[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 23 Nov 2019 10:30:45 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 19/11/23 10:30:44
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary-deception.de-diff.html
proprietary-deception.de.po
proprietary-deception.es.po
proprietary-deception.fr.po
proprietary-deception.ja-diff.html
proprietary-deception.ja.po
proprietary-deception.pot
proprietary-deception.ru.po
proprietary-obsolescence.es.po
proprietary-obsolescence.fr.po
proprietary-obsolescence.pot
proprietary-obsolescence.ru.po
proprietary-subscriptions.de-diff.html
proprietary-subscriptions.de.po
proprietary-subscriptions.es.po
proprietary-subscriptions.fr.po
proprietary-subscriptions.ja-diff.html
proprietary-subscriptions.ja.po
proprietary-subscriptions.pot
proprietary-subscriptions.ru.po pt-br.po ru.po
zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.229&r2=1.230
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.279&r2=1.280
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.168&r2=1.169
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.161&r2=1.162
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.36&r2=1.37
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.61&r2=1.62
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.108&r2=1.109
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de-diff.html?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.de.po?cvsroot=www&r1=1.42&r2=1.43
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.es.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.fr.po?cvsroot=www&r1=1.50&r2=1.51
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja-diff.html?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ja.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.pot?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-deception.ru.po?cvsroot=www&r1=1.59&r2=1.60
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.es.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.fr.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.pot?cvsroot=www&r1=1.6&r2=1.7
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-obsolescence.ru.po?cvsroot=www&r1=1.10&r2=1.11
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de-diff.html?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.de.po?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.es.po?cvsroot=www&r1=1.12&r2=1.13
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.fr.po?cvsroot=www&r1=1.44&r2=1.45
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja-diff.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ja.po?cvsroot=www&r1=1.25&r2=1.26
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.pot?cvsroot=www&r1=1.23&r2=1.24
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-subscriptions.ru.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.208&r2=1.209
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.351&r2=1.352
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.161&r2=1.162
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- de.po 19 Nov 2019 08:32:12 -0000 1.161
+++ de.po 23 Nov 2019 15:30:39 -0000 1.162
@@ -10127,11 +10127,12 @@
#. type: Content of: <div><div><p>
# | {+Some malicious functionalities are mediated by <a
# | href=\"/proprietary/proprietary.html#f1\">back doors</a>.+} Here are
-# | examples of [-demonstrated back doors in proprietary software. They are-]
-# | {+programs that contain one or several of those,+} sorted out according to
-# | what [-they are-] {+the back door is+} known to allow. Back doors that
-# | allow full control over the operating system are said to be
-# | “universal”.
+# | examples of [-demonstrated back doors in proprietary software. They are
+# | sorted out-] {+programs that contain one or several of those, classified+}
+# | according to what [-they are-] {+the back door is+} known to [-allow.-]
+# | {+have the power to do.+} Back doors that allow full control over the
+# | [-operating system-] {+programs which contain them+} are said to be
+# | [-“universal”.-] {+“universal.”+}
#, fuzzy
#| msgid ""
#| "Here are examples of demonstrated back doors in proprietary software. "
@@ -10141,9 +10142,9 @@
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
"Hier sind Beispiele von Hintertüren in proprietärer Software aufgeführt,
und "
"sind nach dem was sie zulassen geordnet. Hintertüren, die die volle "
@@ -10658,8 +10659,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -11519,36 +11522,40 @@
msgstr "Proprietäres Blendwerk"
#. type: Content of: <div><div><p>
-# | [-Here are some examples-]{+One+} of [-demonstrated-] {+the+} malicious
-# | functionalities [-in Microsoft's-] {+that may be designed into+}
-# | proprietary [-software.-] {+software is obsolescence.+}
+# | [-Here are some examples-]{+Programmed obsolescence is one+} of
+# | [-demonstrated-] {+the+} malicious functionalities [-in Microsoft's-]
+# | {+that may be designed into+} proprietary software.
#, fuzzy
#| msgid ""
#| "Here are some examples of demonstrated malicious functionalities in "
#| "Microsoft's proprietary software."
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
"Hier einige Beispiele von nachgewiesenen schädlichen Funktionen in "
"Microsofts proprietärer Software."
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
msgstr ""
#. type: Content of: <div><div><p>
+# | Here are examples of proprietary [-software-] {+programs+} that [-has
+# | documented back doors.-] {+make hardware devices prematurely obsolete.+}
+#, fuzzy
+#| msgid ""
+#| "Here are examples of proprietary software that has documented back doors."
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
msgstr ""
+"Nachfolgend finden Sie Beispiele proprietärer Software, die dokumentierte "
+"Hintertüren haben."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -12250,6 +12257,12 @@
"href=\"/proprietary/proprietary-tethers\">an einen Server gebunden</a> und "
"dieser überprüft das Datum. Beides ist eine bösartige Funktionalität."
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr "Proprietäre Ãberwachung - GNU-Projekt - Free Software Foundation"
@@ -13735,6 +13748,24 @@
msgstr ""
"<a href=\"/proprietary/malware-microsoft\">Schadsoftware von Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "Here are examples of demonstrated back doors in proprietary software. "
+#~| "They are sorted out according to what they are known to allow. Back "
+#~| "doors that allow full control over the operating system are said to be "
+#~| "“universal”."
+#~ msgid ""
+#~ "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#~ "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#~ "contain one or several of those, sorted out according to what the back "
+#~ "door is known to allow. Back doors that allow full control over the "
+#~ "operating system are said to be “universal”."
+#~ msgstr ""
+#~ "Hier sind Beispiele von Hintertüren in proprietärer Software
aufgeführt, "
+#~ "und sind nach dem was sie zulassen geordnet. Hintertüren, die die volle "
+#~ "Kontrolle über das Betriebssystem ermöglichen, werden als
âuniversellâ "
+#~ "bezeichnet."
+
#~ msgid ""
#~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
#~ "malware</a>"
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.229
retrieving revision 1.230
diff -u -b -r1.229 -r1.230
--- es.po 23 Nov 2019 11:33:14 -0000 1.229
+++ es.po 23 Nov 2019 15:30:40 -0000 1.230
@@ -9831,30 +9831,32 @@
msgstr "Los sistemas privativos son prisiones"
#. type: Content of: <div><div><p>
-# | {+Some malicious functionalities are mediated by <a
-# | href=\"/proprietary/proprietary.html#f1\">back doors</a>.+} Here are
-# | examples of [-demonstrated back doors in proprietary software. They are-]
-# | {+programs that contain one or several of those,+} sorted out according to
-# | what [-they are-] {+the back door is+} known to allow. Back doors that
-# | allow full control over the operating system are said to be
-# | “universal”.
+# | Some malicious functionalities are mediated by <a
+# | href=\"/proprietary/proprietary.html#f1\">back doors</a>. Here are
+# | examples of programs that contain one or several of those, [-sorted out-]
+# | {+classified+} according to what the back door is known to [-allow.-]
+# | {+have the power to do.+} Back doors that allow full control over the
+# | [-operating system-] {+programs which contain them+} are said to be
+# | [-“universal”.-] {+“universal.”+}
#, fuzzy
#| msgid ""
-#| "Here are examples of demonstrated back doors in proprietary software. "
-#| "They are sorted out according to what they are known to allow. Back doors "
-#| "that allow full control over the operating system are said to be “"
-#| "universal”."
+#| "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#| "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#| "contain one or several of those, sorted out according to what the back "
+#| "door is known to allow. Back doors that allow full control over the "
+#| "operating system are said to be “universal”."
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
-msgstr ""
-"Se presentan aquà ejemplos comprobados de puertas traseras que se encuentran
"
-"en programas de software privativo. Las clasificamos según lo que sabemos "
-"que permiten hacer. A las puertas traseras que permiten un control total del "
-"sistema operativo se las llama «universales»."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
+msgstr ""
+"En algunas funcionalidades maliciosas intervienen <a href=\"/proprietary/"
+"proprietary.html#f1\">puertas traseras</a>. Se presentan aquà ejemplos de "
+"programas que contienen una o varias de ellas, clasificados según lo que "
+"sabemos que esas puertas traseras permiten hacer. A las puertas traseras que "
+"permiten un control total del sistema operativo se las llama «universales»."
#. type: Content of: <div><div><h3>
msgid "Back-door functionalities"
@@ -10387,11 +10389,11 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
-"Las trampas son funcionalidades maliciosas de programas que son deshonestos "
-"o utilizan artimañas."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -11266,67 +11268,33 @@
msgstr "Censura en el software privativo"
#. type: Content of: <div><div><p>
+# | [-One-]{+Programmed obsolescence is one+} of the malicious functionalities
+# | that may be designed into proprietary [-software is obsolescence.-]
+# | {+software.+}
+#, fuzzy
+#| msgid ""
+#| "One of the malicious functionalities that may be designed into "
+#| "proprietary software is obsolescence."
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
"Una de las funcionalidades maliciosas que pueden diseñarse en el software "
"privativo es la obsolescencia."
#. type: Content of: <div><div><p>
-# | [-As in any human activity, informatics-]{+IT+} has an environmental
-# | [-impact. When the software is proprietary,-] {+impact, as does any human
-# | activity, but+} it is [-even more-] {+especially+} harmful to the planet
-# | {+when it is proprietary,+} because {+then+} it encourages [-the user-]
-# | {+users+} to change devices when they are no longer updated, or to [-buy
-# | back other-] {+replace+} components when they are no longer supported, or
-# | to discard [-a-] defective [-one that, if it was free,-] {+hardware
-# | which+} would be [-repairable.-] {+repairable if it were free.+}
-#, fuzzy
-#| msgid ""
-#| "As in any human activity, informatics has an environmental impact. When "
-#| "the software is proprietary, it is even more harmful to the planet "
-#| "because it encourages the user to change devices when they are no longer "
-#| "updated, or to buy back other components when they are no longer "
-#| "supported, or to discard a defective one that, if it was free, would be "
-#| "repairable."
-msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
-msgstr ""
-"Como toda actividad humana, la informática tiene un impacto ambiental. Es "
-"aún más dañina para el planeta cuando el software es privativo porque
lleva "
-"al usuario a cambiar los dispositivos cuyo software ya no se actualiza, "
-"comprar nuevos componentes para reemplazar aquellos que quedan sin "
-"asistencia técnica, o descartar alguno defectuoso que se podrÃa reparar si "
-"el software fuese libre. "
+msgid ""
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
+msgstr ""
#. type: Content of: <div><div><p>
-# | Here are examples of proprietary software {+that is+} designed to break
-# | the devices [-with which-] they are associated {+with,+} or to make them
-# | irreparable. Users cannot avoid this constraint and are forced to
-# | “upgrade” the [-material-] {+hardware+} because they have no
-# | control over the software.
-#, fuzzy
-#| msgid ""
-#| "Here are examples of proprietary software designed to break the devices "
-#| "with which they are associated or to make them irreparable. Users cannot "
-#| "avoid this constraint and are forced to “upgrade” the "
-#| "material because they have no control over the software."
-msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
-msgstr ""
-"Se presentan aquà ejemplos de software privativo que está diseñado para "
-"estropear o hacer irreparables los dispositivos con los que está "
-"relacionado. Los usuarios no pueden evitar esta restricción y se ven "
-"forzados a «actualizar» el hardware porque no tienen ningún control sobre
el "
-"software."
+msgid ""
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
+msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -11905,6 +11873,12 @@
"<a href=\"/proprietary/proprietary-tethers.html\">depende de un servidor</a> "
"que comprueba la fecha. Ambas son funcionalidades maliciosas."
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
# | Proprietary [-Tyrants-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
@@ -13383,6 +13357,78 @@
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "Here are examples of demonstrated back doors in proprietary software. "
+#~| "They are sorted out according to what they are known to allow. Back "
+#~| "doors that allow full control over the operating system are said to be "
+#~| "“universal”."
+#~ msgid ""
+#~ "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#~ "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#~ "contain one or several of those, sorted out according to what the back "
+#~ "door is known to allow. Back doors that allow full control over the "
+#~ "operating system are said to be “universal”."
+#~ msgstr ""
+#~ "Se presentan aquà ejemplos comprobados de puertas traseras que se "
+#~ "encuentran en programas de software privativo. Las clasificamos según lo "
+#~ "que sabemos que permiten hacer. A las puertas traseras que permiten un "
+#~ "control total del sistema operativo se las llama «universales»."
