[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Mon, 24 Feb 2020 12:03:39 -0500 (EST) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/02/24 12:03:38
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.es.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po nl.po pl.po pot
proprietary-insecurity.de-diff.html
proprietary-insecurity.de.po
proprietary-insecurity.es.po
proprietary-insecurity.fr.po
proprietary-insecurity.it-diff.html
proprietary-insecurity.it.po
proprietary-insecurity.ja-diff.html
proprietary-insecurity.ja.po
proprietary-insecurity.pot
proprietary-insecurity.ru.po
proprietary-surveillance.de-diff.html
proprietary-surveillance.de.po
proprietary-surveillance.es.po
proprietary-surveillance.fr.po
proprietary-surveillance.it-diff.html
proprietary-surveillance.it.po
proprietary-surveillance.ja-diff.html
proprietary-surveillance.ja.po
proprietary-surveillance.pot
proprietary-surveillance.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.245&r2=1.246
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.302&r2=1.303
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.181&r2=1.182
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.51&r2=1.52
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.85&r2=1.86
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.142&r2=1.143
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.173&r2=1.174
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.172&r2=1.173
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de-diff.html?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.de.po?cvsroot=www&r1=1.140&r2=1.141
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.es.po?cvsroot=www&r1=1.27&r2=1.28
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.fr.po?cvsroot=www&r1=1.188&r2=1.189
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it-diff.html?cvsroot=www&r1=1.52&r2=1.53
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.it.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja-diff.html?cvsroot=www&r1=1.72&r2=1.73
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ja.po?cvsroot=www&r1=1.130&r2=1.131
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.pot?cvsroot=www&r1=1.96&r2=1.97
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-insecurity.ru.po?cvsroot=www&r1=1.239&r2=1.240
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de-diff.html?cvsroot=www&r1=1.107&r2=1.108
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.de.po?cvsroot=www&r1=1.322&r2=1.323
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.es.po?cvsroot=www&r1=1.28&r2=1.29
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.fr.po?cvsroot=www&r1=1.496&r2=1.497
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it-diff.html?cvsroot=www&r1=1.174&r2=1.175
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.it.po?cvsroot=www&r1=1.335&r2=1.336
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja-diff.html?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ja.po?cvsroot=www&r1=1.317&r2=1.318
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.pot?cvsroot=www&r1=1.256&r2=1.257
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-surveillance.ru.po?cvsroot=www&r1=1.589&r2=1.590
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.255&r2=1.256
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.303&r2=1.304
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.158&r2=1.159
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.196&r2=1.197
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.162&r2=1.163
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.180&r2=1.181
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.159&r2=1.160
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.176&r2=1.177
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.163&r2=1.164
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.160&r2=1.161
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.273&r2=1.274
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.336&r2=1.337
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.139&r2=1.140
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.150&r2=1.151
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.227&r2=1.228
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.381&r2=1.382
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.173&r2=1.174
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- de.po 21 Feb 2020 23:32:16 -0000 1.173
+++ de.po 24 Feb 2020 17:03:36 -0000 1.174
@@ -2570,6 +2570,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -4457,12 +4474,13 @@
"sind Tyrannen</a>."
#. type: Content of: <div><p>
-# | Copyright © 2016, 2017, [-2018-] {+2018, 2019+} Free Software
+# | Copyright © 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free Software
# | Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2018 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -5584,15 +5602,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free Software
-# | Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2018 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
msgstr ""
@@ -11426,16 +11435,16 @@
"niemals vertrauen kann."
#. type: Content of: <div><p>
-# | Copyright © 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright © 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
-msgstr "Copyright © <ins>2013-</ins>2018 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2018 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Proprietary Interference - GNU Project - Free Software Foundation"
@@ -12385,18 +12394,6 @@
"computerworld.com 2013.\">bestand Oracle darauf, diese Praxis fortzusetzen</"
"a>."
-#. type: Content of: <div><p>
-# | Copyright © 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2018 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
msgstr "Proprietäre Abonnements - GNU-Projekt - Free Software Foundation"
@@ -12455,6 +12452,14 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © 2016, 2017, [-2018-] {+2018, 2019+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr "Proprietäre Ãberwachung - GNU-Projekt - Free Software Foundation"
@@ -13942,6 +13947,16 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © <ins>2013-</ins>2018 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "<a href=\"http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-"
#~| "bootloader.html\"> Some Android phones made by Google are tyrants</a> "
#~| "(though someone found a way to crack the restriction). Fortunately, "
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.245
retrieving revision 1.246
diff -u -b -r1.245 -r1.246
--- es.po 21 Feb 2020 23:32:16 -0000 1.245
+++ es.po 24 Feb 2020 17:03:36 -0000 1.246
@@ -2442,6 +2442,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -3989,13 +4006,14 @@
"Achievements\">son tiranos</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2015,-] 2016, 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright © 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
#, fuzzy
#| msgid ""
-#| "Copyright © 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright © 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+#| "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
#. type: Content of: <title>
# | Malware [-in Mobile Devices-] {+In Cars+} - GNU Project - Free Software
@@ -5261,16 +5279,6 @@
"buena parte de los datos personales</a>, incluso muchas actividades que no "
"tienen nada que ver con las trampas."
-#. type: Content of: <div><p>
-# | Copyright © 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
-# | Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
# | Foundation
@@ -11246,17 +11254,18 @@
"en el software privativo."
#. type: Content of: <div><p>
-# | Copyright © 201[-4-]{+3+}, 2015, 2016, 2017, [-2018-] {+2018, 2019+}
+# | Copyright © 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
# | Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
-#| "Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
-#| "Inc."
+#| "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
-"Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Foundation, Inc."
#. type: Content of: <title>
# | Proprietary [-Software-] {+Interference+} - GNU Project - Free Software
@@ -12105,20 +12114,6 @@
"continue-to-bundle--crapware--with-java.html\">Oracle insistió en continuar "
"con esta práctica</a>."
-#. type: Content of: <div><p>
-# | Copyright © 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-
#. type: Content of: <title>
# | Proprietary [-Tyrants-] {+Subscriptions+} - GNU Project - Free Software
# | Foundation
@@ -12188,6 +12183,15 @@
"Aquà se presentan ejemplos de suscripciones de software que causan un daño "
"directo a los usuarios."
+#. type: Content of: <div><p>
+# | Copyright © [-2015,-] 2016, 2017, [-2018-] {+2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Tyrants-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
@@ -13668,6 +13672,17 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "Google tracks the movements of Android phones, and sometimes <a href="
#~| "\"https://www.nytimes.com/interactive/2019/04/13/us/google-location-"
#~| "tracking-police.html\"> saves the data for years</a>."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.302
retrieving revision 1.303
diff -u -b -r1.302 -r1.303
--- fr.po 24 Feb 2020 13:52:39 -0000 1.302
+++ fr.po 24 Feb 2020 17:03:36 -0000 1.303
@@ -2125,6 +2125,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -3589,8 +3606,9 @@
"des tyrans</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -4676,11 +4694,6 @@
"grand nombre correspondent à des activités n'ayant rien à voir avec la "
"triche."
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
msgstr ""
@@ -9857,9 +9870,9 @@
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2020 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Proprietary Interference - GNU Project - Free Software Foundation"
@@ -10569,12 +10582,6 @@
"continue-to-bundle--crapware--with-java.html\">Oracle a perpétué cette "
"pratique</a>."
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2020 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
msgstr "Abonnements privateurs - Projet GNU - Free Software Foundation"
@@ -10615,6 +10622,10 @@
"Vous trouverez ci-dessous des exemples d'abonnements à des logiciels qui ont
"
"fait du tort directement aux utilisateurs."
+#. type: Content of: <div><p>
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2019 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr "Surveillants privateurs - GNU Project - Free Software Foundation"
@@ -11798,3 +11809,8 @@
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
msgstr ""
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
+
+#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2015-2019 Free Software Foundation, Inc."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- it.po 21 Feb 2020 23:32:16 -0000 1.173
+++ it.po 24 Feb 2020 17:03:36 -0000 1.174
@@ -2512,6 +2512,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -4206,12 +4223,13 @@
"\">sono tiranni</a>."
#. type: Content of: <div><p>
-# | Copyright © [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright © [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -5270,16 +5288,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | [-Amazon's-]{+Google's+} Software Is Malware - GNU Project - Free Software
# | Foundation
@@ -10733,15 +10741,17 @@
"si possa fidare della sicurezza del software non libero."
#. type: Content of: <div><p>
-# | Copyright © 201[-4-]{+3+}, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 201[-4-]{+3+}, 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
-#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+#| "Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
+#| "Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
-msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
#. type: Content of: <title>
# | Proprietary [-Surveillance-] {+Interference+} - GNU Project - Free
@@ -11661,19 +11671,6 @@
"vulnerabilities/oracle-will-continue-to-bundle--crapware--with-java.html"
"\">ha continuato a perpetrare questa pratica.</a>"
-#. type: Content of: <div><p>
-# | Copyright © 201[-4-]{+3+}, 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright © 2014, 2015, 2016, 2017, 2018 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | Proprietary [-Insecurity-] {+Subscriptions+} - GNU Project - Free Software
# | Foundation
@@ -11721,6 +11718,15 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr "Sorveglianza proprietaria - Progetto GNU - Free Software Foundation"
@@ -13218,6 +13224,15 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "<a href=\"http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-"
#~| "bootloader.html\"> Some Android phones are tyrants</a> (though someone "
#~| "found a way to crack the restriction). Fortunately, most Android "
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.181
retrieving revision 1.182
diff -u -b -r1.181 -r1.182
--- ja.po 21 Feb 2020 23:32:16 -0000 1.181
+++ ja.po 24 Feb 2020 17:03:36 -0000 1.182
@@ -1917,6 +1917,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -3153,7 +3170,8 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -4035,13 +4053,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
-
#. type: Content of: <title>
#, fuzzy
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
@@ -8319,7 +8330,7 @@
#| msgid ""
#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
@@ -9029,15 +9040,6 @@
"continue-to-bundle--crapware--with-java.html\">ãªã©ã¯ã«ã¯ãã®æ
£ç¿ãç¶ãããã¨"
"ã主張ãã¦ãã¾ãã</a>"
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
msgstr ""
@@ -9089,6 +9091,12 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2014, 2015, 2016 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr ""
@@ -10315,6 +10323,15 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "<a href=\"http://blog.azimuthsecurity.com/2013/04/unlocking-motorola-"
#~| "bootloader.html\"> Some Android phones are tyrants</a> (though someone "
#~| "found a way to crack the restriction). Fortunately, most Android "
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.51
retrieving revision 1.52
diff -u -b -r1.51 -r1.52
--- malware-appliances.de-diff.html 18 Dec 2019 23:01:25 -0000 1.51
+++ malware-appliances.de-diff.html 24 Feb 2020 17:03:36 -0000 1.52
@@ -101,19 +101,34 @@
</li>
<li>
- <p>Every “home security” camera, if its manufacturer can
communicate with it,
- is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>Amazon Ring proprietary system, and</em></ins></span>
<a
+ <p>Every “home security” camera,
if</strong></del></span> <span class="inserted"><ins><em>Amazon Ring
proprietary system, and <a
+
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access</em></ins></span>
+ its <span class="removed"><del><strong>manufacturer can communicate with
it,
+ is</strong></del></span> <span class="inserted"><ins><em>camera,
speakers and microphones</a>.</p>
+ </li>
+
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had</em></ins></span>
+ a <span class="removed"><del><strong>surveillance
device.</strong></del></span> <span class="inserted"><ins><em>security
vulnerability that enabled attackers to</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
- its camera, speakers and microphones</a>.</p>
+ Canary camera is an example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based</strong></del></span> <span
class="inserted"><ins><em>user's wifi password</a>, and
snoop</em></ins></span> on the <span class="removed"><del><strong>fact
+ that</strong></del></span> <span class="inserted"><ins><em>household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of</em></ins></span> the <span
class="removed"><del><strong>device is tethered</strong></del></span> <span
class="inserted"><ins><em>wifi password would not be
sufficient</em></ins></span> to <span class="removed"><del><strong>a
server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More
about</strong></del></span> <span class="inserted"><ins><em>carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with</em></ins></span>
proprietary <span class="removed"><del><strong>tethering</a>.</p>
+ <p>But it</strong></del></span>
+ <span class="inserted"><ins><em>software lack this. Of course, they
are</em></ins></span> also <span class="removed"><del><strong>demonstrates
that</strong></del></span> <span class="inserted"><ins><em>used by their
+ manufacturers for snooping.</p>
</li>
- <li id="M201904260"></em></ins></span>
- <p>The <span class="removed"><del><strong>article describes
wrongdoing by the manufacturer, based on the fact
- that the device is</strong></del></span> <span
class="inserted"><ins><em>Jibo robot toys were</em></ins></span> tethered to
<span class="removed"><del><strong>a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that</strong></del></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>manufacturer's server,
+ <li id="M201904260">
+ <p>The Jibo robot toys were tethered to</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>manufacturer's server,
and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"></em></ins></span>
the company
<span class="removed"><del><strong>surveillance capability.</p>
@@ -124,187 +139,193 @@
hospitals is connected</strong></del></span> <span
class="inserted"><ins><em>made them all cease</em></ins></span> to <span
class="removed"><del><strong>the internet. Naturally <a
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p>Note</strong></del></span> <span
class="inserted"><ins><em>work</a> by shutting down</em></ins></span>
that <span class="removed"><del><strong>this article misuses the term <a
-href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring to crackers.</p>
-</li>
-
-<li></strong></del></span>
- <span class="inserted"><ins><em>server.</p></em></ins></span>
+ <p>Note</strong></del></span> <span
class="inserted"><ins><em>work</a> by shutting down</em></ins></span>
that <span class="removed"><del><strong>this article
misuses</strong></del></span>
+ <span class="inserted"><ins><em>server.</p>
- <p>The <span class="removed"><del><strong>bad security in many
Internet of Stings devices
- allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on</strong></del></span> <span class="inserted"><ins><em>shutdown
might ironically be good for their users, since</em></ins></span> the
- <span class="inserted"><ins><em>product was designed to
manipulate</em></ins></span> people <span class="removed"><del><strong>that use
them</a>.</p>
- <p>Don't be</strong></del></span> <span class="inserted"><ins><em>by
presenting</em></ins></span> a <span
class="removed"><del><strong>sucker—reject all the stings.</p>
- <p>It is unfortunate that the article uses the
- term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
-</li>
-
-<li>
- <p>Many models</strong></del></span> <span
class="inserted"><ins><em>phony
- semblance</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras are tremendously
insecure.
- They have login accounts with hard-coded passwords, which can't be
- changed,</strong></del></span> <span
class="inserted"><ins><em>emotions,</em></ins></span> and <span
class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way to
- delete these accounts either</a>.</p></strong></del></span>
<span class="inserted"><ins><em>was most certainly spying on
them.</p></em></ins></span>
+ <p>The shutdown might ironically be good for their users,
since</em></ins></span> the <span class="removed"><del><strong>term <a
+href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
+ referring</strong></del></span>
+ <span class="inserted"><ins><em>product was designed</em></ins></span> to
<span class="removed"><del><strong>crackers.</p></strong></del></span>
<span class="inserted"><ins><em>manipulate people by presenting a phony
+ semblance of emotions, and was most certainly spying on
them.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li></strong></del></span>
<span class="inserted"><ins><em><li id="M201903210"></em></ins></span>
- <p>The <span class="removed"><del><strong>proprietary code that runs
pacemakers, insulin pumps, and other
-medical devices is</strong></del></span> <span
class="inserted"><ins><em>Medtronics Conexus Telemetry Protocol
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
-full</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models</em></ins></span> of <span
class="removed"><del><strong>gross security faults</a>.</p>
-</li>
-
-<li><p>Users are suing Bose for <a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing a spyware app for its headphones</a>.
-Specifically, the app would record</strong></del></span> <span
class="inserted"><ins><em>implantable
- defibrillators</a> and</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>devices they connect to.</p>
+ <p>The <span class="removed"><del><strong>bad security in many
Internet</strong></del></span> <span class="inserted"><ins><em>Medtronics
Conexus Telemetry Protocol has <a
+
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities that affect several models</em></ins></span> of <span
class="removed"><del><strong>Stings</strong></del></span> <span
class="inserted"><ins><em>implantable
+ defibrillators</a> and the</em></ins></span> devices
+ <span class="removed"><del><strong>allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</strong></del></span>
<span class="inserted"><ins><em>they connect to.</p>
<p>This protocol has been around since 2006, and similar
vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by</em></ins></span> the
<span class="removed"><del><strong>audio files
-users listen</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
-</p></strong></del></span>
- <span class="inserted"><ins><em>correct them. This means you can't rely on
proprietary software
+ protocol in 2008. Apparently, nothing was done by the
company</em></ins></span> to <span
class="removed"><del><strong>snoop</strong></del></span>
+ <span class="inserted"><ins><em>correct them. This means you can't
rely</em></ins></span> on <span class="removed"><del><strong>the people that
use them</a>.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
+ <p>It</strong></del></span> <span
class="inserted"><ins><em>proprietary software
developers to fix bugs in their products.</p>
</li>
- <li id="M201902270"></em></ins></span>
- <p>The <span class="removed"><del><strong>suit
accuses</strong></del></span> <span class="inserted"><ins><em>Ring (now Amazon)
doorbell camera is designed so</em></ins></span> that <span
class="removed"><del><strong>this was done without the users' consent.
-If</strong></del></span> the <span class="removed"><del><strong>fine print
of</strong></del></span>
- <span class="inserted"><ins><em>manufacturer (now Amazon) can watch
all</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>time.
Now</em></ins></span> it <span class="removed"><del><strong>acceptable? No way!
It should be flat</strong></del></span> <span
class="inserted"><ins><em>turns</em></ins></span> out
- <span class="inserted"><ins><em>that</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal</strong></del></span>
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera</em></ins></span> is <span
class="removed"><del><strong>unfortunate</strong></del></span> <span
class="inserted"><ins><em>designed so</em></ins></span> that the <span
class="removed"><del><strong>article uses</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer (now Amazon) can watch
all</em></ins></span> the
+ <span class="removed"><del><strong>term</strong></del></span> <span
class="inserted"><ins><em>time. Now it turns out
+ that</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
+</li>
+
+<li>
+ <p>Many models of Internet-connected cameras are tremendously insecure.
+ They have login accounts with hard-coded passwords, which can't be
+ changed,</strong></del></span>
<span
class="inserted"><ins><em>href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
- anyone else can also watch, and fake videos too</a>.</p>
+ anyone else can also watch,</em></ins></span> and <span
class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there</strong></del></span>
<span class="inserted"><ins><em>fake videos too</a>.</p>
- <p>The third party vulnerability is presumably
+ <p>The third party vulnerability</em></ins></span> is <span
class="removed"><del><strong>no way</strong></del></span> <span
class="inserted"><ins><em>presumably
unintentional and Amazon will probably fix it. However, we
- do not expect Amazon</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>change</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>design that <a
- href="/proprietary/proprietary-surveillance.html#M201901100">allows
- Amazon</em></ins></span> to <span class="removed"><del><strong>snoop at
all</a>.
-</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>.</p></em></ins></span>
- </li>
-
- <li <span class="removed"><del><strong>id="anova">
- <p>Anova sabotaged users' cooking devices with a
downgrade</strong></del></span> <span
class="inserted"><ins><em>id="M201902080">
- <p>The HP <a
- href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM</em></ins></span> that
- <span class="removed"><del><strong>tethered them to a remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
- cookers won't function.</a></p>
+ do not expect Amazon</em></ins></span> to
+ <span class="removed"><del><strong>delete these accounts
either</a>.</p>
</li>
<li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher is
-<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
<span class="inserted"><ins><em>constantly
- communicates with HP servers</a></em></ins></span> to <span
class="inserted"><ins><em>make sure</em></ins></span> the <span
class="removed"><del><strong>Internet,
-its security</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>crap</a>.</p>
-<p>For example, a cracker can gain access to</strong></del></span> <span
class="inserted"><ins><em>still
- paying for</em></ins></span> the <span
class="removed"><del><strong>dishwasher's filesystem,
- infect it with malware,</strong></del></span> <span
class="inserted"><ins><em>subscription,</em></ins></span> and <span
class="removed"><del><strong>force</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
+<p>The proprietary code</strong></del></span> <span
class="inserted"><ins><em>change the design</em></ins></span> that <span
class="removed"><del><strong>runs pacemakers, insulin pumps, and other
+medical devices is</strong></del></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross security faults</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p></em></ins></span>
+ </li>
+
+<span class="removed"><del><strong><li><p>Users are suing Bose
for</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201902080">
+ <p>The HP</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing a spyware app</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying</em></ins></span> for <span class="removed"><del><strong>its
headphones</a>.
+Specifically,</strong></del></span> the <span class="removed"><del><strong>app
would record</strong></del></span> <span
class="inserted"><ins><em>subscription, and hasn't printed more pages than were
paid for.</p>
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>dishwasher to launch attacks</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
- specific cases, it spies</em></ins></span> on
- <span class="removed"><del><strong>other devices</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
- restrictions</em></ins></span> in the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
- such attacks could potentially put hundreds</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> of <span
class="removed"><del><strong>lives at risk.</p></strong></del></span>
<span class="inserted"><ins><em>ink cartridges that would otherwise be in
- working order.</p></em></ins></span>
+ <p>Even though</em></ins></span> the <span
class="removed"><del><strong>names</strong></del></span> <span
class="inserted"><ins><em>ink subscription program may be cheaper in some
+ specific cases, it spies on users, and involves totally unacceptable
+ restrictions in the use</em></ins></span> of <span
class="inserted"><ins><em>ink cartridges that would otherwise be in
+ working order.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>If you buy a used “smart” car, house, TV, refrigerator,
-etc.,
-usually</strong></del></span>
- <span class="inserted"><ins><em><li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners can still remotely control
it</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture to Amazon servers</a>, which save it
+ <li id="M201901100">
+ <p>Amazon Ring “security” devices <a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send</em></ins></span> the <span class="removed"><del><strong>audio files
+users listen</strong></del></span> <span class="inserted"><ins><em>video they
capture</em></ins></span> to <span class="removed"><del><strong>along
with</strong></del></span> <span class="inserted"><ins><em>Amazon
servers</a>, which save it
long-term.</p>
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>headphone's unique serial number.
