[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www philosophy/po/free-software-even-more-impor...
From: |
GNUN |
Subject: |
www philosophy/po/free-software-even-more-impor... |
Date: |
Mon, 20 Jan 2020 14:04:03 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/01/20 14:04:02
Modified files:
philosophy/po : free-software-even-more-important.ar-diff.html
free-software-even-more-important.ar.po
free-software-even-more-important.de.po
free-software-even-more-important.el-diff.html
free-software-even-more-important.el.po
free-software-even-more-important.es.po
free-software-even-more-important.fr.po
free-software-even-more-important.it-diff.html
free-software-even-more-important.it.po
free-software-even-more-important.ja.po
free-software-even-more-important.lt-diff.html
free-software-even-more-important.lt.po
free-software-even-more-important.nl.po
free-software-even-more-important.pt-br.po
free-software-even-more-important.ru.po
free-software-even-more-important.sq.po
free-software-even-more-important.tr.po
free-software-even-more-important.uk-diff.html
free-software-even-more-important.uk.po
free-software-even-more-important.zh-cn.po
proprietary/po : de.po es.po fr.po it.po ja.po
malware-mobiles.de-diff.html
malware-mobiles.de.po malware-mobiles.es.po
malware-mobiles.fr.po
malware-mobiles.it-diff.html
malware-mobiles.it.po
malware-mobiles.ja-diff.html
malware-mobiles.ja.po malware-mobiles.pot
malware-mobiles.ru.po nl.po pl.po pot
proprietary-back-doors.de-diff.html
proprietary-back-doors.de.po
proprietary-back-doors.es.po
proprietary-back-doors.fr.po
proprietary-back-doors.it-diff.html
proprietary-back-doors.it.po
proprietary-back-doors.ja-diff.html
proprietary-back-doors.ja.po
proprietary-back-doors.pot
proprietary-back-doors.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.ar-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.ar.po?cvsroot=www&r1=1.18&r2=1.19
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.de.po?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.el-diff.html?cvsroot=www&r1=1.16&r2=1.17
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.el.po?cvsroot=www&r1=1.17&r2=1.18
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.es.po?cvsroot=www&r1=1.56&r2=1.57
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.fr.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.it-diff.html?cvsroot=www&r1=1.7&r2=1.8
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.it.po?cvsroot=www&r1=1.53&r2=1.54
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.ja.po?cvsroot=www&r1=1.43&r2=1.44
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.lt-diff.html?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.lt.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.nl.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.pt-br.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.ru.po?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.sq.po?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.tr.po?cvsroot=www&r1=1.2&r2=1.3
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.uk-diff.html?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.uk.po?cvsroot=www&r1=1.35&r2=1.36
http://web.cvs.savannah.gnu.org/viewcvs/www/philosophy/po/free-software-even-more-important.zh-cn.po?cvsroot=www&r1=1.21&r2=1.22
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.235&r2=1.236
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.287&r2=1.288
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de-diff.html?cvsroot=www&r1=1.71&r2=1.72
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.de.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.es.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.fr.po?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it-diff.html?cvsroot=www&r1=1.76&r2=1.77
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.it.po?cvsroot=www&r1=1.127&r2=1.128
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja-diff.html?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ja.po?cvsroot=www&r1=1.118&r2=1.119
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.pot?cvsroot=www&r1=1.93&r2=1.94
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-mobiles.ru.po?cvsroot=www&r1=1.216&r2=1.217
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.164&r2=1.165
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.de.po?cvsroot=www&r1=1.135&r2=1.136
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.es.po?cvsroot=www&r1=1.30&r2=1.31
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.fr.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it-diff.html?cvsroot=www&r1=1.64&r2=1.65
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.it.po?cvsroot=www&r1=1.128&r2=1.129
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja-diff.html?cvsroot=www&r1=1.63&r2=1.64
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ja.po?cvsroot=www&r1=1.110&r2=1.111
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.pot?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-back-doors.ru.po?cvsroot=www&r1=1.198&r2=1.199
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.247&r2=1.248
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.295&r2=1.296
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.154&r2=1.155
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.192&r2=1.193
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.155&r2=1.156
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.156&r2=1.157
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.261&r2=1.262
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.328&r2=1.329
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.134&r2=1.135
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.144&r2=1.145
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.214&r2=1.215
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.362&r2=1.363
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.165&r2=1.166
Patches:
Index: philosophy/po/free-software-even-more-important.ar-diff.html
===================================================================
RCS file:
/web/www/www/philosophy/po/free-software-even-more-important.ar-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- philosophy/po/free-software-even-more-important.ar-diff.html 30 Dec
2019 12:08:32 -0000 1.16
+++ philosophy/po/free-software-even-more-important.ar-diff.html 20 Jan
2020 19:03:59 -0000 1.17
@@ -57,8 +57,8 @@
both <em>malware</em>. That is, both have functionalities
designed to
mistreat the user. Proprietary software nowadays is often malware
because <a href="/proprietary/proprietary.html">the developers' power
-corrupts <span
class="removed"><del><strong>them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>them</a>. That directory lists around
400 different
-malicious functionalities (as of April, 2019), but it is surely just the
+corrupts <span
class="removed"><del><strong>them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>them</a>. That directory lists around
450 different
+malicious functionalities (as of January, 2020), but it is surely just the
tip of the iceberg.</p></em></ins></span>
<p>With free software, the users control the program, both individually
@@ -375,7 +375,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2017, 2018, 2019</em></ins></span> Richard
Stallman</p>
+<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2017, 2018, 2019, 2020</em></ins></span>
Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -385,7 +385,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:03:59 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/free-software-even-more-important.ar.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.ar.po,v
retrieving revision 1.18
retrieving revision 1.19
diff -u -b -r1.18 -r1.19
--- philosophy/po/free-software-even-more-important.ar.po 30 Dec 2019
12:08:32 -0000 1.18
+++ philosophy/po/free-software-even-more-important.ar.po 20 Jan 2020
19:03:59 -0000 1.19
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2016-11-13 20:34+0100\n"
"Last-Translator: Faycal Alami <address@hidden>\n"
"Language-Team: Arabic <address@hidden>\n"
@@ -103,9 +103,9 @@
# | <em>malware</em>. That is, both have functionalities designed to mistreat
# | the user. Proprietary software nowadays is often malware because <a
# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
-# | them</a>. {+That directory lists around 400 different malicious
-# | functionalities (as of April, 2019), but it is surely just the tip of the
-# | iceberg.+}
+# | them</a>. {+That directory lists around 450 different malicious
+# | functionalities (as of January, 2020), but it is surely just the tip of
+# | the iceberg.+}
#, fuzzy
#| msgid ""
#| "Those two nonfree programs have something else in common: they are both "
@@ -118,8 +118,8 @@
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"ÙÙا٠ÙاسÙ
Ù
شتر٠بÙÙ ÙØ°Ù٠اÙبرÙاÙ
جÙÙ
اÙاØتÙارÙÙÙ: ÙÙÙ
ا Ù
عا٠<em>برÙاÙ
جÙÙ "
"خبÙØ«ÙÙ</em>. أ٠أ٠ÙÙÙÙÙ
ا ÙتÙÙر عÙÙ Ùظائ٠Ù
صÙ
Ù
Ø© ÙÙإساءة ÙÙÙ
ستخدÙ
. ÙÙ٠اÙÙÙت "
@@ -813,10 +813,10 @@
"href=\"/server/standards/README.translations.html\">دÙÙ٠اÙترجÙ
Ø©</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2015-] {+2015, 2017, 2018, 2019+} Richard Stallman
+# | Copyright © [-2015-] {+2015, 2017, 2018, 2019, 2020+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2015 Richard Stallman"
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015 رÙتشارد ساÙÙ
Ù"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.de.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.de.po,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- philosophy/po/free-software-even-more-important.de.po 24 Jun 2019
06:58:17 -0000 1.34
+++ philosophy/po/free-software-even-more-important.de.po 20 Jan 2020
19:03:59 -0000 1.35
@@ -9,7 +9,7 @@
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-05-11 23:55+0200\n"
"Last-Translator: Maximilian Bast <address@hidden>\n"
"Language-Team: German <address@hidden>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -86,13 +87,29 @@
"Macht, die niemand haben sollte."
#. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>. That is, both have functionalities designed to mistreat
+# | the user. Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>. That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Diese beiden unfreien Programme haben noch etwas anderes gemein: beide sind "
"<em>Schadsoftware</em>. Das heiÃt, beide verfügen über Funktionen, um den "
@@ -744,7 +761,10 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.el-diff.html
===================================================================
RCS file:
/web/www/www/philosophy/po/free-software-even-more-important.el-diff.html,v
retrieving revision 1.16
retrieving revision 1.17
diff -u -b -r1.16 -r1.17
--- philosophy/po/free-software-even-more-important.el-diff.html 30 Dec
2019 12:08:32 -0000 1.16
+++ philosophy/po/free-software-even-more-important.el-diff.html 20 Jan
2020 19:03:59 -0000 1.17
@@ -57,8 +57,8 @@
both <em>malware</em>. That is, both have functionalities
designed to
mistreat the user. Proprietary software nowadays is often malware
because <a href="/proprietary/proprietary.html">the developers' power
-corrupts <span
class="removed"><del><strong>them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>them</a>. That directory lists around
400 different
-malicious functionalities (as of April, 2019), but it is surely just the
+corrupts <span
class="removed"><del><strong>them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>them</a>. That directory lists around
450 different
+malicious functionalities (as of January, 2020), but it is surely just the
tip of the iceberg.</p></em></ins></span>
<p>With free software, the users control the program, both individually
@@ -375,7 +375,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2017, 2018, 2019</em></ins></span> Richard
Stallman</p>
+<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2017, 2018, 2019, 2020</em></ins></span>
Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -385,7 +385,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:03:59 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/free-software-even-more-important.el.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.el.po,v
retrieving revision 1.17
retrieving revision 1.18
diff -u -b -r1.17 -r1.18
--- philosophy/po/free-software-even-more-important.el.po 16 Jul 2019
16:30:03 -0000 1.17
+++ philosophy/po/free-software-even-more-important.el.po 20 Jan 2020
19:03:59 -0000 1.18
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2016-05-08 22:12+0200\n"
"Last-Translator: Georgios Zarkadas <address@hidden>\n"
"Language-Team: Greek <address@hidden>\n"
@@ -102,9 +102,9 @@
# | <em>malware</em>. That is, both have functionalities designed to mistreat
# | the user. Proprietary software nowadays is often malware because <a
# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
-# | them</a>. {+That directory lists around 400 different malicious
-# | functionalities (as of April, 2019), but it is surely just the tip of the
-# | iceberg.+}
+# | them</a>. {+That directory lists around 450 different malicious
+# | functionalities (as of January, 2020), but it is surely just the tip of
+# | the iceberg.+}
#, fuzzy
#| msgid ""
#| "Those two nonfree programs have something else in common: they are both "
@@ -117,8 +117,8 @@
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"ÎÏ
Ïά Ïα δÏο μη-ελεÏθεÏα ÏÏογÏάμμαÏα ÎÏοÏ
ν
εÏίÏÎ·Ï ÎºÎ¬Ïι άλλο κοινÏ: είναι και "
"Ïα δÏο <em>κακÏβοÏ
λο λογιÏÎ¼Î¹ÎºÏ (malware)</em>.
Îηλαδή, και Ïα δÏο ÏεÏιÎÏοÏ
ν "
@@ -859,10 +859,10 @@
"\"/server/standards/README.translations.html\">ÎεÏαÏÏάÏειÏ
ÎÎÎÎÎΣÎÎÎ</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2015-] {+2015, 2017, 2018, 2019+} Richard Stallman
+# | Copyright © [-2015-] {+2015, 2017, 2018, 2019, 2020+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2015 Richard Stallman"
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "ΠνεÏ
μαÏικά δικαιÏμαÏα © 2015 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.es.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.es.po,v
retrieving revision 1.56
retrieving revision 1.57
diff -u -b -r1.56 -r1.57
--- philosophy/po/free-software-even-more-important.es.po 15 Jan 2020
11:58:20 -0000 1.56
+++ philosophy/po/free-software-even-more-important.es.po 20 Jan 2020
19:03:59 -0000 1.57
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-05-25 11:20+0200\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=utf-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 1.8.11\n"
@@ -83,13 +84,29 @@
"del desarrollador del programa, poder que nadie deberÃa tener."
#. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>. That is, both have functionalities designed to mistreat
+# | the user. Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>. That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Esos dos programas, que no son libres, tienen algo más en común: ambos son "
"<cite>malware</cite>. Es decir, ambos contienen funcionalidades que están "
@@ -735,7 +752,10 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.fr.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.fr.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- philosophy/po/free-software-even-more-important.fr.po 24 May 2019
11:42:35 -0000 1.53
+++ philosophy/po/free-software-even-more-important.fr.po 20 Jan 2020
19:04:00 -0000 1.54
@@ -9,7 +9,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-05-24 13:40+0200\n"
"Last-Translator: Félicien Pillot <felicien AT gnu.org>\n"
"Language-Team: French <address@hidden>\n"
@@ -17,6 +17,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -86,13 +87,29 @@
"pouvoir que personne ne devrait posséder."
#. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>. That is, both have functionalities designed to mistreat
+# | the user. Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>. That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Ces deux programmes non libres ont quelque chose d'autre en commun : ils "
"sont tous deux « malveillants », c'est-à -dire qu'ils ont tous deux des "
@@ -754,7 +771,10 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.it-diff.html
===================================================================
RCS file:
/web/www/www/philosophy/po/free-software-even-more-important.it-diff.html,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -b -r1.7 -r1.8
--- philosophy/po/free-software-even-more-important.it-diff.html 30 Dec
2019 12:08:32 -0000 1.7
+++ philosophy/po/free-software-even-more-important.it-diff.html 20 Jan
2020 19:04:00 -0000 1.8
@@ -57,8 +57,8 @@
both <em>malware</em>. That is, both have functionalities
designed to
mistreat the user. Proprietary software nowadays is often malware
because <a <span
class="removed"><del><strong>href="/malware/">the</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary.html">the</em></ins></span>
developers' power
-corrupts them</a>. That directory lists around 400 different
-malicious functionalities (as of April, 2019), but it is surely just the
+corrupts them</a>. That directory lists around <span
class="removed"><del><strong>400</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span> different
+malicious functionalities (as of <span class="removed"><del><strong>April,
2019),</strong></del></span> <span class="inserted"><ins><em>January,
2020),</em></ins></span> but it is surely just the
tip of the iceberg.</p>
<p>With free software, the users control the program, both individually
@@ -374,7 +374,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, 2017, 2018, 2019 Richard Stallman</p>
+<p>Copyright © 2015, 2017, 2018, <span
class="removed"><del><strong>2019</strong></del></span> <span
class="inserted"><ins><em>2019, 2020</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -384,7 +384,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:04:00 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/free-software-even-more-important.it.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.it.po,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -b -r1.53 -r1.54
--- philosophy/po/free-software-even-more-important.it.po 24 May 2019
11:02:49 -0000 1.53
+++ philosophy/po/free-software-even-more-important.it.po 20 Jan 2020
19:04:00 -0000 1.54
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-04-18 22:23+0200\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian\n"
@@ -105,9 +105,9 @@
# | <em>malware</em>. That is, both have functionalities designed to mistreat
# | the user. Proprietary software nowadays is often malware because <a
# | [-href=\"/malware/\">the-] {+href=\"/proprietary/proprietary.html\">the+}
-# | developers' power corrupts them</a>. That directory lists around 400
-# | different malicious functionalities (as of April, 2019), but it is surely
-# | just the tip of the iceberg.
+# | developers' power corrupts them</a>. That directory lists around
+# | 4[-0-]{+5+}0 different malicious functionalities (as of [-April, 2019),-]
+# | {+January, 2020),+} but it is surely just the tip of the iceberg.
#, fuzzy
#| msgid ""
#| "Those two nonfree programs have something else in common: they are both "
@@ -121,8 +121,8 @@
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Questi due programmi non liberi hanno qualcos'altro in comune: sono entrambi "
"<em>malware</em>, nel senso che contengono funzionalità irrispettose "
@@ -818,7 +818,10 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.ja.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.ja.po,v
retrieving revision 1.43
retrieving revision 1.44
diff -u -b -r1.43 -r1.44
--- philosophy/po/free-software-even-more-important.ja.po 4 Jul 2019
04:28:11 -0000 1.43
+++ philosophy/po/free-software-even-more-important.ja.po 20 Jan 2020
19:04:00 -0000 1.44
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-07-01 14:49+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -78,13 +79,22 @@
"ããã£ãåã¯èª°ãæãã¦ã¯ãããªãã®ã§ãã"
#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"å·®ç°ã¨ã¯å¥ã«ããã®äºã¤ã®ä¸èªç±ãªããã°ã©ã ã¯å
±éã®ç¹ãããã¾ãã両æ¹ã¨ã<em>"
"ãã«ã¦ã§ã¢</em>ãªã®ã§ããããªãã¡ããã®ã¦ã¼ã¶ãèå¾
ããããã«è¨è¨ãããæ©è½ã"
@@ -697,7 +707,9 @@
"README.translations.html\">翻訳 README</a>ãã覧ãã ããã"
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.lt-diff.html
===================================================================
RCS file:
/web/www/www/philosophy/po/free-software-even-more-important.lt-diff.html,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- philosophy/po/free-software-even-more-important.lt-diff.html 30 Dec
2019 12:08:32 -0000 1.15
+++ philosophy/po/free-software-even-more-important.lt-diff.html 20 Jan
2020 19:04:00 -0000 1.16
@@ -57,8 +57,8 @@
both <em>malware</em>. That is, both have functionalities
designed to
mistreat the user. Proprietary software nowadays is often malware
because <a href="/proprietary/proprietary.html">the developers' power
-corrupts <span
class="removed"><del><strong>them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>them</a>. That directory lists around
400 different
-malicious functionalities (as of April, 2019), but it is surely just the
+corrupts <span
class="removed"><del><strong>them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>them</a>. That directory lists around
450 different
+malicious functionalities (as of January, 2020), but it is surely just the
tip of the iceberg.</p></em></ins></span>
<p>With free software, the users control the program, both individually
@@ -375,7 +375,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2017, 2018, 2019</em></ins></span> Richard
Stallman</p>
+<p>Copyright © <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2017, 2018, 2019, 2020</em></ins></span>
Richard Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -385,7 +385,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:04:00 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/free-software-even-more-important.lt.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.lt.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- philosophy/po/free-software-even-more-important.lt.po 30 Dec 2019
12:08:32 -0000 1.19
+++ philosophy/po/free-software-even-more-important.lt.po 20 Jan 2020
19:04:00 -0000 1.20
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2015-09-12 21:32+0300\n"
"Last-Translator: Donatas Klimašauskas <address@hidden>\n"
"Language-Team: Lithuanian <address@hidden>\n"
@@ -107,9 +107,9 @@
# | <em>malware</em>. That is, both have functionalities designed to mistreat
# | the user. Proprietary software nowadays is often malware because <a
# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
-# | them</a>. {+That directory lists around 400 different malicious
-# | functionalities (as of April, 2019), but it is surely just the tip of the
-# | iceberg.+}
+# | them</a>. {+That directory lists around 450 different malicious
+# | functionalities (as of January, 2020), but it is surely just the tip of
+# | the iceberg.+}
#, fuzzy
#| msgid ""
#| "Those two nonfree programs have something else in common: they are both "
@@ -122,8 +122,8 @@
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Tos dvi programos turi kai kÄ
daugiau bendro: jos abi yra <em>kenkÄjiÅ¡kos "
"programos</em>. Tai yra, abi turi funkcionalumus, suprojektuotus "
@@ -854,10 +854,10 @@
"PERSKAITYKITEMANE</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2015-] {+2015, 2017, 2018, 2019+} Richard Stallman
+# | Copyright © [-2015-] {+2015, 2017, 2018, 2019, 2020+} Richard Stallman
#, fuzzy
#| msgid "Copyright © 2015 Richard Stallman"
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.nl.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.nl.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- philosophy/po/free-software-even-more-important.nl.po 2 Aug 2019
10:05:31 -0000 1.27
+++ philosophy/po/free-software-even-more-important.nl.po 20 Jan 2020
19:04:00 -0000 1.28
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2017-11-24 22:08+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
"X-Generator: Poedit 1.8.11\n"
#. type: Content of: <title>
@@ -81,13 +82,29 @@
"gebruikers, macht die niemand zou moeten hebben."
#. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>. That is, both have functionalities designed to mistreat
+# | the user. Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>. That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Deze twee private programma's hebben iets gemeen: ze zijn beide <em>malware</"
"em>. Dat betekent dat ze functies hebben die zijn ontworpen om de gebruiker "
@@ -729,7 +746,10 @@
"voor informatie over het onderhoud van vertalingen op deze website."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
# bijgewerkt
Index: philosophy/po/free-software-even-more-important.pt-br.po
===================================================================
RCS file:
/web/www/www/philosophy/po/free-software-even-more-important.pt-br.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- philosophy/po/free-software-even-more-important.pt-br.po 25 May 2019
08:29:21 -0000 1.38
+++ philosophy/po/free-software-even-more-important.pt-br.po 20 Jan 2020
19:04:00 -0000 1.39
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-05-25 04:50-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -82,13 +83,22 @@
"sobre os usuários, poder que ninguém deveria ter."
#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Esses dois programas não livres têm algo mais em comum: ambos são "
"<em>malwares</em>. Ou seja, ambos têm funcionalidades concebidas para "
@@ -724,7 +734,9 @@
"envio de traduções das páginas desse site."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.ru.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.ru.po,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- philosophy/po/free-software-even-more-important.ru.po 24 May 2019
13:57:37 -0000 1.51
+++ philosophy/po/free-software-even-more-important.ru.po 20 Jan 2020
19:04:00 -0000 1.52
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-05-24 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -81,13 +82,29 @@
"полÑзоваÑелÑми — влаÑÑÑ, коÑоÑой не
должно бÑÑÑ Ð½Ð¸ Ñ ÐºÐ¾Ð³Ð¾."
#. type: Content of: <p>
+# | Those two nonfree programs have something else in common: they are both
+# | <em>malware</em>. That is, both have functionalities designed to mistreat
+# | the user. Proprietary software nowadays is often malware because <a
+# | href=\"/proprietary/proprietary.html\">the developers' power corrupts
+# | them</a>. That directory lists around 4[-0-]{+5+}0 different malicious
+# | functionalities (as of [-April, 2019),-] {+January, 2020),+} but it is
+# | surely just the tip of the iceberg.
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"ÐÑи две пÑогÑÐ°Ð¼Ð¼Ñ Ð¾Ð±ÑединÑÐµÑ Ð´ÑÑгое: и Ñа,
и дÑÑÐ³Ð°Ñ <em>вÑедоноÑна</em>. "
"ÐÑÑгими Ñловами, в обеиÑ
еÑÑÑ ÑÑнкÑии длÑ
ÑÑÐµÐ¼Ð»ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑзоваÑелÑ. РнаÑи дни "
@@ -727,7 +744,10 @@
# type: Content of: <div><p>
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+# | Copyright © 2015, 2017, 2018, [-2019-] {+2019, 2020+} Richard Stallman
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr ""
"Copyright © 2015, 2017, 2018, 2019 Richard Stallman<br />Copyright "
"© 2015, 2017, 2018, 2019 Free Software Foundation, Inc. (translation)"
Index: philosophy/po/free-software-even-more-important.sq.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.sq.po,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- philosophy/po/free-software-even-more-important.sq.po 3 Jun 2019
11:32:03 -0000 1.45
+++ philosophy/po/free-software-even-more-important.sq.po 20 Jan 2020
19:04:00 -0000 1.46
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-06-03 12:49+0300\n"
"Last-Translator: Besnik Bleta <address@hidden>\n"
"Language-Team: \n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
"X-Generator: Poedit 2.2\n"
#. type: Content of: <title>
@@ -79,13 +80,22 @@
"përdoruesit, pushtet që nuk duhet ta ketë kush."
#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Këto dy programe jo të lira kanë diçka të përbashkët: janë që të dy
"
"<em>malware</em>. Domethënë, që të dy kanë funksione të konceptuar
për "
@@ -719,7 +729,9 @@
"standards/README.translations.html\">README për përkthimet</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Të drejta kopjimi © 2015, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.tr.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.tr.po,v
retrieving revision 1.2
retrieving revision 1.3
diff -u -b -r1.2 -r1.3
--- philosophy/po/free-software-even-more-important.tr.po 14 Dec 2019
09:59:54 -0000 1.2
+++ philosophy/po/free-software-even-more-important.tr.po 20 Jan 2020
19:04:00 -0000 1.3
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-12-14 08:19+0100\n"
"Last-Translator: T. E. Kalayci <address@hidden>\n"
"Language-Team: Turkish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
"X-Generator: Poedit 2.2.4\n"
#. type: Content of: <title>
@@ -79,13 +80,22 @@
"iktidar saÄlar, kimsenin sahip olmaması gereken bir güç."