+
+#~ msgid ""
+#~ "Deception is a malicious functionality of programs that are dishonest or "
+#~ "conceal trickery. Here are examples of such programs."
+#~ msgstr ""
+#~ "Las trampas son funcionalidades maliciosas de programas que son "
+#~ "deshonestos o utilizan artimañas."
+
+#~ msgid ""
+#~ "One of the malicious functionalities that may be designed into "
+#~ "proprietary software is obsolescence."
+#~ msgstr ""
+#~ "Una de las funcionalidades maliciosas que pueden diseñarse en el software
"
+#~ "privativo es la obsolescencia."
+
+#, fuzzy
+#~| msgid ""
+#~| "As in any human activity, informatics has an environmental impact. When "
+#~| "the software is proprietary, it is even more harmful to the planet "
+#~| "because it encourages the user to change devices when they are no longer "
+#~| "updated, or to buy back other components when they are no longer "
+#~| "supported, or to discard a defective one that, if it was free, would be "
+#~| "repairable."
+#~ msgid ""
+#~ "IT has an environmental impact, as does any human activity, but it is "
+#~ "especially harmful to the planet when it is proprietary, because then it "
+#~ "encourages users to change devices when they are no longer updated, or to "
+#~ "replace components when they are no longer supported, or to discard "
+#~ "defective hardware which would be repairable if it were free."
+#~ msgstr ""
+#~ "Como toda actividad humana, la informática tiene un impacto ambiental. Es
"
+#~ "aún más dañina para el planeta cuando el software es privativo porque "
+#~ "lleva al usuario a cambiar los dispositivos cuyo software ya no se "
+#~ "actualiza, comprar nuevos componentes para reemplazar aquellos que quedan "
+#~ "sin asistencia técnica, o descartar alguno defectuoso que se podrÃa "
+#~ "reparar si el software fuese libre. "
+
+#, fuzzy
+#~| msgid ""
+#~| "Here are examples of proprietary software designed to break the devices "
+#~| "with which they are associated or to make them irreparable. Users cannot "
+#~| "avoid this constraint and are forced to “upgrade” the "
+#~| "material because they have no control over the software."
+#~ msgid ""
+#~ "Here are examples of proprietary software that is designed to break the "
+#~ "devices they are associated with, or to make them irreparable. Users "
+#~ "cannot avoid this constraint and are forced to “upgrade” the "
+#~ "hardware because they have no control over the software."
+#~ msgstr ""
+#~ "Se presentan aquà ejemplos de software privativo que está diseñado para
"
+#~ "estropear o hacer irreparables los dispositivos con los que está "
+#~ "relacionado. Los usuarios no pueden evitar esta restricción y se ven "
+#~ "forzados a «actualizar» el hardware porque no tienen ningún control
sobre "
+#~ "el software."
+
#~ msgid ""
#~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
#~ "malware</a>"
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.279
retrieving revision 1.280
diff -u -b -r1.279 -r1.280
--- fr.po 23 Nov 2019 14:11:15 -0000 1.279
+++ fr.po 23 Nov 2019 15:30:40 -0000 1.280
@@ -8696,12 +8696,26 @@
msgstr "Portes dérobées du logiciel privateur"
#. type: Content of: <div><div><p>
+# | Some malicious functionalities are mediated by <a
+# | href=\"/proprietary/proprietary.html#f1\">back doors</a>. Here are
+# | examples of programs that contain one or several of those, [-sorted out-]
+# | {+classified+} according to what the back door is known to [-allow.-]
+# | {+have the power to do.+} Back doors that allow full control over the
+# | [-operating system-] {+programs which contain them+} are said to be
+# | [-“universal”.-] {+“universal.”+}
+#, fuzzy
+#| msgid ""
+#| "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#| "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#| "contain one or several of those, sorted out according to what the back "
+#| "door is known to allow. Back doors that allow full control over the "
+#| "operating system are said to be “universal”."
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
"Certaines fonctionnalités malveillantes font intervenir des <a href=\"/"
"proprietary/proprietary.html#f1\">portes dérobées</a>. Voici des exemples
de "
@@ -9157,11 +9171,11 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
-"La tromperie est une fonctionnalité malveillante des programmes qui sont "
-"malhonnêtes ou cachent un piège. Voici des exemples de tels programmes."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -9854,40 +9868,33 @@
msgstr "Obsolescence causée par le logiciel privateur"
#. type: Content of: <div><div><p>
+# | [-One-]{+Programmed obsolescence is one+} of the malicious functionalities
+# | that may be designed into proprietary [-software is obsolescence.-]
+# | {+software.+}
+#, fuzzy
+#| msgid ""
+#| "One of the malicious functionalities that may be designed into "
+#| "proprietary software is obsolescence."
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
"L'une des fonctionnalités malveillantes pouvant être intégrées au
logiciel "
"privateur est l'obsolescence."
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
-msgstr ""
-"Comme toute activité humaine, l'informatique a un effet sur l'environnement.
"
-"Mais elle peut être particulièrement nuisible à la planète si elle est "
-"privatrice, parce qu'alors elle encourage l'utilisateur à remplacer les "
-"appareils lorsque leur logiciel n'est plus mis à jour, ou à acheter
d'autres "
-"composants lorsqu'ils ne sont plus gérés, ou encore à mettre au rebut des "
-"composants défectueux qui, s'ils avaient été libre, auraient été
réparables."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
+msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
-msgstr ""
-"Voici des exemples de logiciels privateurs conçus pour mettre hors d'usage "
-"les appareils avec lesquels ils sont associés ou pour les rendre "
-"irréparables. Les utilisateurs ne peuvent éviter cette contrainte et sont "
-"forcés de « mettre à niveau » le matériel car ils n'ont aucun
contrôle sur "
-"le logiciel."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
+msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -10393,6 +10400,12 @@
"serveur</a> et que ce serveur vérifie la date. L'une et l'autre sont des "
"fonctionnalités malveillantes."
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr "Surveillants privateurs - GNU Project - Free Software Foundation"
@@ -11576,3 +11589,58 @@
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
msgstr ""
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#~ "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#~ "contain one or several of those, sorted out according to what the back "
+#~ "door is known to allow. Back doors that allow full control over the "
+#~ "operating system are said to be “universal”."
+#~ msgstr ""
+#~ "Certaines fonctionnalités malveillantes font intervenir des <a href=\"/"
+#~ "proprietary/proprietary.html#f1\">portes dérobées</a>. Voici des
exemples "
+#~ "de programmes privateurs qui en contiennent une ou plusieurs, classées "
+#~ "d'après ce qu'elles permettent de faire. Les portes dérobées qui "
+#~ "permettent de prendre totalement le contrôle du système d'exploitation "
+#~ "sont dites « universelles »."
+
+#~ msgid ""
+#~ "Deception is a malicious functionality of programs that are dishonest or "
+#~ "conceal trickery. Here are examples of such programs."
+#~ msgstr ""
+#~ "La tromperie est une fonctionnalité malveillante des programmes qui sont "
+#~ "malhonnêtes ou cachent un piège. Voici des exemples de tels programmes."
+
+#~ msgid ""
+#~ "One of the malicious functionalities that may be designed into "
+#~ "proprietary software is obsolescence."
+#~ msgstr ""
+#~ "L'une des fonctionnalités malveillantes pouvant être intégrées au "
+#~ "logiciel privateur est l'obsolescence."
+
+#~ msgid ""
+#~ "IT has an environmental impact, as does any human activity, but it is "
+#~ "especially harmful to the planet when it is proprietary, because then it "
+#~ "encourages users to change devices when they are no longer updated, or to "
+#~ "replace components when they are no longer supported, or to discard "
+#~ "defective hardware which would be repairable if it were free."
+#~ msgstr ""
+#~ "Comme toute activité humaine, l'informatique a un effet sur "
+#~ "l'environnement. Mais elle peut être particulièrement nuisible à la "
+#~ "planète si elle est privatrice, parce qu'alors elle encourage "
+#~ "l'utilisateur à remplacer les appareils lorsque leur logiciel n'est plus "
+#~ "mis à jour, ou à acheter d'autres composants lorsqu'ils ne sont plus "
+#~ "gérés, ou encore à mettre au rebut des composants défectueux qui,
s'ils "
+#~ "avaient été libre, auraient été réparables."
+
+#~ msgid ""
+#~ "Here are examples of proprietary software that is designed to break the "
+#~ "devices they are associated with, or to make them irreparable. Users "
+#~ "cannot avoid this constraint and are forced to “upgrade” the "
+#~ "hardware because they have no control over the software."
+#~ msgstr ""
+#~ "Voici des exemples de logiciels privateurs conçus pour mettre hors "
+#~ "d'usage les appareils avec lesquels ils sont associés ou pour les rendre "
+#~ "irréparables. Les utilisateurs ne peuvent éviter cette contrainte et
sont "
+#~ "forcés de « mettre à niveau » le matériel car ils n'ont aucun
contrôle "
+#~ "sur le logiciel."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- it.po 19 Nov 2019 08:32:12 -0000 1.161
+++ it.po 23 Nov 2019 15:30:41 -0000 1.162
@@ -9511,9 +9511,9 @@
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
#. type: Content of: <div><div><h3>
@@ -10052,8 +10052,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -10824,26 +10826,32 @@
#. type: Content of: <div><div><p>
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
msgstr ""
#. type: Content of: <div><div><p>
+# | Here are examples of proprietary [-software-] {+programs+} that [-has
+# | something worse than a back door.-] {+make hardware devices prematurely
+# | obsolete.+}
+#, fuzzy
+#| msgid ""
+#| "Here are examples of proprietary software that has something worse than a "
+#| "back door."
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
msgstr ""
+"Ecco alcuni esempi di software proprietario che contiene qualcosa peggiore "
+"di una backdoor."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -11515,6 +11523,12 @@
"functionality."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr "Sorveglianza proprietaria - Progetto GNU - Free Software Foundation"
@@ -13372,13 +13386,6 @@
#~ "questo problema."
#~ msgid ""
-#~ "Here are examples of proprietary software that has something worse than a "
-#~ "back door."
-#~ msgstr ""
-#~ "Ecco alcuni esempi di software proprietario che contiene qualcosa "
-#~ "peggiore di una backdoor."
-
-#~ msgid ""
#~ "<a href=\"/proprietary/proprietary.html\"> Other examples of proprietary "
#~ "malware</a>"
#~ msgstr ""
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.168
retrieving revision 1.169
diff -u -b -r1.168 -r1.169
--- ja.po 19 Nov 2019 08:32:12 -0000 1.168
+++ ja.po 23 Nov 2019 15:30:41 -0000 1.169
@@ -7319,9 +7319,9 @@
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr
"ãã¡ãããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ã®ããã¯ãã¢ã®è¨¼æãããä¾ã§ãã"
#. type: Content of: <div><div><h3>
@@ -7735,8 +7735,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -8379,26 +8381,29 @@
#. type: Content of: <div><div><p>
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
msgstr ""
#. type: Content of: <div><div><p>
+#, fuzzy
+#| msgid ""
+#| "Here are examples of proprietary software that has something worse than a "
+#| "back door."
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
msgstr ""
+"ãã¡ããããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ãããã¯ãã¢ãããæªè³ªãªãã®ãæãã"
+"ä¾ã§ãã"
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -8905,6 +8910,12 @@
"ãµã¼ãã¸ç¹ãæ¢ã</a>ããã¦ãã¦ããµã¼ããæ¥ä»ããã§ãã¯ãã¾ããã©ã¡ãã«ãã¦ã"
"æªæã®ããæ©è½ã§ãã"
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr ""
@@ -10129,6 +10140,18 @@
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
msgstr "<a
href=\"/proprietary/malware-microsoft.html\">ãã¤ã¯ãã½ãã</a>"
+#, fuzzy
+#~| msgid ""
+#~| "Here are examples of demonstrated back doors in proprietary software."
+#~ msgid ""
+#~ "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#~ "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#~ "contain one or several of those, sorted out according to what the back "
+#~ "door is known to allow. Back doors that allow full control over the "
+#~ "operating system are said to be “universal”."
+#~ msgstr ""
+#~
"ãã¡ãããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ã®ããã¯ãã¢ã®è¨¼æãããä¾ã§ãã"
+
#~ msgid ""
#~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
#~ "malware</a>"
@@ -10489,13 +10512,6 @@
#~ msgstr "#TOC { width: 45em; }\n"
#~ msgid ""
-#~ "Here are examples of proprietary software that has something worse than a "
-#~ "back door."