+</p>
+
+<p>The suit accuses</strong></del></span> <span
class="inserted"><ins><em>video shows everyone</em></ins></span> that <span
class="removed"><del><strong>this was done without the users' consent.
+If</strong></del></span> <span class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span class="removed"><del><strong>fine
print of</strong></del></span> <span class="inserted"><ins><em>user's front
door.</p>
<p>The article focuses on how Ring used to let individual employees
look
- at the videos freely. It appears Amazon has tried to prevent that
- secondary abuse, but the primary abuse—that Amazon gets the
- video—Amazon expects society to surrender
to.</p></em></ins></span>
+ at</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
+would that make it acceptable? No way!</strong></del></span> <span
class="inserted"><ins><em>videos freely.</em></ins></span> It <span
class="removed"><del><strong>should be flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal</strong></del></span> <span class="inserted"><ins><em>appears Amazon
has tried</em></ins></span> to <span
class="removed"><del><strong>design</strong></del></span> <span
class="inserted"><ins><em>prevent that
+ secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>app</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon gets the
+ video—Amazon expects society</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+</p></strong></del></span> <span class="inserted"><ins><em>surrender
to.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201901070"></em></ins></span>
- <p>Vizio
- <span
class="removed"><del><strong>“smart”</strong></del></span> <span
class="inserted"><ins><em>TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them,</strong></del></span>
+ <li <span class="removed"><del><strong>id="anova">
+ <p>Anova sabotaged users' cooking devices with a downgrade that
+ tethered them to a remote server.</strong></del></span> <span
class="inserted"><ins><em>id="M201901070">
+ <p>Vizio TVs</em></ins></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
+ cookers won't function.</a></p>
+</li>
+
+<li>
+<p>When Miele's Internet</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever the TV sees,”</a> in the own words of
the company's
- CTO,</em></ins></span> and <span class="removed"><del><strong>not just
broadcasts</strong></del></span> <span class="inserted"><ins><em>this data is
sold to third parties. This is in return for
- “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>cable</a>.
Even if</strong></del></span> <span class="inserted"><ins><em>slightly
+ collect “whatever the TV sees,”</a> in the own
words</em></ins></span> of <span class="removed"><del><strong>Stings hospital
disinfectant dishwasher is
+<a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected
to</strong></del></span> the <span class="removed"><del><strong>Internet,
+its security</strong></del></span> <span class="inserted"><ins><em>company's
+ CTO, and this data</em></ins></span> is <span
class="removed"><del><strong>crap</a>.</p>
+<p>For example, a cracker can gain access</strong></del></span> <span
class="inserted"><ins><em>sold</em></ins></span> to <span
class="removed"><del><strong>the dishwasher's filesystem,
+ infect it with malware,</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
+ “better service” (meaning more intrusive
ads?)</em></ins></span> and <span class="removed"><del><strong>force the
dishwasher</strong></del></span> <span class="inserted"><ins><em>slightly
lower retail prices.</p>
- <p>What is supposed to make this spying acceptable, according to him,
- is that it is opt-in in newer models. But since</em></ins></span> the
<span class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>Vizio software</em></ins></span> is <span
class="removed"><del><strong>coming from</strong></del></span>
- <span class="inserted"><ins><em>nonfree, we don't know what is actually
happening behind</em></ins></span> the <span
class="removed"><del><strong>user's own
- computer,</strong></del></span> <span class="inserted"><ins><em>scenes,
- and there is no guarantee that all future updates will
leave</em></ins></span> the <span class="removed"><del><strong>TV reports what
it is. The existence of</strong></del></span>
- <span class="inserted"><ins><em>settings unchanged.</p>
-
- <p>If you already own</em></ins></span> a <span
class="inserted"><ins><em>Vizio smart TV (or any smart TV, for that
- matter), the easiest</em></ins></span> way to
- <span class="removed"><del><strong>disable the surveillance, even
if</strong></del></span> <span class="inserted"><ins><em>make
sure</em></ins></span> it <span class="removed"><del><strong>were not hidden
as</strong></del></span> <span class="inserted"><ins><em>isn't spying on you is
- to disconnect</em></ins></span> it <span class="removed"><del><strong>was
in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p>
+ <p>What is supposed</em></ins></span> to <span
class="removed"><del><strong>launch attacks on
+ other devices</strong></del></span> <span class="inserted"><ins><em>make this
spying acceptable, according to him,
+ is that it is opt-in</em></ins></span> in <span
class="inserted"><ins><em>newer models. But since</em></ins></span> the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
+ such attacks could potentially put hundreds of lives at risk.</p>
+
+</li>
+<li></strong></del></span> <span class="inserted"><ins><em>Vizio
software is
+ nonfree, we don't know what is actually happening behind the scenes,
+ and there is no guarantee that all future updates will leave the
+ settings unchanged.</p></em></ins></span>
+
+ <p>If you <span
class="removed"><del><strong>buy</strong></del></span> <span
class="inserted"><ins><em>already own</em></ins></span> a <span
class="removed"><del><strong>used “smart” car,
house,</strong></del></span> <span class="inserted"><ins><em>Vizio smart TV (or
any smart</em></ins></span> TV, <span class="removed"><del><strong>refrigerator,
+etc.,
+usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
+previous owners can still remotely control it</a>.</p>
</li>
<li>
-<p>More or less all “smart” TVs <a
-href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <p>Vizio
+ “smart” <a
href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span> <span
class="inserted"><ins><em>for</em></ins></span> that <span
class="removed"><del><strong>is viewed</strong></del></span>
+ <span class="inserted"><ins><em>matter), the easiest way to make sure it
isn't spying</em></ins></span> on <span
class="removed"><del><strong>them,</strong></del></span> <span
class="inserted"><ins><em>you is
+ to disconnect it from the Internet,</em></ins></span> and <span
class="inserted"><ins><em>use a terrestrial antenna
+ instead. Unfortunately, this is</em></ins></span> not <span
class="removed"><del><strong>just broadcasts
+ and cable</a>. Even</strong></del></span> <span
class="inserted"><ins><em>always possible. Another option,</em></ins></span>
+ if <span class="removed"><del><strong>the image</strong></del></span>
<span class="inserted"><ins><em>you are technically oriented,</em></ins></span>
is <span class="removed"><del><strong>coming from the
user's</strong></del></span> <span class="inserted"><ins><em>to get
your</em></ins></span> own
+ <span class="removed"><del><strong>computer, the TV reports what it is.
The existence of</strong></del></span> <span class="inserted"><ins><em>router
(which can
+ be an old computer running completely free software), and set
up</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span>
+ <span class="inserted"><ins><em>firewall</em></ins></span> to
+ <span class="removed"><del><strong>disable the surveillance, even if it
were not hidden</strong></del></span> <span class="inserted"><ins><em>block
connections to Vizio's servers. Or,</em></ins></span> as <span
class="removed"><del><strong>it was in
+ these TVs, does not legitimize the
surveillance.</p></strong></del></span> <span class="inserted"><ins><em>a
last resort,
+ you can replace your TV with another model.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+<p>More or less</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201810300">
+ <p>Nearly</em></ins></span> all <span
class="removed"><del><strong>“smart” TVs</strong></del></span>
<span class="inserted"><ins><em>“home security
cameras”</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
-<p>The report was as of 2014, but we don't expect</strong></del></span>
<span class="inserted"><ins><em>Internet, and use a terrestrial antenna
- instead. Unfortunately,</em></ins></span> this <span
class="removed"><del><strong>has got
+<p>The report was as</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give the manufacturer an unencrypted copy</em></ins></span> of <span
class="removed"><del><strong>2014, but we don't expect this has got
better.</p>
-<p>This shows that laws requiring products</strong></del></span> <span
class="inserted"><ins><em>is not always possible. Another option,
- if you are technically oriented, is</em></ins></span> to get <span
class="removed"><del><strong>users' formal
+<p>This shows</strong></del></span> <span
class="inserted"><ins><em>everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>laws requiring
products</strong></del></span> <span class="inserted"><ins><em>these
+ manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>get users' formal
consent before collecting personal data are totally inadequate. And
-what happens if a user declines consent? Probably the TV will say,
-“Without</strong></del></span> your <span
class="removed"><del><strong>consent</strong></del></span> <span
class="inserted"><ins><em>own router (which can
- be an old computer running completely free software), and set up a
- firewall</em></ins></span> to <span class="removed"><del><strong>tracking,
the</strong></del></span> <span class="inserted"><ins><em>block connections to
Vizio's servers. Or, as a last resort,
- you can replace your</em></ins></span> TV <span
class="removed"><del><strong>will not
+what happens if a user declines consent? Probably</strong></del></span> <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>TV will say,
+“Without</strong></del></span> <span class="inserted"><ins><em>videos.
That's not
+ security for</em></ins></span> your <span
class="removed"><del><strong>consent</strong></del></span> <span
class="inserted"><ins><em>home. Security means making sure they don't
get</em></ins></span> to <span class="removed"><del><strong>tracking, the TV
will not
work.”</p>
-<p>Proper laws</strong></del></span> <span
class="inserted"><ins><em>with another model.</p>
+<p>Proper laws would say that TVs</strong></del></span>
+ <span class="inserted"><ins><em>see through your camera.</p>
</li>
- <li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera”</em></ins></span>
would <span class="removed"><del><strong>say</strong></del></span> <span
class="inserted"><ins><em>be a better
- name!</p>
-
- <p>When Consumer Reports tested them, it suggested</em></ins></span>
that <span class="removed"><del><strong>TVs are</strong></del></span> <span
class="inserted"><ins><em>these
- manufacturers promise</em></ins></span> not <span
class="removed"><del><strong>allowed</strong></del></span> to <span
class="removed"><del><strong>report what</strong></del></span> <span
class="inserted"><ins><em>look at what's in</em></ins></span> the
-<span class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p></em></ins></span>
- </li>
-<span class="removed"><del><strong><li>
+ <li id="M201810150">
+ <p>Printer manufacturers</em></ins></span> are <span
class="removed"><del><strong>not allowed to report what</strong></del></span>
<span class="inserted"><ins><em>very innovative—at
blocking</em></ins></span> the
+<span class="removed"><del><strong>user watches — no
exceptions!</p>
+</li>
+<li>
<p>Some LG
TVs</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810150">
- <p>Printer manufacturers are very innovative—at blocking the
- use of independent replacement ink cartridges. Their “security
+ <span class="inserted"><ins><em>use of independent replacement ink
cartridges. Their “security
upgrades” occasionally impose new forms of cartridge
DRM.</em></ins></span> <a <span
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
tyrants</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
@@ -338,8 +359,8 @@
just happened).</p>
<p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>data may be true,
-but</strong></del></span> <span class="inserted"><ins><em>desired temperature
requires running
- nonfree software. With an old-fashioned thermostat, you can
do</em></ins></span> it <span class="removed"><del><strong>doesn't really
matter. If it sells</strong></del></span>
+but it doesn't really matter. If</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can
do</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span>
<span class="inserted"><ins><em>using controls right on</em></ins></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>thermostat.</p>
</li>
@@ -423,45 +444,45 @@
<span class="removed"><del><strong><li>
<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
-Some D-Link routers</a> have a back door for changing settings in a
+Some D-Link routers</a> have</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers and <a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it, the system has</em></ins></span> a <span
class="removed"><del><strong>back door for changing settings in a
dlink of an eye.</p>
-<p></strong></del></span>
+<p></strong></del></span> <span class="inserted"><ins><em>grave security
flaw.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201711200">
- <p>Amazon recently invited consumers to be suckers
and</em></ins></span> <a <span
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764">Many
models of routers
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="https://github.com/elvanderb/TCP-32764">Many
models</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings</em></ins></span> of <span class="removed"><del><strong>routers
have back doors</a>.</p>
</li>
<li>
<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
-The TP-Link router</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff to open their front doors</a>. Wouldn't you know
- it, the system</em></ins></span> has a <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>grave security
flaw.</p></em></ins></span>
+The TP-Link router has a backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>the conversation between two
users</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>The <a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201711100">
- <p>A remote-control sex toy</em></ins></span> was <span
class="removed"><del><strong>designed with DRM</a>: it won't accept
-third-party printing materials. It is the Keurig</strong></del></span> <span
class="inserted"><ins><em>found to make <a
-
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings</em></ins></span> of <span
class="removed"><del><strong>printers. Now it is
-being discontinued, which means that eventually authorized materials won't
-be available and</strong></del></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
+<p>The</strong></del></span>
-<p>With a</strong></del></span> <span
class="inserted"><ins><em>conversation between two users</a>.</p>
- </li>
-
- <li id="M201711080">
+ <span class="inserted"><ins><em><li id="M201711080">
<p>Logitech will sabotage
- all Harmony Link household control devices by</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets</strong></del></span>
+ all Harmony Link household control devices by</em></ins></span> <a
<span
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+“Cube” 3D printer was designed with DRM</a>: it won't accept
+third-party printing materials. It is</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off</em></ins></span> the <span
class="removed"><del><strong>Respects Your
Freedom</a>,</strong></del></span> <span class="inserted"><ins><em>server
through which the products' supposed owners
+ turning off</em></ins></span> the <span
class="removed"><del><strong>Keurig of printers. Now it is
+being discontinued,</strong></del></span> <span
class="inserted"><ins><em>server through</em></ins></span> which <span
class="removed"><del><strong>means that eventually authorized materials won't
+be available and the printers may become unusable.</p>
+
+<p>With a <a
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer that gets</strong></del></span> the <span
class="removed"><del><strong>Respects Your
Freedom</a>,</strong></del></span> <span
class="inserted"><ins><em>products' supposed owners
communicate with them</a>.</p>
<p>The owners suspect</em></ins></span> this <span
class="removed"><del><strong>problem would not
@@ -497,40 +518,39 @@
<p>Philips</strong></del></span>
<span class="inserted"><ins><em><li id="M201709200">
- <p>A</em></ins></span> “smart” <span
class="removed"><del><strong>lightbulbs</strong></del></span> <span
class="inserted"><ins><em>intravenous pump
- designed for hospitals is connected to the internet.
Naturally</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
-have</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
- its security has</em></ins></span> been <span
class="removed"><del><strong>designed not</strong></del></span> <span
class="inserted"><ins><em>cracked</a>.</p>
+ <p>A</em></ins></span> “smart” <span
class="removed"><del><strong>lightbulbs <a
+href="https://www.techdirt.com/articles/20151214/07452133070/lightbulb-drm-philips-locks-purchasers-out-third-party-bulbs-with-firmware-update.shtml">
+have been</strong></del></span> <span class="inserted"><ins><em>intravenous
pump</em></ins></span>
+ designed <span class="removed"><del><strong>not to interact with other
companies' smart
+lightbulbs</a>.</p>
+
+<p>If a product is “smart”, and you didn't build it,
it</strong></del></span> <span class="inserted"><ins><em>for
hospitals</em></ins></span> is
+<span class="removed"><del><strong>cleverly serving</strong></del></span>
<span class="inserted"><ins><em>connected to the internet. Naturally <a
+
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml"></em></ins></span>
+ its <span class="removed"><del><strong>manufacturer <em>against
you</em>.</p></strong></del></span> <span
class="inserted"><ins><em>security has been cracked</a>.</p>
<p><small>(Note that this article misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</em></ins></span> to <span class="removed"><del><strong>interact
with other companies' smart
-lightbulbs</a>.</p>
-
-<p>If</strong></del></span> <span
class="inserted"><ins><em>crackers.)</small></p>
+ referring to crackers.)</small></p></em></ins></span>
</li>
- <li id="M201708280">
- <p>The bad security in many Internet of Stings devices allows <a
-
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
- to snoop on the people that use them</a>.</p>
-
- <p>Don't be</em></ins></span> a <span
class="removed"><del><strong>product is “smart”, and you didn't
build it, it</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all the stings.</p>
-
- <p><small>(It</em></ins></span> is
-<span class="removed"><del><strong>cleverly serving its manufacturer
<em>against you</em>.</p>
-</li>
-
-<li>
+<span class="removed"><del><strong><li>
<p><a
href="http://web.archive.org/web/20131007102857/http://www.nclnet.org/technology/73-digital-rights-management/124-whos-driving-the-copyright-laws-consumers-insist-on-the-right-to-back-it-up">
DVDs and Bluray disks have DRM</a>.
</p>
-<p>That page uses spin terms</strong></del></span> <span
class="inserted"><ins><em>unfortunate</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
-including</strong></del></span> <span class="inserted"><ins><em>the article
uses the term</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+<p>That page uses spin terms</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to snoop on the people</em></ins></span> that <span
class="removed"><del><strong>favor DRM,
+including</strong></del></span> <span class="inserted"><ins><em>use
them</a>.</p>
+
+ <p>Don't be a sucker—reject all the stings.</p>
+
+ <p><small>(It is unfortunate that the article uses the
term</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
digital “rights” management</a>
and</strong></del></span>
<span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p>
@@ -565,32 +585,32 @@
<p>Many models</em></ins></span> of <span
class="removed"><del><strong>network-connected
surveillance</strong></del></span> <span
class="inserted"><ins><em>Internet-connected</em></ins></span> cameras
<span class="inserted"><ins><em>are tremendously insecure.
They</em></ins></span> have <span class="inserted"><ins><em>login
accounts with hard-coded passwords, which can't be changed,
and</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html"></strong></del></span>
+<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+security bugs that allow anyone</strong></del></span>
<span
class="inserted"><ins><em>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
- is no way to delete these accounts either</a>.</p>
+ is no way</em></ins></span> to <span class="removed"><del><strong>watch
through them</a>.</p></strong></del></span> <span
class="inserted"><ins><em>delete these accounts
either</a>.</p></em></ins></span>
</li>
- <li id="M201705250">
- <p>The proprietary code that runs pacemakers,
+<span class="removed"><del><strong><li>
+<p>Samsung's “Smart Home” has a big security hole; <a
+href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+unauthorized people can remotely control it</a>.</p>
+
+<p>Samsung claims</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705250">
+ <p>The proprietary code</em></ins></span> that <span
class="removed"><del><strong>this is an “open” platform so the
+problem</strong></del></span> <span class="inserted"><ins><em>runs pacemakers,
insulin pumps, and other medical devices is <a
- href="http://www.bbc.co.uk/news/technology-40042584"> full of
gross</em></ins></span>
- security <span class="removed"><del><strong>bugs</strong></del></span>
<span class="inserted"><ins><em>faults</a>.</p>
+ href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
+ security faults</a>.</p>
</li>
<li id="M201705180">
<p>Bird and rabbit pets were implemented for Second
- Life by a company</em></ins></span> that <span
class="removed"><del><strong>allow anyone</strong></del></span> <span
class="inserted"><ins><em>tethered their food</em></ins></span> to <span
class="removed"><del><strong>watch through them</a>.</p>
-</li>
-
-<li>
-<p>Samsung's “Smart Home” has</strong></del></span> a <span
class="removed"><del><strong>big security hole;</strong></del></span> <span
class="inserted"><ins><em>server.</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
-unauthorized people can remotely control it</a>.</p>
-
-<p>Samsung claims that this is an “open” platform
so</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down</em></ins></span> the
-<span class="removed"><del><strong>problem is partly</strong></del></span>
<span class="inserted"><ins><em>server and the pets more or less
died</a>.</p>
+ Life by a company that tethered their food to a server. <a
+
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
+ It shut down the server and the pets more or less died</a>.</p>
</li>
<li id="M201704190">
@@ -753,7 +773,7 @@
unauthorized people can remotely control it</a>.</p>
<p>Samsung claims that this is an “open” platform so the
- problem is partly the fault of app developers. That is clearly true
+ problem</em></ins></span> is partly the <span
class="removed"><del><strong>fault of app developers. That is clearly true
if</strong></del></span> <span class="inserted"><ins><em>fault of app
developers. That is clearly true
if the apps are proprietary software.</p>
<p>Anything whose name is “Smart” is most likely going
@@ -878,7 +898,7 @@
<li id="M201511020">
<p>Tivo's alliance with Viacom adds 2.3 million households
- to</em></ins></span> the <span class="removed"><del><strong>fault of app
developers. That is clearly true if</strong></del></span> <span
class="inserted"><ins><em>600 millions social media profiles</em></ins></span>
the <span class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>company
+ to the 600 millions social media profiles</em></ins></span> the <span
class="removed"><del><strong>apps</strong></del></span> <span
class="inserted"><ins><em>company
already monitors. Tivo customers</em></ins></span> are <span
class="removed"><del><strong>proprietary software.</p>
<p>Anything whose name is “Smart” is most likely going to
@@ -1350,7 +1370,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1361,7 +1381,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/18 23:01:25 $
+$Date: 2020/02/24 17:03:36 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.85
retrieving revision 1.86
diff -u -b -r1.85 -r1.86
--- malware-appliances.de.po 18 Dec 2019 23:01:25 -0000 1.85
+++ malware-appliances.de.po 24 Feb 2020 17:03:36 -0000 1.86
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -111,6 +111,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -2150,11 +2167,12 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © 2016, 2017, [-2018-] {+2018, 2019+} Free Software
+# | Copyright © 2016, 2017, [-2018-] {+2018, 2019, 2020+} Free Software
# | Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2016, 2017, 2018 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: malware-appliances.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- malware-appliances.es.po 19 Dec 2019 11:23:37 -0000 1.13
+++ malware-appliances.es.po 24 Feb 2020 17:03:36 -0000 1.14
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2019-12-19 12:08+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
@@ -85,6 +86,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -1672,7 +1690,13 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+# | Copyright © 2016, 2017, 2018, [-2019-] {+2019, 2020+} Free Software
+# | Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
#. type: Content of: <div><p>
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.142
retrieving revision 1.143
diff -u -b -r1.142 -r1.143
--- malware-appliances.fr.po 26 Dec 2019 20:17:01 -0000 1.142
+++ malware-appliances.fr.po 24 Feb 2020 17:03:36 -0000 1.143
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2019-12-20 23:06+0100\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -83,6 +84,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -1683,8 +1701,9 @@
"README.translations.html\">guide de traduction</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright © 2016-2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr "Copyright © 2016-2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- malware-appliances.pot 18 Dec 2019 23:01:25 -0000 1.70
+++ malware-appliances.pot 24 Feb 2020 17:03:36 -0000 1.71
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -64,6 +64,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a "
+"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\">
"
+"access the user's wifi password</a>, and snoop on the household through "
+"connected surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack "
+"this. Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a "
"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
"company made them all cease to work</a> by shutting down that server."