#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Bu iki özgür olmayan programın ortak bir yanı var: İkisi de <em>kötü
amaçlı "
"yazılım</em>. Yani her ikisi de kullanıcıya kötü davranmak üzere
tasarlanmıŠ"
@@ -715,7 +725,9 @@
"\">çalıÅma sayfamızı</a> ziyaret edebilirsiniz."
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.uk-diff.html
===================================================================
RCS file:
/web/www/www/philosophy/po/free-software-even-more-important.uk-diff.html,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- philosophy/po/free-software-even-more-important.uk-diff.html 30 Dec
2019 12:08:32 -0000 1.13
+++ philosophy/po/free-software-even-more-important.uk-diff.html 20 Jan
2020 19:04:00 -0000 1.14
@@ -57,8 +57,8 @@
both <em>malware</em>. That is, both have functionalities
designed to
mistreat the user. Proprietary software nowadays is often malware
because <a <span
class="removed"><del><strong>href="/malware/">the</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/proprietary.html">the</em></ins></span>
developers' power
-corrupts them</a>. That directory lists around <span
class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span> different
-malicious functionalities (as of <span class="removed"><del><strong>Apr
2017),</strong></del></span> <span class="inserted"><ins><em>April,
2019),</em></ins></span> but it is surely just the
+corrupts them</a>. That directory lists around <span
class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span> different
+malicious functionalities (as of <span class="removed"><del><strong>Apr
2017),</strong></del></span> <span class="inserted"><ins><em>January,
2020),</em></ins></span> but it is surely just the
tip of the iceberg.</p>
<p>With free software, the users control the program, both individually
@@ -374,7 +374,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2015, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Richard
Stallman</p>
+<p>Copyright © 2015, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Richard
Stallman</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by-nd/4.0/">Creative
@@ -384,7 +384,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/30 12:08:32 $
+$Date: 2020/01/20 19:04:00 $
<!-- timestamp end -->
</p>
</div>
Index: philosophy/po/free-software-even-more-important.uk.po
===================================================================
RCS file: /web/www/www/philosophy/po/free-software-even-more-important.uk.po,v
retrieving revision 1.35
retrieving revision 1.36
diff -u -b -r1.35 -r1.36
--- philosophy/po/free-software-even-more-important.uk.po 24 May 2019
11:02:50 -0000 1.35
+++ philosophy/po/free-software-even-more-important.uk.po 20 Jan 2020
19:04:00 -0000 1.36
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2017-12-10 07:52+0200\n"
"Last-Translator: Andriy Bandura <address@hidden>\n"
"Language-Team: Ukrainian <>\n"
@@ -107,8 +107,8 @@
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"Ð¦Ñ Ð´Ð²Ñ Ð½ÐµÐ²ÑлÑÐ½Ñ Ð¿ÑогÑами маÑÑÑ Ð´ÐµÑо
ÑпÑлÑне: вони Ð¾Ð±Ð¸Ð´Ð²Ñ Ñ <em>ÑкÑдливими "
"пÑогÑамами</em>. ТобÑо Ð¾Ð±Ð¸Ð´Ð²Ñ Ð¼Ð°ÑÑÑ
можливоÑÑÑ, ÑозÑÐ¾Ð±Ð»ÐµÐ½Ñ Ð´Ð»Ñ Ð·Ð½ÐµÐ²Ð°Ð³Ð¸ "
@@ -781,7 +781,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2015, 2017 Richard Stallman"
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017 Ð ÑÑаÑд СÑолмен"
#. type: Content of: <div><p>
Index: philosophy/po/free-software-even-more-important.zh-cn.po
===================================================================
RCS file:
/web/www/www/philosophy/po/free-software-even-more-important.zh-cn.po,v
retrieving revision 1.21
retrieving revision 1.22
diff -u -b -r1.21 -r1.22
--- philosophy/po/free-software-even-more-important.zh-cn.po 25 May 2019
13:00:59 -0000 1.21
+++ philosophy/po/free-software-even-more-important.zh-cn.po 20 Jan 2020
19:04:00 -0000 1.22
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: free-software-even-more-important.html\n"
-"POT-Creation-Date: 2019-05-24 10:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:26+0000\n"
"PO-Revision-Date: 2019-05-25 20:40+0800\n"
"Last-Translator: Wensheng Xie <address@hidden>\n"
"Language-Team: Chinese <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:26+0000\n"
#. type: Content of: <title>
msgid ""
@@ -73,13 +74,22 @@
"åï¼èä»»ä½äººé½ä¸åºè¯¥æ¥æè¿æ ·çæåã"
#. type: Content of: <p>
+#, fuzzy
+#| msgid ""
+#| "Those two nonfree programs have something else in common: they are both "
+#| "<em>malware</em>. That is, both have functionalities designed to "
+#| "mistreat the user. Proprietary software nowadays is often malware "
+#| "because <a href=\"/proprietary/proprietary.html\">the developers' power "
+#| "corrupts them</a>. That directory lists around 400 different malicious "
+#| "functionalities (as of April, 2019), but it is surely just the tip of the "
+#| "iceberg."
msgid ""
"Those two nonfree programs have something else in common: they are both "
"<em>malware</em>. That is, both have functionalities designed to mistreat "
"the user. Proprietary software nowadays is often malware because <a href=\"/"
"proprietary/proprietary.html\">the developers' power corrupts them</a>. "
-"That directory lists around 400 different malicious functionalities (as of "
-"April, 2019), but it is surely just the tip of the iceberg."
+"That directory lists around 450 different malicious functionalities (as of "
+"January, 2020), but it is surely just the tip of the iceberg."
msgstr ""
"è¿ä¸¤ç§éèªç±è½¯ä»¶è¿æä¸äºå
±åç¹ï¼å®ä»¬é½æ¯<em>æ¶æ软件</em>ãå°±æ¯è¯´ï¼å®ä»¬é½å¸¦æ"
"æ害ç¨æ·çåè½ãå½ä»çä¸æ软件é常é½æ¯æ¶æ软件ï¼å
为<a href=\"/proprietary/"
@@ -614,7 +624,9 @@
"ç¿»è¯é¡»ç¥</a>è·åæå
³åè°åæ交翻è¯çç¸å
³äºé¡¹ã"
#. type: Content of: <div><p>
-msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+#, fuzzy
+#| msgid "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
+msgid "Copyright © 2015, 2017, 2018, 2019, 2020 Richard Stallman"
msgstr "Copyright © 2015, 2017, 2018, 2019 Richard Stallman"
#. type: Content of: <div><p>
Index: proprietary/po/de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/de.po 27 Dec 2019 10:34:03 -0000 1.165
+++ proprietary/po/de.po 20 Jan 2020 19:04:00 -0000 1.166
@@ -7764,6 +7764,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -9517,6 +9541,18 @@
"androidsecuritytest.com 2011.\">verstecktes allgemeines Ãberwachungspaket "
"wie <b>Carrier IQ</b></a> hinzu."
+#. type: Content of: <div><p>
+# | Copyright © 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright © 2014-2018 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Malware in Webpages - GNU Project - Free Software Foundation"
msgstr ""
@@ -10496,10 +10532,10 @@
"zusammengestellt."
#. type: Content of: <div><p>
-# | Copyright © 2014-201[-8-]{+9+} Free Software Foundation, Inc.
+# | Copyright © [-2014-2018-] {+2014-2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2014-2018 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 201<ins>3</ins>-2018 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -11657,8 +11693,8 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
# | [-functionalities,-] {+functionalities (with more than 500 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
@@ -11667,7 +11703,7 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -12013,15 +12049,15 @@
msgstr "Letzte Ergänzungen"
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr "Copyright © 2013-2018 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -13759,6 +13795,35 @@
"<a href=\"/proprietary/malware-microsoft\">Schadsoftware von Microsoft</a>"
#, fuzzy
+#~| msgid "Copyright © 2014-2018 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 201<ins>3</ins>-2018 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "In den Dokumenten sind ungefähr 300 Fälle böswilliger Funktionalitäten
"
+#~ "aufgelistet, es gibt aber sicherlich Tausende, über die nichts bekannt "
+#~ "sind (Stand 2017-04)."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright © 2013-2018 Free Software Foundation, Inc."
+
+#, fuzzy
#~| msgid ""
#~| "This page describes how various proprietary programs mess up the user's "
#~| "system. They are like sabotage, but they are not grave enough to qualify "
Index: proprietary/po/es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.235
retrieving revision 1.236
diff -u -b -r1.235 -r1.236
--- proprietary/po/es.po 27 Dec 2019 10:34:03 -0000 1.235
+++ proprietary/po/es.po 20 Jan 2020 19:04:00 -0000 1.236
@@ -7367,6 +7367,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -9120,6 +9144,20 @@
"features/logs-and-services/loggers/carrieriq/\">paquete de vigilancia "
"general oculto como Carrier IQ</a>."
+#. type: Content of: <div><p>
+# | Copyright © 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
# | Malware in [-Mobile Devices-] {+Webpages+} - GNU Project - Free Software
# | Foundation
@@ -10228,12 +10266,11 @@
"traseras</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2014, 2015-] {+2014-2019+} Free Software Foundation,
-# | Inc.
+# | Copyright © [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
#, fuzzy
-#| msgid "Copyright © 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
-msgstr "Copyright © 2014, 2015 Free Software Foundation, Inc."
+#| msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Proprietary Censorship - GNU Project - Free Software Foundation"
@@ -11425,22 +11462,22 @@
"de ser engañado."
#. type: Content of: <div><p>
-# | As of [-April,-] {+October,+} 2019, the pages in this directory list
-# | around 400 instances of malicious functionalities (with more than [-450-]
-# | {+500+} references to back them up), but there are surely thousands more
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
# | we don't know about.
#, fuzzy
#| msgid ""
-#| "As of April, 2019, the pages in this directory list around 400 instances "
-#| "of malicious functionalities (with more than 450 references to back them "
-#| "up), but there are surely thousands more we don't know about."
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
-"Hasta abril de 2019, las páginas de este directorio ofrecÃan una lista de "
-"alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 450 "
+"Hasta octubre de 2019, las páginas de este directorio ofrecÃan una lista de
"
+"alrededor de 500 ejemplos de funcionalidades maliciosas (con más de 450 "
"referencias de apoyo), pero seguramente hay miles más que desconocemos."
#. type: Content of: <div><table><tr><th>
@@ -11671,17 +11708,17 @@
msgstr "Añadidos recientes"
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
"Foundation, Inc."
#. type: Content of: <title>
@@ -13403,6 +13440,36 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft</a>"
#, fuzzy
+#~| msgid "Copyright © 2014, 2015 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the pages in this directory list around 400 instances "
+#~| "of malicious functionalities (with more than 450 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Hasta abril de 2019, las páginas de este directorio ofrecÃan una lista
de "
+#~ "alrededor de 400 ejemplos de funcionalidades maliciosas (con más de 450 "
+#~ "referencias de apoyo), pero seguramente hay miles más que desconocemos."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
#~| msgid ""
#~| "This page describes how various proprietary programs harass or annoy the "
#~| "user, or cause trouble for the user. These actions are like sabotage "
Index: proprietary/po/fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.287
retrieving revision 1.288
diff -u -b -r1.287 -r1.288
--- proprietary/po/fr.po 27 Dec 2019 16:03:54 -0000 1.287
+++ proprietary/po/fr.po 20 Jan 2020 19:04:00 -0000 1.288
@@ -6469,6 +6469,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -8090,6 +8114,18 @@
"features/logs-and-services/loggers/carrieriq/\">un logiciel de surveillance "
"cachée tous azimuts comme Carrier IQ</a>."
+#. type: Content of: <div><p>
+# | Copyright © 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Malware in Webpages - GNU Project - Free Software Foundation"
msgstr "Malveillance des pages web - Projet GNU - Free Software Foundation"
@@ -9038,7 +9074,10 @@
"dérobées</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+# | Copyright © [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -9990,8 +10029,17 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -10211,9 +10259,15 @@
msgstr "Ajouts récents"
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr "Copyright © 2013-2019 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -11601,3 +11655,20 @@
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
msgstr ""
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
+
+#~ msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
+
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "En octobre 2019, les pages de ce répertoire dénombraient à peu près
400 "
+#~ "cas de fonctionnalités malveillante (appuyés par plus de 500
références), "
+#~ "mais il y en a sûrement des milliers d'autres dont nous ne savons rien."
+
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright © 2013-2019 Free Software Foundation, Inc."
Index: proprietary/po/it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/it.po 27 Dec 2019 10:34:04 -0000 1.165
+++ proprietary/po/it.po 20 Jan 2020 19:04:00 -0000 1.166
@@ -7351,6 +7351,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -8959,6 +8983,17 @@
"features/logs-and-services/loggers/carrieriq/\">pacchetto di sorveglianza "
"generale nascosto come Carrier IQ</a>."
+#. type: Content of: <div><p>
+# | Copyright © 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Malware in [-Mobile Devices-] {+Webpages+} - GNU Project - Free Software
# | Foundation
@@ -9879,10 +9914,10 @@
"deeplinks/2015/02/who-really-owns-your-drones\">uso di backdoor</a>."
#. type: Content of: <div><p>
-# | Copyright © 2014-201[-7-]{+9+} Free Software Foundation, Inc.
+# | Copyright © [-2014-2017-] {+2014-2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -10948,8 +10983,8 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
# | [-functionalities,-] {+functionalities (with more than 500 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
@@ -10958,7 +10993,7 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -11312,15 +11347,15 @@
msgstr "Ultime aggiunte"
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
@@ -13034,6 +13069,36 @@
msgstr ""
"<a href=\"/proprietary/malware-microsoft.html\">Malware di Microsoft</a>"
+#, fuzzy
+#~| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Nel 2017 questo elenco comprende circa 300 esempi di funzionalità "
+#~ "malevole, ma sicuramente ce ne sono altre migliaia che ancora non "
+#~ "conosciamo."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
#~ msgid ""
#~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
#~ "malware</a>"
Index: proprietary/po/ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- proprietary/po/ja.po 31 Dec 2019 01:04:17 -0000 1.173
+++ proprietary/po/ja.po 20 Jan 2020 19:04:00 -0000 1.174
@@ -5628,6 +5628,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -6846,6 +6870,15 @@
"services/loggers/carrieriq/\">Carrier IQã®ãããªé
ãããä¸è¬ç£è¦ããã±ã¼ã¸</"
"a>ãå ãã¾ããã"
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Malware in Webpages - GNU Project - Free Software Foundation"
msgstr ""
@@ -7594,7 +7627,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -8500,7 +8533,7 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -8732,8 +8765,8 @@
#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
@@ -10151,6 +10184,35 @@
msgstr "<a
href=\"/proprietary/malware-microsoft.html\">ãã¤ã¯ãã½ãã</a>"
#, fuzzy
+#~| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
+#~ msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
+#~| "As of January, 2017, the files in this directory list around 260 "
+#~| "instances of malicious functionalities, but there are surely thousands "
+#~| "more we don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~
"2017å¹´1ææç¹ã§ãããã«ã¯ãç´260ã®ç°ãªãæªæã®ããæ©è½ã®å®ä¾ãæ²è¼ããã¦ã"
+#~
"ã¾ããã確å®ã«ããããã¡ãç¥ããªãä½åãã®ä¾ãããã§ãããã"
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
#~| msgid ""
#~| "This page describes how various proprietary programs mess up the user's "
#~| "system. They are like sabotage, but they are not grave enough to qualify "
Index: proprietary/po/malware-mobiles.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de-diff.html,v
retrieving revision 1.71
retrieving revision 1.72
diff -u -b -r1.71 -r1.72
--- proprietary/po/malware-mobiles.de-diff.html 19 Nov 2019 09:01:34 -0000
1.71
+++ proprietary/po/malware-mobiles.de-diff.html 20 Jan 2020 19:04:00 -0000
1.72
@@ -190,118 +190,197 @@
</li>
<span class="removed"><del><strong><li><p><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come
with</strong></del></span>
+ Samsung Galaxy devices running proprietary Android
versions</strong></del></span>
- <span class="inserted"><ins><em><li id="M201908270">
+ <span class="inserted"><ins><em><li id="M202001090">
+ <p>Android phones subsidized by the US government</em></ins></span>
come with <span class="inserted"><ins><em><a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and</em></ins></span> a back <span
class="removed"><del><strong>door</a> that provides remote access to the
data stored on the
+ device.</p>
+ </li>
+
+ <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
+ Samsung's back door</a> provides access to any file on the
system.</p>
+ </li>
+
+ <li>
+ <p>In Android,
+ <a
href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
+ Google has</strong></del></span> <span class="inserted"><ins><em>door for
forcing installation of
+ apps</a>.</p>
+
+ <p>The adware is in</em></ins></span> a <span
class="inserted"><ins><em>modified version of an
+ essential system configuration app. The</em></ins></span> back door <span
class="inserted"><ins><em>is a
+ surreptitious addition</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps.</a> (It was
in</strong></del></span> a program <span class="removed"><del><strong>called
GTalkService, which seems since then to have been
+ merged into Google Play.)
+ </p>
+
+ <p>
+ Google can also
+ <a
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through Google Play.
+ This</strong></del></span> <span class="inserted"><ins><em>whose stated
purpose</em></ins></span> is <span class="removed"><del><strong>not
equivalent</strong></del></span> to <span
class="inserted"><ins><em>be</em></ins></span> a <span
class="inserted"><ins><em><a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"></em></ins></span>
+ universal back <span class="removed"><del><strong>door, but permits various
+ dirty tricks.
+ </p>
+
+ <p>
+ Although Google's <em>exercise</em> of this
power</strong></del></span> <span class="inserted"><ins><em>door for
firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is
malicious</em></ins></span> has <span class="removed"><del><strong>not
been</strong></del></span>
+ <span class="inserted"><ins><em>a secret secondary</em></ins></span>
malicious <span class="removed"><del><strong>so far, the
point</strong></del></span> <span class="inserted"><ins><em>purpose. All
this</em></ins></span> is <span class="removed"><del><strong>that nobody should
have such power,
+ which could also be used maliciously. You might well
decide</strong></del></span> <span class="inserted"><ins><em>in
addition</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>the
+ malware of Android itself.</p>
+ </li>
+
+ <li id="M201908270">
<p>A very popular app found in the
Google Play store contained</em></ins></span> a
- <span class="removed"><del><strong>back door</a></strong></del></span>
<span class="inserted"><ins><em>module</em></ins></span> that <span
class="removed"><del><strong>provides remote access</strong></del></span> <span
class="inserted"><ins><em>was designed</em></ins></span> to <span
class="removed"><del><strong>the data stored</strong></del></span> <span
class="inserted"><ins><em><a
+ <span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs</strong></del></span> <span
class="inserted"><ins><em>module</em></ins></span> that <span
class="removed"><del><strong>it
+ considers malicious. But there is no excuse for allowing
it</strong></del></span> <span class="inserted"><ins><em>was
designed</em></ins></span> to <span
class="removed"><del><strong><em>delete</em> the programs, and you
should have</strong></del></span> <span class="inserted"><ins><em><a
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
- install malware</em></ins></span> on the
- <span class="removed"><del><strong>device.</p>
+ install malware on</em></ins></span> the <span
class="removed"><del><strong>right to
+ decide who (if anyone)</strong></del></span> <span
class="inserted"><ins><em>user's computer</a>. The app developers
+ regularly used it</em></ins></span> to <span
class="removed"><del><strong>trust in this way.
+ </p>
</li>
+</ul>
- <li><p><a
href="/proprietary/proprietary-back-doors.html#samsung">
- Samsung's back door</a> provides access</strong></del></span> <span
class="inserted"><ins><em>user's computer</a>. The app developers
- regularly used it</em></ins></span> to <span
class="removed"><del><strong>any file on</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> the <span
class="removed"><del><strong>system.</p></strong></del></span> <span
class="inserted"><ins><em>computer download and execute any code
- they wanted.</p>
+<h3 id="insecurity">Mobile Insecurity</h3>
- <p>This is a concrete example of what users are exposed to when they
- run nonfree apps. They can never be completely sure that a nonfree
+<p>These bugs are/were not intentional, so unlike the rest
of</strong></del></span> <span class="inserted"><ins><em>make</em></ins></span>
the <span class="removed"><del><strong>file</strong></del></span> <span
class="inserted"><ins><em>computer download and execute any
code</em></ins></span>
+ they <span class="removed"><del><strong>do not count as malware. We
mention them</strong></del></span> <span
class="inserted"><ins><em>wanted.</p>
+
+ <p>This is a concrete example of what users are
exposed</em></ins></span> to <span class="removed"><del><strong>refute the
+ supposition that prestigious proprietary software doesn't have grave
+ bugs.</p>
+
+<ul>
+
+<li>
+ <p>Siri, Alexa, and all the other voice-control
systems</strong></del></span> <span class="inserted"><ins><em>when they
+ run nonfree apps. They</em></ins></span> can <span
class="inserted"><ins><em>never</em></ins></span> be
+ <span class="removed"><del><strong><a
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked
by programs that play commands in ultrasound</strong></del></span> <span
class="inserted"><ins><em>completely sure</em></ins></span> that <span
class="removed"><del><strong>humans can't hear</a>.
+ </p>
+</li>
+
+<li>
+ <p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
+ can be hijacked through their Wi-Fi chips</a> because
of</strong></del></span> a <span class="removed"><del><strong>bug in
+ Broadcom's non-free firmware.</p></strong></del></span> <span
class="inserted"><ins><em>nonfree
app is safe.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li>
- <p>In Android,</strong></del></span>
+<span class="removed"><del><strong><li>
+<p>Samsung</strong></del></span>
<span class="inserted"><ins><em><li id="M201609130">
- <p>Xiaomi phones come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.computerworld.com/article/2506557/security0/google-throws--kill-switch--on-android-phones.html">
- Google has</strong></del></span>
+ <p>Xiaomi</em></ins></span> phones <span
class="inserted"><ins><em>come with</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/"></em></ins></span>
- a <span class="inserted"><ins><em>universal</em></ins></span> back door
<span class="removed"><del><strong>to remotely delete apps.</a> (It
was</strong></del></span> in <span class="removed"><del><strong>a
- program called GTalkService, which seems since then to have been
- merged into Google Play.)
- </p>
+ a <span class="removed"><del><strong>security hole that allows an SMS
message to install
+ransomware</a>.</p>
+</li>
- <p>
- Google</strong></del></span> <span class="inserted"><ins><em>the application
processor, for Xiaomi's
+<li>
+<p>Many proprietary payment apps <a
+href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
+transmit personal data</strong></del></span> <span
class="inserted"><ins><em>universal back door</em></ins></span> in <span
class="removed"><del><strong>an insecure way</a>.
+However,</strong></del></span> the <span class="removed"><del><strong>worse
aspect of these apps</strong></del></span> <span
class="inserted"><ins><em>application processor, for Xiaomi's
use</a>.</p>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the
- universal back door in the modem processor that the local phone
- company</em></ins></span> can <span
class="removed"><del><strong>also</strong></del></span> <span
class="inserted"><ins><em>use</a>.</p>
+ <p>This</em></ins></span> is <span
class="removed"><del><strong>that</strong></del></span> <span
class="inserted"><ins><em>separate from</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
+</p>
+</li>
+
+ <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
+ The NSA can tap data</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">the
+ universal back door</em></ins></span> in <span
class="removed"><del><strong>smart phones, including iPhones, Android, and
+ BlackBerry</a>. While there is not much detail here, it
seems</strong></del></span> <span class="inserted"><ins><em>the modem
processor</em></ins></span> that <span class="removed"><del><strong>this
+ does not operate via</strong></del></span> the <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em>local phone
+ company can use</a>.</p>
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files” as well as</em></ins></span> forcibly <span
class="removed"><del><strong>and remotely</strong></del></span> install <span
class="removed"><del><strong>apps</a> through Google Play.
- This</strong></del></span>
- <span class="inserted"><ins><em>apps</a>.</p>
+ <p>Baidu's proprietary Android library, Moplus, has
a</em></ins></span> back door that <span class="removed"><del><strong>we know
nearly</strong></del></span> <span class="inserted"><ins><em><a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can “upload files” as well as forcibly install
+ apps</a>.</p>
- <p>It</em></ins></span> is <span class="removed"><del><strong>not
equivalent to</strong></del></span> <span class="inserted"><ins><em>used by
14,000 Android applications.</p>
+ <p>It is used by 14,000 Android applications.</p>
</li>
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has</em></ins></span> a universal back <span
class="removed"><del><strong>door, but permits various
- dirty tricks.
- </p>
+ A Chinese version of Android has a universal back door</a>.
