[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary/po de.po es.po fr.po it.po ja.p...
From: |
GNUN |
Subject: |
www/proprietary/po de.po es.po fr.po it.po ja.p... |
Date: |
Sat, 13 Jun 2020 06:00:28 -0400 (EDT) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 20/06/13 06:00:28
Modified files:
proprietary/po : de.po es.po fr.po it.po ja.po
malware-appliances.de-diff.html
malware-appliances.de.po
malware-appliances.es.po
malware-appliances.fr.po malware-appliances.pot
malware-appliances.ru.po nl.po pl.po pot
proprietary-tethers.de-diff.html
proprietary-tethers.de.po
proprietary-tethers.es.po
proprietary-tethers.fr.po
proprietary-tethers.ja-diff.html
proprietary-tethers.ja.po
proprietary-tethers.pot
proprietary-tethers.pt-br.po
proprietary-tethers.ru.po
proprietary.de-diff.html proprietary.de.po
proprietary.es.po proprietary.fr.po
proprietary.it-diff.html proprietary.it.po
proprietary.ja-diff.html proprietary.ja.po
proprietary.nl-diff.html proprietary.nl.po
proprietary.pl-diff.html proprietary.pl.po
proprietary.pot proprietary.pt-br.po
proprietary.ru.po proprietary.tr.po
proprietary.zh-cn.po
proprietary.zh-tw-diff.html
proprietary.zh-tw.po pt-br.po ru.po tr.po
zh-cn.po zh-tw.po
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/de.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/es.po?cvsroot=www&r1=1.263&r2=1.264
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/fr.po?cvsroot=www&r1=1.321&r2=1.322
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/it.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ja.po?cvsroot=www&r1=1.191&r2=1.192
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de-diff.html?cvsroot=www&r1=1.54&r2=1.55
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.de.po?cvsroot=www&r1=1.88&r2=1.89
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.es.po?cvsroot=www&r1=1.19&r2=1.20
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.fr.po?cvsroot=www&r1=1.148&r2=1.149
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.pot?cvsroot=www&r1=1.73&r2=1.74
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-appliances.ru.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/nl.po?cvsroot=www&r1=1.184&r2=1.185
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pl.po?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pot?cvsroot=www&r1=1.182&r2=1.183
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de-diff.html?cvsroot=www&r1=1.26&r2=1.27
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.de.po?cvsroot=www&r1=1.38&r2=1.39
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.es.po?cvsroot=www&r1=1.13&r2=1.14
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.fr.po?cvsroot=www&r1=1.70&r2=1.71
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja-diff.html?cvsroot=www&r1=1.45&r2=1.46
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ja.po?cvsroot=www&r1=1.37&r2=1.38
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pot?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.pt-br.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary-tethers.ru.po?cvsroot=www&r1=1.77&r2=1.78
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de-diff.html?cvsroot=www&r1=1.153&r2=1.154
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.de.po?cvsroot=www&r1=1.194&r2=1.195
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.es.po?cvsroot=www&r1=1.271&r2=1.272
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.fr.po?cvsroot=www&r1=1.319&r2=1.320
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it-diff.html?cvsroot=www&r1=1.165&r2=1.166
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.it.po?cvsroot=www&r1=1.203&r2=1.204
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja-diff.html?cvsroot=www&r1=1.169&r2=1.170
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ja.po?cvsroot=www&r1=1.187&r2=1.188
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl-diff.html?cvsroot=www&r1=1.166&r2=1.167
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.nl.po?cvsroot=www&r1=1.177&r2=1.178
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl-diff.html?cvsroot=www&r1=1.183&r2=1.184
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pl.po?cvsroot=www&r1=1.170&r2=1.171
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pot?cvsroot=www&r1=1.167&r2=1.168
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.pt-br.po?cvsroot=www&r1=1.294&r2=1.295
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.ru.po?cvsroot=www&r1=1.353&r2=1.354
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.tr.po?cvsroot=www&r1=1.22&r2=1.23
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-cn.po?cvsroot=www&r1=1.14&r2=1.15
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw-diff.html?cvsroot=www&r1=1.146&r2=1.147
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/proprietary.zh-tw.po?cvsroot=www&r1=1.157&r2=1.158
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/pt-br.po?cvsroot=www&r1=1.243&r2=1.244
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/ru.po?cvsroot=www&r1=1.406&r2=1.407
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/tr.po?cvsroot=www&r1=1.15&r2=1.16
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-cn.po?cvsroot=www&r1=1.11&r2=1.12
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/zh-tw.po?cvsroot=www&r1=1.183&r2=1.184
Patches:
Index: de.po
===================================================================
RCS file: /web/www/www/proprietary/po/de.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- de.po 7 Jun 2020 07:00:04 -0000 1.183
+++ de.po 13 Jun 2020 10:00:26 -0000 1.184
@@ -2605,6 +2605,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: es.po
===================================================================
RCS file: /web/www/www/proprietary/po/es.po,v
retrieving revision 1.263
retrieving revision 1.264
diff -u -b -r1.263 -r1.264
--- es.po 8 Jun 2020 09:29:43 -0000 1.263
+++ es.po 13 Jun 2020 10:00:26 -0000 1.264
@@ -2499,6 +2499,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/fr.po,v
retrieving revision 1.321
retrieving revision 1.322
diff -u -b -r1.321 -r1.322
--- fr.po 7 Jun 2020 07:13:19 -0000 1.321
+++ fr.po 13 Jun 2020 10:00:26 -0000 1.322
@@ -2167,6 +2167,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: it.po
===================================================================
RCS file: /web/www/www/proprietary/po/it.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- it.po 7 Jun 2020 07:00:04 -0000 1.183
+++ it.po 13 Jun 2020 10:00:26 -0000 1.184
@@ -2544,6 +2544,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/ja.po,v
retrieving revision 1.191
retrieving revision 1.192
diff -u -b -r1.191 -r1.192
--- ja.po 7 Jun 2020 07:00:04 -0000 1.191
+++ ja.po 13 Jun 2020 10:00:26 -0000 1.192
@@ -1951,6 +1951,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: malware-appliances.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de-diff.html,v
retrieving revision 1.54
retrieving revision 1.55
diff -u -b -r1.54 -r1.55
--- malware-appliances.de-diff.html 7 Jun 2020 07:00:04 -0000 1.54
+++ malware-appliances.de-diff.html 13 Jun 2020 10:00:27 -0000 1.55
@@ -132,176 +132,193 @@
a</em></ins></span> security <span class="removed"><del><strong>has been
cracked</a>.</p>
<p>Note</strong></del></span> <span
class="inserted"><ins><em>vulnerability</em></ins></span> that <span
class="removed"><del><strong>this article misuses the
term</strong></del></span> <span class="inserted"><ins><em>enabled attackers
to</em></ins></span> <a
<span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
- access the user's wifi password</a>, and snoop on the household
- through connected surveillance devices.</p>
-
- <p>Knowledge of the wifi password would not be
sufficient</em></ins></span> to <span
class="removed"><del><strong>crackers.</p>
+ referring to crackers.</p>
</li>
<li>
- <p>The bad security in</strong></del></span> <span
class="inserted"><ins><em>carry
- out any significant surveillance if the devices implemented proper
- security, including encryption. But</em></ins></span> many <span
class="removed"><del><strong>Internet of Stings</strong></del></span> devices
- <span class="removed"><del><strong>allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</strong></del></span>
<span class="inserted"><ins><em>with proprietary
- software lack this. Of course, they are also used by their
- manufacturers for snooping.</p>
- </li>
-
- <li id="M201904260">
- <p>The Jibo robot toys were tethered</em></ins></span> to <span
class="removed"><del><strong>snoop on</strong></del></span> the <span
class="removed"><del><strong>people that use them</a>.</p>
- <p>Don't be a sucker—reject all</strong></del></span> <span
class="inserted"><ins><em>manufacturer's server,
- and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"></em></ins></span>
- the <span class="removed"><del><strong>stings.</p>
- <p>It is unfortunate</strong></del></span> <span
class="inserted"><ins><em>company made them all cease to work</a> by
shutting down</em></ins></span> that
- <span class="inserted"><ins><em>server.</p>
-
- <p>The shutdown might ironically be good for their users,
since</em></ins></span> the <span class="removed"><del><strong>article uses the
+ <p>The bad security in many Internet of Stings devices
+ allows <a
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs
+ to</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.commondreams.org/newswire/2019/11/07/amazons-ring-doorbells-leaks-customers-wi-fi-username-and-password">
+ access the user's wifi password</a>, and</em></ins></span> snoop on
the <span class="removed"><del><strong>people that use them</a>.</p>
+ <p>Don't be a sucker—reject all the stings.</p>
+ <p>It is unfortunate that the article uses the
term <a
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.</p>
</li>
<li>
- <p>Many models</strong></del></span>
- <span class="inserted"><ins><em>product was designed to manipulate people
by presenting a phony
- semblance</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras are tremendously
insecure.
- They have login accounts with hard-coded passwords, which can't be
- changed,</strong></del></span> <span
class="inserted"><ins><em>emotions,</em></ins></span> and <span
class="removed"><del><strong><a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way to
- delete these accounts either</a>.</p></strong></del></span>
<span class="inserted"><ins><em>was most certainly spying on
them.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li></strong></del></span>
+ <p>Many models</strong></del></span> <span
class="inserted"><ins><em>household
+ through connected surveillance devices.</p>
- <span class="inserted"><ins><em><li id="M201903210"></em></ins></span>
- <p>The <span class="removed"><del><strong>proprietary code that runs
pacemakers, insulin pumps, and other
-medical devices is</strong></del></span> <span
class="inserted"><ins><em>Medtronics Conexus Telemetry Protocol
has</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.bbc.co.uk/news/technology-40042584">
-full</strong></del></span>
- <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
- two vulnerabilities that affect several models</em></ins></span> of <span
class="removed"><del><strong>gross security faults</a>.</p>
+ <p>Knowledge</em></ins></span> of <span
class="removed"><del><strong>Internet-connected cameras are tremendously
insecure.
+ They have login accounts with hard-coded passwords, which
can't</strong></del></span> <span class="inserted"><ins><em>the wifi password
would not</em></ins></span> be
+ <span class="removed"><del><strong>changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
is no way</strong></del></span> <span
class="inserted"><ins><em>sufficient</em></ins></span> to
+ <span class="removed"><del><strong>delete these accounts
either</a>.</p>
</li>
-<li><p>Users are suing Bose for <a
-href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
-distributing a spyware app for its headphones</a>.
-Specifically, the app would record</strong></del></span> <span
class="inserted"><ins><em>implantable
- defibrillators</a> and</em></ins></span> the <span
class="removed"><del><strong>names of</strong></del></span> <span
class="inserted"><ins><em>devices they connect to.</p>
+<li>
+<p>The proprietary code that runs pacemakers, insulin pumps, and other
+medical</strong></del></span> <span class="inserted"><ins><em>carry
+ out any significant surveillance if the</em></ins></span> devices <span
class="removed"><del><strong>is <a
href="http://www.bbc.co.uk/news/technology-40042584">
+full of gross security faults</a>.</p>
+</li>
- <p>This protocol has been around since 2006, and similar
- vulnerabilities were discovered in an earlier Medtronics communication
- protocol in 2008. Apparently, nothing was done by</em></ins></span> the
<span class="removed"><del><strong>audio files
-users listen</strong></del></span> <span
class="inserted"><ins><em>company</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
-</p></strong></del></span>
- <span class="inserted"><ins><em>correct them. This means you can't rely on
proprietary software
- developers to fix bugs in their products.</p>
+<li><p>Users</strong></del></span> <span
class="inserted"><ins><em>implemented proper
+ security, including encryption. But many devices with proprietary
+ software lack this. Of course, they</em></ins></span> are <span
class="removed"><del><strong>suing Bose</strong></del></span> <span
class="inserted"><ins><em>also used by their
+ manufacturers</em></ins></span> for <span
class="inserted"><ins><em>snooping.</p>
</li>
- <li id="M201902270"></em></ins></span>
- <p>The <span class="removed"><del><strong>suit
accuses</strong></del></span> <span class="inserted"><ins><em>Ring (now Amazon)
doorbell camera is designed so</em></ins></span> that <span
class="removed"><del><strong>this was done without the users' consent.
-If</strong></del></span> the <span class="removed"><del><strong>fine print
of</strong></del></span>
- <span class="inserted"><ins><em>manufacturer (now Amazon) can watch
all</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
-would that make</strong></del></span> <span class="inserted"><ins><em>time.
Now</em></ins></span> it <span class="removed"><del><strong>acceptable? No way!
It should be flat</strong></del></span> <span
class="inserted"><ins><em>turns</em></ins></span> out
- <span class="inserted"><ins><em>that</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/surveillance-vs-democracy.html">
-illegal to design the app</strong></del></span>
- <span
class="inserted"><ins><em>href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
- anyone else can also watch, and fake videos too</a>.</p>
+ <li id="M201909061">
+ <p>Best Buy made controllable appliances and</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+distributing a spyware app for its headphones</a>.
+Specifically,</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
+ shut down</em></ins></span> the <span class="removed"><del><strong>app
would record the names of the audio files
+users listen</strong></del></span> <span
class="inserted"><ins><em>service</em></ins></span> to <span
class="removed"><del><strong>along with the headphone's unique serial number.
+</p>
- <p>The third party vulnerability is presumably
- unintentional and Amazon will probably fix it. However, we
- do not expect Amazon</em></ins></span> to <span
class="removed"><del><strong>snoop at all</a>.
+<p>The suit accuses</strong></del></span> <span
class="inserted"><ins><em>control them through</a>.</p>
+
+ <p>While it is laudable</em></ins></span> that <span
class="removed"><del><strong>this</strong></del></span> <span
class="inserted"><ins><em>Best Buy recognized it</em></ins></span> was <span
class="removed"><del><strong>done without the users' consent.
+If</strong></del></span> <span
class="inserted"><ins><em>mistreating</em></ins></span>
+ the <span class="removed"><del><strong>fine print of</strong></del></span>
<span class="inserted"><ins><em>customers by doing so, this doesn't
alter</em></ins></span> the <span class="removed"><del><strong>app said that
users gave consent for this,
+would</strong></del></span> <span
class="inserted"><ins><em>facts</em></ins></span> that <span
class="removed"><del><strong>make it acceptable? No way! It should be flat out
+<a href="/philosophy/surveillance-vs-democracy.html">
+illegal to design</strong></del></span>
+ <span class="inserted"><ins><em>tethering</em></ins></span> the <span
class="removed"><del><strong>app to snoop at all</a>.