-#~ msgstr ""
-#~
"ãã¡ããããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ãããã¯ãã¢ãããæªè³ªãªãã®ãæã"
-#~ "ãä¾ã§ãã"
-
-#~ msgid ""
#~ "It sounds simple to say that a certain program “requires a "
#~ "subscription.” What that means concretely is that it contains a "
#~ "time bomb, so that it will refuse to operate after that date. Or else it "
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- nl.po 19 Nov 2019 08:32:12 -0000 1.162
+++ nl.po 23 Nov 2019 15:30:42 -0000 1.163
@@ -6654,9 +6654,9 @@
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
#. type: Content of: <div><div><h3>
@@ -7044,8 +7044,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -7686,25 +7688,22 @@
#. type: Content of: <div><div><p>
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -8329,6 +8328,12 @@
"functionality."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- pl.po 19 Nov 2019 08:32:12 -0000 1.161
+++ pl.po 23 Nov 2019 15:30:43 -0000 1.162
@@ -6074,9 +6074,9 @@
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
#. type: Content of: <div><div><h3>
@@ -6453,8 +6453,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -7025,25 +7027,22 @@
#. type: Content of: <div><div><p>
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -7737,6 +7736,12 @@
"functionality."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- pot 19 Nov 2019 08:32:12 -0000 1.160
+++ pot 23 Nov 2019 15:30:43 -0000 1.161
@@ -5738,9 +5738,9 @@
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
#. type: Content of: <div><div><h3>
@@ -6064,8 +6064,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -6547,25 +6549,22 @@
#. type: Content of: <div><div><p>
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -6954,6 +6953,12 @@
"functionality."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr ""
Index: proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.36
retrieving revision 1.37
diff -u -b -r1.36 -r1.37
--- proprietary-back-doors.de-diff.html 20 Nov 2019 08:01:58 -0000 1.36
+++ proprietary-back-doors.de-diff.html 23 Nov 2019 15:30:43 -0000 1.37
@@ -59,18 +59,21 @@
that power to the detriment of the users they ought to serve.</p>
<span class="removed"><del><strong><p>Here</strong></del></span>
-<span class="inserted"><ins><em><hr class="thin" />
+
+<span class="inserted"><ins><em><p>This typically takes the form of
malicious functionalities.</p>
+<hr class="thin" />
</div>
<div id="about-page">
<p>Some malicious functionalities are mediated by <a
href="/proprietary/proprietary.html#f1">back doors</a>.
Here</em></ins></span> are
examples of <span class="removed"><del><strong>demonstrated back doors in
proprietary software.
-They are</strong></del></span> <span class="inserted"><ins><em>programs that
contain one or several of those,</em></ins></span> sorted
-out according to what <span class="removed"><del><strong>they
are</strong></del></span> <span class="inserted"><ins><em>the back door
is</em></ins></span> known to allow. Back doors
-that allow full control over the operating system are said to be
-“universal”.</p>
-<span class="inserted"><ins><em></div>
+They are sorted out</strong></del></span> <span
class="inserted"><ins><em>programs that contain one or several of those,
classified</em></ins></span>
+according to what <span class="removed"><del><strong>they
are</strong></del></span> <span class="inserted"><ins><em>the back door
is</em></ins></span> known to <span
class="removed"><del><strong>allow.</strong></del></span> <span
class="inserted"><ins><em>have the power to do.</em></ins></span>
+Back doors that allow full control over the <span
class="removed"><del><strong>operating system</strong></del></span> <span
class="inserted"><ins><em>programs which contain them</em></ins></span>
+are said to be
+<span
class="removed"><del><strong>“universal”.</p></strong></del></span>
<span class="inserted"><ins><em>“universal.”</p>
+</div>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -210,15 +213,15 @@
<span class="inserted"><ins><em><li id="M201604250">
<p>A pregnancy test controller application not only
can</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone,</em></ins></span> and <span
class="removed"><del><strong>8 with all-spying
+ Microsoft was forcing them to replace Windows 7 and 8 with all-spying
Windows 10</a>.</p>
- <p>Microsoft was</strong></del></span> in <span
class="removed"><del><strong>fact <a
+ <p>Microsoft was</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy on many sorts of data</em></ins></span> in <span
class="removed"><del><strong>fact <a
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7 and 8</a>, switching on a
flag
+ attacking computers that run Windows 7</strong></del></span> <span
class="inserted"><ins><em>the phone,</em></ins></span> and <span
class="removed"><del><strong>8</a>, switching on a flag
that said whether to “upgrade” to Windows 10 when users
- had turned</strong></del></span> <span class="inserted"><ins><em>server
accounts,</em></ins></span>
+ had turned</strong></del></span> <span class="inserted"><ins><em>in
server accounts,</em></ins></span>
it <span class="removed"><del><strong>off.</p>
<p>Later on, Microsoft published instructions on <a
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
@@ -359,14 +362,13 @@
<span class="inserted"><ins><em><li id="M201907100">
<p>Apple appears to say that <a
href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
- there is</em></ins></span> a back door <span class="inserted"><ins><em>in
MacOS</a> for automatically updating some
+ there is</em></ins></span> a back door <span
class="removed"><del><strong>that <a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"></strong></del></span>
<span class="inserted"><ins><em>in MacOS</a> for automatically updating
some
(all?) apps.</p>
<p>The specific change described in the article was not
malicious—it protected users from surveillance by third
- parties—but</em></ins></span> that <span
class="removed"><del><strong><a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can</strong></del></span> <span class="inserted"><ins><em>is a separate
question.</p>
+ parties—but that is a separate question.</p>
</li>
<li id="M201811100">
@@ -421,8 +423,8 @@
<li id="M201511090">
<p>Baidu's proprietary Android library, Moplus, has a back door that
<a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can</em></ins></span> “upload files” as well as forcibly
install
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"></em></ins></span>
+ can “upload files” as well as forcibly install
apps</a>.</p>
<p>It is used by 14,000 Android applications.</p>
@@ -895,7 +897,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/20 08:01:58 $
+$Date: 2019/11/23 15:30:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary-back-doors.de.po 18 Nov 2019 15:05:17 -0000 1.134
+++ proprietary-back-doors.de.po 23 Nov 2019 15:30:43 -0000 1.135
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -74,13 +74,18 @@
"sollte."
#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr ""
+
+#. type: Content of: <div><div><p>
# | {+Some malicious functionalities are mediated by <a
# | href=\"/proprietary/proprietary.html#f1\">back doors</a>.+} Here are
-# | examples of [-demonstrated back doors in proprietary software. They are-]
-# | {+programs that contain one or several of those,+} sorted out according to
-# | what [-they are-] {+the back door is+} known to allow. Back doors that
-# | allow full control over the operating system are said to be
-# | “universal”.
+# | examples of [-demonstrated back doors in proprietary software. They are
+# | sorted out-] {+programs that contain one or several of those, classified+}
+# | according to what [-they are-] {+the back door is+} known to [-allow.-]
+# | {+have the power to do.+} Back doors that allow full control over the
+# | [-operating system-] {+programs which contain them+} are said to be
+# | [-“universal”.-] {+“universal.”+}
#, fuzzy
#| msgid ""
#| "Here are examples of demonstrated back doors in proprietary software. "
@@ -90,9 +95,9 @@
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
"Hier sind Beispiele von Hintertüren in proprietärer Software aufgeführt,
und "
"sind nach dem was sie zulassen geordnet. Hintertüren, die die volle "
Index: proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-back-doors.es.po 21 Nov 2019 22:24:37 -0000 1.28
+++ proprietary-back-doors.es.po 23 Nov 2019 15:30:43 -0000 1.29
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2019-11-20 12:16+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -53,12 +54,31 @@
"a cuyo servicio deberÃan estar."
#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr ""
+"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
+
+#. type: Content of: <div><div><p>
+# | Some malicious functionalities are mediated by <a
+# | href=\"/proprietary/proprietary.html#f1\">back doors</a>. Here are
+# | examples of programs that contain one or several of those, [-sorted out-]
+# | {+classified+} according to what the back door is known to [-allow.-]
+# | {+have the power to do.+} Back doors that allow full control over the
+# | [-operating system-] {+programs which contain them+} are said to be
+# | [-“universal”.-] {+“universal.”+}
+#, fuzzy
+#| msgid ""
+#| "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#| "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#| "contain one or several of those, sorted out according to what the back "
+#| "door is known to allow. Back doors that allow full control over the "
+#| "operating system are said to be “universal”."
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
"En algunas funcionalidades maliciosas intervienen <a href=\"/proprietary/"
"proprietary.html#f1\">puertas traseras</a>. Se presentan aquà ejemplos de "
Index: proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- proprietary-back-doors.fr.po 19 Nov 2019 09:18:56 -0000 1.148
+++ proprietary-back-doors.fr.po 23 Nov 2019 15:30:43 -0000 1.149
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2019-11-19 10:18+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -52,12 +53,30 @@
"détriment des utilisateurs qu'ils devraient servir."
#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
+
+#. type: Content of: <div><div><p>
+# | Some malicious functionalities are mediated by <a
+# | href=\"/proprietary/proprietary.html#f1\">back doors</a>. Here are
+# | examples of programs that contain one or several of those, [-sorted out-]
+# | {+classified+} according to what the back door is known to [-allow.-]
+# | {+have the power to do.+} Back doors that allow full control over the
+# | [-operating system-] {+programs which contain them+} are said to be
+# | [-“universal”.-] {+“universal.”+}
+#, fuzzy
+#| msgid ""
+#| "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#| "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#| "contain one or several of those, sorted out according to what the back "
+#| "door is known to allow. Back doors that allow full control over the "
+#| "operating system are said to be “universal”."
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
"Certaines fonctionnalités malveillantes font intervenir des <a href=\"/"
"proprietary/proprietary.html#f1\">portes dérobées</a>. Voici des exemples
de "
Index: proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary-back-doors.it-diff.html 20 Nov 2019 08:01:58 -0000 1.63
+++ proprietary-back-doors.it-diff.html 23 Nov 2019 15:30:43 -0000 1.64
@@ -59,16 +59,18 @@
that power to the detriment of the users they ought to serve.</p>
<span class="removed"><del><strong><p>Here</strong></del></span>
-<span class="inserted"><ins><em><hr class="thin" />
+
+<span class="inserted"><ins><em><p>This typically takes the form of
malicious functionalities.</p>
+<hr class="thin" />
</div>
<div id="about-page">
<p>Some malicious functionalities are mediated by <a
href="/proprietary/proprietary.html#f1">back doors</a>.
Here</em></ins></span> are
-examples of <span
class="removed"><del><strong>demonstrated</strong></del></span> <span
class="inserted"><ins><em>programs that contain one or several of those, sorted
-out according to what the</em></ins></span> back <span
class="inserted"><ins><em>door is known to allow. Back</em></ins></span> doors
-<span class="inserted"><ins><em>that allow full control over the operating
system are said to be
-“universal”.</p>
+examples of <span
class="removed"><del><strong>demonstrated</strong></del></span> <span
class="inserted"><ins><em>programs that contain one or several of those,
classified
+according to what the</em></ins></span> back <span
class="inserted"><ins><em>door is known to have the power to do.
