 -r1.481
--- proprietary-surveillance.fr.po 19 Oct 2019 10:01:33 -0000 1.480
+++ proprietary-surveillance.fr.po 19 Oct 2019 10:32:22 -0000 1.481
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-10-03 13:12+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -1483,14 +1483,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary-surveillance.it-diff.html 19 Oct 2019 10:01:33 -0000
1.166
+++ proprietary-surveillance.it-diff.html 19 Oct 2019 10:32:22 -0000
1.167
@@ -1107,7 +1107,7 @@
<span class="removed"><del><strong>user must explicitly opt-in
before</strong></del></span> <span class="inserted"><ins><em>phone's
microphone, photos, text messages, contacts, and
internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>app takes effect. However,</strong></del></span>
<span class="inserted"><ins><em>Android version was found to contain a
back-door allowing developers to run any code they wish
in</em></ins></span> the <span class="inserted"><ins><em>users'
- phone, as “superusers.”(1) Downloading and using
this</em></ins></span>
+ phone, as “superusers.” Downloading and using
this</em></ins></span>
app <span class="removed"><del><strong>remains spyware—an
“optional” piece of spyware</strong></del></span> is
<span class="removed"><del><strong>still spyware.</p>
</li>
@@ -1115,22 +1115,22 @@
<li><p>The Meitu photo-editing
app</strong></del></span> <span class="inserted"><ins><em>mandatory at some
workplaces.</p>
- <p>(1) The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
user data to</strong></del></span>
<span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>Chinese company</a>.</p></li>
- <li><p>A pregnancy test controller application
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes
a
- clarification saying that the tests were</em></ins></span> only
- <span class="removed"><del><strong>can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>performed</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>the
- Android version</em></ins></span> of <span
class="removed"><del><strong>data in</strong></del></span> the <span
class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
+ <li><p>A pregnancy test controller application
not</strong></del></span> <span class="inserted"><ins><em>text editor) includes
a clarification
+ saying that the tests were</em></ins></span> only
+ <span class="removed"><del><strong>can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
<span class="inserted"><ins><em>performed</em></ins></span> on <span
class="removed"><del><strong>many sorts</strong></del></span> <span
class="inserted"><ins><em>the Android version</em></ins></span>
+ of <span class="removed"><del><strong>data in</strong></del></span> the
<span class="removed"><del><strong>phone,</strong></del></span> <span
class="inserted"><ins><em>app,</em></ins></span> and <span
class="removed"><del><strong>in server accounts, it can
alter them too</a>.
</p></li>
- <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ <li><p>The Uber</strong></del></span> <span
class="inserted"><ins><em>that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201909091">
@@ -3359,7 +3359,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:33 $
+$Date: 2019/10/19 10:32:22 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.327
retrieving revision 1.328
diff -u -b -r1.327 -r1.328
--- proprietary-surveillance.it.po 19 Oct 2019 10:01:33 -0000 1.327
+++ proprietary-surveillance.it.po 19 Oct 2019 10:32:23 -0000 1.328
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -1908,14 +1908,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary-surveillance.ja-diff.html 19 Oct 2019 10:01:34 -0000
1.182
+++ proprietary-surveillance.ja-diff.html 19 Oct 2019 10:32:23 -0000
1.183
@@ -1046,26 +1046,26 @@
sent across</strong></del></span> <span
class="inserted"><ins><em>phone's microphone, photos, text messages, contacts,
and
internet history</a>, and</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>Android version was found</em></ins></span> to <span
class="removed"><del><strong>Facebook's servers</strong></del></span> <span
class="inserted"><ins><em>contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading</em></ins></span> and
<span class="removed"><del><strong>face-recognition
+ phone, as “superusers.” Downloading</em></ins></span> and
<span class="removed"><del><strong>face-recognition
algorithms.</p>
<p>If so, none</strong></del></span> <span
class="inserted"><ins><em>using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version</em></ins></span> of <span
class="removed"><del><strong>Facebook users' pictures are private
- anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>article</a>
(partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ anymore, even if</strong></del></span> the <span
class="removed"><del><strong>user didn't “upload” them
to</strong></del></span> <span class="inserted"><ins><em>article</a>
(partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that</em></ins></span> the <span
class="removed"><del><strong>service.</p>
</li>
<li><p>Like most “music screaming” disservices,
Spotify
- is based</strong></del></span> <span class="inserted"><ins><em>tests
were only performed</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em>the
- Android version of the app,</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
- 2015 it</strong></del></span> <span class="inserted"><ins><em>that,
according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ is based</strong></del></span> <span class="inserted"><ins><em>tests
were only performed</em></ins></span> on <span
class="removed"><del><strong>proprietary malware (DRM</strong></del></span>
<span class="inserted"><ins><em>the Android version
+ of the app,</em></ins></span> and <span
class="removed"><del><strong>snooping). In August
+ 2015 it</strong></del></span> <span class="inserted"><ins><em>that,
according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201909091">
@@ -3218,7 +3218,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:34 $
+$Date: 2019/10/19 10:32:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.308
retrieving revision 1.309
diff -u -b -r1.308 -r1.309
--- proprietary-surveillance.ja.po 19 Oct 2019 10:01:34 -0000 1.308
+++ proprietary-surveillance.ja.po 19 Oct 2019 10:32:23 -0000 1.309
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -1432,14 +1432,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.248
retrieving revision 1.249
diff -u -b -r1.248 -r1.249
--- proprietary-surveillance.pot 19 Oct 2019 10:01:34 -0000 1.248
+++ proprietary-surveillance.pot 19 Oct 2019 10:32:23 -0000 1.249
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -1042,13 +1042,13 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a "
"back-door allowing developers to run any code they wish in the users' phone, "
-"as “superusers.”(1) Downloading and using this app is mandatory "
-"at some workplaces."