</p>
</li>
<li id="anova">
- <p>Anova sabotaged users' cooking devices with a
downgrade</strong></del></span> <span class="inserted"><ins><em>change the
design</em></ins></span> that
- <span class="removed"><del><strong>tethered them to a remote
server.</strong></del></span> <a <span
class="removed"><del><strong>href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
- cookers won't function.</a></p></strong></del></span>
- <span
class="inserted"><ins><em>href="/proprietary/proprietary-surveillance.html#M201901100">allows
- Amazon to watch</a>.</p></em></ins></span>
+ <p>Anova sabotaged users' cooking devices with a downgrade that
+ tethered them</strong></del></span> <span
class="inserted"><ins><em>device</em></ins></span> to a <span
class="removed"><del><strong>remote server. <a
href="https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/#more-10275062">Unless
users create an account on Anova's servers, their
+ cookers won't function.</a></p>
+</li>
+
+<li>
+<p>When Miele's Internet of Stings hospital disinfectant
dishwasher</strong></del></span> <span class="inserted"><ins><em>particular
server</em></ins></span> is
+<span class="removed"><del><strong><a
href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
<span class="inserted"><ins><em>a path</em></ins></span> to <span
class="inserted"><ins><em>screwing</em></ins></span> the <span
class="removed"><del><strong>Internet,
+its security</strong></del></span>
+ <span class="inserted"><ins><em>users, and that it</em></ins></span> is
<span class="removed"><del><strong>crap</a>.</p>
+<p>For example,</strong></del></span> a <span
class="removed"><del><strong>cracker can gain access to</strong></del></span>
<span class="inserted"><ins><em>consequence of having nonfree software
in</em></ins></span> the <span class="removed"><del><strong>dishwasher's
filesystem,
+ infect it with malware,</strong></del></span>
+ <span class="inserted"><ins><em>device.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>When Miele's Internet of Stings hospital disinfectant dishwasher
is</strong></del></span>
+ <li id="M201904260">
+ <p>The Jibo robot toys were tethered to the manufacturer's
server,</em></ins></span>
+ and <span class="removed"><del><strong>force</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648"></em></ins></span>
+ the <span class="removed"><del><strong>dishwasher</strong></del></span>
<span class="inserted"><ins><em>company made them all cease</em></ins></span>
to <span class="removed"><del><strong>launch attacks on
+ other devices in</strong></del></span> <span
class="inserted"><ins><em>work</a> by shutting down that
+ server.</p>
- <span class="inserted"><ins><em><li id="M201902080">
- <p>The HP</em></ins></span> <a <span
class="removed"><del><strong>href="https://motherboard.vice.com/en_us/article/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">connected</strong></del></span>
- <span
class="inserted"><ins><em>href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
- “ink subscription” cartridges have DRM that constantly
- communicates with HP servers</a></em></ins></span> to <span
class="inserted"><ins><em>make sure</em></ins></span> the <span
class="removed"><del><strong>Internet,
-its security</strong></del></span> <span
class="inserted"><ins><em>user</em></ins></span> is <span
class="removed"><del><strong>crap</a>.</p>
-<p>For example, a cracker can gain access to</strong></del></span> <span
class="inserted"><ins><em>still
- paying for</em></ins></span> the <span
class="removed"><del><strong>dishwasher's filesystem,
- infect it with malware,</strong></del></span> <span
class="inserted"><ins><em>subscription,</em></ins></span> and <span
class="removed"><del><strong>force</strong></del></span> <span
class="inserted"><ins><em>hasn't printed more pages than were
- paid for.</p>
-
- <p>Even though</em></ins></span> the <span
class="removed"><del><strong>dishwasher to launch attacks</strong></del></span>
<span class="inserted"><ins><em>ink subscription program may be cheaper in some
- specific cases, it spies</em></ins></span> on
- <span class="removed"><del><strong>other devices</strong></del></span> <span
class="inserted"><ins><em>users, and involves totally unacceptable
- restrictions</em></ins></span> in the <span
class="removed"><del><strong>network. Since these dishwashers are used in
hospitals,
- such attacks could potentially put hundreds</strong></del></span> <span
class="inserted"><ins><em>use</em></ins></span> of <span
class="removed"><del><strong>lives at risk.</p>
+ <p>The shutdown might ironically be good for their users,
since</em></ins></span> the <span class="removed"><del><strong>network. Since
these dishwashers are used in hospitals,
+ such attacks could potentially put hundreds of lives at risk.</p>
</li>
<li>
-<p>If you buy a used “smart” car, house, TV, refrigerator,
+<p>If you buy</strong></del></span>
+ <span class="inserted"><ins><em>product was designed to manipulate people
by presenting</em></ins></span> a <span class="removed"><del><strong>used
“smart” car, house, TV, refrigerator,
etc.,
usually <a
href="http://boingboing.net/2017/02/20/the-previous-owners-of-used.html">the
-previous owners can still remotely control
it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>ink cartridges that would otherwise be in
- working order.</p></em></ins></span>
+previous owners can still remotely control
it</a>.</p></strong></del></span> <span
class="inserted"><ins><em>phony
+ semblance of emotions, and was most certainly spying on
them.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
<p>Vizio
“smart”</strong></del></span>
- <span class="inserted"><ins><em><li id="M201901100">
- <p>Amazon Ring “security” devices</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
- report everything that is viewed on them, and not just broadcasts
- and cable</a>. Even if</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
- send</em></ins></span> the <span class="removed"><del><strong>image is
coming from</strong></del></span> <span class="inserted"><ins><em>video they
capture to Amazon servers</a>, which save it
- long-term.</p>
+ <span class="inserted"><ins><em><li id="M201903210">
+ <p>The Medtronics Conexus Telemetry Protocol has</em></ins></span>
<a <span
class="removed"><del><strong>href="https://www.ftc.gov/news-events/blogs/business-blog/2017/02/what-vizio-was-doing-behind-tv-screen">TVs
+ report everything</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.startribune.com/750-000-medtronic-defibrillators-vulnerable-to-hacking/507470932/">
+ two vulnerabilities</em></ins></span> that <span
class="removed"><del><strong>is viewed on them,</strong></del></span> <span
class="inserted"><ins><em>affect several models of implantable
+ defibrillators</a></em></ins></span> and <span
class="removed"><del><strong>not just broadcasts</strong></del></span> <span
class="inserted"><ins><em>the devices they connect to.</p>
- <p>In many cases, the video shows everyone that comes near, or merely
- passes by,</em></ins></span> the user's <span
class="removed"><del><strong>own
- computer,</strong></del></span> <span class="inserted"><ins><em>front
door.</p>
-
- <p>The article focuses on how Ring used to let individual employees
look
- at</em></ins></span> the <span class="removed"><del><strong>TV reports
what it is. The existence of a way</strong></del></span> <span
class="inserted"><ins><em>videos freely. It appears Amazon has
tried</em></ins></span> to
- <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>prevent that
- secondary abuse, but</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it were not hidden as it was
in
- these TVs, does not legitimize</strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon
gets</em></ins></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
- <span class="inserted"><ins><em>video—Amazon expects society to
surrender to.</p></em></ins></span>
+ <p>This protocol has been around since 2006,</em></ins></span> and
<span class="removed"><del><strong>cable</a>. Even
if</strong></del></span> <span class="inserted"><ins><em>similar
+ vulnerabilities were discovered in an earlier Medtronics communication
+ protocol in 2008. Apparently, nothing was done by</em></ins></span> the
<span class="removed"><del><strong>image</strong></del></span> <span
class="inserted"><ins><em>company to
+ correct them. This means you can't rely on proprietary software
+ developers to fix bugs in their products.</p>
+ </li>
+
+ <li id="M201902270">
+ <p>The Ring (now Amazon) doorbell camera</em></ins></span> is <span
class="removed"><del><strong>coming from</strong></del></span> <span
class="inserted"><ins><em>designed so that</em></ins></span> the <span
class="removed"><del><strong>user's own
+ computer,</strong></del></span>
+ <span class="inserted"><ins><em>manufacturer (now Amazon) can watch
all</em></ins></span> the <span class="removed"><del><strong>TV reports
what</strong></del></span> <span class="inserted"><ins><em>time.
Now</em></ins></span> it <span class="removed"><del><strong>is. The existence
of a way</strong></del></span> <span class="inserted"><ins><em>turns out
+ that <a
+
href="https://web.archive.org/web/20190918024432/https://dojo.bullguard.com/dojo-by-bullguard/blog/ring/">
+ anyone else can also watch, and fake videos too</a>.</p>
+
+ <p>The third party vulnerability is presumably
+ unintentional and Amazon will probably fix it. However, we
+ do not expect Amazon</em></ins></span> to
+ <span class="removed"><del><strong>disable</strong></del></span> <span
class="inserted"><ins><em>change</em></ins></span> the <span
class="removed"><del><strong>surveillance, even if it</strong></del></span>
<span class="inserted"><ins><em>design that <a
+ href="/proprietary/proprietary-surveillance.html#M201901100">allows
+ Amazon to watch</a>.</p>
+ </li>
+
+ <li id="M201902080">
+ <p>The HP <a
+ href="https://boingboing.net/2019/02/08/inkjet-dystopias.html">
+ “ink subscription” cartridges have DRM that constantly
+ communicates with HP servers</a> to make sure the user is still
+ paying for the subscription, and hasn't printed more pages
than</em></ins></span> were <span class="removed"><del><strong>not hidden
as</strong></del></span>
+ <span class="inserted"><ins><em>paid for.</p>
+
+ <p>Even though the ink subscription program may be cheaper in some
+ specific cases,</em></ins></span> it <span
class="removed"><del><strong>was</strong></del></span> <span
class="inserted"><ins><em>spies on users, and involves totally unacceptable
+ restrictions</em></ins></span> in
+ <span class="removed"><del><strong>these TVs, does not
legitimize</strong></del></span> the <span
class="removed"><del><strong>surveillance.</p></strong></del></span>
<span class="inserted"><ins><em>use of ink cartridges that would otherwise be in
+ working order.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>More or less all “smart”</strong></del></span>
+<p>More or less all “smart” TVs</strong></del></span>
- <span class="inserted"><ins><em><li id="M201901070">
- <p>Vizio</em></ins></span> TVs <a
+ <span class="inserted"><ins><em><li id="M201901100">
+ <p>Amazon Ring “security” devices</em></ins></span> <a
<span
class="removed"><del><strong>href="http://www.myce.com/news/reseachers-all-smart-tvs-spy-on-you-sony-monitors-all-channel-switches-72851/">spy
on their users</a>.</p>
<p>The report was as of 2014, but we don't expect this has got
better.</p>
-<p>This shows that laws requiring products to get users' formal
+<p>This</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.engadget.com/2019/01/10/ring-gave-employees-access-customer-video-feeds/">
+ send the video they capture to Amazon servers</a>, which save it
+ long-term.</p>
+
+ <p>In many cases, the video</em></ins></span> shows <span
class="inserted"><ins><em>everyone</em></ins></span> that <span
class="removed"><del><strong>laws requiring products to get users' formal
consent before collecting personal data are totally inadequate. And
-what happens if a user declines consent? Probably the TV will say,
-“Without your consent to tracking,</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
- collect “whatever</em></ins></span> the TV <span
class="removed"><del><strong>will not
+what happens if a user declines consent? Probably</strong></del></span> <span
class="inserted"><ins><em>comes near, or merely
+ passes by,</em></ins></span> the <span class="removed"><del><strong>TV
will say,
+“Without your consent</strong></del></span> <span
class="inserted"><ins><em>user's front door.</p>
+
+ <p>The article focuses on how Ring used</em></ins></span> to <span
class="removed"><del><strong>tracking,</strong></del></span> <span
class="inserted"><ins><em>let individual employees look
+ at</em></ins></span> the <span class="removed"><del><strong>TV will not
work.”</p>
-<p>Proper laws would say that TVs are not allowed to report
what</strong></del></span> <span
class="inserted"><ins><em>sees,”</a> in</em></ins></span> the
-<span class="removed"><del><strong>user watches — no
exceptions!</p>
-</li>
-<li>
-<p>Some LG
-TVs <a href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
+<p>Proper laws would say that TVs are not allowed</strong></del></span>
<span class="inserted"><ins><em>videos freely. It appears Amazon has
tried</em></ins></span> to <span class="removed"><del><strong>report
what</strong></del></span> <span class="inserted"><ins><em>prevent that
+ secondary abuse, but</em></ins></span> the
+<span class="removed"><del><strong>user watches — no
exceptions!</p></strong></del></span> <span
class="inserted"><ins><em>primary abuse—that Amazon gets the
+ video—Amazon expects society to surrender
to.</p></em></ins></span>
+ </li>
+<span class="removed"><del><strong><li>
+<p>Some LG</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201901070">
+ <p>Vizio</em></ins></span> TVs <a <span
class="removed"><del><strong>href="http://openlgtv.org.ru/wiki/index.php/Achievements">are
tyrants</a>.</p>
</li>
<li><a
href="http://wiki.samygo.tv/index.php5/SamyGO_for_DUMMIES#What_are_Restricted_Firmwares.3F">
-Samsung “Smart” TVs have turned Linux into</strong></del></span>
<span class="inserted"><ins><em>own words of</em></ins></span> the <span
class="removed"><del><strong>base
-for a tyrant system</a> so as</strong></del></span> <span
class="inserted"><ins><em>company's
+Samsung “Smart” TVs have turned Linux into</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2019/1/7/18172397/airplay-2-homekit-vizio-tv-bill-baxter-interview-vergecast-ces-2019">
+ collect “whatever</em></ins></span> the <span
class="removed"><del><strong>base
+for a tyrant system</a> so as</strong></del></span> <span
class="inserted"><ins><em>TV sees,”</a> in the own words of the
company's
CTO, and this data is sold</em></ins></span> to <span
class="removed"><del><strong>impose DRM.
What enables Samsung</strong></del></span> <span
class="inserted"><ins><em>third parties. This is in return for
“better service” (meaning more intrusive ads?) and slightly
@@ -327,117 +344,118 @@
<p>The company's statement</strong></del></span> that <span
class="removed"><del><strong>it anonymizes</strong></del></span>
<span class="inserted"><ins><em>matter),</em></ins></span> the <span
class="removed"><del><strong>data may be true,
but</strong></del></span> <span class="inserted"><ins><em>easiest way to make
sure</em></ins></span> it <span class="removed"><del><strong>doesn't really
matter. If</strong></del></span> <span class="inserted"><ins><em>isn't spying
on you is
- to disconnect</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>data</strong></del></span> <span
class="inserted"><ins><em>Internet, and use a terrestrial antenna
+ to disconnect</em></ins></span> it <span
class="removed"><del><strong>sells</strong></del></span> <span
class="inserted"><ins><em>from</em></ins></span> the <span
class="removed"><del><strong>data to</strong></del></span> <span
class="inserted"><ins><em>Internet, and use</em></ins></span> a <span
class="removed"><del><strong>data broker,
+the data broker</strong></del></span> <span
class="inserted"><ins><em>terrestrial antenna
instead. Unfortunately, this is not always possible. Another option,
- if you are technically oriented, is</em></ins></span> to <span
class="inserted"><ins><em>get your own router (which can
- be an old computer running completely free software), and set
up</em></ins></span> a <span class="removed"><del><strong>data broker,
-the data broker</strong></del></span>
- <span class="inserted"><ins><em>firewall to block connections to Vizio's
servers. Or, as a last resort,
- you</em></ins></span> can <span class="removed"><del><strong>figure out
who the user is.</p></strong></del></span> <span
class="inserted"><ins><em>replace your TV with another
model.</p></em></ins></span>
- </li>
-
-<span class="removed"><del><strong><li>
-<p>Google/Alphabet</strong></del></span>
+ if you are technically oriented, is to get your own router
(which</em></ins></span> can <span class="removed"><del><strong>figure out who
the user is.</p>
+</li>
- <span class="inserted"><ins><em><li id="M201810300">
- <p>Nearly all “home security cameras”</em></ins></span>
<a
-<span
class="removed"><del><strong>href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
-intentionally broke Revolv home automatic control products that depended on
-a server</a> to function. The lesson is, don't stand for that! Insist
+<li>
+<p>Google/Alphabet <a
+href="https://www.eff.org/deeplinks/2016/04/nest-reminds-customers-ownership-isnt-what-it-used-be">
+intentionally broke Revolv home automatic control products that depended
on</strong></del></span>
+ <span class="inserted"><ins><em>be an old computer running completely free
software), and set up</em></ins></span> a <span
class="removed"><del><strong>server</a></strong></del></span>
+ <span class="inserted"><ins><em>firewall</em></ins></span> to <span
class="removed"><del><strong>function. The lesson is, don't stand for that!
Insist
on self-contained computers that run free software!</p>
</li>
<li>
-<p>ARRIS cable modem has</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/">
- give the manufacturer an unencrypted copy of everything they
- see</a>. “Home insecurity camera” would
be</em></ins></span> a <span class="removed"><del><strong><a
+<p>ARRIS cable modem has</strong></del></span> <span
class="inserted"><ins><em>block connections to Vizio's servers. Or,
as</em></ins></span> a <span class="removed"><del><strong><a
href="https://w00tsec.blogspot.de/2015/11/arris-cable-modem-has-backdoor-in.html?m=1">
-backdoor</strong></del></span> <span class="inserted"><ins><em>better
- name!</p>
-
- <p>When Consumer Reports tested them, it suggested that these
- manufacturers promise not to look at what's</em></ins></span> in the <span
class="removed"><del><strong>backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>videos. That's not
- security for your home. Security means making sure they don't get to
- see through your camera.</p></em></ins></span>
+backdoor in the backdoor</a>.</p></strong></del></span> <span
class="inserted"><ins><em>last resort,
+ you can replace your TV with another model.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>HP “storage appliances” that use</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201810150">
- <p>Printer manufacturers are very innovative—at
blocking</em></ins></span> the <span class="removed"><del><strong>proprietary
+<p>HP “storage appliances” that use the proprietary
“Left Hand” operating system have back doors that give
HP</strong></del></span>
- <span class="inserted"><ins><em>use of independent replacement ink
cartridges. Their “security
- upgrades” occasionally impose new forms of cartridge
DRM.</em></ins></span> <a
+
+ <span class="inserted"><ins><em><li id="M201810300">
+ <p>Nearly all “home security cameras”</em></ins></span>
<a
<span
class="removed"><del><strong>href="https://insights.dice.com/2013/07/11/hp-keeps-installing-secret-backdoors-in-enterprise-storage/">
-remote login access</a> to them. HP claims that this does not
give</strong></del></span>
- <span
class="inserted"><ins><em>href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates"></em></ins></span>
- HP
-<span class="removed"><del><strong>access to</strong></del></span> <span
class="inserted"><ins><em>and Epson have done this</a>.</p>
- </li>
+remote login access</a> to them. HP claims that this does
not</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.consumerreports.org/privacy/d-link-camera-poses-data-security-risk--consumer-reports-finds/"></em></ins></span>
+ give <span class="removed"><del><strong>HP
+access to the customer's data, but if</strong></del></span> the <span
class="removed"><del><strong>back door allows
+installation</strong></del></span> <span
class="inserted"><ins><em>manufacturer an unencrypted copy</em></ins></span> of
<span class="removed"><del><strong>software changes, a change
could</strong></del></span> <span class="inserted"><ins><em>everything they
+ see</a>. “Home insecurity camera”
would</em></ins></span> be <span
class="removed"><del><strong>installed</strong></del></span> <span
class="inserted"><ins><em>a better
+ name!</p>
- <li id="M201809260">
- <p>Honeywell's “smart” thermostats communicate
- only through</em></ins></span> the <span
class="removed"><del><strong>customer's data, but if</strong></del></span>
<span class="inserted"><ins><em>company's server. They have
- all</em></ins></span> the <span class="removed"><del><strong>back door
allows
-installation</strong></del></span> <span class="inserted"><ins><em>nasty
characteristics</em></ins></span> of <span
class="removed"><del><strong>software changes,</strong></del></span> <span
class="inserted"><ins><em>such devices: <a
-
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance, and danger of sabotage</a> (of</em></ins></span> a
<span class="removed"><del><strong>change could be installed that
-would give access to</strong></del></span> <span
class="inserted"><ins><em>specific user, or of
- all users at once), as well as</em></ins></span> the <span
class="removed"><del><strong>customer's data.