+Back</em></ins></span> doors <span class="inserted"><ins><em>that allow full
control over the programs which contain them
+are said to be “universal.”</p>
</div>
<div class="important">
@@ -160,103 +162,102 @@
encryption is never trustworthy.</p></strong></del></span>
<span class="inserted"><ins><em>much as Apple
claims</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>A pregnancy test
controller application not only
- can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy
- on many sorts of</strong></del></span>
+ <span class="removed"><del><strong><li><p>A
pregnancy</strong></del></span>
<span class="inserted"><ins><em></ul>
-<h3 id='alter-data'>Altering user's</em></ins></span> data <span
class="removed"><del><strong>in the phone, and in server accounts, it can
- alter them too</a>.</p>
- </li>
-
- <li>
- <p>Xiaomi phones come with</strong></del></span> <span
class="inserted"><ins><em>or settings</h3>
+<h3 id='alter-data'>Altering user's data or settings</h3>
<ul class="blurbs">
<li id="M201905060">
- <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
- universal back door in</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement to run a proprietary phone app</a> to be allowed
into</em></ins></span>
- the <span class="removed"><del><strong>application processor, for
- Xiaomi's use</a>.</p></strong></del></span> <span
class="inserted"><ins><em>event.</p></em></ins></span>
-
- <p>This <span class="inserted"><ins><em>app</em></ins></span> is
<span class="removed"><del><strong>separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor</strong></del></span>
<span class="inserted"><ins><em>a spyware</em></ins></span> that <span
class="removed"><del><strong>the local
- phone company</strong></del></span> can <span
class="removed"><del><strong>use</a>.</p>
- </li>
-
- <li><p>Capcom's Street Fighter V update</strong></del></span>
<span class="inserted"><ins><em>snoop on a lot of
- sensitive data, including user's location and contact list, and
has</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed</strong></del></span>
- <span
class="inserted"><ins><em>href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
+ <p>BlizzCon 2019 imposed a <a
+
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
+
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
near-complete control</a> over the phone.</p>
</li>
<li id="M201809140">
- <p>Android has</em></ins></span> a <span
class="removed"><del><strong>driver that can</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>Android has a <a
href="https://www.theverge.com/platform/amp/2018/9/14/17861150/google-battery-saver-android-9-pie-remote-settings-change">
back door for remotely changing “user”
settings</a>.</p>
- <p>The article suggests it might</em></ins></span> be <span
class="removed"><del><strong>used as a backdoor by any application
- installed on</strong></del></span> a <span
class="removed"><del><strong>Windows
computer</a>.</p></strong></del></span> <span
class="inserted"><ins><em>universal back door, but this
- isn't clear.</p></em></ins></span>
- </li>
-
- <span
class="removed"><del><strong><li><p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201607284">
- <p>The</em></ins></span> Dropbox app for Macintosh <a <span
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
- total</strong></del></span>
- <span
class="inserted"><ins><em>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
- takes</em></ins></span> control of <span class="removed"><del><strong>the
machine by repeatedly nagging</strong></del></span> <span
class="inserted"><ins><em>user interface items after luring</em></ins></span>
the user
- <span class="removed"><del><strong>for</strong></del></span> <span
class="inserted"><ins><em>into
- entering</em></ins></span> an <span
class="removed"><del><strong>admini</strong></del></span> <span
class="inserted"><ins><em>admin</em></ins></span> password</a>.</p>
- </li>
-
- <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal</strong></del></span> <span
class="inserted"><ins><em>id="M201604250">
- <p>A pregnancy test controller application not only can <a
-
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts of data in the phone, and in server accounts,
+ <p>The article suggests it might be a universal back door, but this
+ isn't clear.</p>
+ </li>
+
+ <li id="M201607284">
+ <p>The Dropbox app for Macintosh <a
+
href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">
+ takes control of user interface items after luring the user into
+ entering an admin password</a>.</p>
+ </li>
+
+ <li id="M201604250">
+ <p>A pregnancy</em></ins></span> test controller application not
only can <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">spy</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
+ spy</em></ins></span> on many sorts of data in the phone, and in server
accounts,
it can alter them too</a>.</p>
</li>
- <li id="M201512074">
+ <span class="removed"><del><strong><li>
+ <p>Xiaomi phones come with <a
href="https://www.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered">a
+ universal</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201512074">
<p><a
href="http://www.itworld.com/article/2705284/backdoor-found-in-d-link-router-firmware-code.html">
- Some D-Link routers</a> have a</em></ins></span> back door <span
class="inserted"><ins><em>for changing settings</em></ins></span> in <span
class="removed"><del><strong>portable phones <a
-
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
- employed to listen through their microphones</a>.</p>
- <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature</strong></del></span> <span class="inserted"><ins><em>a
- dlink</em></ins></span> of <span class="removed"><del><strong>this
problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>an eye.</p>
+ Some D-Link routers</a> have a</em></ins></span> back door <span
class="removed"><del><strong>in the application
processor,</strong></del></span> for
+ <span class="removed"><del><strong>Xiaomi's use</a>.</p>
+
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door</strong></del></span> <span
class="inserted"><ins><em>changing settings</em></ins></span> in <span
class="removed"><del><strong>the modem processor that the local
+ phone company can use</a>.</p>
+ </li>
+
+ <li><p>Capcom's Street Fighter V update <a
href="https://web.archive.org/web/20160930051146/http://www.theregister.co.uk/2016/09/23/capcom_street_fighter_v/">installed
+ a driver that can be used as</strong></del></span> a <span
class="removed"><del><strong>backdoor by any application
+ installed on</strong></del></span>
+ <span class="inserted"><ins><em>dlink of an eye.</p>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/"> The
TP-Link
- router has a back door</a>.</p>
+ router has</em></ins></span> a <span class="removed"><del><strong>Windows
computer</a>.</p></strong></del></span> <span
class="inserted"><ins><em>back door</a>.</p>
<p><a href="https://github.com/elvanderb/TCP-32764">Many
models of
routers have back doors</a>.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
- Microsoft</strong></del></span>
+ <span class="removed"><del><strong><li><p>The Dropbox app for
Macintosh</strong></del></span>
<span class="inserted"><ins><em><li id="M201511244">
- <p>Google</em></ins></span> has <span
class="removed"><del><strong>already backdoored</strong></del></span> <span
class="inserted"><ins><em>long had <a
-
href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
- back door to remotely unlock an Android device</a>,
unless</em></ins></span> its disk <span
class="removed"><del><strong>encryption</a>.</p></li>
-
- <li><p>Modern</strong></del></span>
- <span class="inserted"><ins><em>is encrypted (possible since Android 5.0
Lollipop, but still not
- quite the default).</p>
+ <p>Google has long had</em></ins></span> <a <span
class="removed"><del><strong>href="http://applehelpwriter.com/2016/07/28/revealing-dropboxs-dirty-little-security-hack/">takes
+ total control of the machine by repeatedly nagging the user
+ for</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.theguardian.com/technology/2015/nov/24/google-can-unlock-android-devices-remotely-if-phone-unencrypted">a
+ back door to remotely unlock</em></ins></span> an <span
class="removed"><del><strong>admini
password</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Android device</a>, unless its disk
+ is encrypted (possible since Android 5.0 Lollipop, but still not
+ quite the default).</p></em></ins></span>
</li>
- <li id="M201511194">
+ <li <span
class="removed"><del><strong>id="universal-back-door-phone-modem"><p>The
universal</strong></del></span> <span
class="inserted"><ins><em>id="M201511194">
<p>Caterpillar vehicles come with <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">
- a back door to shutoff the engine</a> remotely.</p>
+ a</em></ins></span> back door <span class="removed"><del><strong>in
portable phones <a
+
href="https://www.schneier.com/blog/archives/2006/12/remotely_eavesd_1.html">is
+ employed</strong></del></span> to <span
class="removed"><del><strong>listen through their
microphones</a>.</p>
+ <p>More about <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">the
nature of this problem</a>.</p></strong></del></span> <span
class="inserted"><ins><em>shutoff the engine</a>
remotely.</p></em></ins></span>
</li>
- <li id="M201509160">
+ <span class="removed"><del><strong><li><p><a
href="https://theintercept.com/2015/12/28/recently-bought-a-windows-computer-microsoft-probably-has-your-encryption-key/">
+ Microsoft has already backdoored its disk
encryption</a>.</p></li>
+
+ <li><p>Modern</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201509160">
<p>Modern</em></ins></span> gratis game cr…apps <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
collect a wide range of data about their users and their users'
@@ -361,37 +362,36 @@
they wanted.</p></em></ins></span>
<p>This <span class="removed"><del><strong>seems to involve
use</strong></del></span> <span class="inserted"><ins><em>is a concrete
example</em></ins></span> of <span class="inserted"><ins><em>what users are
exposed to when they
- run nonfree apps. They can never be completely sure that a nonfree
- app is safe.</p>
- </li>
-
- <li id="M201907100">
- <p>Apple appears to say that <a
- href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
- there is</em></ins></span> a back door in <span
class="removed"><del><strong>Windows 7 and 8.</p></strong></del></span>
<span class="inserted"><ins><em>MacOS</a> for automatically updating some
- (all?) apps.</p>
-
- <p>The specific change described in the article was not
- malicious—it protected users from surveillance by third
- parties—but that is a separate question.</p></em></ins></span>
+ run nonfree apps. They can never be completely sure that</em></ins></span>
a <span class="removed"><del><strong>back door in Windows 7 and
8.</p></strong></del></span> <span class="inserted"><ins><em>nonfree
+ app is safe.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>Most mobile phones have a universal back door, which has been used to
-<a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+<p>Most mobile phones have a universal back door, which has been
used</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201907100">
+ <p>Apple appears</em></ins></span> to <span
class="inserted"><ins><em>say that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
turn them malicious</a>.
</p>
</li>
<li>
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android</strong></del></span>
+A Chinese version of Android has</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door</a>. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>door in
MacOS</a> for automatically updating some
+ (all?) apps.</p>
+
+ <p>The specific change described in the article was not
+ malicious—it protected users from surveillance by third
+ parties—but that is a separate question.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201811100">
- <p>Corel Paintshop Pro</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/"></em></ins></span>
- back <span class="removed"><del><strong>door</a>. Nearly all
-models</strong></del></span> <span class="inserted"><ins><em>door that can
make it cease to function</a>.</p>
+ <li id="M201811100">
+ <p>Corel Paintshop Pro has a <a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease to function</a>.</p>
<p>The article is full</em></ins></span> of <span
class="removed"><del><strong>mobile phones</strong></del></span> <span
class="inserted"><ins><em>confusions, errors and biases that
we</em></ins></span> have
<span class="inserted"><ins><em>an obligation to expose, given that we are
making a link to them.</p>
@@ -938,7 +938,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/20 08:01:58 $
+$Date: 2019/11/23 15:30:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary-back-doors.it.po 18 Nov 2019 15:05:17 -0000 1.127
+++ proprietary-back-doors.it.po 23 Nov 2019 15:30:43 -0000 1.128
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -73,12 +73,16 @@
"dovrebbero servire."
#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr ""
+
+#. type: Content of: <div><div><p>
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
#. type: Content of: <div><div><p>
Index: proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.61
retrieving revision 1.62
diff -u -b -r1.61 -r1.62
--- proprietary-back-doors.ja-diff.html 20 Nov 2019 08:01:58 -0000 1.61
+++ proprietary-back-doors.ja-diff.html 23 Nov 2019 15:30:43 -0000 1.62
@@ -59,16 +59,18 @@
that power to the detriment of the users they ought to serve.</p>
<span class="removed"><del><strong><p>Here</strong></del></span>
-<span class="inserted"><ins><em><hr class="thin" />
+
+<span class="inserted"><ins><em><p>This typically takes the form of
malicious functionalities.</p>
+<hr class="thin" />
</div>
<div id="about-page">
<p>Some malicious functionalities are mediated by <a
href="/proprietary/proprietary.html#f1">back doors</a>.
Here</em></ins></span> are
-examples of <span
class="removed"><del><strong>demonstrated</strong></del></span> <span
class="inserted"><ins><em>programs that contain one or several of those, sorted
-out according to what the</em></ins></span> back <span
class="inserted"><ins><em>door is known to allow. Back</em></ins></span> doors
-<span class="inserted"><ins><em>that allow full control over the operating
system are said to be
-“universal”.</p>
+examples of <span
class="removed"><del><strong>demonstrated</strong></del></span> <span
class="inserted"><ins><em>programs that contain one or several of those,
classified
+according to what the</em></ins></span> back <span
class="inserted"><ins><em>door is known to have the power to do.