@@ -1115,7 +1132,7 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation,
Inc."
msgstr ""
#. type: Content of: <div><p>
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- malware-appliances.ru.po 19 Dec 2019 06:59:30 -0000 1.177
+++ malware-appliances.ru.po 24 Feb 2020 17:03:36 -0000 1.178
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2018-12-02 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -84,6 +85,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -1661,8 +1679,10 @@
"translations.html\">“Ð ÑководÑÑве по
пеÑеводам”</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- nl.po 21 Feb 2020 23:32:16 -0000 1.174
+++ nl.po 24 Feb 2020 17:03:36 -0000 1.175
@@ -2072,6 +2072,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -3029,15 +3046,17 @@
"openlgtv.org.ru/wiki/index.php/Achievements\"> are tyrants</a>."
msgstr ""
-# type: Content of: <div><p>
#. type: Content of: <div><p>
-# | Copyright © [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright © [-2013, 2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
-#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#| "Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
#. type: Content of: <title>
# | [-Proprietary Software-]{+Malware In Cars+} - GNU Project - Free Software
@@ -3799,18 +3818,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | [-Apple's Operating Systems are-]{+Google's Software Is+} Malware - GNU
# | Project - Free Software Foundation
@@ -7614,14 +7621,14 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, [-2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
@@ -8471,19 +8478,6 @@
"continuing this practice</a>."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © 2013, [-2014,-] 2015, 2016, [-2017-] {+2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
-#| "Inc."
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | Proprietary [-Software-] {+Subscriptions+} - GNU Project - Free Software
# | Foundation
@@ -8527,6 +8521,16 @@
"below."
msgstr ""
+# type: Content of: <div><p>
+#. type: Content of: <div><p>
+# | Copyright © [-2014, 2015,-] 2016, [-2017-] {+2017, 2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
@@ -9739,6 +9743,17 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~| "Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017 Free Software Foundation, "
+#~ "Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "As of April, 2019, the files in this directory list around 400 instances "
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- pl.po 21 Feb 2020 23:32:16 -0000 1.173
+++ pl.po 24 Feb 2020 17:03:36 -0000 1.174
@@ -1641,6 +1641,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -2599,11 +2616,12 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015-] {+2016, 2017, 2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright © [-2013, 2014, 2015-] {+2016, 2017, 2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
#. type: Content of: <title>
@@ -3345,15 +3363,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015-] {+2016, 2017, 2018, 2019, 2020+}
-# | Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | [-Proprietary-]{+Google's+} Software {+Is Malware+} - GNU Project - Free
# | Software Foundation
@@ -6989,12 +6998,12 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2014, 2015-] {+2015, 2016, 2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, [-2014, 2015-] {+2015, 2016, 2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
@@ -7869,16 +7878,6 @@
"continuing this practice</a>."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © 2013, [-2014, 2015-] {+2015, 2016, 2017, 2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
-
#. type: Content of: <title>
# | Proprietary [-Software-] {+Subscriptions+} - GNU Project - Free Software
# | Foundation
@@ -7919,6 +7918,14 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015-] {+2016, 2017, 2018, 2019+} Free
+# | Software Foundation, Inc.
+#, fuzzy
+#| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
@@ -9143,6 +9150,13 @@
#, fuzzy
#~| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+
+#, fuzzy
+#~| msgid "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
+#~ msgid ""
#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
#~ "Foundation, Inc."
#~ msgstr "Copyright © 2013, 2014, 2015 Free Software Foundation, Inc."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.172
retrieving revision 1.173
diff -u -b -r1.172 -r1.173
--- pot 21 Feb 2020 23:32:16 -0000 1.172
+++ pot 24 Feb 2020 17:03:36 -0000 1.173
@@ -1450,6 +1450,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -2399,7 +2416,8 @@
msgstr ""
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr ""
#. type: Content of: <title>
@@ -3117,11 +3135,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
msgstr ""
@@ -6534,7 +6547,7 @@
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
@@ -7071,12 +7084,6 @@
"continuing this practice</a>."
msgstr ""
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
msgstr ""
@@ -7107,6 +7114,10 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr ""
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr ""
Index: proprietary-insecurity.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de-diff.html,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-insecurity.de-diff.html 18 Dec 2019 23:01:25 -0000 1.37
+++ proprietary-insecurity.de-diff.html 24 Feb 2020 17:03:36 -0000 1.38
@@ -103,40 +103,52 @@
its camera, speakers and microphones</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
- <p>One of the dangers</strong></del></span>
+ <p>One of</strong></del></span>
- <span class="inserted"><ins><em><li id="M201908310">
- <p>A series</em></ins></span> of <span
class="inserted"><ins><em>vulnerabilities <a
-
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
- in iOS allowed attackers to gain access to sensitive information
- including private messages, passwords, photos and contacts stored
on</em></ins></span>
- the <span
class="removed"><del><strong>“internet</strong></del></span> <span
class="inserted"><ins><em>user's iMonster</a>.</p>
-
- <p>The deep insecurity</em></ins></span> of <span
class="removed"><del><strong>stings”</strong></del></span> <span
class="inserted"><ins><em>iMonsters</em></ins></span> is <span
class="removed"><del><strong>that, if
- you lose your internet service, you also <a
+ <span class="inserted"><ins><em><li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access</em></ins></span> the <span class="removed"><del><strong>dangers
of</strong></del></span> <span class="inserted"><ins><em>user's wifi
password</a>, and snoop on</em></ins></span> the <span
class="removed"><del><strong>“internet</strong></del></span> <span
class="inserted"><ins><em>household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge</em></ins></span> of <span
class="removed"><del><strong>stings” is that,</strong></del></span> <span
class="inserted"><ins><em>the wifi password would not be sufficient to carry
+ out any significant surveillance</em></ins></span> if
+ <span class="removed"><del><strong>you lose your internet service,
you</strong></del></span> <span class="inserted"><ins><em>the devices
implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are</em></ins></span> also <span
class="removed"><del><strong><a
href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house and appliances</a>.</p>
- <p>For your safety, don't use any appliance with</strong></del></span>
<span class="inserted"><ins><em>even more pertinent given that
- Apple's proprietary software makes users totally dependent on Apple
- for even</em></ins></span> a <span class="removed"><del><strong>connection
to</strong></del></span> <span class="inserted"><ins><em>modicum of security.
It also means that</em></ins></span> the <span class="removed"><del><strong>real
+ lose control</strong></del></span> <span class="inserted"><ins><em>used by
their
+ manufacturers for snooping.</p>
+ </li>
+
+ <li id="M201908310">
+ <p>A series</em></ins></span> of <span
class="removed"><del><strong>your house and appliances</a>.</p>
+ <p>For your safety, don't use any appliance with a
connection</strong></del></span> <span
class="inserted"><ins><em>vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers</em></ins></span> to <span
class="removed"><del><strong>the real
internet.</p>
</li>
<li>
- <p>Amazon recently invited consumers</strong></del></span> <span
class="inserted"><ins><em>devices do
- not even try</em></ins></span> to <span class="removed"><del><strong>be
suckers and</strong></del></span> <span class="inserted"><ins><em>offer
security against Apple itself.</p>
+ <p>Amazon recently invited consumers</strong></del></span> <span
class="inserted"><ins><em>gain access</em></ins></span> to <span
class="removed"><del><strong>be suckers</strong></del></span> <span
class="inserted"><ins><em>sensitive information
+ including private messages, passwords, photos</em></ins></span> and <span
class="removed"><del><strong><a
+href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you
know it,</strong></del></span> <span class="inserted"><ins><em>contacts stored
on</em></ins></span>
+ the <span class="removed"><del><strong>system has a grave security
flaw.</p>
+</li>
+<li></strong></del></span> <span class="inserted"><ins><em>user's
iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
</li>
<li id="M201908020">
<p>Out of 21 gratis Android antivirus apps
- that were tested by security researchers, eight</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
- allow delivery staff</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
- failed</em></ins></span> to <span class="removed"><del><strong>open their
front doors</a>. Wouldn't you know it,
- the system has</strong></del></span> <span
class="inserted"><ins><em>detect</em></ins></span> a <span
class="removed"><del><strong>grave security flaw.</p>
-</li>
-<li>
- <p>Intel's intentional “management engine”
back</strong></del></span> <span class="inserted"><ins><em>test
virus</a>. All of them asked for dangerous
+ that were tested by security researchers, eight <a
+
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed to detect a test virus</a>. All of them asked for dangerous
permissions or contained advertising trackers, with seven being more
risky than the average of the 100 most popular Android apps.</p>
@@ -237,8 +249,8 @@
real internet.</p>
</li>
- <li id="M201711204">
- <p>Intel's intentional “management engine”
back</em></ins></span> door has <a
+ <li id="M201711204"></em></ins></span>
+ <p>Intel's intentional “management engine” back door has
<a
href="https://www.theregister.co.uk/2017/11/20/intel_flags_firmware_flaws/">
unintended back doors</a> too.</p>
</li>
@@ -1066,7 +1078,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2015, 2016, 2017, <span
class="removed"><del><strong>2018</strong></del></span> <span
class="inserted"><ins><em>2018, 2019, 2020</em></ins></span> Free Software
Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
href="http://creativecommons.org/licenses/by/4.0/">Creative
@@ -1076,7 +1088,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/18 23:01:25 $
+$Date: 2020/02/24 17:03:36 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.de.po,v
retrieving revision 1.140
retrieving revision 1.141
diff -u -b -r1.140 -r1.141
--- proprietary-insecurity.de.po 18 Dec 2019 23:01:25 -0000 1.140
+++ proprietary-insecurity.de.po 24 Feb 2020 17:03:36 -0000 1.141
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:41+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -130,6 +130,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1599,14 +1616,14 @@
"standards/README.translations\">LIESMICH für Ãbersetzungen</a>."
#. type: Content of: <div><p>
-# | Copyright © 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019+} Free
-# | Software Foundation, Inc.
+# | Copyright © 2013, 2015, 2016, 2017, [-2018-] {+2018, 2019, 2020+}
+# | Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2015, 2016, 2017, 2018 Free Software Foundation, "
#| "Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr "Copyright © <ins>2013-</ins>2018 Free Software Foundation, Inc."
Index: proprietary-insecurity.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.es.po,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -b -r1.27 -r1.28
--- proprietary-insecurity.es.po 21 Jan 2020 12:34:48 -0000 1.27
+++ proprietary-insecurity.es.po 24 Feb 2020 17:03:36 -0000 1.28
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2019-12-19 12:08+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -117,6 +118,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1274,8 +1292,14 @@
"coordinación y el envÃo de traducciones de las páginas de este sitio web."
#. type: Content of: <div><p>
+# | Copyright © 2013, 2015, 2016, 2017, 2018, [-2019-] {+2019, 2020+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
Index: proprietary-insecurity.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.fr.po,v
retrieving revision 1.188
retrieving revision 1.189
diff -u -b -r1.188 -r1.189
--- proprietary-insecurity.fr.po 26 Dec 2019 20:17:01 -0000 1.188
+++ proprietary-insecurity.fr.po 24 Feb 2020 17:03:37 -0000 1.189
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2019-12-20 23:06+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -117,6 +118,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1282,9 +1300,9 @@
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
-msgstr "Copyright © 2013, 2015-2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2013, 2015-2020 Free Software Foundation, Inc."
#. type: Content of: <div><p>
msgid ""
Index: proprietary-insecurity.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it-diff.html,v
retrieving revision 1.52
retrieving revision 1.53
diff -u -b -r1.52 -r1.53
--- proprietary-insecurity.it-diff.html 18 Dec 2019 23:01:25 -0000 1.52
+++ proprietary-insecurity.it-diff.html 24 Feb 2020 17:03:37 -0000 1.53
@@ -108,74 +108,85 @@
insecurity since anyone, including malicious crackers,</strong></del></span>
<span class="inserted"><ins><em>this article as</em></ins></span> <a <span
class="removed"><del><strong>href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">can
find those accounts and use them</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.gnu.org/philosophy/words-to-avoid.html#Hacker">“hackers”</a>)
managed</em></ins></span> to <span class="removed"><del><strong>get into
- users' cameras</a>.</p>
-
-</li>
+ users' cameras</a>.</p></strong></del></span> <span
class="inserted"><ins><em>interfere the Amazon Ring proprietary system, and
<a
+
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
+ its camera, speakers and microphones</a>.</p></em></ins></span>
+ </li>
-<li>
+<span class="removed"><del><strong><li>
<p>
- Conexant HD Audio Driver Package (version 1.0.0.46</strong></del></span>
<span class="inserted"><ins><em>interfere the Amazon Ring proprietary
system,</em></ins></span> and <span class="removed"><del><strong>earlier)
- pre-installed on 28 models</strong></del></span> <span
class="inserted"><ins><em><a
-
href="https://www.theguardian.com/technology/2019/dec/13/ring-hackers-reportedly-watching-talking-strangers-in-home-cameras">access
- its camera, speakers and microphones</a>.</p>
+ Conexant HD Audio Driver Package (version 1.0.0.46</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>,</em></ins></span> and <span
class="removed"><del><strong>earlier)
+ pre-installed</strong></del></span> <span
class="inserted"><ins><em>snoop</em></ins></span> on <span
class="removed"><del><strong>28 models</strong></del></span> <span
class="inserted"><ins><em>the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge</em></ins></span> of <span
class="removed"><del><strong>HP laptops logged</strong></del></span> the <span
class="removed"><del><strong>user's
+ keystroke</strong></del></span> <span class="inserted"><ins><em>wifi
password would not be sufficient</em></ins></span> to <span
class="removed"><del><strong>a file in</strong></del></span> <span
class="inserted"><ins><em>carry
+ out any significant surveillance if</em></ins></span> the <span
class="removed"><del><strong>filesystem. Any process</strong></del></span>
<span class="inserted"><ins><em>devices implemented proper
+ security, including encryption. But many devices</em></ins></span> with
<span class="removed"><del><strong>access</strong></del></span> <span
class="inserted"><ins><em>proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
<li id="M201908310">
- <p>A series</em></ins></span> of <span
class="removed"><del><strong>HP laptops logged the user's
- keystroke to a file</strong></del></span> <span
class="inserted"><ins><em>vulnerabilities <a
-
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found</em></ins></span>
- in <span class="removed"><del><strong>the filesystem. Any process with
access</strong></del></span> <span class="inserted"><ins><em>iOS allowed
attackers</em></ins></span> to
+ <p>A series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found
+ in iOS allowed attackers</em></ins></span> to
<span class="removed"><del><strong>the filesystem or the MapViewOfFile API
could</strong></del></span> gain access to <span
class="inserted"><ins><em>sensitive information
including private messages, passwords, photos and contacts stored
on</em></ins></span>
the
- <span class="removed"><del><strong>log. Furthermore, <a
href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according
- to modzero</a> the “information-leak via Covert Storage
- Channel enables malware authors to capture keystrokes without
- taking</strong></del></span> <span class="inserted"><ins><em>user's
iMonster</a>.</p>
+ <span class="removed"><del><strong>log. Furthermore,</strong></del></span>
<span class="inserted"><ins><em>user's iMonster</a>.</p>
<p>The deep insecurity of iMonsters is even more pertinent given that
Apple's proprietary software makes users totally dependent on Apple
- for even a modicum of security. It also means that</em></ins></span> the
<span class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>devices do
+ for even a modicum of security. It also means that the devices do
not even try to offer security against Apple itself.</p>
</li>
<li id="M201908020">
- <p>Out</em></ins></span> of <span class="inserted"><ins><em>21
gratis Android antivirus apps
- that were tested by security researchers, eight <a
-
href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
- failed to detect a test virus</a>. All of them asked for dangerous
- permissions or contained advertising trackers, with
seven</em></ins></span> being <span
class="removed"><del><strong>classified</strong></del></span> <span
class="inserted"><ins><em>more
- risky than the average of the 100 most popular Android apps.</p>
-
- <p><small>(Note that the article refers to these proprietary
apps</em></ins></span> as <span class="removed"><del><strong>malicious
task</strong></del></span>
- <span class="inserted"><ins><em>“free”. It should have said
“gratis”
+ <p>Out of 21 gratis Android antivirus apps
+ that were tested by security researchers, eight</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.modzero.ch/advisories/MZ-17-01-Conexant-Keylogger.txt">according</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.comparitech.com/antivirus/android-antivirus-vulnerabilities/">
+ failed</em></ins></span> to <span
class="removed"><del><strong>modzero</a></strong></del></span> <span
class="inserted"><ins><em>detect a test virus</a>. All of them asked for
dangerous
+ permissions or contained advertising trackers, with seven being more
+ risky than</em></ins></span> the <span
class="removed"><del><strong>“information-leak via Covert Storage
+ Channel enables malware authors</strong></del></span> <span
class="inserted"><ins><em>average of the 100 most popular Android
apps.</p>
+
+ <p><small>(Note that the article refers</em></ins></span> to
<span class="removed"><del><strong>capture keystrokes without
+ taking</strong></del></span> <span class="inserted"><ins><em>these
proprietary apps as
+ “free”. It should have said “gratis”
instead.)</small></p>
</li>
<li id="M201907080">
<p>Many Android apps can track
- users' movements even when the user says <a
+ users' movements even when</em></ins></span> the <span
class="removed"><del><strong>risk</strong></del></span> <span
class="inserted"><ins><em>user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
not to allow them access to locations</a>.</p>
<p>This involves an apparently unintentional weakness in Android,
- exploited intentionally</em></ins></span> by <span
class="removed"><del><strong>AV
- heuristics”.
- </p></strong></del></span> <span class="inserted"><ins><em>malicious
apps.</p></em></ins></span>
+ exploited intentionally by malicious apps.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
- <span class="inserted"><ins><em><li id="M201905150">
- <p>Users caught in the jail of an iMonster are <a
+ <li id="M201905150">
+ <p>Users caught in the jail</em></ins></span> of <span
class="removed"><del><strong>being classified</strong></del></span> <span
class="inserted"><ins><em>an iMonster are <a
href="https://boingboing.net/2019/05/15/brittle-security.html"> sitting
ducks for other attackers</a>, and the app censorship prevents
security
companies from figuring out how those attacks work.</p>
<p>Apple's censorship of apps is fundamentally unjust, and would be
- inexcusable even if it didn't lead to security threats as well.</p>
+ inexcusable even if it didn't lead to security threats</em></ins></span>
as <span class="removed"><del><strong>malicious task by AV
+ heuristics”.
+ </p></strong></del></span> <span
class="inserted"><ins><em>well.</p></em></ins></span>
</li>
+<span class="removed"><del><strong><li></strong></del></span>
- <li id="M201903210"></em></ins></span>
+ <span class="inserted"><ins><em><li id="M201903210"></em></ins></span>
<p>The <span class="inserted"><ins><em>Medtronics Conexus Telemetry
Protocol has <a
href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
two vulnerabilities that affect several models of implantable
@@ -193,10 +204,10 @@
manufacturer (now Amazon) can watch all the time. Now it turns out
that <a
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
- anyone else can also watch,</em></ins></span> and <span
class="inserted"><ins><em>fake videos too</a>.</p>
+ anyone else can also watch, and fake videos too</a>.</p>
<p>The third party vulnerability is presumably
- unintentional and Amazon will probably fix it. However, we
+ unintentional</em></ins></span> and <span class="inserted"><ins><em>Amazon
will probably fix it. However, we
do not expect Amazon to change the design that <a
href="/proprietary/proprietary-surveillance.html#M201901100">allows
Amazon to watch</a>.</p>
@@ -1033,7 +1044,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019</em></ins></span> Free Software
Foundation, Inc.</p>
+<p>Copyright © 2013, 2015, 2016, <span
class="removed"><del><strong>2017</strong></del></span> <span
class="inserted"><ins><em>2017, 2018, 2019, 2020</em></ins></span> Free
Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -1044,7 +1055,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/18 23:01:25 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.it.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary-insecurity.it.po 18 Dec 2019 23:01:25 -0000 1.157
+++ proprietary-insecurity.it.po 24 Feb 2020 17:03:37 -0000 1.158
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:13+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -125,6 +125,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1463,13 +1480,13 @@
"traduzioni</a>."
#. type: Content of: <div><p>
-# | Copyright © 201[-4-]{+3+}, 2015, 2016, [-2017-] {+2017, 2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 201[-4-]{+3+}, 2015, 2016, [-2017-] {+2017, 2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary-insecurity.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja-diff.html,v
retrieving revision 1.72
retrieving revision 1.73
diff -u -b -r1.72 -r1.73
--- proprietary-insecurity.ja-diff.html 31 Dec 2019 01:04:21 -0000 1.72
+++ proprietary-insecurity.ja-diff.html 24 Feb 2020 17:03:37 -0000 1.73
@@ -111,35 +111,48 @@
its camera, speakers and microphones</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201908310"></em></ins></span>
- <p>A <span class="inserted"><ins><em>series of
vulnerabilities</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found</em></ins></span>
- in
-<span class="removed"><del><strong>Internet Explorer and Edge</a> allows
an attacker</strong></del></span> <span class="inserted"><ins><em>iOS allowed
attackers</em></ins></span> to <span class="removed"><del><strong>retrieve
-Microsoft account credentials, if</strong></del></span> <span
class="inserted"><ins><em>gain access to sensitive information
- including private messages, passwords, photos and contacts stored
on</em></ins></span>
- the <span class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>user's iMonster</a>.</p>
+<span class="removed"><del><strong><li>
+<p>A</strong></del></span>
- <p>The deep insecurity of iMonsters</em></ins></span> is <span
class="removed"><del><strong>tricked into visiting</strong></del></span> <span
class="inserted"><ins><em>even more pertinent given that
- Apple's proprietary software makes users totally dependent on Apple
- for even</em></ins></span> a
-<span class="removed"><del><strong>malicious link.</p>
+ <span class="inserted"><ins><em><li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.zdnet.com/article/windows-attack-can-steal-your-username-password-and-other-logins/">flaw
in
+Internet Explorer</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>,</em></ins></span> and <span
class="removed"><del><strong>Edge</a> allows an
attacker</strong></del></span> <span class="inserted"><ins><em>snoop on the
household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be
sufficient</em></ins></span> to <span class="removed"><del><strong>retrieve
+Microsoft account credentials,</strong></del></span> <span
class="inserted"><ins><em>carry
+ out any significant surveillance</em></ins></span> if the <span
class="removed"><del><strong>user is tricked into visiting a
+malicious link.</p>
</li>
<li>
<p><a
href="https://techcrunch.com/2016/07/29/research-shows-deleted-whatsapp-messages-arent-actually-deleted/">“Deleted”
-WhatsApp messages are</strong></del></span> <span
class="inserted"><ins><em>modicum of security. It also means that the devices
do</em></ins></span>
- not <span class="removed"><del><strong>entirely deleted</a>. They
can be recovered
+WhatsApp messages</strong></del></span> <span
class="inserted"><ins><em>devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they</em></ins></span> are <span
class="removed"><del><strong>not entirely deleted</a>. They can be
recovered
in various ways.