+ <p>When Consumer Reports tested them, it suggested</em></ins></span>
that
+<span class="removed"><del><strong>would give access</strong></del></span>
<span class="inserted"><ins><em>these
+ manufacturers promise not</em></ins></span> to <span
class="inserted"><ins><em>look at what's in</em></ins></span> the <span
class="removed"><del><strong>customer's data.
</p>
</li>
<li>
<p><a
href="http://www.itworld.com/article/2705284/data-protection/backdoor-found-in-d-link-router-firmware-code.html">
-Some D-Link routers</a> have a back door for changing settings in a
-dlink</strong></del></span> <span
class="inserted"><ins><em>risk</em></ins></span> of an <span
class="removed"><del><strong>eye.</p>
+Some D-Link routers</a> have a back door</strong></del></span> <span
class="inserted"><ins><em>videos. That's not
+ security</em></ins></span> for <span class="removed"><del><strong>changing
settings in a
+dlink</strong></del></span> <span class="inserted"><ins><em>your home.
Security means making sure they don't get to
+ see through your camera.</p>
+ </li>
+
+ <li id="M201810150">
+ <p>Printer manufacturers are very innovative—at blocking the
+ use</em></ins></span> of <span class="removed"><del><strong>an
eye.</p>
<p>
-<a href="https://github.com/elvanderb/TCP-32764">Many models of routers
-have back doors</a>.</p></strong></del></span> <span
class="inserted"><ins><em>outage (which is what
- just happened).</p>
+<a href="https://github.com/elvanderb/TCP-32764">Many
models</strong></del></span> <span class="inserted"><ins><em>independent
replacement ink cartridges. Their “security
+ upgrades” occasionally impose new forms</em></ins></span> of <span
class="removed"><del><strong>routers</strong></del></span> <span
class="inserted"><ins><em>cartridge DRM. <a
+
href="https://motherboard.vice.com/en_us/article/pa98ab/printer-makers-are-crippling-cheap-ink-cartridges-via-bogus-security-updates">
+ HP and Epson</em></ins></span> have <span
class="removed"><del><strong>back doors</a>.</p>
+</li>
- <p>In addition, setting the desired temperature requires running
- nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p></em></ins></span>
+<li>
+<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
+The TP-Link router has a backdoor</a>.</p></strong></del></span>
<span class="inserted"><ins><em>done this</a>.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p><a href="http://sekurak.pl/tp-link-httptftp-backdoor/">
-The TP-Link router has a backdoor</a>.</p></strong></del></span>
+<p>The</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201809260">
+ <p>Honeywell's “smart” thermostats communicate
+ only through the company's server. They have
+ all the nasty characteristics of such devices:</em></ins></span> <a
<span
class="removed"><del><strong>href="http://michaelweinberg.org/post/137045828005/free-the-cube">
+“Cube” 3D printer was designed with DRM</a>: it won't accept
+third-party printing materials. It is</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
+ surveillance, and danger of sabotage</a> (of a specific user, or of
+ all users at once), as well as</em></ins></span> the <span
class="removed"><del><strong>Keurig</strong></del></span> <span
class="inserted"><ins><em>risk</em></ins></span> of <span
class="removed"><del><strong>printers. Now it</strong></del></span> <span
class="inserted"><ins><em>an outage (which</em></ins></span> is
+<span class="removed"><del><strong>being discontinued, which means that
eventually authorized materials won't
+be available and</strong></del></span> <span class="inserted"><ins><em>what
+ just happened).</p>
- <span class="inserted"><ins><em><li id="M201809240">
+ <p>In addition, setting</em></ins></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
+
+<p>With a <a
href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
+printer that gets</strong></del></span> <span
class="inserted"><ins><em>desired temperature requires running
+ nonfree software. With an old-fashioned thermostat, you can do it
+ using controls right on</em></ins></span> the <span
class="removed"><del><strong>Respects Your Freedom</a>, this problem
would not
+even be a remote possibility.</p>
+
+<p>How pitiful</strong></del></span> <span
class="inserted"><ins><em>thermostat.</p>
+ </li>
+
+ <li id="M201809240">
<p>Researchers have discovered how to <a
href="http://news.rub.de/english/press-releases/2018-09-24-it-security-secret-messages-alexa-and-co">
- hide voice commands in other audio</a>, so that people cannot hear
- them, but Alexa and Siri can.</p></em></ins></span>
+ hide voice commands in other audio</a>, so</em></ins></span> that
<span class="inserted"><ins><em>people cannot hear
+ them, but Alexa and Siri can.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201807050"></em></ins></span>
- <p>The <span class="removed"><del><strong><a
href="http://michaelweinberg.org/post/137045828005/free-the-cube">
-“Cube” 3D printer</strong></del></span> <span
class="inserted"><ins><em>Jawbone fitness tracker</em></ins></span> was <span
class="removed"><del><strong>designed with DRM</a>: it won't accept
-third-party printing materials. It is</strong></del></span> <span
class="inserted"><ins><em>tethered to a proprietary phone
- app. In 2017,</em></ins></span> the <span
class="removed"><del><strong>Keurig of printers. Now it is
-being discontinued, which means that eventually authorized materials won't
-be available</strong></del></span> <span class="inserted"><ins><em>company
shut down</em></ins></span> and <span
class="inserted"><ins><em>made</em></ins></span> the <span
class="removed"><del><strong>printers may become unusable.</p>
-
-<p>With a</strong></del></span> <span class="inserted"><ins><em>app stop
working.</em></ins></span> <a <span
class="removed"><del><strong>href="http://www.fsf.org/resources/hw/endorsement/aleph-objects">
-printer that gets</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All</em></ins></span>
- the <span class="removed"><del><strong>Respects Your Freedom</a>,
this problem would not
-even be</strong></del></span> <span class="inserted"><ins><em>existing
trackers stopped working forever</a>.</p>
-
- <p>The article focuses on</em></ins></span> a <span
class="removed"><del><strong>remote possibility.</p>
-
-<p>How pitiful</strong></del></span> <span
class="inserted"><ins><em>further nasty fillip,</em></ins></span> that <span
class="removed"><del><strong>the author</strong></del></span> <span
class="inserted"><ins><em>sales</em></ins></span> of <span
class="inserted"><ins><em>the
- broken devices continued. But we think</em></ins></span> that <span
class="removed"><del><strong>article says that there was
-“nothing wrong” with designing</strong></del></span> <span
class="inserted"><ins><em>is a secondary issue;
- it made</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span> <span
class="inserted"><ins><em>nasty consequences extend</em></ins></span> to <span
class="removed"><del><strong>restrict users in</strong></del></span> <span
class="inserted"><ins><em>some additional people.
+ <li id="M201807050">
+ <p>The Jawbone fitness tracker was tethered to a proprietary phone
+ app. In 2017,</em></ins></span> the <span
class="removed"><del><strong>author of that</strong></del></span> <span
class="inserted"><ins><em>company shut down and made the app stop working. <a
+
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
+ the existing trackers stopped working forever</a>.</p>
+
+ <p>The</em></ins></span> article <span
class="removed"><del><strong>says</strong></del></span> <span
class="inserted"><ins><em>focuses on a further nasty fillip,</em></ins></span>
that <span class="removed"><del><strong>there was
+“nothing wrong” with designing</strong></del></span> <span
class="inserted"><ins><em>sales of</em></ins></span> the <span
class="removed"><del><strong>device</strong></del></span>
+ <span class="inserted"><ins><em>broken devices continued. But we think
that is a secondary issue;
+ it made the nasty consequences extend</em></ins></span> to <span
class="removed"><del><strong>restrict users in</strong></del></span> <span
class="inserted"><ins><em>some additional people.
The fundamental wrong was to design</em></ins></span> the <span
class="removed"><del><strong>first place. This is like
putting</strong></del></span> <span class="inserted"><ins><em>devices to depend
on something
else that didn't respect users' freedom.</p>
</li>
@@ -491,262 +509,285 @@
</p>
<p>That page uses spin terms that favor DRM,
-including <a
href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
-digital “rights” management</a>
-and</strong></del></span> <span class="inserted"><ins><em>lose your internet
service, you also</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
+including</strong></del></span> <span class="inserted"><ins><em>lose your
internet service, you also</em></ins></span> <a <span
class="removed"><del><strong>href="/philosophy/words-to-avoid.html#DigitalRightsManagement">
+digital “rights” management</a></strong></del></span>
<span
class="inserted"><ins><em>href="https://torrentfreak.com/piracy-notices-can-mess-with-your-thermostat-isp-warns-171224/">
- lose control of your house</em></ins></span> and <span
class="removed"><del><strong>it claims that “artists” (rather than
companies) are
-primarily responsible for putting digital restrictions management into
-these disks. Nonetheless, it is a reference for the facts.
-</p>
-
-<p>Every Bluray disk (with few, rare exceptions) has
DRM—so</strong></del></span> <span
class="inserted"><ins><em>appliances</a>.</p>
+ lose control of your house</em></ins></span> and <span
class="removed"><del><strong><a
href="/philosophy/words-to-avoid.html#Protection">“protect”</a>,</strong></del></span>
<span class="inserted"><ins><em>appliances</a>.</p>
- <p>For your safety,</em></ins></span> don't use <span
class="removed"><del><strong>Bluray disks!</p></strong></del></span>
<span class="inserted"><ins><em>any appliance with a connection to the
- real internet.</p></em></ins></span>
+ <p>For your safety, don't use any appliance with a connection to the
+ real internet.</p>
</li>
- <li <span class="removed"><del><strong>id="cameras-bugs">
-<p>Over 70 brands of network-connected surveillance cameras
have</strong></del></span> <span class="inserted"><ins><em>id="M201711200">
- <p>Amazon recently invited consumers to be suckers
and</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
-security bugs that</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo"></em></ins></span>
- allow <span class="removed"><del><strong>anyone</strong></del></span>
<span class="inserted"><ins><em>delivery staff</em></ins></span> to <span
class="removed"><del><strong>watch through them</a>.</p>
-</li>
+ <li id="M201711200">
+ <p>Amazon recently invited consumers to be suckers</em></ins></span>
and <span class="removed"><del><strong>it claims that “artists”
(rather than companies) are
+primarily responsible for putting digital restrictions management into
+these disks. Nonetheless, it is a reference for</strong></del></span> <span
class="inserted"><ins><em><a
+
href="https://www.techdirt.com/articles/20171120/10533238651/vulnerability-fo">
+ allow delivery staff to open their front doors</a>. Wouldn't you know
+ it,</em></ins></span> the <span class="removed"><del><strong>facts.
+</p>
-<li>
-<p>Samsung's “Smart Home”</strong></del></span> <span
class="inserted"><ins><em>open their front doors</a>. Wouldn't you know
- it, the system</em></ins></span> has a <span
class="removed"><del><strong>big</strong></del></span> <span
class="inserted"><ins><em>grave</em></ins></span> security <span
class="removed"><del><strong>hole;</strong></del></span> <span
class="inserted"><ins><em>flaw.</p>
+<p>Every Bluray disk (with few, rare exceptions)</strong></del></span>
<span class="inserted"><ins><em>system</em></ins></span> has <span
class="removed"><del><strong>DRM—so
+don't use Bluray disks!</p></strong></del></span> <span
class="inserted"><ins><em>a grave security flaw.</p></em></ins></span>
</li>
- <li id="M201711100">
- <p>A remote-control sex toy was found to make</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
-unauthorized people can remotely</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
- recordings of the conversation between two users</a>.</p>
+ <li <span class="removed"><del><strong>id="cameras-bugs">
+<p>Over 70 brands</strong></del></span> <span
class="inserted"><ins><em>id="M201711100">
+ <p>A remote-control sex toy was found to make <a
+
href="https://www.theverge.com/2017/11/10/16634442/lovense-sex-toy-spy-survei">audio
+ recordings</em></ins></span> of <span
class="removed"><del><strong>network-connected surveillance cameras
have</strong></del></span> <span class="inserted"><ins><em>the conversation
between two users</a>.</p>
</li>
<li id="M201711080">
<p>Logitech will sabotage
- all Harmony Link household</em></ins></span> control <span
class="removed"><del><strong>it</a>.</p>
-
-<p>Samsung claims that this is an “open” platform
so</strong></del></span> <span class="inserted"><ins><em>devices by <a
-
href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
- turning off</em></ins></span> the
-<span class="removed"><del><strong>problem is partly</strong></del></span>
<span class="inserted"><ins><em>server through which</em></ins></span> the
<span class="removed"><del><strong>fault of app developers.
That</strong></del></span> <span class="inserted"><ins><em>products' supposed
owners
+ all Harmony Link household control devices by</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.kerneronsec.com/2016/02/remote-code-execution-in-cctv-dvrs-of.html">
+security bugs</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://arstechnica.com/gadgets/2017/11/logitech-to-shut-down-service-and-support-for-harmony-link-devices-in-2018/">
+ turning off the server through which the products' supposed owners
communicate with them</a>.</p>
- <p>The owners suspect this</em></ins></span> is <span
class="removed"><del><strong>clearly true if
-the apps</strong></del></span> <span class="inserted"><ins><em>to pressure
them to buy a newer model. If
- they</em></ins></span> are <span class="removed"><del><strong>proprietary
software.</p>
-
-<p>Anything whose name is “Smart” is most likely
going</strong></del></span> <span class="inserted"><ins><em>wise, they will
learn, rather,</em></ins></span> to
-<span class="removed"><del><strong>screw you.</p></strong></del></span>
<span class="inserted"><ins><em>distrust any product that
- requires users to talk with them through some specialized
service.</p></em></ins></span>
+ <p>The owners suspect this is to pressure them to buy a newer model.
If
+ they are wise, they will learn, rather, to distrust any
product</em></ins></span> that <span class="removed"><del><strong>allow
anyone</strong></del></span>
+ <span class="inserted"><ins><em>requires users</em></ins></span> to <span
class="removed"><del><strong>watch</strong></del></span> <span
class="inserted"><ins><em>talk with them</em></ins></span> through <span
class="removed"><del><strong>them</a>.</p></strong></del></span>
<span class="inserted"><ins><em>some specialized
service.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>
-Malware found on</strong></del></span>
+<p>Samsung's “Smart Home” has</strong></del></span>
<span class="inserted"><ins><em><li id="M201710040">
<p>Every “home security” camera, if its
- manufacturer can communicate with it, is a surveillance
device.</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
-security cameras available through Amazon</a>.