+Back</em></ins></span> doors <span class="inserted"><ins><em>that allow full
control over the programs which contain them
+are said to be “universal.”</p>
</div>
<div class="important">
@@ -149,13 +151,14 @@
<span class="removed"><del><strong>Microsoft has
already</strong></del></span>
backdoored its disk <span
class="removed"><del><strong>encryption</a>.</p></li>
- <li><p>Modern gratis game cr…apps</strong></del></span>
<span class="inserted"><ins><em>encryption</a>.</p>
+ <li><p>Modern gratis game cr…apps
+ <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
+ collect a</strong></del></span> <span
class="inserted"><ins><em>encryption</a>.</p>
</li>
<li id="M201409220">
- <p>Apple can, and regularly does,</em></ins></span> <a <span
class="removed"><del><strong>href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</strong></del></span>
- <span
class="inserted"><ins><em>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ <p>Apple can, and regularly does, <a
+
href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
remotely extract some data from iPhones for the state</a>.</p>
<p>This may have improved with <a
@@ -235,7 +238,7 @@
<li id="M201509160">
<p>Modern gratis game cr…apps <a
href="http://toucharcade.com/2015/09/16/we-own-you-confessions-of-a-free-to-play-producer/">
- collect a wide range of</em></ins></span> data about their users and their
users'
+ collect a</em></ins></span> wide range of data about their users and their
users'
friends and associates</a>.</p>
<p>Even nastier, they do it through ad networks that merge the data
@@ -913,7 +916,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/20 08:01:58 $
+$Date: 2019/11/23 15:30:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -b -r1.108 -r1.109
--- proprietary-back-doors.ja.po 18 Nov 2019 15:05:17 -0000 1.108
+++ proprietary-back-doors.ja.po 23 Nov 2019 15:30:43 -0000 1.109
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -63,15 +63,19 @@
"ã«å¯¾ãã¦æ害ãä¸ãã¾ãã"
#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr ""
+
+#. type: Content of: <div><div><p>
#, fuzzy
#| msgid ""
#| "Here are examples of demonstrated back doors in proprietary software."
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr
"ãã¡ãããããã©ã¤ã¨ã¿ãªãªã½ããã¦ã§ã¢ã®ããã¯ãã¢ã®è¨¼æãããä¾ã§ãã"
#. type: Content of: <div><div><p>
Index: proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary-back-doors.pot 18 Nov 2019 11:26:47 -0000 1.76
+++ proprietary-back-doors.pot 23 Nov 2019 15:30:43 -0000 1.77
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -41,12 +41,17 @@
msgstr ""
#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr ""
+
+#. type: Content of: <div><div><p>
msgid ""
"Some malicious functionalities are mediated by <a "
"href=\"/proprietary/proprietary.html#f1\">back doors</a>. Here are examples "
-"of programs that contain one or several of those, sorted out according to "
-"what the back door is known to allow. Back doors that allow full control "
-"over the operating system are said to be “universal”."
+"of programs that contain one or several of those, classified according to "
+"what the back door is known to have the power to do. Back doors that allow "
+"full control over the programs which contain them are said to be "
+"“universal.”"
msgstr ""
#. type: Content of: <div><div><p>
Index: proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary-back-doors.ru.po 19 Nov 2019 07:01:51 -0000 1.196
+++ proprietary-back-doors.ru.po 23 Nov 2019 15:30:43 -0000 1.197
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -51,12 +52,30 @@
"полÑзоваÑелÑм, коÑоÑÑÑ
они должнÑ
обÑлÑживаÑÑ."
#. type: Content of: <div><div><p>
+msgid "This typically takes the form of malicious functionalities."
+msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
+
+#. type: Content of: <div><div><p>
+# | Some malicious functionalities are mediated by <a
+# | href=\"/proprietary/proprietary.html#f1\">back doors</a>. Here are
+# | examples of programs that contain one or several of those, [-sorted out-]
+# | {+classified+} according to what the back door is known to [-allow.-]
+# | {+have the power to do.+} Back doors that allow full control over the
+# | [-operating system-] {+programs which contain them+} are said to be
+# | [-“universal”.-] {+“universal.”+}
+#, fuzzy
+#| msgid ""
+#| "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#| "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#| "contain one or several of those, sorted out according to what the back "
+#| "door is known to allow. Back doors that allow full control over the "
+#| "operating system are said to be “universal”."
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
"ÐекоÑоÑÑе вÑедоноÑнÑе ÑÑнкÑии
опоÑÑÐµÐ´Ð¾Ð²Ð°Ð½Ñ <a href=\"/proprietary/"
"proprietary.html#f1\">лазейками</a>. Here are examples of programs
that "
Index: proprietary-deception.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de-diff.html,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary-deception.de-diff.html 18 Nov 2019 15:05:17 -0000 1.30
+++ proprietary-deception.de-diff.html 23 Nov 2019 15:30:43 -0000 1.31
@@ -56,8 +56,12 @@
</div>
<div id="about-page">
-<p>Deception</em></ins></span> is <span class="inserted"><ins><em>a
malicious functionality of programs that are</em></ins></span> dishonest
-or <span class="removed"><del><strong>conceals deception or
trickery.</p></strong></del></span> <span
class="inserted"><ins><em>conceal trickery. Here are examples of such
programs.</p>
+<p>Deception</em></ins></span> is <span class="inserted"><ins><em>a
malicious functionality that makes the program</em></ins></span>
+dishonest or conceals <span class="inserted"><ins><em>trickery. Here are
examples of such
+malicious functionalities. Cases of</em></ins></span> deception <span
class="removed"><del><strong>or trickery.</p></strong></del></span> <span
class="inserted"><ins><em>that involve taking
+people's money are listed in <a
+href="/proprietary/proprietary-fraud.html#main-heading">
+Proprietary Fraud</a>.</p>
</div>
<div class="important"></em></ins></span>
@@ -75,18 +79,18 @@
<p id="M201509210">Volkswagen programmed its car engine computers to
<a
href="https://www.petri.com/volkswagen-used-software-to-cheat-on-emissions">
detect the Environmental Protection Agency's emission tests</a>, and
- run dirty the rest of</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>time. In real
driving, the cars exceeded
+ run dirty the rest of the time. In real driving, the cars exceeded
emissions standards by a factor of up to 35.</p>
<p>Using free software would not have stopped Volkswagen from
programming it this way, but would have made it harder to conceal,
- and given the users the possibility of correcting the deception.</p>
+ and given the users</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
+
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>possibility
of correcting the deception.</p>
- <p>Former executives of Volkswagen are being</em></ins></span> <a
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ <p>Former executives of Volkswagen are being <a
+
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
@@ -101,8 +105,8 @@
<li id="M201902041.2">
<p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one or more malicious functionalities, such as <a
-
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ be on Google Play had one or more malicious functionalities, such
as</em></ins></span> <a
+ <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos instead of “beautifying” them</a>,
pushing unwanted and often malicious ads on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
@@ -232,7 +236,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/18 15:05:17 $
+$Date: 2019/11/23 15:30:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-deception.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.de.po,v
retrieving revision 1.42
retrieving revision 1.43
diff -u -b -r1.42 -r1.43
--- proprietary-deception.de.po 18 Nov 2019 15:05:17 -0000 1.42
+++ proprietary-deception.de.po 23 Nov 2019 15:30:43 -0000 1.43
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:43+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -79,8 +79,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><div><p>
Index: proprietary-deception.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.es.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-deception.es.po 21 Nov 2019 22:24:37 -0000 1.11
+++ proprietary-deception.es.po 23 Nov 2019 15:30:43 -0000 1.12
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2019-11-20 12:42+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
@@ -58,11 +59,11 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
-"Las trampas son funcionalidades maliciosas de programas que son deshonestos "
-"o utilizan artimañas."
#. type: Content of: <div><div><p>
msgid ""
@@ -283,6 +284,13 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "Deception is a malicious functionality of programs that are dishonest or "
+#~ "conceal trickery. Here are examples of such programs."
+#~ msgstr ""
+#~ "Las trampas son funcionalidades maliciosas de programas que son "
+#~ "deshonestos o utilizan artimañas."
+
+#~ msgid ""
#~ "This document reports instances where proprietary software is dishonest "
#~ "or conceals deception or trickery."
#~ msgstr ""
Index: proprietary-deception.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.fr.po,v
retrieving revision 1.50
retrieving revision 1.51
diff -u -b -r1.50 -r1.51
--- proprietary-deception.fr.po 18 Nov 2019 17:15:32 -0000 1.50
+++ proprietary-deception.fr.po 23 Nov 2019 15:30:43 -0000 1.51
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: fr <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -54,11 +55,11 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
-"La tromperie est une fonctionnalité malveillante des programmes qui sont "
-"malhonnêtes ou cachent un piège. Voici des exemples de tels programmes."
#. type: Content of: <div><div><p>
msgid ""
@@ -278,3 +279,10 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "Deception is a malicious functionality of programs that are dishonest or "
+#~ "conceal trickery. Here are examples of such programs."
+#~ msgstr ""
+#~ "La tromperie est une fonctionnalité malveillante des programmes qui sont "
+#~ "malhonnêtes ou cachent un piège. Voici des exemples de tels programmes."
Index: proprietary-deception.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja-diff.html,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- proprietary-deception.ja-diff.html 18 Nov 2019 15:05:17 -0000 1.35
+++ proprietary-deception.ja-diff.html 23 Nov 2019 15:30:43 -0000 1.36
@@ -56,15 +56,22 @@
</div>
<div id="about-page">
-<p>Deception</em></ins></span> is <span class="inserted"><ins><em>a
malicious functionality of programs that are</em></ins></span> dishonest
-or <span class="removed"><del><strong>conceals deception</strong></del></span>
<span class="inserted"><ins><em>conceal trickery. Here are examples of such
programs.</p>
+<p>Deception</em></ins></span> is <span class="inserted"><ins><em>a
malicious functionality that makes the program</em></ins></span>
+dishonest or conceals <span class="inserted"><ins><em>trickery. Here are
examples of such
+malicious functionalities. Cases of</em></ins></span> deception <span
class="inserted"><ins><em>that involve taking
+people's money are listed in <a
+href="/proprietary/proprietary-fraud.html#main-heading">
+Proprietary Fraud</a>.</p>
</div>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
here, please write
to <a href="mailto:address@hidden"><address@hidden></a>
-to inform us. Please include the URL of a trustworthy reference or two
+to inform us. Please include the URL of a trustworthy
reference</em></ins></span> or <span
class="removed"><del><strong>trickery.</p>
+
+<ul>
+<li></strong></del></span> <span class="inserted"><ins><em>two
to serve as specific substantiation.</p>
</div>
@@ -82,8 +89,8 @@
programming it this way, but would have made it harder to conceal,
and given the users the possibility of correcting the deception.</p>
- <p>Former executives of Volkswagen are being <a
-
href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
+ <p>Former executives of Volkswagen are being</em></ins></span> <a
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/business/2019/apr/15/former-head-of-volkswagen-could-face-10-years-in-prison">
sued over this fraud</a>.</p>
</li>
@@ -98,11 +105,8 @@
<li id="M201902041.2">
<p>Twenty nine “beauty camera” apps that used to
- be on Google Play had one</em></ins></span> or <span
class="removed"><del><strong>trickery.</p>
-
-<ul>
-<li></strong></del></span> <span class="inserted"><ins><em>more
malicious functionalities, such as</em></ins></span> <a
- <span
class="inserted"><ins><em>href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
+ be on Google Play had one or more malicious functionalities, such as <a
+
href="https://www.teleanalysis.com/news/national/these-29-beauty-camera-apps-steal-private-photo-29923">
stealing users' photos instead of “beautifying” them</a>,
pushing unwanted and often malicious ads on users, and redirecting
them to phishing sites that stole their credentials. Furthermore,
@@ -135,9 +139,9 @@
<p>The</em></ins></span> proprietor of the Pokémon Go game <a
href="https://www.theguardian.com/technology/2016/jul/14/pokemon-go-sponsored-locations-restaurants-business">
invites restaurants and other businesses to pay to have the game lure
- people <span
class="removed"><del><strong>there</a>.</strong></del></span> <span
class="inserted"><ins><em>there</a>.</p></em></ins></span>
+ people <span class="removed"><del><strong>there</a>.