-</p>
-</li>
+</p></strong></del></span> <span class="inserted"><ins><em>also used by
their
+ manufacturers for snooping.</p></em></ins></span>
+ </li>
-<li>
-<p>A vulnerability in Apple's Image I/O API allowed an
attacker</strong></del></span> <span class="inserted"><ins><em>even
try</em></ins></span> to
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201908310"></em></ins></span>
+ <p>A <span
class="removed"><del><strong>vulnerability</strong></del></span> <span
class="inserted"><ins><em>series of vulnerabilities <a
+
href="https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/">found</em></ins></span>
+ in <span class="removed"><del><strong>Apple's Image I/O
API</strong></del></span> <span class="inserted"><ins><em>iOS</em></ins></span>
allowed <span class="removed"><del><strong>an attacker</strong></del></span>
<span class="inserted"><ins><em>attackers</em></ins></span> to
<span class="removed"><del><strong><a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
- malacious code from any application</strong></del></span> <span
class="inserted"><ins><em>offer security against Apple itself.</p>
+ malacious code from any application</strong></del></span> <span
class="inserted"><ins><em>gain access to sensitive information
+ including private messages, passwords, photos and contacts stored on
+ the user's iMonster</a>.</p>
+
+ <p>The deep insecurity of iMonsters is even more pertinent given that
+ Apple's proprietary software makes users totally dependent on Apple
+ for even a modicum of security. It also means that the devices do
+ not even try to offer security against Apple itself.</p>
</li>
<li id="M201908020">
@@ -972,7 +985,7 @@
There is more detail about copyright years in the GNU Maintainers
Information document, www.gnu.org/prep/maintain. -->
-<p>Copyright © 2013, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017, 2018, 2019</em></ins></span> Free
Software Foundation, Inc.</p>
+<p>Copyright © 2013, 2015, <span
class="removed"><del><strong>2016</strong></del></span> <span
class="inserted"><ins><em>2016, 2017, 2018, 2019, 2020</em></ins></span> Free
Software Foundation, Inc.</p>
<p>This page is licensed under a <a rel="license"
<span
class="removed"><del><strong>href="http://creativecommons.org/licenses/by-nd/4.0/">Creative</strong></del></span>
@@ -983,7 +996,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2019/12/31 01:04:21 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-insecurity.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ja.po,v
retrieving revision 1.130
retrieving revision 1.131
diff -u -b -r1.130 -r1.131
--- proprietary-insecurity.ja.po 31 Dec 2019 01:04:21 -0000 1.130
+++ proprietary-insecurity.ja.po 24 Feb 2020 17:03:37 -0000 1.131
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2016-10-31 12:56+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -107,6 +107,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1062,7 +1079,7 @@
#| msgid ""
#| "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr "Copyright © 2014, 2015, 2016, 2017 Free Software Foundation, Inc."
Index: proprietary-insecurity.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.pot,v
retrieving revision 1.96
retrieving revision 1.97
diff -u -b -r1.96 -r1.97
--- proprietary-insecurity.pot 18 Dec 2019 23:01:25 -0000 1.96
+++ proprietary-insecurity.pot 24 Feb 2020 17:03:37 -0000 1.97
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -81,6 +81,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a "
+"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\">
"
+"access the user's wifi password</a>, and snoop on the household through "
+"connected surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack "
+"this. Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A series of vulnerabilities <a "
"href=\"https://www.forbes.com/sites/gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-xr-update/\">found
"
"in iOS allowed attackers to gain access to sensitive information including "
@@ -843,7 +860,7 @@
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
Index: proprietary-insecurity.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-insecurity.ru.po,v
retrieving revision 1.239
retrieving revision 1.240
diff -u -b -r1.239 -r1.240
--- proprietary-insecurity.ru.po 19 Dec 2019 06:59:30 -0000 1.239
+++ proprietary-insecurity.ru.po 24 Feb 2020 17:03:37 -0000 1.240
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-insecurity.html\n"
-"POT-Creation-Date: 2019-12-18 22:55+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2018-12-02 17:17+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Insecurity - GNU Project - Free Software Foundation"
@@ -112,6 +113,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"A series of vulnerabilities <a href=\"https://www.forbes.com/sites/"
"gordonkelly/2019/08/31/apple-iphone-ipad-security-ios-upgrade-iphone-xs-max-"
"xr-update/\">found in iOS allowed attackers to gain access to sensitive "
@@ -1255,10 +1273,10 @@
# type: Content of: <div><p>
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
#. type: Content of: <div><p>
Index: proprietary-surveillance.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de-diff.html,v
retrieving revision 1.107
retrieving revision 1.108
diff -u -b -r1.107 -r1.108
--- proprietary-surveillance.de-diff.html 21 Feb 2020 23:32:16 -0000
1.107
+++ proprietary-surveillance.de-diff.html 24 Feb 2020 17:03:37 -0000
1.108
@@ -1386,193 +1386,119 @@
app <span class="removed"><del><strong>tracks</strong></del></span> <span
class="inserted"><ins><em>is mandatory at some workplaces.</p>
<p>Note: The</em></ins></span> <a <span
class="removed"><del><strong>href="https://techcrunch.com/2016/11/28/uber-background-location-data-collection/">clients'
- movements before and after the ride</a>.</p>
-
- <p>This example illustrates how
“getting</strong></del></span>
+ movements before and</strong></del></span>
<span
class="inserted"><ins><em>href="http://web-old.archive.org/web/20191015005153/https://www.washingtonpost.com/world/asia_pacific/chinese-app-on-xis-ideology-allows-data-access-to-100-million-users-phones-report-says/2019/10/11/2d53bbae-eb4d-11e9-bafb-da248f8d5734_story.html">
- Washington Post version of</em></ins></span> the <span
class="removed"><del><strong>user's consent”
- for surveillance is inadequate as</strong></del></span> <span
class="inserted"><ins><em>article</a> (partly obfuscated, but
- readable after copy-pasting in</em></ins></span> a <span
class="removed"><del><strong>protection against massive
- surveillance.</p>
- </li>
-
- <li><p>Google's new voice messaging app <a
href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
- all conversations</a>.</p>
- </li>
-
- <li><p>Apps</strong></del></span> <span
class="inserted"><ins><em>text editor) includes a clarification
- saying</em></ins></span> that <span class="removed"><del><strong>include
- <a
href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
- Symphony surveillance software snoop</strong></del></span> <span
class="inserted"><ins><em>the tests were only performed</em></ins></span> on
<span class="removed"><del><strong>what radio</strong></del></span> <span
class="inserted"><ins><em>the Android version
- of the app,</em></ins></span> and <span class="removed"><del><strong>TV
programs
- are playing nearby</a>. Also on what users
post</strong></del></span> <span class="inserted"><ins><em>that, according to
Apple, “this kind of
- ‘superuser’ surveillance could not be
conducted</em></ins></span> on <span class="removed"><del><strong>various sites
- such as Facebook, Google+ and Twitter.</p></strong></del></span>
- <span class="inserted"><ins><em>Apple's operating
system.”</p></em></ins></span>
- </li>
-
- <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909091">
- <p>The Facebook</em></ins></span> app <a
-<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
-scans your mobile phone's photo collections for known faces</a>,
- and suggests you to share the picture you take according to
who</strong></del></span>
- <span
class="inserted"><ins><em>href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
- tracks users even when it</em></ins></span> is <span
class="removed"><del><strong>in the frame.</p>
-
- <p>This spyware feature seems to require online access to some
- known-faces database, which means the pictures are likely to be
- sent across</strong></del></span> <span class="inserted"><ins><em>turned
off</a>, after tricking them
- into giving</em></ins></span> the <span
class="removed"><del><strong>wire</strong></del></span> <span
class="inserted"><ins><em>app broad permissions in order</em></ins></span> to
<span class="removed"><del><strong>Facebook's servers</strong></del></span>
<span class="inserted"><ins><em>use one of its
+ Washington Post version of the article</a> (partly obfuscated, but
+ readable</em></ins></span> after <span
class="inserted"><ins><em>copy-pasting in a text editor) includes a
clarification
+ saying that</em></ins></span> the <span
class="removed"><del><strong>ride</a>.</p>
+
+ <p>This example illustrates how
“getting</strong></del></span> <span class="inserted"><ins><em>tests were
only performed on</em></ins></span> the <span
class="removed"><del><strong>user's consent”
+ for</strong></del></span> <span class="inserted"><ins><em>Android
version
+ of the app, and that, according to Apple, “this kind of
+ ‘superuser’</em></ins></span> surveillance <span
class="inserted"><ins><em>could not be conducted on
+ Apple's operating system.”</p>
+ </li>
+
+ <li id="M201909091">
+ <p>The Facebook app <a
+
href="https://eu.usatoday.com/story/tech/talkingtech/2019/09/09/facebook-app-social-network-tracking-your-every-move/2270305001/">
+ tracks users even when it</em></ins></span> is <span
class="removed"><del><strong>inadequate as</strong></del></span> <span
class="inserted"><ins><em>turned off</a>, after tricking them
+ into giving the app broad permissions in order to use one of its
functionalities.</p>
</li>
<li id="M201909090">
- <p>Some nonfree period-tracking apps including MIA
Fem</em></ins></span> and <span class="removed"><del><strong>face-recognition
- algorithms.</p>
-
- <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>Maya <a
+ <p>Some nonfree period-tracking apps including MIA Fem and Maya <a
href="https://www.buzzfeednews.com/article/meghara/period-tracker-apps-facebook-maya-mia-fem">
- send intimate details</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> users' <span
class="removed"><del><strong>pictures are private
- anymore, even if the user didn't “upload”
them</strong></del></span> <span
class="inserted"><ins><em>lives</em></ins></span> to <span
class="removed"><del><strong>the service.</p></strong></del></span> <span
class="inserted"><ins><em>Facebook</a>.</p></em></ins></span>
+ send intimate details of users' lives to Facebook</a>.</p>
</li>
- <span class="removed"><del><strong><li><p>Like most “music
screaming” disservices, Spotify
- is based on</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201909060">
- <p>Keeping track of who downloads a</em></ins></span> proprietary
<span class="removed"><del><strong>malware (DRM and snooping). In August
- 2015 it <a
-href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
- demanded users submit to increased snooping</a>, and some
- are starting to realize that it</strong></del></span>
- <span class="inserted"><ins><em>program</em></ins></span> is <span
class="removed"><del><strong>nasty.</p>
-
- <p>This article shows the <a
-href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
- twisted ways that they present snooping as</strong></del></span> a <span
class="removed"><del><strong>way
- to “serve” users better</a>—never mind
- whether they want that. This</strong></del></span> <span
class="inserted"><ins><em>form of surveillance. There</em></ins></span> is a
<span class="removed"><del><strong>typical example of
- the attitude of the proprietary software industry towards
- those they have subjugated.</p>
-
- <p>Out, out, damned Spotify!</p>
- </li>
- <li><p>Many</strong></del></span>
- proprietary <span class="removed"><del><strong>apps</strong></del></span>
<span class="inserted"><ins><em>program</em></ins></span> for <span
class="removed"><del><strong>mobile devices report which other
- apps</strong></del></span> <span class="inserted"><ins><em>adjusting a
certain telescopic rifle sight. <a
+ <li id="M201909060">
+ <p>Keeping track of who downloads</em></ins></span> a <span
class="removed"><del><strong>protection</strong></del></span> <span
class="inserted"><ins><em>proprietary
+ program is a form of surveillance. There is a
+ proprietary program for adjusting a certain telescopic rifle sight. <a
href="https://www.forbes.com/sites/thomasbrewster/2019/09/06/exclusive-feds-demand-apple-and-google-hand-over-names-of-10000-users-of-a-gun-scope-app/">
- A US prosecutor has demanded</em></ins></span> the <span
class="removed"><del><strong>user</strong></del></span> <span
class="inserted"><ins><em>list of all the 10,000 or more people
+ A US prosecutor has demanded the list of all the 10,000 or more people
who have installed it</a>.</p>
- <p>With a free program there would not be a list of
who</em></ins></span> has
- <span class="removed"><del><strong>installed.</strong></del></span> <span
class="inserted"><ins><em>installed
+ <p>With a free program there would not be a list of who has installed
it.</p>
</li>
<li id="M201907081">
- <p>Many unscrupulous mobile-app developers keep finding ways
to</em></ins></span> <a <span
class="removed"><del><strong>href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
- is doing this in a way that at least is visible</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
- bypass user's settings</a>, regulations,</em></ins></span> and
- <span class="removed"><del><strong>optional</a>.
Not</strong></del></span> <span class="inserted"><ins><em>privacy-enhancing
features
- of the operating system, in order to gather</em></ins></span> as <span
class="removed"><del><strong>bad</strong></del></span> <span
class="inserted"><ins><em>much private data</em></ins></span> as <span
class="removed"><del><strong>what</strong></del></span>
- <span class="inserted"><ins><em>they possibly can.</p>
-
- <p>Thus, we can't trust rules against spying. What we can trust is
- having control over</em></ins></span> the <span
class="removed"><del><strong>others do.</p>
- </li>
-
- <li><p>FTC says most mobile apps for children don't respect
privacy:
- <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
-
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p></strong></del></span>
<span class="inserted"><ins><em>software we run.</p></em></ins></span>
+ <p>Many unscrupulous mobile-app developers keep finding ways to <a
+
href="https://www.cnet.com/news/more-than-1000-android-apps-harvest-your-data-even-after-you-deny-permissions/">
+ bypass user's settings</a>, regulations, and privacy-enhancing
features
+ of the operating system, in order to gather as much private data as
+ they possibly can.</p>
+
+ <p>Thus, we can't trust rules</em></ins></span> against <span
class="removed"><del><strong>massive
+ surveillance.</p></strong></del></span> <span
class="inserted"><ins><em>spying. What we can trust is
+ having control over the software we run.</p></em></ins></span>
</li>
- <span class="removed"><del><strong><li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
- QR-code scanner</strong></del></span>
+ <span class="removed"><del><strong><li><p>Google's new voice
messaging</strong></del></span>
<span class="inserted"><ins><em><li id="M201907080">
- <p>Many Android</em></ins></span> apps <span
class="removed"><del><strong>snoop on</strong></del></span> <span
class="inserted"><ins><em>can track
- users' movements even when</em></ins></span> the <span
class="removed"><del><strong>user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>user says <a
+ <p>Many Android apps can track
+ users' movements even when the user says <a
href="https://www.theverge.com/2019/7/8/20686514/android-covert-channel-permissions-data-collection-imei-ssid-location">
- not</em></ins></span> to
- <span class="removed"><del><strong>the snooping done by the phone
company, and perhaps by the OS</strong></del></span> <span
class="inserted"><ins><em>allow them access to locations</a>.</p>
+ not to allow them access to locations</a>.</p>
- <p>This involves an apparently unintentional
weakness</em></ins></span> in <span class="removed"><del><strong>the
- phone.</p>
-
- <p>Don't be distracted</strong></del></span> <span
class="inserted"><ins><em>Android,
- exploited intentionally</em></ins></span> by <span
class="removed"><del><strong>the question of whether the app developers get
- users to say “I agree”. That is no excuse for
malware.</p></strong></del></span> <span
class="inserted"><ins><em>malicious apps.</p></em></ins></span>
+ <p>This involves an apparently unintentional weakness in Android,
+ exploited intentionally by malicious apps.</p>
</li>
- <span class="removed"><del><strong><li><p>The Brightest
Flashlight</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201905300">
- <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
- sends user data, including geolocation,</strong></del></span>
+ <li id="M201905300">
+ <p>The Femm “fertility”</em></ins></span> app <span
class="inserted"><ins><em>is secretly a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theverge.com/2016/9/21/12994362/allo-privacy-message-logs-google">logs
+ all conversations</a>.</p></strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theguardian.com/world/2019/may/30/revealed-womens-fertility-app-is-funded-by-anti-abortion-campaigners">
- tool</em></ins></span> for <span
class="removed"><del><strong>use</strong></del></span> <span
class="inserted"><ins><em>propaganda</a></em></ins></span> by <span
class="removed"><del><strong>companies.</a></p>
-
- <p>The FTC criticized this app because it asked the
user</strong></del></span> <span class="inserted"><ins><em>natalist Christians.
It spreads distrust
+ tool for propaganda</a> by natalist Christians. It spreads distrust
for contraception.</p>
<p>It snoops on users, too, as you must expect from nonfree
- programs.</p>
+ programs.</p></em></ins></span>
</li>
- <li id="M201905060">
- <p>BlizzCon 2019 imposed a <a
-
href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
- requirement</em></ins></span> to
- <span class="removed"><del><strong>approve sending personal
data</strong></del></span> <span class="inserted"><ins><em>run a proprietary
phone app</a></em></ins></span> to <span class="inserted"><ins><em>be
allowed into</em></ins></span>
- the <span class="inserted"><ins><em>event.</p>
-
- <p>This</em></ins></span> app <span
class="removed"><del><strong>developer but did not
- ask about sending it to other companies. This shows the
- weakness</strong></del></span> <span class="inserted"><ins><em>is a
spyware that can snoop on a lot</em></ins></span> of
- <span class="inserted"><ins><em>sensitive data, including user's location
and contact list, and has <a
+ <span class="removed"><del><strong><li><p>Apps that
include</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201905060">
+ <p>BlizzCon 2019 imposed a</em></ins></span> <a <span
class="removed"><del><strong>href="http://techaeris.com/2016/01/13/symphony-advanced-media-software-tracks-your-digital-life-through-your-smartphone-mic/">
+ Symphony surveillance software</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gaming/2019/05/blizzcon-2019-tickets-revolve-around-invasive-poorly-reviewed-smartphone-app/">
+ requirement to run a proprietary phone app</a> to be allowed into
+ the event.</p>
+
+ <p>This app is a spyware that can snoop on a lot of
+ sensitive data, including user's location and contact list, and has <a
href="https://old.reddit.com/r/wow/comments/bkd5ew/you_need_to_have_a_phone_to_attend_blizzcon_this/emg38xv/">
- near-complete control</a> over</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
- “solution”</strong></del></span> <span
class="inserted"><ins><em>phone.</p>
+ near-complete control</a> over the phone.</p>
</li>
<li id="M201904131">
<p>Data collected by menstrual and pregnancy monitoring apps is
often <a
href="https://www.theguardian.com/world/2019/apr/13/theres-a-dark-side-to-womens-health-apps-menstrual-surveillance">
- available</em></ins></span> to <span
class="removed"><del><strong>surveillance: why should</strong></del></span>
<span class="inserted"><ins><em>employers and insurance companies</a>.
Even though the
+ available to employers and insurance companies</a>. Even though the
data is “anonymized and aggregated,” it can easily be
traced back to the woman who uses the app.</p>
<p>This has harmful implications for women's rights to equal
employment
and freedom to make their own pregnancy choices. Don't use
- these apps, even if someone offers you</em></ins></span> a <span
class="removed"><del><strong>flashlight
- app send any information</strong></del></span> <span
class="inserted"><ins><em>reward</em></ins></span> to <span
class="removed"><del><strong>anyone?</strong></del></span> <span
class="inserted"><ins><em>do so.</em></ins></span> A <span
class="removed"><del><strong>free software flashlight</strong></del></span>
- <span class="inserted"><ins><em>free-software</em></ins></span> app <span
class="removed"><del><strong>would not.</p></strong></del></span> <span
class="inserted"><ins><em>that does more or less the same thing without
+ these apps, even if someone offers you a reward to do so. A
+ free-software app that does more or less the same thing without
spying on you is available from <a
href="https://search.f-droid.org/?q=menstr">F-Droid</a>, and <a
href="https://www.bloomberg.com/news/audio/2019-04-10/building-a-better-period-tracking-app-podcast">
- a new one is being developed</a>.</p></em></ins></span>
+ a new one is being developed</a>.</p>
</li>
-<span class="removed"><del><strong></ul>
-<div class="big-subsection">
- <h4 id="SpywareInToys">Spyware</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201904130">
+ <li id="M201904130">
<p>Google tracks the movements of Android phones and iPhones
running Google apps, and sometimes <a
href="https://www.nytimes.com/interactive/2019/04/13/us/google-location-tracking-police.html">
saves the data for years</a>.</p>
- <p>Nonfree software</em></ins></span> in <span
class="removed"><del><strong>Toys</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
-</div>
-
-<ul>
-
- <li></strong></del></span> <span class="inserted"><ins><em>the phone
has to be responsible for sending
+ <p>Nonfree software in the phone has to be responsible for sending
the location data to Google.</p>
</li>
@@ -1586,8 +1512,8 @@
surveillance on which the user has absolutely no control.</p>
</li>
- <li id="M201903201"></em></ins></span>
- <p>A <span class="removed"><del><strong>remote-control sex toy
was</strong></del></span> <span class="inserted"><ins><em>study of 24
“health” apps</em></ins></span> found <span
class="inserted"><ins><em>that 19 of them <a
+ <li id="M201903201">
+ <p>A study of 24 “health” apps found that 19 of them
<a
href="https://motherboard.vice.com/en_us/article/pan9e8/health-apps-can-share-your-data-everywhere-new-study-shows">
send sensitive personal data to third parties</a>, which can use it
for invasive advertising or discriminating against people in poor
@@ -2326,204 +2252,339 @@
information with online social media participation, Tivo can now <a
href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
correlate TV advertisement with online purchases</a>, exposing all
- users</em></ins></span> to <span class="removed"><del><strong>make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
- of the conversation between two
users</a>.</p></strong></del></span> <span
class="inserted"><ins><em>new combined surveillance by
default.</p></em></ins></span>
+ users to new combined surveillance by default.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>The</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201507240">
- <p>Vizio</em></ins></span> “smart” <span
class="removed"><del><strong>toys My Friend Cayla</strong></del></span> <span
class="inserted"><ins><em>TVs recognize</em></ins></span> and <span
class="removed"><del><strong>i-Que transmit</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,
- a speech recognition company based in the U.S.</p>
-
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control the toys with</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
- what people are watching</a>, even if it isn't</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
- enable crackers to listen in</strong></del></span> <span
class="inserted"><ins><em>TV channel.</p>
+ <li id="M201507240">
+ <p>Vizio “smart” TVs recognize and <a
+ href="http://www.engadget.com/2015/07/24/vizio-ipo-inscape-acr/">track
+ what people are watching</a>, even if it isn't a TV
channel.</p>
</li>
<li id="M201505290">
<p>Verizon cable TV <a
href="http://arstechnica.com/business/2015/05/verizon-fios-reps-know-what-tv-channels-you-watch/">
- snoops</em></ins></span> on <span class="removed"><del><strong>a child's
speech,</strong></del></span> <span class="inserted"><ins><em>what programs
people watch,</em></ins></span> and even <span
class="removed"><del><strong>speak
- into the toys themselves.</p></strong></del></span> <span
class="inserted"><ins><em>what they wanted to
- record</a>.</p></em></ins></span>
+ snoops on what programs people watch, and even what they wanted to
+ record</a>.</p>
</li>
- <span class="removed"><del><strong><li>
- <p>A computerized vibrator</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201504300">
- <p>Vizio</em></ins></span> <a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on</strong></del></span>
- <span
class="inserted"><ins><em>href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
- used a firmware “upgrade” to make</em></ins></span> its <span
class="inserted"><ins><em>TVs snoop on what</em></ins></span>
- users <span class="removed"><del><strong>through the proprietary control
app</a>.</p></strong></del></span> <span
class="inserted"><ins><em>watch</a>. The TVs did not do that when first
sold.</p>
- </li>
-
- <li id="M201502090"></em></ins></span>
- <p>The <span class="removed"><del><strong>app was
reporting</strong></del></span> <span class="inserted"><ins><em>Samsung
“Smart” TV <a
-
href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
- transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>temperature of</strong></del></span> <span
class="inserted"><ins><em>internet to another company, Nuance</a>.