-</p>
+ manufacturer can communicate with it, is</em></ins></span> a <span
class="removed"><del><strong>big security hole;</strong></del></span> <span
class="inserted"><ins><em>surveillance device.</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://arstechnica.com/security/2016/05/samsung-smart-home-flaws-lets-hackers-make-keys-to-front-door/">
+unauthorized people can remotely control it</a>.</p>
-<p>A</strong></del></span>
+<p>Samsung claims that this</strong></del></span>
<span
class="inserted"><ins><em>href="https://www.theverge.com/circuitbreaker/2017/10/4/16426394/canary-smart-home-camera-free-service-update-change">
- Canary</em></ins></span> camera <span class="removed"><del><strong>that
records locally on physical media, and has no network
-connection, does not threaten people with
surveillance—neither</strong></del></span> <span
class="inserted"><ins><em>is an example</a>.</p>
+ Canary camera</em></ins></span> is an <span
class="removed"><del><strong>“open” platform
so</strong></del></span> <span
class="inserted"><ins><em>example</a>.</p>
- <p>The article describes wrongdoing</em></ins></span> by <span
class="removed"><del><strong>watching people through</strong></del></span> the
<span class="removed"><del><strong>camera, nor through malware
in</strong></del></span> <span class="inserted"><ins><em>manufacturer, based
on</em></ins></span>
- the
-<span class="removed"><del><strong>camera.</p>
+ <p>The article describes wrongdoing by</em></ins></span> the
+<span class="removed"><del><strong>problem is partly</strong></del></span>
<span class="inserted"><ins><em>manufacturer, based on</em></ins></span>
+ the <span class="removed"><del><strong>fault of app developers. That is
clearly true if</strong></del></span> <span class="inserted"><ins><em>fact
that</em></ins></span> the <span class="removed"><del><strong>apps are
proprietary software.</p>
+
+<p>Anything whose name is “Smart”</strong></del></span>
<span class="inserted"><ins><em>device</em></ins></span> is <span
class="removed"><del><strong>most likely going</strong></del></span> <span
class="inserted"><ins><em>tethered</em></ins></span> to
+<span class="removed"><del><strong>screw you.</p>
</li>
<li>
-<p> <a
-href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
-FitBit fitness trackers have a Bluetooth
vulnerability</a></strong></del></span> <span
class="inserted"><ins><em>fact</em></ins></span> that <span
class="removed"><del><strong>allows
-attackers to send malware to</strong></del></span> the <span
class="removed"><del><strong>devices, which can subsequently
-spread</strong></del></span> <span class="inserted"><ins><em>device is
tethered</em></ins></span> to <span class="removed"><del><strong>computers and
other FitBit trackers</strong></del></span> <span class="inserted"><ins><em>a
server.</p>
+<p>
+Malware found on <a
+href="http://www.slate.com/blogs/future_tense/2016/04/11/security_cameras_sold_through_amazon_have_malware_according_to_security.html">
+security cameras available through Amazon</a>.
+</p>
+
+<p>A camera</strong></del></span> <span class="inserted"><ins><em>a
server.</p>
<p><a href="/proprietary/proprietary-tethers.html">More about
proprietary tethering</a>.</p>
- <p>But it also demonstrates</em></ins></span> that <span
class="removed"><del><strong>interact with
-them.</p>
-</li>
-
-<li>
-<p> “Self-encrypting” disk drives do</strong></del></span>
the <span class="removed"><del><strong>encryption with
-proprietary firmware so you can't trust it. Western Digital's <a
-href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
-“My Passport” drives have a back
door</a>.</p></strong></del></span> <span
class="inserted"><ins><em>device gives the company
+ <p>But it also demonstrates</em></ins></span> that <span
class="removed"><del><strong>records locally on physical media, and has no
network
+connection, does not threaten people with surveillance—neither
+by watching people through</strong></del></span> the <span
class="removed"><del><strong>camera, nor through malware
in</strong></del></span> <span class="inserted"><ins><em>device
gives</em></ins></span> the
+<span class="removed"><del><strong>camera.</p></strong></del></span>
<span class="inserted"><ins><em>company
surveillance capability.</p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>
-Hospira infusion pumps, which are used to administer drugs to
-a patient, were rated “<a
-href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
-least secure IP device I've ever seen</a>” by a security
-researcher.</p>
-
-<p>Depending on what drug</strong></del></span>
+<p></strong></del></span>
<span class="inserted"><ins><em><li id="M201709200">
<p>A “smart” intravenous pump
- designed for hospitals</em></ins></span> is <span
class="removed"><del><strong>being infused,</strong></del></span> <span
class="inserted"><ins><em>connected to</em></ins></span> the <span
class="removed"><del><strong>insecurity could
-open</strong></del></span> <span class="inserted"><ins><em>internet. Naturally
<a
-
href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
+ designed for hospitals is connected to the internet.
Naturally</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.tripwire.com/state-of-security/latest-security-news/10-second-hack-delivers-first-ever-malware-to-fitness-trackers/">
+FitBit fitness trackers have a Bluetooth
vulnerability</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170920/09450338247/smart-hospital-iv-pump-vulnerable-to-remote-hack-attack.shtml">
its security has been cracked</a>.</p>
- <p><small>(Note that this article misuses</em></ins></span>
the <span class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>term <a
+ <p><small>(Note</em></ins></span> that <span
class="removed"><del><strong>allows
+attackers</strong></del></span> <span class="inserted"><ins><em>this article
misuses the term <a
href="/philosophy/words-to-avoid.html#Hacker">“hackers”</a>
- referring</em></ins></span> to <span
class="removed"><del><strong>murder.</p></strong></del></span> <span
class="inserted"><ins><em>crackers.)</small></p></em></ins></span>
+ referring</em></ins></span> to <span class="removed"><del><strong>send
malware</strong></del></span> <span
class="inserted"><ins><em>crackers.)</small></p>
</li>
-<span class="removed"><del><strong><li>
-<p>Due to</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201708280">
- <p>The</em></ins></span> bad security in <span
class="removed"><del><strong>a drug pump, crackers could use it
to</strong></del></span> <span class="inserted"><ins><em>many Internet of
Stings devices allows</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
-kill patients</a>.</p>
+ <li id="M201708280">
+ <p>The bad security in many Internet of Stings devices allows <a
+
href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
+ to <span class="inserted"><ins><em>snoop on</em></ins></span> the <span
class="removed"><del><strong>devices, which can subsequently
+spread to computers and other FitBit trackers</strong></del></span> <span
class="inserted"><ins><em>people</em></ins></span> that <span
class="removed"><del><strong>interact with
+them.</p>
</li>
<li>
-<p><a
-href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
-“Smart homes”</a> turn out</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.techdirt.com/articles/20170828/08152938092/iot-devices-provide-comcast-wonderful-new-opportunity-to-spy-you.shtml">ISPs</em></ins></span>
- to <span class="inserted"><ins><em>snoop on the people that use
them</a>.</p>
+<p> “Self-encrypting” disk drives do</strong></del></span>
<span class="inserted"><ins><em>use them</a>.</p>
- <p>Don't</em></ins></span> be <span
class="removed"><del><strong>stupidly vulnerable to
-intrusion.</p>
-</li>
-
-<li>
-<p>The <a
-href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
-FTC punished</strong></del></span> a <span
class="removed"><del><strong>company for making webcams with bad
security</a> so</strong></del></span> <span
class="inserted"><ins><em>sucker—reject all the stings.</p>
+ <p>Don't be a sucker—reject all</em></ins></span> the <span
class="removed"><del><strong>encryption with
+proprietary firmware so you can't trust it. Western
Digital's</strong></del></span> <span
class="inserted"><ins><em>stings.</p>
- <p><small>(It is unfortunate</em></ins></span> that <span
class="removed"><del><strong>it was easy for anyone to watch
them.</p></strong></del></span> <span class="inserted"><ins><em>the
article uses the term <a
-
href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
+ <p><small>(It is unfortunate that the article uses the
term</em></ins></span> <a
+<span
class="removed"><del><strong>href="https://motherboard.vice.com/en_uk/read/some-popular-self-encrypting-hard-drives-have-really-bad-encryption">
+“My Passport” drives have a back
door</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/words-to-avoid.html#Monetize">“monetize”</a>.)</small></p></em></ins></span>
</li>
<span class="removed"><del><strong><li>
-<p>It is possible</strong></del></span>
+<p>
+Hospira infusion pumps, which are used to administer
drugs</strong></del></span>
<span class="inserted"><ins><em><li id="M201708230">
<p>Sonos <a
href="http://www.zdnet.com/article/sonos-accept-new-privacy-policy-speakers-cease-to-function/">
told all its customers, “Agree”</em></ins></span>
- to <span class="inserted"><ins><em>snooping or the product will stop
working</a>.</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
-kill</strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
- Another article</a> says they won't forcibly change the software,
but</em></ins></span>
- people <span class="removed"><del><strong>by taking control of medical
implants by radio</a>. More
-information in <a
-href="http://www.bbc.co.uk/news/technology-17631838">BBC News</a> and
-<a
-href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
-IOActive Labs Research blog</a>.</p>
-</li>
-
-<li>
-<p>Lots of <a
-href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
-hospital equipment has lousy security</a>, and it
can</strong></del></span> <span
class="inserted"><ins><em>won't</em></ins></span> be <span
class="removed"><del><strong>fatal.</p>
-</li>
+ to
+<span class="removed"><del><strong>a patient, were rated “<a
+href="https://securityledger.com/2015/05/researcher-drug-pump-the-least-secure-ip-device-ive-ever-seen/">
+least secure IP device I've ever seen</a>” by a security
+researcher.</p>
-<li>
-<p><a
-href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
-Point-of-sale terminals running Windows were taken
over</a></strong></del></span> <span class="inserted"><ins><em>able to
get any upgrades</em></ins></span> and <span class="removed"><del><strong>turned
-into a botnet for the purpose of collecting customers' credit card
-numbers.</p></strong></del></span> <span
class="inserted"><ins><em>eventually it will
+<p>Depending on what drug is being infused,</strong></del></span> <span
class="inserted"><ins><em>snooping or</em></ins></span> the <span
class="removed"><del><strong>insecurity could
+open</strong></del></span> <span class="inserted"><ins><em>product will stop
working</a>. <a
+
href="https://www.consumerreports.org/consumerist/sonos-holds-software-updates-hostage-if-you-dont-sign-new-privacy-agreement/">
+ Another article</a> says they won't forcibly
change</em></ins></span> the <span
class="removed"><del><strong>door</strong></del></span> <span
class="inserted"><ins><em>software, but
+ people won't be able</em></ins></span> to <span
class="removed"><del><strong>murder.</p></strong></del></span> <span
class="inserted"><ins><em>get any upgrades and eventually it will
stop working.</p></em></ins></span>
</li>
- <li <span class="removed"><del><strong>id="vizio-snoop">
-<p>Vizio
-<a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
-used</strong></del></span> <span class="inserted"><ins><em>id="M201708040">
- <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>firmware
“upgrade”</strong></del></span> <span class="inserted"><ins><em>DJI
drone</em></ins></span>
- to <span class="removed"><del><strong>make its TVs</strong></del></span>
snoop on <span class="removed"><del><strong>what
-users watch</a>. The TVs did not do that when first sold.</p>
-</li>
+<span class="removed"><del><strong><li>
+<p>Due to bad security in</strong></del></span>
-<li>
-<p>LG</strong></del></span> <span class="inserted"><ins><em>other
people, DJI is in many cases</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
-disabled network features</a></strong></del></span>
- <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping</em></ins></span>
- on <span class="removed"><del><strong><em>previously
purchased</em>
-“smart” TVs,</strong></del></span> <span
class="inserted"><ins><em>you</a>.</p>
+ <span class="inserted"><ins><em><li id="M201708040">
+ <p>While you're using</em></ins></span> a <span
class="removed"><del><strong>drug pump, crackers could use
it</strong></del></span> <span class="inserted"><ins><em>DJI
drone</em></ins></span>
+ to <span class="inserted"><ins><em>snoop on other people, DJI is in many
cases</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.wired.com/2015/06/hackers-can-send-fatal-doses-hospital-drug-pumps/">
+kill patients</a>.</p></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theverge.com/2017/8/4/16095244/us-army-stop-using-dji-drones-cybersecurity">snooping
+ on you</a>.</p></em></ins></span>
</li>
- <li id="M201706200">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/">
+“Smart homes”</a> turn out to</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201706200">
<p>Many models of Internet-connected cameras
are tremendously insecure. They have login
- accounts with hard-coded passwords, which can't be changed, and <a
+ accounts with hard-coded passwords, which can't</em></ins></span> be <span
class="removed"><del><strong>stupidly vulnerable</strong></del></span> <span
class="inserted"><ins><em>changed, and <a
href="https://arstechnica.com/security/2017/06/internet-cameras-expose-private-video-feeds-and-remote-controls/">there
- is no way to delete these accounts either</a>.</p>
+ is no way</em></ins></span> to
+<span class="removed"><del><strong>intrusion.</p></strong></del></span>
<span class="inserted"><ins><em>delete these accounts
either</a>.</p></em></ins></span>
</li>
- <li id="M201705250">
- <p>The proprietary code that runs pacemakers,
- insulin pumps, and other medical devices is <a
- href="http://www.bbc.co.uk/news/technology-40042584"> full of gross
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201705250"></em></ins></span>
+ <p>The <span class="inserted"><ins><em>proprietary code that runs
pacemakers,
+ insulin pumps, and other medical devices is</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.nytimes.com/2013/09/05/technology/ftc-says-webcams-flaw-put-users-lives-on-display.html">
+FTC punished</strong></del></span>
+ <span
class="inserted"><ins><em>href="http://www.bbc.co.uk/news/technology-40042584">
full of gross
security faults</a>.</p>
</li>
<li id="M201705180">
<p>Bird and rabbit pets were implemented for Second
- Life by a company that tethered their food to a server. <a
-
href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
- It shut down the server and the pets more or less died</a>.</p>
+ Life by</em></ins></span> a company <span class="removed"><del><strong>for
making webcams with bad security</a> so</strong></del></span> that <span
class="removed"><del><strong>it was easy for anyone to watch them.</p>
+</li>
+
+<li>
+<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>tethered their food</em></ins></span> to <span
class="inserted"><ins><em>a server.</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://siliconangle.com/blog/2013/07/27/famed-hacker-barnaby-jack-dies-days-before-scheduled-black-hat-appearance/">
+kill people by taking control of medical implants by radio</a>. More
+information in <a
+href="http://www.bbc.co.uk/news/technology-17631838">BBC
News</a></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.rockpapershotgun.com/2017/05/19/second-life-ozimals-pet-rabbits-dying">
+ It shut down the server</em></ins></span> and
+<span class="removed"><del><strong><a
+href="http://blog.ioactive.com/2013/02/broken-hearts-how-plausible-was.html">
+IOActive Labs Research blog</a>.</p></strong></del></span> <span
class="inserted"><ins><em>the pets more or less
died</a>.</p></em></ins></span>
</li>
- <li id="M201704190">
- <p>Users are suing Bose for <a
-
href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
- distributing a spyware app for its headphones</a>. Specifically,
- the app would record the names of the audio files users listen to
- along with the headphone's unique serial number.</p>
+<span class="removed"><del><strong><li>
+<p>Lots of</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704190">
+ <p>Users are suing Bose for</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
+hospital equipment has lousy security</a>, and it can be fatal.</p>
+</li>
+
+<li>
+<p><a
+href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
+Point-of-sale terminals running Windows were taken over</a> and turned
+into</strong></del></span>
+ <span
class="inserted"><ins><em>href="https://web.archive.org/web/20170423010030/https://www.washingtonpost.com/news/the-switch/wp/2017/04/19/bose-headphones-have-been-spying-on-their-customers-lawsuit-claims/">
+ distributing</em></ins></span> a <span
class="removed"><del><strong>botnet</strong></del></span> <span
class="inserted"><ins><em>spyware app</em></ins></span> for <span
class="inserted"><ins><em>its headphones</a>.
Specifically,</em></ins></span>
+ the <span class="removed"><del><strong>purpose</strong></del></span> <span
class="inserted"><ins><em>app would record the names</em></ins></span> of <span
class="removed"><del><strong>collecting customers' credit card
+numbers.</p>
+</li>
+
+<li id="vizio-snoop">
+<p>Vizio
+<a
href="http://boingboing.net/2015/04/30/telescreen-watch-vizio-adds-s.html">
+used a firmware “upgrade”</strong></del></span> <span
class="inserted"><ins><em>the audio files users listen</em></ins></span> to
<span class="removed"><del><strong>make its TVs snoop on
what</strong></del></span>
+ <span class="inserted"><ins><em>along with the headphone's unique serial
number.</p>
<p>The suit accuses that this was done without the users' consent.