Nearly</em></ins></span>
+ all
+ <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>have
a</em></ins></span> <a <span
class="removed"><del><strong>href="#universal-back-door">
+ lots of bugs</strong></del></span> <span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">
+ universal back door</em></ins></span> in the <span
class="removed"><del><strong>phones' radio software</a>.</p>
+ </li>
+</ul>
- <p>
- Although Google's <em>exercise</em></strong></del></span> <span
class="inserted"><ins><em>door</a>. Nearly
- all models</em></ins></span> of <span class="removed"><del><strong>this
power has not been
- malicious so far,</strong></del></span> <span
class="inserted"><ins><em>mobile phones have a <a
href="#universal-back-door-phone-modem">
- universal back door in</em></ins></span> the <span
class="removed"><del><strong>point</strong></del></span> <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad bother
- to introduce another? Because this one</em></ins></span> is <span
class="removed"><del><strong>that nobody should have such power,
- which could also be used maliciously. You might well decide to
let</strong></del></span> <span class="inserted"><ins><em>controlled by
Coolpad.</p>
+<h3 id="surveillance">Mobile Surveillance</h3>
+<ul>
+ <li><p>The Sarahah app
+ <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book to developer's server. Note that</strong></del></span> <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad bother
+ to introduce another? Because</em></ins></span> this <span
class="removed"><del><strong>article misuses the words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>one is controlled by
Coolpad.</p></em></ins></span>
</li>
- <li id="M201403120.1">
+ <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions come
with</em></ins></span>
- a
- <span class="removed"><del><strong>security service remotely
<em>deactivate</em> programs</strong></del></span> <span
class="inserted"><ins><em>back door</a></em></ins></span> that <span
class="removed"><del><strong>it
- considers malicious. But there is no excuse for allowing
it</strong></del></span> <span class="inserted"><ins><em>provides remote
access</em></ins></span> to <span
class="removed"><del><strong><em>delete</em></strong></del></span>
the <span class="removed"><del><strong>programs, and you should
have</strong></del></span> <span class="inserted"><ins><em>files stored
on</em></ins></span>
- the <span class="removed"><del><strong>right</strong></del></span> <span
class="inserted"><ins><em>device.</p>
+ Samsung Galaxy devices running proprietary Android versions
come</em></ins></span> with <span class="removed"><del><strong>spyware sending
lots of data</strong></del></span>
+ <span class="inserted"><ins><em>a back door</a> that provides remote
access</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
+
+<li>
+ <p>Facebook's app listens all</strong></del></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span> <span class="inserted"><ins><em>files
stored</em></ins></span> on <span class="removed"><del><strong>what people are
listening to</strong></del></span>
+ <span class="inserted"><ins><em>the device.</p>
</li>
</ul>
<h3 id="drm">DRM</h3>
-<p>Digital restrictions management, or “DRM,”
refers</em></ins></span> to
- <span class="removed"><del><strong>decide who (if
anyone)</strong></del></span>
-<span class="inserted"><ins><em>functionalities designed</em></ins></span> to
<span class="removed"><del><strong>trust</strong></del></span> <span
class="inserted"><ins><em>restrict what users can do with the
data</em></ins></span>
-in <span class="removed"><del><strong>this way.
- </p></strong></del></span> <span class="inserted"><ins><em>their
computers.</p>
+<p>Digital restrictions management,</em></ins></span> or <span
class="removed"><del><strong>watching</a>. In addition, it may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>“DRM,” refers</em></ins></span> to <span
class="removed"><del><strong>serve them</strong></del></span>
+<span class="inserted"><ins><em>functionalities designed to restrict what
users can do</em></ins></span> with <span class="removed"><del><strong>targeted
+ advertisements.</p>
+</li>
+
+
+<li>
+ <p>A</strong></del></span> <span class="inserted"><ins><em>the data
+in their computers.</p>
<ul class="blurbs">
<li id="M201501030">
- <p id="netflix-app-geolocation-drm">The Netflix Android app <a
-
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
- forces the use of Google DNS</a>. This is one of the methods that
+ <p id="netflix-app-geolocation-drm">The Netflix Android
app</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
+ research paper</a> that investigated</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
+ forces</em></ins></span> the <span class="removed"><del><strong>privacy
and</strong></del></span> <span class="inserted"><ins><em>use of Google
DNS</a>. This is one of the methods that
Netflix uses to enforce the geolocation restrictions dictated by the
- movie studios.</p></em></ins></span>
+ movie studios.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="insecurity">Mobile
Insecurity</h3></strong></del></span> <span
class="inserted"><ins><em>id="insecurity">Insecurity</h3></em></ins></span>
+<h3 id="insecurity">Insecurity</h3>
<p>These bugs are/were not intentional, so unlike the rest of the file
they do not count as malware. We mention them to refute the
supposition that prestigious proprietary software doesn't have grave
bugs.</p>
-<span class="removed"><del><strong><ul>
-
-<li>
- <p>Siri, Alexa, and all</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
+<ul class="blurbs">
<li id="M201908020">
<p>Out of 21 gratis Android antivirus apps
that were tested by security researchers, eight <a
@@ -316,31 +395,26 @@
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all</em></ins></span> the other voice-control
systems can be <a <span
class="removed"><del><strong>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">hijacked</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
- hijacked</em></ins></span> by programs that play commands in ultrasound
that humans
- can't <span class="removed"><del><strong>hear</a>.
- </p></strong></del></span> <span
class="inserted"><ins><em>hear</a>.</p></em></ins></span>
+ <p>Siri, Alexa, and all the other voice-control systems can be <a
+
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
+ hijacked by programs that play commands in ultrasound that humans
+ can't hear</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201807020">
+ <li id="M201807020">
<p>Some Samsung phones randomly <a
href="https://www.theverge.com/circuitbreaker/2018/7/2/17528076/samsung-phones-text-rcs-update-messages">send
photos to people in the owner's contact list</a>.</p>
</li>
- <li id="M201704050"></em></ins></span>
+ <li id="M201704050">
<p>Many Android devices <a
href="https://arstechnica.com/security/2017/04/wide-range-of-android-phones-vulnerable-to-device-hijacks-over-wi-fi/">
can be hijacked through their Wi-Fi chips</a> because of a bug in
Broadcom's non-free firmware.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201702170">
+ <li id="M201702170">
<p>The mobile apps for communicating <a
href="https://www.bleepingcomputer.com/news/security/millions-of-smart-cars-vulnerable-due-to-insecure-android-apps/">with
a smart but foolish car have very bad security</a>.</p>
@@ -351,16 +425,14 @@
off the tracking.</p>
</li>
- <li id="M201701270"></em></ins></span>
+ <li id="M201701270">
<p>Samsung phones <a
href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have
a security hole that allows an SMS message to install
ransomware</a>.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201701130">
+ <li id="M201701130">
<p>WhatsApp has a feature that <a
href="https://techcrunch.com/2017/01/13/encrypted-messaging-platform-whatsapp-denies-backdoor-claim/">
has been described as a “back door”</a> because it would
@@ -398,22 +470,16 @@
taking control of those systems</a>.</p>
</li>
- <li id="M201603100"></em></ins></span>
+ <li id="M201603100">
<p>Many proprietary payment apps <a
-<span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
-transmit</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit</em></ins></span>
+
href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">transmit
personal data in an insecure way</a>. However,
the worse aspect of these apps is that <a
- href="/philosophy/surveillance-vs-democracy.html">payment is not <span
class="removed"><del><strong>anonymous</a>.
-</p></strong></del></span>
- <span
class="inserted"><ins><em>anonymous</a>.</p></em></ins></span>
+ href="/philosophy/surveillance-vs-democracy.html">payment is not
+ anonymous</a>.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201505294">
+ <li id="M201505294">
<p><a
href="http://phys.org/news/2015-05-app-vulnerability-threatens-millions-users.html">
Many smartphone apps use insecure authentication methods when storing
@@ -446,59 +512,34 @@
<li id="M201311120">
<p><a
href="https://web.archive.org/web/20180816030205/http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap</em></ins></span> data in smart phones, including iPhones,
+ The NSA can tap data in smart phones, including iPhones,
Android, and BlackBerry</a>. While there is not much
detail here, it seems that this does not operate via
the universal back door that we know nearly all portable
- phones have. It may involve exploiting various bugs. There are <a
<span
class="removed"><del><strong>href="#universal-back-door"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone"></em></ins></span>
+ phones have. It may involve exploiting various bugs. There are <a
+
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
lots of bugs in the phones' radio software</a>.</p>
</li>
</ul>
-<h3 <span class="removed"><del><strong>id="surveillance">Mobile
Surveillance</h3>
-<ul>
- <li><p>The Sarahah app
- <a
href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads all phone numbers and email addresses</a> in user's address
- book to developer's server. Note that this article
misuses</strong></del></span> <span
class="inserted"><ins><em>id="interference">Interference</h3>
-
-<p>This section gives examples of mobile apps harassing or
annoying</em></ins></span>
-the <span class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p>
- </li>
+<h3 id="interference">Interference</h3>
- <li><p>Some portable</strong></del></span> <span
class="inserted"><ins><em>user, or causing trouble for the user. These actions
are like
+<p>This section gives examples of mobile apps harassing or annoying
+the user, or causing trouble for the user. These actions are like
sabotage but the word “sabotage” is too strong for them.</p>
<ul class="blurbs">
<li id="M201901110">
- <p>Samsung</em></ins></span> phones <span
class="removed"><del><strong><a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold</strong></del></span> <span class="inserted"><ins><em>come
preloaded</em></ins></span> with <span class="removed"><del><strong>spyware
sending lots</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Samsung phones come preloaded with <a
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">
- a version</em></ins></span> of <span class="removed"><del><strong>data to
China</a>.</p></li>
-
-<li>
- <p>Facebook's app listens all</strong></del></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop
- on what people are listening to or watching</a>. In addition, it
may</strong></del></span> <span class="inserted"><ins><em>Facebook app that
can't</em></ins></span> be <span class="removed"><del><strong>analyzing
people's conversations to serve them with targeted
- advertisements.</p>
-</li>
-
-
-<li>
- <p>A</strong></del></span> <span
class="inserted"><ins><em>deleted</a>.</em></ins></span> <a <span
class="removed"><del><strong>href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the
privacy</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app">
+ a version of the Facebook app that can't be deleted</a>. <a
+
href="https://www.infopackets.com/news/10484/truth-behind-undeletable-facebook-app">
Facebook claims this is a stub</a> which doesn't do anything, but we
- have to take their word for it,</em></ins></span> and <span
class="removed"><del><strong>security
- of 283 Android VPN apps concluded</strong></del></span> <span
class="inserted"><ins><em>there is the permanent risk</em></ins></span> that
<span class="removed"><del><strong>“in spite of</strong></del></span>
- the
- <span class="removed"><del><strong>promises for privacy, security, and
anonymity given</strong></del></span> <span class="inserted"><ins><em>app will
be activated by an automatic update.</p>
+ have to take their word for it, and there is the permanent risk that
+ the app will be activated by an automatic update.</p>
<p>Preloading crapware along with a nonfree operating system is
common
- practice, but</em></ins></span> by <span
class="inserted"><ins><em>making</em></ins></span> the
- <span class="removed"><del><strong>majority of VPN apps—millions
of</strong></del></span> <span class="inserted"><ins><em>crapware undeletable,
Facebook and Samsung (<a
+ practice, but by making the crapware undeletable, Facebook and Samsung
(<a
class="not-a-duplicate"
href="https://www.bloomberg.com/news/articles/2019-01-08/samsung-phone-users-get-a-shock-they-can-t-delete-facebook">among
others</a>)
are going one step further in their hijacking of users' devices.</p>
@@ -962,10 +1003,10 @@
<li id="M201611160">
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy and security of
+ research paper</a> that investigated the privacy
and</em></ins></span> security of
283 Android VPN apps concluded that “in spite of the promises
for privacy, security, and anonymity given by the majority of VPN
- apps—millions of</em></ins></span> users may be unawarely subject to
poor security
+ apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
<p>Following is a non-exhaustive <span
class="removed"><del><strong>list</strong></del></span> <span
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
@@ -1472,7 +1513,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1483,7 +1524,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/19 09:01:34 $
+$Date: 2020/01/20 19:04:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.de.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary/po/malware-mobiles.de.po 18 Nov 2019 15:05:17 -0000
1.127
+++ proprietary/po/malware-mobiles.de.po 20 Jan 2020 19:04:00 -0000
1.128
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -315,6 +315,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2481,14 +2505,14 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright © 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr "Copyright © 2014-2018 Free Software Foundation, Inc."
Index: proprietary/po/malware-mobiles.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.es.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary/po/malware-mobiles.es.po 23 Nov 2019 11:33:15 -0000
1.159
+++ proprietary/po/malware-mobiles.es.po 20 Jan 2020 19:04:00 -0000
1.160
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -240,6 +241,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2139,8 +2164,14 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
+# | Copyright © 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
Index: proprietary/po/malware-mobiles.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.fr.po,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- proprietary/po/malware-mobiles.fr.po 18 Nov 2019 17:15:32 -0000
1.182
+++ proprietary/po/malware-mobiles.fr.po 20 Jan 2020 19:04:00 -0000
1.183
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2019-11-18 18:14+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -237,6 +238,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2139,8 +2164,14 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
+# | Copyright © 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
Index: proprietary/po/malware-mobiles.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it-diff.html,v
retrieving revision 1.76
retrieving revision 1.77
diff -u -b -r1.76 -r1.77
--- proprietary/po/malware-mobiles.it-diff.html 19 Nov 2019 09:01:34 -0000
1.76
+++ proprietary/po/malware-mobiles.it-diff.html 20 Jan 2020 19:04:00 -0000
1.77
@@ -230,12 +230,7 @@
<div id="TOC">
<h3>Types</em></ins></span> of <span class="removed"><del><strong>a
bug</strong></del></span> <span
class="inserted"><ins><em>malware</em></ins></span> in
- <span class="removed"><del><strong>Broadcom's non-free
firmware.</p>
-</li>
-
-<li>
-<p>Samsung
-phones</strong></del></span> <span class="inserted"><ins><em>mobiles</h3>
+ <span class="removed"><del><strong>Broadcom's non-free
firmware.</p></strong></del></span> <span
class="inserted"><ins><em>mobiles</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a
href="#censorship">Censorship</a></li>-->
@@ -254,62 +249,72 @@
<ul class="blurbs">
<li id="M209900001">
- <p>See above for the</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
<span
class="inserted"><ins><em>href="#universal-back-door-phone-modem">general
universal back
+ <p>See above for the <a
href="#universal-back-door-phone-modem">general universal back
door</a> in essentially all mobile phones, which permits converting
- them into full-time listening devices.</p>
+ them into full-time listening devices.</p></em></ins></span>
</li>
- <li id="M201908270">
- <p>A very popular app found in the
- Google Play store contained</em></ins></span> a <span
class="removed"><del><strong>security hole</strong></del></span> <span
class="inserted"><ins><em>module</em></ins></span> that <span
class="removed"><del><strong>allows an SMS message</strong></del></span> <span
class="inserted"><ins><em>was designed</em></ins></span> to <span
class="removed"><del><strong>install
+<span class="removed"><del><strong><li>
+<p>Samsung</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M202001090">
+ <p>Android</em></ins></span> phones <span
class="inserted"><ins><em>subsidized by the US government come
with</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.bleepingcomputer.com/news/security/sms-exploitable-bug-in-samsung-galaxy-phones-can-be-used-for-ransomware-attacks/">have</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and</em></ins></span> a <span
class="removed"><del><strong>security hole that allows</strong></del></span>
<span class="inserted"><ins><em>back door for forcing installation of
+ apps</a>.</p>
+
+ <p>The adware is in a modified version of</em></ins></span> an <span
class="removed"><del><strong>SMS message</strong></del></span>
+ <span class="inserted"><ins><em>essential system configuration app. The
back door is a
+ surreptitious addition</em></ins></span> to <span
class="removed"><del><strong>install
ransomware</a>.</p>
</li>
<li>
-<p>Many proprietary payment apps</strong></del></span> <a
+<p>Many proprietary payment apps</strong></del></span> <span
class="inserted"><ins><em>a program whose stated purpose is to be
a</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.bloomberg.com/news/articles/2016-03-10/many-mobile-payments-startups-aren-t-properly-securing-user-data">
-transmit personal data in an insecure way</a>.
-However,</strong></del></span>
+transmit personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ universal back door for firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is</em></ins></span> in
<span class="removed"><del><strong>an insecure way</a>.
+However,</strong></del></span> <span class="inserted"><ins><em>addition
to</em></ins></span> the <span class="removed"><del><strong>worse
aspect</strong></del></span>
+ <span class="inserted"><ins><em>malware</em></ins></span> of <span
class="removed"><del><strong>these apps is</strong></del></span> <span
class="inserted"><ins><em>Android itself.</p>
+ </li>
+
+ <li id="M201908270">
+ <p>A very popular app found in the
+ Google Play store contained a module</em></ins></span> that <span
class="inserted"><ins><em>was designed to</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">payment
is not anonymous</a>.
+</p>
+</li>
+
+ <li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html"></strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
- install malware on</em></ins></span> the <span
class="removed"><del><strong>worse aspect of these apps</strong></del></span>
<span class="inserted"><ins><em>user's computer</a>. The app developers
- regularly used it to make the computer download and execute any code
+ install malware on the user's computer</a>.</em></ins></span> The
<span class="removed"><del><strong>NSA can tap data in smart phones, including
iPhones, Android,</strong></del></span> <span class="inserted"><ins><em>app
developers
+ regularly used it to make the computer download</em></ins></span> and
+ <span class="removed"><del><strong>BlackBerry</a>. While
there</strong></del></span> <span class="inserted"><ins><em>execute any code
they wanted.</p>
- <p>This</em></ins></span> is <span class="inserted"><ins><em>a
concrete example of what users are exposed to when they
- run nonfree apps. They can never be completely sure</em></ins></span> that
-<span class="removed"><del><strong><a
href="/philosophy/surveillance-vs-democracy.html">payment</strong></del></span>
<span class="inserted"><ins><em>a nonfree
- app</em></ins></span> is <span class="removed"><del><strong>not
anonymous</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>safe.</p></em></ins></span>
+ <p>This</em></ins></span> is <span class="removed"><del><strong>not
much detail here, it seems</strong></del></span> <span
class="inserted"><ins><em>a concrete example of what users are exposed to when
they
+ run nonfree apps. They can never be completely sure</em></ins></span> that
<span class="removed"><del><strong>this
+ does not operate via</strong></del></span> <span class="inserted"><ins><em>a
nonfree
+ app is safe.</p>
</li>
- <span class="removed"><del><strong><li><p><a
href="http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html">
- The NSA can tap data</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201609130">
+ <li id="M201609130">
<p>Xiaomi phones come with <a
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/">
- a universal back door</em></ins></span> in <span
class="removed"><del><strong>smart phones, including iPhones, Android, and
- BlackBerry</a>. While there is not much detail here, it seems that this
- does not operate via</strong></del></span> the <span
class="inserted"><ins><em>application processor, for Xiaomi's
+ a universal back door in</em></ins></span> the <span
class="inserted"><ins><em>application processor, for Xiaomi's
use</a>.</p>
<p>This is separate from <a
href="#universal-back-door-phone-modem">the</em></ins></span>
- universal back door <span class="removed"><del><strong>that we know nearly
all
- portable phones have. It may involve exploiting various bugs. There are
- <a
href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots of bugs</strong></del></span> in the <span
class="removed"><del><strong>phones' radio
software</a>.</p></strong></del></span> <span
class="inserted"><ins><em>modem processor that the local phone
- company can use</a>.</p></em></ins></span>
+ universal back door <span class="inserted"><ins><em>in the modem
processor</em></ins></span> that <span class="removed"><del><strong>we know
nearly</strong></del></span> <span class="inserted"><ins><em>the local phone
+ company can use</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-
-<h3 id="surveillance">Mobile Surveillance</h3>
-<ul>
- <li><p>The Sarahah app</strong></del></span>
- <span class="inserted"><ins><em><li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door
that</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
- uploads</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ <li id="M201511090">
+ <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files” as well as forcibly install
apps</a>.</p>
@@ -320,58 +325,34 @@
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
A Chinese version of Android has a universal back door</a>.