+"as “superusers.” Downloading and using this app is mandatory at "
+"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a "
+"Note: The <a "
"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
"Washington Post version of the article</a> (partly obfuscated, but readable "
"after copy-pasting in a text editor) includes a clarification saying that "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.574
retrieving revision 1.575
diff -u -b -r1.574 -r1.575
--- proprietary-surveillance.ru.po 19 Oct 2019 10:01:34 -0000 1.574
+++ proprietary-surveillance.ru.po 19 Oct 2019 10:32:23 -0000 1.575
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -1469,14 +1469,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.133
retrieving revision 1.134
diff -u -b -r1.133 -r1.134
--- proprietary.de-diff.html 19 Oct 2019 10:01:34 -0000 1.133
+++ proprietary.de-diff.html 19 Oct 2019 10:32:23 -0000 1.134
@@ -195,17 +195,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201910070">
@@ -312,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:34 $
+$Date: 2019/10/19 10:32:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.175
retrieving revision 1.176
diff -u -b -r1.175 -r1.176
--- proprietary.de.po 19 Oct 2019 10:01:34 -0000 1.175
+++ proprietary.de.po 19 Oct 2019 10:32:23 -0000 1.176
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -461,14 +461,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.231
retrieving revision 1.232
diff -u -b -r1.231 -r1.232
--- proprietary.es.po 19 Oct 2019 10:01:34 -0000 1.231
+++ proprietary.es.po 19 Oct 2019 10:32:23 -0000 1.232
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -328,14 +328,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- proprietary.fr.po 19 Oct 2019 10:01:34 -0000 1.279
+++ proprietary.fr.po 19 Oct 2019 10:32:23 -0000 1.280
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-10-16 12:46+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -324,14 +324,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.145
retrieving revision 1.146
diff -u -b -r1.145 -r1.146
--- proprietary.it-diff.html 19 Oct 2019 10:01:35 -0000 1.145
+++ proprietary.it-diff.html 19 Oct 2019 10:32:23 -0000 1.146
@@ -194,17 +194,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201910070">
@@ -311,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:35 $
+$Date: 2019/10/19 10:32:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- proprietary.it.po 19 Oct 2019 10:01:35 -0000 1.184
+++ proprietary.it.po 19 Oct 2019 10:32:23 -0000 1.185
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -465,14 +465,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.ja-diff.html 19 Oct 2019 10:01:35 -0000 1.148
+++ proprietary.ja-diff.html 19 Oct 2019 10:32:23 -0000 1.149
@@ -192,17 +192,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201910070">
@@ -309,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:35 $
+$Date: 2019/10/19 10:32:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- proprietary.ja.po 19 Oct 2019 10:01:35 -0000 1.168
+++ proprietary.ja.po 19 Oct 2019 10:32:23 -0000 1.169
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -325,14 +325,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.nl-diff.html 19 Oct 2019 10:01:35 -0000 1.146
+++ proprietary.nl-diff.html 19 Oct 2019 10:32:23 -0000 1.147
@@ -194,17 +194,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201910070">
@@ -311,7 +311,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:35 $
+$Date: 2019/10/19 10:32:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary.nl.po 19 Oct 2019 10:01:35 -0000 1.158
+++ proprietary.nl.po 19 Oct 2019 10:32:23 -0000 1.159
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -367,14 +367,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary.pl-diff.html 19 Oct 2019 10:01:35 -0000 1.163
+++ proprietary.pl-diff.html 19 Oct 2019 10:32:23 -0000 1.164
@@ -192,17 +192,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201910070">
@@ -309,7 +309,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:35 $
+$Date: 2019/10/19 10:32:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.151
retrieving revision 1.152
diff -u -b -r1.151 -r1.152
--- proprietary.pl.po 19 Oct 2019 10:01:35 -0000 1.151
+++ proprietary.pl.po 19 Oct 2019 10:32:23 -0000 1.152
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -546,14 +546,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary.pot 19 Oct 2019 10:01:35 -0000 1.148
+++ proprietary.pot 19 Oct 2019 10:32:23 -0000 1.149
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -263,13 +263,13 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a "
"back-door allowing developers to run any code they wish in the users' phone, "
-"as “superusers.”(1) Downloading and using this app is mandatory "
-"at some workplaces."