- If the fine print of the app said that users gave consent for this,
- would that make it acceptable? No way! It should be flat out <a
- href="/philosophy/surveillance-vs-democracy.html"> illegal to design
- the app to snoop at all</a>.</p>
+ If the fine print of the app said that</em></ins></span> users <span
class="removed"><del><strong>watch</a>. The TVs did not
do</strong></del></span> <span class="inserted"><ins><em>gave consent for this,
+ would</em></ins></span> that <span class="removed"><del><strong>when first
sold.</p>
+</li>
+
+<li>
+<p>LG</strong></del></span> <span class="inserted"><ins><em>make it
acceptable? No way! It should be flat out</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
+disabled network features</a> on <em>previously
purchased</em>
+“smart” TVs, unless the purchasers agreed</strong></del></span>
+ <span
class="inserted"><ins><em>href="/philosophy/surveillance-vs-democracy.html">
illegal</em></ins></span> to <span class="removed"><del><strong>let LG
+begin</strong></del></span> <span class="inserted"><ins><em>design
+ the app</em></ins></span> to snoop <span class="removed"><del><strong>on
them and distribute their personal data.</p></strong></del></span> <span
class="inserted"><ins><em>at all</a>.</p></em></ins></span>
</li>
- <li id="M201704120">
+<span class="removed"><del><strong><li>
+<p><a
+href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
+Barbie is going</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201704120">
<p>Anova sabotaged users' cooking devices
- with a downgrade that tethered them to a remote server. <a
+ with a downgrade that tethered them</em></ins></span> to <span
class="removed"><del><strong>spy</a></strong></del></span> <span
class="inserted"><ins><em>a remote server. <a
href="https://web.archive.org/web/20170415145520/https://consumerist.com/2017/04/12/anova-ticks-off-customers-by-requiring-mandatory-accounts-to-cook-food/">Unless
- users create an account on Anova's servers, their cookers won't
- function</a>.</p>
+ users create an account</em></ins></span> on <span
class="removed"><del><strong>children and adults.</p>
+</li>
+
+<li>
+<p><a
+href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
+Cisco TNP IP phones are spying
devices</a>.</p></strong></del></span> <span
class="inserted"><ins><em>Anova's servers, their cookers won't
+ function</a>.</p></em></ins></span>
</li>
- <li id="M201703270">
+<span class="removed"><del><strong><li>
+<p>The <a
+href="http://www.bbc.com/news/technology-34922712">Nest Cam
+“smart” camera</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201703270">
<p>When Miele's Internet of
- Stings hospital disinfectant dishwasher is <a
+ Stings hospital disinfectant dishwasher</em></ins></span> is <span
class="removed"><del><strong>always watching</a>, even
when</strong></del></span> <span class="inserted"><ins><em><a
href="https://motherboard.vice.com/en_us/article/pg9qkv/a-hackable-dishwasher-is-connecting-hospitals-to-the-internet-of-shit">
- connected to the Internet, its security is crap</a>.</p>
+ connected to</em></ins></span> the
+<span class="removed"><del><strong>“owner” switches it
“off.”</p>
+
+<p>A “smart” device means the
manufacturer</strong></del></span> <span class="inserted"><ins><em>Internet,
its security</em></ins></span> is <span
class="removed"><del><strong>using</strong></del></span> <span
class="inserted"><ins><em>crap</a>.</p>
<p>For example, a cracker can gain access to the dishwasher's
- filesystem, infect it with malware, and force the dishwasher to launch
- attacks on other devices in the network. Since these dishwashers are
+ filesystem, infect</em></ins></span> it <span
class="inserted"><ins><em>with malware, and force the
dishwasher</em></ins></span> to <span class="removed"><del><strong>outsmart
+you.</p>
+</li>
+
+<li>
+<p>Vizio goes a step further than</strong></del></span> <span
class="inserted"><ins><em>launch
+ attacks on</em></ins></span> other <span class="removed"><del><strong>TV
manufacturers</strong></del></span> <span
class="inserted"><ins><em>devices</em></ins></span> in <span
class="removed"><del><strong>spying</strong></del></span> <span
class="inserted"><ins><em>the network. Since these dishwashers are
used in hospitals, such attacks could potentially put hundreds of
lives at risk.</p>
</li>
@@ -754,19 +795,20 @@
<li id="M201703140">
<p>A computerized vibrator <a
href="https://www.theguardian.com/technology/2016/aug/10/vibrator-phone-app-we-vibe-4-plus-bluetooth-hack">
- was snooping on its users through the proprietary control
app</a>.</p>
+ was snooping</em></ins></span> on <span class="inserted"><ins><em>its
users through the proprietary control app</a>.</p>
<p>The app was reporting the temperature of the vibrator minute by
minute (thus, indirectly, whether it was surrounded by a person's
body), as well as the vibration frequency.</p>
<p>Note the totally inadequate proposed response: a labeling
- standard with which manufacturers would make statements about their
- products, rather than free software which users could have checked
+ standard with which manufacturers would make statements
about</em></ins></span> their <span class="removed"><del><strong>users:
their</strong></del></span>
+ <span class="inserted"><ins><em>products, rather than free software which
users could have checked
and changed.</p>
- <p>The company that made the vibrator <a
-
href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
+ <p>The company that made the vibrator</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.theguardian.com/us-news/2016/sep/14/wevibe-sex-toy-data-collection-chicago-lawsuit">
was sued for collecting lots of personal information about how people
used it</a>.</p>
@@ -783,19 +825,29 @@
<li id="M201703070">
<p>The CIA exploited existing vulnerabilities
- in “smart” TVs and phones to design a malware that <a
+ in</em></ins></span> “smart” TVs <span
class="removed"><del><strong>analyze your viewing habits in
detail</strong></del></span> and
+<span class="removed"><del><strong>link them your IP address</a>
so</strong></del></span> <span class="inserted"><ins><em>phones to design a
malware</em></ins></span> that <span class="removed"><del><strong>advertisers
can track you
+across devices.</p>
+
+<p>It is possible</strong></del></span> <span
class="inserted"><ins><em><a
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
- spies through their microphones and cameras while making them appear
- to be turned off</a>. Since the spyware sniffs signals, it bypasses
- encryption.</p>
+ spies through their microphones and cameras while making them
appear</em></ins></span>
+ to <span class="removed"><del><strong>turn this off, but
having</strong></del></span> <span class="inserted"><ins><em>be turned
off</a>. Since the spyware sniffs signals,</em></ins></span> it <span
class="removed"><del><strong>enabled by default
+is an injustice already.</p></strong></del></span> <span
class="inserted"><ins><em>bypasses
+ encryption.</p></em></ins></span>
</li>
- <li id="M201702280">
- <p>“CloudPets” toys with microphones <a
+<span class="removed"><del><strong><li>
+<p>Tivo's alliance</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201702280">
+ <p>“CloudPets” toys</em></ins></span> with <span
class="removed"><del><strong>Viacom adds 2.3 million
households</strong></del></span> <span class="inserted"><ins><em>microphones
<a
href="https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults">
- leak childrens' conversations to the manufacturer</a>. Guess what?
<a
+ leak childrens' conversations</em></ins></span> to the <span
class="removed"><del><strong>600
+millions social media profiles</strong></del></span> <span
class="inserted"><ins><em>manufacturer</a>. Guess what? <a
href="https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings">
- Crackers found a way to access the data</a> collected by the
+ Crackers found a way to access</em></ins></span> the <span
class="removed"><del><strong>company already monitors. Tivo
+customers</strong></del></span> <span class="inserted"><ins><em>data</a>
collected by the
manufacturer's snooping.</p>
<p>That the manufacturer and the FBI could listen to these
@@ -1109,16 +1161,24 @@
better.</p>
<p>This shows that laws requiring products to get users' formal
- consent before collecting personal data are totally inadequate.
- And what happens if a user declines consent? Probably the TV will
- say, “Without your consent to tracking, the TV will not
+ consent before collecting personal data</em></ins></span> are <span
class="removed"><del><strong>unaware they're being watched by advertisers. By
+combining</strong></del></span> <span class="inserted"><ins><em>totally
inadequate.
+ And what happens if a user declines consent? Probably
the</em></ins></span> TV <span class="removed"><del><strong>viewing information
with online social media
+participation, Tivo can now <a
+href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
+correlate</strong></del></span> <span class="inserted"><ins><em>will
+ say, “Without your consent to tracking, the</em></ins></span> TV
<span class="removed"><del><strong>advertisement with online
purchases</a>, exposing all
+users</strong></del></span> <span class="inserted"><ins><em>will not
work.”</p>
- <p>Proper laws would say that TVs are not allowed to report what the
- user watches—no exceptions!</p>
+ <p>Proper laws would say that TVs are not allowed</em></ins></span>
to <span class="removed"><del><strong>new combined surveillance by
default.</p></strong></del></span> <span class="inserted"><ins><em>report
what the
+ user watches—no exceptions!</p></em></ins></span>
</li>
- <li id="M201407170">
+<span class="removed"><del><strong><li>
+<p>Some web</strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201407170">
<p id="nest-thermometers">Nest thermometers send <a
href="http://bgr.com/2014/07/17/google-nest-jailbreak-hack">a lot of
data about the user</a>.</p>
@@ -1128,84 +1188,40 @@
<p>LG <a
href="http://www.techdirt.com/articles/20140511/17430627199/lg-will-take-smart-out-your-smart-tv-if-you-dont-agree-to-share-your-viewing-search-data-with-third-parties.shtml">
disabled network features</a> on <em>previously
purchased</em>
- “smart” TVs,</em></ins></span> unless the purchasers agreed to
let LG begin
- to snoop on them and distribute their personal data.</p>
+ “smart” TVs, unless the purchasers agreed to let LG begin
+ to snoop on them</em></ins></span> and <span
class="removed"><del><strong>TV advertisements play inaudible
sounds</strong></del></span> <span class="inserted"><ins><em>distribute their
personal data.</p>
</li>
-<span class="removed"><del><strong><li>
-<p><a
-href="http://www.mirror.co.uk/news/technology-science/technology/wi-fi-spy-barbie-records-childrens-5177673">
-Barbie is going to spy</a> on children</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201404250">
+ <li id="M201404250">
<p>Lots of <a
href="http://www.wired.com/2014/04/hospital-equipment-vulnerable/">
- hospital equipment has lousy security</a>,</em></ins></span> and
<span class="removed"><del><strong>adults.</p></strong></del></span>
<span class="inserted"><ins><em>it can be fatal.</p></em></ins></span>
+ hospital equipment has lousy security</a>, and it can be
fatal.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312290"></em></ins></span>
- <p><a
-<span
class="removed"><del><strong>href="http://boingboing.net/2012/12/29/your-cisco-phone-is-listening.html">
-Cisco TNP IP phones are spying devices</a>.</p>
-</li>
-
-<li>
-<p>The <a
-href="http://www.bbc.com/news/technology-34922712">Nest Cam
-“smart” camera is always watching</a>, even when the
-“owner” switches</strong></del></span> <span
class="inserted"><ins><em>href="http://www.bunniestudios.com/blog/?p=3554">
Some flash
+ <li id="M201312290">
+ <p><a href="http://www.bunniestudios.com/blog/?p=3554"> Some
flash
memories have modifiable software</a>, which makes them vulnerable
to viruses.</p>
- <p>We don't call this a “back door”
because</em></ins></span> it <span
class="removed"><del><strong>“off.”</p>
-
-<p>A “smart” device means the
manufacturer</strong></del></span> is <span class="removed"><del><strong>using
it</strong></del></span> <span class="inserted"><ins><em>normal
+ <p>We don't call this a “back door” because it is normal
that you can install a new system in a computer, given physical
access</em></ins></span>
- to <span class="removed"><del><strong>outsmart
-you.</p></strong></del></span> <span class="inserted"><ins><em>it.
However, memory sticks and cards should not be modifiable in
- this way.</p></em></ins></span>
+ to <span class="inserted"><ins><em>it. However, memory sticks and cards
should not</em></ins></span> be <span class="removed"><del><strong>picked
+up by proprietary malware</strong></del></span> <span
class="inserted"><ins><em>modifiable in
+ this way.</p>
</li>
-<span class="removed"><del><strong><li>
-<p>Vizio goes</strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201312040">
+ <li id="M201312040">
<p><a
href="http://arstechnica.com/security/2013/12/credit-card-fraud-comes-of-age-with-first-known-point-of-sale-botnet/">
- Point-of-sale terminals running Windows were taken over</a> and
- turned into</em></ins></span> a <span class="removed"><del><strong>step
further than other TV manufacturers</strong></del></span> <span
class="inserted"><ins><em>botnet for the purpose of collecting customers' credit
+ Point-of-sale terminals</em></ins></span> running <span
class="inserted"><ins><em>Windows were taken over</a> and
+ turned into a botnet for the purpose of collecting customers' credit
card numbers.</p>
</li>
<li id="M201311210">
- <p>Spyware</em></ins></span> in <span
class="removed"><del><strong>spying on
-their users: their <a
-href="http://www.propublica.org/article/own-a-vizio-smart-tv-its-watching-you"></strong></del></span>
<span class="inserted"><ins><em>LG</em></ins></span> “smart” TVs
<span class="removed"><del><strong>analyze your viewing habits in
detail</strong></del></span> <span class="inserted"><ins><em><a
+ <p>Spyware in LG “smart” TVs <a
href="http://doctorbeet.blogspot.co.uk/2013/11/lg-smart-tvs-logging-usb-filenames-and.html">
- reports what the user watches,</em></ins></span> and
-<span class="removed"><del><strong>link them your IP address</a> so that
advertisers can track you
-across devices.</p>
-
-<p>It is possible</strong></del></span> <span
class="inserted"><ins><em>the switch</em></ins></span> to turn this <span
class="removed"><del><strong>off, but having it enabled by default
-is an injustice already.</p>
-</li>
-
-<li>
-<p>Tivo's alliance with Viacom adds 2.3 million households to the 600
-millions social media profiles the company already monitors. Tivo
-customers are unaware they're being watched by advertisers. By
-combining TV viewing information with online social media
-participation, Tivo can now <a
-href="http://www.reuters.com/article/viacom-tivo-idUSL1N12U1VV20151102">
-correlate TV advertisement with online purchases</a>, exposing all
-users to new combined surveillance by default.</p>
-</li>
-
-<li>
-<p>Some web and TV advertisements play inaudible sounds to be picked
-up by proprietary malware running</strong></del></span> <span
class="inserted"><ins><em>off has
+ reports what the user watches, and the switch to turn this off has
no effect</a>. (The fact that the transmission reports a 404 error
really means nothing; the server could save that data anyway.)</p>
@@ -1417,7 +1433,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/07 07:00:04 $
+$Date: 2020/06/13 10:00:27 $
<!-- timestamp end -->
</p>
</div>
Index: malware-appliances.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.de.po,v
retrieving revision 1.88
retrieving revision 1.89
diff -u -b -r1.88 -r1.89
--- malware-appliances.de.po 7 Jun 2020 07:00:05 -0000 1.88
+++ malware-appliances.de.po 13 Jun 2020 10:00:27 -0000 1.89
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2018-07-20 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -140,6 +140,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: malware-appliances.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.es.po,v
retrieving revision 1.19
retrieving revision 1.20
diff -u -b -r1.19 -r1.20
--- malware-appliances.es.po 8 Jun 2020 09:12:01 -0000 1.19
+++ malware-appliances.es.po 13 Jun 2020 10:00:27 -0000 1.20
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-06-08 10:59+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
"X-Generator: Poedit 2.2.1\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
@@ -128,6 +129,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: malware-appliances.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.fr.po,v
retrieving revision 1.148
retrieving revision 1.149
diff -u -b -r1.148 -r1.149
--- malware-appliances.fr.po 7 Jun 2020 07:13:19 -0000 1.148
+++ malware-appliances.fr.po 13 Jun 2020 10:00:27 -0000 1.149
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-06-07 09:09+0200\n"
"Last-Translator: Thrérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -125,6 +126,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: malware-appliances.pot
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.pot,v
retrieving revision 1.73
retrieving revision 1.74
diff -u -b -r1.73 -r1.74
--- malware-appliances.pot 7 Jun 2020 07:00:05 -0000 1.73
+++ malware-appliances.pot 13 Jun 2020 10:00:27 -0000 1.74
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: malware-appliances.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -90,6 +90,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a "
+"href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\">
"
+"shut down the service to control them through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a "
"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
"company made them all cease to work</a> by shutting down that server."