</li>
- <span class="removed"><del><strong><li>
+ <li>
<p>“Dark patterns”
are <a
href="http://www.theverge.com/2013/8/29/4640308/dark-patterns-inside-the-interfaces-designed-to-trick-you">user
interfaces designed to mislead users, or make option settings
@@ -145,9 +149,9 @@
<p>This allows a company such as Apple to say, “We allow
users to turn this off” while ensuring that few will
- understand how to actually turn it off.</p>
+ understand how to actually turn it off.</p></strong></del></span>
<span class="inserted"><ins><em>there</a>.</p></em></ins></span>
</li>
- <li></strong></del></span>
+ <span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201511110"></em></ins></span>
<p>A top-ranking proprietary Instagram client promising
@@ -232,7 +236,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/18 15:05:17 $
+$Date: 2019/11/23 15:30:43 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-deception.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ja.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- proprietary-deception.ja.po 18 Nov 2019 15:05:17 -0000 1.43
+++ proprietary-deception.ja.po 23 Nov 2019 15:30:43 -0000 1.44
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2016-11-18 13:31+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -68,8 +68,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><div><p>
Index: proprietary-deception.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.pot,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-deception.pot 18 Nov 2019 15:05:17 -0000 1.27
+++ proprietary-deception.pot 23 Nov 2019 15:30:43 -0000 1.28
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -46,8 +46,11 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious "
+"functionalities. Cases of deception that involve taking people's money are "
+"listed in <a href=\"/proprietary/proprietary-fraud.html#main-heading\"> "
+"Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><div><p>
Index: proprietary-deception.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-deception.ru.po,v
retrieving revision 1.59
retrieving revision 1.60
diff -u -b -r1.59 -r1.60
--- proprietary-deception.ru.po 19 Nov 2019 07:01:52 -0000 1.59
+++ proprietary-deception.ru.po 23 Nov 2019 15:30:43 -0000 1.60
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-deception.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2018-09-27 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Deception - GNU Project - Free Software Foundation"
@@ -56,11 +57,11 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
-"Ðбман — вÑедоноÑÐ½Ð°Ñ ÑÑнкÑиÑ
пÑогÑамм, коÑонÑе неÑеÑÑÐ½Ñ Ð¸Ð»Ð¸ "
-"ÑкÑÑваÑÑ Ð¿Ð¾Ð´Ð²Ð¾Ñ
. ÐÐ¾Ñ Ð¿ÑимеÑÑ ÑакиÑ
пÑогÑамм."
#. type: Content of: <div><div><p>
msgid ""
@@ -282,6 +283,13 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "Deception is a malicious functionality of programs that are dishonest or "
+#~ "conceal trickery. Here are examples of such programs."
+#~ msgstr ""
+#~ "Ðбман — вÑедоноÑÐ½Ð°Ñ ÑÑнкÑиÑ
пÑогÑамм, коÑонÑе неÑеÑÑÐ½Ñ Ð¸Ð»Ð¸ "
+#~ "ÑкÑÑваÑÑ Ð¿Ð¾Ð´Ð²Ð¾Ñ
. ÐÐ¾Ñ Ð¿ÑимеÑÑ ÑакиÑ
пÑогÑамм."
+
+#~ msgid ""
#~ "This document reports instances where proprietary software is dishonest "
#~ "or conceals deception or trickery."
#~ msgstr ""
Index: proprietary-obsolescence.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.es.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- proprietary-obsolescence.es.po 21 Nov 2019 22:24:38 -0000 1.11
+++ proprietary-obsolescence.es.po 23 Nov 2019 15:30:44 -0000 1.12
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2019-11-21 12:15+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -59,40 +60,33 @@
"Habitualmente, esto suele realizarse mediante funcionalidades maliciosas."
#. type: Content of: <div><div><p>
+# | [-One-]{+Programmed obsolescence is one+} of the malicious functionalities
+# | that may be designed into proprietary [-software is obsolescence.-]
+# | {+software.+}
+#, fuzzy
+#| msgid ""
+#| "One of the malicious functionalities that may be designed into "
+#| "proprietary software is obsolescence."
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
"Una de las funcionalidades maliciosas que pueden diseñarse en el software "
"privativo es la obsolescencia."
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
-msgstr ""
-"Como toda actividad humana, la informática tiene un impacto ambiental, pero "
-"es aún más dañina para el planeta cuando es privativa, pues incita al "
-"usuario a cambiar los dispositivos cuyo software ya no se actualiza, comprar "
-"nuevos componentes para reemplazar aquellos que quedan sin asistencia "
-"técnica, o descartar alguno defectuoso que se podrÃa reparar si el software
"
-"fuese libre."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
+msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
-msgstr ""
-"Se presentan aquà ejemplos de software privativo que está diseñado para "
-"estropear o hacer irreparables los dispositivos con los que está "
-"relacionado. Los usuarios no pueden evitar esta restricción y se ven "
-"forzados a «actualizar» el hardware porque no tienen ningún control sobre
el "
-"software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
+msgstr ""
#. type: Content of: <div><div><p>
msgid ""
@@ -317,3 +311,29 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Ãltima actualización:"
+
+#~ msgid ""
+#~ "IT has an environmental impact, as does any human activity, but it is "
+#~ "especially harmful to the planet when it is proprietary, because then it "
+#~ "encourages users to change devices when they are no longer updated, or to "
+#~ "replace components when they are no longer supported, or to discard "
+#~ "defective hardware which would be repairable if it were free."
+#~ msgstr ""
+#~ "Como toda actividad humana, la informática tiene un impacto ambiental, "
+#~ "pero es aún más dañina para el planeta cuando es privativa, pues incita
"
+#~ "al usuario a cambiar los dispositivos cuyo software ya no se actualiza, "
+#~ "comprar nuevos componentes para reemplazar aquellos que quedan sin "
+#~ "asistencia técnica, o descartar alguno defectuoso que se podrÃa reparar "
+#~ "si el software fuese libre."
+
+#~ msgid ""
+#~ "Here are examples of proprietary software that is designed to break the "
+#~ "devices they are associated with, or to make them irreparable. Users "
+#~ "cannot avoid this constraint and are forced to “upgrade” the "
+#~ "hardware because they have no control over the software."
+#~ msgstr ""
+#~ "Se presentan aquà ejemplos de software privativo que está diseñado para
"
+#~ "estropear o hacer irreparables los dispositivos con los que está "
+#~ "relacionado. Los usuarios no pueden evitar esta restricción y se ven "
+#~ "forzados a «actualizar» el hardware porque no tienen ningún control
sobre "
+#~ "el software."
Index: proprietary-obsolescence.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.fr.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- proprietary-obsolescence.fr.po 18 Nov 2019 17:15:33 -0000 1.15
+++ proprietary-obsolescence.fr.po 23 Nov 2019 15:30:44 -0000 1.16
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Obsolescence - GNU Project - Free Software Foundation"
@@ -54,40 +55,33 @@
msgstr "Cela prend habituellement la forme de fonctionnalités malveillantes."
#. type: Content of: <div><div><p>
+# | [-One-]{+Programmed obsolescence is one+} of the malicious functionalities
+# | that may be designed into proprietary [-software is obsolescence.-]
+# | {+software.+}
+#, fuzzy
+#| msgid ""
+#| "One of the malicious functionalities that may be designed into "
+#| "proprietary software is obsolescence."
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
"L'une des fonctionnalités malveillantes pouvant être intégrées au
logiciel "
"privateur est l'obsolescence."
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
-msgstr ""
-"Comme toute activité humaine, l'informatique a un effet sur l'environnement.
"
-"Mais elle peut être particulièrement nuisible à la planète si elle est "
-"privatrice, parce qu'alors elle encourage l'utilisateur à remplacer les "
-"appareils lorsque leur logiciel n'est plus mis à jour, ou à acheter
d'autres "
-"composants lorsqu'ils ne sont plus gérés, ou encore à mettre au rebut des "
-"composants défectueux qui, s'ils avaient été libre, auraient été
réparables."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
+msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
-msgstr ""
-"Voici des exemples de logiciels privateurs conçus pour mettre hors d'usage "
-"les appareils avec lesquels ils sont associés ou pour les rendre "
-"irréparables. Les utilisateurs ne peuvent éviter cette contrainte et sont "
-"forcés de « mettre à niveau » le matériel car ils n'ont aucun
contrôle sur "
-"le logiciel."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
+msgstr ""
#. type: Content of: <div><div><p>
msgid ""
@@ -313,3 +307,30 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "IT has an environmental impact, as does any human activity, but it is "
+#~ "especially harmful to the planet when it is proprietary, because then it "
+#~ "encourages users to change devices when they are no longer updated, or to "
+#~ "replace components when they are no longer supported, or to discard "
+#~ "defective hardware which would be repairable if it were free."
+#~ msgstr ""
+#~ "Comme toute activité humaine, l'informatique a un effet sur "
+#~ "l'environnement. Mais elle peut être particulièrement nuisible à la "
+#~ "planète si elle est privatrice, parce qu'alors elle encourage "
+#~ "l'utilisateur à remplacer les appareils lorsque leur logiciel n'est plus "
+#~ "mis à jour, ou à acheter d'autres composants lorsqu'ils ne sont plus "
+#~ "gérés, ou encore à mettre au rebut des composants défectueux qui,
s'ils "
+#~ "avaient été libre, auraient été réparables."
+
+#~ msgid ""
+#~ "Here are examples of proprietary software that is designed to break the "
+#~ "devices they are associated with, or to make them irreparable. Users "
+#~ "cannot avoid this constraint and are forced to “upgrade” the "
+#~ "hardware because they have no control over the software."
+#~ msgstr ""
+#~ "Voici des exemples de logiciels privateurs conçus pour mettre hors "
+#~ "d'usage les appareils avec lesquels ils sont associés ou pour les rendre "
+#~ "irréparables. Les utilisateurs ne peuvent éviter cette contrainte et
sont "
+#~ "forcés de « mettre à niveau » le matériel car ils n'ont aucun
contrôle "
+#~ "sur le logiciel."
Index: proprietary-obsolescence.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.pot,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -b -r1.6 -r1.7
--- proprietary-obsolescence.pot 18 Nov 2019 15:05:18 -0000 1.6
+++ proprietary-obsolescence.pot 23 Nov 2019 15:30:44 -0000 1.7
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -46,25 +46,22 @@
#. type: Content of: <div><div><p>
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
msgstr ""
#. type: Content of: <div><div><p>
Index: proprietary-obsolescence.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-obsolescence.ru.po,v
retrieving revision 1.10
retrieving revision 1.11
diff -u -b -r1.10 -r1.11
--- proprietary-obsolescence.ru.po 19 Nov 2019 07:01:53 -0000 1.10
+++ proprietary-obsolescence.ru.po 23 Nov 2019 15:30:44 -0000 1.11
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-obsolescence.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2019-09-04 15:43+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Obsolescence - GNU Project - Free Software Foundation"
@@ -55,39 +56,33 @@
msgstr "Ðак пÑавило, ÑÑо пÑÐ¸Ð½Ð¸Ð¼Ð°ÐµÑ ÑоÑмÑ
вÑедоноÑнÑÑ
ÑÑнкÑий."
#. type: Content of: <div><div><p>
+# | [-One-]{+Programmed obsolescence is one+} of the malicious functionalities
+# | that may be designed into proprietary [-software is obsolescence.-]
+# | {+software.+}
+#, fuzzy
+#| msgid ""
+#| "One of the malicious functionalities that may be designed into "
+#| "proprietary software is obsolescence."
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
"Ðдна из вÑедоноÑнÑÑ
ÑÑнкÑий, коÑоÑÑе
могÑÑ Ð·Ð°ÐºÐ»Ð°Ð´ÑваÑÑÑÑ Ð² неÑвободнÑе "
"пÑогÑÐ°Ð¼Ð¼Ñ — ÑÑÑаÑевание."