Nearly</em></ins></span>
- all <span class="removed"><del><strong>phone numbers and email
addresses</a></strong></del></span> <span
class="inserted"><ins><em>models of mobile phones have a <a
href="#universal-back-door-phone-modem">
- universal back door</em></ins></span> in <span
class="removed"><del><strong>user's address
- book to developer's server. Note that this article
misuses</strong></del></span> the <span class="removed"><del><strong>words
- “<a href="/philosophy/free-sw.html">free
software</a>”
- referring to zero price.</p></strong></del></span> <span
class="inserted"><ins><em>modem chip</a>. So why did Coolpad bother
- to introduce another? Because this one is controlled by
Coolpad.</p></em></ins></span>
+ all
+ <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span
class="removed"><del><strong>have.</strong></del></span> <span
class="inserted"><ins><em>have a <a
href="#universal-back-door-phone-modem">
+ universal back door in the modem chip</a>. So why did Coolpad bother
+ to introduce another? Because this one is controlled by Coolpad.</p>
</li>
- <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201403120.1">
+ <li id="M201403120.1">
<p id="samsung"><a
href="https://www.fsf.org/blogs/community/replicant-developers-find-and-close-samsung-galaxy-backdoor">
- Samsung Galaxy devices running proprietary Android versions
come</em></ins></span> with <span class="removed"><del><strong>spyware sending
lots of data</strong></del></span>
- <span class="inserted"><ins><em>a back door</a> that provides remote
access</em></ins></span> to <span
class="removed"><del><strong>China</a>.</p></li>
-
-<li>
- <p>Facebook's app listens all</strong></del></span> the <span
class="removed"><del><strong>time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span> <span class="inserted"><ins><em>files
stored</em></ins></span> on <span class="removed"><del><strong>what people are
listening to</strong></del></span>
- <span class="inserted"><ins><em>the device.</p>
+ Samsung Galaxy devices running proprietary Android versions come with
+ a back door</a> that provides remote access to the files stored on
+ the device.</p>
</li>
</ul>
<h3 id="drm">DRM</h3>
-<p>Digital restrictions management,</em></ins></span> or <span
class="removed"><del><strong>watching</a>. In addition, it may
- be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>“DRM,” refers</em></ins></span> to <span
class="removed"><del><strong>serve them</strong></del></span>
-<span class="inserted"><ins><em>functionalities designed to restrict what
users can do</em></ins></span> with <span class="removed"><del><strong>targeted
- advertisements.</p>
-</li>
-
-
-<li>
- <p>A
- <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated</strong></del></span> the
<span class="removed"><del><strong>privacy and security
- of 283</strong></del></span> <span class="inserted"><ins><em>data
+<p>Digital restrictions management, or “DRM,” refers to
+functionalities designed to restrict what users can do with the data
in their computers.</p>
<ul class="blurbs">
<li id="M201501030">
- <p id="netflix-app-geolocation-drm">The Netflix</em></ins></span>
Android <span class="removed"><del><strong>VPN apps concluded that “in
spite of the
- promises for privacy, security, and anonymity given
by</strong></del></span> <span class="inserted"><ins><em>app <a
+ <p id="netflix-app-geolocation-drm">The Netflix Android app <a
href="http://torrentfreak.com/netflix-cracks-down-on-vpn-and-proxy-pirates-150103/">
- forces</em></ins></span> the
- <span class="removed"><del><strong>majority of VPN
apps—millions</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> of <span
class="removed"><del><strong>users may be unawarely subject
- to poor security guarantees and abusive practices inflicted by
- VPN apps.”</p>
-
- <p>Following</strong></del></span> <span
class="inserted"><ins><em>Google DNS</a>. This</em></ins></span> is <span
class="removed"><del><strong>a non-exhaustive list</strong></del></span> <span
class="inserted"><ins><em>one</em></ins></span> of <span
class="removed"><del><strong>proprietary VPN apps from</strong></del></span>
the <span class="removed"><del><strong>research paper</strong></del></span>
<span class="inserted"><ins><em>methods</em></ins></span> that <span
class="removed"><del><strong>tracks and infringes</strong></del></span>
- <span class="inserted"><ins><em>Netflix uses to enforce</em></ins></span>
the <span class="removed"><del><strong>privacy</strong></del></span> <span
class="inserted"><ins><em>geolocation restrictions dictated by the
+ forces the use of Google DNS</a>. This is one of the methods that
+ Netflix uses to enforce the geolocation restrictions dictated by the
movie studios.</p>
</li>
</ul>
@@ -379,16 +360,8 @@
<h3 id="insecurity">Insecurity</h3>
-<p>These bugs are/were not intentional, so unlike the
rest</em></ins></span> of
- <span class="removed"><del><strong>users:</p>
-
- <dl>
- <dt>SurfEasy</dt>
- <dd>Includes tracking libraries such</strong></del></span> <span
class="inserted"><ins><em>the file
- they do not count</em></ins></span> as <span
class="removed"><del><strong>NativeX and Appflood,
- meant to track users and show</strong></del></span> <span
class="inserted"><ins><em>malware. We mention</em></ins></span> them <span
class="removed"><del><strong>targeted ads.</dd>
-
- <dt>sFly Network</strong></del></span> <span
class="inserted"><ins><em>to refute the
+<p>These bugs are/were not intentional, so unlike the rest of the file
+ they do not count as malware. We mention them to refute the
supposition that prestigious proprietary software doesn't have grave
bugs.</p>
@@ -402,13 +375,14 @@
risky than the average of the 100 most popular Android apps.</p>
<p><small>(Note that the article refers to these proprietary
apps as
- “free”. It should have said “gratis”
+ “free”.</em></ins></span> It <span
class="removed"><del><strong>may involve exploiting various bugs. There
are</strong></del></span> <span class="inserted"><ins><em>should have said
“gratis”
instead.)</small></p>
</li>
<li id="M201807100">
- <p>Siri, Alexa, and all the other voice-control systems can be <a
-
href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
+ <p>Siri, Alexa, and all the other voice-control systems can
be</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.fastcodesign.com/90139019/a-simple-design-flaw-makes-it-astoundingly-easy-to-hack-siri-and-alexa">
hijacked by programs that play commands in ultrasound that humans
can't hear</a>.</p>
</li>
@@ -967,15 +941,31 @@
along with the headphone's unique serial number.</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ If the fine print</em></ins></span> of <span
class="removed"><del><strong>bugs in</strong></del></span> the <span
class="removed"><del><strong>phones' radio software</a>.</p>
+ </li>
+</ul>
+
+<h3 id="surveillance">Mobile Surveillance</h3>
+<ul>
+ <li><p>The Sarahah</strong></del></span> app <span
class="inserted"><ins><em>said that users gave consent for this,
+ would that make it acceptable? No way! It should be flat
out</em></ins></span> <a <span
class="removed"><del><strong>href="https://theintercept.com/2017/08/27/hit-app-sarahah-quietly-uploads-your-address-book/">
+ uploads all phone numbers and email addresses</a> in user's address
+ book</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>developer's
server. Note that this article misuses</strong></del></span> <span
class="inserted"><ins><em>design</em></ins></span>
+ the <span class="removed"><del><strong>words
+ “<a href="/philosophy/free-sw.html">free
software</a>”
+ referring</strong></del></span> <span
class="inserted"><ins><em>app</em></ins></span> to <span
class="removed"><del><strong>zero price.</p></strong></del></span> <span
class="inserted"><ins><em>snoop at all</a>.</p></em></ins></span>
</li>
- <li id="M201704074">
- <p>Pairs of Android apps can collude
- to transmit users' personal data to servers. <a
+ <span class="removed"><del><strong><li><p>Some portable phones
<a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
+ sold with spyware sending lots</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704074">
+ <p>Pairs</em></ins></span> of <span
class="inserted"><ins><em>Android apps can collude
+ to transmit users' personal</em></ins></span> data to <span
class="removed"><del><strong>China</a>.</p></li>
+
+<li>
+ <p>Facebook's</strong></del></span> <span
class="inserted"><ins><em>servers. <a
href="https://www.theatlantic.com/technology/archive/2017/04/when-apps-collude-to-steal-your-data/522177/">A
study found tens of thousands of pairs that collude</a>.</p>
</li>
@@ -983,14 +973,15 @@
<li id="M201703300">
<p>Verizon <a
href="https://yro.slashdot.org/story/17/03/30/0112259/verizon-to-force-appflash-spyware-on-android-phones">
- announced an opt-in proprietary search app that it will</a>
pre-install
- on some of its phones. The app will give Verizon the same information
+ announced an opt-in proprietary search</em></ins></span> app <span
class="removed"><del><strong>listens all</strong></del></span> <span
class="inserted"><ins><em>that it will</a> pre-install
+ on some of its phones. The app will give Verizon</em></ins></span> the
<span class="removed"><del><strong>time,</strong></del></span> <span
class="inserted"><ins><em>same information
about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is <a
-
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
- being pre-installed on only one phone</a>, and the user must
+ <p>Currently, the app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ being pre-installed</em></ins></span> on <span
class="removed"><del><strong>what people are listening to or
watching</a>. In addition, it may
+ be analyzing people's conversations</strong></del></span> <span
class="inserted"><ins><em>only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
remains spyware—an “optional” piece of spyware is
still spyware.</p>
@@ -999,7 +990,8 @@
<li id="M201701210">
<p>The Meitu photo-editing app <a
href="https://theintercept.com/2017/01/21/popular-selfie-app-sending-user-data-to-china-researchers-say/">sends
- user data to a Chinese company</a>.</p>
+ user data</em></ins></span> to <span class="removed"><del><strong>serve
them with targeted
+ advertisements.</p></strong></del></span> <span
class="inserted"><ins><em>a Chinese company</a>.</p>
</li>
<li id="M201611280">
@@ -1009,10 +1001,13 @@
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p>
+ massive surveillance.</p></em></ins></span>
</li>
- <li id="M201611160">
+
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201611160"></em></ins></span>
<p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
research paper</a> that investigated the privacy and security of
@@ -1021,16 +1016,20 @@
apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is a non-exhaustive list, taken from the research paper,
- of some proprietary VPN apps that track users and infringe their
+ <p>Following is a non-exhaustive <span
class="removed"><del><strong>list</strong></del></span> <span
class="inserted"><ins><em>list, taken from the research paper,</em></ins></span>
+ of <span class="inserted"><ins><em>some</em></ins></span> proprietary VPN
apps <span class="removed"><del><strong>from
+ the research paper</strong></del></span> that <span
class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>track users</em></ins></span> and <span
class="removed"><del><strong>infringes the privacy of
+ users:</p>
+
+ <dl></strong></del></span> <span class="inserted"><ins><em>infringe
their
privacy:</p>
- <dl class="compact">
+ <dl class="compact"></em></ins></span>
<dt>SurfEasy</dt>
<dd>Includes tracking libraries such as NativeX and Appflood,
meant to track users and show them targeted ads.</dd>
- <dt>sFly Network</em></ins></span> Booster</dt>
+ <dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
permissions upon installation, meaning it has full access to users'
text messages.</dd>
@@ -1519,7 +1518,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free
Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1530,7 +1529,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/19 09:01:34 $
+$Date: 2020/01/20 19:04:00 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.it.po,v
retrieving revision 1.127
retrieving revision 1.128
diff -u -b -r1.127 -r1.128
--- proprietary/po/malware-mobiles.it.po 18 Nov 2019 15:05:17 -0000
1.127
+++ proprietary/po/malware-mobiles.it.po 20 Jan 2020 19:04:01 -0000
1.128
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -301,6 +301,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2265,13 +2289,13 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-# | Copyright © 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright © 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary/po/malware-mobiles.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja-diff.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary/po/malware-mobiles.ja-diff.html 31 Dec 2019 01:04:21 -0000
1.93
+++ proprietary/po/malware-mobiles.ja-diff.html 20 Jan 2020 19:04:01 -0000
1.94
@@ -227,7 +227,9 @@
<span class="inserted"><ins><em></ul>
<div id="TOC">
-<h3>Types of malware</em></ins></span> in <span
class="removed"><del><strong>smart</strong></del></span> <span
class="inserted"><ins><em>mobiles</h3>
+<h3>Types of malware</em></ins></span> in <span
class="removed"><del><strong>smart phones, including iPhones, Android, and
+ BlackBerry</a>. While there is not much detail here, it seems that this
+ does not operate via</strong></del></span> <span
class="inserted"><ins><em>mobiles</h3>
<ul>
<li><a href="#back-doors">Back doors</a></li>
<!--<li><a
href="#censorship">Censorship</a></li>-->
@@ -246,39 +248,68 @@
<ul class="blurbs">
<li id="M209900001">
- <p>See above for the <a
href="#universal-back-door-phone-modem">general universal back
- door</a> in essentially all mobile</em></ins></span> phones, <span
class="removed"><del><strong>including iPhones, Android,</strong></del></span>
<span class="inserted"><ins><em>which permits converting
+ <p>See above for</em></ins></span> the <span
class="inserted"><ins><em><a
href="#universal-back-door-phone-modem">general</em></ins></span> universal
back <span class="removed"><del><strong>door that we know
nearly</strong></del></span>
+ <span class="inserted"><ins><em>door</a> in
essentially</em></ins></span> all
+ <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>mobile phones, which permits converting
them into full-time listening devices.</p>
</li>
- <li id="M201908270">
- <p>A very popular app found in the
- Google Play store contained a module that was designed to <a
+ <li id="M202001090">
+ <p>Android</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>subsidized by
the US government come with</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
+ lots</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a back door for forcing
installation</em></ins></span> of <span
class="removed"><del><strong>bugs</strong></del></span>
+ <span class="inserted"><ins><em>apps</a>.</p>
+
+ <p>The adware is in a modified version of an
+ essential system configuration app. The back door is a
+ surreptitious addition to a program whose stated purpose is to be a <a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ universal back door for firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is</em></ins></span> in
<span class="inserted"><ins><em>addition to</em></ins></span> the <span
class="removed"><del><strong>phones' radio
software</a>.</p></strong></del></span>
+ <span class="inserted"><ins><em>malware of Android
itself.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+<h3 id="surveillance">Mobile Surveillance</h3>
+<ul>
+<li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908270"></em></ins></span>
+ <p>A <span class="removed"><del><strong>half-blind security critique
of a tracking app: it</strong></del></span> <span
class="inserted"><ins><em>very popular app</em></ins></span> found <span
class="inserted"><ins><em>in the
+ Google Play store contained a module</em></ins></span> that <span
class="removed"><del><strong><a
+href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
+blatant flaws allowed anyone</strong></del></span> <span
class="inserted"><ins><em>was designed</em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span> <span
class="inserted"><ins><em><a
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
- install malware on the user's computer</a>. The app developers
- regularly used it to make the computer download</em></ins></span> and
- <span class="removed"><del><strong>BlackBerry</a>. While
there</strong></del></span> <span class="inserted"><ins><em>execute any code
+ install malware</em></ins></span> on <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>the</em></ins></span> user's <span
class="removed"><del><strong>personal data</a>.</strong></del></span>
<span class="inserted"><ins><em>computer</a>.</em></ins></span> The <span
class="removed"><del><strong>critique fails entirely to express concern that
the</strong></del></span> app <span
class="removed"><del><strong>sends</strong></del></span> <span
class="inserted"><ins><em>developers
+ regularly used it to make</em></ins></span> the
+<span class="removed"><del><strong>personal data</strong></del></span> <span
class="inserted"><ins><em>computer download and execute any code
they wanted.</p>
- <p>This</em></ins></span> is <span class="removed"><del><strong>not
much detail here, it seems</strong></del></span> <span
class="inserted"><ins><em>a concrete example of what users are exposed to when
they
- run nonfree apps. They can never be completely sure</em></ins></span> that
<span class="removed"><del><strong>this
- does not operate via</strong></del></span> <span class="inserted"><ins><em>a
nonfree
- app is safe.</p>
+ <p>This is a concrete example of what users are
exposed</em></ins></span> to <span class="inserted"><ins><em>when they
+ run nonfree apps. They can never be completely sure that</em></ins></span>
a <span class="removed"><del><strong>server, where the
<em>developer</em> gets it all.
+This “service”</strong></del></span> <span
class="inserted"><ins><em>nonfree
+ app</em></ins></span> is <span class="inserted"><ins><em>safe.</p>
</li>
<li id="M201609130">
<p>Xiaomi phones come with <a
href="https://web.archive.org/web/20190424082647/http://blog.thijsbroenink.com/2016/09/xiaomis-analytics-app-reverse-engineered/">
- a universal back door in</em></ins></span> the <span
class="inserted"><ins><em>application processor, for Xiaomi's
+ a universal back door in the application processor,</em></ins></span> for
<span class="removed"><del><strong>suckers!</p>
+
+<p>The server surely</strong></del></span> <span
class="inserted"><ins><em>Xiaomi's
use</a>.</p>
- <p>This is separate from <a
href="#universal-back-door-phone-modem">the</em></ins></span>
- universal back door <span class="inserted"><ins><em>in the modem
processor</em></ins></span> that <span class="removed"><del><strong>we know
nearly</strong></del></span> <span class="inserted"><ins><em>the local phone
+ <p>This is separate from <a
href="#universal-back-door-phone-modem">the
+ universal back door in the modem processor that the local phone
company can use</a>.</p>
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
+ <p>Baidu's proprietary Android library, Moplus,</em></ins></span>
has a <span class="removed"><del><strong>“privacy policy,” and
surely it
+is worthless since nearly all of</strong></del></span> <span
class="inserted"><ins><em>back door that <a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files” as well as forcibly install
apps</a>.</p>
@@ -289,9 +320,8 @@
<li id="M201412180">
<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
- A Chinese version of Android has a universal back door</a>.
Nearly</em></ins></span>
- all
- <span class="removed"><del><strong>portable</strong></del></span> <span
class="inserted"><ins><em>models of mobile</em></ins></span> phones <span
class="removed"><del><strong>have. It may involve exploiting various bugs.
There are</strong></del></span> <span class="inserted"><ins><em>have a <a
href="#universal-back-door-phone-modem">
+ A Chinese version of Android has a universal back door</a>. Nearly
+ all models of mobile phones have a <a
href="#universal-back-door-phone-modem">
universal back door in the modem chip</a>. So why did Coolpad bother
to introduce another? Because this one is controlled by Coolpad.</p>
</li>
@@ -926,12 +956,11 @@
about the users' searches that Google normally gets when they use
its search engine.</p>
- <p>Currently, the app is</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.osnews.com/story/27416/The_second_operating_system_hiding_in_every_mobile_phone">
- lots</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
+ <p>Currently, the app is <a
+
href="https://www.eff.org/deeplinks/2017/04/update-verizons-appflash-pre-installed-spyware-still-spyware">
being pre-installed on only one phone</a>, and the user must
explicitly opt-in before the app takes effect. However, the app
- remains spyware—an “optional” piece</em></ins></span> of
<span class="removed"><del><strong>bugs in</strong></del></span> <span
class="inserted"><ins><em>spyware is
+ remains spyware—an “optional” piece of spyware is
still spyware.</p>
</li>
@@ -944,41 +973,34 @@
<li id="M201611280">
<p>The Uber app tracks <a
href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after</em></ins></span> the <span
class="removed"><del><strong>phones' radio
software</a>.</p></strong></del></span> <span
class="inserted"><ins><em>ride</a>.</p>
+ movements before and after the ride</a>.</p>
<p>This example illustrates how “getting the user's
consent” for surveillance is inadequate as a protection against
- massive surveillance.</p></em></ins></span>
+ massive surveillance.</p>
</li>
-<span class="removed"><del><strong></ul>
-<h3 id="surveillance">Mobile Surveillance</h3>
-<ul>
-<li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201611160"></em></ins></span>
- <p>A <span
class="removed"><del><strong>half-blind</strong></del></span> <span
class="inserted"><ins><em><a
+ <li id="M201611160">
+ <p>A <a
href="https://research.csiro.au/ng/wp-content/uploads/sites/106/2016/08/paper-1.pdf">
- research paper</a> that investigated the privacy
and</em></ins></span> security <span
class="removed"><del><strong>critique</strong></del></span> of
- <span class="inserted"><ins><em>283 Android VPN apps concluded that
“in spite of the promises
+ research paper</a> that investigated the privacy and security of
+ 283 Android VPN apps concluded that “in spite of the promises
for privacy, security, and anonymity given by the majority of VPN
apps—millions of users may be unawarely subject to poor security
guarantees and abusive practices inflicted by VPN apps.”</p>
- <p>Following is</em></ins></span> a <span
class="inserted"><ins><em>non-exhaustive list, taken from the research paper,
+ <p>Following is a non-exhaustive list, taken from the research paper,
of some proprietary VPN apps that track users and infringe their
privacy:</p>
<dl class="compact">
<dt>SurfEasy</dt>
- <dd>Includes</em></ins></span> tracking <span
class="removed"><del><strong>app:</strong></del></span> <span
class="inserted"><ins><em>libraries such as NativeX and Appflood,
+ <dd>Includes tracking libraries such as NativeX and Appflood,
meant to track users and show them targeted ads.</dd>
<dt>sFly Network Booster</dt>
<dd>Requests the <code>READ_SMS</code> and
<code>SEND_SMS</code>
- permissions upon installation, meaning</em></ins></span> it <span
class="removed"><del><strong>found that <a
-href="http://www.consumerreports.org/mobile-security-software/glow-pregnancy-app-exposed-women-to-privacy-threats/">
-blatant flaws allowed anyone</strong></del></span> <span
class="inserted"><ins><em>has full access</em></ins></span> to <span
class="removed"><del><strong>snoop on a user's personal
data</a>.</strong></del></span> <span class="inserted"><ins><em>users'
+ permissions upon installation, meaning it has full access to users'
text messages.</dd>
<dt>DroidVPN and TigerVPN</dt>
@@ -992,34 +1014,30 @@
<dt>VPN Services HotspotShield</dt>
<dd>Injects JavaScript code into the HTML pages returned to the
- users.</em></ins></span> The <span class="removed"><del><strong>critique
fails entirely</strong></del></span> <span class="inserted"><ins><em>stated
purpose of the JS injection is</em></ins></span> to <span
class="removed"><del><strong>express concern</strong></del></span> <span
class="inserted"><ins><em>display ads. Uses
+ users. The stated purpose of the JS injection is to display ads. Uses
roughly five tracking libraries. Also, it redirects the user's
traffic through valueclick.com (an advertising website).</dd>
<dt>WiFi Protector VPN</dt>
<dd>Injects JavaScript code into HTML pages, and also uses roughly
- five tracking libraries. Developers of this app have
confirmed</em></ins></span> that
- the <span class="inserted"><ins><em>non-premium version of
the</em></ins></span> app <span
class="removed"><del><strong>sends</strong></del></span> <span
class="inserted"><ins><em>does JavaScript injection for
- tracking</em></ins></span> the
-<span class="removed"><del><strong>personal</strong></del></span> <span
class="inserted"><ins><em>user and displaying ads.</dd>
+ five tracking libraries. Developers of this app have confirmed that
+ the non-premium version of the app does JavaScript injection for
+ tracking the user and displaying ads.</dd>
</dl>
</li>
<li id="M201611150">
<p>Some portable phones <a
href="http://www.prnewswire.com/news-releases/kryptowire-discovered-mobile-phone-firmware-that-transmitted-personally-identifiable-information-pii-without-user-consent-or-disclosure-300362844.html">are
- sold with spyware sending lots of</em></ins></span> data to <span
class="removed"><del><strong>a server, where the <em>developer</em>
gets it all.
-This “service” is</strong></del></span> <span
class="inserted"><ins><em>China</a>.</p>
+ sold with spyware sending lots of data to China</a>.</p>
</li>
<li id="M201606050">
<p>Facebook's new Magic Photo app <a
href="https://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
- scans your mobile phone's photo collections</em></ins></span> for <span
class="removed"><del><strong>suckers!</p>
-
-<p>The server surely has a “privacy
policy,”</strong></del></span> <span class="inserted"><ins><em>known
faces</a>,</em></ins></span>
- and <span class="removed"><del><strong>surely it</strong></del></span>
<span class="inserted"><ins><em>suggests you to share the picture you take
according to who</em></ins></span> is <span
class="removed"><del><strong>worthless since nearly</strong></del></span>
- <span class="inserted"><ins><em>in the frame.</p>
+ scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share the picture you take according to who is
+ in the frame.</p>
<p>This spyware feature seems to require online access to some
known-faces database, which means the pictures are likely to be
@@ -1031,7 +1049,7 @@
</li>
<li id="M201605310">
- <p>Facebook's app listens</em></ins></span> all <span
class="inserted"><ins><em>the time, <a
+ <p>Facebook's app listens all the time, <a
href="http://www.independent.co.uk/life-style/gadgets-and-tech/news/facebook-using-people-s-phones-to-listen-in-on-what-they-re-saying-claims-professor-a7057526.html">to
snoop on what people are listening to or watching</a>. In addition,
it may be analyzing people's conversations to serve them with targeted
@@ -1041,7 +1059,7 @@
<li id="M201604250">
<p>A pregnancy test controller application not only can <a
href="http://www.theverge.com/2016/4/25/11503718/first-response-pregnancy-pro-test-bluetooth-app-security">
- spy on many sorts</em></ins></span> of <span
class="inserted"><ins><em>data in the phone, and in server accounts,
+ spy on many sorts of data in the phone, and in server accounts,
it can alter</em></ins></span> them <span
class="removed"><del><strong>are.</p></strong></del></span> <span
class="inserted"><ins><em>too</a>.</p></em></ins></span>
</li>
@@ -1350,7 +1368,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2014, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Free
Software Foundation, Inc.</p>
+<p>Copyright © 2014, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017, 2018, 2019, 2020</em></ins></span> Free
Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1361,7 +1379,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/malware-mobiles.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ja.po,v
retrieving revision 1.118
retrieving revision 1.119
diff -u -b -r1.118 -r1.119
--- proprietary/po/malware-mobiles.ja.po 31 Dec 2019 01:04:21 -0000
1.118
+++ proprietary/po/malware-mobiles.ja.po 20 Jan 2020 19:04:01 -0000
1.119
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2016-12-20 14:59+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -231,6 +231,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -1703,7 +1727,7 @@
#| msgid ""
#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary/po/malware-mobiles.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.pot,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -b -r1.93 -r1.94
--- proprietary/po/malware-mobiles.pot 18 Nov 2019 11:26:47 -0000 1.93
+++ proprietary/po/malware-mobiles.pot 20 Jan 2020 19:04:01 -0000 1.94
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -180,6 +180,29 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a "
+"href=\"https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/\">
"
+"preinstalled adware and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a "
+"href=\"https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\">
"
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a "
"href=\"https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/\">secretly
"
@@ -1426,7 +1449,7 @@
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
Index: proprietary/po/malware-mobiles.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-mobiles.ru.po,v
retrieving revision 1.216
retrieving revision 1.217
diff -u -b -r1.216 -r1.217
--- proprietary/po/malware-mobiles.ru.po 19 Nov 2019 07:01:50 -0000
1.216
+++ proprietary/po/malware-mobiles.ru.po 20 Jan 2020 19:04:01 -0000
1.217
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-mobiles.html\n"
-"POT-Creation-Date: 2019-11-18 11:26+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2018-12-02 08:54+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Mobile Devices - GNU Project - Free Software Foundation"
@@ -233,6 +234,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -2119,8 +2144,14 @@
# type: Content of: <div><p>
#. type: Content of: <div><p>
+# | Copyright © 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
Index: proprietary/po/nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary/po/nl.po 27 Dec 2019 10:34:04 -0000 1.166
+++ proprietary/po/nl.po 20 Jan 2020 19:04:01 -0000 1.167
@@ -5117,6 +5117,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -6183,6 +6207,19 @@
"such as Carrier IQ</a>."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013,-] 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | [-Proprietary Software-]{+Malware in Webpages+} - GNU Project - Free
# | Software Foundation
@@ -6901,11 +6938,11 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2015, 2016-] {+2014-2019+} Free Software Foundation,
+# | Copyright © [-2015, 2016-] {+2014-2020+} Free Software Foundation,
# | Inc.
#, fuzzy
#| msgid "Copyright © 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2015, 2016 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -7806,17 +7843,17 @@
"je meestal belazerd."