Index: malware-appliances.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/malware-appliances.ru.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- malware-appliances.ru.po 7 Jun 2020 17:00:51 -0000 1.184
+++ malware-appliances.ru.po 13 Jun 2020 10:00:27 -0000 1.185
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
#. type: Content of: <title>
msgid "Malware in Appliances - GNU Project - Free Software Foundation"
@@ -126,6 +127,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/nl.po,v
retrieving revision 1.184
retrieving revision 1.185
diff -u -b -r1.184 -r1.185
--- nl.po 7 Jun 2020 07:00:07 -0000 1.184
+++ nl.po 13 Jun 2020 10:00:27 -0000 1.185
@@ -2098,6 +2098,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/pl.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- pl.po 7 Jun 2020 07:00:07 -0000 1.183
+++ pl.po 13 Jun 2020 10:00:27 -0000 1.184
@@ -1667,6 +1667,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: pot
===================================================================
RCS file: /web/www/www/proprietary/po/pot,v
retrieving revision 1.182
retrieving revision 1.183
diff -u -b -r1.182 -r1.183
--- pot 7 Jun 2020 07:00:07 -0000 1.182
+++ pot 13 Jun 2020 10:00:27 -0000 1.183
@@ -1476,6 +1476,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: proprietary-tethers.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de-diff.html,v
retrieving revision 1.26
retrieving revision 1.27
diff -u -b -r1.26 -r1.27
--- proprietary-tethers.de-diff.html 7 Jun 2020 07:00:07 -0000 1.26
+++ proprietary-tethers.de-diff.html 13 Jun 2020 10:00:27 -0000 1.27
@@ -72,45 +72,59 @@
here, please write
to <a
href="mailto:webmasters@gnu.org"><webmasters@gnu.org></a>
to inform us. Please include the URL of a trustworthy reference or two
-to <span class="removed"><del><strong>present</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
+to <span class="removed"><del><strong>present the specifics.</p>
+
+<ul>
+
+<li>
+<p>The game Metal Gear Rising for MacOS was</strong></del></span> <span
class="inserted"><ins><em>serve as specific substantiation.</p>
</div>
<div class="column-limit" id="proprietary-tethers"></div>
<ul class="blurbs">
<li id="M202005070">
- <p>Wink sells a “smart” home hub that is tethered
- to a server. In May 2020, it ordered the purchasers to start <a
-
href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
- paying a monthly fee for</em></ins></span> the <span
class="removed"><del><strong>specifics.</p>
-
-<ul>
-
-<li></strong></del></span> <span class="inserted"><ins><em>use of that
server</a>. Because of the
+ <p>Wink sells a “smart” home hub that
is</em></ins></span> tethered
+ to a server.
+<span class="removed"><del><strong>The company</strong></del></span> <span
class="inserted"><ins><em>In May 2020, it ordered the purchasers to
start</em></ins></span> <a
+<span
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm"></strong></del></span>
+ <span
class="inserted"><ins><em>href="https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html">
+ paying a monthly fee for the use of that server</a>. Because of the
tethering, the hub is useless without that.</p>
</li>
- <li id="M201904260"></em></ins></span>
- <p>The <span class="removed"><del><strong>game Metal Gear
Rising</strong></del></span> <span class="inserted"><ins><em>Jibo robot toys
were tethered to the manufacturer's server,
- and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
- the company made them all cease to work</a> by shutting down that
+ <li id="M201909061">
+ <p>Best Buy made controllable appliances and <a
+
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6"></em></ins></span>
+ shut down the <span class="inserted"><ins><em>service to control them
through</a>.</p>
+
+ <p>While it is laudable that Best Buy recognized it was mistreating
+ the customers by doing so, this doesn't alter the facts that
+ tethering the device to a particular server is a path to screwing the
+ users, and that it is a consequence of having nonfree software in the
+ device.</p>
+ </li>
+
+ <li id="M201904260">
+ <p>The Jibo robot toys were tethered to the
manufacturer's</em></ins></span> server,
+ and <span class="inserted"><ins><em><a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
+ the company made them</em></ins></span> all <span
class="removed"><del><strong>copies stopped
working</a>.</p></strong></del></span> <span
class="inserted"><ins><em>cease to work</a> by shutting down that
server.</p>
- <p>The shutdown might ironically be good</em></ins></span> for <span
class="removed"><del><strong>MacOS</strong></del></span> <span
class="inserted"><ins><em>their users, since the
- product</em></ins></span> was <span
class="removed"><del><strong>tethered</strong></del></span> <span
class="inserted"><ins><em>designed</em></ins></span> to <span
class="inserted"><ins><em>manipulate people by presenting</em></ins></span> a
<span class="removed"><del><strong>server.
-The company</strong></del></span> <span class="inserted"><ins><em>phony
- semblance of emotions, and was most certainly spying on them.</p>
+ <p>The shutdown might ironically be good for their users, since the
+ product was designed to manipulate people by presenting a phony
+ semblance of emotions, and was most certainly spying on
them.</p></em></ins></span>
</li>
- <li id="M201904040">
+<span class="removed"><del><strong><li></strong></del></span>
+
+ <span class="inserted"><ins><em><li id="M201904040">
<p>Ebooks “bought” from Microsoft's store check that
their DRM is valid by connecting to the store every time their
“owner” wants to read them. Microsoft is going to close
- this store,</em></ins></span> <a
-<span
class="removed"><del><strong>href="http://www.gamerevolution.com/news/400087-metal-gear-rising-mac-unplayable-drm">
-shut down</strong></del></span> <span
class="inserted"><ins><em>href="https://www.bbc.com/news/technology-47810367">
+ this store, <a href="https://www.bbc.com/news/technology-47810367">
bricking all DRM'ed ebooks it has ever “sold”</a>. (The
- article additionally highlights</em></ins></span> the <span
class="removed"><del><strong>server,</strong></del></span> <span
class="inserted"><ins><em>pitfalls of DRM.)</p>
+ article additionally highlights the pitfalls of DRM.)</p>
<p>This is another proof that a DRM-encumbered product doesn't belong
to the person who bought it. Microsoft said it will refund customers,
@@ -130,18 +144,16 @@
only through the company's server. They have
all the nasty characteristics of such devices: <a
href="https://www.businessinsider.com/honeywell-iot-thermostats-server-outage-2018-9">
- surveillance,</em></ins></span> and <span class="inserted"><ins><em>danger
of sabotage</a> (of a specific user, or of</em></ins></span>
- all <span class="removed"><del><strong>copies stopped
working</a>.</p></strong></del></span> <span
class="inserted"><ins><em>users at once), as well as the risk of an outage
(which is what
+ surveillance, and danger of sabotage</a> (of a specific user, or of
+ all users at once), as well as the risk of an outage (which is what
just happened).</p>
<p>In addition, setting the desired temperature requires running
nonfree software. With an old-fashioned thermostat, you can do it
- using controls right on the thermostat.</p></em></ins></span>
+ using controls right on the thermostat.</p>
</li>
-<span class="removed"><del><strong><li></strong></del></span>
-
- <span class="inserted"><ins><em><li id="M201807050"></em></ins></span>
+ <li id="M201807050"></em></ins></span>
<p>The Jawbone fitness tracker was tethered to a proprietary phone
app. In 2017, the company shut down and made the app stop working. <a
href="https://www.theguardian.com/technology/2018/jul/05/defunct-jawbone-fitness-trackers-kept-selling-after-app-closure-says-which">All
@@ -351,7 +363,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/07 07:00:07 $
+$Date: 2020/06/13 10:00:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-tethers.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.de.po,v
retrieving revision 1.38
retrieving revision 1.39
diff -u -b -r1.38 -r1.39
--- proprietary-tethers.de.po 7 Jun 2020 07:00:07 -0000 1.38
+++ proprietary-tethers.de.po 13 Jun 2020 10:00:27 -0000 1.39
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2018-08-29 02:39+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -140,6 +140,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: proprietary-tethers.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.es.po,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -b -r1.13 -r1.14
--- proprietary-tethers.es.po 8 Jun 2020 09:12:01 -0000 1.13
+++ proprietary-tethers.es.po 13 Jun 2020 10:00:27 -0000 1.14
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-06-08 11:00+0200\n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n != 1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -110,6 +111,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: proprietary-tethers.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.fr.po,v
retrieving revision 1.70
retrieving revision 1.71
diff -u -b -r1.70 -r1.71
--- proprietary-tethers.fr.po 7 Jun 2020 07:13:19 -0000 1.70
+++ proprietary-tethers.fr.po 13 Jun 2020 10:00:27 -0000 1.71
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-06-07 09:09+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -105,6 +106,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: proprietary-tethers.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja-diff.html,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -b -r1.45 -r1.46
--- proprietary-tethers.ja-diff.html 7 Jun 2020 07:00:07 -0000 1.45
+++ proprietary-tethers.ja-diff.html 13 Jun 2020 10:00:27 -0000 1.46
@@ -86,6 +86,18 @@
tethering, the hub is useless without that.</p>
</li>
+ <li id="M201909061">
+ <p>Best Buy made controllable appliances and <a
+
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
+ shut down the service to control them through</a>.</p>
+
+ <p>While it is laudable that Best Buy recognized it was mistreating
+ the customers by doing so, this doesn't alter the facts that
+ tethering the device to a particular server is a path to screwing the
+ users, and that it is a consequence of having nonfree software in the
+ device.</p>
+ </li>
+
<li id="M201904260">
<p>The Jibo robot toys were tethered to the manufacturer's server,
and <a
href="https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648">
@@ -333,7 +345,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/07 07:00:07 $
+$Date: 2020/06/13 10:00:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary-tethers.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ja.po,v
retrieving revision 1.37
retrieving revision 1.38
diff -u -b -r1.37 -r1.38
--- proprietary-tethers.ja.po 7 Jun 2020 07:00:07 -0000 1.37
+++ proprietary-tethers.ja.po 13 Jun 2020 10:00:27 -0000 1.38
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2016-11-18 13:34+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -104,6 +104,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: proprietary-tethers.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pot,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-tethers.pot 7 Jun 2020 07:00:09 -0000 1.34
+++ proprietary-tethers.pot 13 Jun 2020 10:00:27 -0000 1.35
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -79,6 +79,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a "
+"href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\">
"
+"shut down the service to control them through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a "
"href=\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the "
"company made them all cease to work</a> by shutting down that server."
Index: proprietary-tethers.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.pt-br.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary-tethers.pt-br.po 7 Jun 2020 07:00:09 -0000 1.22
+++ proprietary-tethers.pt-br.po 13 Jun 2020 10:00:27 -0000 1.23
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary-tethers.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2019-11-26 22:50-0200\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -100,6 +100,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: proprietary-tethers.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary-tethers.ru.po,v
retrieving revision 1.77
retrieving revision 1.78
diff -u -b -r1.77 -r1.78
--- proprietary-tethers.ru.po 7 Jun 2020 17:00:51 -0000 1.77
+++ proprietary-tethers.ru.po 13 Jun 2020 10:00:27 -0000 1.78
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Tethers - GNU Project - Free Software Foundation"
@@ -106,6 +107,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: proprietary.de-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de-diff.html,v
retrieving revision 1.153
retrieving revision 1.154
diff -u -b -r1.153 -r1.154
--- proprietary.de-diff.html 7 Jun 2020 07:00:09 -0000 1.153
+++ proprietary.de-diff.html 13 Jun 2020 10:00:27 -0000 1.154
@@ -27,8 +27,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
@@ -57,10 +57,10 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -127,16 +127,16 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -153,19 +153,19 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
-<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -212,6 +212,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909061">
+ <p>Best Buy made controllable appliances and <a
+
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
+ shut down the service to control them through</a>.</p>
+
+ <p>While it is laudable that Best Buy recognized it was mistreating
+ the customers by doing so, this doesn't alter the facts that
+ tethering the device to a particular server is a path to screwing the
+ users, and that it is a consequence of having nonfree software in the
+ device.</p>
+ </li>
+
<li id="M202005070">
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
@@ -260,15 +272,6 @@
treatment is equivalent to actually doing it. Whatever condemnation
the latter deserves, the former deserves the same.</p>
</li>
-
- <li id="M201703070">
- <p>The CIA exploited existing vulnerabilities
- in “smart” TVs and phones to design a malware that <a
-
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
- spies through their microphones and cameras while making them appear
- to be turned off</a>. Since the spyware sniffs signals, it bypasses
- encryption.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -331,7 +334,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.de.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.de.po,v
retrieving revision 1.194
retrieving revision 1.195
diff -u -b -r1.194 -r1.195
--- proprietary.de.po 7 Jun 2020 07:00:09 -0000 1.194
+++ proprietary.de.po 13 Jun 2020 10:00:27 -0000 1.195
@@ -7,7 +7,7 @@
msgstr ""
"Project-Id-Version: proprietary.html\n"
"Report-Msgid-Bugs-To: Webmasters <webmasters@gnu.org>\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2018-04-12 22:00+0200\n"
"Last-Translator: Jоегg Kоhпе <joeko (AT) online [PUNKT] de>\n"
"Language-Team: German <www-de-translators@gnu.org>\n"
@@ -455,6 +455,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -517,16 +533,6 @@
"deserves the same."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
# !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
# ! GNU should report facts briefly and crisply! Also resulting !
# ! consequences should not be swept away by an own opinion! !
Index: proprietary.es.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.es.po,v
retrieving revision 1.271
retrieving revision 1.272
diff -u -b -r1.271 -r1.272
--- proprietary.es.po 8 Jun 2020 09:12:01 -0000 1.271
+++ proprietary.es.po 13 Jun 2020 10:00:27 -0000 1.272
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: \n"
"Last-Translator: Javier Fdez. Retenaga <jfrtnaga@gnu.org>\n"
"Language-Team: Spanish <www-es-general@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n!=1);\n"
"X-Generator: Poedit 2.2.1\n"
@@ -312,6 +313,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -410,23 +427,6 @@
"de vista ético, exigir por adelantado que se acepte un mal trato equivale a "
"infligirlo. Si esto merece alguna condena, aquello merece la misma."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"La CIA aprovechó vulnerabilidades existentes en teléfonos y televisores "
-"«inteligentes» para diseñar un software malicioso capaz de <a
href=\"https://"
-"www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-"
-"android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"
-"\">espiar mediante sus micrófonos y cámaras mientras parecÃan estar "
-"apagados</a>. Puesto que este software espÃa capta las señales, sortea el "
-"encriptado."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -504,6 +504,22 @@
msgstr "Ãltima actualización:"
#~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in “smart” TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/"
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "La CIA aprovechó vulnerabilidades existentes en teléfonos y televisores "
+#~ "«inteligentes» para diseñar un software malicioso capaz de <a href="
+#~ "\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/"
+#~ "wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\">espiar mediante sus micrófonos y cámaras
mientras "
+#~ "parecÃan estar apagados</a>. Puesto que este software espÃa capta las "
+#~ "señales, sortea el encriptado."
+
+#~ msgid ""
#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
#~ "surveillance.html\"> tells the cops directly</a>."
Index: proprietary.fr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.fr.po,v
retrieving revision 1.319
retrieving revision 1.320
diff -u -b -r1.319 -r1.320
--- proprietary.fr.po 7 Jun 2020 07:13:19 -0000 1.319
+++ proprietary.fr.po 13 Jun 2020 10:00:27 -0000 1.320
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-06-07 09:09+0200\n"
"Last-Translator: Thérèse Godefroy <godef.th AT free.fr>\n"
"Language-Team: French <trad-gnu@april.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
"X-Generator: Gtranslator 2.91.5\n"
"Plural-Forms: \n"
@@ -308,6 +309,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -405,22 +422,6 @@
"que les gens acceptent par avance un mauvais traitement est équivalent à le
"
"leur infliger. Cela mérite la même condamnation que le traitement
lui-même."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"La CIA a exploité des vulnérabilités présentes dans les téléviseurs et "
-"téléphones « intelligents » pour fabriquer un logiciel malveillant qui
<a "
-"href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/"
-"wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-"
-"a7616651.html\">se sert de leur micro et de leur caméra pour espionner, tout
"
-"en les faisant paraître inactifs</a>."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -495,6 +496,21 @@
msgstr "Dernière mise à jour :"
#~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in “smart” TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/"
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "La CIA a exploité des vulnérabilités présentes dans les téléviseurs
et "
+#~ "téléphones « intelligents » pour fabriquer un logiciel malveillant
qui <a "
+#~ "href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/"
+#~ "wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\">se sert de leur micro et de leur caméra pour "
+#~ "espionner, tout en les faisant paraître inactifs</a>."
+
+#~ msgid ""
#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
#~ "surveillance.html\"> tells the cops directly</a>."