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
-msgstr ""
-"Ðак лÑÐ±Ð°Ñ ÑеловеÑеÑÐºÐ°Ñ Ð´ÐµÑÑелÑноÑÑÑ,
вÑÑиÑлиÑелÑÐ½Ð°Ñ ÑеÑ
ника влиÑÐµÑ Ð½Ð° "
-"окÑÑжаÑÑÑÑ ÑÑедÑ, но она наноÑÐ¸Ñ Ð¾Ñобенно
болÑÑой вÑед планеÑе, когда "
-"пÑогÑÐ°Ð¼Ð¼Ñ Ð½ÐµÑвободнÑ, поÑÐ¾Ð¼Ñ ÑÑо Ñогда
они пооÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¼ÐµÐ½ÑÑÑ "
-"ÑÑÑÑойÑÑва, когда пÑогÑÐ°Ð¼Ð¼Ñ Ð¿ÐµÑеÑÑаÑÑ
обновлÑÑÑ, или заменÑÑÑ ÐºÐ¾Ð¼Ð¿Ð¾Ð½ÐµÐ½ÑÑ, "
-"когда они болÑÑе не поддеÑживаÑÑÑÑ, или
вÑбÑаÑÑваÑÑ Ð½ÐµÐ¸ÑпÑавнÑÑ ÑеÑ
никÑ, "
-"коÑоÑÑÑ, еÑли Ð±Ñ Ð¾Ð½Ð° бÑла Ñвободна, можно
бÑло Ð±Ñ Ð¿Ð¾ÑиниÑÑ."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
+msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
-msgstr ""
-"ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм,
ÑпÑоекÑиÑованнÑÑ
Ñак, ÑÑÐ¾Ð±Ñ Ð²ÑводиÑÑ Ð¸Ð· "
-"ÑÑÑÐ¾Ñ ÑÑÑÑойÑÑва, Ñ ÐºÐ¾ÑоÑÑми они ÑвÑзанÑ,
или делаÑÑ Ð¸Ñ
неÑемонÑопÑигоднÑми. "
-"ÐолÑзоваÑели не могÑÑ Ð¾Ð±Ð¾Ð¹Ñи ÑÑо
огÑаниÑение и пÑинÑждаÑÑÑÑ “"
-"обновлÑÑÑ” ÑÑÑÑойÑÑва, поÑÐ¾Ð¼Ñ ÑÑо Ñ Ð½Ð¸Ñ
Ð½ÐµÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ пÑогÑаммами."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
+msgstr ""
#. type: Content of: <div><div><p>
msgid ""
@@ -313,6 +308,32 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "IT has an environmental impact, as does any human activity, but it is "
+#~ "especially harmful to the planet when it is proprietary, because then it "
+#~ "encourages users to change devices when they are no longer updated, or to "
+#~ "replace components when they are no longer supported, or to discard "
+#~ "defective hardware which would be repairable if it were free."
+#~ msgstr ""
+#~ "Ðак лÑÐ±Ð°Ñ ÑеловеÑеÑÐºÐ°Ñ Ð´ÐµÑÑелÑноÑÑÑ,
вÑÑиÑлиÑелÑÐ½Ð°Ñ ÑеÑ
ника влиÑÐµÑ Ð½Ð° "
+#~ "окÑÑжаÑÑÑÑ ÑÑедÑ, но она наноÑиÑ
оÑобенно болÑÑой вÑед планеÑе, когда "
+#~ "пÑогÑÐ°Ð¼Ð¼Ñ Ð½ÐµÑвободнÑ, поÑÐ¾Ð¼Ñ ÑÑо Ñогда
они пооÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¼ÐµÐ½ÑÑÑ "
+#~ "ÑÑÑÑойÑÑва, когда пÑогÑÐ°Ð¼Ð¼Ñ Ð¿ÐµÑеÑÑаÑÑ
обновлÑÑÑ, или заменÑÑÑ ÐºÐ¾Ð¼Ð¿Ð¾Ð½ÐµÐ½ÑÑ, "
+#~ "когда они болÑÑе не поддеÑживаÑÑÑÑ, или
вÑбÑаÑÑваÑÑ Ð½ÐµÐ¸ÑпÑавнÑÑ ÑеÑ
никÑ, "
+#~ "коÑоÑÑÑ, еÑли Ð±Ñ Ð¾Ð½Ð° бÑла Ñвободна, можно
бÑло Ð±Ñ Ð¿Ð¾ÑиниÑÑ."
+
+#~ msgid ""
+#~ "Here are examples of proprietary software that is designed to break the "
+#~ "devices they are associated with, or to make them irreparable. Users "
+#~ "cannot avoid this constraint and are forced to “upgrade” the "
+#~ "hardware because they have no control over the software."
+#~ msgstr ""
+#~ "ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм,
ÑпÑоекÑиÑованнÑÑ
Ñак, ÑÑÐ¾Ð±Ñ Ð²ÑводиÑÑ Ð¸Ð· "
+#~ "ÑÑÑÐ¾Ñ ÑÑÑÑойÑÑва, Ñ ÐºÐ¾ÑоÑÑми они
ÑвÑзанÑ, или делаÑÑ Ð¸Ñ
"
+#~ "неÑемонÑопÑигоднÑми. ÐолÑзоваÑели не
могÑÑ Ð¾Ð±Ð¾Ð¹Ñи ÑÑо огÑаниÑение и "
+#~ "пÑинÑждаÑÑÑÑ “обновлÑÑÑ”
ÑÑÑÑойÑÑва, поÑÐ¾Ð¼Ñ ÑÑо Ñ Ð½Ð¸Ñ
Ð½ÐµÑ "
+#~ "конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ пÑогÑаммами."
+
+#~ msgid ""
#~ "This page is licensed under a <a rel=\"license\" href=\"http://"
#~ "creativecommons.org/licenses/by-nd/4.0/\">Creative Commons Attribution-"
#~ "NoDerivatives 4.0 International License</a>."
Index: proprietary-subscriptions.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de-diff.html,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-subscriptions.de-diff.html 18 Nov 2019 15:05:18 -0000
1.25
+++ proprietary-subscriptions.de-diff.html 23 Nov 2019 15:30:44 -0000
1.26
@@ -63,7 +63,10 @@
it is <a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">tethered</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary-tethers.html#about-page">tethered</em></ins></span>
to a server</a>, and that server checks the date. Either one is a
malicious functionality.</p>
-<span class="inserted"><ins><em></div>
+
+<span class="inserted"><ins><em><p>Examples of software subscriptions
that harmed users directly are
+given below.</p>
+</div>
<div class="important"></em></ins></span>
<p>If you know of an example that ought to be in this page but isn't
@@ -205,7 +208,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/18 15:05:18 $
+$Date: 2019/11/23 15:30:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-subscriptions.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.de.po,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- proprietary-subscriptions.de.po 18 Nov 2019 15:05:18 -0000 1.29
+++ proprietary-subscriptions.de.po 23 Nov 2019 15:30:44 -0000 1.30
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -108,6 +108,12 @@
"dieser überprüft das Datum. Beides ist eine bösartige Funktionalität."
#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
# | If you know of an example that ought to be in this page but isn't here,
# | please write to <a
# | href=\"mailto:address@hidden\"><address@hidden></a> to
Index: proprietary-subscriptions.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.es.po,v
retrieving revision 1.12
retrieving revision 1.13
diff -u -b -r1.12 -r1.13
--- proprietary-subscriptions.es.po 21 Nov 2019 22:24:38 -0000 1.12
+++ proprietary-subscriptions.es.po 23 Nov 2019 15:30:44 -0000 1.13
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2019-11-21 12:22+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
"Plural-Forms: nplurals=2;plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -74,6 +75,12 @@
#. type: Content of: <div><div><p>
msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden\"><webmasters@gnu."
"org></a> to inform us. Please include the URL of a trustworthy reference "
Index: proprietary-subscriptions.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.fr.po,v
retrieving revision 1.44
retrieving revision 1.45
diff -u -b -r1.44 -r1.45
--- proprietary-subscriptions.fr.po 18 Nov 2019 17:15:33 -0000 1.44
+++ proprietary-subscriptions.fr.po 23 Nov 2019 15:30:44 -0000 1.45
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -69,6 +70,12 @@
#. type: Content of: <div><div><p>
msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden\"><webmasters@gnu."
"org></a> to inform us. Please include the URL of a trustworthy reference "
Index: proprietary-subscriptions.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja-diff.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-subscriptions.ja-diff.html 18 Nov 2019 15:05:19 -0000
1.34
+++ proprietary-subscriptions.ja-diff.html 23 Nov 2019 15:30:44 -0000
1.35
@@ -65,7 +65,10 @@
<span class="removed"><del><strong><ul>
<li></strong></del></span>
-<span class="inserted"><ins><em></div>
+
+<span class="inserted"><ins><em><p>Examples of software subscriptions
that harmed users directly are
+given below.</p>
+</div>
<div class="important">
<p>If you know of an example that ought to be in this page but isn't
@@ -207,7 +210,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/18 15:05:19 $
+$Date: 2019/11/23 15:30:44 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-subscriptions.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ja.po,v
retrieving revision 1.25
retrieving revision 1.26
diff -u -b -r1.25 -r1.26
--- proprietary-subscriptions.ja.po 18 Nov 2019 15:05:19 -0000 1.25
+++ proprietary-subscriptions.ja.po 23 Nov 2019 15:30:44 -0000 1.26
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2016-09-16 09:36+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -91,6 +91,12 @@
#. type: Content of: <div><div><p>
msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden\"><webmasters@gnu."
"org></a> to inform us. Please include the URL of a trustworthy reference "
Index: proprietary-subscriptions.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.pot,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- proprietary-subscriptions.pot 18 Nov 2019 15:05:19 -0000 1.23
+++ proprietary-subscriptions.pot 23 Nov 2019 15:30:44 -0000 1.24
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -56,6 +56,12 @@
#. type: Content of: <div><div><p>
msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a "
"href=\"mailto:address@hidden\"><address@hidden></a> to inform "
Index: proprietary-subscriptions.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-subscriptions.ru.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- proprietary-subscriptions.ru.po 19 Nov 2019 07:01:53 -0000 1.51
+++ proprietary-subscriptions.ru.po 23 Nov 2019 15:30:44 -0000 1.52
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-subscriptions.html\n"
-"POT-Creation-Date: 2019-11-18 14:55+0000\n"
+"POT-Creation-Date: 2019-11-23 15:25+0000\n"
"PO-Revision-Date: 2018-06-23 09:13+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2019-11-23 15:25+0000\n"
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
@@ -71,6 +72,12 @@
#. type: Content of: <div><div><p>
msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
+#. type: Content of: <div><div><p>
+msgid ""
"If you know of an example that ought to be in this page but isn't here, "
"please write to <a href=\"mailto:address@hidden\"><webmasters@gnu."
"org></a> to inform us. Please include the URL of a trustworthy reference "
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.208
retrieving revision 1.209
diff -u -b -r1.208 -r1.209
--- pt-br.po 19 Nov 2019 08:32:12 -0000 1.208
+++ pt-br.po 23 Nov 2019 15:30:44 -0000 1.209
@@ -7063,9 +7063,9 @@
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
#. type: Content of: <div><div><h3>
@@ -7460,8 +7460,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -8037,25 +8039,22 @@
#. type: Content of: <div><div><p>
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -8550,6 +8549,12 @@
"functionality."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.351
retrieving revision 1.352
diff -u -b -r1.351 -r1.352
--- ru.po 19 Nov 2019 10:31:11 -0000 1.351
+++ ru.po 23 Nov 2019 15:30:44 -0000 1.352
@@ -8636,12 +8636,26 @@
msgstr "Ðазейки в неÑвободнÑÑ
пÑогÑаммаÑ
"
#. type: Content of: <div><div><p>
+# | Some malicious functionalities are mediated by <a
+# | href=\"/proprietary/proprietary.html#f1\">back doors</a>. Here are
+# | examples of programs that contain one or several of those, [-sorted out-]
+# | {+classified+} according to what the back door is known to [-allow.-]
+# | {+have the power to do.+} Back doors that allow full control over the
+# | [-operating system-] {+programs which contain them+} are said to be
+# | [-“universal”.-] {+“universal.”+}
+#, fuzzy
+#| msgid ""
+#| "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#| "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#| "contain one or several of those, sorted out according to what the back "
+#| "door is known to allow. Back doors that allow full control over the "
+#| "operating system are said to be “universal”."
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
"ÐекоÑоÑÑе вÑедоноÑнÑе ÑÑнкÑии
опоÑÑÐµÐ´Ð¾Ð²Ð°Ð½Ñ <a href=\"/proprietary/"
"proprietary.html#f1\">лазейками</a>. Here are examples of programs
that "
@@ -9093,11 +9107,11 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
-"Ðбман — вÑедоноÑÐ½Ð°Ñ ÑÑнкÑиÑ
пÑогÑамм, коÑонÑе неÑеÑÑÐ½Ñ Ð¸Ð»Ð¸ "
-"ÑкÑÑваÑÑ Ð¿Ð¾Ð´Ð²Ð¾Ñ
. ÐÐ¾Ñ Ð¿ÑимеÑÑ ÑакиÑ
пÑогÑамм."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -9798,39 +9812,33 @@
msgstr "УÑÑаÑевание неÑвободнÑÑ
пÑогÑамм"
#. type: Content of: <div><div><p>
+# | [-One-]{+Programmed obsolescence is one+} of the malicious functionalities
+# | that may be designed into proprietary [-software is obsolescence.-]
+# | {+software.+}
+#, fuzzy
+#| msgid ""
+#| "One of the malicious functionalities that may be designed into "
+#| "proprietary software is obsolescence."