#. type: Content of: <div><p>
-# | As of [-April,-] {+October,+} 2019, the [-files-] {+pages+} in this
-# | directory list around 400 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 500 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2019,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around 4[-0-]{+5+}0 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2019, the files in this directory list around 400 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -8167,15 +8204,15 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
@@ -9554,6 +9591,31 @@
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft-malware</a>"
+#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the files in this directory list around 400 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Anno april 2019 staan er in dit overzicht ongeveer 400 gevallen van "
+#~ "kwaadaardige functionaliteit, maar er zijn zeker weten duizenden andere "
+#~ "gevallen waar we niks van weten."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
#~ msgid ""
#~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
#~ "malware</a>"
Index: proprietary/po/pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/pl.po 27 Dec 2019 10:34:04 -0000 1.165
+++ proprietary/po/pl.po 20 Jan 2020 19:04:01 -0000 1.166
@@ -4570,6 +4570,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -5620,6 +5644,16 @@
"such as Carrier IQ</a>."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013,-] 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | [-Proprietary Software-]{+Malware in Webpages+} - GNU Project - Free
# | Software Foundation
@@ -6325,11 +6359,11 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015-] {+2014-2019+} Free Software
+# | Copyright © [-2013, 2014, 2015-] {+2014-2020+} Free Software
# | Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -7180,7 +7214,7 @@
#. type: Content of: <div><p>
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -7584,13 +7618,13 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -8974,6 +9008,13 @@
msgstr "<a href=\"/philosophy/malware-microsoft.html\">Malware Microsoftu</a>"
#, fuzzy
+#~| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
#~| msgid ""
#~| "<a href=\"/philosophy/proprietary-drm.html\">Digital restrictions "
#~| "management</a> or “DRM” means functionalities designed to "
Index: proprietary/po/pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.164
retrieving revision 1.165
diff -u -b -r1.164 -r1.165
--- proprietary/po/pot 27 Dec 2019 10:34:04 -0000 1.164
+++ proprietary/po/pot 20 Jan 2020 19:04:01 -0000 1.165
@@ -4285,6 +4285,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -5328,6 +5352,12 @@
"such as Carrier IQ</a>."
msgstr ""
+#. type: Content of: <div><p>
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+
#. type: Content of: <title>
msgid "Malware in Webpages - GNU Project - Free Software Foundation"
msgstr ""
@@ -5970,7 +6000,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <title>
@@ -6639,7 +6669,7 @@
#. type: Content of: <div><p>
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -6826,8 +6856,8 @@
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
#. type: Content of: <title>
Index: proprietary/po/proprietary-back-doors.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary/po/proprietary-back-doors.de-diff.html 23 Nov 2019 15:30:43
-0000 1.37
+++ proprietary/po/proprietary-back-doors.de-diff.html 20 Jan 2020 19:04:01
-0000 1.38
@@ -362,8 +362,7 @@
<span class="inserted"><ins><em><li id="M201907100">
<p>Apple appears to say that <a
href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
- there is</em></ins></span> a back door <span
class="removed"><del><strong>that <a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"></strong></del></span>
<span class="inserted"><ins><em>in MacOS</a> for automatically updating
some
+ there is</em></ins></span> a back door <span
class="removed"><del><strong>that <a</strong></del></span> <span
class="inserted"><ins><em>in MacOS</a> for automatically updating some
(all?) apps.</p>
<p>The specific change described in the article was not
@@ -422,8 +421,8 @@
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
-
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"></em></ins></span>
+ <p>Baidu's proprietary Android library, Moplus, has a back door that
<a</em></ins></span>
+
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
can “upload files” as well as forcibly install
apps</a>.</p>
@@ -475,9 +474,8 @@
<span class="inserted"><ins><em><li id="M200808110">
<p>The iPhone</em></ins></span> has a back door <span
class="removed"><del><strong>for</strong></del></span> <span
class="inserted"><ins><em><a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple to</em></ins></span> remotely <span
class="removed"><del><strong>deleting apps</a>.</p>
- <p>You might well decide</strong></del></span> <span
class="inserted"><ins><em>delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's OK for
Apple</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> <span
class="inserted"><ins><em>have
+ that allows Apple to</em></ins></span> remotely <span
class="removed"><del><strong>deleting</strong></del></span> <span
class="inserted"><ins><em>delete apps</a> which Apple considers
+ “inappropriate”. Jobs said it's OK for Apple to have
this power because of course we can trust Apple.</p>
</li>
</ul>
@@ -486,12 +484,30 @@
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
+ <li id="M202001090">
+ <p>Android phones subsidized by the US government come with <a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a back door for forcing installation
of</em></ins></span>
+ apps</a>.</p>
+ <span class="removed"><del><strong><p>You might well
decide</strong></del></span>
+
+ <span class="inserted"><ins><em><p>The adware is in a modified
version of an
+ essential system configuration app. The back door is a
+ surreptitious addition</em></ins></span> to <span
class="removed"><del><strong>let</strong></del></span> a <span
class="removed"><del><strong>security service</strong></del></span> <span
class="inserted"><ins><em>program whose stated purpose is to be a <a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ universal back door for firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is in addition to the
+ malware of Android itself.</p>
+ </li>
+
<li id="M201910130.1">
<p>The Chinese Communist Party's <a
href="/proprietary/proprietary-surveillance.html#M201910130">
“Study the Great Nation” app</a> was found to contain
<a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962"></em></ins></span>
- a <span class="removed"><del><strong>security
service</strong></del></span> <span class="inserted"><ins><em>back-door
allowing developers to run any code they wish</a> in the
+
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ a back-door allowing developers to run any code they wish</a> in the
users' phone, as “superusers.”</p>
<p>Note: The <a
@@ -887,7 +903,7 @@
of this article.</p>
</div>
-<p>Copyright © <span
class="removed"><del><strong>2014-2018</strong></del></span> <span
class="inserted"><ins><em>2014-2019</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span
class="removed"><del><strong>2014-2018</strong></del></span> <span
class="inserted"><ins><em>2014-2020</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -897,7 +913,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/23 15:30:43 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.de.po,v
retrieving revision 1.135
retrieving revision 1.136
diff -u -b -r1.135 -r1.136
--- proprietary/po/proprietary-back-doors.de.po 23 Nov 2019 15:30:43 -0000
1.135
+++ proprietary/po/proprietary-back-doors.de.po 20 Jan 2020 19:04:01 -0000
1.136
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
"PO-Revision-Date: 2018-08-29 03:06+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -798,6 +798,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
@@ -1414,10 +1438,10 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © 2014-201[-8-]{+9+} Free Software Foundation, Inc.
+# | Copyright © [-2014-2018-] {+2014-2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2014-2018 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 201<ins>3</ins>-2018 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary/po/proprietary-back-doors.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.es.po,v
retrieving revision 1.30
retrieving revision 1.31
diff -u -b -r1.30 -r1.31
--- proprietary/po/proprietary-back-doors.es.po 24 Nov 2019 11:31:59 -0000
1.30
+++ proprietary/po/proprietary-back-doors.es.po 20 Jan 2020 19:04:01 -0000
1.31
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
"PO-Revision-Date: 2019-11-24 11:48+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:56+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -671,6 +672,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
@@ -1180,7 +1205,10 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+# | Copyright © [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary/po/proprietary-back-doors.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.fr.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary/po/proprietary-back-doors.fr.po 24 Nov 2019 09:35:45 -0000
1.150
+++ proprietary/po/proprietary-back-doors.fr.po 20 Jan 2020 19:04:01 -0000
1.151
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
"PO-Revision-Date: 2019-11-23 17:20+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:56+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -677,6 +678,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
@@ -1186,7 +1211,10 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+# | Copyright © [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary/po/proprietary-back-doors.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it-diff.html,v
retrieving revision 1.64
retrieving revision 1.65
diff -u -b -r1.64 -r1.65
--- proprietary/po/proprietary-back-doors.it-diff.html 23 Nov 2019 15:30:43
-0000 1.64
+++ proprietary/po/proprietary-back-doors.it-diff.html 20 Jan 2020 19:04:01
-0000 1.65
@@ -289,63 +289,32 @@
the <span
class="removed"><del><strong>computer.</p></strong></del></span> <span
class="inserted"><ins><em>device.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>Baidu's proprietary Android library, Moplus,</strong></del></span>
+ <p>Baidu's proprietary Android library,</strong></del></span>
<span class="inserted"><ins><em><li id="M201210220">
<p id="swindle-eraser">The Amazon
- Kindle-Swindle</em></ins></span> has a back door that <span
class="removed"><del><strong><a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
- “upload files” as well as forcibly install
- apps</a>.</p>
- <p>It is used by 14,000 Android applications.</p>
- </li>
-
-<li><p>ARRIS cable modem</strong></del></span> has <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor in</strong></del></span>
- <span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
- remotely erase books</a>. One of</em></ins></span> the <span
class="removed"><del><strong>backdoor</a>.</p>
-</li>
- <li><p>Caterpillar vehicles come with
- <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span> <span class="inserted"><ins><em>books erased
was
+ Kindle-Swindle has a back door that has been used to <a
+
href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
+ remotely erase books</a>. One of the books erased was
<cite>1984</cite>, by George Orwell.</p>
- <p>Amazon responded</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>criticism by saying it
- would delete books only following orders from</em></ins></span> the <span
class="removed"><del><strong>engine</a>
- remotely.</p>
- </li>
-<li><p>
-Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local back door for 4 years</a>.
-</p></li>
-
-<li><p>Users reported</strong></del></span>
- <span class="inserted"><ins><em>state. However,</em></ins></span> that
<span class="inserted"><ins><em>policy didn't last. In 2012
it</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them to replace Windows 7</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
- wiped a user's Kindle-Swindle</em></ins></span> and <span
class="removed"><del><strong>8 with all-spying
- Windows 10</a>.</p>
-
- <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>deleted her account</a>, then
+ <p>Amazon responded to criticism by saying it
+ would delete books only following orders from the
+ state. However, that policy didn't last. In 2012 it <a
+
href="http://boingboing.net/2012/10/22/kindle-user-claims-amazon-dele.html">
+ wiped a user's Kindle-Swindle and deleted her account</a>, then
offered her kafkaesque “explanations.”</p>
- <p>Do other ebook readers have back doors</em></ins></span> in <span
class="removed"><del><strong>fact <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers that run Windows 7</strong></del></span> <span
class="inserted"><ins><em>their nonfree software? We
- don't know,</em></ins></span> and <span
class="removed"><del><strong>8</a>, switching on a flag
- that said whether</strong></del></span> <span class="inserted"><ins><em>we
have no way</em></ins></span> to <span
class="removed"><del><strong>“upgrade”</strong></del></span> <span
class="inserted"><ins><em>find out. There is no reason</em></ins></span> to
<span class="removed"><del><strong>Windows 10 when</strong></del></span>
- <span class="inserted"><ins><em>assume that they don't.</p>
+ <p>Do other ebook readers have back doors in their nonfree software?
We
+ don't know, and we have no way to find out. There is no reason to
+ assume that they don't.</p>
</li>
<li id="M201011220">
<p>The iPhone has a back door for <a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
- remote wipe</a>. It's not always enabled, but</em></ins></span>
users
- <span class="removed"><del><strong>had turned</strong></del></span> <span
class="inserted"><ins><em>are led into
- enabling</em></ins></span> it <span
class="removed"><del><strong>off.</p>
-
- <p>Later on, Microsoft published instructions on <a
-
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how</strong></del></span> <span class="inserted"><ins><em>without
understanding.</p>
+ remote wipe</a>. It's not always enabled, but users are led into
+ enabling it without understanding.</p>
</li>
</ul>
@@ -355,32 +324,21 @@
<ul class="blurbs">
<li id="M201908270">
<p>A very popular app found in the
- Google Play store contained a module that was designed</em></ins></span>
to <span class="removed"><del><strong>permanently reject</strong></del></span>
<span class="inserted"><ins><em><a
+ Google Play store contained a module that was designed to <a
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
- install malware on</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>user's computer</a>. The app developers
- regularly used it</em></ins></span> to <span
class="removed"><del><strong>Windows
10</a>.</p></strong></del></span> <span
class="inserted"><ins><em>make the computer download and execute any code
- they wanted.</p></em></ins></span>
-
- <p>This <span class="removed"><del><strong>seems to involve
use</strong></del></span> <span class="inserted"><ins><em>is a concrete
example</em></ins></span> of <span class="inserted"><ins><em>what users are
exposed to when they
- run nonfree apps. They can never be completely sure that</em></ins></span>
a <span class="removed"><del><strong>back door in Windows 7 and
8.</p></strong></del></span> <span class="inserted"><ins><em>nonfree
- app is safe.</p></em></ins></span>
+ install malware on the user's computer</a>. The app developers
+ regularly used it to make the computer download and execute any code
+ they wanted.</p>
+
+ <p>This is a concrete example of what users are exposed to when they
+ run nonfree apps. They can never be completely sure that a nonfree
+ app is safe.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Most mobile phones have a universal back door, which has been
used</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201907100">
- <p>Apple appears</em></ins></span> to <span
class="inserted"><ins><em>say that</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p>
-</li>
-
-<li>
-<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of Android has</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
- there is</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door</a>. Nearly all
-models</strong></del></span> <span class="inserted"><ins><em>door in
MacOS</a> for automatically updating some
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
(all?) apps.</p>
<p>The specific change described in the article was not
@@ -393,8 +351,8 @@
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
back door that can make it cease to function</a>.</p>
- <p>The article is full</em></ins></span> of <span
class="removed"><del><strong>mobile phones</strong></del></span> <span
class="inserted"><ins><em>confusions, errors and biases that
we</em></ins></span> have
- <span class="inserted"><ins><em>an obligation to expose, given that we are
making a link to them.</p>
+ <p>The article is full of confusions, errors and biases that we have
+ an obligation to expose, given that we are making a link to them.</p>
<ul>
<li>Getting a patent does not “enable” a company to do
@@ -402,15 +360,14 @@
to do is sue other companies if they do some particular thing in
their products.</li>
- <li>A company's policies about when to attack users
through</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back
- door <span class="inserted"><ins><em>are beside the point. Inserting the
back door is wrong</em></ins></span> in the <span
class="removed"><del><strong>modem chip. So
-why did Coolpad bother</strong></del></span>
- <span class="inserted"><ins><em>first place, and using the back door is
always wrong too. No software
+ <li>A company's policies about when to attack users through a back
+ door are beside the point. Inserting the back door is wrong in the
+ first place, and using the back door is always wrong too. No software
developer should have that power over users.</li>
<li>“<a
href="/philosophy/words-to-avoid.html#Piracy">Piracy</a>”
means
- attacking ships. Using that word</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>refer to sharing
copies</em></ins></span> is <span
class="removed"><del><strong>controlled</strong></del></span> <span
class="inserted"><ins><em>a smear;
+ attacking ships. Using that word to refer to sharing copies is a smear;
please don't smear sharing.</li>
<li><p>The idea of “protecting our IP” is
@@ -423,15 +380,11 @@
because neighbors' kids are playing on your front yard, and saying
that you're “protecting the boundary line”. The kids can't do
harm
to the boundary line, not even with a jackhammer, because it is an
- abstraction and can't be affected</em></ins></span> by <span
class="removed"><del><strong>Coolpad.
-</p></strong></del></span> <span class="inserted"><ins><em>physical
action.</p></li>
- </ul></em></ins></span>
+ abstraction and can't be affected by physical action.</p></li>
+ </ul>
</li>
-<span class="removed"><del><strong><li>
-<p>Microsoft Windows</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804010">
+ <li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
load downgrades that install a surveillance app</a>.</p>
@@ -444,148 +397,217 @@
</li>
<li id="M201511090">
- <p>Baidu's proprietary Android library, Moplus,</em></ins></span>
has a <span class="removed"><del><strong>universal</strong></del></span> back
door <span class="removed"><del><strong>through which</strong></del></span>
<span class="inserted"><ins><em>that</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made"></em></ins></span>
- can <span class="removed"><del><strong>be imposed on the users</a>.
-</p>
-<p>More information on when</strong></del></span> <span
class="inserted"><ins><em>“upload files” as well as forcibly install
+ <p>Baidu's proprietary Android library,</em></ins></span> Moplus,
has a back door that <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
+ can</em></ins></span> “upload files” as well as forcibly
install
apps</a>.</p>
<p>It is used by 14,000 Android applications.</p>
</li>
- <li id="M201112080">
- <p> In addition to its</em></ins></span> <a <span
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
-this was used</a>.
-</p>
-<p>In</strong></del></span> <span
class="inserted"><ins><em>href="#windows-update">universal back
- door</a>,</em></ins></span> Windows <span
class="removed"><del><strong>10, the universal</strong></del></span> <span
class="inserted"><ins><em>8 has a</em></ins></span> back door <span
class="inserted"><ins><em>for <a
-
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
+<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201112080">
+ <p> In addition to its <a href="#windows-update">universal back
+ door</a>, Windows 8</em></ins></span> has a <span
class="inserted"><ins><em>back door for</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in the backdoor</a>.</p>
+</li>
+ <li><p>Caterpillar vehicles come with
+ <a
href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
- <p>You might well decide to let a security service that you trust
+ <p>You might well decide</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>let a security service that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
- But there</em></ins></span> is no <span
class="removed"><del><strong>longer hidden; all
-“upgrades” will
-be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>excuse for <em>deleting</em> the
programs,</em></ins></span> and <span class="removed"><del><strong>immediately
imposed</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>you
+ But there is no excuse for <em>deleting</em></em></ins></span>
the <span class="removed"><del><strong>engine</a>
+ remotely.</p></strong></del></span> <span
class="inserted"><ins><em>programs, and you
should have the right to decide whom (if anyone) to trust in this
way.</p></em></ins></span>
</li>
-
-<span class="removed"><del><strong><li><p>German
government</strong></del></span>
+<span class="removed"><del><strong><li><p>
+Mac OS X had an</strong></del></span>
<span class="inserted"><ins><em><li id="M201103070">
- <p>In Android,</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
-away from Windows 8 computers with TPM 2.0 due to
potential</strong></del></span>
+ <p>In Android,</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google has a</em></ins></span> back door <span
class="removed"><del><strong>capabilities</strong></del></span> <span
class="inserted"><ins><em>to remotely delete apps</a>. (It was in a
+ Google has a</em></ins></span> back door <span
class="removed"><del><strong>for 4 years</a>.
+</p></li>
+
+<li><p>Users reported that <a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was forcing them</strong></del></span> to <span
class="removed"><del><strong>replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft</strong></del></span> <span
class="inserted"><ins><em>remotely delete apps</a>. (It</em></ins></span>
was in <span class="removed"><del><strong>fact</strong></del></span> <span
class="inserted"><ins><em>a
program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
- <p>Google can also <a
-
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly and remotely install apps</a> through GTalkService. This is
+ <p>Google can also</em></ins></span> <a
+ <span
class="removed"><del><strong>href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly</em></ins></span> and <span
class="removed"><del><strong>8</a>, switching on</strong></del></span>
<span class="inserted"><ins><em>remotely install apps</a> through
GTalkService. This is
not equivalent to a universal back door, but permits various dirty
tricks.</p>
- <p>Although Google's <em>exercise</em></em></ins></span>
of <span class="inserted"><ins><em>this power has not been
- malicious so far,</em></ins></span> the <span
class="removed"><del><strong>TPM 2.0
chip</a>.</p></strong></del></span> <span
class="inserted"><ins><em>point is that nobody should have such power,
+ <p>Although Google's <em>exercise</em> of this power has
not been
+ malicious so far, the point is that nobody should have such power,
which could also be used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em> programs
that
- it considers malicious. But there is no excuse for allowing it to
- <em>delete</em> the programs, and you should have the right to
decide
- who (if anyone) to trust in this way.</p></em></ins></span>
+ let</em></ins></span> a <span
class="removed"><del><strong>flag</strong></del></span> <span
class="inserted"><ins><em>security service remotely
<em>deactivate</em> programs</em></ins></span> that <span
class="removed"><del><strong>said whether to “upgrade” to Windows
10 when users
+ had turned</strong></del></span>
+ it <span class="removed"><del><strong>off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how</strong></del></span> <span class="inserted"><ins><em>considers
malicious. But there is no excuse for allowing it</em></ins></span> to <span
class="removed"><del><strong>permanently reject</strong></del></span>
+ <span class="inserted"><ins><em><em>delete</em> the programs,
and you should have</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>right</em></ins></span> to <span
class="removed"><del><strong>Windows 10</a>.</p>
+
+ <p>This seems</strong></del></span> <span
class="inserted"><ins><em>decide
+ who (if anyone)</em></ins></span> to <span
class="removed"><del><strong>involve use of a back door</strong></del></span>
<span class="inserted"><ins><em>trust</em></ins></span> in <span
class="removed"><del><strong>Windows 7 and 8.</p></strong></del></span>
<span class="inserted"><ins><em>this way.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<span class="removed"><del><strong><li>
+<p>Most mobile phones have</strong></del></span>
- <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
- <p>The iPhone has a back door <a
+ <span class="inserted"><ins><em><li id="M200808110">
+ <p>The iPhone has</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door,</strong></del></span> <span
class="inserted"><ins><em>door <a
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
- that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's <span
class="removed"><del><strong>ok</strong></del></span> <span
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
- this power because of course we can trust <span
class="removed"><del><strong>Apple.
-</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
- </li>
+ that allows Apple to remotely delete apps</a></em></ins></span>
which <span class="removed"><del><strong>has been used</strong></del></span>
<span class="inserted"><ins><em>Apple considers
+ “inappropriate”. Jobs said it's OK for
Apple</em></ins></span> to
+<span class="removed"><del><strong><a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
+</p>
+</li>
-<span class="removed"><del><strong><li></strong></del></span>
-<span class="inserted"><ins><em></ul>
+<li>
+<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A Chinese version</strong></del></span> <span class="inserted"><ins><em>have
+ this power because</em></ins></span> of <span
class="removed"><del><strong>Android has</strong></del></span> <span
class="inserted"><ins><em>course we can trust Apple.</p>
+ </li>
+</ul>
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
- <li id="M201910130.1"></em></ins></span>
- <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's <a
+ <li id="M202001090">
+ <p>Android phones subsidized by the US government come with <a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> back <span
class="removed"><del><strong>door</a>. Nearly all
+models</strong></del></span> <span class="inserted"><ins><em>door for forcing
installation</em></ins></span> of <span class="removed"><del><strong>mobile
phones have</strong></del></span>
+ <span class="inserted"><ins><em>apps</a>.</p>
+
+ <p>The adware is in</em></ins></span> a <span
class="removed"><del><strong>universal</strong></del></span> <span
class="inserted"><ins><em>modified version of an
+ essential system configuration app. The</em></ins></span> back door <span
class="removed"><del><strong>in the modem chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>is a
+ surreptitious addition</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>a program whose
stated purpose</em></ins></span> is <span
class="removed"><del><strong>controlled
+by Coolpad.
+</p>
+</li>
+
+<li>
+<p>Microsoft Windows has</strong></del></span> <span
class="inserted"><ins><em>to be</em></ins></span> a <span
class="inserted"><ins><em><a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"></em></ins></span>
+ universal back door <span class="removed"><del><strong>through
which</strong></del></span> <span class="inserted"><ins><em>for
firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is in addition to the
+ malware of Android itself.</p>
+ </li>
+
+ <li id="M201910130.1">
+ <p>The Chinese Communist Party's <a
href="/proprietary/proprietary-surveillance.html#M201910130">
- “Study the Great Nation” app</a> was found to contain
<a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- a back-door allowing developers to run any code they wish</a> in the
- users' phone, as “superusers.”</p>
+ “Study the Great Nation” app</a> was found to
contain</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
+ a back-door allowing developers to run</em></ins></span> any <span
class="removed"><del><strong>change whatsoever can be imposed
on</strong></del></span> <span class="inserted"><ins><em>code they
wish</a> in</em></ins></span> the <span
class="removed"><del><strong>users</a>.
+</p>
+<p>More information on when</strong></del></span>
+ <span class="inserted"><ins><em>users' phone, as
“superusers.”</p>
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
+ <p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+this was used</a>.
+</p>
+<p>In Windows 10,</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
Washington Post version of the article</a> (partly obfuscated, but
readable after copy-pasting in a text editor) includes a clarification
saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
+ of</em></ins></span> the <span class="inserted"><ins><em>app, and that,
according to Apple, “this kind of
‘superuser’ surveillance could not be conducted on
Apple's operating system.”</p>
</li>
<li id="M201908220">
<p>ChromeBooks are programmed for obsolescence:
- ChromeOS</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back door <span
class="inserted"><ins><em>that is used</em></ins></span> for
-<span class="removed"><del><strong><a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
-remote wipe</a>. It's not always enabled, but users are led into
enabling
-it without understanding.
+ ChromeOS has a</em></ins></span> universal back door <span
class="inserted"><ins><em>that</em></ins></span> is <span
class="removed"><del><strong>no longer hidden; all
+“upgrades” will
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
<span class="inserted"><ins><em>used for updates</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
</p>
</li>
-<li>
- <p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>updates</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
+<li><p>German government</strong></del></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">veers
+away from Windows 8 computers with TPM 2.0 due</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
- ceases to operate at a predefined date</a>. From then on, there
- appears to be no support whatsoever</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may</strong></del></span> <span
class="inserted"><ins><em>computer.</p>
+ ceases</em></ins></span> to <span
class="removed"><del><strong>potential</strong></del></span> <span
class="inserted"><ins><em>operate at a predefined date</a>. From then on,
there
+ appears to be no support whatsoever for the computer.</p>
- <p>In other words, when you stop getting screwed by the back door,
- you start getting screwed by the obsolescence.</p>
+ <p>In other words, when you stop getting screwed by
the</em></ins></span> back
+<span class="removed"><del><strong>door capabilities of</strong></del></span>
<span class="inserted"><ins><em>door,
+ you start getting screwed by</em></ins></span> the <span
class="removed"><del><strong>TPM 2.0
chip</a>.</p></strong></del></span> <span
class="inserted"><ins><em>obsolescence.</p></em></ins></span>
</li>
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902011"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>FordPass Connect feature of some Ford
vehicles</em></ins></span> has <span class="removed"><del><strong>a back
door</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+that allows Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
+“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>improved with</strong></del></span> <span
class="inserted"><ins><em>you succeeded in breaking the
+ <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>this power
+because</strong></del></span> <span class="inserted"><ins><em>you succeeded in
breaking the
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
<li id="M201812300">
- <p>New GM cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8</strong></del></span>
- <span
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
+ <p>New GM cars <a
+ href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
+ offer the feature</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
+</p></strong></del></span> <span class="inserted"><ins><em>a universal
back door</a>.</p>
- <p>Every nonfree program offers the user zero</em></ins></span>
security <span class="removed"><del><strong>improvements</a>;
but</strong></del></span> <span class="inserted"><ins><em>against its
+ <p>Every nonfree program offers the user zero security against its
developer. With this malfeature, GM has explicitly made things even
- worse.</p>
+ worse.</p></em></ins></span>
</li>
- <li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711244"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>back door for
+<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
enabling
+it without understanding.