- Nuance can save it and would then have to give it to</em></ins></span> the
<span class="removed"><del><strong>vibrator minute by
- minute (thus, indirectly, whether</strong></del></span> <span
class="inserted"><ins><em>US or some
- other government.</p>
+ <li id="M201504300">
+ <p>Vizio <a
+
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+ used a firmware “upgrade” to make its TVs</em></ins></span>
snoop on what <span class="removed"><del><strong>radio and TV programs
+ are playing nearby</a>. Also on what</strong></del></span>
+ users <span class="removed"><del><strong>post on various sites
+ such as Facebook, Google+ and Twitter.</p></strong></del></span>
<span class="inserted"><ins><em>watch</a>. The TVs did not do that when
first sold.</p></em></ins></span>
+ </li>
- <p>Speech recognition is not to be trusted unless</em></ins></span>
it <span class="removed"><del><strong>was surrounded</strong></del></span>
<span class="inserted"><ins><em>is done</em></ins></span> by <span
class="removed"><del><strong>a person's
- body), as well as the vibration frequency.</p>
+ <span class="removed"><del><strong><li><p>Facebook's new Magic
Photo app</strong></del></span>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about
- their products, rather than</strong></del></span> free
- software <span class="removed"><del><strong>which users could have
- checked and changed.</p>
+ <span class="inserted"><ins><em><li id="M201502090">
+ <p>The Samsung “Smart” TV</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160605165148/http://www.theregister.co.uk/2015/11/10/facebook_scans_camera_for_your_friends/">
+scans your mobile phone's photo collections for known faces</a>,
+ and suggests you to share</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.consumerreports.org/cro/news/2015/02/who-s-the-third-party-that-samsung-and-lg-smart-tvs-are-sharing-your-voice-data-with/index.htm">
+ transmits users' voice on</em></ins></span> the <span
class="removed"><del><strong>picture you take according</strong></del></span>
<span class="inserted"><ins><em>internet</em></ins></span> to <span
class="removed"><del><strong>who
+ is in the frame.</p>
+
+ <p>This spyware feature seems</strong></del></span> <span
class="inserted"><ins><em>another company, Nuance</a>.
+ Nuance can save it and would then have</em></ins></span> to <span
class="removed"><del><strong>require online access</strong></del></span> <span
class="inserted"><ins><em>give it</em></ins></span> to <span
class="removed"><del><strong>some
+ known-faces database, which means</strong></del></span> the <span
class="removed"><del><strong>pictures are likely</strong></del></span> <span
class="inserted"><ins><em>US or some
+ other government.</p>
- <p>The company</strong></del></span> <span
class="inserted"><ins><em>in your own computer.</p>
+ <p>Speech recognition is not</em></ins></span> to be
+ <span class="removed"><del><strong>sent across the
wire</strong></del></span> <span class="inserted"><ins><em>trusted unless it is
done by free
+ software in your own computer.</p>
- <p>In its privacy policy, Samsung explicitly
confirms</em></ins></span> that <span
class="removed"><del><strong>made</strong></del></span> <span
class="inserted"><ins><em><a
+ <p>In its privacy policy, Samsung explicitly confirms that <a
href="http://theweek.com/speedreads/538379/samsung-warns-customers-not-discuss-personal-information-front-smart-tvs">voice
- data containing sensitive information will be transmitted to third
+ data containing sensitive information will be
transmitted</em></ins></span> to <span class="removed"><del><strong>Facebook's
servers and face-recognition
+ algorithms.</p>
+
+ <p>If so, none</strong></del></span> <span
class="inserted"><ins><em>third
parties</a>.</p>
</li>
<li id="M201411090">
<p>The Amazon “Smart” TV is <a
href="http://www.theguardian.com/technology/shortcuts/2014/nov/09/amazon-echo-smart-tv-watching-listening-surveillance">
- snooping all</em></ins></span> the <span
class="removed"><del><strong>vibrator</strong></del></span> <span
class="inserted"><ins><em>time</a>.</p>
+ snooping all the time</a>.</p>
</li>
<li id="M201409290">
- <p>More or less all “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
+ <p>More or less all “smart” TVs <a
+
href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
- <p>The report</em></ins></span> was <span
class="removed"><del><strong>sued for collecting lots</strong></del></span>
<span class="inserted"><ins><em>as</em></ins></span> of <span
class="removed"><del><strong>personal information about how
- people used it</a>.</p>
-
- <p>The company's statement</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
+ <p>The report was as</em></ins></span> of <span
class="removed"><del><strong>Facebook</strong></del></span> <span
class="inserted"><ins><em>2014, but we don't expect this has got
better.</p>
- <p>This shows</em></ins></span> that <span
class="removed"><del><strong>it was anonymizing the</strong></del></span> <span
class="inserted"><ins><em>laws requiring products to get users' formal
- consent before collecting personal</em></ins></span> data <span
class="removed"><del><strong>may be
- true, but it doesn't really matter. If it had sold</strong></del></span>
<span class="inserted"><ins><em>are totally inadequate.
- And what happens if a user declines consent? Probably</em></ins></span>
the <span class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>TV will
- say, “Without your consent</em></ins></span> to <span
class="removed"><del><strong>a
- data broker,</strong></del></span> <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>data broker</strong></del></span> <span
class="inserted"><ins><em>TV will not
- work.”</p>
+ <p>This shows that laws requiring products to get</em></ins></span>
users' <span class="removed"><del><strong>pictures</strong></del></span> <span
class="inserted"><ins><em>formal
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>private
+ anymore, even</strong></del></span> <span
class="inserted"><ins><em>totally inadequate.
+ And what happens</em></ins></span> if <span
class="removed"><del><strong>the</strong></del></span> <span
class="inserted"><ins><em>a</em></ins></span> user <span
class="removed"><del><strong>didn't “upload”
them</strong></del></span> <span class="inserted"><ins><em>declines consent?
Probably the TV will
+ say, “Without your consent</em></ins></span> to <span
class="inserted"><ins><em>tracking,</em></ins></span> the <span
class="removed"><del><strong>service.</p>
+ </li>
- <p>Proper laws</em></ins></span> would <span
class="removed"><del><strong>have been able</strong></del></span> <span
class="inserted"><ins><em>say that TVs are not allowed</em></ins></span> to
<span class="removed"><del><strong>figure out
- who</strong></del></span> <span class="inserted"><ins><em>report
what</em></ins></span> the
- user <span class="removed"><del><strong>was.</p>
+ <li><p>Like most “music screaming” disservices,
Spotify
+ is based on proprietary malware (DRM and snooping). In August
+ 2015 it <a
+href="http://www.theguardian.com/technology/2015/aug/21/spotify-faces-user-backlash-over-new-privacy-policy">
+ demanded users submit</strong></del></span> <span
class="inserted"><ins><em>TV will not
+ work.”</p>
- <p>Following this lawsuit,</strong></del></span> <span
class="inserted"><ins><em>watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>increased
snooping</a>,</strong></del></span> <span
class="inserted"><ins><em>report what the
+ user watches—no exceptions!</p>
</li>
<li id="M201405200">
- <p>Spyware in LG “smart” TVs</em></ins></span> <a
<span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits"></strong></del></span>
- <span
class="inserted"><ins><em>href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what</em></ins></span> the <span
class="removed"><del><strong>company has been ordered</strong></del></span>
<span class="inserted"><ins><em>user watches, and the switch</em></ins></span>
to <span class="removed"><del><strong>pay</strong></del></span> <span
class="inserted"><ins><em>turn this off has
- no effect</a>. (The fact that the transmission
reports</em></ins></span> a <span class="removed"><del><strong>total of
C$4m</a>
- to its customers.</p>
+ <p>Spyware in LG “smart” TVs <a
+
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
+ reports what the user watches,</em></ins></span> and <span
class="removed"><del><strong>some
+ are starting</strong></del></span> <span class="inserted"><ins><em>the
switch</em></ins></span> to <span
class="removed"><del><strong>realize</strong></del></span> <span
class="inserted"><ins><em>turn this off has
+ no effect</a>. (The fact that the transmission reports a 404 error
+ really means nothing; the server could save</em></ins></span> that <span
class="inserted"><ins><em>data anyway.)</p>
+
+ <p>Even worse,</em></ins></span> it <span
class="removed"><del><strong>is nasty.</p>
+
+ <p>This article shows</strong></del></span> <span
class="inserted"><ins><em><a
+
href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
+ snoops on other devices on</em></ins></span> the <span
class="inserted"><ins><em>user's local network</a>.</p>
+
+ <p>LG later said it had installed a patch to stop this, but any
+ product could spy this way.</p>
+
+ <p>Meanwhile, LG TVs</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://web.archive.org/web/20160313214751/http://www.theregister.co.uk/2015/08/21/spotify_worse_than_the_nsa/">
+ twisted ways that they present snooping as</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+ do lots of spying anyway</a>.</p>
</li>
- <li><p> “CloudPets” toys with microphones
- <a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak
childrens' conversations to</strong></del></span> <span
class="inserted"><ins><em>404 error
- really means nothing;</em></ins></span> the
- <span class="removed"><del><strong>manufacturer</a>. Guess
what?</strong></del></span> <span class="inserted"><ins><em>server could save
that data anyway.)</p>
+ <li id="M201212170">
+ <p id="break-security-smarttv"><a
+
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
+ Crackers found</em></ins></span> a way to <span
class="removed"><del><strong>“serve” users
better</a>—never mind
+ whether they want that. This is</strong></del></span> <span
class="inserted"><ins><em>break security on</em></ins></span> a <span
class="removed"><del><strong>typical example of
+ the attitude of</strong></del></span> <span
class="inserted"><ins><em>“smart” TV</a>
+ and use its camera to watch</em></ins></span> the <span
class="removed"><del><strong>proprietary software industry towards
+ those they have subjugated.</p>
- <p>Even worse, it</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers
found</strong></del></span>
- <span
class="inserted"><ins><em>href="http://rambles.renney.me/2013/11/lg-tv-logging-filenames-from-network-folders/">
- snoops on other devices on the user's local network</a>.</p>
+ <p>Out, out, damned Spotify!</p></strong></del></span> <span
class="inserted"><ins><em>people who are watching
TV.</p></em></ins></span>
+ </li>
+ <span class="removed"><del><strong><li><p>Many proprietary apps
for mobile</strong></del></span>
+<span class="inserted"><ins><em></ul>
- <p>LG later said it had installed</em></ins></span> a <span
class="removed"><del><strong>way</strong></del></span> <span
class="inserted"><ins><em>patch</em></ins></span> to <span
class="removed"><del><strong>access the data</a>
- collected by the manufacturer's snooping.</p>
- <p>That the manufacturer and the FBI</strong></del></span> <span
class="inserted"><ins><em>stop this, but any
- product</em></ins></span> could <span class="removed"><del><strong>listen
to these conversations
- was unacceptable by itself.</p></li>
+<div class="big-subsection">
+ <h4 id="SpywareInCameras">Cameras</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+</div>
- <li><p>Barbie</strong></del></span> <span
class="inserted"><ins><em>spy this way.</p>
+<ul class="blurbs">
+ <li id="M201901100">
+ <p>Amazon Ring “security”</em></ins></span> devices
<span class="removed"><del><strong>report</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>,</em></ins></span>
which <span class="removed"><del><strong>other
+ apps</strong></del></span> <span class="inserted"><ins><em>save it
+ long-term.</p>
- <p>Meanwhile, LG TVs</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
- do lots of spying anyway</a>.</p>
+ <p>In many cases,</em></ins></span> the <span
class="removed"><del><strong>user has
+ installed. <a
href="http://techcrunch.com/2014/11/26/twitter-app-graph/">Twitter
+ is doing this in a way</strong></del></span> <span
class="inserted"><ins><em>video shows everyone</em></ins></span> that <span
class="removed"><del><strong>at least is visible and
+ optional</a>. Not as bad as what</strong></del></span> <span
class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span class="removed"><del><strong>others
do.</p>
</li>
- <li id="M201212170">
- <p id="break-security-smarttv"><a
-
href="http://www.dailymail.co.uk/sciencetech/article-2249303/Hackers-penetrate-home-Crack-Samsungs-Smart-TV-allows-attacker-seize-control-microphone-cameras.html">
- Crackers found a way</em></ins></span> to <span
class="removed"><del><strong>spy</strong></del></span> <span
class="inserted"><ins><em>break security</em></ins></span> on <span
class="removed"><del><strong>children</strong></del></span> <span
class="inserted"><ins><em>a “smart” TV</a></em></ins></span>
- and <span
class="removed"><del><strong>adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>use its camera to watch the people who are
watching TV.</p></em></ins></span>
+ <li><p>FTC says most mobile apps for children don't respect
privacy:
+ <a
href="http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/">
+
http://arstechnica.com/information-technology/2012/12/ftc-disclosures-severely-lacking-in-kids-mobile-appsand-its-getting-worse/</a>.</p>
</li>
-</ul>
+ <li><p>Widely used <a
href="https://freedom-to-tinker.com/blog/kollarssmith/scan-this-or-scan-me-user-privacy-barcode-scanning-applications/">proprietary
+ QR-code scanner apps snoop</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
-<span class="removed"><del><strong><!-- #SpywareOnSmartWatches -->
-<!-- WEBMASTERS: make sure to place new items on top under each subsection
--></strong></del></span>
+ <p>The article focuses</em></ins></span> on <span
class="removed"><del><strong>the user</a>. This is in
addition</strong></del></span> <span class="inserted"><ins><em>how Ring
used</em></ins></span> to <span class="inserted"><ins><em>let individual
employees look
+ at</em></ins></span> the <span class="removed"><del><strong>snooping done
by the phone company, and perhaps by</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has tried to
prevent that
+ secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>OS in</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon
gets</em></ins></span> the
+ <span class="removed"><del><strong>phone.</p>
+ <p>Don't be distracted by</strong></del></span>
+ <span class="inserted"><ins><em>video—Amazon expects society to
surrender to.</p>
+ </li>
-<div <span class="removed"><del><strong>class="big-section">
- <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3></strong></del></span> <span
class="inserted"><ins><em>class="big-subsection">
- <h4 id="SpywareInCameras">Cameras</h4></em></ins></span>
- <span <span class="removed"><del><strong>class="anchor-reference-id">
- (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span></strong></del></span>
<span class="inserted"><ins><em>class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span></em></ins></span>
+ <li id="M201810300">
+ <p>Nearly all “home security cameras” <a
+
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
+ give</em></ins></span> the <span
class="removed"><del><strong>question</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy</em></ins></span> of
<span class="removed"><del><strong>whether</strong></del></span> <span
class="inserted"><ins><em>everything they
+ see</a>. “Home insecurity camera” would be a better
+ name!</p>
+
+ <p>When Consumer Reports tested them, it suggested that these
+ manufacturers promise not to look at what's in</em></ins></span> the <span
class="removed"><del><strong>app developers</strong></del></span> <span
class="inserted"><ins><em>videos. That's not
+ security for your home. Security means making sure they
don't</em></ins></span> get
+ <span class="removed"><del><strong>users</strong></del></span> to <span
class="removed"><del><strong>say “I agree”. That is no excuse for
malware.</p></strong></del></span>
+ <span class="inserted"><ins><em>see through your
camera.</p></em></ins></span>
+ </li>
+
+ <span class="removed"><del><strong><li><p>The Brightest
Flashlight app</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201603220">
+ <p>Over 70 brands of network-connected surveillance cameras
have</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.theguardian.com/technology/2013/dec/06/android-app-50m-downloads-sent-data-advertisers">
+ sends user data, including geolocation, for use by
companies.</a></p>
+
+ <p>The FTC criticized this app because it asked the user to
+ approve sending personal data</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+ security bugs that allow anyone</em></ins></span> to <span
class="inserted"><ins><em>watch through them</a>.</p>
+ </li>
+
+ <li id="M201511250">
+ <p>The Nest Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
+ even when</em></ins></span> the <span class="removed"><del><strong>app
developer but did not
+ ask about sending</strong></del></span> <span
class="inserted"><ins><em>“owner” switches</em></ins></span> it
<span class="removed"><del><strong>to other companies. This shows the
+ weakness of</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
+
+ <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>reject-it-if-you-dislike-snooping
+ “solution” to surveillance: why should a flashlight
+ app send any information</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using it</em></ins></span>
+ to <span class="removed"><del><strong>anyone? A free software flashlight
+ app would not.</p></strong></del></span> <span
class="inserted"><ins><em>outsmart you.</p></em></ins></span>
+ </li>
+</ul>
+
+
+<div class="big-subsection">
+ <h4 <span class="removed"><del><strong>id="SpywareInToys">Spyware in
Toys</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a
href="#SpywareInToys">#SpywareInToys</a>)</span>
</div>
-<span class="removed"><del><strong><div style="clear: left;"></div>
-<ul>
+<span class="removed"><del><strong><ul>
+
<li>
- <p>An LG “smart” watch is designed</strong></del></span>
+ <p>A remote-control sex toy was found to make <a
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
recordings
+ of the conversation between two users</a>.</p>
+ </li>
+
+ <li></strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html"></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send the video they capture</em></ins></span> to <span
class="removed"><del><strong>report its location</strong></del></span> <span
class="inserted"><ins><em>Amazon servers</a>, which save it
- long-term.</p>
+ <li id="M201711244"></em></ins></span>
+ <p>The <span class="removed"><del><strong>“smart” toys
My Friend Cayla and i-Que transmit
+ <a
href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
conversations to Nuance Communications</a>,</strong></del></span> <span
class="inserted"><ins><em>Furby Connect has</em></ins></span> a <span
class="removed"><del><strong>speech recognition company based in the
U.S.</p>
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by, the user's front door.</p>
+ <p>Those toys also contain major security vulnerabilities; crackers
+ can remotely control</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
+ universal back door</a>. If</em></ins></span> the <span
class="removed"><del><strong>toys with</strong></del></span> <span
class="inserted"><ins><em>product as shipped doesn't act as</em></ins></span> a
<span class="removed"><del><strong>mobile phone. This would
+ enable crackers</strong></del></span>
+ <span class="inserted"><ins><em>listening device, remote
changes</em></ins></span> to <span class="removed"><del><strong>listen in on a
child's speech, and even speak</strong></del></span> <span
class="inserted"><ins><em>the code could surely convert it</em></ins></span>
+ into <span class="inserted"><ins><em>one.</p>
+ </li>
- <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>someone else and</strong></del></span> <span
class="inserted"><ins><em>let individual employees look
- at the videos freely. It appears Amazon has tried</em></ins></span> to
<span class="removed"><del><strong>transmit
- conversations too</a>.</p>
+ <li id="M201711100">
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings of</em></ins></span> the <span
class="removed"><del><strong>toys themselves.</p></strong></del></span>
<span class="inserted"><ins><em>conversation between two
users</a>.</p></em></ins></span>
</li>
- <li>
- <p>A very cheap “smart watch” comes with an Android app
- <a
href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/"></strong></del></span>
<span class="inserted"><ins><em>prevent</em></ins></span> that <span
class="removed"><del><strong>connects</strong></del></span>
- <span class="inserted"><ins><em>secondary abuse, but the primary
abuse—that Amazon gets the
- video—Amazon expects society</em></ins></span> to <span
class="inserted"><ins><em>surrender to.</p>
+
+ <span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703140"></em></ins></span>
+ <p>A computerized vibrator <a
+
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
+ was snooping on its users through the proprietary control
app</a>.</p>
+
+ <p>The app was reporting the temperature of the vibrator minute by
+ minute (thus, indirectly, whether it was surrounded by a person's
+ body), as well as the vibration frequency.</p>
+
+ <p>Note the totally inadequate proposed response: a labeling
+ standard with which manufacturers would make statements about their
+ products, rather than free software which users could have checked
+ and changed.</p>
+
+ <p>The company that made the vibrator <a
+
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ was sued for collecting lots of personal information about how people
+ used it</a>.</p>
+
+ <p>The company's statement that it was anonymizing the data may be
+ true, but it doesn't really matter. If it had sold the data to a data
+ broker, the data broker would have been able to figure out who the
+ user was.</p>
+
+ <p>Following this lawsuit, <a
+
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
+ the company has been ordered to pay a total of C$4m</a> to its
+ customers.</p>
</li>
- <li id="M201810300">
- <p>Nearly all “home security cameras” <a
-
href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer</em></ins></span> an <span
class="removed"><del><strong>unidentified site in China</a>.</p>
- <p>The article says this is a back door, but that
could</strong></del></span> <span class="inserted"><ins><em>unencrypted copy of
everything they
- see</a>. “Home insecurity camera”
would</em></ins></span> be a
- <span class="removed"><del><strong>misunderstanding.