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
"Ðдна из вÑедоноÑнÑÑ
ÑÑнкÑий, коÑоÑÑе
могÑÑ Ð·Ð°ÐºÐ»Ð°Ð´ÑваÑÑÑÑ Ð² неÑвободнÑе "
"пÑогÑÐ°Ð¼Ð¼Ñ — ÑÑÑаÑевание."
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
-msgstr ""
-"Ðак лÑÐ±Ð°Ñ ÑеловеÑеÑÐºÐ°Ñ Ð´ÐµÑÑелÑноÑÑÑ,
вÑÑиÑлиÑелÑÐ½Ð°Ñ ÑеÑ
ника влиÑÐµÑ Ð½Ð° "
-"окÑÑжаÑÑÑÑ ÑÑедÑ, но она наноÑÐ¸Ñ Ð¾Ñобенно
болÑÑой вÑед планеÑе, когда "
-"пÑогÑÐ°Ð¼Ð¼Ñ Ð½ÐµÑвободнÑ, поÑÐ¾Ð¼Ñ ÑÑо Ñогда
они пооÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¼ÐµÐ½ÑÑÑ "
-"ÑÑÑÑойÑÑва, когда пÑогÑÐ°Ð¼Ð¼Ñ Ð¿ÐµÑеÑÑаÑÑ
обновлÑÑÑ, или заменÑÑÑ ÐºÐ¾Ð¼Ð¿Ð¾Ð½ÐµÐ½ÑÑ, "
-"когда они болÑÑе не поддеÑживаÑÑÑÑ, или
вÑбÑаÑÑваÑÑ Ð½ÐµÐ¸ÑпÑавнÑÑ ÑеÑ
никÑ, "
-"коÑоÑÑÑ, еÑли Ð±Ñ Ð¾Ð½Ð° бÑла Ñвободна, можно
бÑло Ð±Ñ Ð¿Ð¾ÑиниÑÑ."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
+msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
-msgstr ""
-"ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм,
ÑпÑоекÑиÑованнÑÑ
Ñак, ÑÑÐ¾Ð±Ñ Ð²ÑводиÑÑ Ð¸Ð· "
-"ÑÑÑÐ¾Ñ ÑÑÑÑойÑÑва, Ñ ÐºÐ¾ÑоÑÑми они ÑвÑзанÑ,
или делаÑÑ Ð¸Ñ
неÑемонÑопÑигоднÑми. "
-"ÐолÑзоваÑели не могÑÑ Ð¾Ð±Ð¾Ð¹Ñи ÑÑо
огÑаниÑение и пÑинÑждаÑÑÑÑ “"
-"обновлÑÑÑ” ÑÑÑÑойÑÑва, поÑÐ¾Ð¼Ñ ÑÑо Ñ Ð½Ð¸Ñ
Ð½ÐµÑ ÐºÐ¾Ð½ÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ пÑогÑаммами."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
+msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -10341,6 +10349,12 @@
"proprietary/proprietary-tethers.html#about-page\">пÑивÑзана к
ÑеÑвеÑÑ</a>, а "
"ÑеÑÐ²ÐµÑ Ð¿ÑовеÑÑÐµÑ Ð´Ð°ÑÑ. Ð Ñо, и дÑÑгое
ÑвлÑеÑÑÑ Ð²ÑедоноÑной ÑÑнкÑией."
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr ""
@@ -11525,6 +11539,61 @@
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
#~ msgid ""
+#~ "Some malicious functionalities are mediated by <a href=\"/proprietary/"
+#~ "proprietary.html#f1\">back doors</a>. Here are examples of programs that "
+#~ "contain one or several of those, sorted out according to what the back "
+#~ "door is known to allow. Back doors that allow full control over the "
+#~ "operating system are said to be “universal”."
+#~ msgstr ""
+#~ "ÐекоÑоÑÑе вÑедоноÑнÑе ÑÑнкÑии
опоÑÑÐµÐ´Ð¾Ð²Ð°Ð½Ñ <a href=\"/proprietary/"
+#~ "proprietary.html#f1\">лазейками</a>. Here are examples of
programs that "
+#~ "ÐдеÑÑ Ð¿ÑÐ¸Ð²ÐµÐ´ÐµÐ½Ñ Ð¿ÑимеÑÑ Ð»Ð°Ð·ÐµÐµÐº,
ÑÑÑеÑÑвование коÑоÑÑÑ
в неÑвободнÑÑ
"
+#~ "пÑогÑаммаÑ
бÑло показано. Ðни ÑазбиÑÑ Ð½Ð°
гÑÑÐ¿Ð¿Ñ Ð¿Ð¾ ÑомÑ, ÑÑо они "
+#~ "(наÑколÑко нам извеÑÑно) позволÑÑÑ.
Ðазейки, коÑоÑÑе допÑÑкаÑÑ Ð¿Ð¾Ð»Ð½Ñй "
+#~ "конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ опеÑаÑионной ÑиÑÑемой,
обознаÑÐµÐ½Ñ ÐºÐ°Ðº “"
+#~ "ÑнивеÑÑалÑнÑе”."
+
+#~ msgid ""
+#~ "Deception is a malicious functionality of programs that are dishonest or "
+#~ "conceal trickery. Here are examples of such programs."
+#~ msgstr ""
+#~ "Ðбман — вÑедоноÑÐ½Ð°Ñ ÑÑнкÑиÑ
пÑогÑамм, коÑонÑе неÑеÑÑÐ½Ñ Ð¸Ð»Ð¸ "
+#~ "ÑкÑÑваÑÑ Ð¿Ð¾Ð´Ð²Ð¾Ñ
. ÐÐ¾Ñ Ð¿ÑимеÑÑ ÑакиÑ
пÑогÑамм."
+
+#~ msgid ""
+#~ "One of the malicious functionalities that may be designed into "
+#~ "proprietary software is obsolescence."
+#~ msgstr ""
+#~ "Ðдна из вÑедоноÑнÑÑ
ÑÑнкÑий, коÑоÑÑе
могÑÑ Ð·Ð°ÐºÐ»Ð°Ð´ÑваÑÑÑÑ Ð² неÑвободнÑе "
+#~ "пÑогÑÐ°Ð¼Ð¼Ñ — ÑÑÑаÑевание."
+
+#~ msgid ""
+#~ "IT has an environmental impact, as does any human activity, but it is "
+#~ "especially harmful to the planet when it is proprietary, because then it "
+#~ "encourages users to change devices when they are no longer updated, or to "
+#~ "replace components when they are no longer supported, or to discard "
+#~ "defective hardware which would be repairable if it were free."
+#~ msgstr ""
+#~ "Ðак лÑÐ±Ð°Ñ ÑеловеÑеÑÐºÐ°Ñ Ð´ÐµÑÑелÑноÑÑÑ,
вÑÑиÑлиÑелÑÐ½Ð°Ñ ÑеÑ
ника влиÑÐµÑ Ð½Ð° "
+#~ "окÑÑжаÑÑÑÑ ÑÑедÑ, но она наноÑиÑ
оÑобенно болÑÑой вÑед планеÑе, когда "
+#~ "пÑогÑÐ°Ð¼Ð¼Ñ Ð½ÐµÑвободнÑ, поÑÐ¾Ð¼Ñ ÑÑо Ñогда
они пооÑÑÑÑÑ Ð¿Ð¾Ð»ÑзоваÑÐµÐ»Ñ Ð¼ÐµÐ½ÑÑÑ "
+#~ "ÑÑÑÑойÑÑва, когда пÑогÑÐ°Ð¼Ð¼Ñ Ð¿ÐµÑеÑÑаÑÑ
обновлÑÑÑ, или заменÑÑÑ ÐºÐ¾Ð¼Ð¿Ð¾Ð½ÐµÐ½ÑÑ, "
+#~ "когда они болÑÑе не поддеÑживаÑÑÑÑ, или
вÑбÑаÑÑваÑÑ Ð½ÐµÐ¸ÑпÑавнÑÑ ÑеÑ
никÑ, "
+#~ "коÑоÑÑÑ, еÑли Ð±Ñ Ð¾Ð½Ð° бÑла Ñвободна, можно
бÑло Ð±Ñ Ð¿Ð¾ÑиниÑÑ."
+
+#~ msgid ""
+#~ "Here are examples of proprietary software that is designed to break the "
+#~ "devices they are associated with, or to make them irreparable. Users "
+#~ "cannot avoid this constraint and are forced to “upgrade” the "
+#~ "hardware because they have no control over the software."
+#~ msgstr ""
+#~ "ÐÐ¾Ñ Ð¿ÑимеÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм,
ÑпÑоекÑиÑованнÑÑ
Ñак, ÑÑÐ¾Ð±Ñ Ð²ÑводиÑÑ Ð¸Ð· "
+#~ "ÑÑÑÐ¾Ñ ÑÑÑÑойÑÑва, Ñ ÐºÐ¾ÑоÑÑми они
ÑвÑзанÑ, или делаÑÑ Ð¸Ñ
"
+#~ "неÑемонÑопÑигоднÑми. ÐолÑзоваÑели не
могÑÑ Ð¾Ð±Ð¾Ð¹Ñи ÑÑо огÑаниÑение и "
+#~ "пÑинÑждаÑÑÑÑ “обновлÑÑÑ”
ÑÑÑÑойÑÑва, поÑÐ¾Ð¼Ñ ÑÑо Ñ Ð½Ð¸Ñ
Ð½ÐµÑ "
+#~ "конÑÑÐ¾Ð»Ñ Ð½Ð°Ð´ пÑогÑаммами."
+
+#~ msgid ""
#~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
#~ "malware</a>"
#~ msgstr ""
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.161
retrieving revision 1.162
diff -u -b -r1.161 -r1.162
--- zh-tw.po 19 Nov 2019 08:32:12 -0000 1.161
+++ zh-tw.po 23 Nov 2019 15:30:44 -0000 1.162
@@ -6077,9 +6077,9 @@
msgid ""
"Some malicious functionalities are mediated by <a href=\"/proprietary/"
"proprietary.html#f1\">back doors</a>. Here are examples of programs that "
-"contain one or several of those, sorted out according to what the back door "
-"is known to allow. Back doors that allow full control over the operating "
-"system are said to be “universal”."
+"contain one or several of those, classified according to what the back door "
+"is known to have the power to do. Back doors that allow full control over "
+"the programs which contain them are said to be “universal.”"
msgstr ""
#. type: Content of: <div><div><h3>
@@ -6461,8 +6461,10 @@
#. type: Content of: <div><div><p>
msgid ""
-"Deception is a malicious functionality of programs that are dishonest or "
-"conceal trickery. Here are examples of such programs."
+"Deception is a malicious functionality that makes the program dishonest or "
+"conceals trickery. Here are examples of such malicious functionalities. "
+"Cases of deception that involve taking people's money are listed in <a href="
+"\"/proprietary/proprietary-fraud.html#main-heading\"> Proprietary Fraud</a>."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -7042,25 +7044,22 @@
#. type: Content of: <div><div><p>
msgid ""
-"One of the malicious functionalities that may be designed into proprietary "
-"software is obsolescence."
+"Programmed obsolescence is one of the malicious functionalities that may be "
+"designed into proprietary software."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"IT has an environmental impact, as does any human activity, but it is "
-"especially harmful to the planet when it is proprietary, because then it "
-"encourages users to change devices when they are no longer updated, or to "
-"replace components when they are no longer supported, or to discard "
-"defective hardware which would be repairable if it were free."
+"Computer technology inevitably has an environmental impact, but proprietary "
+"software makes it worse because it is often designed to lead or pressure "
+"users to discard devices sooner because support for them has ceased, or to "
+"discard defective hardware which could have been made repairable."
msgstr ""
#. type: Content of: <div><div><p>
msgid ""
-"Here are examples of proprietary software that is designed to break the "
-"devices they are associated with, or to make them irreparable. Users cannot "
-"avoid this constraint and are forced to “upgrade” the hardware "
-"because they have no control over the software."
+"Here are examples of proprietary programs that make hardware devices "
+"prematurely obsolete."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -7652,6 +7651,12 @@
"functionality."
msgstr ""
+#. type: Content of: <div><div><p>
+msgid ""
+"Examples of software subscriptions that harmed users directly are given "
+"below."
+msgstr ""
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
# | Foundation