+</p>
+</li>
+
+<li>
+ <p>Apple can, and regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span> <span
class="inserted"><ins><em>product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
listening device, remote changes to the code could surely convert it
into one.</p></em></ins></span>
</li>
@@ -927,7 +949,7 @@
of this article.</p>
</div>
-<p>Copyright © <span
class="removed"><del><strong>2014-2017</strong></del></span> <span
class="inserted"><ins><em>2014-2019</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span
class="removed"><del><strong>2014-2017</strong></del></span> <span
class="inserted"><ins><em>2014-2020</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -938,7 +960,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/11/23 15:30:43 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.it.po,v
retrieving revision 1.128
retrieving revision 1.129
diff -u -b -r1.128 -r1.129
--- proprietary/po/proprietary-back-doors.it.po 23 Nov 2019 15:30:43 -0000
1.128
+++ proprietary/po/proprietary-back-doors.it.po 20 Jan 2020 19:04:01 -0000
1.129
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
"PO-Revision-Date: 2017-12-31 13:12+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -817,6 +817,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
@@ -1397,10 +1421,10 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-# | Copyright © 2014-201[-7-]{+9+} Free Software Foundation, Inc.
+# | Copyright © [-2014-2017-] {+2014-2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary/po/proprietary-back-doors.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja-diff.html,v
retrieving revision 1.63
retrieving revision 1.64
diff -u -b -r1.63 -r1.64
--- proprietary/po/proprietary-back-doors.ja-diff.html 31 Dec 2019 01:04:21
-0000 1.63
+++ proprietary/po/proprietary-back-doors.ja-diff.html 20 Jan 2020 19:04:01
-0000 1.64
@@ -272,12 +272,10 @@
<span class="inserted"><ins><em><li id="M201210220">
<p id="swindle-eraser">The Amazon
Kindle-Swindle</em></ins></span> has a back door that <span
class="inserted"><ins><em>has been used to</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">can
- “upload files” as well as forcibly install
- apps</a>.</p>
- <p>It is used</strong></del></span>
+ “upload</strong></del></span>
<span
class="inserted"><ins><em>href="http://pogue.blogs.nytimes.com/2009/07/17/some-e-books-are-more-equal-than-others/">
remotely erase books</a>. One of the books erased was
- <cite>1984</cite>,</em></ins></span> by <span
class="removed"><del><strong>14,000 Android
applications.</p></strong></del></span> <span
class="inserted"><ins><em>George Orwell.</p>
+ <cite>1984</cite>, by George Orwell.</p>
<p>Amazon responded to criticism by saying it
would delete books only following orders from the
@@ -288,15 +286,12 @@
<p>Do other ebook readers have back doors in their nonfree software?
We
don't know, and we have no way to find out. There is no reason to
- assume that they don't.</p></em></ins></span>
+ assume that they don't.</p>
</li>
-<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201011220">
- <p>The iPhone</em></ins></span> has a <span
class="inserted"><ins><em>back door for</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
- backdoor</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+ <li id="M201011220">
+ <p>The iPhone has a back door for <a
+
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
remote wipe</a>. It's not always enabled, but users are led into
enabling it without understanding.</p>
</li>
@@ -307,69 +302,46 @@
<ul class="blurbs">
<li id="M201908270">
- <p>A very popular app found</em></ins></span> in the <span
class="removed"><del><strong>backdoor</a>.</p>
-</li>
- <li><p>Caterpillar vehicles come with</strong></del></span>
- <span class="inserted"><ins><em>Google Play store contained a module that
was designed to</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door</strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
+ <p>A very popular app found in the
+ Google Play store contained a module that was designed to <a
+
href="https://arstechnica.com/information-technology/2019/08/google-play-app-with-100-million-downloads-executed-secret-payloads/">secretly
install malware on the user's computer</a>. The app developers
- regularly used it</em></ins></span> to <span
class="removed"><del><strong>shutoff</strong></del></span> <span
class="inserted"><ins><em>make</em></ins></span> the <span
class="removed"><del><strong>engine</a>
- remotely.</p></strong></del></span> <span
class="inserted"><ins><em>computer download and execute any code
+ regularly used it to make the computer download and execute any code
they wanted.</p>
<p>This is a concrete example of what users are exposed to when they
run nonfree apps. They can never be completely sure that a nonfree
- app is safe.</p></em></ins></span>
+ app is safe.</p>
</li>
-<span class="removed"><del><strong><li><p>
-Mac OS X had an</strong></del></span>
- <span class="inserted"><ins><em><li id="M201907100">
- <p>Apple appears to say that</em></ins></span> <a <span
class="removed"><del><strong>href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
-intentional local</strong></del></span>
- <span
class="inserted"><ins><em>href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
- there is a</em></ins></span> back door <span class="inserted"><ins><em>in
MacOS</a></em></ins></span> for <span class="removed"><del><strong>4
years</a>.
-</p></li>
-
-<li><p>Users reported</strong></del></span> <span
class="inserted"><ins><em>automatically updating some
+ <li id="M201907100">
+ <p>Apple appears to say that <a
+ href="https://techcrunch.com/2019/07/10/apple-silent-update-zoom-app/">
+ there is a back door in MacOS</a> for automatically updating some
(all?) apps.</p>
<p>The specific change described in the article was not
malicious—it protected users from surveillance by third
- parties—but</em></ins></span> that <span
class="inserted"><ins><em>is a separate question.</p>
+ parties—but that is a separate question.</p>
</li>
<li id="M201811100">
- <p>Corel Paintshop Pro has a</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
- Microsoft was forcing them</strong></del></span>
- <span
class="inserted"><ins><em>href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
- back door that can make it cease</em></ins></span> to <span
class="removed"><del><strong>replace Windows 7</strong></del></span> <span
class="inserted"><ins><em>function</a>.</p>
+ <p>Corel Paintshop Pro has a <a
+
href="https://torrentfreak.com/corel-wrongly-accuses-licensed-user-of-piracy-disables-software-remotely-181110/">
+ back door that can make it cease to function</a>.</p>
- <p>The article is full of confusions, errors</em></ins></span> and
<span class="removed"><del><strong>8 with all-spying
- Windows 10</a>.</p>
-
- <p>Microsoft was in fact <a
-
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
- attacking computers</strong></del></span> <span
class="inserted"><ins><em>biases</em></ins></span> that <span
class="removed"><del><strong>run Windows 7 and 8</a>, switching on a
flag</strong></del></span> <span class="inserted"><ins><em>we have
- an obligation to expose, given</em></ins></span> that <span
class="removed"><del><strong>said whether</strong></del></span> <span
class="inserted"><ins><em>we are making a link</em></ins></span> to <span
class="removed"><del><strong>“upgrade”</strong></del></span> <span
class="inserted"><ins><em>them.</p>
+ <p>The article is full of confusions, errors and biases that we have
+ an obligation to expose, given that we are making a link to them.</p>
<ul>
- <li>Getting a patent does not “enable” a
company</em></ins></span> to <span class="removed"><del><strong>Windows 10 when
users
- had turned</strong></del></span> <span class="inserted"><ins><em>do
- any particular thing in its products. What</em></ins></span> it <span
class="removed"><del><strong>off.</p>
-
- <p>Later on, Microsoft published instructions on <a
-
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
- how to permanently reject</strong></del></span> <span
class="inserted"><ins><em>does enable</em></ins></span> the <span
class="removed"><del><strong>downgrade</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span>
- to <span class="removed"><del><strong>Windows 10</a>.</p>
-
- <p>This seems</strong></del></span> <span
class="inserted"><ins><em>do is sue other companies if they do some particular
thing in
+ <li>Getting a patent does not “enable” a company to do
+ any particular thing in its products. What it does enable the company
+ to do is sue other companies if they do some particular thing in
their products.</li>
- <li>A company's policies about when</em></ins></span> to <span
class="removed"><del><strong>involve use of</strong></del></span> <span
class="inserted"><ins><em>attack users through</em></ins></span> a back
- door <span class="inserted"><ins><em>are beside the point. Inserting the
back door is wrong</em></ins></span> in <span
class="removed"><del><strong>Windows 7</strong></del></span> <span
class="inserted"><ins><em>the
- first place,</em></ins></span> and <span
class="removed"><del><strong>8.</p></strong></del></span> <span
class="inserted"><ins><em>using the back door is always wrong too. No software
+ <li>A company's policies about when to attack users through a back
+ door are beside the point. Inserting the back door is wrong in the
+ first place, and using the back door is always wrong too. No software
developer should have that power over users.</li>
<li>“<a
@@ -388,115 +360,135 @@
that you're “protecting the boundary line”. The kids can't do
harm
to the boundary line, not even with a jackhammer, because it is an
abstraction and can't be affected by physical action.</p></li>
- </ul></em></ins></span>
+ </ul>
</li>
-<span class="removed"><del><strong><li>
-<p>Most mobile phones have</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201804010">
+ <li id="M201804010">
<p>Some “Smart” TVs automatically <a
href="https://web.archive.org/web/20180405014828/https:/twitter.com/buro9/status/980349887006076928">
- load downgrades that install</em></ins></span> a <span
class="removed"><del><strong>universal back door, which has been
used</strong></del></span> <span class="inserted"><ins><em>surveillance
app</a>.</p>
+ load downgrades that install a surveillance app</a>.</p>
<p>We link to the article for the facts it presents. It
is too bad that the article finishes by advocating the
- moral weakness of surrendering</em></ins></span> to <span
class="inserted"><ins><em>Netflix. The Netflix app</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
-turn them malicious</a>.
-</p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
- malware too</a>.</p></em></ins></span>
+ moral weakness of surrendering to Netflix. The Netflix app <a
+ href="/proprietary/malware-google.html#netflix-app-geolocation-drm">is
+ malware too</a>.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
-A Chinese version of</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201511090">
- <p>Baidu's proprietary</em></ins></span> Android <span
class="inserted"><ins><em>library, Moplus,</em></ins></span> has a <span
class="removed"><del><strong>universal back door</a>. Nearly all
-models of mobile phones have a universal</strong></del></span> back door <span
class="removed"><del><strong>in the modem chip. So
-why did Coolpad bother to introduce another? Because this
one</strong></del></span> <span class="inserted"><ins><em>that <a
+ <li id="M201511090">
+ <p>Baidu's proprietary Android library, Moplus, has a back door that
<a
href="https://www.eff.org/deeplinks/2015/11/millions-android-devices-vulnerable-remote-hijacking-baidu-wrote-code-google-made">
- can “upload files” as well as forcibly install
+ can “upload</em></ins></span> files” as well as forcibly
install
apps</a>.</p>
- <p>It</em></ins></span> is <span
class="removed"><del><strong>controlled</strong></del></span> <span
class="inserted"><ins><em>used</em></ins></span> by <span
class="removed"><del><strong>Coolpad.
-</p></strong></del></span> <span class="inserted"><ins><em>14,000
Android applications.</p></em></ins></span>
+ <p>It is <span class="removed"><del><strong>used by 14,000 Android
applications.</p></strong></del></span> <span
class="inserted"><ins><em>used by 14,000 Android applications.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Microsoft</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201112080">
+ <li id="M201112080">
<p> In addition to its <a href="#windows-update">universal back
- door</a>,</em></ins></span> Windows <span
class="inserted"><ins><em>8</em></ins></span> has a <span
class="removed"><del><strong>universal</strong></del></span> back door <span
class="removed"><del><strong>through which</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> <a <span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
-any change whatsoever can be imposed on</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
+ door</a>, Windows 8 has a back door for <a
+
href="https://www.computerworld.com/article/2500036/microsoft--we-can-remotely-delete-windows-8-apps.html">
remotely deleting apps</a>.</p>
<p>You might well decide to let a security service that you trust
remotely <em>deactivate</em> programs that it considers
malicious.
- But there is no excuse for <em>deleting</em></em></ins></span>
the <span class="removed"><del><strong>users</a>.
-</p>
-<p>More information on when
-<a
href="http://slated.org/windows_by_stealth_the_updates_you_dont_want"></strong></del></span>
<span class="inserted"><ins><em>programs, and you
- should have the right to decide whom (if anyone) to trust
in</em></ins></span> this <span class="removed"><del><strong>was used</a>.
-</p></strong></del></span>
- <span class="inserted"><ins><em>way.</p>
+ But there is no excuse for <em>deleting</em> the programs, and
you
+ should have the right to decide whom (if anyone) to trust in this
+ way.</p>
</li>
- <li id="M201103070"></em></ins></span>
- <p>In <span class="removed"><del><strong>Windows 10, the
universal</strong></del></span> <span class="inserted"><ins><em>Android, <a
+ <li id="M201103070">
+ <p>In Android, <a
href="https://www.computerworld.com/article/2506557/google-throws--kill-switch--on-android-phones.html">
- Google has a</em></ins></span> back door <span
class="removed"><del><strong>is no longer hidden; all
-“upgrades” will
-be</strong></del></span> <span class="inserted"><ins><em>to remotely delete
apps</a>. (It was in a
+ Google has a back door to remotely delete apps</a>. (It was in a
program called GTalkService, which seems since then to have been
merged into Google Play.)</p>
- <p>Google can also</em></ins></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly</strong></del></span>
- <span
class="inserted"><ins><em>href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
- forcibly</em></ins></span> and <span
class="removed"><del><strong>immediately imposed</a>.
-</p>
-</li>
-
-<li>
-<p>Windows 8's</strong></del></span> <span
class="inserted"><ins><em>remotely install apps</a> through GTalkService.
This is
- not equivalent to a universal</em></ins></span> back <span
class="removed"><del><strong>doors are</strong></del></span> <span
class="inserted"><ins><em>door, but permits various dirty
+ <p>Google can also <a
+
href="https://jon.oberheide.org/blog/2010/06/25/remote-kill-and-install-on-google-android/">
+ forcibly and remotely install apps</a> through GTalkService. This is
+ not equivalent to a universal back door, but permits various dirty
tricks.</p>
<p>Although Google's <em>exercise</em> of this power has
not been
- malicious</em></ins></span> so <span
class="removed"><del><strong>gaping</strong></del></span> <span
class="inserted"><ins><em>far, the point is that nobody should have such power,
+ malicious so far, the point is that nobody should have such power,
which could also be used maliciously. You might well decide to
- let a security service remotely <em>deactivate</em>
programs</em></ins></span> that
-<span class="removed"><del><strong><a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/">
-the German government has decided</strong></del></span>
- it <span class="removed"><del><strong>can't be trusted</a>.
-</p></strong></del></span> <span class="inserted"><ins><em>considers
malicious. But there is no excuse for allowing it to
+ let a security service remotely <em>deactivate</em> programs
that
+ it considers malicious. But there is no excuse for allowing it to
<em>delete</em> the programs, and you should have the right to
decide
who (if anyone) to trust in this way.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
+<span class="removed"><del><strong><li><p>ARRIS cable
modem</strong></del></span>
- <span class="inserted"><ins><em><li id="M200808110"></em></ins></span>
- <p>The iPhone has a back door <a
-
href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+ <span class="inserted"><ins><em><li id="M200808110">
+ <p>The iPhone</em></ins></span> has a <span
class="inserted"><ins><em>back door</em></ins></span> <a <span
class="removed"><del><strong>href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
+ backdoor in the backdoor</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
that allows Apple to remotely delete apps</a> which Apple considers
- “inappropriate”. Jobs said it's <span
class="removed"><del><strong>ok</strong></del></span> <span
class="inserted"><ins><em>OK</em></ins></span> for Apple to have
- this power because of course we can trust <span
class="removed"><del><strong>Apple.
-</p></strong></del></span> <span
class="inserted"><ins><em>Apple.</p></em></ins></span>
+ “inappropriate”. Jobs said it's OK for Apple to have
+ this power because of course we can trust
Apple.</p></em></ins></span>
</li>
-
-<span class="removed"><del><strong><li></strong></del></span>
+ <span class="removed"><del><strong><li><p>Caterpillar
vehicles</strong></del></span>
<span class="inserted"><ins><em></ul>
<h3 id='universal'>Full control</h3>
<ul class="blurbs">
- <li id="M201910130.1"></em></ins></span>
- <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>Chinese Communist Party's <a
+ <li id="M202001090">
+ <p>Android phones subsidized by the US government</em></ins></span>
come with <a <span
class="removed"><del><strong>href="http://www.zerohedge.com/news/2015-11-19/caterpillar-depression-has-never-been-worse-it-has-cunning-plan-how-deal-it">a
back-door to shutoff the engine</a>
+ remotely.</p>
+ </li>
+<li><p>
+Mac OS X had an <a
href="https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/">
+intentional local</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a</em></ins></span> back door for <span
class="removed"><del><strong>4 years</a>.
+</p></li>
+
+<li><p>Users reported that <a
+
href="http://www.networkworld.com/article/2993490/windows/windows-10-upgrades-reportedly-appearing-as-mandatory-for-some-users.html#tk.rss_all">
+ Microsoft was</strong></del></span> forcing <span
class="removed"><del><strong>them to replace Windows 7 and 8 with all-spying
+ Windows 10</a>.</p>
+
+ <p>Microsoft was</strong></del></span> <span
class="inserted"><ins><em>installation of
+ apps</a>.</p>
+
+ <p>The adware is</em></ins></span> in <span
class="removed"><del><strong>fact <a
+
href="http://www.computerworld.com/article/3012278/microsoft-windows/microsoft-sets-stage-for-massive-windows-10-upgrade-strategy.html">
+ attacking computers that run Windows 7 and 8</a>, switching
on</strong></del></span> a <span class="removed"><del><strong>flag
+ that said whether to “upgrade” to Windows 10 when users
+ had turned it off.</p>
+
+ <p>Later on, Microsoft published instructions on <a
+
href="http://arstechnica.com/information-technology/2016/01/microsoft-finally-has-a-proper-way-to-opt-out-of-windows-78-to-windows-10-upgrades/">
+ how to permanently reject the downgrade to Windows 10</a>.</p>
+
+ <p>This seems to involve use</strong></del></span> <span
class="inserted"><ins><em>modified version</em></ins></span> of <span
class="removed"><del><strong>a</strong></del></span> <span
class="inserted"><ins><em>an
+ essential system configuration app. The</em></ins></span> back door <span
class="removed"><del><strong>in Windows 7 and 8.</p>
+</li>
+
+<li>
+<p>Most mobile phones have</strong></del></span> <span
class="inserted"><ins><em>is a
+ surreptitious addition to a program whose stated purpose is to
be</em></ins></span> a <span class="inserted"><ins><em><a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/"></em></ins></span>
+ universal back <span class="removed"><del><strong>door,
which</strong></del></span> <span class="inserted"><ins><em>door for
firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is
malicious</em></ins></span> has <span class="removed"><del><strong>been
used</strong></del></span>
+ <span class="inserted"><ins><em>a secret secondary malicious purpose. All
this is in addition</em></ins></span> to
+<span class="removed"><del><strong><a
href="http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html">
+turn them malicious</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>the
+ malware of Android itself.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li>
+<p><a
href="http://www.theguardian.com/technology/2014/dec/18/chinese-android-phones-coolpad-hacker-backdoor">
+A</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201910130.1">
+ <p>The</em></ins></span> Chinese <span
class="inserted"><ins><em>Communist Party's <a
href="/proprietary/proprietary-surveillance.html#M201910130">
“Study the Great Nation” app</a> was found to contain
<a
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
@@ -505,65 +497,98 @@
<p>Note: The <a
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
+ Washington Post</em></ins></span> version of <span
class="removed"><del><strong>Android has</strong></del></span> <span
class="inserted"><ins><em>the article</a> (partly obfuscated, but
+ readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>universal back door</a>. Nearly all
+models of mobile phones have</strong></del></span> <span
class="inserted"><ins><em>text editor) includes</em></ins></span> a <span
class="removed"><del><strong>universal back door in</strong></del></span> <span
class="inserted"><ins><em>clarification
+ saying that</em></ins></span> the <span class="removed"><del><strong>modem
chip. So
+why did Coolpad bother</strong></del></span> <span
class="inserted"><ins><em>tests were only performed on the Android version
+ of the app, and that, according</em></ins></span> to <span
class="removed"><del><strong>introduce another? Because this one is controlled
+by Coolpad.
+</p></strong></del></span> <span class="inserted"><ins><em>Apple,
“this kind of
‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
+ Apple's operating system.”</p></em></ins></span>
</li>
- <li id="M201908220">
+<span class="removed"><del><strong><li>
+<p>Microsoft Windows</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908220">
<p>ChromeBooks are programmed for obsolescence:
- ChromeOS</em></ins></span> has a <span
class="inserted"><ins><em>universal</em></ins></span> back door <span
class="inserted"><ins><em>that is used</em></ins></span> for
-<span class="removed"><del><strong><a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
-remote wipe</a>. It's not always enabled, but users are led into
enabling
-it without understanding.
+ ChromeOS</em></ins></span> has a universal back door <span
class="removed"><del><strong>through which</strong></del></span> <span
class="inserted"><ins><em>that is used for updates and</em></ins></span> <a
<span
class="removed"><del><strong>href="https://web.archive.org/web/20071011010707/http://informationweek.com/news/showArticle.jhtml?articleID=201806263">
+any change whatsoever can</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
+ ceases to operate at a predefined date</a>. From then on, there
+ appears to</em></ins></span> be <span class="removed"><del><strong>imposed
on</strong></del></span> <span class="inserted"><ins><em>no support whatsoever
for</em></ins></span> the <span class="removed"><del><strong>users</a>.
+</p>
+<p>More information on when
+<a href="http://slated.org/windows_by_stealth_the_updates_you_dont_want">
+this was used</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>computer.</p></em></ins></span>
+
+ <p>In <span class="removed"><del><strong>Windows
10,</strong></del></span> <span class="inserted"><ins><em>other words, when you
stop getting screwed by</em></ins></span> the <span
class="removed"><del><strong>universal back door is no longer hidden; all
+“upgrades” will
+be <a
href="http://arstechnica.com/information-technology/2015/07/windows-10-updates-to-be-automatic-and-mandatory-for-home-users/">forcibly
+and immediately imposed</a>.
</p>
</li>
<li>
- <p>Apple can,</strong></del></span> <span
class="inserted"><ins><em>updates</em></ins></span> and <span
class="removed"><del><strong>regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
- remotely extract some data from iPhones</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theregister.co.uk/2019/08/22/buying_a_chromebook_dont_forget_to_check_when_it_expires/">
- ceases to operate at a predefined date</a>. From then on, there
- appears to be no support whatsoever</em></ins></span> for the <span
class="removed"><del><strong>state</a>.
- </p>
- <p>This may</strong></del></span> <span
class="inserted"><ins><em>computer.</p>
-
- <p>In other words, when you stop getting screwed by the back door,
- you start getting screwed by the obsolescence.</p>
+<p>Windows 8's</strong></del></span> back <span
class="removed"><del><strong>doors are so gaping that
+<a
href="https://web.archive.org/web/20160310201616/http://drleonardcoldwell.com/2013/08/23/leaked-german-government-warns-key-entities-not-to-use-windows-8-linked-to-nsa/"></strong></del></span>
<span class="inserted"><ins><em>door,
+ you start getting screwed by</em></ins></span> the <span
class="removed"><del><strong>German government has decided it can't be
trusted</a>.
+</p></strong></del></span> <span
class="inserted"><ins><em>obsolescence.</p></em></ins></span>
</li>
- <li id="M201902011">
- <p>The FordPass Connect feature of some Ford vehicles has <a
-
href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
- near-complete access to the internal car network</a>. It is
constantly
- connected to the cellular phone network and sends Ford a lot of data,
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902011"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>FordPass Connect feature of some Ford
vehicles</em></ins></span> has <span class="removed"><del><strong>a back
door</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html">
+that allows Apple</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.myfordpass.com/content/ford_com/fp_app/en_us/termsprivacy.html">
+ near-complete access</em></ins></span> to <span
class="removed"><del><strong>remotely delete apps</a> which Apple
considers
+“inappropriate”. Jobs said it's ok for
Apple</strong></del></span> <span class="inserted"><ins><em>the internal car
network</a>. It is constantly
+ connected</em></ins></span> to <span class="inserted"><ins><em>the
cellular phone network and sends Ford a lot of data,
including car location. This feature operates even when the ignition
key is removed, and users report that they can't disable it.</p>
- <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>improved with</strong></del></span> <span
class="inserted"><ins><em>you succeeded in breaking the
+ <p>If you own one of these cars,</em></ins></span> have <span
class="removed"><del><strong>this power
+because</strong></del></span> <span class="inserted"><ins><em>you succeeded in
breaking the
connectivity by disconnecting the cellular modem, or wrapping the
antenna in aluminum foil?</p>
</li>
<li id="M201812300">
- <p>New GM cars</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
- iOS 8</strong></del></span>
- <span
class="inserted"><ins><em>href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
- offer the feature of a universal back door</a>.</p>
+ <p>New GM cars <a
+ href="https://media.gm.com/media/us/en/gmc/vehicles/canyon/2019.html">
+ offer the feature</em></ins></span> of <span
class="removed"><del><strong>course we can trust Apple.