However,</strong></del></span> <span class="inserted"><ins><em>better
- name!</p>
+ <span class="removed"><del><strong><li><p>
“CloudPets”</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets”</em></ins></span> toys with microphones
<a <span
class="removed"><del><strong>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">leak</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
+ leak</em></ins></span> childrens' conversations to the
manufacturer</a>. Guess what? <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">Crackers</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
+ Crackers</em></ins></span> found a way to access the data</a>
collected by the
+ manufacturer's snooping.</p>
+
+ <p>That the manufacturer and the FBI could listen to these
+ conversations was unacceptable by <span
class="removed"><del><strong>itself.</p></li>
+
+ <li><p>Barbie
+ <a
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
going to spy on children and adults</a>.</p></strong></del></span>
<span class="inserted"><ins><em>itself.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong></ul>
+
+
+<!-- #SpywareOnSmartWatches -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
+
+<div class="big-section">
+ <h3 id="SpywareOnSmartWatches">Spyware on “Smart”
Watches</h3>
+ <span class="anchor-reference-id">
+ (<a
href="#SpywareOnSmartWatches">#SpywareOnSmartWatches</a>)</span>
+</div>
+<div style="clear: left;"></div>
- <p>When Consumer Reports tested them,</em></ins></span> it <span
class="removed"><del><strong>is certainly surveillance, at
+<ul>
+ <li>
+ <p>An LG</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201612060">
+ <p>The</em></ins></span> “smart” <span
class="removed"><del><strong>watch is designed
+ <a
href="http://www.huffingtonpost.co.uk/2014/07/09/lg-kizon-smart-watch_n_5570234.html">
+ to report its location to someone else</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla</em></ins></span> and <span
class="removed"><del><strong>to</strong></del></span> <span
class="inserted"><ins><em>i-Que</em></ins></span> transmit
+ <span class="removed"><del><strong>conversations
too</a>.</p>
+ </li>
+ <li>
+ <p>A very cheap “smart watch” comes with an Android
app</strong></del></span> <a <span
class="removed"><del><strong>href="https://www.theregister.co.uk/2016/03/02/chinese_backdoor_found_in_ebays_popular_cheap_smart_watch/">
+ that connects</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
+ conversations</em></ins></span> to <span class="removed"><del><strong>an
unidentified site in China</a>.</p>
+ <p>The article says this is a back door, but that could
be</strong></del></span> <span class="inserted"><ins><em>Nuance
Communications</a>,</em></ins></span> a
+ <span class="removed"><del><strong>misunderstanding. However, it is
certainly surveillance, at
least.</p>
</li>
</ul>
<!-- #SpywareAtLowLevel -->
-<!-- WEBMASTERS: make sure</strong></del></span> <span
class="inserted"><ins><em>suggested that these
- manufacturers promise not</em></ins></span> to <span
class="removed"><del><strong>place new items on top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
- <h3 id="SpywareAtLowLevel">Spyware</strong></del></span> <span
class="inserted"><ins><em>look</em></ins></span> at <span
class="removed"><del><strong>Low Level</h3>
+ <h3 id="SpywareAtLowLevel">Spyware at Low Level</h3>
<span class="anchor-reference-id">(<a
href="#SpywareAtLowLevel">#SpywareAtLowLevel</a>)</span>
</div>
<div style="clear: left;"></div>
<div class="big-subsection">
- <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>what's</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
+ <h4 id="SpywareInBIOS">Spyware</strong></del></span> <span
class="inserted"><ins><em>speech recognition
+ company based</em></ins></span> in <span
class="removed"><del><strong>BIOS</h4>
<span class="anchor-reference-id">(<a
href="#SpywareInBIOS">#SpywareInBIOS</a>)</span>
</div>
@@ -2532,15 +2593,14 @@
<a
href="http://www.computerworld.com/article/2984889/windows-pcs/lenovo-collects-usage-data-on-thinkpad-thinkcentre-and-thinkstation-pcs.html">
Lenovo stealthily installed crapware and spyware via BIOS</a> on Windows
installs.
Note that</strong></del></span> the <span
class="removed"><del><strong>specific sabotage method Lenovo used did not affect
-GNU/Linux; also, a “clean” Windows install
is</strong></del></span> <span class="inserted"><ins><em>videos.
That's</em></ins></span> not <span class="removed"><del><strong>really
+GNU/Linux; also, a “clean” Windows install is not really
clean since <a href="/proprietary/malware-microsoft.html">Microsoft
puts in its own malware</a>.
</p></li>
</ul>
<!-- #SpywareAtWork -->
-<!-- WEBMASTERS: make</strong></del></span>
- <span class="inserted"><ins><em>security for your home. Security means
making</em></ins></span> sure <span class="inserted"><ins><em>they don't
get</em></ins></span> to <span class="removed"><del><strong>place new items on
top under each subsection -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareAtWork">Spyware at Work</h3>
@@ -2550,242 +2610,181 @@
<ul>
<li><p>Investigation
- Shows</strong></del></span>
- <span class="inserted"><ins><em>see through your camera.</p>
- </li>
-
- <li id="M201603220">
- <p>Over 70 brands of network-connected surveillance cameras have
<a
-
href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
- security bugs that allow anyone to watch through them</a>.</p>
- </li>
-
- <li id="M201511250">
- <p>The Nest Cam “smart” camera is</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
+ Shows <a
href="https://www.techdirt.com/articles/20160602/17210734610/investigation-shows-gchq-using-us-companies-nsa-to-route-around-domestic-surveillance-restrictions.shtml">GCHQ
Using US Companies, NSA To Route Around Domestic Surveillance
Restrictions</a>.</p>
- <p>Specifically,</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.bbc.com/news/technology-34922712">always
watching</a>,
- even when the “owner” switches</em></ins></span> it <span
class="removed"><del><strong>can collect</strong></del></span> <span
class="inserted"><ins><em>“off.”</p>
+ <p>Specifically, it</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
- <p>A “smart” device means</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
- this way, because they pass</strong></del></span> <span
class="inserted"><ins><em>manufacturer is using</em></ins></span> it <span
class="removed"><del><strong>through Microsoft.</p></li>
+ <p>Those toys also contain major security vulnerabilities;
crackers</em></ins></span>
+ can <span class="removed"><del><strong>collect</strong></del></span> <span
class="inserted"><ins><em>remotely control</em></ins></span> the <span
class="removed"><del><strong>emails of members of Parliament
+ this way, because they pass it through Microsoft.</p></li>
+
+ <li><p>Spyware</strong></del></span> <span
class="inserted"><ins><em>toys with a mobile phone. This would enable
+ crackers to listen</em></ins></span> in <span
class="removed"><del><strong>Cisco TNP IP phones:</strong></del></span> <span
class="inserted"><ins><em>on a child's speech, and even speak into the
+ toys themselves.</p>
+ </li>
- <li><p>Spyware in Cisco TNP IP phones:
- <a
href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+ <li id="M201502180">
+ <p>Barbie</em></ins></span> <a <span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html</a></p></strong></del></span>
- <span class="inserted"><ins><em>to outsmart
you.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
+ going to spy on children and adults</a>.</p></em></ins></span>
</li>
</ul>
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInToys">Toys</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInToys">#SpywareInToys</a>)</span></em></ins></span>
+ <h4 <span class="removed"><del><strong>id="SpywareInSkype">Spyware in
Skype</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
+ <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInSkype">#SpywareInSkype</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
</div>
<span class="removed"><del><strong><ul>
- <li><p>Spyware in Skype:</strong></del></span>
+ <li><p>Spyware</strong></del></span>
<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201711244">
- <p>The Furby Connect has a</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
+ <li id="M201708040">
+ <p>While you're using a DJI drone
+ to snoop on other people, DJI is</em></ins></span> in <span
class="removed"><del><strong>Skype:
+ <a
href="http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/">
http://www.forbes.com/sites/petercohan/2013/06/20/project-chess-how-u-s-snoops-on-your-skype/</a>.
- Microsoft changed Skype</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.contextis.com/blog/dont-feed-them-after-midnight-reverse-engineering-the-furby-connect">
- universal back door</a>. If the product as shipped doesn't act as a
- listening device, remote changes to the code could surely convert it
- into one.</p>
- </li>
-
- <li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span>
<a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
+ Microsoft changed Skype</strong></del></span> <span
class="inserted"><ins><em>many cases</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.guardian.co.uk/world/2013/jul/11/microsoft-nsa-collaboration-user-data">
specifically for spying</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two
users</a>.</p></em></ins></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
-<span class="removed"><del><strong></ul>
-
-
-
-<!-- #SpywareOnTheRoad -->
-<!-- WEBMASTERS:</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201703140">
- <p>A computerized vibrator <a
-
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
-
- <p>The app was reporting the temperature of the vibrator minute by
- minute (thus, indirectly, whether it was surrounded by a person's
- body), as well as the vibration frequency.</p>
+</ul>
- <p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would</em></ins></span> make <span
class="removed"><del><strong>sure</strong></del></span> <span
class="inserted"><ins><em>statements about their
- products, rather than free software which users could have checked
- and changed.</p>
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
- was sued for collecting lots of personal information about how people
- used it</a>.</p>
- <p>The company's statement that it was anonymizing the data may be
- true, but it doesn't really matter. If it had sold the data to a data
- broker, the data broker would have been able to figure out who the
- user was.</p>
-
- <p>Following this lawsuit, <a
-
href="https://www.theguardian.com/technology/2017/mar/14/we-vibe-vibrator-tracking-users-sexual-habits">
- the company has been ordered to pay a total of
C$4m</a></em></ins></span> to <span class="removed"><del><strong>place
new items on top under each subsection -->
+<span class="removed"><del><strong><!-- #SpywareOnTheRoad -->
+<!-- WEBMASTERS: make sure to place new items on top under each subsection
-->
<div class="big-section">
<h3 id="SpywareOnTheRoad">Spyware on The Road</h3>
<span class="anchor-reference-id">(<a
href="#SpywareOnTheRoad">#SpywareOnTheRoad</a>)</span>
</div>
-<div style="clear: left;"></div>
+<div style="clear: left;"></div></strong></del></span>
+
<div class="big-subsection">
- <h4 id="SpywareInCameras">Spyware in Cameras</h4>
- <span class="anchor-reference-id">(<a
href="#SpywareInCameras">#SpywareInCameras</a>)</span>
+ <h4 <span class="removed"><del><strong>id="SpywareInCameras">Spyware
in Cameras</h4>
+ <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInCameras">#SpywareInCameras</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
</div>
-<ul>
+<span class="removed"><del><strong><ul>
<li>
- <p>Every “home security” camera,
if</strong></del></span> its <span class="removed"><del><strong>manufacturer
can communicate</strong></del></span>
- <span class="inserted"><ins><em>customers.</p>
+ <p>Every “home security” camera,</strong></del></span>
+
+<span class="inserted"><ins><em><ul class="blurbs">
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance</em></ins></span> if <span
class="removed"><del><strong>its manufacturer can
communicate</strong></del></span> <span class="inserted"><ins><em>the devices
implemented proper
+ security, including encryption. But many devices</em></ins></span> with
<span class="removed"><del><strong>it,</strong></del></span> <span
class="inserted"><ins><em>proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
- <li id="M201702280">
- <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>it,
- is a surveillance device.</strong></del></span> <span
class="inserted"><ins><em>microphones</em></ins></span> <a
-<span
class="removed"><del><strong>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary camera is an example</a>.</p>
- <p>The article describes wrongdoing by</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to</em></ins></span> the <span
class="removed"><del><strong>manufacturer, based on</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
-
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>fact
- that</strong></del></span> <span
class="inserted"><ins><em>data</a> collected by</em></ins></span> the
<span class="removed"><del><strong>device is tethered to a server.</p>
- <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates that</strong></del></span>
- <span class="inserted"><ins><em>manufacturer's snooping.</p>
+ <li id="M201907210">
+ <p>Google “Assistant” records users' conversations <a
+
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
+ when it</em></ins></span> is <span class="inserted"><ins><em>not supposed
to listen</a>. Thus, when one of Google's
+ subcontractors discloses</em></ins></span> a <span
class="removed"><del><strong>surveillance device. <a
+href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
+ Canary camera</strong></del></span> <span
class="inserted"><ins><em>thousand confidential voice recordings,
+ users were easily identified from these recordings.</p>
- <p>That</em></ins></span> the <span
class="removed"><del><strong>device gives</strong></del></span> <span
class="inserted"><ins><em>manufacturer and</em></ins></span> the <span
class="removed"><del><strong>company
- surveillance capability.</p></strong></del></span> <span
class="inserted"><ins><em>FBI could listen to these
- conversations was unacceptable by itself.</p></em></ins></span>
- </li>
+ <p>Since Google “Assistant” uses proprietary software,
there</em></ins></span> is <span class="removed"><del><strong>an
example</a>.</p>
+ <p>The article describes wrongdoing by</strong></del></span> <span
class="inserted"><ins><em>no
+ way to see or control what it records or sends.</p>
- <span class="removed"><del><strong><li></strong></del></span>
+ <p>Rather than trying to better control the use of recordings, Google
+ should not record or listen to the person's voice. It should only
+ get commands that the user wants to send to some Google service.</p>
+ </li>
- <span class="inserted"><ins><em><li id="M201612060"></em></ins></span>
- <p>The <span class="removed"><del><strong>Nest
Cam</strong></del></span> “smart” <span
class="removed"><del><strong>camera is</strong></del></span> <span
class="inserted"><ins><em>toys My Friend Cayla and i-Que
transmit</em></ins></span> <a
- <span
class="removed"><del><strong>href="http://www.bbc.com/news/technology-34922712">always
- watching</a>, even when</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.forbrukerradet.no/siste-nytt/connected-toys-violate-consumer-laws">children's
- conversations to Nuance Communications</a>, a speech recognition
- company based in</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
- <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>U.S.</p>
+ <li id="M201905061">
+ <p>Amazon Alexa collects a lot more information from users
+ than is necessary for correct functioning (time, location,
+ recordings made without a legitimate prompt), and sends
+ it to Amazon's servers, which store it indefinitely. Even
+ worse, Amazon forwards it to third-party companies. Thus,
+ even if users request deletion of their data from Amazon's servers, <a
+
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php"></em></ins></span>
+ the <span class="removed"><del><strong>manufacturer,
based</strong></del></span> <span class="inserted"><ins><em>data
remain</em></ins></span> on <span class="inserted"><ins><em>other
servers</a>, where they can be accessed by
+ advertising companies and government agencies. In other words,
+ deleting</em></ins></span> the <span class="removed"><del><strong>fact
+ that the device is tethered to a server.</p>
+ <p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
+ <p>But it also demonstrates that</strong></del></span> <span
class="inserted"><ins><em>collected information doesn't
cancel</em></ins></span> the <span class="removed"><del><strong>device
gives</strong></del></span> <span class="inserted"><ins><em>wrong of
+ collecting it.</p>
- <p>Those toys also contain major security vulnerabilities; crackers
- can remotely control</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it</strong></del></span>
<span class="inserted"><ins><em>toys with a mobile phone. This would enable
- crackers</em></ins></span> to <span class="removed"><del><strong>outsmart
- you.</p></strong></del></span> <span
class="inserted"><ins><em>listen in on a child's speech, and even speak into the
- toys themselves.</p>
+ <p>Data collected by devices such as</em></ins></span> the <span
class="removed"><del><strong>company
+ surveillance capability.</p>
</li>
- <li id="M201502180">
- <p>Barbie <a
-
href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">is
- going to spy on children and adults</a>.</p></em></ins></span>
+ <li>
+ <p>The</strong></del></span> Nest <span
class="removed"><del><strong>Cam “smart” camera is <a
+ href="http://www.bbc.com/news/technology-34922712">always
+ watching</a>, even when</strong></del></span> <span
class="inserted"><ins><em>thermostat,</em></ins></span> the <span
class="removed"><del><strong>“owner” switches it
“off.”</p>
+ <p>A “smart” device means</strong></del></span> <span
class="inserted"><ins><em>Philips
+ Hue-connected lights,</em></ins></span> the <span
class="removed"><del><strong>manufacturer is using it to outsmart
+ you.</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 <span
class="removed"><del><strong>id="SpywareInElectronicReaders">Spyware in
e-Readers</h4></strong></del></span> <span
class="inserted"><ins><em>id="SpywareInDrones">Drones</h4></em></ins></span>
- <span class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareInDrones">#SpywareInDrones</a>)</span></em></ins></span>
+ <h4 id="SpywareInElectronicReaders">Spyware in e-Readers</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInElectronicReaders">#SpywareInElectronicReaders</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
- <li><p>E-books can contain JavaScript code,
- and <a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
- this code snoops on readers</a>.</p>
+<ul>
+ <li><p>E-books can contain JavaScript
code,</strong></del></span> <span class="inserted"><ins><em>Chamberlain MyQ
garage opener</em></ins></span> and <span class="removed"><del><strong><a
href="http://www.theguardian.com/books/2016/mar/08/men-make-up-their-minds-about-books-faster-than-women-study-finds">sometimes
+ this code snoops</strong></del></span> <span class="inserted"><ins><em>the
Sonos
+ speakers are likewise stored longer than necessary</em></ins></span> on
<span class="removed"><del><strong>readers</a>.</p>
</li>
- <li><p>Spyware in many e-readers—not only the
- Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
- they report even which page the user reads at what
time</a>.</p>
+ <li><p>Spyware in many e-readers—not
only</strong></del></span> the
+ <span class="removed"><del><strong>Kindle: <a
href="https://www.eff.org/pages/reader-privacy-chart-2012">
+ they report even which page</strong></del></span> <span
class="inserted"><ins><em>servers</em></ins></span>
+ the <span class="removed"><del><strong>user reads at what
time</a>.</p>
</li>
- <li><p>Adobe made “Digital Editions,” the e-reader
used
+ <li><p>Adobe</strong></del></span> <span
class="inserted"><ins><em>devices are tethered to. Moreover, they
are</em></ins></span> made <span class="removed"><del><strong>“Digital
Editions,” the e-reader used
by most US libraries,
<a
href="http://www.computerworlduk.com/blogs/open-enterprise/drm-strikes-again-3575860/">
send lots of data to Adobe</a>. Adobe's “excuse”: it's
- needed</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201708040">
- <p>While you're using a DJI drone</em></ins></span>
- to <span class="removed"><del><strong>check
DRM!</p></strong></del></span> <span class="inserted"><ins><em>snoop on
other people, DJI is in many cases <a
-
href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
- on you</a>.</p></em></ins></span>
+ needed</strong></del></span> <span
class="inserted"><ins><em>available</em></ins></span> to <span
class="removed"><del><strong>check DRM!</p>
</li>
</ul>
-
<div class="big-subsection">
- <h4 <span class="removed"><del><strong>id="SpywareInVehicles">Spyware
in Vehicles</h4>
- <span</strong></del></span> <span
class="inserted"><ins><em>id="SpywareAtHome">Other
Appliances</h4><span</em></ins></span>
class="anchor-reference-id">(<a <span
class="removed"><del><strong>href="#SpywareInVehicles">#SpywareInVehicles</a>)</span></strong></del></span>
<span
class="inserted"><ins><em>href="#SpywareAtHome">#SpywareAtHome</a>)</span></em></ins></span>
+ <h4 id="SpywareInVehicles">Spyware in Vehicles</h4>
+ <span class="anchor-reference-id">(<a
href="#SpywareInVehicles">#SpywareInVehicles</a>)</span>
</div>
-<span class="removed"><del><strong><ul>
-<li><p>Computerized cars with nonfree software
are</strong></del></span>
-
-<span class="inserted"><ins><em><ul class="blurbs">
- <li id="M201907210">
- <p>Google “Assistant” records users'
conversations</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
- snooping devices</a>.</p></strong></del></span>
- <span
class="inserted"><ins><em>href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
- when it is not supposed to listen</a>. Thus, when one of Google's
- subcontractors discloses a thousand confidential voice recordings,
- users were easily identified from these recordings.</p>
-
- <p>Since Google “Assistant” uses proprietary software,
there is no
- way to see or control what it records or sends.</p>
-
- <p>Rather than trying to better control the use of recordings, Google
- should not record or listen to the person's voice. It should only
- get commands that the user wants to send to some Google
service.</p></em></ins></span>
+<ul>
+<li><p>Computerized cars with nonfree software are
+ <a
href="http://www.thelowdownblog.com/2016/07/your-cars-been-studying-you-closely-and.html">
+ snooping devices</a>.</p>
</li>
- <li <span class="removed"><del><strong>id="nissan-modem"><p>The
Nissan Leaf has</strong></del></span> <span
class="inserted"><ins><em>id="M201905061">
- <p>Amazon Alexa collects</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
+ <li id="nissan-modem"><p>The Nissan Leaf
has</strong></del></span>
+ <span class="inserted"><ins><em>Alexa. As</em></ins></span> a <span
class="removed"><del><strong>built-in cell phone modem which allows
effectively
anyone <a
href="https://www.troyhunt.com/controlling-vehicle-features-of-nissan/">to
- access its computers remotely</strong></del></span> <span
class="inserted"><ins><em>lot more information from users
- than is necessary for correct functioning (time, location,
- recordings made without a legitimate prompt),</em></ins></span> and <span
class="removed"><del><strong>make changes in various
+ access its computers remotely and make changes in various
settings</a>.</p>
- <p>That's easy</strong></del></span> <span
class="inserted"><ins><em>sends
- it</em></ins></span> to <span class="removed"><del><strong>do because the
system has no authentication when
- accessed through the modem. However,</strong></del></span> <span
class="inserted"><ins><em>Amazon's servers, which store it indefinitely. Even
- worse, Amazon forwards it to third-party companies. Thus,</em></ins></span>
- even if <span class="removed"><del><strong>it asked for
- authentication, you couldn't</strong></del></span> <span
class="inserted"><ins><em>users request deletion of their data from Amazon's
servers, <a
-
href="https://www.ctpost.com/business/article/Alexa-has-been-eavesdropping-on-you-this-whole-13822095.php">
- the data remain on other servers</a>, where they
can</em></ins></span> be <span class="removed"><del><strong>confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>accessed by
- advertising companies and government agencies. In other words,
- deleting the collected information doesn't cancel the wrong of
- collecting it.</p>
-
- <p>Data collected by devices such as the Nest thermostat, the Philips
- Hue-connected lights, the Chamberlain MyQ garage opener and the Sonos
- speakers are likewise stored longer than necessary on the servers
- the devices are tethered to. Moreover, they are made available to
- Alexa. As a result, Amazon</em></ins></span> has <span
class="removed"><del><strong>no
+ <p>That's easy to do because the system has no authentication when
+ accessed through the modem. However, even if it asked for
+ authentication, you couldn't be confident that
Nissan</strong></del></span> <span class="inserted"><ins><em>result,
Amazon</em></ins></span> has <span class="removed"><del><strong>no
access. The software</strong></del></span> <span
class="inserted"><ins><em>a very precise picture of users' life
at home, not only</em></ins></span> in the <span
class="removed"><del><strong>car is
proprietary, <a
href="/philosophy/free-software-even-more-important.html">which
@@ -3696,7 +3695,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/21 23:32:16 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.de.po,v
retrieving revision 1.322
retrieving revision 1.323
diff -u -b -r1.322 -r1.323
--- proprietary-surveillance.de.po 21 Feb 2020 23:32:17 -0000 1.322
+++ proprietary-surveillance.de.po 24 Feb 2020 17:03:37 -0000 1.323