+"as “superusers.” Downloading and using this app is mandatory at "
+"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a "
+"Note: The <a "
"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
"Washington Post version of the article</a> (partly obfuscated, but readable "
"after copy-pasting in a text editor) includes a clarification saying that "
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.241
retrieving revision 1.242
diff -u -b -r1.241 -r1.242
--- proprietary.pt-br.po 19 Oct 2019 10:01:35 -0000 1.241
+++ proprietary.pt-br.po 19 Oct 2019 10:32:23 -0000 1.242
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-10-17 02:11-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -317,14 +317,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.312
retrieving revision 1.313
diff -u -b -r1.312 -r1.313
--- proprietary.ru.po 19 Oct 2019 10:01:36 -0000 1.312
+++ proprietary.ru.po 19 Oct 2019 10:32:23 -0000 1.313
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -327,14 +327,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.125
retrieving revision 1.126
diff -u -b -r1.125 -r1.126
--- proprietary.zh-tw-diff.html 19 Oct 2019 10:01:36 -0000 1.125
+++ proprietary.zh-tw-diff.html 19 Oct 2019 10:32:23 -0000 1.126
@@ -195,17 +195,17 @@
access to the phone's microphone, photos, text messages, contacts, and
internet history</a>, and the Android version was found to contain a
back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.”(1) Downloading and using this
+ phone, as “superusers.” Downloading and using this
app is mandatory at some workplaces.</p>
- <p>(1) The <a
+ <p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated,
- but readable after copy-pasting in a text editor) includes a
- clarification saying that the tests were only performed on the
- Android version of the app, and that, according to Apple, “this
- kind of ‘superuser’ surveillance could not be conducted
- on Apple's operating system.”</p>
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable after copy-pasting in a text editor) includes a clarification
+ saying that the tests were only performed on the Android version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’ surveillance could not be conducted on
+ Apple's operating system.”</p>
</li>
<li id="M201910070">
@@ -312,7 +312,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/10/19 10:01:36 $
+$Date: 2019/10/19 10:32:23 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.136
retrieving revision 1.137
diff -u -b -r1.136 -r1.137
--- proprietary.zh-tw.po 19 Oct 2019 10:01:36 -0000 1.136
+++ proprietary.zh-tw.po 19 Oct 2019 10:32:23 -0000 1.137
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-10-19 09:55+0000\n"
+"POT-Creation-Date: 2019-10-19 10:25+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -439,14 +439,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- pt-br.po 19 Oct 2019 10:01:36 -0000 1.194
+++ pt-br.po 19 Oct 2019 10:32:23 -0000 1.195
@@ -1329,14 +1329,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -6925,19 +6925,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.320
retrieving revision 1.321
diff -u -b -r1.320 -r1.321
--- ru.po 19 Oct 2019 10:01:37 -0000 1.320
+++ ru.po 19 Oct 2019 10:32:23 -0000 1.321
@@ -1650,14 +1650,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -8744,19 +8744,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- zh-tw.po 19 Oct 2019 10:01:37 -0000 1.150
+++ zh-tw.po 19 Oct 2019 10:32:23 -0000 1.151
@@ -1258,14 +1258,14 @@
"access to the phone's microphone, photos, text messages, contacts, and "
"internet history</a>, and the Android version was found to contain a back-"
"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.”(1) Downloading and using this app is mandatory at "
+"“superusers.” Downloading and using this app is mandatory at "
"some workplaces."
msgstr ""
#. type: Content of: <ul><li><p>
msgid ""
-"(1) The <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
+"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
"article</a> (partly obfuscated, but readable after copy-pasting in a text "
@@ -6061,19 +6061,6 @@
#. type: Content of: <ul><li><p>
msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
-#. type: Content of: <ul><li><p>
-msgid ""
"The Furby Connect has a <a href=\"https://www.contextis.com/blog/dont-feed-"
"them-after-midnight-reverse-engineering-the-furby-connect\"> universal back "
"door</a>. If the product as shipped doesn't act as a listening device, "
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/03
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/04
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/05
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/15
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/16
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/19
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/20
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/21
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/28
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/30
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2019/10/31