+</p></strong></del></span> <span class="inserted"><ins><em>a universal
back door</a>.</p>
- <p>Every nonfree program offers the user zero</em></ins></span>
security <span class="removed"><del><strong>improvements</a>;
but</strong></del></span> <span class="inserted"><ins><em>against its
+ <p>Every nonfree program offers the user zero security against its
developer. With this malfeature, GM has explicitly made things even
- worse.</p>
+ worse.</p></em></ins></span>
</li>
- <li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
- not</strong></del></span>
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711244"></em></ins></span>
+ <p>The <span
class="removed"><del><strong>iPhone</strong></del></span> <span
class="inserted"><ins><em>Furby Connect</em></ins></span> has a <span
class="removed"><del><strong>back door for
+<a
href="http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone">
+remote wipe</a>. It's not always enabled, but users are led into
enabling
+it without understanding.
+</p>
+</li>
+
+<li>
+ <p>Apple can, and regularly does,</strong></del></span> <a <span
class="removed"><del><strong>href="http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/">
+ remotely extract some data from iPhones for</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>state</a>.
+ </p>
+ <p>This may have improved with
+ <a
href="http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html">
+ iOS 8 security improvements</a>; but
+ <a href="https://firstlook.org/theintercept/2014/09/22/apple-data/">
+ not</strong></del></span> <span
class="inserted"><ins><em>product</em></ins></span> as <span
class="removed"><del><strong>much</strong></del></span> <span
class="inserted"><ins><em>shipped doesn't act</em></ins></span> as <span
class="removed"><del><strong>Apple
claims</a>.</p></strong></del></span> <span
class="inserted"><ins><em>a
listening device, remote changes to the code could surely convert it
into one.</p></em></ins></span>
</li>
@@ -905,7 +930,7 @@
of this article.</p>
</div>
-<p>Copyright © <span
class="removed"><del><strong>2014-2017</strong></del></span> <span
class="inserted"><ins><em>2014-2019</em></ins></span> Free Software Foundation,
Inc.</p>
+<p>Copyright © <span
class="removed"><del><strong>2014-2017</strong></del></span> <span
class="inserted"><ins><em>2014-2020</em></ins></span> Free Software Foundation,
Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -916,7 +941,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary-back-doors.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ja.po,v
retrieving revision 1.110
retrieving revision 1.111
diff -u -b -r1.110 -r1.111
--- proprietary/po/proprietary-back-doors.ja.po 31 Dec 2019 01:04:21 -0000
1.110
+++ proprietary/po/proprietary-back-doors.ja.po 20 Jan 2020 19:04:01 -0000
1.111
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
"PO-Revision-Date: 2017-01-24 12:17+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -631,6 +631,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
@@ -1073,7 +1097,7 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2014-2017 Free Software Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2017 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary/po/proprietary-back-doors.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.pot,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary/po/proprietary-back-doors.pot 23 Nov 2019 15:30:43 -0000
1.77
+++ proprietary/po/proprietary-back-doors.pot 20 Jan 2020 19:04:01 -0000
1.78
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -467,6 +467,29 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a "
+"href=\"https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/\">
"
+"preinstalled adware and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a "
+"href=\"https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\">
"
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Chinese Communist Party's <a "
"href=\"/proprietary/proprietary-surveillance.html#M201910130\"> “Study "
"the Great Nation” app</a> was found to contain <a "
@@ -804,7 +827,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary/po/proprietary-back-doors.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-back-doors.ru.po,v
retrieving revision 1.198
retrieving revision 1.199
diff -u -b -r1.198 -r1.199
--- proprietary/po/proprietary-back-doors.ru.po 23 Nov 2019 16:29:02 -0000
1.198
+++ proprietary/po/proprietary-back-doors.ru.po 20 Jan 2020 19:04:01 -0000
1.199
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-back-doors.html\n"
-"POT-Creation-Date: 2019-11-23 15:25+0000\n"
+"POT-Creation-Date: 2020-01-20 18:56+0000\n"
"PO-Revision-Date: 2018-11-13 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:56+0000\n"
#. type: Content of: <title>
msgid "Proprietary Back Doors - GNU Project - Free Software Foundation"
@@ -663,6 +664,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Chinese Communist Party's <a href=\"/proprietary/proprietary-"
"surveillance.html#M201910130\"> “Study the Great Nation” app</a> "
"was found to contain <a href=\"https://www.ndtv.com/world-news/chinese-app-"
@@ -1169,7 +1194,10 @@
# type: Content of: <div><p>
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+# | Copyright © [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary/po/proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- proprietary/po/proprietary.de-diff.html 18 Dec 2019 23:01:25 -0000
1.142
+++ proprietary/po/proprietary.de-diff.html 20 Jan 2020 19:04:01 -0000
1.143
@@ -109,7 +109,7 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>January,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
@@ -154,9 +154,9 @@
<td></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
-<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
@@ -212,6 +212,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202001090">
+ <p>Android phones subsidized by the US government come with <a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a back door for forcing installation of
+ apps</a>.</p>
+
+ <p>The adware is in a modified version of an
+ essential system configuration app. The back door is a
+ surreptitious addition to a program whose stated purpose is to be a <a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ universal back door for firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is in addition to the
+ malware of Android itself.</p>
+ </li>
+
<li id="M201912170">
<p>Some security breakers (wrongly referred in this article as <a
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
@@ -303,26 +320,6 @@
approval after compilation. This amounts to a system of surveilling
the use of free programs.</p>
</li>
-
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
-
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
- </li>
</ul>
</div></em></ins></span>
@@ -374,7 +371,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -385,7 +382,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/18 23:01:25 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary/po/proprietary.de.po 18 Dec 2019 23:01:26 -0000 1.183
+++ proprietary/po/proprietary.de.po 20 Jan 2020 19:04:01 -0000 1.184
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -98,8 +98,8 @@
"übers Ohr gehauen zu werden â¦"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
# | [-functionalities,-] {+functionalities (with more than 500 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
@@ -108,7 +108,7 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -455,6 +455,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -563,31 +587,6 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
@@ -655,15 +654,15 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr "Copyright © 2013-2018 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary/po/proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.247
retrieving revision 1.248
diff -u -b -r1.247 -r1.248
--- proprietary/po/proprietary.es.po 19 Dec 2019 11:23:37 -0000 1.247
+++ proprietary/po/proprietary.es.po 20 Jan 2020 19:04:01 -0000 1.248
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -88,8 +89,17 @@
"de ser engañado."
#. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -312,6 +322,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -492,49 +526,6 @@
"la aprobación de Apple tras la compilación. Esto supone un sistema de "
"vigilancia de la utilización de programas libres."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-"La aplicación del Partido Comunista Chino <cite>Study the Great Nation</"
-"cite> requiere que los usuarios le permitan <a href=\"https://www.ndtv.com/"
-"world-news/chinese-app-allows-officials-access-to-100-million-users-phone-"
-"report-2115962\"> acceder al micrófono del teléfono, a las fotos, mensajes "
-"de texto, contactos e historial de navegación</a>, y en la versión para "
-"Android se ha descubierto una puerta trasera que permite a los "
-"desarrolladores ejecutar en el teléfono, como «supeusuarios», el código
que "
-"deseen. Descargarse y utilizar esta aplicación es obligatorio en algunos "
-"centros de trabajo."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-"Nota: La <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\">versión del artÃculo en el "
-"Washington Post</a> (en parte ocultada, pero legible si se copia y pega en "
-"un editor de texto) incluye una explicación en la que dice que las pruebas "
-"se han hecho únicamente en la versión de la aplicación para Android, y
que, "
-"según Apple, «esta clase de vigilancia como \"superusuario\" no puede "
-"llevarse a cabo en el sistema operativo de Apple»."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -582,9 +573,15 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
"Foundation, Inc."
@@ -612,6 +609,49 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "The Chinese Communist Party's “Study the Great Nation” app "
+#~ "requires users to grant it <a href=\"https://www.ndtv.com/world-news/"
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> access to the phone's microphone, photos, text "
+#~ "messages, contacts, and internet history</a>, and the Android version was "
+#~ "found to contain a back-door allowing developers to run any code they "
+#~ "wish in the users' phone, as “superusers.” Downloading and "
+#~ "using this app is mandatory at some workplaces."
+#~ msgstr ""
+#~ "La aplicación del Partido Comunista Chino <cite>Study the Great Nation</"
+#~ "cite> requiere que los usuarios le permitan <a href=\"https://www.ndtv."
+#~ "com/world-news/chinese-app-allows-officials-access-to-100-million-users-"
+#~ "phone-report-2115962\"> acceder al micrófono del teléfono, a las fotos, "
+#~ "mensajes de texto, contactos e historial de navegación</a>, y en la "
+#~ "versión para Android se ha descubierto una puerta trasera que permite a "
+#~ "los desarrolladores ejecutar en el teléfono, como «supeusuarios», el "
+#~ "código que deseen. Descargarse y utilizar esta aplicación es obligatorio
"
+#~ "en algunos centros de trabajo."
+
+#~ msgid ""
+#~ "Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> "
+#~ "Washington Post version of the article</a> (partly obfuscated, but "
+#~ "readable after copy-pasting in a text editor) includes a clarification "
+#~ "saying that the tests were only performed on the Android version of the "
+#~ "app, and that, according to Apple, “this kind of ‘"
+#~ "superuser’ surveillance could not be conducted on Apple's operating "
+#~ "system.”"
+#~ msgstr ""
+#~ "Nota: La <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">versión
"
+#~ "del artÃculo en el Washington Post</a> (en parte ocultada, pero legible "
+#~ "si se copia y pega en un editor de texto) incluye una explicación en la "
+#~ "que dice que las pruebas se han hecho únicamente en la versión de la "
+#~ "aplicación para Android, y que, según Apple, «esta clase de vigilancia "
+#~ "como \"superusuario\" no puede llevarse a cabo en el sistema operativo de "
+#~ "Apple»."
+
+#~ msgid ""
#~ "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-"
#~ "hong-kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the "
#~ "Chinese government. When the region is set to Hong Kong, this flag is not "
Index: proprietary/po/proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.295
retrieving revision 1.296
diff -u -b -r1.295 -r1.296
--- proprietary/po/proprietary.fr.po 26 Dec 2019 20:17:01 -0000 1.295
+++ proprietary/po/proprietary.fr.po 20 Jan 2020 19:04:01 -0000 1.296
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2019-12-20 23:06+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -86,8 +87,17 @@
"typiquement un moyen de mal se conduire."
#. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -308,6 +318,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -489,49 +523,6 @@
"l'approbation d'Apple après compilation. Cela équivaut à un système de "
"surveillance de l'utilisation des programmes libres."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-"L'appli du parti communiste chinois « Ãtudie la grande nation » oblige
les "
-"utilisateurs à lui <a href=\"https://www.ndtv.com/world-news/chinese-app-"
-"allows-officials-access-to-100-million-users-phone-report-2115962\">donner "
-"accès au micro du téléphone, ainsi qu'aux photos, textos, carnets
d'adresses "
-"et historique Internet</a> qui y sont stockés. De plus, la version Android "
-"s'est révélée contenir une porte dérobée permettant aux développeurs "
-"d'exécuter le code de leur choix sur le téléphone de l'utilisateur avec
des "
-"privilèges de « super-utilisateur ». Le téléchargement et
l'utilisation de "
-"cette appli sont obligatoires sur certains lieux de travail."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-"Note : la <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\">version de cet article publiée par "
-"le Washington Post</a> (partiellement cachée mais lisible après
copié-collé "
-"dans un éditeur de texte) inclut une mise au point disant que les tests ont "
-"été faits uniquement sur la version Android de l'appli et que, d'après "
-"Apple, ce genre de surveillance avec privilèges de âsuper-utilisateurâ
ne "
-"pouvait pas fonctionner sur le système d'exploitation d'Apple »."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -578,9 +569,15 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr "Copyright © 2013-2019 Free Software Foundation, Inc."
#. type: Content of: <div><p>
@@ -604,3 +601,47 @@
#. type: Content of: <div><p>
msgid "Updated:"
msgstr "Dernière mise à jour :"
+
+#~ msgid ""
+#~ "The Chinese Communist Party's “Study the Great Nation” app "
+#~ "requires users to grant it <a href=\"https://www.ndtv.com/world-news/"
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> access to the phone's microphone, photos, text "
+#~ "messages, contacts, and internet history</a>, and the Android version was "
+#~ "found to contain a back-door allowing developers to run any code they "
+#~ "wish in the users' phone, as “superusers.” Downloading and "
+#~ "using this app is mandatory at some workplaces."
+#~ msgstr ""
+#~ "L'appli du parti communiste chinois « Ãtudie la grande nation »
oblige "
+#~ "les utilisateurs à lui <a href=\"https://www.ndtv.com/world-news/chinese-"
+#~ "app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\">donner accès au micro du téléphone, ainsi qu'aux
photos, "
+#~ "textos, carnets d'adresses et historique Internet</a> qui y sont stockés.
"
+#~ "De plus, la version Android s'est révélée contenir une porte dérobée "
+#~ "permettant aux développeurs d'exécuter le code de leur choix sur le "
+#~ "téléphone de l'utilisateur avec des privilèges de «Â
super-utilisateur ». "
+#~ "Le téléchargement et l'utilisation de cette appli sont obligatoires sur "
+#~ "certains lieux de travail."
+
+#~ msgid ""
+#~ "Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> "
+#~ "Washington Post version of the article</a> (partly obfuscated, but "
+#~ "readable after copy-pasting in a text editor) includes a clarification "
+#~ "saying that the tests were only performed on the Android version of the "
+#~ "app, and that, according to Apple, “this kind of ‘"
+#~ "superuser’ surveillance could not be conducted on Apple's operating "
+#~ "system.”"
+#~ msgstr ""
+#~ "Note : la <a
href=\"http://web-old.archive.org/web/20191015005153/https://"
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">version "
+#~ "de cet article publiée par le Washington Post</a> (partiellement cachée "
+#~ "mais lisible après copié-collé dans un éditeur de texte) inclut une
mise "
+#~ "au point disant que les tests ont été faits uniquement sur la version "
+#~ "Android de l'appli et que, d'après Apple, ce genre de surveillance avec "
+#~ "privilèges de âsuper-utilisateurâ ne pouvait pas fonctionner sur le "
+#~ "système d'exploitation d'Apple »."
Index: proprietary/po/proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.154
retrieving revision 1.155
diff -u -b -r1.154 -r1.155
--- proprietary/po/proprietary.it-diff.html 18 Dec 2019 23:01:26 -0000
1.154
+++ proprietary/po/proprietary.it-diff.html 20 Jan 2020 19:04:01 -0000
1.155
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,14 +58,14 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
- text-decoration: none;
+ text-decoration: none;</em></ins></span>
}
-#TOC a { text-decoration: none; }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
#TOC a:hover { text-decoration: underline; }
-->
</style>
@@ -109,7 +109,7 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>January,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
@@ -211,6 +211,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202001090">
+ <p>Android phones subsidized by the US government come with <a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a back door for forcing installation of
+ apps</a>.</p>
+
+ <p>The adware is in a modified version of an
+ essential system configuration app. The back door is a
+ surreptitious addition to a program whose stated purpose is to be a <a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ universal back door for firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is in addition to the
+ malware of Android itself.</p>
+ </li>
+
<li id="M201912170">
<p>Some security breakers (wrongly referred in this article as <a
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
@@ -302,26 +319,6 @@
approval after compilation. This amounts to a system of surveilling
the use of free programs.</p>
</li>
-
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
-
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
- </li>
</ul>
</div></em></ins></span>
@@ -373,7 +370,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -384,7 +381,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/18 23:01:26 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.192
retrieving revision 1.193
diff -u -b -r1.192 -r1.193
--- proprietary/po/proprietary.it.po 18 Dec 2019 23:01:26 -0000 1.192
+++ proprietary/po/proprietary.it.po 20 Jan 2020 19:04:01 -0000 1.193
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -94,8 +94,8 @@
"norma. Il software proprietario moderno è tipicamente una fregatura."
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
# | [-functionalities,-] {+functionalities (with more than 500 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
@@ -104,7 +104,7 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -459,6 +459,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -567,31 +591,6 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -639,15 +638,15 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
Index: proprietary/po/proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary/po/proprietary.ja-diff.html 31 Dec 2019 01:04:21 -0000
1.158
+++ proprietary/po/proprietary.ja-diff.html 20 Jan 2020 19:04:01 -0000
1.159
@@ -56,14 +56,14 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -106,7 +106,7 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>January,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+<p>As of January, <span
class="removed"><del><strong>2017,</strong></del></span> <span
class="inserted"><ins><em>2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>260</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
@@ -153,10 +153,10 @@
</ul>
</td>
<td>
- <ul>
- <li><a
href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li>
+ <ul></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
<li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li>
<li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
@@ -209,6 +209,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202001090">
+ <p>Android phones subsidized by the US government come with <a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a back door for forcing installation of
+ apps</a>.</p>
+
+ <p>The adware is in a modified version of an
+ essential system configuration app. The back door is a
+ surreptitious addition to a program whose stated purpose is to be a <a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ universal back door for firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is in addition to the
+ malware of Android itself.</p>
+ </li>
+
<li id="M201912170">
<p>Some security breakers (wrongly referred in this article as <a
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
@@ -300,26 +317,6 @@
approval after compilation. This amounts to a system of surveilling
the use of free programs.</p>
</li>
-
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
-
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
- </li>
</ul>
</div></em></ins></span>
@@ -371,7 +368,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free
Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -382,7 +379,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary/po/proprietary.ja.po 18 Dec 2019 23:01:26 -0000 1.176
+++ proprietary/po/proprietary.ja.po 20 Jan 2020 19:04:01 -0000 1.177
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -92,7 +92,7 @@
#| "instances of malicious functionalities, but there are surely thousands "
#| "more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -320,6 +320,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -428,31 +452,6 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -500,8 +499,8 @@
#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary/po/proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.155
retrieving revision 1.156
diff -u -b -r1.155 -r1.156
--- proprietary/po/proprietary.nl-diff.html 18 Dec 2019 23:01:26 -0000
1.155
+++ proprietary/po/proprietary.nl-diff.html 20 Jan 2020 19:04:01 -0000
1.156
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -58,14 +58,14 @@
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em
5%;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
- text-decoration: none;
+ text-decoration: none;</em></ins></span>
}
-#TOC a { text-decoration: none; }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a { text-decoration: none; }
#TOC a:hover { text-decoration: underline; }
-->
</style>
@@ -109,7 +109,7 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>January,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
@@ -211,6 +211,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202001090">
+ <p>Android phones subsidized by the US government come with <a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a back door for forcing installation of
+ apps</a>.</p>
+
+ <p>The adware is in a modified version of an
+ essential system configuration app. The back door is a
+ surreptitious addition to a program whose stated purpose is to be a <a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ universal back door for firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is in addition to the
+ malware of Android itself.</p>
+ </li>
+
<li id="M201912170">
<p>Some security breakers (wrongly referred in this article as <a
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
@@ -302,26 +319,6 @@
approval after compilation. This amounts to a system of surveilling
the use of free programs.</p>
</li>
-
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
-
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
- </li>
</ul>
</div></em></ins></span>
@@ -373,7 +370,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free
Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -384,7 +381,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/18 23:01:26 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary/po/proprietary.nl.po 18 Dec 2019 23:01:26 -0000 1.166
+++ proprietary/po/proprietary.nl.po 20 Jan 2020 19:04:01 -0000 1.167
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -96,17 +96,17 @@
"je meestal belazerd."
#. type: Content of: <div><p>
-# | As of [-April,-] {+October,+} 2019, the [-files-] {+pages+} in this
-# | directory list around 400 instances of malicious [-functionalities,-]
-# | {+functionalities (with more than 500 references to back them up),+} but
-# | there are surely thousands more we don't know about.
+# | As of [-April, 2019,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around 4[-0-]{+5+}0 instances of malicious
+# | [-functionalities,-] {+functionalities (with more than 500 references to
+# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
#| msgid ""
#| "As of April, 2019, the files in this directory list around 400 instances "
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -363,6 +363,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -471,31 +495,6 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -539,15 +538,15 @@
"voor informatie over het onderhoud van vertalingen op deze website."
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary/po/proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- proprietary/po/proprietary.pl-diff.html 18 Dec 2019 23:01:26 -0000
1.172
+++ proprietary/po/proprietary.pl-diff.html 20 Jan 2020 19:04:01 -0000
1.173
@@ -27,8 +27,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
@@ -56,14 +56,14 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline;</em></ins></span> }
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -114,7 +114,7 @@
<hr class="thin" />
</div>
-<p>As of October, 2019, the pages in this directory list around 400
+<p>As of January, 2020, the pages in this directory list around 450
instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 500
references to
back them up), but there are surely thousands more we don't know
about.</p>
@@ -157,15 +157,15 @@
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
<li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li>
- <li><a
href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
- <ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <ul>
+ <li><a
href="/proprietary/malware-adobe.html">Adobe</a></li>
+ <li><a
href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -209,6 +209,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202001090">
+ <p>Android phones subsidized by the US government come with <a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a back door for forcing installation of
+ apps</a>.</p>
+
+ <p>The adware is in a modified version of an
+ essential system configuration app. The back door is a
+ surreptitious addition to a program whose stated purpose is to be a <a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ universal back door for firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is in addition to the
+ malware of Android itself.</p>
+ </li>
+
<li id="M201912170">
<p>Some security breakers (wrongly referred in this article as <a
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
@@ -300,26 +317,6 @@
approval after compilation. This amounts to a system of surveilling
the use of free programs.</p>
</li>
-
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
-
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
- </li>
</ul>
</div></em></ins></span>
@@ -371,7 +368,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019</em></ins></span> Free
Software Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, <span
class="removed"><del><strong>2015</strong></del></span> <span
class="inserted"><ins><em>2015, 2016, 2017, 2018, 2019, 2020</em></ins></span>
Free Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -382,7 +379,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/18 23:01:26 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary/po/proprietary.pl.po 18 Dec 2019 23:01:26 -0000 1.159
+++ proprietary/po/proprietary.pl.po 20 Jan 2020 19:04:01 -0000 1.160
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -135,7 +135,7 @@
#. type: Content of: <div><p>
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -540,6 +540,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -648,31 +672,6 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -720,13 +719,13 @@
"tÅumaczeÅ</a>."
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, [-2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary/po/proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.156
retrieving revision 1.157
diff -u -b -r1.156 -r1.157
--- proprietary/po/proprietary.pot 18 Dec 2019 23:01:26 -0000 1.156
+++ proprietary/po/proprietary.pot 20 Jan 2020 19:04:01 -0000 1.157
@@ -7,13 +7,13 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
"Language: \n"
"MIME-Version: 1.0\n"
-"Content-Type: text/plain; charset=CHARSET\n"
+"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
#. type: Content of: <title>
@@ -70,7 +70,7 @@
#. type: Content of: <div><p>
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -257,6 +257,29 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a "
+"href=\"https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/\">
"
+"preinstalled adware and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a "
+"href=\"https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\">
"
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a "
"href=\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“hackers”</a>)
"
"managed to interfere the Amazon Ring proprietary system, and <a "
@@ -368,29 +391,6 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a "
-"href=\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962\">
"
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a "
-"back-door allowing developers to run any code they wish in the users' phone, "
-"as “superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a "
-"href=\"http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\">
"
-"Washington Post version of the article</a> (partly obfuscated, but readable "
-"after copy-pasting in a text editor) includes a clarification saying that "
-"the tests were only performed on the Android version of the app, and that, "
-"according to Apple, “this kind of ‘superuser’ surveillance "
-"could not be conducted on Apple's operating system.”"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -428,8 +428,8 @@
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
#. type: Content of: <div><p>
Index: proprietary/po/proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.261
retrieving revision 1.262
diff -u -b -r1.261 -r1.262
--- proprietary/po/proprietary.pt-br.po 20 Dec 2019 14:59:21 -0000 1.261
+++ proprietary/po/proprietary.pt-br.po 20 Jan 2020 19:04:01 -0000 1.262
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2019-12-20 11:27-0200\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -84,8 +85,13 @@
"de ser mal."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -305,6 +311,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -482,48 +512,6 @@
"aprovação da Apple após a compilação. Isso equivale a um sistema de "
"monitoramento do uso de programas livres."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-"O aplicativo âStudy the Great Nationâ do Partido Comunista Chinês exige
que "
-"os usuários o concedam <a
href=\"https://www.ndtv.com/world-news/chinese-app-"
-"allows-officials-access-to-100-million-users-phone-report-2115962\"> acesso "
-"ao microfone, fotos, mensagens de texto, contatos e histórico da Internet do
"
-"telefone</a>, e a versão Android contém uma <i lang=\"en\">back door</i>
que "
-"permite que os desenvolvedores executem qualquer código que desejarem desejo
"
-"no telefone dos usuários, como âsuperusuáriosâ. Baixar e usar este "
-"aplicativo é obrigatório em alguns locais de trabalho."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-"Nota: A <a href=\"http://web-old.archive.org/web/20191015005153/https://www."