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2018-05-18 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -4338,6 +4338,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
Index: proprietary-surveillance.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.es.po,v
retrieving revision 1.28
retrieving revision 1.29
diff -u -b -r1.28 -r1.29
--- proprietary-surveillance.es.po 23 Feb 2020 11:03:35 -0000 1.28
+++ proprietary-surveillance.es.po 24 Feb 2020 17:03:37 -0000 1.29
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2020-02-23 11:24+0100\n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -3734,6 +3735,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
Index: proprietary-surveillance.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.fr.po,v
retrieving revision 1.496
retrieving revision 1.497
diff -u -b -r1.496 -r1.497
--- proprietary-surveillance.fr.po 24 Feb 2020 13:52:40 -0000 1.496
+++ proprietary-surveillance.fr.po 24 Feb 2020 17:03:37 -0000 1.497
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2020-02-24 14:52+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
"Plural-Forms: \n"
"X-Generator: Gtranslator 2.91.5\n"
@@ -3741,6 +3742,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
Index: proprietary-surveillance.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it-diff.html,v
retrieving revision 1.174
retrieving revision 1.175
diff -u -b -r1.174 -r1.175
--- proprietary-surveillance.it-diff.html 21 Feb 2020 23:32:17 -0000
1.174
+++ proprietary-surveillance.it-diff.html 24 Feb 2020 17:03:37 -0000
1.175
@@ -2695,6 +2695,20 @@
</div>
<ul class="blurbs">
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -3469,7 +3483,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/21 23:32:17 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.it.po,v
retrieving revision 1.335
retrieving revision 1.336
diff -u -b -r1.335 -r1.336
--- proprietary-surveillance.it.po 21 Feb 2020 23:32:17 -0000 1.335
+++ proprietary-surveillance.it.po 24 Feb 2020 17:03:37 -0000 1.336
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2017-12-31 13:19+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -4093,6 +4093,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
Index: proprietary-surveillance.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja-diff.html,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- proprietary-surveillance.ja-diff.html 21 Feb 2020 23:32:17 -0000
1.191
+++ proprietary-surveillance.ja-diff.html 24 Feb 2020 17:03:37 -0000
1.192
@@ -2609,6 +2609,20 @@
</div>
<ul class="blurbs">
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
+ </li>
+
<li id="M201907210">
<p>Google “Assistant” records users' conversations <a
href="https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/">even
@@ -3308,7 +3322,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/21 23:32:17 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-surveillance.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ja.po,v
retrieving revision 1.317
retrieving revision 1.318
diff -u -b -r1.317 -r1.318
--- proprietary-surveillance.ja.po 21 Feb 2020 23:32:17 -0000 1.317
+++ proprietary-surveillance.ja.po 24 Feb 2020 17:03:37 -0000 1.318
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2017-01-24 12:16+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -3194,6 +3194,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
Index: proprietary-surveillance.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.pot,v
retrieving revision 1.256
retrieving revision 1.257
diff -u -b -r1.256 -r1.257
--- proprietary-surveillance.pot 21 Feb 2020 23:32:17 -0000 1.256
+++ proprietary-surveillance.pot 24 Feb 2020 17:03:37 -0000 1.257
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -2528,6 +2528,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a "
+"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\">
"
+"access the user's wifi password</a>, and snoop on the household through "
+"connected surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack "
+"this. Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a "
"href=\"https://arstechnica.com/information-technology/2019/07/google-defends-listening-to-ok-google-queries-after-voice-recordings-leak/\">even
"
"when it is not supposed to listen</a>. Thus, when one of Google's "
Index: proprietary-surveillance.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-surveillance.ru.po,v
retrieving revision 1.589
retrieving revision 1.590
diff -u -b -r1.589 -r1.590
--- proprietary-surveillance.ru.po 21 Feb 2020 23:32:17 -0000 1.589
+++ proprietary-surveillance.ru.po 24 Feb 2020 17:03:37 -0000 1.590
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-surveillance.html\n"
-"POT-Creation-Date: 2020-02-21 23:25+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2019-02-03 16:09+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -3713,6 +3713,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Google “Assistant” records users' conversations <a href="
"\"https://arstechnica.com/information-technology/2019/07/google-defends-"
"listening-to-ok-google-queries-after-voice-recordings-leak/\">even when it "
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.de-diff.html 17 Feb 2020 08:35:26 -0000 1.146
+++ proprietary.de-diff.html 24 Feb 2020 17:03:37 -0000 1.147
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -212,16 +212,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202002020">
- <p>Many Android apps fool their users by asking
- them to decide what permissions to give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
- bypassing these permissions</a>.</p>
-
- <p>The Android system is supposed to prevent data leaks by running
apps
- in isolated sandboxes, but developers have found ways to access the
- data by other means, and there is nothing the user can do to stop
- them from doing so, since both the system and the apps are
nonfree.</p>
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
<li id="M201912220">
@@ -246,6 +248,18 @@
additional malware (the system itself being the original
malware).</p>
</li>
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running
apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are
nonfree.</p>
+ </li>
+
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
@@ -254,16 +268,6 @@
cracking the car's computer, which is always hidden and running with
proprietary software.</p>
</li>
-
- <li id="M201912090">
- <p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -326,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary.de.po 17 Feb 2020 08:35:26 -0000 1.187
+++ proprietary.de.po 24 Feb 2020 17:03:37 -0000 1.188
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <address@hidden>\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <address@hidden>\n"
@@ -455,18 +455,19 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -496,6 +497,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -503,16 +520,6 @@
"with proprietary software."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.255
retrieving revision 1.256
diff -u -b -r1.255 -r1.256
--- proprietary.es.po 17 Feb 2020 12:08:08 -0000 1.255
+++ proprietary.es.po 24 Feb 2020 17:03:37 -0000 1.256
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <address@hidden>\n"
"Language-Team: Spanish <address@hidden>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -312,28 +313,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
-"Muchas aplicaciones de Android engañan a los usuarios al pedirles que "
-"decidan qué permisos otorgar al programa, para a continuación <a href="
-"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-"
-"permissions-to-access-sensitive-data/\">ignorar sus preferencias</a>."
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
-"Se supone que el sistema Android evita el filtrado de datos al ejecutar las "
-"aplicaciones en entornos aislados, pero los desarrolladores han encontrado "
-"maneras de acceder a los datos por otros medios. Y no hay nada que el "
-"usuario pueda hacer para evitarlo, ya que tanto el sistema como las "
-"aplicaciones son privativas."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -377,6 +370,31 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+"Muchas aplicaciones de Android engañan a los usuarios al pedirles que "
+"decidan qué permisos otorgar al programa, para a continuación <a href="
+"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-"
+"permissions-to-access-sensitive-data/\">ignorar sus preferencias</a>."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+"Se supone que el sistema Android evita el filtrado de datos al ejecutar las "
+"aplicaciones en entornos aislados, pero los desarrolladores han encontrado "
+"maneras de acceder a los datos por otros medios. Y no hay nada que el "
+"usuario pueda hacer para evitarlo, ya que tanto el sistema como las "
+"aplicaciones son privativas."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -390,23 +408,6 @@
"ordenador del vehÃculo, que está siempre oculto y funciona con software "
"privativo."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-"Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos Android "
-"proporcionan a los empleadores potentes <a href=\"https://www.fastcompany."
-"com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
-"privacy\">capacidades de espionaje y sabotaje</a> en el caso de que estos "
-"instalen su propio software en el dispositivo. Muchos empleadores exigen "
-"hacerlo. Para el empleado esto no es sino otro software privativo, tan "
-"fundamentalmente injusto y peligroso como cualquier otro software privativo."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -484,6 +485,24 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "iMonsters and Android phones, when used for work, give employers powerful "
+#~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-"
+#~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "
+#~ "capabilities</a> if they install their own software on the device. Many "
+#~ "employers demand to do this. For the employee, this is simply nonfree "
+#~ "software, as fundamentally unjust and as dangerous as any other nonfree "
+#~ "software."
+#~ msgstr ""
+#~ "Cuando se utilizan en el trabajo, los iMonstruos y los teléfonos Android "
+#~ "proporcionan a los empleadores potentes <a href=\"https://www.fastcompany."
+#~ "com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
+#~ "privacy\">capacidades de espionaje y sabotaje</a> en el caso de que estos "
+#~ "instalen su propio software en el dispositivo. Muchos empleadores exigen "
+#~ "hacerlo. Para el empleado esto no es sino otro software privativo, tan "
+#~ "fundamentalmente injusto y peligroso como cualquier otro software "
+#~ "privativo."
+
+#~ msgid ""
#~ "The Amazon Ring app does <a href=\"https://www.theguardian.com/"
#~ "technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"
#~ "\"> surveillance for other companies as well as for Amazon</a>."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.303
retrieving revision 1.304
diff -u -b -r1.303 -r1.304
--- proprietary.fr.po 17 Feb 2020 10:05:13 -0000 1.303
+++ proprietary.fr.po 24 Feb 2020 17:03:37 -0000 1.304
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2020-02-17 11:03+0100\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <address@hidden>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -308,29 +309,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
-"Beaucoup d'applis Android dupent leurs utilisateurs en leur demandant de "
-"décider quelles permissions doit avoir le programme, et ensuite <a href="
-"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-"
-"permissions-to-access-sensitive-data/\">ne tiennent pas compte de ces "
-"permissions</a>."
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
-"Le système Android est censé éviter les fuites de données en exécutant
les "
-"applis dans des « bacs à sable » isolés, mais les développeurs ont
trouvé "
-"moyen d'accéder aux données par d'autres moyens. Il n'y a rien que "
-"l'utilisateur puisse faire pour les en empêcher, puisque le système et "
-"l'appli sont tous deux privateurs."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -374,6 +366,32 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+"Beaucoup d'applis Android dupent leurs utilisateurs en leur demandant de "
+"décider quelles permissions doit avoir le programme, et ensuite <a href="
+"\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-"
+"permissions-to-access-sensitive-data/\">ne tiennent pas compte de ces "
+"permissions</a>."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+"Le système Android est censé éviter les fuites de données en exécutant
les "
+"applis dans des « bacs à sable » isolés, mais les développeurs ont
trouvé "
+"moyen d'accéder aux données par d'autres moyens. Il n'y a rien que "
+"l'utilisateur puisse faire pour les en empêcher, puisque le système et "
+"l'appli sont tous deux privateurs."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -387,23 +405,6 @@
"s'introduire dans l'ordinateur de la voiture, qui est toujours caché et "
"fonctionne avec un logiciel privateur."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-"Lorsqu'ils sont utilisés sur le lieu de travail, les iMonstres et les "
-"téléphones Android donnent aux utilisateurs des <a href=\"https://www."
-"fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-"
-"to-your-privacy\">moyens puissants de surveillance et de sabotage</a> s'ils "
-"y installent leur propre logiciel. De nombreux employeurs l'exigent. Pour "
-"l'employé, c'est simplement un logiciel privateur, aussi fondamentalement "
-"injuste et dangereux que n'importe quel autre logiciel privateur."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -478,6 +479,24 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "iMonsters and Android phones, when used for work, give employers powerful "
+#~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-"
+#~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "
+#~ "capabilities</a> if they install their own software on the device. Many "
+#~ "employers demand to do this. For the employee, this is simply nonfree "
+#~ "software, as fundamentally unjust and as dangerous as any other nonfree "
+#~ "software."
+#~ msgstr ""
+#~ "Lorsqu'ils sont utilisés sur le lieu de travail, les iMonstres et les "
+#~ "téléphones Android donnent aux utilisateurs des <a href=\"https://www."
+#~ "fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-"
+#~ "goodbye-to-your-privacy\">moyens puissants de surveillance et de "
+#~ "sabotage</a> s'ils y installent leur propre logiciel. De nombreux "
+#~ "employeurs l'exigent. Pour l'employé, c'est simplement un logiciel "
+#~ "privateur, aussi fondamentalement injuste et dangereux que n'importe quel "
+#~ "autre logiciel privateur."
+
+#~ msgid ""
#~ "The Amazon Ring app does <a href=\"https://www.theguardian.com/"
#~ "technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"
#~ "\"> surveillance for other companies as well as for Amazon</a>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.158
retrieving revision 1.159
diff -u -b -r1.158 -r1.159
--- proprietary.it-diff.html 17 Feb 2020 08:35:26 -0000 1.158
+++ proprietary.it-diff.html 24 Feb 2020 17:03:37 -0000 1.159
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,16 +211,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202002020">
- <p>Many Android apps fool their users by asking
- them to decide what permissions to give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
- bypassing these permissions</a>.</p>
-
- <p>The Android system is supposed to prevent data leaks by running
apps
- in isolated sandboxes, but developers have found ways to access the
- data by other means, and there is nothing the user can do to stop
- them from doing so, since both the system and the apps are
nonfree.</p>
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
<li id="M201912220">
@@ -245,6 +247,18 @@
additional malware (the system itself being the original
malware).</p>
</li>
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running
apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are
nonfree.</p>
+ </li>
+
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
@@ -253,16 +267,6 @@
cracking the car's computer, which is always hidden and running with
proprietary software.</p>
</li>
-
- <li id="M201912090">
- <p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -325,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.196
retrieving revision 1.197
diff -u -b -r1.196 -r1.197
--- proprietary.it.po 17 Feb 2020 08:35:26 -0000 1.196
+++ proprietary.it.po 24 Feb 2020 17:03:37 -0000 1.197
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <address@hidden>\n"
"Language-Team: Italian <address@hidden>\n"
@@ -459,18 +459,19 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -500,6 +501,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -507,16 +524,6 @@
"with proprietary software."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.162
retrieving revision 1.163
diff -u -b -r1.162 -r1.163
--- proprietary.ja-diff.html 17 Feb 2020 08:35:26 -0000 1.162
+++ proprietary.ja-diff.html 24 Feb 2020 17:03:37 -0000 1.163
@@ -209,16 +209,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202002020">
- <p>Many Android apps fool their users by asking
- them to decide what permissions to give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
- bypassing these permissions</a>.</p>
-
- <p>The Android system is supposed to prevent data leaks by running
apps
- in isolated sandboxes, but developers have found ways to access the
- data by other means, and there is nothing the user can do to stop
- them from doing so, since both the system and the apps are
nonfree.</p>
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
<li id="M201912220">
@@ -243,6 +245,18 @@
additional malware (the system itself being the original
malware).</p>
</li>
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running
apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are
nonfree.</p>
+ </li>
+
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
@@ -251,16 +265,6 @@
cracking the car's computer, which is always hidden and running with
proprietary software.</p>
</li>
-
- <li id="M201912090">
- <p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -323,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.180
retrieving revision 1.181
diff -u -b -r1.180 -r1.181
--- proprietary.ja.po 17 Feb 2020 08:35:26 -0000 1.180
+++ proprietary.ja.po 24 Feb 2020 17:03:37 -0000 1.181
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <address@hidden>\n"
"Language-Team: Japanese <address@hidden>\n"
@@ -320,18 +320,19 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -361,6 +362,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -368,16 +385,6 @@
"with proprietary software."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.159
retrieving revision 1.160
diff -u -b -r1.159 -r1.160
--- proprietary.nl-diff.html 17 Feb 2020 08:35:26 -0000 1.159
+++ proprietary.nl-diff.html 24 Feb 2020 17:03:37 -0000 1.160
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,16 +211,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202002020">
- <p>Many Android apps fool their users by asking
- them to decide what permissions to give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
- bypassing these permissions</a>.</p>
-
- <p>The Android system is supposed to prevent data leaks by running
apps
- in isolated sandboxes, but developers have found ways to access the
- data by other means, and there is nothing the user can do to stop
- them from doing so, since both the system and the apps are
nonfree.</p>
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
<li id="M201912220">
@@ -245,6 +247,18 @@
additional malware (the system itself being the original
malware).</p>
</li>
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running
apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are
nonfree.</p>
+ </li>
+
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
@@ -253,16 +267,6 @@
cracking the car's computer, which is always hidden and running with
proprietary software.</p>
</li>
-
- <li id="M201912090">
- <p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -325,7 +329,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.nl.po 17 Feb 2020 08:35:26 -0000 1.170
+++ proprietary.nl.po 24 Feb 2020 17:03:37 -0000 1.171
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <address@hidden>\n"
"Language-Team: Dutch <address@hidden>\n"
@@ -363,18 +363,19 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -404,6 +405,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -411,16 +428,6 @@
"with proprietary software."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.176
retrieving revision 1.177
diff -u -b -r1.176 -r1.177
--- proprietary.pl-diff.html 17 Feb 2020 08:35:26 -0000 1.176
+++ proprietary.pl-diff.html 24 Feb 2020 17:03:37 -0000 1.177
@@ -114,8 +114,8 @@
<hr class="thin" />
</div>
-<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>January, 2020, the pages in this directory
list around 450
-instances of malicious functionalities (with more than 500 references to
+<p>As of January, 2020, the pages in this directory list around 450
+instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 500
references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -155,17 +155,17 @@
<ul>
<span class="removed"><del><strong><li><strong>Type of
malware</strong></li></strong></del></span>
<li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li>
- <li><a
href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a
href="/proprietary/malware-cars.html">Cars</a></li>
+ <li><a
href="/proprietary/malware-games.html">Games</a></li>
+ <li><a
href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li>
- <li><a
href="/proprietary/malware-google.html">Google</a></li>
- <li><a
href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/philosophy/proprietary-drm.html">Digital</strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -186,10 +186,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/philosophy/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -209,16 +209,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202002020">
- <p>Many Android apps fool their users by asking
- them to decide what permissions to give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
- bypassing these permissions</a>.</p>
-
- <p>The Android system is supposed to prevent data leaks by running
apps
- in isolated sandboxes, but developers have found ways to access the
- data by other means, and there is nothing the user can do to stop
- them from doing so, since both the system and the apps are
nonfree.</p>
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
<li id="M201912220">
@@ -243,6 +245,18 @@
additional malware (the system itself being the original
malware).</p>
</li>
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running
apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are
nonfree.</p>
+ </li>
+
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
@@ -251,16 +265,6 @@
cracking the car's computer, which is always hidden and running with
proprietary software.</p>
</li>
-
- <li id="M201912090">
- <p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -323,7 +327,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:37 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.163
retrieving revision 1.164
diff -u -b -r1.163 -r1.164
--- proprietary.pl.po 17 Feb 2020 08:35:26 -0000 1.163
+++ proprietary.pl.po 24 Feb 2020 17:03:37 -0000 1.164
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <address@hidden>\n"
@@ -540,18 +540,19 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -581,6 +582,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -588,16 +605,6 @@
"with proprietary software."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.160
retrieving revision 1.161
diff -u -b -r1.160 -r1.161
--- proprietary.pot 17 Feb 2020 08:35:26 -0000 1.160
+++ proprietary.pot 24 Feb 2020 17:03:37 -0000 1.161
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <address@hidden>\n"
@@ -257,18 +257,19 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a "
-"href=\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/\">
"
-"bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a "
+"href=\"https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\">
"
+"access the user's wifi password</a>, and snoop on the household through "
+"connected surveillance devices."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack "
+"this. Of course, they are also used by their manufacturers for snooping."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -299,6 +300,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a "
+"href=\"https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/\">
"
+"bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a "
"href=\"https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html\"> "
"record and send various kinds of data to the manufacturer</a>. For the user, "
@@ -306,16 +323,6 @@
"computer, which is always hidden and running with proprietary software."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy\">
"
-"snooping and sabotage capabilities</a> if they install their own software on "
-"the device. Many employers demand to do this. For the employee, this is "
-"simply nonfree software, as fundamentally unjust and as dangerous as any "
-"other nonfree software."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.273
retrieving revision 1.274
diff -u -b -r1.273 -r1.274
--- proprietary.pt-br.po 18 Feb 2020 10:34:02 -0000 1.273
+++ proprietary.pt-br.po 24 Feb 2020 17:03:37 -0000 1.274
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2020-02-18 06:55-0300\n"
"Last-Translator: Rafael Fontenelle <address@hidden>\n"
"Language-Team: Brazilian Portuguese <address@hidden>\n"
@@ -13,6 +13,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Virtaal 1.0.0-beta1\n"
@@ -305,27 +306,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
-"Muitos aplicativos Android enganam seus usuários pedindo que eles decidam "
-"quais permissões dar ao programa e, em seguida, <a href=\"https://"
-"nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-"
-"access-sensitive-data/\"> ignorando essas permissões</a>."