Index: proprietary.it-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it-diff.html,v
retrieving revision 1.165
retrieving revision 1.166
diff -u -b -r1.165 -r1.166
--- proprietary.it-diff.html 7 Jun 2020 07:00:09 -0000 1.165
+++ proprietary.it-diff.html 13 Jun 2020 10:00:27 -0000 1.166
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -65,13 +65,13 @@
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
- .reduced-width</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>width: 55em;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em></style></em></ins></span>
+ .reduced-width { width: 55em; }
+</style></em></ins></span>
<!--#include virtual="/server/banner.html" -->
<span class="inserted"><ins><em><div
class="reduced-width"></em></ins></span>
@@ -187,10 +187,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -211,6 +211,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909061">
+ <p>Best Buy made controllable appliances and <a
+
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
+ shut down the service to control them through</a>.</p>
+
+ <p>While it is laudable that Best Buy recognized it was mistreating
+ the customers by doing so, this doesn't alter the facts that
+ tethering the device to a particular server is a path to screwing the
+ users, and that it is a consequence of having nonfree software in the
+ device.</p>
+ </li>
+
<li id="M202005070">
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
@@ -259,15 +271,6 @@
treatment is equivalent to actually doing it. Whatever condemnation
the latter deserves, the former deserves the same.</p>
</li>
-
- <li id="M201703070">
- <p>The CIA exploited existing vulnerabilities
- in “smart” TVs and phones to design a malware that <a
-
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
- spies through their microphones and cameras while making them appear
- to be turned off</a>. Since the spyware sniffs signals, it bypasses
- encryption.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -330,7 +333,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.it.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.it.po,v
retrieving revision 1.203
retrieving revision 1.204
diff -u -b -r1.203 -r1.204
--- proprietary.it.po 7 Jun 2020 07:00:09 -0000 1.203
+++ proprietary.it.po 13 Jun 2020 10:00:27 -0000 1.204
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2018-02-01 21:32+0100\n"
"Last-Translator: Andrea Pescetti <pescetti@gnu.org>\n"
"Language-Team: Italian <www-it-traduzioni@gnu.org>\n"
@@ -459,6 +459,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -521,16 +537,6 @@
"deserves the same."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.ja-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja-diff.html,v
retrieving revision 1.169
retrieving revision 1.170
diff -u -b -r1.169 -r1.170
--- proprietary.ja-diff.html 7 Jun 2020 07:00:09 -0000 1.169
+++ proprietary.ja-diff.html 13 Jun 2020 10:00:27 -0000 1.170
@@ -27,10 +27,10 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC {
- display: block;</em></ins></span>
+table#TOC</em></ins></span> {
+ <span class="inserted"><ins><em>display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -62,8 +62,8 @@
color: #004caa;
text-decoration: none;
}
-#TOC a { text-decoration: none; }
-#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
+#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
<span class="inserted"><ins><em><style type="text/css"
media="print,screen">
@@ -186,10 +186,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong></ul>
</div>
@@ -209,6 +209,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909061">
+ <p>Best Buy made controllable appliances and <a
+
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
+ shut down the service to control them through</a>.</p>
+
+ <p>While it is laudable that Best Buy recognized it was mistreating
+ the customers by doing so, this doesn't alter the facts that
+ tethering the device to a particular server is a path to screwing the
+ users, and that it is a consequence of having nonfree software in the
+ device.</p>
+ </li>
+
<li id="M202005070">
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
@@ -257,15 +269,6 @@
treatment is equivalent to actually doing it. Whatever condemnation
the latter deserves, the former deserves the same.</p>
</li>
-
- <li id="M201703070">
- <p>The CIA exploited existing vulnerabilities
- in “smart” TVs and phones to design a malware that <a
-
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
- spies through their microphones and cameras while making them appear
- to be turned off</a>. Since the spyware sniffs signals, it bypasses
- encryption.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -328,7 +331,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.ja.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ja.po,v
retrieving revision 1.187
retrieving revision 1.188
diff -u -b -r1.187 -r1.188
--- proprietary.ja.po 7 Jun 2020 07:00:09 -0000 1.187
+++ proprietary.ja.po 13 Jun 2020 10:00:27 -0000 1.188
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2017-01-11 11:25+0900\n"
"Last-Translator: NIIBE Yutaka <gniibe@fsij.org>\n"
"Language-Team: Japanese <web-translators-ja@gnu.org>\n"
@@ -320,6 +320,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -382,16 +398,6 @@
"deserves the same."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.nl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl-diff.html,v
retrieving revision 1.166
retrieving revision 1.167
diff -u -b -r1.166 -r1.167
--- proprietary.nl-diff.html 7 Jun 2020 07:00:09 -0000 1.166
+++ proprietary.nl-diff.html 13 Jun 2020 10:00:27 -0000 1.167
@@ -27,8 +27,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
@@ -57,17 +57,17 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
-<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
+<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
#TOC a { text-decoration: none; }
-#TOC a:hover { text-decoration: underline; }
--->
+#TOC a:hover</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-decoration: underline;</em></ins></span> }
+<span class="removed"><del><strong>--></style></strong></del></span>
+<span class="inserted"><ins><em>-->
</style>
<style type="text/css" media="print,screen">
.reduced-width { width: 55em; }
@@ -211,6 +211,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909061">
+ <p>Best Buy made controllable appliances and <a
+
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
+ shut down the service to control them through</a>.</p>
+
+ <p>While it is laudable that Best Buy recognized it was mistreating
+ the customers by doing so, this doesn't alter the facts that
+ tethering the device to a particular server is a path to screwing the
+ users, and that it is a consequence of having nonfree software in the
+ device.</p>
+ </li>
+
<li id="M202005070">
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
@@ -259,15 +271,6 @@
treatment is equivalent to actually doing it. Whatever condemnation
the latter deserves, the former deserves the same.</p>
</li>
-
- <li id="M201703070">
- <p>The CIA exploited existing vulnerabilities
- in “smart” TVs and phones to design a malware that <a
-
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
- spies through their microphones and cameras while making them appear
- to be turned off</a>. Since the spyware sniffs signals, it bypasses
- encryption.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -330,7 +333,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.nl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.nl.po,v
retrieving revision 1.177
retrieving revision 1.178
diff -u -b -r1.177 -r1.178
--- proprietary.nl.po 7 Jun 2020 07:00:09 -0000 1.177
+++ proprietary.nl.po 13 Jun 2020 10:00:27 -0000 1.178
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2017-11-24 22:20+0100\n"
"Last-Translator: Justin van Steijn <jvs@fsfe.org>\n"
"Language-Team: Dutch <www-nl-translators@gnu.org>\n"
@@ -363,6 +363,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -425,16 +441,6 @@
"deserves the same."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pl-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl-diff.html,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- proprietary.pl-diff.html 7 Jun 2020 07:00:09 -0000 1.183
+++ proprietary.pl-diff.html 13 Jun 2020 10:00:27 -0000 1.184
@@ -28,9 +28,9 @@
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section { font-size: 1.1em; font-style: italic; }
-table#TOC</em></ins></span> {
- <span class="inserted"><ins><em>display: block;</em></ins></span>
+#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+table#TOC {
+ display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
overflow: auto;
border: .2em solid #e0dfda;
@@ -56,13 +56,13 @@
#TOC ul</em></ins></span> li { <span class="inserted"><ins><em>padding-bottom:
.5em; margin: 0;</em></ins></span> list-style: none; <span
class="removed"><del><strong>margin-bottom: 1em;</strong></del></span> }
<span class="removed"><del><strong>#content div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ol { text-align: left; margin: 0; }
-#TOC ol li { margin: .5em 5%; }
+#TOC ol li</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>margin: .5em 5%; }
#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
}
-#TOC a</em></ins></span> { <span class="removed"><del><strong>margin-top:
1em;</strong></del></span> <span class="inserted"><ins><em>text-decoration:
none; }
+#TOC a { text-decoration: none; }
#TOC a:hover { text-decoration: underline;</em></ins></span> }
-->
</style>
@@ -114,8 +114,8 @@
<hr class="thin" />
</div>
-<p>As of January, 2020, the pages in this directory list around 450
-instances</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>malicious functionalities (with more than 500
references to
+<p>As</em></ins></span> of <span
class="removed"><del><strong>product</strong></li></strong></del></span>
<span class="inserted"><ins><em>January, 2020, the pages in this directory
list around 450
+instances of malicious functionalities (with more than 500 references to
back them up), but there are surely thousands more we don't know
about.</p>
<table id="TOC">
@@ -209,6 +209,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909061">
+ <p>Best Buy made controllable appliances and <a
+
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
+ shut down the service to control them through</a>.</p>
+
+ <p>While it is laudable that Best Buy recognized it was mistreating
+ the customers by doing so, this doesn't alter the facts that
+ tethering the device to a particular server is a path to screwing the
+ users, and that it is a consequence of having nonfree software in the
+ device.</p>
+ </li>
+
<li id="M202005070">
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
@@ -257,15 +269,6 @@
treatment is equivalent to actually doing it. Whatever condemnation
the latter deserves, the former deserves the same.</p>
</li>
-
- <li id="M201703070">
- <p>The CIA exploited existing vulnerabilities
- in “smart” TVs and phones to design a malware that <a
-
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
- spies through their microphones and cameras while making them appear
- to be turned off</a>. Since the spyware sniffs signals, it bypasses
- encryption.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -328,7 +331,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.pl.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pl.po,v
retrieving revision 1.170
retrieving revision 1.171
diff -u -b -r1.170 -r1.171
--- proprietary.pl.po 7 Jun 2020 07:00:09 -0000 1.170
+++ proprietary.pl.po 13 Jun 2020 10:00:27 -0000 1.171
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2015-07-31 20:51-0600\n"
"Last-Translator: Jan Owoc <jsowoc AT gmail.com>\n"
"Language-Team: Polish <www-pl-trans@gnu.org>\n"
@@ -540,6 +540,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -602,16 +618,6 @@
"deserves the same."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pot
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pot,v
retrieving revision 1.167
retrieving revision 1.168
diff -u -b -r1.167 -r1.168
--- proprietary.pot 7 Jun 2020 07:00:09 -0000 1.167
+++ proprietary.pot 13 Jun 2020 10:00:27 -0000 1.168
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n"
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
"Language-Team: LANGUAGE <LL@li.org>\n"
@@ -257,6 +257,21 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a "
+"href=\"https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6\">
"
+"shut down the service to control them through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a "
"href=\"https://www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-subscription-model.html\">
"
@@ -320,15 +335,6 @@
"deserves the same."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a "
-"href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html\">
"
-"spies through their microphones and cameras while making them appear to be "
-"turned off</a>. Since the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: proprietary.pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.pt-br.po,v
retrieving revision 1.294
retrieving revision 1.295
diff -u -b -r1.294 -r1.295
--- proprietary.pt-br.po 7 Jun 2020 07:00:09 -0000 1.294
+++ proprietary.pt-br.po 13 Jun 2020 10:00:27 -0000 1.295
@@ -5,7 +5,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-05-26 10:33-0300\n"
"Last-Translator: Rafael Fontenelle <rafaelff@gnome.org>\n"
"Language-Team: Brazilian Portuguese <www-pt-br-general@gnu.org>\n"
@@ -306,6 +306,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -398,22 +414,6 @@
"equivalente a realmente fazê-lo. Qualquer que seja a condenação que o
último "
"mereça, o primeiro merece o mesmo."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"A CIA explorou as vulnerabilidades existentes em TVs e telefones "
-"âinteligentesâ para projetar um malware que <a href=\"https://www."
-"independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-"
-"iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html\"> espia "
-"através de seus microfones e câmeras enquanto os faz parecer
desligados</a>. "
-"Como o spyware detecta sinais, ignora a criptografia."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -489,6 +489,21 @@
msgstr "Ãltima atualização:"
#~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in “smart” TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/"
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "A CIA explorou as vulnerabilidades existentes em TVs e telefones "
+#~ "âinteligentesâ para projetar um malware que <a href=\"https://www."
+#~ "independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-"
+#~ "android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html"
+#~ "\"> espia através de seus microfones e câmeras enquanto os faz parecer "
+#~ "desligados</a>. Como o spyware detecta sinais, ignora a criptografia."
+
+#~ msgid ""
#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
#~ "surveillance.html\"> tells the cops directly</a>."
Index: proprietary.ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.ru.po,v
retrieving revision 1.353
retrieving revision 1.354
diff -u -b -r1.353 -r1.354
--- proprietary.ru.po 7 Jun 2020 17:00:51 -0000 1.353
+++ proprietary.ru.po 13 Jun 2020 10:00:27 -0000 1.354
@@ -8,7 +8,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary/\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-05-25 16:59+0000\n"
"Last-Translator: Ineiev <ineiev@gnu.org>\n"
"Language-Team: Russian <www-ru-list@gnu.org>\n"
@@ -16,6 +16,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
#. type: Content of: <title>
msgid "Proprietary Software - GNU Project - Free Software Foundation"
@@ -312,6 +313,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -410,23 +427,6 @@
"обÑаÑение ÑквиваленÑно ÑÐ°ÐºÐ¾Ð¼Ñ Ð¾Ð±ÑаÑениÑ.
ÐÑли поÑледнее заÑлÑÐ¶Ð¸Ð²Ð°ÐµÑ "
"оÑÑждениÑ, Ñо и пеÑвое заÑлÑÐ¶Ð¸Ð²Ð°ÐµÑ Ñакого
же оÑÑждениÑ."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"ЦРУ иÑполÑзовало ÑÑÑеÑÑвÑÑÑие ÑÑзвимоÑÑи
в “ÑмнÑÑ
” ÑелевизоÑаÑ
и "
-"ÑелеÑонаÑ
, ÑÑÐ¾Ð±Ñ ÑоÑÑавиÑÑ Ð²ÑедоноÑнÑÑ
пÑогÑаммÑ, коÑоÑÐ°Ñ <a href=\"https://"
-"www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-"
-"android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html\"> "
-"ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ ÑеÑез иÑ
микÑоÑÐ¾Ð½Ñ Ð¸ камеÑÑ,
пÑиÑем они вÑглÑдÑÑ Ñак, как бÑдÑо они "
-"вÑклÑÑенÑ</a>. ÐоÑколÑÐºÑ ÑпионÑкаÑ
пÑогÑамма пеÑеÑ
ваÑÑÐ²Ð°ÐµÑ ÑигналÑ, "
-"ÑиÑÑование Ð¾Ñ ÑÑого не заÑиÑаеÑ."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -503,6 +503,22 @@
msgstr "Ðбновлено:"
#~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in “smart” TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/"
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "ЦРУ иÑполÑзовало ÑÑÑеÑÑвÑÑÑие
ÑÑзвимоÑÑи в “ÑмнÑÑ
” "
+#~ "ÑелевизоÑаÑ
и ÑелеÑонаÑ
, ÑÑобÑ
ÑоÑÑавиÑÑ Ð²ÑедоноÑнÑÑ Ð¿ÑогÑаммÑ, коÑоÑÐ°Ñ "
+#~ "<a href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/"
+#~ "wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\"> ÑÐ¿Ð¸Ð¾Ð½Ð¸Ñ ÑеÑез иÑ
микÑоÑонÑ
и камеÑÑ, пÑиÑем они "
+#~ "вÑглÑдÑÑ Ñак, как бÑдÑо они вÑклÑÑенÑ</a>.
ÐоÑколÑÐºÑ ÑпионÑÐºÐ°Ñ Ð¿ÑогÑамма "
+#~ "пеÑеÑ
ваÑÑÐ²Ð°ÐµÑ ÑигналÑ, ÑиÑÑование оÑ
ÑÑого не заÑиÑаеÑ."
+
+#~ msgid ""
#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
#~ "surveillance.html\"> tells the cops directly</a>."
Index: proprietary.tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.tr.po,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -b -r1.22 -r1.23
--- proprietary.tr.po 7 Jun 2020 09:40:02 -0000 1.22
+++ proprietary.tr.po 13 Jun 2020 10:00:27 -0000 1.23
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-06-07 11:38+0200\n"
"Last-Translator: T. E. Kalayci <tekrei@member.fsf.org>\n"
"Language-Team: Turkish <www-tr-comm@gnu.org>\n"
@@ -14,6 +14,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"X-Generator: Poedit 2.3\n"
@@ -305,6 +306,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -404,22 +421,6 @@
"etmek, kötü muamele etmekle eÅdeÄerdir. Ä°kinci durumun hak ettiÄi
kınamanın "
"aynısını ilk durum da hak eder."
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"CIA, <a href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/"
-"news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
-"assange-a7616651.html\">kapalı gözükmesini saÄladıÄı halde mikrofon ve
"
-"kameralar aracılıÄıyla casusluk</a> yapan kötücül bir yazılım
tasarlamak "
-"için “akıllı” TV ve telefonlardaki mevcut açıkları istismar
"
-"etti. Casus yazılım sinyalleri yakaladıÄı için Åifrelemeyi es
geçiyor."
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -500,6 +501,21 @@
msgstr "Son Güncelleme:"
#~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in “smart” TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/"
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "CIA, <a href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/"
+#~ "news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\">kapalı gözükmesini saÄladıÄı halde mikrofon
ve "
+#~ "kameralar aracılıÄıyla casusluk</a> yapan kötücül bir yazılım
tasarlamak "
+#~ "için “akıllı” TV ve telefonlardaki mevcut açıkları
istismar "
+#~ "etti. Casus yazılım sinyalleri yakaladıÄı için Åifrelemeyi es
geçiyor."
+
+#~ msgid ""
#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
#~ "surveillance.html\"> tells the cops directly</a>."