-"washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> versão de artigo do Washington "
-"Post</a> (parcialmente ofuscada, mas legÃvel após copiar e colar em um "
-"editor de texto) inclui um esclarecimento dizendo que os testes foram "
-"realizados apenas na versão Android do aplicativo e que, segundo a Apple, "
-"âesse tipo de vigilância de âsuperusuárioâ não pôde ser realizado
em Sistema "
-"operacional da Appleâ."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -569,9 +557,13 @@
"envio de traduções das páginas desse site."
#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
"Foundation, Inc."
@@ -599,6 +591,48 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "The Chinese Communist Party's “Study the Great Nation” app "
+#~ "requires users to grant it <a href=\"https://www.ndtv.com/world-news/"
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> access to the phone's microphone, photos, text "
+#~ "messages, contacts, and internet history</a>, and the Android version was "
+#~ "found to contain a back-door allowing developers to run any code they "
+#~ "wish in the users' phone, as “superusers.” Downloading and "
+#~ "using this app is mandatory at some workplaces."
+#~ msgstr ""
+#~ "O aplicativo âStudy the Great Nationâ do Partido Comunista Chinês
exige "
+#~ "que os usuários o concedam <a href=\"https://www.ndtv.com/world-news/"
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> acesso ao microfone, fotos, mensagens de texto, "
+#~ "contatos e histórico da Internet do telefone</a>, e a versão Android "
+#~ "contém uma <i lang=\"en\">back door</i> que permite que os "
+#~ "desenvolvedores executem qualquer código que desejarem desejo no telefone
"
+#~ "dos usuários, como âsuperusuáriosâ. Baixar e usar este aplicativo é
"
+#~ "obrigatório em alguns locais de trabalho."
+
+#~ msgid ""
+#~ "Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> "
+#~ "Washington Post version of the article</a> (partly obfuscated, but "
+#~ "readable after copy-pasting in a text editor) includes a clarification "
+#~ "saying that the tests were only performed on the Android version of the "
+#~ "app, and that, according to Apple, “this kind of ‘"
+#~ "superuser’ surveillance could not be conducted on Apple's operating "
+#~ "system.”"
+#~ msgstr ""
+#~ "Nota: A <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> versão
"
+#~ "de artigo do Washington Post</a> (parcialmente ofuscada, mas legÃvel
após "
+#~ "copiar e colar em um editor de texto) inclui um esclarecimento dizendo "
+#~ "que os testes foram realizados apenas na versão Android do aplicativo e "
+#~ "que, segundo a Apple, âesse tipo de vigilância de âsuperusuárioâ
não pôde "
+#~ "ser realizado em Sistema operacional da Appleâ."
+
+#~ msgid ""
#~ "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-"
#~ "hong-kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the "
#~ "Chinese government. When the region is set to Hong Kong, this flag is not "
Index: proprietary/po/proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.328
retrieving revision 1.329
diff -u -b -r1.328 -r1.329
--- proprietary/po/proprietary.ru.po 19 Dec 2019 06:59:30 -0000 1.328
+++ proprietary/po/proprietary.ru.po 20 Jan 2020 19:04:01 -0000 1.329
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-01-20 18:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -88,8 +89,17 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -311,6 +321,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -488,49 +522,6 @@
"одобÑение Apple поÑле компилÑÑии. ÐÑо
вÑлÑеÑÑÑ Ð² ÑиÑÑÐµÐ¼Ñ Ð½Ð°Ð´Ð·Ð¾Ñа за "
"полÑзованием ÑвободнÑми пÑогÑаммами."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-"ÐÑиложение ÐиÑайÑкой коммÑниÑÑиÑеÑкой
паÑÑии “ÐзÑÑай великÑÑ "
-"наÑиє ÑÑебÑеÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели
пÑедоÑÑавлÑли ÐµÐ¼Ñ <a href=\"https://"
-"www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-"
-"users-phone-report-2115962\"> в ÑелеÑоне доÑÑÑп к
микÑоÑонÑ, ÑоÑогÑаÑиÑм, "
-"ÑекÑÑовÑм ÑообÑениÑм, адÑеÑной книге, а
Ñакже иÑÑоÑии ÑеÑевÑÑ
"
-"взаимодейÑÑвий</a>, а в веÑÑии под Android
обнаÑÑжилаÑÑ Ð»Ð°Ð·ÐµÐ¹ÐºÐ°, позволÑÑÑÐ°Ñ "
-"ÑазÑабоÑÑикам вÑполнÑÑÑ ÐºÐ°ÐºÐ¸Ðµ Ñгодно
ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² ÑелеÑоне полÑзоваÑелÑ, Ñ "
-"пÑивилегиÑми “ÑвеÑÑ
полÑзоваÑелей”.
РнекоÑоÑÑÑ
ÑÑÑеждениÑÑ
"
-"ÑÑÑановка и полÑзование ÑÑим пÑиложением
обÑзаÑелÑно."
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-"ÐамеÑание: <a
href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> в ÑедакÑии ÑÑой
ÑÑаÑÑи из “"
-"ÐаÑингÑон поÑÑ”</a> (ÑÑение напÑÑмÑÑ
заÑÑÑднено, но возможно поÑле "
-"копиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ вÑÑавки в ÑекÑÑовом
ÑедакÑоÑе) пÑиÑÑÑÑÑвÑÐµÑ ÑазÑÑÑнение, где "
-"Ñказано, ÑÑо ÑеÑÑÑ Ð¿ÑоводилиÑÑ ÑолÑко на
веÑÑии пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ Android и "
-"ÑÑо, ÑоглаÑно Apple, “ÑÑого Ñода ‘ÑвеÑÑ
полÑзоваÑелÑÑкађ "
-"Ñлежка не могла Ð±Ñ Ð±ÑÑÑ Ð²Ð²ÐµÐ´ÐµÐ½Ð° на
опеÑаÑионной ÑиÑÑеме Apple”."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -576,9 +567,15 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
"Foundation, Inc."
@@ -609,6 +606,50 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The Chinese Communist Party's “Study the Great Nation” app "
+#~ "requires users to grant it <a href=\"https://www.ndtv.com/world-news/"
+#~ "chinese-app-allows-officials-access-to-100-million-users-phone-"
+#~ "report-2115962\"> access to the phone's microphone, photos, text "
+#~ "messages, contacts, and internet history</a>, and the Android version was "
+#~ "found to contain a back-door allowing developers to run any code they "
+#~ "wish in the users' phone, as “superusers.” Downloading and "
+#~ "using this app is mandatory at some workplaces."
+#~ msgstr ""
+#~ "ÐÑиложение ÐиÑайÑкой коммÑниÑÑиÑеÑкой
паÑÑии “ÐзÑÑай великÑÑ "
+#~ "наÑиє ÑÑебÑеÑ, ÑÑÐ¾Ð±Ñ Ð¿Ð¾Ð»ÑзоваÑели
пÑедоÑÑавлÑли ÐµÐ¼Ñ <a href="
+#~ "\"https://www.ndtv.com/world-news/chinese-app-allows-officials-access-"
+#~ "to-100-million-users-phone-report-2115962\"> в ÑелеÑоне
доÑÑÑп к "
+#~ "микÑоÑонÑ, ÑоÑогÑаÑиÑм, ÑекÑÑовÑм
ÑообÑениÑм, адÑеÑной книге, а Ñакже "
+#~ "иÑÑоÑии ÑеÑевÑÑ
взаимодейÑÑвий</a>, а в
веÑÑии под Android обнаÑÑжилаÑÑ "
+#~ "лазейка, позволÑÑÑÐ°Ñ ÑазÑабоÑÑикам
вÑполнÑÑÑ ÐºÐ°ÐºÐ¸Ðµ Ñгодно ÐºÐ¾Ð¼Ð°Ð½Ð´Ñ Ð² "
+#~ "ÑелеÑоне полÑзоваÑелÑ, Ñ Ð¿ÑивилегиÑми
“ÑвеÑÑ
полÑзоваÑелей”. Ð "
+#~ "некоÑоÑÑÑ
ÑÑÑеждениÑÑ
ÑÑÑановка и
полÑзование ÑÑим пÑиложением "
+#~ "обÑзаÑелÑно."
+
+#~ msgid ""
+#~ "Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
+#~ "www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-"
+#~ "allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> "
+#~ "Washington Post version of the article</a> (partly obfuscated, but "
+#~ "readable after copy-pasting in a text editor) includes a clarification "
+#~ "saying that the tests were only performed on the Android version of the "
+#~ "app, and that, according to Apple, “this kind of ‘"
+#~ "superuser’ surveillance could not be conducted on Apple's operating "
+#~ "system.”"
+#~ msgstr ""
+#~ "ÐамеÑание: <a
href=\"http://web-old.archive.org/web/20191015005153/"
+#~ "https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-"
+#~ "ideology-allows-data-access-to-100-million-users-phones-report-"
+#~ "says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html\"> в "
+#~ "ÑедакÑии ÑÑой ÑÑаÑÑи из “ÐаÑингÑон
поÑÑ”</a> (ÑÑение напÑÑмÑÑ "
+#~ "заÑÑÑднено, но возможно поÑле
копиÑÐ¾Ð²Ð°Ð½Ð¸Ñ Ð¸ вÑÑавки в ÑекÑÑовом "
+#~ "ÑедакÑоÑе) пÑиÑÑÑÑÑвÑÐµÑ ÑазÑÑÑнение,
где Ñказано, ÑÑо ÑеÑÑÑ Ð¿ÑоводилиÑÑ "
+#~ "ÑолÑко на веÑÑии пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð´ Android и
ÑÑо, ÑоглаÑно Apple, “"
+#~ "ÑÑого Ñода ‘ÑвеÑÑ
полÑзоваÑелÑÑкађ Ñлежка не могла бÑ
бÑÑÑ "
+#~ "введена на опеÑаÑионной ÑиÑÑеме Apple”."
+
+#~ msgid ""
#~ "Apple <a href=\"https://boingboing.net/2019/10/07/apple-ios-13-1-2-for-"
#~ "hong-kong.html\"> censors the Taiwan flag in iOS</a> on behalf of the "
#~ "Chinese government. When the region is set to Hong Kong, this flag is not "
Index: proprietary/po/proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.134
retrieving revision 1.135
diff -u -b -r1.134 -r1.135
--- proprietary/po/proprietary.zh-tw-diff.html 18 Dec 2019 23:01:26 -0000
1.134
+++ proprietary/po/proprietary.zh-tw-diff.html 20 Jan 2020 19:04:01 -0000
1.135
@@ -109,7 +109,7 @@
<span class="inserted"><ins><em><hr class="thin" />
</div></em></ins></span>
-<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>October,
2019,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>400</em></ins></span>
+<p>As of <span class="removed"><del><strong>April,
2017,</strong></del></span> <span class="inserted"><ins><em>January,
2020,</em></ins></span> the <span
class="removed"><del><strong>files</strong></del></span> <span
class="inserted"><ins><em>pages</em></ins></span> in this directory list around
<span class="removed"><del><strong>300</strong></del></span> <span
class="inserted"><ins><em>450</em></ins></span>
instances of malicious <span
class="removed"><del><strong>functionalities,</strong></del></span> <span
class="inserted"><ins><em>functionalities (with more than 500 references to
back them up),</em></ins></span> but there are surely thousands more we don't
know about.</p>
@@ -154,9 +154,9 @@
<td></em></ins></span>
<ul>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li>
-<li><a
href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li>
+<li><a
href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
@@ -212,6 +212,23 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M202001090">
+ <p>Android phones subsidized by the US government come with <a
+
href="https://arstechnica.com/information-technology/2020/01/us-government-funded-android-phones-come-preinstalled-with-unremovable-malware/">
+ preinstalled adware and a back door for forcing installation of
+ apps</a>.</p>
+
+ <p>The adware is in a modified version of an
+ essential system configuration app. The back door is a
+ surreptitious addition to a program whose stated purpose is to be a <a
+
href="https://www.zdnet.com/article/unremovable-malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/">
+ universal back door for firmware</a>.</p>
+
+ <p>In other words, a program whose raison d'être is malicious has
+ a secret secondary malicious purpose. All this is in addition to the
+ malware of Android itself.</p>
+ </li>
+
<li id="M201912170">
<p>Some security breakers (wrongly referred in this article as <a
href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
@@ -303,26 +320,6 @@
approval after compilation. This amounts to a system of surveilling
the use of free programs.</p>
</li>
-
- <li id="M201910130">
- <p>The Chinese Communist Party's “Study
- the Great Nation” app requires users to grant it <a
-
href="https://www.ndtv.com/world-news/chinese-app-allows-officials-access-to-100-million-users-phone-report-2115962">
- access to the phone's microphone, photos, text messages, contacts, and
- internet history</a>, and the Android version was found to contain a
- back-door allowing developers to run any code they wish in the users'
- phone, as “superusers.” Downloading and using this
- app is mandatory at some workplaces.</p>
-
- <p>Note: The <a
-
href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of the article</a> (partly obfuscated, but
- readable after copy-pasting in a text editor) includes a clarification
- saying that the tests were only performed on the Android version
- of the app, and that, according to Apple, “this kind of
- ‘superuser’ surveillance could not be conducted on
- Apple's operating system.”</p>
- </li>
</ul>
</div></em></ins></span>
@@ -374,7 +371,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2014, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -385,7 +382,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/18 23:01:26 $
+$Date: 2020/01/20 19:04:01 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary/po/proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.144
retrieving revision 1.145
diff -u -b -r1.144 -r1.145
--- proprietary/po/proprietary.zh-tw.po 18 Dec 2019 23:01:26 -0000 1.144
+++ proprietary/po/proprietary.zh-tw.po 20 Jan 2020 19:04:01 -0000 1.145
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-01-20 18:55+0000\n"
"PO-Revision-Date: 2018-03-27 16:48+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -89,8 +89,8 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
# | [-functionalities,-] {+functionalities (with more than 500 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
@@ -99,7 +99,7 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -433,6 +433,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Some security breakers (wrongly referred in this article as <a href="
"\"https://www.gnu.org/philosophy/words-to-avoid.html#Hacker\">“"
"hackers”</a>) managed to interfere the Amazon Ring proprietary "
@@ -541,31 +565,6 @@
"programs."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The Chinese Communist Party's “Study the Great Nation” app "
-"requires users to grant it <a href=\"https://www.ndtv.com/world-news/chinese-"
-"app-allows-officials-access-to-100-million-users-phone-report-2115962\"> "
-"access to the phone's microphone, photos, text messages, contacts, and "
-"internet history</a>, and the Android version was found to contain a back-"
-"door allowing developers to run any code they wish in the users' phone, as "
-"“superusers.” Downloading and using this app is mandatory at "
-"some workplaces."
-msgstr ""
-
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"Note: The <a href=\"http://web-old.archive.org/web/20191015005153/https://"
-"www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-"
-"data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-"
-"eb4d-11e9-bafb-da248f8d5734_story.html\"> Washington Post version of the "
-"article</a> (partly obfuscated, but readable after copy-pasting in a text "
-"editor) includes a clarification saying that the tests were only performed "
-"on the Android version of the app, and that, according to Apple, “this "
-"kind of ‘superuser’ surveillance could not be conducted on "
-"Apple's operating system.”"
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -608,15 +607,15 @@
"å®ã"
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
Index: proprietary/po/pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.214
retrieving revision 1.215
diff -u -b -r1.214 -r1.215
--- proprietary/po/pt-br.po 27 Dec 2019 10:34:04 -0000 1.214
+++ proprietary/po/pt-br.po 20 Jan 2020 19:04:01 -0000 1.215
@@ -5239,6 +5239,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -6495,6 +6519,18 @@
"such as Carrier IQ</a>."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -7352,7 +7388,7 @@
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
@@ -8164,16 +8200,16 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "As of April, 2019, the pages in this directory list around 400 instances "
-#| "of malicious functionalities (with more than 450 references to back them "
-#| "up), but there are surely thousands more we don't know about."
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
-"Até abril de 2019, as páginas neste diretório listam quase 400 exemplos de
"
-"funcionalidades maliciosas (com mais de 450 referências para confirmá-las),
"
+"Até outubro de 2019, as páginas neste diretório listam quase 400 exemplos
de "
+"funcionalidades maliciosas (com mais de 500 referências para confirmá-las),
"
"mas com certeza há mais milhares das quais nós não temos conhecimento."
#. type: Content of: <div><table><tr><th>
@@ -8396,13 +8432,13 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
"Foundation, Inc."
#. type: Content of: <title>
@@ -9674,6 +9710,32 @@
msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft</a>"
#, fuzzy
+#~| msgid ""
+#~| "As of April, 2019, the pages in this directory list around 400 instances "
+#~| "of malicious functionalities (with more than 450 references to back them "
+#~| "up), but there are surely thousands more we don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Até abril de 2019, as páginas neste diretório listam quase 400 exemplos
"
+#~ "de funcionalidades maliciosas (com mais de 450 referências para
confirmá-"
+#~ "las), mas com certeza há mais milhares das quais nós não temos "
+#~ "conhecimento."
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
#~| msgid "<a href=\"/proprietary/potential-malware.html\">In the pipe</a>"
#~ msgid ""
#~ "<a href=\"/proprietary/proprietary.html\">Other examples of proprietary "
Index: proprietary/po/ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.362
retrieving revision 1.363
diff -u -b -r1.362 -r1.363
--- proprietary/po/ru.po 27 Dec 2019 11:31:23 -0000 1.362
+++ proprietary/po/ru.po 20 Jan 2020 19:04:01 -0000 1.363
@@ -6419,6 +6419,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -8029,6 +8053,21 @@
"features/logs-and-services/loggers/carrieriq/\"> ÑкÑÑÑÑй пакеÑ
Ñлежки, Ñакой "
"как Carrier IQ</a>."
+# type: Content of: <div><p>
+#. type: Content of: <div><p>
+# | Copyright © 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
msgid "Malware in Webpages - GNU Project - Free Software Foundation"
msgstr ""
@@ -8971,8 +9010,12 @@
"deeplinks/2015/02/who-really-owns-your-drones\">пÑимеÑÑ
пÑÐ¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð»Ð°Ð·ÐµÐµÐº</"
"a>."
+# type: Content of: <div><p>
#. type: Content of: <div><p>
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+# | Copyright © [-2014-2019-] {+2014-2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -9935,8 +9978,17 @@
"ÑпоÑоб даÑÑ ÑÐµÐ±Ñ Ð¾Ð´ÑÑаÑиÑÑ."
#. type: Content of: <div><p>
+# | As of [-October, 2019,-] {+January, 2020,+} the pages in this directory
+# | list around 4[-0-]{+5+}0 instances of malicious functionalities (with more
+# | than 500 references to back them up), but there are surely thousands more
+# | we don't know about.
+#, fuzzy
+#| msgid ""
+#| "As of October, 2019, the pages in this directory list around 400 "
+#| "instances of malicious functionalities (with more than 500 references to "
+#| "back them up), but there are surely thousands more we don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -10157,9 +10209,15 @@
msgstr "ÐоÑледние добавлениÑ"
#. type: Content of: <div><p>
+# | Copyright © 2013, 2014, 2015, 2016, 2017, 2018, [-2019-] {+2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
"Foundation, Inc."
@@ -11548,6 +11606,25 @@
msgstr ""
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
+#~ msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+#~ msgstr "Copyright © 2014-2019 Free Software Foundation, Inc."
+
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "Ðа окÑÑбÑÑ 2019 года на ÑÑÑаниÑаÑ
ÑÑого
каÑалога пеÑеÑиÑлено около "
+#~ "400 пÑимеÑов вÑедоноÑнÑÑ
ÑÑнкÑий (и более
500 ÑÑÑлок, подкÑеплÑÑÑиÑ
иÑ
), "
+#~ "но еÑÑÑ, беÑÑпоÑно, ÑÑÑÑÑи дÑÑгиÑ
, о
коÑоÑÑÑ
Ð¼Ñ Ð½Ðµ знаем."
+
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+
#~ msgid ""
#~ "One kind of malicious functionality mediates developer's interference "
#~ "into the use of the software. This page describes how various proprietary "
Index: proprietary/po/zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary/po/zh-tw.po 27 Dec 2019 10:34:04 -0000 1.165
+++ proprietary/po/zh-tw.po 20 Jan 2020 19:04:02 -0000 1.166
@@ -4571,6 +4571,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Android phones subsidized by the US government come with <a href=\"https://"
+"arstechnica.com/information-technology/2020/01/us-government-funded-android-"
+"phones-come-preinstalled-with-unremovable-malware/\"> preinstalled adware "
+"and a back door for forcing installation of apps</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The adware is in a modified version of an essential system configuration "
+"app. The back door is a surreptitious addition to a program whose stated "
+"purpose is to be a <a href=\"https://www.zdnet.com/article/unremovable-"
+"malware-found-preinstalled-on-low-end-smartphone-sold-in-the-us/\"> "
+"universal back door for firmware</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"In other words, a program whose raison d'être is malicious has a secret "
+"secondary malicious purpose. All this is in addition to the malware of "
+"Android itself."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A very popular app found in the Google Play store contained a module that "
"was designed to <a href=\"https://arstechnica.com/information-"
"technology/2019/08/google-play-app-with-100-million-downloads-executed-"
@@ -5619,6 +5643,20 @@
"such as Carrier IQ</a>."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013,-] 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid ""
+"Copyright © 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
+"Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
# | [-Proprietary Software-]{+Malware in Webpages+} - GNU Project - Free
# | Software Foundation
@@ -6329,13 +6367,13 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2014-2019+} Free
+# | Copyright © [-2013, 2014, 2015, 2016, 2017, 2018-] {+2014-2020+} Free
# | Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
-msgid "Copyright © 2014-2019 Free Software Foundation, Inc."
+msgid "Copyright © 2014-2020 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
@@ -7152,8 +7190,8 @@
"æ¹å¼çºå°æè»é«ã"
#. type: Content of: <div><p>
-# | As of [-April, 2017,-] {+October, 2019,+} the [-files-] {+pages+} in this
-# | directory list around [-3-]{+4+}00 instances of malicious
+# | As of [-April, 2017,-] {+January, 2020,+} the [-files-] {+pages+} in this
+# | directory list around [-300-] {+450+} instances of malicious
# | [-functionalities,-] {+functionalities (with more than 500 references to
# | back them up),+} but there are surely thousands more we don't know about.
#, fuzzy
@@ -7162,7 +7200,7 @@
#| "of malicious functionalities, but there are surely thousands more we "
#| "don't know about."
msgid ""
-"As of October, 2019, the pages in this directory list around 400 instances "
+"As of January, 2020, the pages in this directory list around 450 instances "
"of malicious functionalities (with more than 500 references to back them "
"up), but there are surely thousands more we don't know about."
msgstr ""
@@ -7495,15 +7533,15 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, 2014, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019, 2020 Free "
+"Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
@@ -8835,6 +8873,30 @@
#, fuzzy
#~| msgid ""
+#~| "As of April, 2017, the files in this directory list around 300 instances "
+#~| "of malicious functionalities, but there are surely thousands more we "
+#~| "don't know about."
+#~ msgid ""
+#~ "As of October, 2019, the pages in this directory list around 400 "
+#~ "instances of malicious functionalities (with more than 500 references to "
+#~ "back them up), but there are surely thousands more we don't know about."
+#~ msgstr ""
+#~ "å°2017å¹´4æçºæ¢ï¼æ¤ç®éååºçæªæ¡å·²æ´çåºç´ 300
種æ¡æåè½ç實ä¾ï¼ä½æ¯çµå°"
+#~ "éæä¸å種æåä¸ç解çå©ç¨æ¹å¼ã"
+
+#, fuzzy
+#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "<a href=\"/proprietary/proprietary-drm.html\">Digital restrictions "
#~| "management</a> or “DRM” means functionalities designed to "
#~| "restrict what users can do with the data in their computers."
- www philosophy/po/free-software-even-more-impor...,
GNUN <=