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
-"O sistema Android deve impedir o vazamento de dados executando aplicativos "
-"em caixas de proteção isoladas, mas os desenvolvedores encontraram maneiras
"
-"de acessar os dados por outros meios, e não há nada que o usuário possa "
-"fazer para impedi-lo, pois o sistema e o os aplicativos são não livres."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -368,6 +362,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+"Muitos aplicativos Android enganam seus usuários pedindo que eles decidam "
+"quais permissões dar ao programa e, em seguida, <a href=\"https://"
+"nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-"
+"access-sensitive-data/\"> ignorando essas permissões</a>."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+"O sistema Android deve impedir o vazamento de dados executando aplicativos "
+"em caixas de proteção isoladas, mas os desenvolvedores encontraram maneiras
"
+"de acessar os dados por outros meios, e não há nada que o usuário possa "
+"fazer para impedi-lo, pois o sistema e o os aplicativos são não livres."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -380,23 +398,6 @@
"impossÃvel, pois envolve quebrar o computador do carro, que está sempre "
"oculto e funcionando com software proprietário."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-"Os iMonstros e os telefones Android, quando usados no trabalho, proporcionam "
-"aos empregadores poderosas <a href=\"https://www.fastcompany.com/90440073/if-"
-"you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy\"> recursos "
-"de bisbilhotamento e sabotagem</a> se eles instalarem seu próprio software "
-"no dispositivo. Muitos empregadores exigem isso. Para o funcionário, esse é
"
-"simplesmente um software não livre, fundamentalmente injusto e perigoso como
"
-"qualquer outro software não livre."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -472,6 +473,24 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "iMonsters and Android phones, when used for work, give employers powerful "
+#~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-"
+#~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "
+#~ "capabilities</a> if they install their own software on the device. Many "
+#~ "employers demand to do this. For the employee, this is simply nonfree "
+#~ "software, as fundamentally unjust and as dangerous as any other nonfree "
+#~ "software."
+#~ msgstr ""
+#~ "Os iMonstros e os telefones Android, quando usados no trabalho, "
+#~ "proporcionam aos empregadores poderosas <a href=\"https://www.fastcompany."
+#~ "com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
+#~ "privacy\"> recursos de bisbilhotamento e sabotagem</a> se eles instalarem "
+#~ "seu próprio software no dispositivo. Muitos empregadores exigem isso. "
+#~ "Para o funcionário, esse é simplesmente um software não livre, "
+#~ "fundamentalmente injusto e perigoso como qualquer outro software não "
+#~ "livre."
+
+#~ msgid ""
#~ "The Amazon Ring app does <a href=\"https://www.theguardian.com/"
#~ "technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"
#~ "\"> surveillance for other companies as well as for Amazon</a>."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.336
retrieving revision 1.337
diff -u -b -r1.336 -r1.337
--- proprietary.ru.po 17 Feb 2020 09:33:21 -0000 1.336
+++ proprietary.ru.po 24 Feb 2020 17:03:38 -0000 1.337
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2019-03-18 17:51+0000\n"
"Last-Translator: Ineiev <address@hidden>\n"
"Language-Team: Russian <address@hidden>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-02-24 16:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -311,27 +312,20 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
-"Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android надÑваÑÑ ÑвоиÑ
полÑзоваÑелей, пÑоÑÑ Ð¸Ñ
ÑеÑиÑÑ, "
-"какие ÑазÑеÑÐµÐ½Ð¸Ñ Ð´Ð°ÑÑ Ð¿ÑогÑамме, а заÑем <a
href=\"https://nakedsecurity."
-"sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-"
-"sensitive-data/\"> обÑ
Ð¾Ð´Ñ ÑÑи ÑазÑеÑениÑ</a>."
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
-"ÐÑедполагаеÑÑÑ, ÑÑо ÑиÑÑема Android бÑдеÑ
пÑедоÑвÑаÑаÑÑ ÑÑеÑÐºÑ Ð´Ð°Ð½Ð½ÑÑ
, "
-"вÑполнÑÑ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð² изолиÑованнÑÑ
пеÑоÑниÑаÑ
, но ÑазÑабоÑÑики наÑли пÑÑи "
-"доÑÑÑпа к даннÑÑ
Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð´ÑÑгиÑ
ÑÑедÑÑв,
и полÑзоваÑÐµÐ»Ñ Ð½Ð¸ÐºÐ°Ðº не Ð¼Ð¾Ð¶ÐµÑ "
-"помеÑаÑÑ Ð¸Ð¼ ÑÑо делаÑÑ, поÑколÑÐºÑ ÐºÐ°Ðº
ÑиÑÑема, Ñак и пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð½ÐµÑвободнÑ."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -376,6 +370,30 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+"Ðногие пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Android надÑваÑÑ ÑвоиÑ
полÑзоваÑелей, пÑоÑÑ Ð¸Ñ
ÑеÑиÑÑ, "
+"какие ÑазÑеÑÐµÐ½Ð¸Ñ Ð´Ð°ÑÑ Ð¿ÑогÑамме, а заÑем <a
href=\"https://nakedsecurity."
+"sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-"
+"sensitive-data/\"> обÑ
Ð¾Ð´Ñ ÑÑи ÑазÑеÑениÑ</a>."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+"ÐÑедполагаеÑÑÑ, ÑÑо ÑиÑÑема Android бÑдеÑ
пÑедоÑвÑаÑаÑÑ ÑÑеÑÐºÑ Ð´Ð°Ð½Ð½ÑÑ
, "
+"вÑполнÑÑ Ð¿ÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð² изолиÑованнÑÑ
пеÑоÑниÑаÑ
, но ÑазÑабоÑÑики наÑли пÑÑи "
+"доÑÑÑпа к даннÑÑ
Ñ Ð¿Ð¾Ð¼Ð¾ÑÑÑ Ð´ÑÑгиÑ
ÑÑедÑÑв,
и полÑзоваÑÐµÐ»Ñ Ð½Ð¸ÐºÐ°Ðº не Ð¼Ð¾Ð¶ÐµÑ "
+"помеÑаÑÑ Ð¸Ð¼ ÑÑо делаÑÑ, поÑколÑÐºÑ ÐºÐ°Ðº
ÑиÑÑема, Ñак и пÑÐ¸Ð»Ð¾Ð¶ÐµÐ½Ð¸Ñ Ð½ÐµÑвободнÑ."
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -388,23 +406,6 @@
"невозможен, поÑколÑÐºÑ ÑÑо ÑопÑÑжено Ñо
взломом авÑомобилÑного компÑÑÑеÑа, "
"коÑоÑÑй вÑегда ÑкÑÑÑ Ð¸ ÑабоÑÐ°ÐµÑ Ð¿Ð¾Ð´
ÑпÑавлением неÑвободнÑÑ
пÑогÑамм."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-"Ðй-ÑÑдовиÑа и ÑелеÑÐ¾Ð½Ñ Ñ Android, когда ими
полÑзÑÑÑÑÑ Ð´Ð»Ñ ÑабоÑÑ, "
-"пÑедоÑÑавлÑÑÑ ÑабоÑодаÑелÑм моÑнÑе <a
href=\"https://www.fastcompany."
-"com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
-"privacy\"> возможноÑÑи Ñлежки и ÑабоÑажа</a>,
еÑли они ÑÑÑанавливаÑÑ Ñвои "
-"пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° ÑÑÑÑойÑÑво. Ðногие
ÑабоÑодаÑели ÑÑебÑÑÑ ÑÑого. ÐÐ»Ñ ÑабоÑника "
-"ÑÑо пÑоÑÑо неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма, Ñак же
пÑинÑипиалÑно неÑпÑÐ°Ð²ÐµÐ´Ð»Ð¸Ð²Ð°Ñ Ð¸ "
-"опаÑнаÑ, как лÑÐ±Ð°Ñ Ð´ÑÑÐ³Ð°Ñ Ð½ÐµÑвободнаÑ
пÑогÑамма."
-
# type: Content of: <div><div>
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
@@ -483,6 +484,23 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "iMonsters and Android phones, when used for work, give employers powerful "
+#~ "<a href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-"
+#~ "phone-for-work-say-goodbye-to-your-privacy\"> snooping and sabotage "
+#~ "capabilities</a> if they install their own software on the device. Many "
+#~ "employers demand to do this. For the employee, this is simply nonfree "
+#~ "software, as fundamentally unjust and as dangerous as any other nonfree "
+#~ "software."
+#~ msgstr ""
+#~ "Ðй-ÑÑдовиÑа и ÑелеÑÐ¾Ð½Ñ Ñ Android, когда ими
полÑзÑÑÑÑÑ Ð´Ð»Ñ ÑабоÑÑ, "
+#~ "пÑедоÑÑавлÑÑÑ ÑабоÑодаÑелÑм моÑнÑе <a
href=\"https://www.fastcompany."
+#~ "com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-"
+#~ "privacy\"> возможноÑÑи Ñлежки и ÑабоÑажа</a>,
еÑли они ÑÑÑанавливаÑÑ Ñвои "
+#~ "пÑогÑÐ°Ð¼Ð¼Ñ Ð½Ð° ÑÑÑÑойÑÑво. Ðногие
ÑабоÑодаÑели ÑÑебÑÑÑ ÑÑого. ÐÐ»Ñ ÑабоÑника "
+#~ "ÑÑо пÑоÑÑо неÑÐ²Ð¾Ð±Ð¾Ð´Ð½Ð°Ñ Ð¿ÑогÑамма, Ñак же
пÑинÑипиалÑно неÑпÑÐ°Ð²ÐµÐ´Ð»Ð¸Ð²Ð°Ñ Ð¸ "
+#~ "опаÑнаÑ, как лÑÐ±Ð°Ñ Ð´ÑÑÐ³Ð°Ñ Ð½ÐµÑвободнаÑ
пÑогÑамма."
+
+#~ msgid ""
#~ "The Amazon Ring app does <a href=\"https://www.theguardian.com/"
#~ "technology/2020/jan/29/ring-smart-doorbell-company-surveillance-eff-report"
#~ "\"> surveillance for other companies as well as for Amazon</a>."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.139
retrieving revision 1.140
diff -u -b -r1.139 -r1.140
--- proprietary.zh-tw-diff.html 17 Feb 2020 08:35:26 -0000 1.139
+++ proprietary.zh-tw-diff.html 24 Feb 2020 17:03:38 -0000 1.140
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>-->
+#TOC a:hover { text-decoration: underline; }
+-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -212,16 +212,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
- <li id="M202002020">
- <p>Many Android apps fool their users by asking
- them to decide what permissions to give the program, and then <a
-
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
- bypassing these permissions</a>.</p>
-
- <p>The Android system is supposed to prevent data leaks by running
apps
- in isolated sandboxes, but developers have found ways to access the
- data by other means, and there is nothing the user can do to stop
- them from doing so, since both the system and the apps are
nonfree.</p>
+ <li id="M201911190">
+ <p>Internet-tethered Amazon Ring had
+ a security vulnerability that enabled attackers to <a
+
href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and snoop on the household
+ through connected surveillance devices.</p>
+
+ <p>Knowledge of the wifi password would not be sufficient to carry
+ out any significant surveillance if the devices implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they are also used by their
+ manufacturers for snooping.</p>
</li>
<li id="M201912220">
@@ -246,6 +248,18 @@
additional malware (the system itself being the original
malware).</p>
</li>
+ <li id="M202002020">
+ <p>Many Android apps fool their users by asking
+ them to decide what permissions to give the program, and then <a
+
href="https://nakedsecurity.sophos.com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-data/">
+ bypassing these permissions</a>.</p>
+
+ <p>The Android system is supposed to prevent data leaks by running
apps
+ in isolated sandboxes, but developers have found ways to access the
+ data by other means, and there is nothing the user can do to stop
+ them from doing so, since both the system and the apps are
nonfree.</p>
+ </li>
+
<li id="M201912171">
<p>Most modern cars now <a
href="https://boingboing.net/2019/12/17/cars-now-run-on-the-new-oil.html">
@@ -254,16 +268,6 @@
cracking the car's computer, which is always hidden and running with
proprietary software.</p>
</li>
-
- <li id="M201912090">
- <p>iMonsters and Android phones,
- when used for work, give employers powerful <a
-
href="https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-for-work-say-goodbye-to-your-privacy">
- snooping and sabotage capabilities</a> if they install their own
- software on the device. Many employers demand to do this. For the
- employee, this is simply nonfree software, as fundamentally unjust
- and as dangerous as any other nonfree software.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -326,7 +330,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/02/17 08:35:26 $
+$Date: 2020/02/24 17:03:38 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.150
retrieving revision 1.151
diff -u -b -r1.150 -r1.151
--- proprietary.zh-tw.po 17 Feb 2020 08:35:26 -0000 1.150
+++ proprietary.zh-tw.po 24 Feb 2020 17:03:38 -0000 1.151
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-02-17 08:26+0000\n"
+"POT-Creation-Date: 2020-02-24 16:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <address@hidden>\n"
"Language-Team: Traditional Chinese <address@hidden>\n"
@@ -433,18 +433,19 @@
#. type: Content of: <div><ul><li><p>
msgid ""
-"Many Android apps fool their users by asking them to decide what permissions "
-"to give the program, and then <a href=\"https://nakedsecurity.sophos."
-"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
-"data/\"> bypassing these permissions</a>."
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
msgstr ""
#. type: Content of: <div><ul><li><p>
msgid ""
-"The Android system is supposed to prevent data leaks by running apps in "
-"isolated sandboxes, but developers have found ways to access the data by "
-"other means, and there is nothing the user can do to stop them from doing "
-"so, since both the system and the apps are nonfree."
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
msgstr ""
#. type: Content of: <div><ul><li><p>
@@ -474,6 +475,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Many Android apps fool their users by asking them to decide what permissions "
+"to give the program, and then <a href=\"https://nakedsecurity.sophos."
+"com/2019/07/10/android-apps-sidestepping-permissions-to-access-sensitive-"
+"data/\"> bypassing these permissions</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"The Android system is supposed to prevent data leaks by running apps in "
+"isolated sandboxes, but developers have found ways to access the data by "
+"other means, and there is nothing the user can do to stop them from doing "
+"so, since both the system and the apps are nonfree."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Most modern cars now <a href=\"https://boingboing.net/2019/12/17/cars-now-"
"run-on-the-new-oil.html\"> record and send various kinds of data to the "
"manufacturer</a>. For the user, access to the data is nearly impossible, as "
@@ -481,16 +498,6 @@
"with proprietary software."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"iMonsters and Android phones, when used for work, give employers powerful <a "
-"href=\"https://www.fastcompany.com/90440073/if-you-use-your-personal-phone-"
-"for-work-say-goodbye-to-your-privacy\"> snooping and sabotage capabilities</"
-"a> if they install their own software on the device. Many employers demand "
-"to do this. For the employee, this is simply nonfree software, as "
-"fundamentally unjust and as dangerous as any other nonfree software."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.227
retrieving revision 1.228
diff -u -b -r1.227 -r1.228
--- pt-br.po 21 Feb 2020 23:32:17 -0000 1.227
+++ pt-br.po 24 Feb 2020 17:03:38 -0000 1.228
@@ -1811,6 +1811,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -2906,11 +2923,12 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
#| "Foundation, Inc."
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
"Foundation, Inc."
#. type: Content of: <title>
@@ -3873,17 +3891,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -8080,13 +8087,13 @@
#. type: Content of: <div><p>
#, fuzzy
#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
"Foundation, Inc."
#. type: Content of: <title>
@@ -8766,18 +8773,6 @@
"continuing this practice</a>."
msgstr ""
-#. type: Content of: <div><p>
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018, 2019 Free Software "
-"Foundation, Inc."
-
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -8816,6 +8811,16 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
#, fuzzy
#| msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -9912,6 +9917,17 @@
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
msgstr "<a href=\"/proprietary/malware-microsoft.html\">Microsoft</a>"
+#, fuzzy
+#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
#~ msgid ""
#~ "Motorola, then owned by Google, made <a href=\"http://blog."
#~ "azimuthsecurity.com/2013/04/unlocking-motorola-bootloader.html\"> Android "
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.381
retrieving revision 1.382
diff -u -b -r1.381 -r1.382
--- ru.po 21 Feb 2020 23:32:17 -0000 1.381
+++ ru.po 24 Feb 2020 17:03:38 -0000 1.382
@@ -2119,6 +2119,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -3562,8 +3579,10 @@
"ÑиÑанами</a>."
#. type: Content of: <div><p>
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
-msgstr "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
#. type: Content of: <title>
msgid "Malware In Cars - GNU Project - Free Software Foundation"
@@ -4632,12 +4651,6 @@
"компÑÑÑеÑе игÑока, и вÑÐ´Ð°ÐµÑ Ð¸Ð·ÑÑдное
колиÑеÑÑво лиÑнÑÑ
даннÑÑ
</a>, вклÑÑÐ°Ñ "
"маÑÑÑ Ð´ÐµÐ¹ÑÑвий, никак не ÑвÑзаннÑÑ
Ñ
обманом."
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-
#. type: Content of: <title>
msgid "Google's Software Is Malware - GNU Project - Free Software Foundation"
msgstr ""
@@ -9805,12 +9818,13 @@
"ÑÑеди ниÑ
еÑÑÑ ÑиÑоко пÑименÑемÑе
ÑиÑÑемÑ. ÐÑо ÑлÑÐ¶Ð¸Ñ Ð¿Ð¾Ð´ÑвеÑждением ÑÐ¾Ð¼Ñ "
"ÑакÑÑ, ÑÑо никогда нелÑÐ·Ñ ÑаÑÑÑиÑÑваÑÑ Ð½Ð°
безопаÑноÑÑÑ Ð½ÐµÑвободнÑÑ
пÑогÑамм."
+# type: Content of: <div><p>
#. type: Content of: <div><p>
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
#. type: Content of: <title>
@@ -10530,15 +10544,6 @@
"oracle-will-continue-to-bundle--crapware--with-java.html\"> Oracle
ÑпоÑно "
"пÑодолжала ÑледоваÑÑ ÑÑой пÑакÑике</a>."
-# type: Content of: <div><p>
-#. type: Content of: <div><p>
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-
#. type: Content of: <title>
msgid "Proprietary Subscriptions - GNU Project - Free Software Foundation"
msgstr ""
@@ -10580,6 +10585,10 @@
"Ðиже пÑиводÑÑÑÑ Ð¿ÑимеÑÑ Ð¿Ð¾Ð´Ð¿Ð¸Ñки на
пÑогÑаммÑ, коÑоÑÑе нанеÑли полÑзоваÑелÑм "
"непоÑÑедÑÑвеннÑй вÑед."
+#. type: Content of: <div><p>
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+
#. type: Content of: <title>
msgid "Proprietary Surveillance - GNU Project - Free Software Foundation"
msgstr ""
@@ -11764,6 +11773,13 @@
"<a href=\"/proprietary/malware-microsoft.html#main-heading\">Microsoft</a>"
#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+
+#~ msgid ""
#~ "Google tracks the movements of Android phones and iPhones running Goggle "
#~ "apps, and sometimes <a href=\"https://www.nytimes.com/"
#~ "interactive/2019/04/13/us/google-location-tracking-police.html\"> saves "
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.173
retrieving revision 1.174
diff -u -b -r1.173 -r1.174
--- zh-tw.po 21 Feb 2020 23:32:17 -0000 1.173
+++ zh-tw.po 24 Feb 2020 17:03:38 -0000 1.174
@@ -1638,6 +1638,23 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Internet-tethered Amazon Ring had a security vulnerability that enabled "
+"attackers to <a href=\"https://www.commondreams.org/newswire/2019/11/07/"
+"amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password\"> access "
+"the user's wifi password</a>, and snoop on the household through connected "
+"surveillance devices."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"Knowledge of the wifi password would not be sufficient to carry out any "
+"significant surveillance if the devices implemented proper security, "
+"including encryption. But many devices with proprietary software lack this. "
+"Of course, they are also used by their manufacturers for snooping."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
@@ -2592,13 +2609,14 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015,-] 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © [-2013, 2014, 2015,-] 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
-msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgid ""
+"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
"Foundation, Inc."
@@ -3346,19 +3364,6 @@
"to do with cheating."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © [-2013, 2014, 2015,-] 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright © 2016, 2017, 2018, 2019, 2020 Free Software Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
-
#. type: Content of: <title>
# | [-Proprietary-]{+Google's+} Software {+Is Malware+} - GNU Project - Free
# | Software Foundation
@@ -7022,14 +7027,14 @@
msgstr ""
#. type: Content of: <div><p>
-# | Copyright © 2013, [-2014,-] 2015, 2016, 2017, [-2018-] {+2018, 2019+}
-# | Free Software Foundation, Inc.
+# | Copyright © 2013, [-2014,-] 2015, 2016, 2017, [-2018-] {+2018, 2019,
+# | 2020+} Free Software Foundation, Inc.
#, fuzzy
#| msgid ""
#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
#| "Foundation, Inc."
msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
"Foundation, Inc."
msgstr ""
"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
@@ -7805,20 +7810,6 @@
"continuing this practice</a>."
msgstr ""
-#. type: Content of: <div><p>
-# | Copyright © 2013, [-2014,-] 2015, 2016, 2017, [-2018-] {+2018, 2019,
-# | 2020+} Free Software Foundation, Inc.
-#, fuzzy
-#| msgid ""
-#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-#| "Foundation, Inc."
-msgid ""
-"Copyright © 2013, 2015, 2016, 2017, 2018, 2019, 2020 Free Software "
-"Foundation, Inc."
-msgstr ""
-"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
-"Foundation, Inc."
-
#. type: Content of: <title>
# | Proprietary [-Software-] {+Subscriptions+} - GNU Project - Free Software
# | Foundation
@@ -7859,6 +7850,18 @@
"below."
msgstr ""
+#. type: Content of: <div><p>
+# | Copyright © [-2013, 2014, 2015,-] 2016, 2017, [-2018-] {+2018, 2019+}
+# | Free Software Foundation, Inc.
+#, fuzzy
+#| msgid ""
+#| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#| "Foundation, Inc."
+msgid "Copyright © 2016, 2017, 2018, 2019 Free Software Foundation, Inc."
+msgstr ""
+"Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+"Foundation, Inc."
+
#. type: Content of: <title>
# | Proprietary [-Software-] {+Surveillance+} - GNU Project - Free Software
# | Foundation
@@ -9027,6 +9030,17 @@
#, fuzzy
#~| msgid ""
+#~| "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~| "Foundation, Inc."
+#~ msgid ""
+#~ "Copyright © 2013, 2015, 2016, 2017, 2018, 2019 Free Software "
+#~ "Foundation, Inc."
+#~ msgstr ""
+#~ "Copyright © 2013, 2014, 2015, 2016, 2017, 2018 Free Software "
+#~ "Foundation, Inc."
+
+#, fuzzy
+#~| msgid ""
#~| "As of April, 2017, the files in this directory list around 300 instances "
#~| "of malicious functionalities, but there are surely thousands more we "
#~| "don't know about."
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/02/06
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/02/15
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/02/15
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/02/17
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/02/21
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/02/25