Index: proprietary.zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-cn.po,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -b -r1.14 -r1.15
--- proprietary.zh-cn.po 8 Jun 2020 01:28:32 -0000 1.14
+++ proprietary.zh-cn.po 13 Jun 2020 10:00:27 -0000 1.15
@@ -7,7 +7,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-06-08 09:11+0800\n"
"Last-Translator: Wensheng Xie <wxie@member.fsf.org>\n"
"Language-Team: CTT <www-zh-cn-translators@gnu.org>\n"
@@ -15,6 +15,7 @@
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Outdated-Since: 2020-06-13 09:55+0000\n"
"X-Generator: Poedit 2.3\n"
#. type: Content of: <title>
@@ -288,6 +289,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -374,21 +391,6 @@
"è¦çé®é¢ãä»éä¹ä¸è¯´ï¼è¦æ±äººä»¬å
æ¥åæ个æ¶æ对å¾
å对人å®æ½æ¶æ对å¾
æ¯çä»·çã"
"对åè
çææè°´è´£ï¼æ¾å¨åè
身ä¸ä¹æ¯ä¸æ ·çã"
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-"ä¸å¤®æ
æ¥å±å©ç¨“æºè½çµè§”åçµè¯çå·²ææ¼æ´è®¾è®¡äºä¸ç§æ¶æ软件ï¼<a
"
-"href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/"
-"wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-"
-"a7616651.html\">éè¿éº¦å
é£åæå头è¿è¡é´è°æ´»å¨ï¼åæ¶çä¸å»ååæ¯å¤äºå
³éç¶æ"
-"</a>ãç±äºé´è°è½¯ä»¶ä¼å
æ¢ä¿¡å·ï¼ç»è¿äºå å¯ã"
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
@@ -466,6 +468,20 @@
msgstr "æåæ´æ°ï¼"
#~ msgid ""
+#~ "The CIA exploited existing vulnerabilities in “smart” TVs and "
+#~ "phones to design a malware that <a href=\"https://www.independent.co.uk/"
+#~ "life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-"
+#~ "phones-handsets-tv-smart-julian-assange-a7616651.html\"> spies through "
+#~ "their microphones and cameras while making them appear to be turned off</"
+#~ "a>. Since the spyware sniffs signals, it bypasses encryption."
+#~ msgstr ""
+#~ "ä¸å¤®æ
æ¥å±å©ç¨“æºè½çµè§”åçµè¯çå·²ææ¼æ´è®¾è®¡äºä¸ç§æ¶æ软件ï¼"
+#~ "<a href=\"https://www.independent.co.uk/life-style/gadgets-and-tech/news/"
+#~ "wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-"
+#~ "assange-a7616651.html\">éè¿éº¦å
é£åæå头è¿è¡é´è°æ´»å¨ï¼åæ¶çä¸å»ååæ¯å¤"
+#~ "äºå
³éç¶æ</a>ãç±äºé´è°è½¯ä»¶ä¼å
æ¢ä¿¡å·ï¼ç»è¿äºå
å¯ã"
+
+#~ msgid ""
#~ "The Alipay Health Code app estimates whether the user has Covid-19 and <a "
#~ "href=\"https://www.nytimes.com/2020/03/01/business/china-coronavirus-"
#~ "surveillance.html\"> tells the cops directly</a>."
Index: proprietary.zh-tw-diff.html
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw-diff.html,v
retrieving revision 1.146
retrieving revision 1.147
diff -u -b -r1.146 -r1.147
--- proprietary.zh-tw-diff.html 7 Jun 2020 07:00:09 -0000 1.146
+++ proprietary.zh-tw-diff.html 13 Jun 2020 10:00:27 -0000 1.147
@@ -27,8 +27,8 @@
<span class="inserted"><ins><em><!--
#skiplinks .button</em></ins></span> { float: <span
class="removed"><del><strong>right; margin-bottom:</strong></del></span> <span
class="inserted"><ins><em>left; margin:</em></ins></span> .5em; }
<span class="removed"><del><strong>div.malfunctions</strong></del></span>
-<span class="inserted"><ins><em>#skiplinks .button a { display: inline-block; }
-#about-section</em></ins></span> { <span class="inserted"><ins><em>font-size:
1.1em; font-style: italic; }
+<span class="inserted"><ins><em>#skiplinks .button a</em></ins></span> { <span
class="inserted"><ins><em>display: inline-block; }
+#about-section { font-size: 1.1em; font-style: italic; }
table#TOC {
display: block;</em></ins></span>
max-width: <span class="removed"><del><strong>27em;</strong></del></span>
<span class="inserted"><ins><em>100%;
@@ -57,10 +57,10 @@
<span class="removed"><del><strong>div.toc</strong></del></span>
<span class="inserted"><ins><em>#TOC ul</em></ins></span> li { <span
class="inserted"><ins><em>padding-bottom: .5em; margin: 0;</em></ins></span>
list-style: none; <span class="removed"><del><strong>margin-bottom:
1em;</strong></del></span> }
<span class="removed"><del><strong>div.toc</strong></del></span>
-<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0;</em></ins></span> }
+<span class="inserted"><ins><em>#TOC ol</em></ins></span> { <span
class="removed"><del><strong>margin-top: 1em;</strong></del></span> <span
class="inserted"><ins><em>text-align: left; margin: 0; }
+#TOC ol li { margin: .5em 5%;</em></ins></span> }
<span class="removed"><del><strong>--></style></strong></del></span>
-<span class="inserted"><ins><em>#TOC ol li { margin: .5em 5%; }
-#TOC a, #TOC a:visited,
+<span class="inserted"><ins><em>#TOC a, #TOC a:visited,
#skiplinks a, #skiplinks a:visited {
color: #004caa;
text-decoration: none;
@@ -127,16 +127,16 @@
<td>
<ul class="columns"></em></ins></span>
<li><a <span
class="removed"><del><strong>href="/proprietary/malware-apple.html">Apple
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-addictions.html">Addictions</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a href="#f1">1</a>)</li>
- <li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-microsoft.html">Microsoft
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-back-doors.html">Back
doors</a> (<a
href="#f1">1</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-google.html">Google
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-censorship.html">Censorship</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-adobe.html">Adobe
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-coverups.html">Coverups</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-amazon.html">Amazon
Malware</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-deception.html">Deception</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-webpages.html">Malware
in webpages</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-drm.html">DRM</a> (<a
href="#f2">2</a>)</li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-mobiles.html">Malware
in mobile devices</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-fraud.html">Fraud</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-games.html">Malware
in games</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-appliances.html">Malware
in appliances</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/malware-cars.html">Malware
in cars</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/proprietary-interference.html">Interference</a></li>
+ <li><a
href="/proprietary/proprietary-jails.html">Jails</a> (<a
href="#f3">3</a>)</li>
<li><a
href="/proprietary/proprietary-manipulation.html">Manipulation</a></li>
<li><a
href="/proprietary/proprietary-obsolescence.html">Obsolescence</a></li>
<li><a
href="/proprietary/proprietary-sabotage.html">Sabotage</a></li>
@@ -153,19 +153,19 @@
<span class="inserted"><ins><em></td>
<td></em></ins></span>
<ul>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li></strong></del></span> <span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-back-doors.html">Back
doors</a></li>
+<li><a
href="/proprietary/proprietary-censorship.html">Censorship</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-appliances.html">Appliances</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-coverups.html">Coverups</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-cars.html">Cars</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-deception.html">Deception</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-games.html">Games</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-incompatibility.html">Incompatibility</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-mobiles.html">Mobiles</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-webpages.html">Webpages</a></li>
</ul>
<ul></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-insecurity.html">Insecurity</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
- <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li>
-<li><a
href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-interference.html">Interference</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-adobe.html">Adobe</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-sabotage.html">Sabotage</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-amazon.html">Amazon</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-surveillance.html">Surveillance</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-apple.html">Apple</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-subscriptions.html">Subscriptions</a></li></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-google.html">Google</a></li></em></ins></span>
+ <li><a <span
class="removed"><del><strong>href="/proprietary/proprietary-tethers.html">Tethers</a></strong></del></span>
<span
class="inserted"><ins><em>href="/proprietary/malware-microsoft.html">Microsoft</a></li>
</ul>
</td>
</tr>
@@ -188,10 +188,10 @@
application programs.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/proprietary-tyrants.html">Tyrants</a>—systems</strong></del></span>
- <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality</em></ins></span>
that <span class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>requires
+ <span class="inserted"><ins><em><li
id="f4"><em>Tether:</em> functionality that requires
permanent (or very frequent) connection to a server.</li>
- <li id="f5"><em>Tyrant:</em> system that
rejects</em></ins></span> any operating
+ <li id="f5"><em>Tyrant:</em>
system</em></ins></span> that <span
class="removed"><del><strong>reject</strong></del></span> <span
class="inserted"><ins><em>rejects</em></ins></span> any operating
system not “authorized” by the manufacturer.</li>
<span class="removed"><del><strong><li><a
href="/proprietary/potential-malware.html">Potential
Malware</a></li>
</ul>
@@ -212,6 +212,18 @@
<span class="inserted"><ins><em><h3 id="latest">Latest
additions</h3>
<ul class="blurbs">
+ <li id="M201909061">
+ <p>Best Buy made controllable appliances and <a
+
href="https://www.theverge.com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-mobile-app-shutdown-november-6">
+ shut down the service to control them through</a>.</p>
+
+ <p>While it is laudable that Best Buy recognized it was mistreating
+ the customers by doing so, this doesn't alter the facts that
+ tethering the device to a particular server is a path to screwing the
+ users, and that it is a consequence of having nonfree software in the
+ device.</p>
+ </li>
+
<li id="M202005070">
<p>Wink sells a “smart” home hub that is tethered
to a server. In May 2020, it ordered the purchasers to start <a
@@ -260,15 +272,6 @@
treatment is equivalent to actually doing it. Whatever condemnation
the latter deserves, the former deserves the same.</p>
</li>
-
- <li id="M201703070">
- <p>The CIA exploited existing vulnerabilities
- in “smart” TVs and phones to design a malware that <a
-
href="https://www.independent.co.uk/life-style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-handsets-tv-smart-julian-assange-a7616651.html">
- spies through their microphones and cameras while making them appear
- to be turned off</a>. Since the spyware sniffs signals, it bypasses
- encryption.</p>
- </li>
</ul>
</div></em></ins></span>
@@ -331,7 +334,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2020/06/07 07:00:09 $
+$Date: 2020/06/13 10:00:27 $
<!-- timestamp end -->
</p>
</div>
Index: proprietary.zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/proprietary.zh-tw.po,v
retrieving revision 1.157
retrieving revision 1.158
diff -u -b -r1.157 -r1.158
--- proprietary.zh-tw.po 7 Jun 2020 07:00:09 -0000 1.157
+++ proprietary.zh-tw.po 13 Jun 2020 10:00:27 -0000 1.158
@@ -6,7 +6,7 @@
msgid ""
msgstr ""
"Project-Id-Version: proprietary.html\n"
-"POT-Creation-Date: 2020-06-07 06:55+0000\n"
+"POT-Creation-Date: 2020-06-13 09:55+0000\n"
"PO-Revision-Date: 2020-02-08 17:12+0800\n"
"Last-Translator: Cheng-Chia Tseng <pswo10680@gmail.com>\n"
"Language-Team: Traditional Chinese <www-zh-tw-translators@gnu.org>\n"
@@ -433,6 +433,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"Wink sells a “smart” home hub that is tethered to a server. In "
"May 2020, it ordered the purchasers to start <a href=\"https://www.techhive."
"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
@@ -495,16 +511,6 @@
"deserves the same."
msgstr ""
-#. type: Content of: <div><ul><li><p>
-msgid ""
-"The CIA exploited existing vulnerabilities in “smart” TVs and "
-"phones to design a malware that <a href=\"https://www.independent.co.uk/life-"
-"style/gadgets-and-tech/news/wikileaks-vault-7-android-iphone-cia-phones-"
-"handsets-tv-smart-julian-assange-a7616651.html\"> spies through their "
-"microphones and cameras while making them appear to be turned off</a>. Since "
-"the spyware sniffs signals, it bypasses encryption."
-msgstr ""
-
#. TRANSLATORS: Use space (SPC) as msgstr if you don't have notes.
#. type: Content of: <div>
msgid "*GNUN-SLOT: TRANSLATOR'S NOTES*"
Index: pt-br.po
===================================================================
RCS file: /web/www/www/proprietary/po/pt-br.po,v
retrieving revision 1.243
retrieving revision 1.244
diff -u -b -r1.243 -r1.244
--- pt-br.po 7 Jun 2020 07:00:09 -0000 1.243
+++ pt-br.po 13 Jun 2020 10:00:27 -0000 1.244
@@ -1847,6 +1847,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: ru.po
===================================================================
RCS file: /web/www/www/proprietary/po/ru.po,v
retrieving revision 1.406
retrieving revision 1.407
diff -u -b -r1.406 -r1.407
--- ru.po 7 Jun 2020 16:54:17 -0000 1.406
+++ ru.po 13 Jun 2020 10:00:27 -0000 1.407
@@ -2126,11 +2126,11 @@
"subscription-model.html\"> paying a monthly fee for the use of that server</"
"a>. Because of the tethering, the hub is useless without that."
msgstr ""
-"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Wink пÑÐ¾Ð´Ð°ÐµÑ Ñзел “Ñмного”
дома, пÑивÑзаннÑй к ÑеÑвеÑÑ. Ð "
-"мае 2020 года ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð²ÐµÐ»ÐµÐ»Ð°
покÑпаÑелÑм наÑаÑÑ <a href=\"https://www.techhive."
-"com/article/3542631/wink-users-revolt-following-its-sudden-shift-to-a-"
-"subscription-model.html\"> вноÑиÑÑ ÐµÐ¶ÐµÐ¼ÐµÑÑÑнÑÑ Ð¿Ð»Ð°ÑÑ
за полÑзование ÑÑим ÑеÑвеÑом</a>. "
-"Ðз-за пÑивÑзки Ñзел без ÑÑого не ÑабоÑаеÑ."
+"ÐÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Wink пÑÐ¾Ð´Ð°ÐµÑ Ñзел “Ñмного”
дома, пÑивÑзаннÑй к ÑеÑвеÑÑ. "
+"Рмае 2020 года ÐºÐ¾Ð¼Ð¿Ð°Ð½Ð¸Ñ Ð²ÐµÐ»ÐµÐ»Ð°
покÑпаÑелÑм наÑаÑÑ <a href=\"https://"
+"www.techhive.com/article/3542631/wink-users-revolt-following-its-sudden-"
+"shift-to-a-subscription-model.html\"> вноÑиÑÑ ÐµÐ¶ÐµÐ¼ÐµÑÑÑнÑÑ
плаÑÑ Ð·Ð° "
+"полÑзование ÑÑим ÑеÑвеÑом</a>. Ðз-за
пÑивÑзки Ñзел без ÑÑого не ÑабоÑаеÑ."
#. type: Content of: <div><ul><li><p>
msgid ""
@@ -2161,6 +2161,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: tr.po
===================================================================
RCS file: /web/www/www/proprietary/po/tr.po,v
retrieving revision 1.15
retrieving revision 1.16
diff -u -b -r1.15 -r1.16
--- tr.po 7 Jun 2020 09:59:16 -0000 1.15
+++ tr.po 13 Jun 2020 10:00:27 -0000 1.16
@@ -1615,6 +1615,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: zh-cn.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-cn.po,v
retrieving revision 1.11
retrieving revision 1.12
diff -u -b -r1.11 -r1.12
--- zh-cn.po 8 Jun 2020 01:28:32 -0000 1.11
+++ zh-cn.po 13 Jun 2020 10:00:28 -0000 1.12
@@ -1586,6 +1586,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
Index: zh-tw.po
===================================================================
RCS file: /web/www/www/proprietary/po/zh-tw.po,v
retrieving revision 1.183
retrieving revision 1.184
diff -u -b -r1.183 -r1.184
--- zh-tw.po 7 Jun 2020 07:00:09 -0000 1.183
+++ zh-tw.po 13 Jun 2020 10:00:28 -0000 1.184
@@ -1664,6 +1664,22 @@
#. type: Content of: <div><ul><li><p>
msgid ""
+"Best Buy made controllable appliances and <a href=\"https://www.theverge."
+"com/2019/9/6/20853671/best-buy-connect-insignia-smart-plug-wifi-freezer-"
+"mobile-app-shutdown-november-6\"> shut down the service to control them "
+"through</a>."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
+"While it is laudable that Best Buy recognized it was mistreating the "
+"customers by doing so, this doesn't alter the facts that tethering the "
+"device to a particular server is a path to screwing the users, and that it "
+"is a consequence of having nonfree software in the device."
+msgstr ""
+
+#. type: Content of: <div><ul><li><p>
+msgid ""
"The Jibo robot toys were tethered to the manufacturer's server, and <a href="
"\"https://www.apnews.com/99c9ec8ebad242ca88178e22c7642648\"> the company "
"made them all cease to work</a> by shutting down that server."
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/01
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/07
- www/proprietary/po de.po es.po fr.po it.po ja.p...,
GNUN <=
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/22
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/25
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/26
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/29
- www/proprietary/po de.po es.po fr.po it.po ja.p..., GNUN, 2020/06/29